Powered by Deep Web Technologies
Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Threat Analysis Framework | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Threat Analysis Framework The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be...

2

Microsoft Word - Threat Analysis Framework Sept07_comments-final.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5792 5792 Unlimited Release September 2007 Threat Analysis Framework David P. Duggan and John T. Michalski Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. Threat Analysis Framework 2 Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government, nor any agency

3

An Intelligent Threat Prevention Framework with Heterogeneous Information  

E-Print Network (OSTI)

An Intelligent Threat Prevention Framework with Heterogeneous Information Wenjun Ma 1 and Weiru Liu 1 Abstract. Three issues usually are associated with threat prevention intelligent surveillance, the de- mand of effectively predicting suspects' intention and ranking the potential threats posed

Liu, Weiru

4

Cyber Threat Trees for Large System Threat Cataloging and Analysis*  

E-Print Network (OSTI)

Cyber Threat Trees for Large System Threat Cataloging and Analysis* P. Ongsakorn, K. Turney, M, kturney, mitch, nair, szygenda, manikas}@lyle.smu.edu Abstract--The implementation of cyber threat. Because large systems have many possible threats that may be interdependent, it is crucial

Thornton, Mitchell

5

Insider threat to secure facilities: data analysis  

SciTech Connect

Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs.

Not Available

1980-05-09T23:59:59.000Z

6

Comprehensive Vulnerability and Threat Analysis | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Vulnerability and Threat Analysis Our world is characterized by ever-changing threats to critical facilities, national assets and international interests. Understanding...

7

Hardware Trojan Attacks: Threat Analysis and  

E-Print Network (OSTI)

of malicious modifications of electronic hardware at different stages of its life cycle, pose major securityINVITED P A P E R Hardware Trojan Attacks: Threat Analysis and Countermeasures This paper or the information being processed. The underlying hardware used for information processing has been considered

Bhunia, Swarup

8

Environmental Metabolomics:? A SWOT Analysis (Strengths, Weaknesses, Opportunities, and Threats)  

Science Journals Connector (OSTI)

Environmental Metabolomics:? A SWOT Analysis (Strengths, Weaknesses, Opportunities, and Threats) ... An overall goal of environmental metabolomics is to understand what is metabolomically “normal” or adaptive and what constitutes a threat to human health and the environment. ...

Marion G. Miller

2007-01-04T23:59:59.000Z

9

A situational awareness framework for securing the smart grid using monitoring sensors and threat models  

Science Journals Connector (OSTI)

Security, access control and risk mitigation in the smart grid are matters of great impact for this important sector of the critical infrastructure. Situational awareness requires a means of aggregating information and presenting that information in a manner conducive to assessing risk. While major components of the electric power grid were traditionally deployed in physically isolated networks, they are now utilising IP-based, open, interconnected networks to transmit and manage the supervisory control and data acquisition (SCADA) messages. Unfortunately, SCADA protocols used for communications and the systems that implement those protocols were not originally designed with security in mind. Therefore, in order to enhance security and detect potential malicious behaviour, smart grid operators need detailed and accurate information about the status, integrity, configuration and network topology of SCADA devices as well as information about any threats that may impact the grid. This paper describes a comprehensive framework that provides situational awareness (SA) for SCADA devices and their operations in a smart grid environment. Situational awareness is achieved by processing information collected by monitoring sensors and understanding threats that may affect operations. The proposed framework employs a threat modelling methodology to support this mission.

Anastasia Mavridou; Victor Zhou; Jerald Dawkins; Mauricio Papa

2012-01-01T23:59:59.000Z

10

A margin-based approach to vehicle threat assessment in a homotopy framework for semi-autonomous highway navigation  

E-Print Network (OSTI)

This thesis describes the design of an unified framework for threat assessment and the shared control between a human driver and the onboard controller, based on the notion of fields of safe travel. It allows to perform ...

Constantin, Alexandre, S.M. Massachusetts Institute of Technology

2014-01-01T23:59:59.000Z

11

ANALYSIS OF ELECTRIC GRID SECURITY UNDER TERRORIST THREAT Javier Salmeron  

E-Print Network (OSTI)

ANALYSIS OF ELECTRIC GRID SECURITY UNDER TERRORIST THREAT Javier Salmeron Kevin Wood Operations techniques for analyzing the security and resilience of electrical power grids against disruptions caused analytical techniques to help mitigate the disruptions to electric power grids caused by terrorist attacks

Baldick, Ross

12

EXTERNAL TERRORIST THREATS TO CIVILIAN AIRLINERS: A SUMMARY RISK ANALYSIS OF  

E-Print Network (OSTI)

EXTERNAL TERRORIST THREATS TO CIVILIAN AIRLINERS: A SUMMARY RISK ANALYSIS OF MANPADS, OTHER BALLISTIC WEAPONS RISKS, FUTURE THREATS, AND POSSIBLE COUNTERMEASURES POLICIES O'Sullivan, T. CREATE REPORT Threats to Civilian Airliners: A Summary Risk Analysis of MANPADS, Other Ballistic Weapons Risks, Future

Wang, Hai

13

Threat to the point: improving the value of comparative extinction risk analysis for conservation action  

E-Print Network (OSTI)

Threat to the point: improving the value of comparative extinction risk analysis for conservation of such analyses for conservation practice has been questioned. One reason for underperformance may be that threats this problem by (i) reviewing the use of threats in this field and (ii) quanti- tatively investigating

Davidson, Ana

14

Sodium loop framework structural analysis  

SciTech Connect

This document provides the structural analysis of the Sodium Loop framework in a drop condition. The drop is similar to the US Department of Transportation non-bulk, performance-oriented packaging (Packaging Group I) drop test. The drop height evaluated for the Sodium Loop framework is 5.9 ft.

Nguyen, P.M.

1995-06-06T23:59:59.000Z

15

Threat Characterization  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Michalski Michalski SNL Department 5621 Threat Characterization Summary Slide: Threat Characterization Outcomes: Develop a network analysis toolset to allow an analyst to efficiently "crawl" large data sets to discover relevant threat information. Road Map Challenges:"The ability to discover & understand emerging threats and vulnerabilities is a prerequisite to developing effective countermeasures" Major Successes: * Implemented prototype front end crawler and semantic analysis engine (Sandia National Labs). * Transition Development work to the Institute for Complex Additive System Analysis (ICASA) Center (NMTech) * Quarterly threat reports being produced  Schedule: Improvements to both the analyst process and GUI Interface, 4Q 2009; Transition maintenance and development to

16

Analysis of Threats to the Security of CPC Networks J. G. Alfaro,, M. Barbeau, and E. Kranakis  

E-Print Network (OSTI)

Analysis of Threats to the Security of CPC Networks J. G. Alfaro,, M. Barbeau, and E. Kranakis@scs.carleton.ca, kranakis@scs.carleton.ca Abstract Detecting and responding to security and privacy threats to Electronic of the threats in terms of importance must be done. We present such an evaluation. Our analysis of the threats

Kranakis, Evangelos

17

Analysis of Threats to the Security of EPC Networks J. G. Alfaro,, M. Barbeau, and E. Kranakis  

E-Print Network (OSTI)

Analysis of Threats to the Security of EPC Networks J. G. Alfaro,, M. Barbeau, and E. Kranakis@scs.carleton.ca, kranakis@scs.carleton.ca Abstract Detecting and responding to security and privacy threats to Electronic of the threats in terms of importance must be done. We present such an evaluation. Our analysis of the threats

Garcia-Alfaro, Joaquin

18

Fact Sheet: Detection and Analysis of Threats to the Energy Sector (DATES)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Detection and Analysis of Threats Detection and Analysis of Threats to the Energy Sector (DATES) A groundbreaking integrated capability in intrusion detection, security event management, and sector-wide threat analysis Detecting cyber attacks against digital control systems quickly and accurately is essential to energy sector security. Current intrusion detection systems (IDS) continuously scan control system communication paths and alert operators of suspicious network traffic. But existing IDS, often not tailored to the control environment, typically offer limited attack response capability and frequently produce false alarms or fail to alert. Without carefully deployed monitoring, these devices can produce an overwhelming number of alarms

19

Coupling Multi-Criteria Decision Analysis, Life-Cycle Assessment, and Risk Assessment for Emerging Threats  

Science Journals Connector (OSTI)

Coupling Multi-Criteria Decision Analysis, Life-Cycle Assessment, and Risk Assessment for Emerging Threats ... Emerging environmental threats such as novel chemical compounds, biological agents, and nanomaterials present serious challenges to traditional models of risk analysis and regulatory risk management processes. ... The recent emergence of new materials, technologies, and other environmental stressors in both the marketplace and the public consciousness coincides with increased recognition of the importance of an integrated systems approach to environmental health and safety that includes life-cycle thinking, public participation, and adaptive management of risks associated with emerging threats. ...

Igor Linkov; Thomas P. Seager

2011-04-27T23:59:59.000Z

20

Analysis and Modelling of Fraud and Revenue Assurance Threats in Future Telecommunications Network and Service Environments  

E-Print Network (OSTI)

Analysis and Modelling of Fraud and Revenue Assurance Threats in Future Telecommunications Network and revenue assurance in future telecommunication network and service environments. 1. Introduction, usually, to obtain property or services from him or her unjustly [1]. The Telecommunications (Fraud) Act

Haddadi, Hamed

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Threat Analysis of Portable Hack Tools from USB Storage Devices and Protection Solutions  

E-Print Network (OSTI)

Threat Analysis of Portable Hack Tools from USB Storage Devices and Protection Solutions Dung V hack tools. However, beside U3 technology, attackers also have another more flexible alternative, portable application or application virtualization, which allows a wide range of hack tools to be compiled

Halgamuge, Malka N.

22

WHAT DO THREAT LEVELS AND RESPONSE LEVELS MEAN? THREAT LEVELS  

E-Print Network (OSTI)

WHAT DO THREAT LEVELS AND RESPONSE LEVELS MEAN? THREAT LEVELS: The UK Threat Level is decided by the Government's Joint Terrorism Analysis Centre (JTAC). It is the system to assess the threat to the UK from Threat Levels: Low - an attack is unlikely Moderate - an attack is possible, but not likely Substantial

Edinburgh, University of

23

Homicidal Threats  

Science Journals Connector (OSTI)

Every day in the media we hear about death threats. Death threats are often made against individuals, i.e ... e. “Death to America.” Often these threats are accompanied by shouts, specific gestures,...

Stephen J. Morewitz

2008-01-01T23:59:59.000Z

24

A threat-rigidity analysis of the Apache Software Foundation's response to reported server security issues  

E-Print Network (OSTI)

There exists a broad body of literature documenting organizational responses to competitive threats, including those responses which fit into the threat-rigidity hypothesis. The purpose of this thesis is to investigate how ...

Shapira, Yoav

2006-01-01T23:59:59.000Z

25

On threats analysis approach applied to a Mediterranean remnant wetland: Is the assessment of human-induced threats related to different level of expertise of respondents?  

Science Journals Connector (OSTI)

Naming, listing and measuring human-induced threats in protected areas are crucial in conservation. ... , we defined a check-list of direct threats in a Mediterranean remnant wetland (central Italy ... students a...

Corrado Battisti; Luca Luiselli; Daniele Pantano…

2008-06-01T23:59:59.000Z

26

2014 Threats  

Science Journals Connector (OSTI)

......Society Winter 2013 research-article Information Security 2014 Threats Gareth Niblett Gareth Niblett, Chairman of the BCS Information...www.bcs.org/securitycommunity FURTHERINFORMATION 2014 THREATS doi:10.1093/itnow/bwt073 2013 The British Computer......

Gareth Niblett

2013-01-01T23:59:59.000Z

27

Initial Risk Analysis and Decision Making Framework  

SciTech Connect

Commercialization of new carbon capture simulation initiative (CCSI) technology will include two key elements of risk management, namely, technical risk (will process and plant performance be effective, safe, and reliable) and enterprise risk (can project losses and costs be controlled within the constraints of market demand to maintain profitability and investor confidence). Both of these elements of risk are incorporated into the risk analysis subtask of Task 7. Thus far, this subtask has developed a prototype demonstration tool that quantifies risk based on the expected profitability of expenditures when retrofitting carbon capture technology on a stylized 650 MW pulverized coal electric power generator. The prototype is based on the selection of specific technical and financial factors believed to be important determinants of the expected profitability of carbon capture, subject to uncertainty. The uncertainty surrounding the technical performance and financial variables selected thus far is propagated in a model that calculates the expected profitability of investments in carbon capture and measures risk in terms of variability in expected net returns from these investments. Given the preliminary nature of the results of this prototype, additional work is required to expand the scope of the model to include additional risk factors, additional information on extant and proposed risk factors, the results of a qualitative risk factor elicitation process, and feedback from utilities and other interested parties involved in the carbon capture project. Additional information on proposed distributions of these risk factors will be integrated into a commercial implementation framework for the purpose of a comparative technology investment analysis.

Engel, David W.

2012-02-01T23:59:59.000Z

28

Framework for Statistical Analysis of Homogeneous Multicore Power Grid Networks  

E-Print Network (OSTI)

Framework for Statistical Analysis of Homogeneous Multicore Power Grid Networks Guanglei Liu the feasibility of such a framework. 1 Index Terms ­ Multicore, Power Grid Network, Statistical Analysis, Process voltage. It has become the number one concern in the design of multicore power grid network. Due

Fan, Jeffrey

29

Neural Mechanisms Underlying Selective Attention to Threat  

E-Print Network (OSTI)

Neural Mechanisms Underlying Selective Attention to Threat SONIA J. BISHOP Behavioural and Clinical. This provides a framework for inves- tigating the neural mechanisms underlying selective attention to threat. Both subcortical regions implicated in threat detection--specifically the amygdala--and prefrontal

Bishop, Sonia

30

Flexible Framework for Building Energy Analysis: Preprint  

SciTech Connect

In the building energy research and advanced practitioner communities, building models are perturbed across large parameter spaces to assess energy and cost performance in the face of programmatic and economic constraints. This paper describes the OpenStudio software framework for performing such analyses.

Hale, E.; Macumber, D.; Weaver, E.; Shekhar, D.

2012-09-01T23:59:59.000Z

31

Hydrogen economy in China: Strengths–weaknesses–opportunities–threats analysis and strategies prioritization  

Science Journals Connector (OSTI)

Abstract The objective of this paper is to analyze the internal and external environment of hydrogen economy in China using strengths–weaknesses–opportunities–threats (SWOT) analytical method, and then to prioritize the strategies for promoting the development of hydrogen economy in China. After the key strengths, weaknesses, opportunities and threats of the hydrogen economy in China were identified and nine effective strategies were proposed, a multi-criteria decision-making method by integrating goal programming and fuzzy theory has been developed for prioritizing these strategies, which can help the stakeholders/decision-makers to implement these strategies appropriately, The proposed method is not limited to China, and it is a generic method that can also be used to study the hydrogen economy of other regions.

Jingzheng Ren; Suzhao Gao; Shiyu Tan; Lichun Dong

2015-01-01T23:59:59.000Z

32

Anonymity Analysis of Onion Routing in the Universally Composable Framework  

E-Print Network (OSTI)

Anonymity Analysis of Onion Routing in the Universally Composable Framework Joan Feigenbaum Yale. Specifically we present a probabilistic analysis of onion routing in a black-box model of anonymous Syverson Naval Research Laboratory syverson@itd.navy.mil ABSTRACT We present the formalization and analysis

Johnson, Aaron

33

Geologic Framework Model Analysis Model Report  

SciTech Connect

The purpose of this report is to document the Geologic Framework Model (GFM), Version 3.1 (GFM3.1) with regard to data input, modeling methods, assumptions, uncertainties, limitations, and validation of the model results, qualification status of the model, and the differences between Version 3.1 and previous versions. The GFM represents a three-dimensional interpretation of the stratigraphy and structural features of the location of the potential Yucca Mountain radioactive waste repository. The GFM encompasses an area of 65 square miles (170 square kilometers) and a volume of 185 cubic miles (771 cubic kilometers). The boundaries of the GFM were chosen to encompass the most widely distributed set of exploratory boreholes (the Water Table or WT series) and to provide a geologic framework over the area of interest for hydrologic flow and radionuclide transport modeling through the unsaturated zone (UZ). The depth of the model is constrained by the inferred depth of the Tertiary-Paleozoic unconformity. The GFM was constructed from geologic map and borehole data. Additional information from measured stratigraphy sections, gravity profiles, and seismic profiles was also considered. This interim change notice (ICN) was prepared in accordance with the Technical Work Plan for the Integrated Site Model Process Model Report Revision 01 (CRWMS M&O 2000). The constraints, caveats, and limitations associated with this model are discussed in the appropriate text sections that follow. The GFM is one component of the Integrated Site Model (ISM) (Figure l), which has been developed to provide a consistent volumetric portrayal of the rock layers, rock properties, and mineralogy of the Yucca Mountain site. The ISM consists of three components: (1) Geologic Framework Model (GFM); (2) Rock Properties Model (RPM); and (3) Mineralogic Model (MM). The ISM merges the detailed project stratigraphy into model stratigraphic units that are most useful for the primary downstream models and the repository design. These downstream models include the hydrologic flow models and the radionuclide transport models. All the models and the repository design, in turn, will be incorporated into the Total System Performance Assessment (TSPA) of the potential radioactive waste repository block and vicinity to determine the suitability of Yucca Mountain as a host for the repository. The interrelationship of the three components of the ISM and their interface with downstream uses are illustrated in Figure 2.

R. Clayton

2000-12-19T23:59:59.000Z

34

Cluster Analysis-Based Approaches for Geospatiotemporal Data Mining of Massive Data Sets for Identification of Forest Threats  

SciTech Connect

We investigate methods for geospatiotemporal data mining of multi-year land surface phenology data (250 m2 Normalized Difference Vegetation Index (NDVI) values derived from the Moderate Resolution Imaging Spectrometer (MODIS) in this study) for the conterminous United States (CONUS) as part of an early warning system for detecting threats to forest ecosystems. The approaches explored here are based on k-means cluster analysis of this massive data set, which provides a basis for defining the bounds of the expected or normal phenological patterns that indicate healthy vegetation at a given geographic location. We briefly describe the computational approaches we have used to make cluster analysis of such massive data sets feasible, describe approaches we have explored for distinguishing between normal and abnormal phenology, and present some examples in which we have applied these approaches to identify various forest disturbances in the CONUS.

Mills, Richard T [ORNL] [ORNL; Hoffman, Forrest M [ORNL] [ORNL; Kumar, Jitendra [ORNL] [ORNL; HargroveJr., William Walter [USDA Forest Service

2011-01-01T23:59:59.000Z

35

A Framework for Radio Frequency Spectrum Measurement and Analysis  

E-Print Network (OSTI)

A Framework for Radio Frequency Spectrum Measurement and Analysis V. Rory Petty ITTC-FY2008-TR allocation and the burgeoning problem of spectrum scarcity have prompted an examination of how the radio frequency spectrum is utilized. The radio frequency spectrum is an important national resource that impacts

Kansas, University of

36

MCSAF: AN EXTENSIBLE STATIC ANALYSIS FRAMEWORK FOR THE MATLAB LANGUAGE  

E-Print Network (OSTI)

programming. Despite its popularity, there are few active projects providing open tools for MATLAB related is to simplify the development of new compiler tools for MATLAB. The McLAB project was started in orderMCSAF: AN EXTENSIBLE STATIC ANALYSIS FRAMEWORK FOR THE MATLAB LANGUAGE by Jesse Doherty School

Verbrugge, Clark

37

BOMB THREAT CALL PROCEDURES  

E-Print Network (OSTI)

THREAT CALL PROCEDURES BOMB THREAT CHECKLIST Date: Time: Time Caller Phone Number Where Hung Up: Call Received:Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act threat is received by phone: 1. Remain calm. Keep the caller on the line for as long as possible. DO

Guo, Ting

38

Framework for Interactive Parallel Dataset Analysis on the Grid  

SciTech Connect

We present a framework for use at a typical Grid site to facilitate custom interactive parallel dataset analysis targeting terabyte-scale datasets of the type typically produced by large multi-institutional science experiments. We summarize the needs for interactive analysis and show a prototype solution that satisfies those needs. The solution consists of desktop client tool and a set of Web Services that allow scientists to sign onto a Grid site, compose analysis script code to carry out physics analysis on datasets, distribute the code and datasets to worker nodes, collect the results back to the client, and to construct professional-quality visualizations of the results.

Alexander, David A.; Ananthan, Balamurali; /Tech-X Corp.; Johnson, Tony; Serbo, Victor; /SLAC

2007-01-10T23:59:59.000Z

39

Research Article Signaling Threat  

E-Print Network (OSTI)

Research Article Signaling Threat How Situational Cues Affect Women in Math, Science and organization,canmake potentialtargetsvulnerabletosocial identity threat.Objective and subjective measuresofidentity threat were collected from male and female math, science, and engineering (MSE) majors who watched

Gross, James J.

40

Threats and Countermeasures  

Science Journals Connector (OSTI)

......research-article Information Security Threats and Countermeasures Gareth Niblett Gareth...Specialist Group, takes a look at upcoming threats and countermeasures. Follow @bcsbooks...for the user's email account. This threat is not going to recede, so everyone should......

Gareth Niblett

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Vacuoles: a hollow threat?  

E-Print Network (OSTI)

2 EDITORIALS Vacuoles: a hollow threat? Tony L. Yaksh, PhDthat Vacuoles: a hollow threat? provided by procaine anda l’esprit : Vacuoles: a hollow threat? Ces vacuoles acides

Yaksh, Tony L.

2010-01-01T23:59:59.000Z

42

A Complexity Science-Based Framework for Global Joint Operations Analysis to Support Force Projection: LDRD Final Report.  

SciTech Connect

The military is undergoing a significant transformation as it modernizes for the information age and adapts to address an emerging asymmetric threat beyond traditional cold war era adversaries. Techniques such as traditional large-scale, joint services war gaming analysis are no longer adequate to support program evaluation activities and mission planning analysis at the enterprise level because the operating environment is evolving too quickly. New analytical capabilities are necessary to address modernization of the Department of Defense (DoD) enterprise. This presents significant opportunity to Sandia in supporting the nation at this transformational enterprise scale. Although Sandia has significant experience with engineering system of systems (SoS) and Complex Adaptive System of Systems (CASoS), significant fundamental research is required to develop modeling, simulation and analysis capabilities at the enterprise scale. This report documents an enterprise modeling framework which will enable senior level decision makers to better understand their enterprise and required future investments.

Lawton, Craig R.

2015-01-01T23:59:59.000Z

43

Insider Threat Program  

Directives, Delegations, and Requirements

To establish responsibilities and requirements for the Department of Energy (DOE) Insider Threat Program (ITP) to deter, detect, and mitigate insider threat actions by Federal and contractor employees in accordance with the requirements of Executive Order 13587, the National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs and other government-wide and DOE requirements. Does not cancel other directives.

2014-06-02T23:59:59.000Z

44

Analysis and System Design Framework for Infrared Spatial Heterodyne Spectrometers  

SciTech Connect

The authors present a preliminary analysis and design framework developed for the evaluation and optimization of infrared, Imaging Spatial Heterodyne Spectrometer (SHS) electro-optic systems. Commensurate with conventional interferometric spectrometers, SHS modeling requires an integrated analysis environment for rigorous evaluation of system error propagation due to detection process, detection noise, system motion, retrieval algorithm and calibration algorithm. The analysis tools provide for optimization of critical system parameters and components including : (1) optical aperture, f-number, and spectral transmission, (2) SHS interferometer grating and Littrow parameters, and (3) image plane requirements as well as cold shield, optical filtering, and focal-plane dimensions, pixel dimensions and quantum efficiency, (4) SHS spatial and temporal sampling parameters, and (5) retrieval and calibration algorithm issues.

Cooke, B.J.; Smith, B.W.; Laubscher, B.E.; Villeneuve, P.V.; Briles, S.D.

1999-04-05T23:59:59.000Z

45

Military Expenditure, Threats, and Growth  

E-Print Network (OSTI)

a country's external military threat; lgdp is the log ofMilitary Expenditure, Threats, and Growth * September 2003expenditure, external threats, corruption, and other

Aizenman, Joshua; Glick, Reuven

2003-01-01T23:59:59.000Z

46

BOMB THREAT CALL PROCEDURES  

E-Print Network (OSTI)

BOMB THREAT CALL PROCEDURES WHO TO CONTACT (select one) · Follow your local guidelines · Federal Protective Service (FPS) Police 1-877-4-FPS-411 (1-877-437-7411) · 911 Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act quickly, but remain calm and obtain

Boyce, Richard L.

47

Threats and Countermeasures  

Science Journals Connector (OSTI)

......research-article Information Security Threats and Countermeasures Gareth Niblett *Risk...into the future* to see what emerging threats we might have to contend with. doi...into the future* to see what emerging threats we might have to contend with. *Risk......

Gareth Niblett

2012-01-01T23:59:59.000Z

48

Five of the Threats  

Science Journals Connector (OSTI)

......research-article Information Security Five of the Threats Graeme Nash Today, social networking...Here are the top five social networking threats to which organisations may be exposed...probably infected themselves). Whilst the threat from this particular malware has now FIVE......

Graeme Nash

2013-01-01T23:59:59.000Z

49

Combating Future Threats  

Science Journals Connector (OSTI)

......research-article Future Combating Future Threats Andy Clark On 21 September BCS, The Chartered...leadership debate about future security threats. Andy Clark, Head of Forensics at Detica...and where are they? These are different threats. Smartphones are powerful, connected......

Andy Clark

2011-01-01T23:59:59.000Z

50

Online Monitoring Technical Basis and Analysis Framework for Large Power  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for Large for Large Power Transformers; Interim Report for FY 2012 Online Monitoring Technical Basis and Analysis Framework for Large Power Transformers; Interim Report for FY 2012 The Light Water Reactor Sustainability Program is a research, development, and deployment program sponsored by the U.S. Department of Energy Office of Nuclear Energy. The program is operated in collaboration with the Electric Power Research Institute's (EPRI's) research and development efforts in the Long-Term Operations (LTO) Program. The LTO Program is managed as a separate technical program operating in the Plant Technology Department of the EPRI Nuclear Power Sector with the guidance of an industry advisory Integration Committee. Because both the Department of Energy Office of Nuclear Energy and EPRI conduct research and development in technologies

51

Online Monitoring Technical Basis and Analysis Framework for Emergency  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for for Emergency Diesel Generators-Interim Report for FY 2013 Online Monitoring Technical Basis and Analysis Framework for Emergency Diesel Generators-Interim Report for FY 2013 The Light Water Reactor Sustainability Program is a research, development, and deployment program sponsored by the U.S. Department of Energy Office of Nuclear Energy. The program is operated in collaboration with the Electric Power Research Institute's (EPRI's) research and development efforts in the Long-Term Operations Program. The Long-Term Operations Program is managed as a separate technical program operating in the Plant Technology Department of the EPRI Nuclear Power Sector with the guidance of an industry advisory Integration Committee. Because both the Department of Energy Office of Nuclear Energy and EPRI conduct research and development

52

The Nature of the Bioterrorism Threat  

SciTech Connect

This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

Regens, J. L.

2003-02-25T23:59:59.000Z

53

BOMB THREATS What should I know about bomb threats?  

E-Print Network (OSTI)

BOMB THREATS What should I know about bomb threats? Goals of a Bomb Threat: Motivation and goals for making a bomb threat usually comes from one of two goals: The Hoax Caller: The most frequent goal to warn of the threat to minimize personal injuries or property damage. The caller may be the person

Fernandez, Eduardo

54

Bomb threat There are two types of Bomb Threats  

E-Print Network (OSTI)

v Bomb threat There are two types of Bomb Threats: 1. Specific Information/location will be given about the device, or a suspicious item and/or location. Specific Threat - On a landline Dial 6111, state you have received a "SPecific BOmB threat". If possible recall exact wording of threat. 2. Non

Hickman, Mark

55

BOMB THREATS What should I know about bomb threats?  

E-Print Network (OSTI)

BOMB THREATS What should I know about bomb threats? Goals of a Bomb Threat: Motivation and goals for making a bomb threat usually comes from one of two goals: The Hoax Caller: The most frequent goal of the threat to minimize personal injuries or property damage. The caller may be the person placing the bomb

Fernandez, Eduardo

56

BOMB THREATS What should I know about bomb threats?  

E-Print Network (OSTI)

BOMB THREATS What should I know about bomb threats? Goals of a Bomb Threat · The Hoax Caller and goals for making a bomb threat usually comes from one of two goals: · The Credible Caller: The caller or she wants to warn of the threat to minimize personal injuries or property damage. The caller may

Fernandez, Eduardo

57

Analysis, Design and Development of a Generic Framework for Power Trading  

E-Print Network (OSTI)

in their producing plans (e.g. wind power plant). The bid model is the best model for clients with units havingAnalysis, Design and Development of a Generic Framework for Power Trading Rasmus Skovmark, s001509 analysis, design and development of a generic framework for automatic real- time trading of power among

58

Categorizing Threat Building and Using a Generic Threat Matrix | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Categorizing Threat Building and Using a Generic Threat Matrix Categorizing Threat Building and Using a Generic Threat Matrix Categorizing Threat Building and Using a Generic Threat Matrix The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general

59

COUNTERING MICROBIAL THREATS  

Science Journals Connector (OSTI)

COUNTERING MICROBIAL THREATS ... The highly contagious disease dubbed severe acute respiratory syndrome, first seen in Asia but now diagnosed in several other countries, underscores the report's key point: More must be done to improve the public health and medical communities' ability to prevent, detect, and control emerging and resurging health threats posed by wily microbes. ... Because we all live on the same global microbial real estate, "one nation's problem soon can become every nation's problem," warns Margaret A. Hamburg, cochair of the panel that produced the report, "Microbial Threats to Health: Emergence, Detection & Response." ...

LOIS EMBER

2003-03-24T23:59:59.000Z

60

A parallel and matrix free framework for global stability analysis of compressible flows  

E-Print Network (OSTI)

An numerical iterative framework for global modal stability analysis of compressible flows using a parallel environment is presented. The framework uses a matrix-free implementation to allow computations of large scale problems. Various methods are tested with regard to convergence acceleration of the framework. The methods consist of a spectral Cayley transformation used to select desired Eigenvalues from a large spectrum, an improved linear solver and a parallel block-Jacobi preconditioning scheme.

Henze, O; Sesterhenn, J

2015-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Cybersecurity Framework Development Overview  

E-Print Network (OSTI)

Cybersecurity Framework Development Overview NIST's Role in Implementing Executive Order 13636 "Improving Critical Infrastructure Cybersecurity" #12;Executive Order 13636: Improving Critical Infrastructure Cybersecurity - February 12, 2013 "The cyber threat to critical infrastructure continues to grow

Bentz, Dale P.

62

Cybersecurity Framework Development Overview  

E-Print Network (OSTI)

Cybersecurity Framework Development Overview NIST's Role in Implementing Executive Order 13636 "Improving Critical Infrastructure Cybersecurity" #12;Executive Order 13636: Improving Critical Infrastructure Cybersecurity February 12, 2013 · "The cyber threat to critical infrastructure continues to grow

63

C-Meter: A Framework for Performance Analysis of Computing Clouds  

E-Print Network (OSTI)

C-Meter: A Framework for Performance Analysis of Computing Clouds Nezih Yigitbasi, Alexandru Iosup virtualization and network communications overheads. To address these issues, we have designed and implemented C-Meter of computing clouds. Then, we present the architecture of the C-Meter framework and discuss several resource

Iosup, Alexandru

64

Two-Tier Hierarchical Cyber-Physical Security Analysis Framework For Smart Grid  

E-Print Network (OSTI)

Two-Tier Hierarchical Cyber-Physical Security Analysis Framework For Smart Grid Jin Wei and Deepa stability in the smart grid in the face of cyber-physical attack. We model the smart grid as a networked the proposed framework. I. INTRODUCTION It is well known that the smart grid promises increased reliability

Kundur, Deepa

65

A Statistical Framework for the Functional Analysis of Metagenomes  

SciTech Connect

Metagenomic studies consider the genetic makeup of microbial communities as a whole, rather than their individual member organisms. The functional and metabolic potential of microbial communities can be analyzed by comparing the relative abundance of gene families in their collective genomic sequences (metagenome) under different conditions. Such comparisons require accurate estimation of gene family frequencies. They present a statistical framework for assessing these frequencies based on the Lander-Waterman theory developed originally for Whole Genome Shotgun (WGS) sequencing projects. They also provide a novel method for assessing the reliability of the estimations which can be used for removing seemingly unreliable measurements. They tested their method on a wide range of datasets, including simulated genomes and real WGS data from sequencing projects of whole genomes. Results suggest that their framework corrects inherent biases in accepted methods and provides a good approximation to the true statistics of gene families in WGS projects.

Sharon, Itai; Pati, Amrita; Markowitz, Victor; Pinter, Ron Y.

2008-10-01T23:59:59.000Z

66

Threat Insight Quarterly Wireless Technology  

E-Print Network (OSTI)

X-Force ® Threat Insight Quarterly Wireless Technology April 2006 #12;X - F O R C E T H R E A T I N the Wireless Threat ..................................................3 Wireless Threats-Force Catastrophic Risk Index...................................... 13 Future X-Force Threat Insight Quarterly Topics

67

BIODIVERSITY Geographical linkages between threats  

E-Print Network (OSTI)

BIODIVERSITY RESEARCH Geographical linkages between threats and imperilment in freshwater fish and species declines can be the result of different threats or combinations of threats, such as habitat, deter- mining whether the effects of any specific threat is related to the level of imperilment

Kark, Salit

68

A Conceptual Framework for Semantic Case-based Safety Analysis Olawande Daramola, Tor Stlhane  

E-Print Network (OSTI)

.biffl}@tuwien.ac.at Abstract Hazard and Operability (HAZOP) Analysis and Fail- ure Mode and Effect Analysis (FMEA) are among-based framework for safety analy- sis, which facilitates the reuse of previous HAZOP and FMEA experiences in order application. Key words: Safety analysis, HAZOP, FMEA, ontology, requirements, case-based reasoning, natural

69

Quantifying threats in a Mediterranean wetland: are there any changes in their evaluation during a training course?  

Science Journals Connector (OSTI)

“Threats analysis” is a conservation discipline directed to ... , quantify, rank, map the human-induced threats occurring in a specific study area, assessing ... of central Italy, where 15 human-induced threats w...

Corrado Battisti; Luca Luiselli; Corrado Teofili

2009-10-01T23:59:59.000Z

70

Global Threat Reduction Initiative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

comprehensive comprehensive strategy to prevent nuclear terrorism; and  The key organization responsible for implementing the U.S. HEU minimization policy. GTRI MISSION Reduce and protect vulnerable nuclear and radiological material located at civilian sites worldwide. DOE STRATEGIC GOAL 2.2 Prevent the acquisition of nuclear and radiological materials for use in weapons of mass destruction and other acts of terrorism Protect high priority nuclear and radiological materials from theft and sabotage These efforts result in threat reduction by improving security on the bomb material remaining at civilian sites - each vulnerable building that is protected reduces the risk until a permanent threat reduction solution can be implemented.

71

Insider Threat.pptx  

NLE Websites -- All DOE Office Websites (Extended Search)

Mitigating the Insider Threat Mitigating the Insider Threat (and Other Security Issues) Roger G. Johnston, Ph.D., CPP Vulnerability Assessment Team Argonne National Laboratory http://www.ne.anl.gov/capabilities/vat Argonne National Laboratory ~$738 million annual budget 1500 acres, 3400 employees, 4400 facility users, 1500 students R&D and technical assistance for government & industry Sponsors * DHS * DoD * DOS * IAEA * Euratom * DOE/NNSA * private companies * intelligence agencies * public interest organizations The VAT has done detailed vulnerability assessments on hundreds of different security devices, systems, & programs. Vulnerability Assessment Team (VAT) The greatest of faults, I should say, is to be conscious of none.

72

A Multiple Criteria Decision Analysis (MCDA) Software Selection Framework  

Science Journals Connector (OSTI)

With the gaining popularity of multiple criteria decision analysis (MCDA) among researchers and practitioners, a variety of software that implements sophisticated MCDA methods and techniques is now available. To address the issue of the missing methodological ... Keywords: Multiple Criteria Decision Analysis, MCDA, Software evaluation, multicriteria aggregation procedures

Yan Li; Manoj A. Thomas

2014-01-01T23:59:59.000Z

73

BomB ThreaT Assume threat is real  

E-Print Network (OSTI)

Call 911 BomB ThreaT · Assume threat is real · Evacuate area explosion/ Fire · Activate fire alarm or office, do not let the person in · Do not block person's access to an exit · Move away from the threat

Alpay, S. Pamir

74

Use of probabilistic methods for analysis of cost and duration uncertainties in a decision analysis framework  

SciTech Connect

Probabilistic forecasting techniques have been used in many risk assessment and performance assessment applications on radioactive waste disposal projects such as Yucca Mountain and the Waste Isolation Pilot Plant (WIPP). Probabilistic techniques such as Monte Carlo and Latin Hypercube sampling methods are routinely used to treat uncertainties in physical parameters important in simulating radionuclide transport in a coupled geohydrologic system and assessing the ability of that system to comply with regulatory release limits. However, the use of probabilistic techniques in the treatment of uncertainties in the cost and duration of programmatic alternatives on risk and performance assessment projects is less common. Where significant uncertainties exist and where programmatic decisions must be made despite existing uncertainties, probabilistic techniques may yield important insights into decision options, especially when used in a decision analysis framework and when properly balanced with deterministic analyses. For relatively simple evaluations, these types of probabilistic evaluations can be made using personal computer-based software.

Boak, D.M.; Painton, L.

1995-12-08T23:59:59.000Z

75

Threat Insight Quarterly Vulnerability Management  

E-Print Network (OSTI)

X-Force ® Threat Insight Quarterly Vulnerability Management July 2006 #12;X - F O R C E T H R E.................. 7 X-Force Catastrophic Risk Index.............................. 10 Future X-Force Threat Insight Introduction There is a wide range of threats that can exist in any network. The presence of unpatched

76

Threat Insight Quarterly Regulatory Compliance  

E-Print Network (OSTI)

X-Force ® Threat Insight Quarterly Regulatory Compliance www.iss.netwww.iss.net October 2006 #12 Risk Index ..............................................11 Future X-Force Threat Insight Quarterly Internet Security Systems X-Force® Threat Insight Quarterly > October 2006 ©2006 Internet Security Systems

77

Threat Insight Quarterly Browser Exploitation  

E-Print Network (OSTI)

X-Force ® Threat Insight Quarterly Browser Exploitation www.iss.netwww.iss.net January 2007 #12 . . . . . . . . . . . . . . . . . . . . . . . . 11 Previous X-Force Threat Insight Quarterly Topics . . . . . . . . . . 15 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Contents IBM Internet Security Systems X-Force® Threat Insight Quarterly > January 2007

78

Major Insect Threats; Cotton Insects, Grasshoppers, Corn Borer, And Army Worm Still Maior Threats  

Science Journals Connector (OSTI)

Major Insect Threats; Cotton Insects, Grasshoppers, Corn Borer, And Army Worm Still Maior Threats ...

. U S D A

1954-01-01T23:59:59.000Z

79

COAL: a generic modelling and prototyping framework for convex optimization problems of variational image analysis  

Science Journals Connector (OSTI)

We present the Convex Optimization Algorithms Library COAL, a flexible C++framework for modelling and solving convex optimization problems in connection with variational problems of image analysis. COAL connects solver implementations with specific models ... Keywords: convex optimization, image processing, sparse large-scale programming, variational modelling

Dirk Breitenreicher; Jan Lellmann; Christoph Schnörr

2013-10-01T23:59:59.000Z

80

3D Human Motion Analysis Framework for Shape Similarity and Retrieval  

E-Print Network (OSTI)

3D Human Motion Analysis Framework for Shape Similarity and Retrieval Rim Slamaa,b , Hazem Wannousa, Villeneuve d'Ascq, France c Institut Mines-T´el´ecom / T´el´ecom Lille, Villeneuve d'Ascq, France Abstract 3D the problem of 3D shape representation and shape similarity in human video sequences. Our shape representation

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

A New Framework for the Integration, Analysis and Visualisation of Urban Traffic Data Within GIS  

E-Print Network (OSTI)

1 A New Framework for the Integration, Analysis and Visualisation of Urban Traffic Data Within GIS environment for the visualisation of urban traffic data within GIS. These concepts provide a relevant support Systems (GIS) have been adopted as a successful solution by a wide range of disciplines

Bargiela, Andrzej

82

A Framework for the Analysis of Process Mining Philip Weber, Behzad Bordbar, Peter Tino  

E-Print Network (OSTI)

1 A Framework for the Analysis of Process Mining Algorithms Philip Weber, Behzad Bordbar, Peter Tino Abstract--There are many process mining algorithms and representations, making it difficult to choose which algorithm to use or compare results. Process mining is essentially a machine learning task

Tino, Peter

83

PITTSBURGH REGIONAL ENVIRONMENTAL THREATS ANALYSIS  

E-Print Network (OSTI)

.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Coke Oven Emissions.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Carbon Tetrachloride.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Acetaldehyde

Jiang, Huiqiang

84

The versatility of graded acoustic measures in classification of predation threats by the tufted titmouse Baeolophus bicolor  

E-Print Network (OSTI)

The versatility of graded acoustic measures in classification of predation threats by the tufted titmouse Baeolophus bicolor: exploring a mixed framework for threat communication Kathryn E. Sieving-based' alarms encode graded or ranked threat-levels by varying the production patterns of the same call types

Sieving, Kathryn E.

85

Life cycle assessment and sustainability analysis of products, materials and technologies. Toward a scientific framework for sustainability life cycle analysis  

Science Journals Connector (OSTI)

There are many approaches to study the environmental and sustainability aspects of production and consumption. Some of these reside at the level of concepts, e.g., industrial ecology, design for environment, and cleaner production. Other approaches are based on the use of quantitative models, e.g., life cycle assessment, material flow accounting and strategic environmental assessment. This paper focuses on the development of a framework that is able to incorporate different models for environmental analysis, with the option of a broader scope that also includes economic and social aspects, thus covering the three pillars of sustainability. This framework builds on the ISO-framework for life cycle assessment, but takes a broader view, and allows us to move from micro questions on specific products, via meso questions on life styles up to macro questions in which the entire societal structure is part of the analysis.

Reinout Heijungs; Gjalt Huppes; Jeroen B. Guinée

2010-01-01T23:59:59.000Z

86

Threat Characterization: Trajectory Dynamics  

E-Print Network (OSTI)

Given a primary interest in "mitigation of the potential hazard" of near-Earth objects impacting the Earth, the subject of characterization takes on an aspect not normally present when considering asteroids as abstract bodies. Many deflection concepts are interested in the classic geophysical characteristics of asteroids when considering the physical challenge of modifying their orbits in order to cause them to subsequently miss an impact with Earth. Yet for all deflection concepts there are characteristics of the threat which overwhelm these traditional factors. For example, a close gravitational encounter with Earth some years or decades prior to impact can reduce the velocity change necessary for deflection by several orders of magnitude if the deflection precedes the close encounter (or encounters). Conversely this "benefit" comes at a "price"; a corresponding increase in the accuracy of tracking required to determine the probability of impact. Societal issues, both national and international, also characterize the NEO deflection process and these may strongly contend with the purely technical issues normally considered. Therefore critical factors not normally considered must be brought into play as one characterizes the threat of NEO impacts.

Russell Schweickart; Clark Chapman; Dan Durda; Bill Bottke; David Nesvorny; Piet Hut

2006-08-15T23:59:59.000Z

87

Categorizing threat : building and using a generic threat matrix.  

SciTech Connect

The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

2007-09-01T23:59:59.000Z

88

Identification of threats using linguistics-based knowledge extraction.  

SciTech Connect

One of the challenges increasingly facing intelligence analysts, along with professionals in many other fields, is the vast amount of data which needs to be reviewed and converted into meaningful information, and ultimately into rational, wise decisions by policy makers. The advent of the world wide web (WWW) has magnified this challenge. A key hypothesis which has guided us is that threats come from ideas (or ideology), and ideas are almost always put into writing before the threats materialize. While in the past the 'writing' might have taken the form of pamphlets or books, today's medium of choice is the WWW, precisely because it is a decentralized, flexible, and low-cost method of reaching a wide audience. However, a factor which complicates matters for the analyst is that material published on the WWW may be in any of a large number of languages. In 'Identification of Threats Using Linguistics-Based Knowledge Extraction', we have sought to use Latent Semantic Analysis (LSA) and other similar text analysis techniques to map documents from the WWW, in whatever language they were originally written, to a common language-independent vector-based representation. This then opens up a number of possibilities. First, similar documents can be found across language boundaries. Secondly, a set of documents in multiple languages can be visualized in a graphical representation. These alone offer potentially useful tools and capabilities to the intelligence analyst whose knowledge of foreign languages may be limited. Finally, we can test the over-arching hypothesis--that ideology, and more specifically ideology which represents a threat, can be detected solely from the words which express the ideology--by using the vector-based representation of documents to predict additional features (such as the ideology) within a framework based on supervised learning. In this report, we present the results of a three-year project of the same name. We believe these results clearly demonstrate the general feasibility of an approach such as that outlined above. Nevertheless, there are obstacles which must still be overcome, relating primarily to how 'ideology' should be defined. We discuss these and point to possible solutions.

Chew, Peter A.

2008-09-01T23:59:59.000Z

89

Development of a Geological and Geomechanical Framework for the Analysis of  

Open Energy Info (EERE)

Geological and Geomechanical Framework for the Analysis of Geological and Geomechanical Framework for the Analysis of MEQ in EGS Experiments (Geysers) Geothermal Project Jump to: navigation, search Last modified on July 22, 2011. Project Title Development of a Geological and Geomechanical Framework for the Analysis of MEQ in EGS Experiments (Geysers) Project Type / Topic 1 Recovery Act: Enhanced Geothermal Systems Component Research and Development/Analysis Project Type / Topic 2 Induced Seismicity Project Description Water injection is used in engineered or enhanced geothermal systems (EGS) to increase rock permeability, a process which involves fracture initiation and/or reactivation of joints through pore pressure and stress perturbations. This stimulation process is often accompanied by multiple microseismic events associated with rock failure or shear slip on pre-existing fractures. The microseismic signals can be used to understand the hydraulic fracturing process and the properties of the created reservoir. Despite progress in quantitative and qualitative analysis of reservoir stimulation using MEQs, the fundamental mechanisms still are poorly understood and several key questions remain unresolved namely, the variation of seismic activity with injection rate, delayed micro-seismicity, the relation of the stimulated zone to the injected volume and its rate, the connectivity of fractures hosting MEQs, and the resulting reservoir permeability. In addition, longer term phenomena such as permeability evolution related to thermal contraction remain to be investigated.

90

Risk Management for Trrorist Threats  

Science Journals Connector (OSTI)

Risk management for Homeland and National Security involves the calculus of funding preventative systems andd procedures based upon potential threat likelihood and consequences. ...

Zimet, Elihu

91

Technosocial Modeling of IED Threat Scenarios and Attacks  

SciTech Connect

This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.; Young, Jonathan; Wolf, Katherine E.; Thompson, Sandra E.; Niesen, David A.; Madsen, John M.; Henderson, Cynthia L.

2009-03-23T23:59:59.000Z

92

Global Threat Reduction Initiative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nonproliferation Nonproliferation U.S. DEPARTMENT OF ENERGY 1 The Current Status of Gap and U.S.-Origin Nuclear Fuel Removals 2011 Jeff Galan, Deputy Project Manager U.S.-Origin Nuclear Remove Program National Nuclear Security Administration Global Threat Reduction Initiative Defense Nuclear Nonproliferation U.S. DEPARTMENT OF ENERGY 2 GTRI Mission and Goals GTRI is: A part of President Obama's comprehensive strategy to prevent nuclear terrorism; and The key organization responsible for implementing the U.S. HEU minimization policy. GTRI MISSION Reduce and protect vulnerable nuclear and radiological material located at civilian sites worldwide. DOE STRATEGIC GOAL 2.2 Prevent the acquisition of nuclear and radiological materials for use in weapons of mass destruction and other

93

Bio-threat microparticle simulants  

SciTech Connect

A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

Farquar, George Roy; Leif, Roald

2014-09-16T23:59:59.000Z

94

An outcome-based learning model to identify emerging threats : experimental and simulation results.  

SciTech Connect

The authors present experimental and simulation results of an outcome-based learning model as it applies to the identification of emerging threats. This model integrates judgment, decision making, and learning theories to provide an integrated framework for the behavioral study of emerging threats.

Martinez-Moyano, I. J.; Conrad, S. H.; Andersen, D. F.; Decision and Information Sciences; SNL; Univ. at Albany

2007-01-01T23:59:59.000Z

95

Ionospheric Threat Parameterization for Local Area Global-Positioning-System-Based Aircraft Landing Systems  

E-Print Network (OSTI)

Ionospheric Threat Parameterization for Local Area Global-Positioning-System-Based Aircraft Landing of user separation. The method of data analysis that produced these results is described, and a threat space that parameterizes these possible threats to user integrity is defined. Certain configurations

Stanford University

96

An improved framework for power grid vulnerability analysis considering critical system features  

Science Journals Connector (OSTI)

Abstract In recent years the rapid development of complex network theory has provided a new angle on the vulnerability analysis of a power grid. However, current analysis models are usually general ones that may ignore some specific features of power systems. In order to address the issue, this paper proposes an improved framework for the vulnerability analysis of power grids. Firstly, the traditional topology based graph model is improved by depicting a power grid as a weighted graph based on the reactance matrix. Secondly, the concept of load is redefined by using power angle information. Thirdly, the power flow constraints are adopted instead of the shortest path based flow scheme. Based on the proposed framework, an improved dynamic analysis model is developed. In addition, numerical simulations for both a general traditional model and the proposed model are investigated based on the IEEE 118-bus system respectively. The comparison demonstrates that the improved model is more effective and efficient for the vulnerability analysis of a power grid.

YuanYu Dai; Guo Chen; ZhaoYang Dong; YuSheng Xue; David J. Hill; Yuan Zhao

2014-01-01T23:59:59.000Z

97

Study on Threats to Security of Space TT&C Systems  

Science Journals Connector (OSTI)

A space Tracking, Telemetry and Command (TT&C) system is a spaceflight support system and its security is of great significance. A framework of space TT&C system security threat assessment is proposed and it comp...

Qi Wang; Bo Wang; Bin Wu

2013-01-01T23:59:59.000Z

98

Parameter analysis and design framework for magnetic adhesion wall climbing wheeled robot  

Science Journals Connector (OSTI)

Some robots need to climb ferromagnetic walls for performing important inspections and evaluations of the material properties of these walls. This paper aims to establish a design framework for magnetically adhering wheeled robots having magnets attached to the base of the robot. The different design parameters influencing the magnetic adhesion include the geometry of the flux concentrator, the variation of the air gap on adhesion and climbing performance in addition to various types of materials for magnetic flux concentration. These parameters shaping adhesion behaviour are simulated numerically using magnetostatic analysis in ANSYS Finite Elements Method (FEM) software. The results are evaluated and a set of rules and procedures are created as a framework that will enable a more efficient design and construction of this type of robots.

Salman Hussain; Tariq Sattar; Ener Salinas

2012-01-01T23:59:59.000Z

99

Preliminary thoughts concerning potential US Army threats/roles  

SciTech Connect

The rate at which the current world military/political perspective is changing demands consideration of a broader spectrum of potential threats then has been the case for the past few decades--during which the Soviet Union was the preeminent threat. Seemingly overnight, the cold war ceased, the requirement for massive U.S. military counters to the Soviet Union forces faded, and an era of constant (obvious) military threat disappeared. This situation has in turn been revolutionized by the Iraq invasion of Kuwait and the U.S. response. The paper addresses part of the problem facing military planners by defining a spectrum of threats that typify those the U.S. Army might face over the next decade or two. The purpose of the threat set is to support the evaluation of the effectiveness and usefulness, to the U.S. Army, of advanced technologies. The set of threats is intended to provide a complete set of characteristics rather then to be a complete list of the possibilities; it is illustrative rather than exhaustive. Although largely completed before the war with Iraq started, its content is still valid in that its purpose is to provide a framework for thinking about future U.S. Army technology needs.

Greene, R.A.; Solomon, K.A.; Miles, J.T.

1991-06-01T23:59:59.000Z

100

Global Threat Reduction Initiative | Department of Energy  

Office of Environmental Management (EM)

Reduction Initiative An overview of the Global Threat Reduction Initiative, U.S.-Origin Nuclear Fuel Removals. Global Threat Reduction Initiative More Documents &...

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Global Threat Reduction Initiative | Department of Energy  

Office of Environmental Management (EM)

Initiative Global Threat Reduction Initiative The Current Status of Gap and U.S.-Origin Nuclear Fuel Removals 2011. Global Threat Reduction Initiative More Documents &...

102

Offshore petroleum security: Analysis of offshore security threats, target attractiveness, and the international legal framework for the protection and security of offshore petroleum installations.  

E-Print Network (OSTI)

??The offshore petroleum industry is of critical importance to the global economy. Offshore petroleum installations are considered elements of critical national infrastructure in many nation-States… (more)

Kashubsky, Mikhail

2011-01-01T23:59:59.000Z

103

CRBLASTER: A Parallel-Processing Computational Framework for Embarrassingly-Parallel Image-Analysis Algorithms  

E-Print Network (OSTI)

The development of parallel-processing image-analysis codes is generally a challenging task that requires complicated choreography of interprocessor communications. If, however, the image-analysis algorithm is embarrassingly parallel, then the development of a parallel-processing implementation of that algorithm can be a much easier task to accomplish because, by definition, there is little need for communication between the compute processes. I describe the design, implementation, and performance of a parallel-processing image-analysis application, called CRBLASTER, which does cosmic-ray rejection of CCD (charge-coupled device) images using the embarrassingly-parallel L.A.COSMIC algorithm. CRBLASTER is written in C using the high-performance computing industry standard Message Passing Interface (MPI) library. The code has been designed to be used by research scientists who are familiar with C as a parallel-processing computational framework that enables the easy development of parallel-processing image-analy...

Mighell, Kenneth John

2010-01-01T23:59:59.000Z

104

Bridging Human Reliability Analysis and Psychology, Part 2: A Cognitive Framework to Support HRA  

SciTech Connect

This is the second of two papers that discuss the literature review conducted as part of the U.S. Nuclear Regulatory Commission (NRC) effort to develop a hybrid human reliability analysis (HRA) method in response to Staff Requirements Memorandum (SRM) SRM-M061020. This review was conducted with the goal of strengthening the technical basis within psychology, cognitive science and human factors for the hybrid HRA method being proposed. An overview of the literature review approach and high-level structure is provided in the first paper, whereas this paper presents the results of the review. The psychological literature review encompassed research spanning the entirety of human cognition and performance, and consequently produced an extensive list of psychological processes, mechanisms, and factors that contribute to human performance. To make sense of this large amount of information, the results of the literature review were organized into a cognitive framework that identifies causes of failure of macrocognition in humans, and connects those proximate causes to psychological mechanisms and performance influencing factors (PIFs) that can lead to the failure. This cognitive framework can serve as a tool to inform HRA. Beyond this, however, the cognitive framework has the potential to also support addressing human performance issues identified in Human Factors applications.

April M. Whaley; Stacey M. L. Hendrickson; Ronald L. Boring; Jing Xing

2012-06-01T23:59:59.000Z

105

A FRAMEWORK FOR THE ANALYSIS OF LOCALIZED CORROSION AT THE PROPOSED YUCCA MOUNTAIN REPOSITORY  

SciTech Connect

Corrosion is a primary determinant of waste package performance at the proposed Yucca Mountain Repository: (1) the most likely degradation process; (2) controls the delay time for radionuclide transport from the waste package; and (3) determines when packages will be penetrated and the shape size and distribution of those penetrations. In this presentation a framework for the analysis of localized corrosion is presented and demonstrated for a scenario: (1) water chemistry of mixed salt solutions (sodium chloride-potassium nitrate); and (2) time-temperature-relative humidity profiles for a hot, mid and cool temperature waste package.

Dr. J.H. Payer

2006-04-18T23:59:59.000Z

106

Uncertainty Analysis Framework - Hanford Site-Wide Groundwater Flow and Transport Model  

SciTech Connect

Pacific Northwest National Laboratory (PNNL) embarked on a new initiative to strengthen the technical defensibility of the predictions being made with a site-wide groundwater flow and transport model at the U.S. Department of Energy Hanford Site in southeastern Washington State. In FY 2000, the focus of the initiative was on the characterization of major uncertainties in the current conceptual model that would affect model predictions. The long-term goals of the initiative are the development and implementation of an uncertainty estimation methodology in future assessments and analyses using the site-wide model. This report focuses on the development and implementation of an uncertainty analysis framework.

Cole, Charles R.; Bergeron, Marcel P.; Murray, Christopher J.; Thorne, Paul D.; Wurstner, Signe K.; Rogers, Phillip M.

2001-11-09T23:59:59.000Z

107

Regional knowledge dynamics in the biotechnology industry: a conceptual framework for micro-level analysis  

Science Journals Connector (OSTI)

In this paper, we propose a firm-based micro-level framework for the analysis of regional knowledge dynamics. This approach contrasts with most of the established literature on regional clusters, learning regions, industrial districts or Regional Innovation Systems (RISs), which focus mainly on the meso-level of industrial organisation. Contrary to those concepts we are using a biographical method that maps the firm's innovation processes and practices and further on evaluates how those processes are interrelated with intra-organisational change and knowledge flows across different territorial levels.

Robert Kaiser; Michael Liecke

2009-01-01T23:59:59.000Z

108

A multi-tier framework for dynamic data collection, analysis, and visualization  

E-Print Network (OSTI)

This thesis describes a framework for collecting, analyzing, and visualizing dynamic data, particularly data gathered through Web questionnaires. The framework addresses challenges such as promoting user participation, ...

Ke, Xian, 1981-

2004-01-01T23:59:59.000Z

109

IBM Software Data Sheet IBM adaptive threat  

E-Print Network (OSTI)

IBM Software Data Sheet IBM adaptive threat protection Stay ahead of security threats with a state-of-the-art network protection engine Highlights Identify high-risk threats and zero-day attacks with protocol-based, behavioral anomaly detection Protect end users against the latest web-based threats, such as SQL injection

110

Promises and Threats with Conditionals and Disjunctions  

E-Print Network (OSTI)

Promises and Threats with Conditionals and Disjunctions Robert van Rooij and Michael Franke Version promises and threats. But with a disjunction "You do . . . , or I'll do . . . " we can only make threats is trying to influence the behavior of the hearer by conditional promises and threats: whereas

van Rooij, Robert

111

Identifying Chemicals That Are Planetary Boundary Threats  

Science Journals Connector (OSTI)

Identifying Chemicals That Are Planetary Boundary Threats ... Our point of departure to develop profiles for chemicals that are potential planetary boundary threats is to identify scenarios in which a chemical could fulfill each of the three conditions for being a planetary boundary threat. ... Note that chemicals named as examples do not necessarily represent planetary boundary threats since at least one scenario from each of the three conditions must be fulfilled for a chemical to pose a planetary boundary threat. ...

Matthew MacLeod; Magnus Breitholtz; Ian T. Cousins; Cynthia A. de Wit; Linn M. Persson; Christina Rudén; Michael S. McLachlan

2014-09-02T23:59:59.000Z

112

Threats from space: 20 years of progress  

E-Print Network (OSTI)

It has been 20 years since planning began for the 1995 United Nations International Conference on Near-Earth Objects. The conference proceedings established the scientific basis for an international organizational framework to support research and collective actions to mitigate a potential near-Earth object (NEO) threat to the planet. Since that time, researchers have conducted telescope surveys that should, within the coming decade, answer many questions about the size, number, and Earth impact probability of these objects. Space explorations to asteroids and comets have been successfully carried out, including sample recovery. Laboratory experiments and computer simulations at Sandia National Laboratories have analyzed the effects of soft X-ray radiation on meteorites - which might help researchers develop a way to redirect an incoming asteroid by vaporizing a thin layer of its surface. An Action Team on NEOs, established in 2001 in response to recommendations of the Third United Nations Conference on the E...

Remo, J L

2014-01-01T23:59:59.000Z

113

A framework for graph-based synthesis, analysis, and visualization of HPC cluster job data.  

SciTech Connect

The monitoring and system analysis of high performance computing (HPC) clusters is of increasing importance to the HPC community. Analysis of HPC job data can be used to characterize system usage and diagnose and examine failure modes and their effects. This analysis is not straightforward, however, due to the complex relationships that exist between jobs. These relationships are based on a number of factors, including shared compute nodes between jobs, proximity of jobs in time, etc. Graph-based techniques represent an approach that is particularly well suited to this problem, and provide an effective technique for discovering important relationships in job queuing and execution data. The efficacy of these techniques is rooted in the use of a semantic graph as a knowledge representation tool. In a semantic graph job data, represented in a combination of numerical and textual forms, can be flexibly processed into edges, with corresponding weights, expressing relationships between jobs, nodes, users, and other relevant entities. This graph-based representation permits formal manipulation by a number of analysis algorithms. This report presents a methodology and software implementation that leverages semantic graph-based techniques for the system-level monitoring and analysis of HPC clusters based on job queuing and execution data. Ontology development and graph synthesis is discussed with respect to the domain of HPC job data. The framework developed automates the synthesis of graphs from a database of job information. It also provides a front end, enabling visualization of the synthesized graphs. Additionally, an analysis engine is incorporated that provides performance analysis, graph-based clustering, and failure prediction capabilities for HPC systems.

Mayo, Jackson R.; Kegelmeyer, W. Philip, Jr.; Wong, Matthew H.; Pebay, Philippe Pierre; Gentile, Ann C.; Thompson, David C.; Roe, Diana C.; De Sapio, Vincent; Brandt, James M.

2010-08-01T23:59:59.000Z

114

Chinese Workers: Under Threat or a Threat to American Workers?  

E-Print Network (OSTI)

. At the same time, some employers have found ways to avoid following the spirit, if not the letter of the laws. The consequences for American workers are unclear, since their challenges are less about a direct threat from Chinese workers and more about...

Harper Ho, Virginia E.; Zhang, Lu

2010-07-01T23:59:59.000Z

115

Multiattribute utility analysis as a framework for public participation siting a hazardous waste facility  

SciTech Connect

How can the public play a role in decisions involving complicated scientific arguments? This paper describes a public participation exercise in which stakeholders used multiattribute utility analysis to select a site for a hazardous waste facility. Key to success was the ability to separate and address the two types of judgements inherent in environmental decisions: technical judgements on the likely consequences of alternative choices and value judgements on the importance or seriousness of those consequences. This enabled technical specialists to communicate the essential technical considerations and allowed stakeholders to establish the value judgements for the decision. Although rarely used in public participation, the multiattribute utility approach appears to provide a useful framework for the collaborative resolution of many complex environmental decision problems.

Merkhofer, M.W. [Applied Decision Analysis, Inc., Menlo Park, CA (United States); Conway, R. [Sandia National Labs., Albuquerque, NM (United States); Anderson, R.G. [Los Alamos National Lab., NM (United States)

1996-05-01T23:59:59.000Z

116

Gestures Everywhere: A Multimodal Sensor Fusion and Analysis Framework for Pervasive Displays  

Science Journals Connector (OSTI)

Gestures Everywhere is a dynamic framework for multimodal sensor fusion, pervasive analytics and gesture recognition. Our framework aggregates the real-time data from approximately 100 sensors that include RFID readers, depth cameras and RGB cameras ...

Nicholas Gillian; Sara Pfenninger; Spencer Russell; Joseph A. Paradiso

2014-06-01T23:59:59.000Z

117

An impulse framework for hydrodynamic force analysis : fish propulsion, water entry of spheres, and marine propellers  

E-Print Network (OSTI)

This thesis presents an impulse framework for analyzing the hydrodynamic forces on bodies in flow. This general theoretical framework is widely applicable, and it is used to address the hydrodynamics of fish propulsion, ...

Epps, Brenden P

2010-01-01T23:59:59.000Z

118

A Formal Analysis Framework for PLEXIL Gilles Dowek, Cesar Mu~noz, and Corina S. Pasareanu  

E-Print Network (OSTI)

, and stuttering, for different variants of the language. The framework is organized as a stack of abstract

Muñoz, César A.

119

Global Threat Reduction Initiative | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Threat Reduction Initiative | National Nuclear Security Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Global Threat Reduction Initiative Home > About Us > Our Programs > Nonproliferation > Global Threat Reduction Initiative Global Threat Reduction Initiative The mission of the Global Threat Reduction Initiative (GTRI) is to reduce

120

Global Threat Reduction Initiative | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Threat Reduction Initiative | National Nuclear Security Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Global Threat Reduction Initiative Home > About Us > Our Programs > Nonproliferation > Global Threat Reduction Initiative Global Threat Reduction Initiative The mission of the Global Threat Reduction Initiative (GTRI) is to reduce

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

The nature of threat category changes in three Mediterranean biodiversity hotspots Felipe Domnguez Lozano a,e,  

E-Print Network (OSTI)

The nature of threat category changes in three Mediterranean biodiversity hotspots Felipe Domínguez Conservation assessments Red List Spain Threat analysis Threatened plants IUCN categories Western Australia a b s t r a c t Step changes in threat category can be quantified and analyzed in relation to reasons

Moreno Saiz, Juan Carlos

122

Electronic publishing: strengths, weaknesses and threats  

Science Journals Connector (OSTI)

...April 1998 news News Electronic publishing: strengths, weaknesses and threats Derek McNally Treasurer of the RAS 2.7 April 1998 Vol 39 NEWS Both Monthly...Treasurer of the RAS. Electronic publishing: strengths, weaknesses and threats...

Derek McNally

1998-04-01T23:59:59.000Z

123

Vetting Threats To Safe Drug Supplies  

Science Journals Connector (OSTI)

Vetting Threats To Safe Drug Supplies ... Representatives from government, drug companies, and national and international law enforcement agencies struggled to characterize what all agree is a large, growing, and frustratingly nebulous threat to public health and safety. ...

RICK MULLIN

2012-04-01T23:59:59.000Z

124

Nuclear Radiological Threat Task Force Established | National...  

National Nuclear Security Administration (NNSA)

Radiological Threat Task Force Established | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

125

Physical Degradation of Soils, Risks and Threats  

Science Journals Connector (OSTI)

Physical soil degradation...is one of the eight main risks and threats defined by the European Thematic Strategy for...

Winfried E. H. Blum

2014-08-01T23:59:59.000Z

126

nuclear threat science | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

threat science | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing...

127

Responding to WMD Terrorism Threats: The Role of Insurance Markets  

E-Print Network (OSTI)

the Biological Weapons and Bioterrorism Threat SSI http://Responding to WMD Terrorism Threats: The Role of InsuranceNeed for Comprehensive Threat and Risk Assessments of

Jaffee, Dwight M.; Russell, Thomas

2007-01-01T23:59:59.000Z

128

A Risk Management Approach to the 'Insider Threat'  

E-Print Network (OSTI)

Stochastic, and Insider Threat. Management Science, 48(6):modelling for insider threat mitigation. Paci?c Northwestbased model for analyzing threats that include those usually

2010-01-01T23:59:59.000Z

129

BOMB THREAT CHECKLIST QUESTIONS TO ASK  

E-Print Network (OSTI)

BOMB THREAT CHECKLIST QUESTIONS TO ASK: 1. When is the bomb going to explode? 2. Where is it right ___Clearing Throat ___Laughter ___Deep Breathing __Crying ___Cracking voice __Normal ___Disguised THREAT __Foul ___Taped __Message read by threat maker __Irrational If voice is familiar, who did it sound like

Cui, Yan

130

REVIEW/SYNTHSE Threat display in birds  

E-Print Network (OSTI)

REVIEW/SYNTHÃ?SE Threat display in birds Peter L. Hurd and Magnus Enquist Abstract: The study of threat displays has long been an area in which theory and empirical work have each spurred the other. A great deal that classical ethologists have accurately described about threat displays still lacks

Hurd, Peter L.

131

Unauthorized Collaboration on Facebook: Threats and Responses  

E-Print Network (OSTI)

Unauthorized Collaboration on Facebook: Threats and Responses Recent events at FSU have uncovered a threat to academic integrity that might be flying under the radar of most instructors. This resource can help you understand and respond to this threat, while providing positive forums for student interaction

McQuade, D. Tyler

132

Survey on Security Threats and Protection Mechanisms  

E-Print Network (OSTI)

Survey on Security Threats and Protection Mechanisms in Embedded Automotive Networks Ivan Studnia1 and can be seen as entry points for cyber attacks. In this paper, we present a survey on security threats in the embedded networks of current vehicles, we then analyze the potential threats targeting these networks

Paris-Sud XI, Université de

133

Developmental Changes in Responsivity to Threat are  

E-Print Network (OSTI)

Developmental Changes in Responsivity to Threat are Stimulus-Specific in Rats Christoph P 2000 ABSTRACT: During early ontogeny, stimuli that pose a threat to an animal change. Unrelated adult a threat only during a limited period of development, when the animal's particular developmental stage

Barr, Gordon A.

134

An Analysis Framework for Investigating the Trade-offs Between System Performance and Energy Consumption in a Heterogeneous Computing Environment  

E-Print Network (OSTI)

An Analysis Framework for Investigating the Trade-offs Between System Performance and Energy that will allow a system administrator to investigate the trade- offs between system energy consumption be useful to examine the trade-offs between minimizing energy consumption and maximizing computing

Maciejewski, Anthony A.

135

Proceedings of the Workshop on Open Infrastructures and Analysis Frameworks for HLT, pages 101109, Dublin, Ireland, August 23rd 2014.  

E-Print Network (OSTI)

Commons Attribution 4.0 International License. Page numbers and proceedings footer are addedProceedings of the Workshop on Open Infrastructures and Analysis Frameworks for HLT, pages 101`eve Universit´e du Maine Le Mans, France yannick.esteve@ lium.univ-lemans.fr Eelco Herder L3S Research Center

136

Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults' memory errors  

E-Print Network (OSTI)

Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults, 90089-0191. Phone: 213-740-6772. Email: barbersa@usc.edu #12;STEREOTYPE THREAT REDUCES MEMORY ERRORS 2 Abstract (144 words) Stereotype threat often incurs the cost of reducing the amount of information

Mather, Mara

137

Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act  

E-Print Network (OSTI)

Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act quickly, but remain calm and obtain information with the checklist on this card. BOMB THREAT CALL PROCEDURE If a bomb threat is received by phone: Remain calm. Keep the caller on the line for as long

Slatton, Clint

138

Recognizing Threat: A Simple Geometric Shape Activates Neural Circuitry for Threat Detection  

E-Print Network (OSTI)

Recognizing Threat: A Simple Geometric Shape Activates Neural Circuitry for Threat Detection the perception of threat. We here re- port that the neural circuitry known to be mobilized by many realistic instantiating detection of threat and negative affect, suggesting that recognition of potential danger may

Sarinopoulos, Issidoros

139

Ionosphere Spatial Gradient Threat for LAAS: Mitigation and Tolerable Threat Space  

E-Print Network (OSTI)

1 Ionosphere Spatial Gradient Threat for LAAS: Mitigation and Tolerable Threat Space Ming Luo, Sam and a threat space was extrapolated based on the 6 April 2000 ionospheric storm. It was showed that the impact of the ionospheric anomalies depends on the threat parameters, namely, the ionospheric gradient, the slope width

Stanford University

140

Stereotype threat in sports 1 Running head: STEREOTYPE THREAT AND ACHIEVEMENT GOALS IN SPORTS  

E-Print Network (OSTI)

Stereotype threat in sports 1 Running head: STEREOTYPE THREAT AND ACHIEVEMENT GOALS IN SPORTS Do Achievement Goals Mediate Stereotype Threat? An Investigation on Females' Soccer Performance Aïna Chalabaev Psycholoy 30 (2008) 143-158" #12;Stereotype threat in sports 2 Abstract This research investigated

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Methodological Framework for Analysis of Buildings-Related Programs with BEAMS, 2008  

SciTech Connect

The U.S. Department of Energy’s (DOE’s) Office of Energy Efficiency and Renewable Energy (EERE) develops official “benefits estimates” for each of its major programs using its Planning, Analysis, and Evaluation (PAE) Team. PAE conducts an annual integrated modeling and analysis effort to produce estimates of the energy, environmental, and financial benefits expected from EERE’s budget request. These estimates are part of EERE’s budget request and are also used in the formulation of EERE’s performance measures. Two of EERE’s major programs are the Building Technologies Program (BT) and the Weatherization and Intergovernmental Program (WIP). Pacific Northwest National Laboratory (PNNL) supports PAE by developing the program characterizations and other market information necessary to provide input to the EERE integrated modeling analysis as part of PAE’s Portfolio Decision Support (PDS) effort. Additionally, PNNL also supports BT by providing line-item estimates for the Program’s internal use. PNNL uses three modeling approaches to perform these analyses. This report documents the approach and methodology used to estimate future energy, environmental, and financial benefits using one of those methods: the Building Energy Analysis and Modeling System (BEAMS). BEAMS is a PC-based accounting model that was built in Visual Basic by PNNL specifically for estimating the benefits of buildings-related projects. It allows various types of projects to be characterized including whole-building, envelope, lighting, and equipment projects. This document contains an overview section that describes the estimation process and the models used to estimate energy savings. The body of the document describes the algorithms used within the BEAMS software. This document serves both as stand-alone documentation for BEAMS, and also as a supplemental update of a previous document, Methodological Framework for Analysis of Buildings-Related Programs: The GPRA Metrics Effort, (Elliott et al. 2004b). The areas most changed since the publication of that previous document are those discussing the calculation of lighting and HVAC interactive effects (for both lighting and envelope/whole-building projects). This report does not attempt to convey inputs to BEAMS or the methodology of their derivation.

Elliott, Douglas B.; Dirks, James A.; Hostick, Donna J.

2008-09-30T23:59:59.000Z

142

A life cycle cost analysis framework for geologic storage of hydrogen : a user's tool.  

SciTech Connect

The U.S. Department of Energy (DOE) has an interest in large scale hydrogen geostorage, which could offer substantial buffer capacity to meet possible disruptions in supply or changing seasonal demands. The geostorage site options being considered are salt caverns, depleted oil/gas reservoirs, aquifers and hard rock caverns. The DOE has an interest in assessing the geological, geomechanical and economic viability for these types of geologic hydrogen storage options. This study has developed an economic analysis methodology and subsequent spreadsheet analysis to address costs entailed in developing and operating an underground geologic storage facility. This year the tool was updated specifically to (1) incorporate more site-specific model input assumptions for the wells and storage site modules, (2) develop a version that matches the general format of the HDSAM model developed and maintained by Argonne National Laboratory, and (3) incorporate specific demand scenarios illustrating the model's capability. Four general types of underground storage were analyzed: salt caverns, depleted oil/gas reservoirs, aquifers, and hard rock caverns/other custom sites. Due to the substantial lessons learned from the geological storage of natural gas already employed, these options present a potentially sizable storage option. Understanding and including these various geologic storage types in the analysis physical and economic framework will help identify what geologic option would be best suited for the storage of hydrogen. It is important to note, however, that existing natural gas options may not translate to a hydrogen system where substantial engineering obstacles may be encountered. There are only three locations worldwide that currently store hydrogen underground and they are all in salt caverns. Two locations are in the U.S. (Texas), and are managed by ConocoPhillips and Praxair (Leighty, 2007). The third is in Teeside, U.K., managed by Sabic Petrochemicals (Crotogino et al., 2008; Panfilov et al., 2006). These existing H{sub 2} facilities are quite small by natural gas storage standards. The second stage of the analysis involved providing ANL with estimated geostorage costs of hydrogen within salt caverns for various market penetrations for four representative cities (Houston, Detroit, Pittsburgh and Los Angeles). Using these demand levels, the scale and cost of hydrogen storage necessary to meet 10%, 25% and 100% of vehicle summer demands was calculated.

Kobos, Peter Holmes; Lord, Anna Snider; Borns, David James; Klise, Geoffrey T.

2011-09-01T23:59:59.000Z

143

Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity  

E-Print Network (OSTI)

The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and ...

Cho, Yiseul

2012-01-01T23:59:59.000Z

144

Development of a Geological and GeomechanicalFramework for the Analysis of MEQ in EGS Experiments  

Energy.gov (U.S. Department of Energy (DOE))

Project objective: to develop a framework for investigating processes that contribute to the occurrence of seismicity in enhanced geothermal systems with particular reference to the Newberry demonstration experiment and the potential Geysers EGS demonstration experiment.

145

Sensor-guided threat countermeasure system  

DOE Patents (OSTI)

A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

2012-12-25T23:59:59.000Z

146

An Analysis Framework for Investigating the Trade-offs Between System Performance and Energy Consumption in a Heterogeneous Computing Environment  

SciTech Connect

Rising costs of energy consumption and an ongoing effort for increases in computing performance are leading to a significant need for energy-efficient computing. Before systems such as supercomputers, servers, and datacenters can begin operating in an energy-efficient manner, the energy consumption and performance characteristics of the system must be analyzed. In this paper, we provide an analysis framework that will allow a system administrator to investigate the tradeoffs between system energy consumption and utility earned by a system (as a measure of system performance). We model these trade-offs as a bi-objective resource allocation problem. We use a popular multi-objective genetic algorithm to construct Pareto fronts to illustrate how different resource allocations can cause a system to consume significantly different amounts of energy and earn different amounts of utility. We demonstrate our analysis framework using real data collected from online benchmarks, and further provide a method to create larger data sets that exhibit similar heterogeneity characteristics to real data sets. This analysis framework can provide system administrators with insight to make intelligent scheduling decisions based on the energy and utility needs of their systems.

Friese, Ryan [Colorado State University, Fort Collins; Khemka, Bhavesh [Colorado State University, Fort Collins; Maciejewski, Anthony A [Colorado State University, Fort Collins; Siegel, Howard Jay [Colorado State University, Fort Collins; Koenig, Gregory A [ORNL; Powers, Sarah S [ORNL; Hilton, Marcia M [ORNL; Rambharos, Rajendra [ORNL; Okonski, Gene D [ORNL; Poole, Stephen W [ORNL

2013-01-01T23:59:59.000Z

147

Countering the Nuclear Terrorist Threat  

SciTech Connect

The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant psychological consequences. The greatest impact of a small release would probably be economic, associated with cleanup and restoration of the contaminated area. Another category of threat is the attack on a facility, either a power reactor or sabotage of a large radiation source. In general these facilities are hard targets (structurally), and damage and contamination are localized. The final category of threat is the use of radioactive materials to deliver a radiation dose to individuals. This type of attack is again localized and does not readily fall into the category of a weapon of mass destruction.

Vantine, H C

2002-10-04T23:59:59.000Z

148

Autonomous Realtime Threat-Hunting Robot (ARTHR  

SciTech Connect

Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

INL

2008-05-29T23:59:59.000Z

149

Autonomous Realtime Threat-Hunting Robot (ARTHR  

ScienceCinema (OSTI)

Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

INL

2009-09-01T23:59:59.000Z

150

design basis threat | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

design basis threat | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the...

151

CHEMICAL TERRORISM: THREATS TO WATER SUPPLIES  

Science Journals Connector (OSTI)

Although for practical reasons, terrorist attacks on water systems are considered less likely than on other targets, threats to drinking water cannot be ignored. A...

ALFRED BERNARD; CLAIRE DE BURBURE

2006-01-01T23:59:59.000Z

152

Addressing the cybersecurity Malicious Insider threat.  

E-Print Network (OSTI)

?? Malicious Insider threats consist of employees, contractors, or business partners who either have current authorized access, or have had authorized access to an organization's… (more)

Schluderberg, Larry E.

2015-01-01T23:59:59.000Z

153

Control Systems Security Publications Library | Department of...  

Energy Savers (EERE)

Protection Cyber Vulnerability Assessment - November 2007 Categorizing Threat: Building and Using a Generic Threat Matrix - September 2007 Threat Analysis Framework -...

154

Temperature Control Framework Using Wireless Sensor Networks and Geostatistical Analysis for Total Spatial Awareness  

E-Print Network (OSTI)

) intelligent control, and (3) home automation [1]. Home automation is the use of products to link services presents a novel framework for intelligent temperature control in smart homes using Wireless Sensor Home; Intelligent Temperature Control; Wireless Sensor Network; WSN; Context Awareness; Geostatistical

Fan, Jeffrey

155

Zero-Emission Vehicle Scenario Cost Analysis Using A Fuzzy Set-Based Framework  

E-Print Network (OSTI)

Fuel Cell Vehicle Analysis of Energy Use, Emissions, and Cost,"Cost Analysis of Conventional and Fuel Cell/Battery Powered Urban Passenger Vehicles,cost analysis of several types of AFVs, but did not include fuel cell vehicles

Lipman, Timothy Edward

1999-01-01T23:59:59.000Z

156

Zero-Emission Vehicle Scenario Cost Analysis Using A Fuzzy Set-Based Framework  

E-Print Network (OSTI)

Fuel Cell Vehicle Analysis of Energy Use, Emissions, and Cost,&Cost Analysis of Conventional and Fuel Cell/Battery Powered Urban Passenger Vehicles,cost analysis of several types of AFV s, but did not include fuel cell vehicles

Lipman, Timothy E.

1999-01-01T23:59:59.000Z

157

ExMAn: A Generic and Customizable Framework for Experimental Mutation Analysis #  

E-Print Network (OSTI)

analysis using Path Inspector and to compare concurrent testing using ConTest with model checking [BCD05 approach using code inspection, static analysis (FindBugs, Jlint), dynamic analysis and testing [LDG + 04

Graham, Nick

158

Design Basis Threat | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Design Basis Threat | National Nuclear Security Administration Design Basis Threat | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Design Basis Threat Home > About Us > Our Programs > Nuclear Security > Design Basis Threat Design Basis Threat NNSA has taken aggressive action to improve the security of its nuclear weapons material (often referred to as special nuclear material, or SNM)

159

Mitigating Security Threats to Large-Scale Cross Border Virtualization Infrastructures  

Science Journals Connector (OSTI)

The large-scale cross border virtualization infrastructures can be seen as a federation of heterogeneous clouds. We present pragmatic analysis of the potential threats posed to the emerging large-scale cross...in...

Philippe Massonet; Syed Naqvi; Francesco Tusa; Massimo Villari…

2010-01-01T23:59:59.000Z

160

Commercial Aircraft Corporation of China (Comac) attempts to break the Airbus-Boeing duopoly, will it succeed? : an industry analysis framework applied  

E-Print Network (OSTI)

Using an industry analysis framework, this thesis analyzes whether the recently established Commercial Aircraft Corporation of China (Comac) is likely to break the Boeing-Airbus duopoly in the industry of large commercial ...

Fuentes, Jose L., S.M. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

EM threat analysis for wireless systems.  

SciTech Connect

Modern digital radio systems are complex and must be carefully designed, especially when expected to operate in harsh propagation environments. The ability to accurately predict the effects of propagation on wireless radio performance could lead to more efficient radio designs as well as the ability to perform vulnerability analyses before and after system deployment. In this report, the authors--experts in electromagnetic (EM) modeling and wireless communication theory--describe the construction of a simulation environment that is capable of quantifying the effects of wireless propagation on the performance of digital communication.

Burkholder, R. J. (Ohio State University Electroscience Laboratory); Mariano, Robert J.; Schniter, P. (Ohio State University Electroscience Laboratory); Gupta, I. J. (Ohio State University Electroscience Laboratory)

2006-06-01T23:59:59.000Z

162

Abstract--Grazing incidence metal mirrors in laser-driven IFE power plants are subject to a variety of threats that result  

E-Print Network (OSTI)

of threats that result in damages leading to increased laser absorption, beam quality degradation and reduced of threats, including prompt neutron and gamma fluxes, x-ray and ionic emissions, and contamination from in the ARIES study. II. MIRROR DEFECTS AND ANALYSIS APPROACHES Depending on the type of threat, the mirror can

Tillack, Mark

163

ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling for Mobile Ad Hoc and  

E-Print Network (OSTI)

ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling. Chivers, Olwen Worthington and Pankaj Rohatgi Abstract-- This paper introduces a threat model for ad hoc and mobile ad hoc networks (MANETS). It identifies threat categories, modes of use, and a variety of threats

Sen, Sevil

164

The Law of Duress and the Economics of Credible Threats  

E-Print Network (OSTI)

seller has a credible threat, it is in the buyer’s interestand the more credible is the threat to breach it. C.existence of a credible threat, may be difficult to verify.

Bar-Gill, Oren; Ben-Shahar, Omri

2003-01-01T23:59:59.000Z

165

Now or Later?--Endogenous Timing of Threats  

Science Journals Connector (OSTI)

Whereas early threats are chosen before bargaining, late threats are determined after bargaining ended in conflict. Instead of exogenously imposing the timing of threats, these are derived endogenously as in indi...

Siegfried K. Berninghaus; Werner Guth

2003-11-01T23:59:59.000Z

166

PROHIBITED USE OF ELECTRONIC RESOURCES FOR THREATS, HARASSMENT, AND PORNOGRAPHY  

E-Print Network (OSTI)

Page 1 PROHIBITED USE OF ELECTRONIC RESOURCES FOR THREATS, HARASSMENT, AND PORNOGRAPHY Policy, and prohibits the use of University Electronic Resources for threats, harassment, and pornography. Reason threats, engaging in harassing behavior, and viewing, downloading, or communicating pornography. Table

Shahriar, Selim

167

Zero-Emission Vehicle Scenario Cost Analysis Using A Fuzzy Set-Based Framework  

E-Print Network (OSTI)

Cycle Cost Analysis of Conventional and Fuel Cell/BatteryEVs A few cost analyses for complete PEM fuel cell systemshigh-volume PEM fuel cell system cost analysis has been

Lipman, Timothy E.

1999-01-01T23:59:59.000Z

168

Manager, International Chemical Threat Reduction Department, Sandia  

NLE Websites -- All DOE Office Websites (Extended Search)

International Chemical Threat Reduction Department, Sandia International Chemical Threat Reduction Department, Sandia National Laboratories | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Nancy Jackson Manager, International Chemical Threat Reduction Department, Sandia National Laboratories

169

Manager, International Chemical Threat Reduction Department, Sandia  

National Nuclear Security Administration (NNSA)

International Chemical Threat Reduction Department, Sandia International Chemical Threat Reduction Department, Sandia National Laboratories | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Nancy Jackson Manager, International Chemical Threat Reduction Department, Sandia National Laboratories

170

RIS-M-2519 A FRAMEWORK FOR COGNITIVE TASK ANALYSIS IN SYSTEMS DESIGN  

E-Print Network (OSTI)

of the current task by means of an analysis of the cognitive task. cont. INIS Descriptors. DECISION MAKING

171

Bio-PEPA: A framework for the modelling and analysis of biological systems  

Science Journals Connector (OSTI)

In this work we present Bio-PEPA, a process algebra for the modelling and the analysis of biochemical networks. It is a modification of PEPA, originally defined for the performance analysis of computer systems, in order to handle some features of biological ... Keywords: Analysis, Biochemical networks, Modelling, Process algebras

Federica Ciocchetta; Jane Hillston

2009-08-01T23:59:59.000Z

172

Incorporation of a risk analysis approach for the nuclear fuel cycle advanced transparency framework.  

SciTech Connect

Proliferation resistance features that reduce the likelihood of diversion of nuclear materials from the civilian nuclear power fuel cycle are critical for a global nuclear future. A framework that monitors process information continuously can demonstrate the ability to resist proliferation by measuring and reducing diversion risk, thus ensuring the legitimate use of the nuclear fuel cycle. The automation of new nuclear facilities requiring minimal manual operation makes this possible by generating instantaneous system state data that can be used to track and measure the status of the process and material at any given time. Sandia National Laboratories (SNL) and the Japan Atomic Energy Agency (JAEA) are working in cooperation to develop an advanced transparency framework capable of assessing diversion risk in support of overall plant transparency. The ''diversion risk'' quantifies the probability and consequence of a host nation diverting nuclear materials from a civilian fuel cycle facility. This document introduces the details of the diversion risk quantification approach to be demonstrated in the fuel handling training model of the MONJU Fast Reactor.

Mendez, Carmen Margarita (Sociotecnia Solutions, LLC); York, David L.; Inoue, Naoko (Japan Atomic Energy Agency); Kitabata, Takuya (Japan Atomic Energy Agency); Vugrin, Eric D.; Vugrin, Kay White; Rochau, Gary Eugene; Cleary, Virginia D.

2007-05-01T23:59:59.000Z

173

Death Threats and Violence at Schools and Colleges  

Science Journals Connector (OSTI)

This chapter examines the nature of death threats and other violence against schools and universities. Death threats and violence against schools and universities reflect...

Stephen J. Morewitz

2008-01-01T23:59:59.000Z

174

Seeking out silent threats to simulation integrity | EMSL  

NLE Websites -- All DOE Office Websites (Extended Search)

Seeking out silent threats to simulation integrity Seeking out silent threats to simulation integrity Controlling the impact of soft errors on optimization algorithm results NULL A...

175

Before the House Subcommittee on Emerging Threats, Cyber Security...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and...

176

SciTech Connect: Sequential Threat Detection for Harbor Defense...  

Office of Scientific and Technical Information (OSTI)

Sequential Threat Detection for Harbor Defense: An X-ray Physics-Based Bayesian Approach Citation Details In-Document Search Title: Sequential Threat Detection for Harbor Defense:...

177

Autonomous Realtime Threat-Hunting Robot (ARTHR)  

ScienceCinema (OSTI)

Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

Idaho National Laboratory - David Bruemmer, Curtis Nielsen

2010-01-08T23:59:59.000Z

178

Autonomous Realtime Threat-Hunting Robot (ARTHR)  

SciTech Connect

Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

Idaho National Laboratory - David Bruemmer, Curtis Nielsen

2008-05-29T23:59:59.000Z

179

Source prestige and target reactions to threats  

Science Journals Connector (OSTI)

A 3 by 2 design was employed to study the effects of source capability and of punishment magnitude on the compliance of target individuals to contingent threats intermittently sent by a simulated source in...

Thomas V. Bonoma; Barry R. Schlenker; R. Bob Smith…

1970-08-01T23:59:59.000Z

180

Non-Military Threats to the Alliance  

Science Journals Connector (OSTI)

I have been given the opportunity to say a few words on what could become a dialogue between the EU and the U.S. concerning the rather difficult questions of non-military threats, also called global or transnatio...

Eric Danon

2000-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

The Fragmented Securitization of Cyber Threats  

Science Journals Connector (OSTI)

Cybersecurity is one of the most pressing national security issues nowadays. Cyber threats reached truly global scales, cyber attacks that potentially or actually cause physical damage are on the rise, and sec...

Agnes Kasper

2014-01-01T23:59:59.000Z

182

A Framework for Visual Information Analysis Petra Neumann, Anthony Tang, Sheelagh Carpendale  

E-Print Network (OSTI)

accomplished by a team. However, there exist relatively few models that describe the visual analysis process visualization tool design. Teams in our study were given paper-based (static) visual- izations to solve tasks users engage with informa- tion visualizations in their analysis process. With the rapid growth in size

Isenberg, Petra

183

An Empirical Framework for Comparing Effectiveness of Testing and Property-Based Formal Analysis  

E-Print Network (OSTI)

and practise of formal analysis and on the other hand, by a need for improved quality assurance techniques. 1. INTRODUCTION Testing and formal analysis are two complementary qual- ity assurance techniques-condition, a loop invariant, a class representation invariant, an interface us- age rule, or a temporal property

Bradbury, Jeremy S.

184

An Empirical Framework for Comparing Effectiveness of Testing and Property-Based Formal Analysis  

E-Print Network (OSTI)

in the theory and practise of formal analysis and on the other hand, by a need for improved quality assurance. 1. INTRODUCTION Testing and formal analysis are two complementary qual- ity assurance techniques of a method pre-condition, a loop invariant, a class representation invariant, an interface us- age rule

Cordy, James R.

185

Framework for the Economic Analysis of Hybrid Systems Based on Exergy Consumption  

SciTech Connect

Starting from an overview of the dynamic behavior of the electricity market the need of the introduction of energy users that will provide a damping capability to the system is derived as also a qualitative analysis of the impact of uncertainty, both in the demand and supply side, is performed. Then it follows an introduction to the investment analysis methodologies based on the discounting of the cash flow, and then work concludes with the illustration and application of the exergonomic principles to provide a sound methodology for the cost accounting of the plant components to be used in the cash flow analysis.

Cristian Rabiti; Robert S. Cherry; Wesley R. Deason; Piyush Sabharwall; Shannon M. Bragg-Sitton; Richard D. Boardman

2014-08-01T23:59:59.000Z

186

Survey of Threats and Assaults by Patients on Psychiatry Residents  

Science Journals Connector (OSTI)

The authors sought to determine the prevalence of threats and assaults by patients on psychiatry residents,...

Yael Dvir M.D.; Emiko Moniwa M.D.; Holly Crisp-Han M.D.…

2012-01-01T23:59:59.000Z

187

Invited Paper New Frontiers of Network Security: The Threat Within  

E-Print Network (OSTI)

Invited Paper New Frontiers of Network Security: The Threat Within Sugata Sanyal1 , Ajit Shelat2% of information security threats originate from inside the organization. The instances of insider threats have. The Insider threats are generally caused by current or ex-employees, contractors or partners, who have

Sanyal, Sugata

188

FUTURE THREATS AYCOCK & MAURUSHAT 275VIRUS BULLETIN CONFERENCE SEPTEMBER 2007  

E-Print Network (OSTI)

FUTURE THREATS AYCOCK & MAURUSHAT 275VIRUS BULLETIN CONFERENCE SEPTEMBER 2007 FUTURE THREATS John.maurushat@unsw.edu.au ABSTRACT `Aren't you just giving the virus writers ideas?' Research into future security threats begin to examine how far security research can go in terms of looking at future threats, particularly

Aycock, John

189

An Approach to Security Policy Configuration Using Semantic Threat Graphs  

E-Print Network (OSTI)

An Approach to Security Policy Configuration Using Semantic Threat Graphs Simon N. Foley, in turn, unnecessarily expose the enterprise to known threats. This paper pro- poses a threat management- nomic configuration of security mechanisms. This knowledge is mod- eled in terms of Semantic Threat

Foley, Simon

190

Consumer Choice and Dempster-Shafer Models of Threat Prioritization for Emerging Dual-Use Technologies: Their Application to Synthetic Biology  

SciTech Connect

Identification and prioritization of risks to international security associated with emerging dual-use technologies presents numerous challenges. First, it demands prediction of the evolving states-of-the-art in various technological fields and, second, it requires a comprehension of the motivations and prospective selection criteria that illicit users might adopt in choosing among new technologies and their means of deployment. Nevertheless, the identification and prioritization of such threats is critical in establishing the appropriate focal points for proactive, nonproliferation policy-making. This paper addresses the question of how the threats associated with alternative means of deploying an emerging technology might be prioritized. The method revolves around systematic identification of the technological barriers to an illicit user in deploying a new technology. Evaluation of the resources necessary to overcome the barriers - such acquisition of the necessary intellectual capital and laboratory assets - then provides the basis for assessing the relative likelihoods or plausibilities of various deployment scenarios. Two optional bases are outlined for quantification of the model. One is a choice model that has found application in the analysis of consumer behavior, where the illicit user is modeled essentially as a consumer of new technology. The other employs a Dempster-Shafer framework for priority characterization. The paper describes application of the methodology to emerging life science technologies; in particular, to synthetic biology - the means of engineering biological systems. The prospect of a terrorist being able to synthesize natural pathogens or, perhaps worse still, to engineer pathogens not present in nature, creates an unprecedented threat to international security. Use of the proposed methodology to identify and prioritize threats associated with the engineering of pathogens is described.

Unwin, Stephen D.; Fecht, Barbara A.

2009-03-01T23:59:59.000Z

191

Running head: STEREOTYPE THREAT IN OLDER ADULTS 1 Stereotype threat can enhance, as well as impair, older adults' memory  

E-Print Network (OSTI)

Running head: STEREOTYPE THREAT IN OLDER ADULTS 1 Stereotype threat can enhance, as well as impair, and Rico Velasco for research assistance and to Dr. Tom Hess for providing us with the stereotype threat for publication. #12;STEREOTYPE THREAT IN OLDER ADULTS 2 Abstract (150) Negative stereotypes about aging can

Mather, Mara

192

Approach to proliferation risk assessment based on multiple objective analysis framework  

SciTech Connect

The approach to the assessment of proliferation risk using the methods of multi-criteria decision making and multi-objective optimization is presented. The approach allows the taking into account of the specifics features of the national nuclear infrastructure, and possible proliferation strategies (motivations, intentions, and capabilities). 3 examples of applying the approach are shown. First, the approach has been used to evaluate the attractiveness of HEU (high enriched uranium)production scenarios at a clandestine enrichment facility using centrifuge enrichment technology. Secondly, the approach has been applied to assess the attractiveness of scenarios for undeclared production of plutonium or HEU by theft of materials circulating in nuclear fuel cycle facilities and thermal reactors. Thirdly, the approach has been used to perform a comparative analysis of the structures of developing nuclear power systems based on different types of nuclear fuel cycles, the analysis being based on indicators of proliferation risk.

Andrianov, A.; Kuptsov, I. [Obninsk Institute for Nuclear Power Engineering of NNRU MEPhI (Russian Federation); Studgorodok 1, Obninsk, Kaluga region, 249030 (Russian Federation)

2013-07-01T23:59:59.000Z

193

Left-Wing Extremism: The Current Threat  

SciTech Connect

Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

Karl A. Seger

2001-04-30T23:59:59.000Z

194

Assessing security threat scenarios for utility-based reputation model in grids  

Science Journals Connector (OSTI)

Trust and reputation models play an important role in enabling trusted computations over large-scale distributed grids. Many models have been recently proposed and implemented within trust management systems. Nevertheless, the existing approaches usually assess performance of models in terms of resource management while less attention is paid to the analysis of security threat scenarios for such models. In this paper, we assess the most important and critical security threats for a utility-based reputation model in grids. The existing model is extended to address these threat scenarios. With simulations that were run using data collected from the EGEE Grid-Observatory project, we analyse efficiency of the utility-based reputation model against these threats.

Olga Kussul; Nataliia Kussul; Sergii Skakun

2013-01-01T23:59:59.000Z

195

Anomaly metrics to differentiate threat sources from benign sources in primary vehicle screening.  

SciTech Connect

Discrimination of benign sources from threat sources at Port of Entries (POE) is of a great importance in efficient screening of cargo and vehicles using Radiation Portal Monitors (RPM). Currently RPM's ability to distinguish these radiological sources is seriously hampered by the energy resolution of the deployed RPMs. As naturally occurring radioactive materials (NORM) are ubiquitous in commerce, false alarms are problematic as they require additional resources in secondary inspection in addition to impacts on commerce. To increase the sensitivity of such detection systems without increasing false alarm rates, alarm metrics need to incorporate the ability to distinguish benign and threat sources. Principal component analysis (PCA) and clustering technique were implemented in the present study. Such techniques were investigated for their potential to lower false alarm rates and/or increase sensitivity to weaker threat sources without loss of specificity. Results of the investigation demonstrated improved sensitivity and specificity in discriminating benign sources from threat sources.

Cohen, Israel Dov; Mengesha, Wondwosen

2011-09-01T23:59:59.000Z

196

Experimental spectra analysis in THM with the help of simulation based on Geant4 framework  

E-Print Network (OSTI)

The Coulomb barrier and electron screening cause difficulties in directly measuring nuclear reaction cross sections of charged particles in astrophysical energies. The Trojan-horse method has been introduced to solve the difficulties as a powerful indirect tool. In order to understand experimental spectra better, Geant4 is employed to simulate the method for the first time. Validity and reliability of the simulation are examined by comparing the experimental data with simulated results. The Geant4 simulation can give useful information to understand the experimental spectra better in data analysis and is beneficial to the design for future related experiments.

Chengbo Li; Qungang Wen; Shuhua Zhou; Yuanyong Fu; Jing Zhou; Qiuying Meng; Zongjun Jiang; Xiaolian Wang

2014-08-27T23:59:59.000Z

197

A framework of motion capture system based human behaviours simulation for ergonomic analysis  

E-Print Network (OSTI)

With the increasing of computer capabilities, Computer aided ergonomics (CAE) offers new possibilities to integrate conventional ergonomic knowledge and to develop new methods into the work design process. As mentioned in [1], different approaches have been developed to enhance the efficiency of the ergonomic evaluation. Ergonomic expert systems, ergonomic oriented information systems, numerical models of human, etc. have been implemented in numerical ergonomic software. Until now, there are ergonomic software tools available, such as Jack, Ergoman, Delmia Human, 3DSSPP, and Santos, etc. [2-4]. The main functions of these tools are posture analysis and posture prediction. In the visualization part, Jack and 3DSSPP produce results to visualize virtual human tasks in 3-dimensional, but without realistic physical properties. Nowadays, with the development of computer technology, the simulation of physical world is paid more attention. Physical engines [5] are used more and more in computer game (CG) field. The a...

Ma, Ruina; Bennis, Fouad; Ma, Liang

2011-01-01T23:59:59.000Z

198

Bomb threats hit Texas petrochemical plants  

Science Journals Connector (OSTI)

A recent rash of bomb threats has plagued petrochemical plants and refineries in the Houston area.No real bombs have been found. But plant managers are concerned that if law enforcement officials do not soon find those involved and discourage others, ...

ANN THAYER

1996-04-29T23:59:59.000Z

199

Framework of pipeline integrity management  

Science Journals Connector (OSTI)

Pipeline integrity is the cornerstone of many industrial and engineering systems. This paper provides a review and analysis of pipeline integrity that will support professionals from industry who are investigating technical challenges of pipeline integrity. In addition, it will provide an overview for academia to understand the complete picture of pipeline integrity threats and techniques to deal with these threats. Pipeline threats are explained and failures are classified. Design practices are discussed using pressure criteria. Inspection techniques are studied and used as a basis for describing the corresponding integrity assessment techniques, which are linked with integrity monitoring and maintenance criteria. Finally, pipeline integrity management system design is presented using activity models, process models, and knowledge structures. The paper will be useful for further development of automated tools to support pipeline integrity management.

Hossam A. Gabbar; Hossam A. Kishawy

2011-01-01T23:59:59.000Z

200

Threat Mitigation: The Gravity Tractor  

E-Print Network (OSTI)

The Gravity Tractor (GT) is a fully controlled asteroid deflection concept using the mutual gravity between a robotic spacecraft and an asteroid to slowly accelerate the asteroid in the direction of the "hovering" spacecraft. Based on early warning, provided by ground tracking and orbit prediction, it would be deployed a decade or more prior to a potential impact. Ion engines would be utilized for both the rendezvous with the asteroid and the towing phase. Since the GT does not dock with or otherwise physically contact the asteroid during the deflection process there is no requirement for knowledge of the asteroid's shape, composition, rotation state or other "conventional" characteristics. The GT would first reduce the uncertainty in the orbit of the asteroid via Earth tracking of its radio transponder while station keeping with the asteroid. If, after analysis of the more precise asteroid orbit a deflection is indeed indicated, the GT would "hover" above the surface of the asteroid in the direction of the required acceleration vector for a duration adequate to achieve the desired velocity change. The orbit of the asteroid is continuously monitored throughout the deflection process and the end state is known in real time. The performance envelope for the GT includes most NEOs which experience close gravitational encounters prior to impact and those below 150-200 meters in diameter on a direct Earth impact trajectory.

Russell Schweickart; Clark Chapman; Dan Durda; Piet Hut

2006-08-15T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Threat Mitigation: The Asteroid Tugboat  

E-Print Network (OSTI)

The Asteroid Tugboat (AT) is a fully controlled asteroid deflection concept using a robotic spacecraft powered by a high efficiency, electric propulsion system (ion or plasma) which docks with and attaches to the asteroid, conducts preliminary operations, and then thrusts continuously parallel to the asteroid velocity vector until the desired velocity change is achieved. Based on early warning, provided by ground tracking and orbit prediction, it would be deployed a decade or more prior to a potential impact. On completion of the initial rendezvous with the near-Earth object (NEO) the AT would first reduce the uncertainty in the orbit of the asteroid via Earth tracking of its radio transponder while it is station keeping with the asteroid. If on analysis of tracking data a deflection is required the AT would execute a reconnaissance phase collecting and processing information about the physical characteristics of the asteroid to support subsequent operations. The AT would then dock at the appropriate pole (i.e. on the spin axis), attach to the asteroid surface, and initiate a NEO reorientation maneuver. Following completion of the NEO reorientation the AT would initiate the deflection phase by thrusting continuously parallel to the asteroid velocity vector until the resultant target orbit is achieved. The orbit of the asteroid is continuously monitored throughout the deflection process and the end state is known in real time. If one assumes a nuclear-electric propulsion (NEP) system similar to that formerly under development in the recently canceled Prometheus Program, the AT would be capable of deflecting threatening NEOs up to 800 meters in diameter or more.

Russell Schweickart; Clark Chapman; Dan Durda; Piet Hut

2006-08-15T23:59:59.000Z

202

To Catch a Thief: Practical Methods of Using Social Networks as a Mechanism for Identifying Corporate Insider Threats  

Science Journals Connector (OSTI)

Is it possible to utilize psychological profiling through social network analysis to identify potential corporate insider threats? This research will aim to provide corporate ... capable of recognizing the signs ...

Martyn Styles

2014-01-01T23:59:59.000Z

203

Introduction to Administrative Programs that Mitigate the Insider Threat  

SciTech Connect

This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

2012-09-01T23:59:59.000Z

204

Policing Cyber Hate, Cyber Threats and Cyber Terrorism  

Science Journals Connector (OSTI)

What are cyber threats? This book brings together a diverse range of multidisciplinary ideas to explore the extent of cyber threats, cyber hate and cyber terrorism. This ground-breaking text provides a comprehensive understanding of the range of activities ...

Imran Awan; Brian Blakemore

2012-07-01T23:59:59.000Z

205

Environment-Driven Threats Elicitation for Web Applications  

Science Journals Connector (OSTI)

The popularity and complexity of web application present challenges to the security implementation for web engineering. Threat elicitation is an indispensable step for developers to identify the possible threats ...

Hui Guan; Weiru Chen; Lin Liu; Hongji Yang

2011-01-01T23:59:59.000Z

206

Classification of Threats Via a Multi-sensor Security Portal  

Science Journals Connector (OSTI)

Classification of threats has always been a major security decision ... walks through a security portal. To classify threat by combining data from multiple sensors like ... metal detectors. We wish to identify th...

Amar Singh; Lawrence Holder

2006-01-01T23:59:59.000Z

207

Managing Threats to Web Databases and Cyber Systems  

Science Journals Connector (OSTI)

This chapter provides an overview of some of the cyber threats information systems as well as data management ... then discusses potential solutions and challenges. The threats include access control violations, ...

Bhavani Thuraisingham

2005-01-01T23:59:59.000Z

208

Discussion Draft1 Message to Senior Executives on the Cybersecurity Framework2  

E-Print Network (OSTI)

Discussion Draft1 Message to Senior Executives on the Cybersecurity Framework2 3 The national with an advancing6 cybersecurity threat now puts our critical infrastructure, our information, and our7 safety at risk.8 The cybersecurity threat to critical infrastructure continues to grow and represents9 one

Bentz, Dale P.

209

Securing Infrastructure from High Explosive Threats  

SciTech Connect

Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

2009-03-20T23:59:59.000Z

210

The same, only different: Threat management systems as homologues in the tree of life  

E-Print Network (OSTI)

T. , & ,Quirin, M. (2014). Threat and defense: From anxietyto manage uncertainty and threat associated with politicalD.M.T. (2013). Sizing up the threat: The envisioned physical

Holbrook, Colin; Fessler, Daniel M.T.

2015-01-01T23:59:59.000Z

211

Stereotype Threat in Organizations: An Examination of its Scope, Triggers, and Possible Interventions  

E-Print Network (OSTI)

and social identity threat. Advances in Experimental Socialmen triggers social identity threat among female engineers.C. (2007). Stereotype threat at work. Academy of Management

Kray, Laura J.; Shirako, Aiwa

2009-01-01T23:59:59.000Z

212

Rethinking the Threats to Scientific Balance in Contexts of Litigation and Regulation  

E-Print Network (OSTI)

Monograph Rethinking the Threats to Scienti?c Balance inc factors such as threats or dollars. Environmental Healthwatched for/resisted Threats; overt pressure to slant ?

Freudenburg, William R.

2008-01-01T23:59:59.000Z

213

Mobility changes anonymity: new passive threats in mobile ad hoc networks  

E-Print Network (OSTI)

Anonymity: New Passive Threats in Mobile Ad Hoc Networkson new anonymity threats and classify the correspondingagainst the new anonymity threats in mobile networks. The

Hong, Xiaoyan; Kong, Jiejun; Gerla, Mario

2006-01-01T23:59:59.000Z

214

Confronting Ego Threats with Reappraisal versus Rumination  

E-Print Network (OSTI)

of the requirements for the degree of MASTER OF SCIENCE Approved by: Chair of Committee, Brandon Schmeichel Committee Members, Eddie Harmon-Jones Jeffrey Ackerman Head of Department, Les Morey May 2009 Major Subject: Psychology iii ABSTRACT... Confronting Ego Threats with Reappraisal versus Rumination. (May 2009) Ryan Caskey, B.A., University of Arizona Chair of Advisory Committee: Dr. Brandon Schmeichel Two experiments compared the effects of two cognitive responses (i.e., rumination...

Caskey, Ryan

2010-01-16T23:59:59.000Z

215

Nonproliferation, Nuclear Security, and the Insider Threat  

SciTech Connect

Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

Balatsky, Galya I. [Los Alamos National Laboratory; Duggan, Ruth [SNL

2012-07-12T23:59:59.000Z

216

Handsets Malware Threats and Facing Techniques  

E-Print Network (OSTI)

Nowadays, mobile handsets combine the functionality of mobile phones and PDAs. Unfortunately, mobile handsets development process has been driven by market demand, focusing on new features and neglecting security. So, it is imperative to study the existing challenges that facing the mobile handsets threat containment process, and the different techniques and methodologies that used to face those challenges and contain the mobile handsets malwares. This paper also presents a new approach to group the different malware containment systems according to their typologies.

Elfattah, Marwa M A; Sarhan, Ebada

2012-01-01T23:59:59.000Z

217

The multi-sensor nuclear threat detection Dorit S. Hochbaum  

E-Print Network (OSTI)

an efficient graph algorithm that solves the problem in polynomial time. Detecting nuclear threatsThe multi-sensor nuclear threat detection problem Dorit S. Hochbaum Abstract One way of reducing sources. We address here the problem of detecting nuclear threats by using multiple detectors mounted

Hochbaum, Dorit S.

218

Metamaterials for threat reduction applications: imaging, signal processing, and cloaking  

E-Print Network (OSTI)

Metamaterials for threat reduction applications: imaging, signal processing, and cloaking R. D effort is underway to fill this "THz gap" in view of potential threat reduction applications) and Theoretical Divisions, are exploring metamaterials-based de- vices operating at THz frequencies for threat

219

Maritime Threat Detection Using Probabilistic Graphical Models Bryan Auslander1  

E-Print Network (OSTI)

Maritime Threat Detection Using Probabilistic Graphical Models Bryan Auslander1 , Kalyan Moy Gupta1.lastname@knexusresearch.com | david.aha@nrl.navy.mil Abstract Maritime threat detection is a challenging problem because maritime them on a threat recognition task using track data obtained from force protection naval exercises

Gupta, Kalyan Moy

220

Insider Threat Detection using Stream Mining and Graph Mining  

E-Print Network (OSTI)

Insider Threat Detection using Stream Mining and Graph Mining Pallabi Parveen, Jonathan Evans threats who attempt to conceal their activities by varying their behaviors over time. This paper applies of insider threat detection, demonstrating that the ensemble-based approach is significantly more effective

Hamlen, Kevin W.

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Mitigating the Risk of Insider Threats When Sharing  

E-Print Network (OSTI)

Mitigating the Risk of Insider Threats When Sharing Credentials by Muntaha NourEddin Qasem Alawneh requirement. Achieving secure content sharing requires a deep analy- sis and understanding of security threats affecting such a fundamental requirement. We study and analyze one of the major threats which affect secure

Sheldon, Nathan D.

222

European Commission DG ENV Soil biodiversity: functions, threats and  

E-Print Network (OSTI)

European Commission DG ENV Soil biodiversity: functions, threats and tools for policy makers.turbe@biois.com In association with #12;2 European Commission - DG ENV Soil biodiversity: functions, threats and tools for policy Putten, Eric Labouze, and Shailendra Mudgal. Soil biodiversity: functions, threats and tools for policy

Paris-Sud XI, Université de

223

THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS  

E-Print Network (OSTI)

THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS Joshua Pauli College of Business.xu@ndsu.nodak.edu Keywords: Software architecture, Security, Threat model, Use case, Misuse case, UML Abstract: To deal with software security issues in the early stages of system development, this paper presents a threat- driven

224

Rapid evolutionary dynamics and disease threats to biodiversity  

E-Print Network (OSTI)

Rapid evolutionary dynamics and disease threats to biodiversity Sonia Altizer1 , Drew Harvell2 should enable hosts to respond better to future disease threats. Infectious diseases are recognized populations, or have been implicated as threats to already declining species [4­6]. Although infectious

225

Decentralized Semantic Threat Graphs Simon N. Foley1  

E-Print Network (OSTI)

Decentralized Semantic Threat Graphs Simon N. Foley1 William M. Fitzgerald1 Cork Constraint.foley@cs.ucc.ie wfitzgerald@4c.ucc.ie Abstract. Threat knowledge-bases such as those maintained by MITRE and NIST provide a basis with which to mitigate known threats to an enterprise. These centralised knowledge-bases assume

Foley, Simon

226

Maritime Threat Detection using Plan Recognition Bryan Auslander1  

E-Print Network (OSTI)

Maritime Threat Detection using Plan Recognition Bryan Auslander1 , Kalyan Moy Gupta1 , & David W algorithms for maritime threat detection employ a variety of normalcy models that are probabilistic and for threat detection. We compare their performance with a behavior recognition algorithm on simulated

Gupta, Kalyan Moy

227

BOMB THREAT PLACE THIS CARD UNDER YOUR TELEPHONE  

E-Print Network (OSTI)

BOMB THREAT PLACE THIS CARD UNDER YOUR TELEPHONE QUESTIONS TO ASK: 1. When is the bomb going? EXACT WORDING OF THE THREAT: Sex of caller: Race: Age: Number at which call received: Length of call: Check Caller ID - *69: Record caller's number: Time: Date: IMMEDIATELY REPORT BOMB THREATS TO

Slatton, Clint

228

FACTS about threat Possible INTERVENTIONS Strong domain identification  

E-Print Network (OSTI)

FACTS about threat Possible INTERVENTIONS Strong domain identification heightens the effect are able to self affirm in difficult situations can lessen the effects of threat. Encourage students to use to students not under threat. Educate students on self talk! Teach them to pay close attention

Chisholm, Rex L.

229

Ionosphere Threat to LAAS: Updated Model, User Impact, and Mitigations  

E-Print Network (OSTI)

1 Ionosphere Threat to LAAS: Updated Model, User Impact, and Mitigations Ming Luo, Sam Pullen-4], a "linear spatial gradient front" model was established and a threat space was extrapolated based on data from the 6 April 2000 ionospheric storm. User vertical error was estimated based on this threat model

Stanford University

230

Predictors of Threat and Error Management: Identification of Core  

E-Print Network (OSTI)

Predictors of Threat and Error Management: Identification of Core Nontechnical Skills In normal flight operations, crews are faced with a variety of external threats and commit a range of errors of these threats and errors therefore forms an essential element of enhancing performance and minimizing risk

231

Risks and threats to civilization, humankind, and the earth  

Science Journals Connector (OSTI)

This paper is a brief look at a wide range of risks that are said to present great threats to humankind. It was stimulated by several interacting factors. First, too many books and articles about astrophysical catastrophes, in the scientific and semi-scientific press, give relatively little attention to their timeframe or the measures to anticipate and prepare for them. Second, and most important, is that the overblown effects of 9/11 have distorted the United States of America's perspective and agenda on catastrophes. The result is that billions of dollars have been wasted and attention turned away from threats that could be truly catastrophic for the United States and, in many cases, for the rest of the world. Third, are books that have become popular by raising the threat that what will happen to us will be similar to what happened to earlier societies such as the Maya and the Easter Islanders. Most notably among these is Jared Diamond's Collapse [Jared Diamond, Collapse: How Societies Choose to Fail or Succeed, Penguin Group, 2005]. The failure in these doomsday arguments is to overlook the greater sophistication, knowledge, awareness, monitoring and preparation currently in the United States and in other parts of the globe. The institutional structure and scientific knowledge today would either prevent or deal with the kind of socio-economic decline anticipated by the “collapse” arguments. In contrast several geophysical and celestial risks do imply global catastrophe. The value of this paper is as broad background to the specific scenario papers that follow. While it leans heavily on the work of others, it offers three new features for the analysis of any extreme risk. First is a scale of devastation, based on deaths. Second is a comprehensive time frame—now to the end of the Earth. Third is an outline of general questions that must be addressed for any risk, however large or small, if it is to provide insight into policy choices and promote systemic thinking.

Joseph F. Coates

2009-01-01T23:59:59.000Z

232

Not All Threats are Created Equal: How Implicitness and Timing Affect the Effectiveness of Threats in Negotiations  

Science Journals Connector (OSTI)

The effectiveness of threats in negotiations was examined by exploring two ... implicitness, or the extent to which the threat mentions what action the perpetrator would take ... and timing, or the time when the

Marwan Sinaceur; Margaret A. Neale

2005-01-01T23:59:59.000Z

233

NNSA Launches Global Threat Reduction Initiative | National Nuclear  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Threat Reduction Initiative | National Nuclear Global Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > NNSA Launches Global Threat Reduction Initiative NNSA Launches Global Threat Reduction Initiative May 26, 2004 Vienna, Austria NNSA Launches Global Threat Reduction Initiative

234

Office of Nuclear Threat Science | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Threat Science | National Nuclear Security Administration Nuclear Threat Science | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Office of Nuclear Threat Science Home > About Us > Our Programs > Counterterrorism and Counterproliferation > Office of Nuclear Threat Science Office of Nuclear Threat Science

235

Office of Nuclear Threat Science | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Threat Science | National Nuclear Security Administration Threat Science | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Office of Nuclear Threat Science Home > About Us > Our Programs > Counterterrorism and Counterproliferation > Office of Nuclear Threat Science Office of Nuclear Threat Science

236

NNSA Launches Global Threat Reduction Initiative | National Nuclear  

National Nuclear Security Administration (NNSA)

Global Threat Reduction Initiative | National Nuclear Global Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > NNSA Launches Global Threat Reduction Initiative NNSA Launches Global Threat Reduction Initiative May 26, 2004 Vienna, Austria NNSA Launches Global Threat Reduction Initiative

237

Detection and Analysis of Threatsto the Energy Sector (DATES) May 2008  

Energy.gov (U.S. Department of Energy (DOE))

A groundbreaking integrated capability in intrusion detection, security event management, and sector-wide threat analysis.

238

An FPGA-Based Framework for Run-time Injection and Analysis of Soft Errors in Microprocessors  

E-Print Network (OSTI)

-specified memory elements of an entire microprocessor (MIPS32) running application software. While the framework is applicable to arbitrary software, we demonstrate its usage by characterizing soft errors effects on several software filters used in aviation for probabilistic sensor data fusion. I. INTRODUCTION Soft errors cause

Teschner, Matthias

239

Cycle time versus throughput analysis: an overall framework for generating simulation-based cycle time-throughput curves  

Science Journals Connector (OSTI)

A simulation-based cycle time-throughput curve requires a large amount of simulation output data, and an experimentation framework is needed to enhance the precision and accuracy of a simulation-based cycle time-throughput curve. In this research, approaches ...

Sungmin Park; Gerald T. Mackulak; John W. Fowler

2001-12-01T23:59:59.000Z

240

An Overview of Non-traditional Nuclear Threats  

SciTech Connect

In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or ''dirty'' bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials entering our borders is considered. The radiation and other signatures or potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.

Geelhood, Bruce D.; Wogman, Ned A.

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

An Overview of Non-Traditional Nuclear Threats  

SciTech Connect

In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear war-heads to include radiation dispersal devices (RDD) or “dirty” bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials enter-ing our borders is considered. The radiation and other signatures of potential nuclear and radio-logical threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.

Geelhood, Bruce D.; Wogman, Ned A.

2005-01-01T23:59:59.000Z

242

Chlorine Gas: An Evolving Hazardous Material Threat and Unconventional Weapon  

E-Print Network (OSTI)

biological, and chemical weapons of warfare and terrorism.Threat and Unconventional Weapon Robert Jones, MD Brandonand as a terrorist weapon. This review will summarize recent

Jones, Robert; Wills, Brandon; Kang, Christopher

2010-01-01T23:59:59.000Z

243

COLLOQUIUM: Nuclear Famine: The Threat to Humanity from Nuclear...  

NLE Websites -- All DOE Office Websites (Extended Search)

MBG Auditorium COLLOQUIUM: Nuclear Famine: The Threat to Humanity from Nuclear Weapons Dr. Alan Robock Rutgers University A nuclear war between India and Pakistan, with...

244

Mitigating the Insider Threat Using Behavioral Science Workshop  

SciTech Connect

PowerPoint presentations are included on: the Insider Threat; Detecting the Malicious Insider through Behavioral Science; and Psychological Barriers to Effective Nuclear Security.

Landers, John; De Castro, Kara

2012-11-26T23:59:59.000Z

245

ORISE: Securing the Golden State from threats foreign and domestic  

NLE Websites -- All DOE Office Websites (Extended Search)

Securing the Golden State from threats foreign and domestic ORISE helps California emergency planners with innovative training on state and local levels To protect the state of...

246

NNSA Supports Permanent Threat Reduction in Ukraine through Alternativ...  

National Nuclear Security Administration (NNSA)

terrorism around the world. Converting or replacing isotopic devices with non-isotopic alternative technology achieves permanent threat reduction by decreasing the availability...

247

Working to keep us safe: Sara Brambilla, Postdoc creates threat...  

NLE Websites -- All DOE Office Websites (Extended Search)

to keep us safe: Sara Brambilla, Postdoc creates threat reduction tools Chemical engineer postdoc experiences a foreign culture while working on resources that respond to...

248

Sensor Data Processing for Tracking Underwater Threats Using Terascale Optical Core Devices  

SciTech Connect

A critical aspect of littoral surveillance (including port protection) involves the localization and tracking of underwater threats such as manned or unmanned autonomous underwater vehicles. In this article, we present a methodology for locating underwater threat sources from uncertain sensor network data, and illustrate the threat tracking aspects using active sonars in a matched filter framework. The novelty of the latter paradigm lies in its implementation on a tera-scale optical core processor, EnLight , recently introduced by Lenslet Laboratories. This processor is optimized for array operations, which it performs in a fixed point arithmetic architecture at tera-scale throughput. Using the EnLight 64 prototype processor, our results (i) illustrate the ability to reach a robust tracking accuracy, and (ii) demonstrate that a considerable speed-up (a factor of over 13,000) can be achieved when compared to an Intel XeonTM processor in the computation of sets of 80K-sample complex Fourier transforms that are associated with our matched filter techniques.

Barhen, Jacob [ORNL; Imam, Neena [ORNL

2009-01-01T23:59:59.000Z

249

Before the House Subcommittee on Emerging Threats, Cyber Security and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Emerging Threats, Cyber Security Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability 7-21-09_Final_Testimony_Hoffman.pdf More Documents & Publications Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Before the House Science and Technology Subcommittee on Energy and

250

Nuclear Radiological Threat Task Force Established | National Nuclear  

NLE Websites -- All DOE Office Websites (Extended Search)

Radiological Threat Task Force Established | National Nuclear Radiological Threat Task Force Established | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > Nuclear Radiological Threat Task Force Established Nuclear Radiological Threat Task Force Established November 03, 2003 Washington, DC Nuclear Radiological Threat Task Force Established

251

Global Threat Reduction Initiative | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Threat Reduction Global Threat Reduction ... Global Threat Reduction Initiative The Global Threat Reduction Initiative's Alarm Response Training provides training in the area of response for radiological events and provides an opportunity for the security forces, health and safety personnel, and other responsible parties such as the supporting local law enforcement to develop, discuss, and exercise their own tactics, techniques, procedures, and protocols when responding to a theft and/or sabotage event involving radioactive materials of significance. This voluntary program is free, and all expenses (travel, meals, etc.), other than the trainee's training time, will be paid by the GTRI Domestic Threat Reduction Program. Facilities participating in the Domestic Security Program are scheduled for

252

GTRI: Reducing Nuclear Threats | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Reducing Nuclear Threats | National Nuclear Security Administration Reducing Nuclear Threats | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > GTRI: Reducing Nuclear Threats Fact Sheet GTRI: Reducing Nuclear Threats Apr 12, 2013 Mission In 2004, NNSA established the Global Threat Reduction Initiative (GTRI) in the Office of Defense Nuclear Nonproliferation to, as quickly as possible,

253

POLICY RELATED TO THREATS OF CAMPUS DISRUPTION Bomb threats and similar situations are disruptive to the academic, research and operational functions of  

E-Print Network (OSTI)

POLICY RELATED TO THREATS OF CAMPUS DISRUPTION Bomb threats and similar situations are disruptive. Policy Any bomb threat or incident of a suspected explosive device shall be considered as valid by all advised that the situation is no longer considered a threat. Every effort must be made to protect

Collins, Gary S.

254

Response to Bomb Threats Page 1 of 3 Virginia Polytechnic Institute and State University No. 5600 Rev.: 4  

E-Print Network (OSTI)

Response to Bomb Threats Page 1 of 3 Virginia Polytechnic Institute and State University No. 5600 __________________________________________________________________________________ Subject: Response to Bomb Threats ............................................................................................................................................................1 3.1 Telephoned Threat

Virginia Tech

255

Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security  

E-Print Network (OSTI)

Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security Marwan Abi Science Carnegie Mellon University Pittsburgh, PA 15213 Center for Software Excellence Abstract Threat Foundation. #12;Keywords: Threat modeling, data flow diagrams, reflexion models, architecture-level security

Abi-Antoun, Marwan

256

THE VISUAL CUES USED BY THE LEMON PEEL ANGELFISH (CENTROPYGE FLAVISSIMA) TO DETERMINE THREAT  

E-Print Network (OSTI)

FLAVISSIMA) TO DETERMINE THREAT JESSICA   POST Integrative be used by fish to assess threat, and indicate when it is were  important in assessing threat.   Multiple cues were 

Post, Jessica

2012-01-01T23:59:59.000Z

257

Threat Facilitates Subsequent Executive Control During Anxious Mood Jeffrey L. Birk  

E-Print Network (OSTI)

Threat Facilitates Subsequent Executive Control During Anxious Mood Jeffrey L. Birk Tufts) posits that low-level threat may facilitate behavioral performance by influencing executive control functions. Anxiety is thought to strengthen this effect by enhancing threat's affective significance

Patel, Aniruddh D.

258

DAKOTA : a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis.  

SciTech Connect

The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic expansion methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a theoretical manual for selected algorithms implemented within the DAKOTA software. It is not intended as a comprehensive theoretical treatment, since a number of existing texts cover general optimization theory, statistical analysis, and other introductory topics. Rather, this manual is intended to summarize a set of DAKOTA-related research publications in the areas of surrogate-based optimization, uncertainty quantification, and optimization under uncertainty that provide the foundation for many of DAKOTA's iterative analysis capabilities.

Eldred, Michael Scott; Vigil, Dena M.; Dalbey, Keith R.; Bohnhoff, William J.; Adams, Brian M.; Swiler, Laura Painton; Lefantzi, Sophia (Sandia National Laboratories, Livermore, CA); Hough, Patricia Diane (Sandia National Laboratories, Livermore, CA); Eddy, John P.

2011-12-01T23:59:59.000Z

259

Methodology and computational framework used for the US Department of Energy Environmental Restoration and Waste Management Programmatic Environmental Impact Statement accident analysis  

SciTech Connect

A methodology, computational framework, and integrated PC-based database have been developed to assess the risks of facility accidents in support of the US Department of Energy (DOE) Environmental Restoration and Waste Management Programmatic Environmental Impact Statement. The methodology includes the following interrelated elements: (1) screening of storage and treatment processes and related waste inventories to determine risk-dominant facilities across the DOE complex, (2) development and frequency estimation of the risk-dominant sequences of accidents, and (3) determination of the evolution of and final compositions of radiological or chemically hazardous source terms predicted to be released as a function of the storage inventory or treatment process throughput. The computational framework automates these elements to provide source term input for the second part of the analysis which includes (1) development or integration of existing site-specific demographics and meteorological data and calculation of attendant unit-risk factors and (2) assessment of the radiological or toxicological consequences of accident releases to the general public and to the occupational work force.

Mueller, C.; Roglans-Ribas, J.; Folga, S.; Huttenga, A. [Argonne National Lab., IL (United States); Jackson, R.; TenBrook, W.; Russell, J. [Science Applications International Corp., Golden, CO (United States)]|[Science Applications International Corp., Pleasanton, CA (United States)

1994-02-01T23:59:59.000Z

260

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Coping with stereotype threat: Denial as an impression management strategy  

E-Print Network (OSTI)

Four experiments tested the hypothesis that people who are concerned with impression management cope with stereotype threat through denial. Consistent with this hypothesis, temporary employees threatened by a stereotype ...

Von Hippel, W.; Von Hippel, C.; Conway, Leanne; Preacher, K. J.; Schooler, J. W.; Radvansky, G. A.

2005-01-01T23:59:59.000Z

262

Nuclear power's threat to health, safety, and freedom  

Science Journals Connector (OSTI)

Nuclear power's threat to health, safety, and freedom ... In particular, they may differ on whether the nuclear power plants that are the result of the 1953 Atoms for Peace movement help or hinder the control of nuclear weapons. ...

1980-10-13T23:59:59.000Z

263

A European vision for addressing global security threats  

Science Journals Connector (OSTI)

There is a robust consensus among EU Member States about the need to identify the complex links between the threats and challenges to the EU’s security. ... and instruments required to effectively respond to secu...

Gerhard Sabathil

2010-06-01T23:59:59.000Z

264

Chapter 2 - Threats and Hazards at Educational Institutions  

Science Journals Connector (OSTI)

Abstract This chapter describes the threats and hazards currently facing school administrators. It separately covers school districts (K-12) and higher education (colleges and universities), and includes information about legislation and protection measures.

Philip Purpura

2014-01-01T23:59:59.000Z

265

Threat assessment design for driver assistance system at intersections  

E-Print Network (OSTI)

This paper considers the decision-making problem for a human-driven vehicle crossing a road intersection in the presence of other, potentially errant, drivers. Our approach relies on a novel threat assessment module, which ...

Aoude, Georges

266

EWAS: Modeling Application for Early Detection of Terrorist Threats  

Science Journals Connector (OSTI)

This paper presents a model and system architecture for an early warning system to detect terrorist threats. The paper discusses the shortcomings of state ... of generation of early warnings to predict terrorist

Pir Abdul Rasool Qureshi; Nasrullah Memon…

2010-01-01T23:59:59.000Z

267

Threat-aware Path Planning in Uncertain Urban Environments  

E-Print Network (OSTI)

This paper considers the path planning problem for an autonomous vehicle in an urban environment populated with static obstacles and moving vehicles with uncertain intents. We propose a novel threat assessment module, ...

Aoude, Georges

268

Extinction by Miscalculation: The Threat to Sakinaw and Cultus Lake  

E-Print Network (OSTI)

Extinction by Miscalculation: The Threat to Sakinaw and Cultus Lake Sockeye MART R. GROSS of Economics, University of Toronto, 150 St. George Street, Toronto, Canada M5S 3G7. Email

Gross, Mart

269

Insider Threat to Nuclear and Radiological Materials: Fact Sheet | National  

National Nuclear Security Administration (NNSA)

Insider Threat to Nuclear and Radiological Materials: Fact Sheet | National Insider Threat to Nuclear and Radiological Materials: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Insider Threat to Nuclear and Radiological Materials: ... Fact Sheet Insider Threat to Nuclear and Radiological Materials: Fact Sheet

270

Sustainability analysis of complex dynamic systems using embodied energy flows: The eco-bond graphs modeling and simulation framework  

Science Journals Connector (OSTI)

Abstract This article presents a general methodology for modeling complex dynamic systems focusing on sustainability properties that emerge from tracking energy flows. We adopt the embodied energy (emergy) concept that traces all energy transformations required for running a process. Thus, energy at any process within a system is studied in terms of all the energy previously invested to support it (up to the primary sources) and therefore sustainability can be analyzed structurally. These ideas were implemented in the bond graph framework, a modeling paradigm where physical variables are explicitly checked for adherence to energy conservation principles. The results are a novel Ecological Bond Graphs (EcoBG) modeling paradigm and the new EcoBondLib library, a set of practical ready-to-use graphical models based on EcoBG principles and developed under the Modelica model encoding standard. EcoBG represents general systems in a three-faceted fashion, describing dynamics at their mass, energy, and emergy facets. EcoBG offers a scalable graphical formalism for the description of emergy dynamic equations, resolving some mathematical difficulties inherited from the original formulation of the equations. The core elements of EcoBG offer a soundly organized mathematical skeleton upon which new custom variables and indexes can be built to extend the modeling power. This can be done safely, without compromising the correctness of the core energy balance calculations. As an example we show how to implement a custom sustainability index at local submodels, for detecting unsustainable phases that are not automatically discovered when using the emergy technique alone. The fact that we implemented EcoBondLib relying on the Modelica technology opens up powerful possibilities for studying sustainability of systems with interactions between natural and industrial processes. Modelica counts on a vast and reusable knowledge base of industrial-strength models and tools in engineering applications, developed by the Modelica community throughout decades.

Rodrigo D. Castro; François E. Cellier; Andreas Fischlin

2014-01-01T23:59:59.000Z

271

A Bayesian Belief Network of Threat Anticipation and Terrorist Motivations  

SciTech Connect

Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) as well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.

Olama, Mohammed M [ORNL; Allgood, Glenn O [ORNL; Davenport, Kristen M [ORNL; Schryver, Jack C [ORNL

2010-01-01T23:59:59.000Z

272

A New Framework for Adaptive Sampling and Analysis During Long-Term Monitoring and Remedial Action Management  

SciTech Connect

DOE and other Federal agencies are making a significant investment in the development of field analytical techniques, nonintrusive technologies, and sensor technologies that will have a profound impact on the way environmental monitoring is conducted. Monitoring and performance evaluation networks will likely be base on suites of in situ sensors, with physical sampling playing a much more limited role. Designing and using these types of networks effectively will require development of a new paradigm for sampling and analysis of remedial actions, which is the overall goal of this project.

Minsker, Barbara; Albert Valocchi; Barbara Bailey

2008-01-27T23:59:59.000Z

273

Receiver Operating Characteristic Analysis for Detecting Explosives-related Threats  

SciTech Connect

The Department of Homeland Security (DHS) and the Transportation Security Administration (TSA) are interested in developing a standardized testing procedure for determining the performance of candidate detection systems. This document outlines a potential method for judging detection system performance as well as determining if combining the information from a legacy system with a new system can signi��������cantly improve performance. In this document, performance corresponds to the Neyman-Pearson criterion applied to the Receiver Operating Characteristic (ROC) curves of the detection systems in question. A simulation was developed to investigate how the amount of data provided by the vendor in the form of the ROC curve e�������¤ects the performance of the combined detection system. Furthermore, the simulation also takes into account the potential e�������¤ects of correlation and how this information can also impact the performance of the combined system.

Mark E. Oxley; Alexander M. Venzin

2012-11-14T23:59:59.000Z

274

Multi-Agent Patrolling under Uncertainty and Threats Shaofei Chen1,2  

E-Print Network (OSTI)

Multi-Agent Patrolling under Uncertainty and Threats Shaofei Chen1,2 , Feng Wu2 , Lincheng Shen1 information is distributed alongside threats. The informa- tion and threat at each location are respectively by an agent. While agents obtain information at a location, they may suffer attacks from the threat

Yeoh, William

275

Threat Assessment Using Evidential Networks A. Benavoli, B. Ristic, A. Farina, M. Oxenham, L. Chisci  

E-Print Network (OSTI)

Threat Assessment Using Evidential Networks A. Benavoli, B. Ristic, A. Farina§, M. Oxenham, L by providing a threat assessment, that is an estimate of the extent to which an enemy platform poses a threat based on evidence about its intent and capability. Threat is modelled by a network of entities

Chisci, Luigi

276

Ionospheric Threat Model Methodology for Juan Blanch, Todd Walter, Per Enge. Stanford University  

E-Print Network (OSTI)

Ionospheric Threat Model Methodology for WAAS Juan Blanch, Todd Walter, Per Enge. Stanford of a threat model. The threat model is used to restrict the expected ionospheric behavior. It must not be too driving the ionosphere are not entirely known, a decision has been made to base the threat model

Stanford University

277

Old Threats Never Die By: Gunter Ollmann, Director of Security Strategy  

E-Print Network (OSTI)

Old Threats Never Die By: Gunter Ollmann, Director of Security Strategy IBM Internet Security Systems #12;Table of Contents Threat Lifecycle 1 Malware Threat Lifecycle 2 Vulnerability Lifecycle 2 Conclusions 12 #12;Old Threats Never Die Page 1 With year-on-year increases in vulnerabilities, malware

278

Economic Impact Reporting Framework  

E-Print Network (OSTI)

Economic Impact Reporting Framework 2007/08 November 2008 #12;#12;Economic Impact Reporting Framework 2007/08 #12;STFC Economic Impact Reporting Framework 2007/08 Contents: Introduction..............................................................................................................................................2 1: Overall Economic Impacts

279

Economic Impact Reporting Framework  

E-Print Network (OSTI)

Economic Impact Reporting Framework 2008/09 #12;#12;Economic Impact Reporting Framework 2008/09 #12;STFC Economic Impact Reporting Framework 2008/09 Contents: Introduction..............................................................................................................................................2 1: Overall Economic Impacts

280

Terror Threats Life Cycles Controlling Using Crisis Management during Environmental Metamorphoses  

Science Journals Connector (OSTI)

Abstract The appearance of new terror threats is a reality. They manifest themselves as perils which can be replicated as the new use cases on terrorist attack events in surprising sceneries and arenas. In this paper, the behaviour of the relevant entities is blazonry explained, modelled, analysed, evaluated and simulated using the DYVELOP method within the pertinent threat/peril life cycles. They are modelled on looping terrorist attack scenes in pertinent environments and their metamorphoses, operating at real threat/peril scenes. This article helps to clarify and identify the roles and processes of these scene entities, domains, actors, participants, interfaces and users. The DYVELOP method is a fundamental instrument for the objective analysis, understanding, evaluation, interpretation, development and computerized modelling & simulation of emergency/ societal security awareness, performance, continual planning, management, training and intervention. Base upon qualitative research it deduces within a process the necessity for operational cooperation among all participants, collaborating to fulfil the requirements of crisis management stakeholders, controlling the crisis scene in many environments using process systems and use cases.

David Kral; Jiri F. Urbanek

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

A framework and review of customer outage costs: Integration and analysis of electric utility outage cost surveys  

SciTech Connect

A clear understanding of the monetary value that customers place on reliability and the factors that give rise to higher and lower values is an essential tool in determining investment in the grid. The recent National Transmission Grid Study recognizes the need for this information as one of growing importance for both public and private decision makers. In response, the U.S. Department of Energy has undertaken this study, as a first step toward addressing the current absence of consistent data needed to support better estimates of the economic value of electricity reliability. Twenty-four studies, conducted by eight electric utilities between 1989 and 2002 representing residential and commercial/industrial (small, medium and large) customer groups, were chosen for analysis. The studies cover virtually all of the Southeast, most of the western United States, including California, rural Washington and Oregon, and the Midwest south and east of Chicago. All variables were standardized to a consistent metric and dollar amounts were adjusted to the 2002 CPI. The data were then incorporated into a meta-database in which each outage scenario (e.g., the lost of electric service for one hour on a weekday summer afternoon) is treated as an independent case or record both to permit comparisons between outage characteristics and to increase the statistical power of analysis results. Unadjusted average outage costs and Tobit models that estimate customer damage functions are presented. The customer damage functions express customer outage costs for a given outage scenario and customer class as a function of location, time of day, consumption, and business type. One can use the damage functions to calculate outage costs for specific customer types. For example, using the customer damage functions, the cost experienced by an ''average'' customer resulting from a 1 hour summer afternoon outage is estimated to be approximately $3 for a residential customer, $1,200 for small-medium commercial and industrial customer, and $82,000 for large commercial and industrial customer. Future work to improve the quality and coverage of information on the value of electricity reliability to customers is described.

Lawton, Leora; Sullivan, Michael; Van Liere, Kent; Katz, Aaron; Eto, Joseph

2003-11-01T23:59:59.000Z

282

Nuclear Safety Regulatory Framework  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy Department of Energy Nuclear Safety Regulatory Framework DOE's Nuclear Safety Enabling Legislation Regulatory Enforcement & Oversight Regulatory Governance Atomic Energy Act 1946 Atomic Energy Act 1954 Energy Reorganization Act 1974 DOE Act 1977 Authority and responsibility to regulate nuclear safety at DOE facilities 10 CFR 830 10 CFR 835 10 CFR 820 Regulatory Implementation Nuclear Safety Radiological Safety Procedural Rules ISMS-QA; Operating Experience; Metrics and Analysis Cross Cutting DOE Directives & Manuals DOE Standards Central Technical Authorities (CTA) Office of Health, Safety, and Security (HSS) Line Management SSO/ FAC Reps 48 CFR 970 48 CFR 952 Federal Acquisition Regulations External Oversight *Defense Nuclear Facility

283

The unstable Gulf, Threats from within  

SciTech Connect

Martin offers an analysis of disputes along the borders of countries in the Persian Gulf region and a description of the religious, ethnic, and ideological tensions among the peoples. The pros and cons of various options for protecting American interests are outlined. The discussion covers Iran, Iraq, Kuwait, North and South Yemen, Oman, Soudi Arabia, U.A.E., Bahrain, and Qatar.

Martin, L.G.

1984-01-01T23:59:59.000Z

284

Sustainability Framework 1 Queen's University  

E-Print Network (OSTI)

Sustainability Framework 1 Queen's University Sustainability Strategic Framework #12;Sustainability Framework 2 Contents Introduction .................................................................................................................................................. 2 Queen's Sustainability Mission

Abolmaesumi, Purang

285

Protecting the Nation's Electric Grid from Cyber Threats | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats January 11, 2012 - 11:28am Addthis A smarter, modernized, and more secure grid will be pivotal to the United States’ world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. A smarter, modernized, and more secure grid will be pivotal to the United States' world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. Howard A. Schmidt White House Cybersecurity Coordinator Secretary Steven Chu: "Establishing a comprehensive cybersecurity approach will give utility companies and grid operators another important tool to improve the grid's ability to respond to cybersecurity risks."

286

NNSA's Global Threat Reduction Initiative launches mobile app | National  

National Nuclear Security Administration (NNSA)

launches mobile app | National launches mobile app | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative launches mobile app NNSA's Global Threat Reduction Initiative launches mobile app Posted By Office of Public Affairs NNSA's Global Threat Reduction Initiative (GTRI) recently launched a

287

NNSA's Global Threat Reduction Initiative food face-off | National  

NLE Websites -- All DOE Office Websites (Extended Search)

food face-off | National food face-off | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative food face-off NNSA's Global Threat Reduction Initiative food face-off Posted By Office of Public Affairs NNSA's Global Threat Reduction Initiative holds a Feds Feeds Family face-off

288

Effects of intentional threats to power substation control systems  

Science Journals Connector (OSTI)

Power station control and management systems represent key elements for guaranteeing the security of the power grid infrastructure. Intrinsically conceived to support the continuous provision of power in secure conditions, those systems today make intensive use of information and communication systems and are therefore exposed to related accidental and intentional cyber threats. This paper describes a simulation of cyber attacks conducted in the CESI RICERCA laboratory testbed on a prototypical substation control infrastructure with the purpose of testing their feasibility and illustrating their impact on the control system services. A set of attack scenarios targeting several subsystems has been experimented, with different simulated threat motivations and different degrees of impact on the global substation service. The paper reports some considerations about the consequences of the implemented attacks, focusing on different facets of the problem, in an effort to elucidate the full significance of the potential cyber threats.

Giovanna Dondossola; Judit Szanto; Marcelo Masera; Igor Nai Fovino

2008-01-01T23:59:59.000Z

289

NNSA's Global Threat Reduction Initiative Receives 2010 Distinguished  

NLE Websites -- All DOE Office Websites (Extended Search)

Receives 2010 Distinguished Receives 2010 Distinguished Project Award from PMI | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Press Releases > NNSA's Global Threat Reduction Initiative Receives 2010 ... Press Release NNSA's Global Threat Reduction Initiative Receives 2010 Distinguished

290

Threats and Challenges in Reconfigurable Hardware Security Ryan Kastner  

E-Print Network (OSTI)

Reconfigurable Hardware Life Cycle Before we discuss specific security problems, attacks and solutions, we: The life cycle of reconfigurable hardware, from manufacturing to application development to deploymentThreats and Challenges in Reconfigurable Hardware Security Ryan Kastner Dept. of Computer Science

291

How to determine threat probabilities using ontologies and Bayesian networks  

E-Print Network (OSTI)

are capable to reduce the risk to an acceptable level at the lowest possible costs. Risk is defined. The elaborated concepts enable risk managers to comprehensibly quantify the current security status Terms Security Keywords threat probability determination, risk management, infor- mation security 1

292

Constructing Ionospheric Irregularity Threat Model for Korean SBAS  

E-Print Network (OSTI)

GNSS augmentation system and space weather forecasting for GNSS application. Jiyun Lee is an Assistant metrics which measure the density and uniformity of IPP distribution in a region. Thus, the threat model metrics, which characterize threatening undersampled geometries including the density of IPP distribution

Stanford University

293

WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President  

E-Print Network (OSTI)

WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President Dr. Peter H. Gleick1 October 9, 2008 Safe and adequate fresh water resources are central to the economy, foreign policy domestic and international challenges related to fresh water. These challenges will require unilateral

294

The cyber threat landscape: Challenges and future research directions  

Science Journals Connector (OSTI)

Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain ... Keywords: Culture of security, Cyber crime, Cyber exploitation, Policing and preventative strategy, Public private partnership, Routine Activity Theory

Kim-Kwang Raymond Choo

2011-11-01T23:59:59.000Z

295

Ecological factors and human threats both drive wildfowl population declines  

E-Print Network (OSTI)

; human population density. Correspondence Peter R. Long, Department of Biology and Biochemistry, Africa and Asia. Second, we use phylogenetic comparative analyses to test whether population size, globalEcological factors and human threats both drive wildfowl population declines P. R. Long1 , T. Sz

296

PERSISTENT SURVEILLANCE FOR PIPELINE PROTECTION AND THREAT INTERDICTION  

E-Print Network (OSTI)

-rated and IFE target supply processes and target related systems Electrically steer targets Making foam or fastPERSISTENT SURVEILLANCE FOR PIPELINE PROTECTION AND THREAT INTERDICTION Overview of the Fusion) for the Pedestal Developed and Tested · Formation of an edge barrier or "pedestal" allows high performance

297

GVis: a scalable visualization framework for genomic data  

Science Journals Connector (OSTI)

This paper describes a framework we have developed for the visual analysis of large-scale phylogeny hierarchies populated with the genomic data of various organisms. This framework allows the user to quickly browse the phylogeny hierarchy of organisms ...

Jin Hong; Dong Hyun Jeong; Chris D Shaw; William Ribarsky; Mark Borodovsky; Chang Song

2005-06-01T23:59:59.000Z

298

A decision making framework for cruise ship design  

E-Print Network (OSTI)

This thesis develops a new decision making framework for initial cruise ship design. Through review of effectiveness analysis and multi-criteria decision making, a uniform philosophy is created to articulate a framework ...

Katsoufis, George P. (George Paraskevas)

2006-01-01T23:59:59.000Z

299

Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial  

E-Print Network (OSTI)

Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial of the Threat and Consequences of Weapon Attacks on Commercial Aircraft CREATE Report 29 November 2005 John P FLIGHT PATH . . . . . . . . . . . . . . . . . . . . . . . . . . 20 WEAPON LETHALITY MODEL

Wang, Hai

300

Study of Internet Threats and Attack Methods Using Honeypots and Honeynets  

Science Journals Connector (OSTI)

The number of threats from the Internet has been growing in ... the most suitable protection the detailed information about threats are required. Honeypots and honeynets are effective ... tools for obtaining deta...

Tomas Sochor; Matej Zuzcak

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

NNSA's Global Threat Reduction Initiative Completes First Plutonium  

National Nuclear Security Administration (NNSA)

Completes First Plutonium Completes First Plutonium Shipment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative Completes First ... NNSA's Global Threat Reduction Initiative Completes First Plutonium Shipment Posted By NNSA Public Affairs NNSA Blog The United States and Sweden announced today at the 2012 Nuclear Security

302

NNSA's Global Threat Reduction Initiative Completes First Plutonium  

NLE Websites -- All DOE Office Websites (Extended Search)

Completes First Plutonium Completes First Plutonium Shipment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative Completes First ... NNSA's Global Threat Reduction Initiative Completes First Plutonium Shipment Posted By NNSA Public Affairs NNSA Blog The United States and Sweden announced today at the 2012 Nuclear Security

303

Threats and human influence on coastal ecosystem of Southern India  

Science Journals Connector (OSTI)

Populations of the majority of fish species showed drastic reduction over the past five decades in west coast of India. We conducted an intensive study of Aghanashini estuary for water quality and fish diversity in west coast of India. Coastal ecosystems are impacted by many stressors and are continually subjected to threats from multiple stresses imposed mostly by human activities predominantly as a result of increased population growth in India. The most significant categories of threats derive from water pollution from numerous sources including thermal effluents, heavy metals, oil, sewage, pesticides, pulp mills, habitat loss and degradation, overexploitation, eutrophication and misguided human perceptions. Wide array of prohibited fishing methods are rampant by using of insecticides as poisons, destruction and modification of habitats, dynamiting, using chemical and herbal poisons. Due to deteriorated water, quality from anthropogenic activities fish diversity has drastically reduced. In complex coastal ecosystems, strategies for restoration can become equally complicated.

D. Sannadurgappa

2010-01-01T23:59:59.000Z

304

Chapter 3 - Building Skills with Basics: Learning to Identify Threats  

Science Journals Connector (OSTI)

Abstract The karate student builds skills in a variety of ways, but one of the fundamental ways to practice is through repetition of the basics: blocks, punches, and kicks. A student learns to respond to real attacks from any direction, through continual training on the right way to defend and to eliminate an opponent. This is the starting point where a student develops proper techniques to attack and counterattack against a variety of violent threats. Organizations must recognize harmful hazards. Hazards may be obvious, such as risks from hurricanes, or may be less evident, such as the risks from a chemical spill on a nearby roadway. Threats to your organization can come in many formats, from natural to accidental to deliberate. To successfully prepare for problems, the next step in the assessment process calls for identifying potential risks and using available sources to identify what things you really should worry about.

Eric N. Smith

2014-01-01T23:59:59.000Z

305

Q&A with Steven Spencer: Speaker in the Women and STEM Series Talks About How He Became Interested in Studying Psychology, Dissonance, and Stereotype Threat  

E-Print Network (OSTI)

dissonance, and stereotype threat A Spencer’s talk, “Athe field of stereotype threat, I was impressed by his kindthink about contents stereotype threat. Therefore, I had the

Hooker, Courtney

2011-01-01T23:59:59.000Z

306

Assets at Risk: Menstrual Cycle Variation in the Envisioned Formidability of a Potential Sexual Assailant Reveals a Component of Threat Assessment  

E-Print Network (OSTI)

M. T. (2013). Sizing up the threat: The envisioned physicalconceptual links between threat, social status, and physicalReveals a Component of Threat Assessment Daniel M.T.

Fessler, Daniel M.T.; Holbrook, Colin; Fleischman, Diana S.

2014-01-01T23:59:59.000Z

307

A Study on Biological Threats to Texas Freshwater Resources  

E-Print Network (OSTI)

A STUDY ON BIOLOGICAL THREATS TO TEXAS FRESHWATER RESOURCES A Thesis by MICHAEL TYLER NEISCH Submitted to the Office of Graduate and Professional Studies of Texas A&M University in partial fulfillment of the requirements.... Roelke and Dr. Masser, and my committee member, Dr. Rogers, for their guidance and support throughout the course of this research. Special thanks also to Dr. Gatlin, Brian Ray and all the Texas A&M Aquaculture and Research Facility staff, John Johnson...

Neisch, Michael

2014-01-15T23:59:59.000Z

308

Application of Machine Learning and Crowdsourcing to Detection of Cybersecurity Threats Application of Machine Learning and Crowdsourcing  

E-Print Network (OSTI)

Application of Machine Learning and Crowdsourcing to Detection of Cybersecurity Threats 1 Application of Machine Learning and Crowdsourcing to Detection of Cybersecurity Threats February 2011 Eugene of Cybersecurity Threats 2 Abstract We are applying machine learning and crowdsourcing to cybersecurity

Fink, Eugene

309

Countering Hybrid Eco-threats to Global Security Under International Law: The Need for an Comprehensive Legal Approach  

Science Journals Connector (OSTI)

Threats to environmental security (‘eco-threats’) face not only shortcomings of environmental ... of Armed Conflict. Considering the new ‘Hybrid Threat’ concept, which had recently been discussed ... for adopting...

Joachim Sanden; Sascha-Dominik Bachmann

2013-11-01T23:59:59.000Z

310

IONOSPHERIC THREATS TO THE INTEGRITY OF AIRBORNE GPS USERS A DISSERTATION  

E-Print Network (OSTI)

IONOSPHERIC THREATS TO THE INTEGRITY OF AIRBORNE GPS USERS A DISSERTATION SUBMITTED threats to user safety if left unmitigated. This work identifies when such disturbances may occur using indicates the need for a non-trivial threat model for the Federal Aviation Administration's Local Area

Stanford University

311

Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability  

E-Print Network (OSTI)

Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability by Georges;Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability by Georges Salim fulfillment of the requirements for the degree of Doctor of Philosophy Abstract This thesis develops threat

How, Jonathan P.

312

Modeling Medical System Threats with Conditional Probabilities using Multiple-Valued Logic Decision  

E-Print Network (OSTI)

Modeling Medical System Threats with Conditional Probabilities using Multiple-Valued Logic Decision system reliability has become an area of increasing importance. Medical system threats, which include system operation. To address these problems, we build upon our previous threat cataloging methodology

Thornton, Mitchell

313

Moderate threat causes longer lasting disruption to processing in anxious individuals  

E-Print Network (OSTI)

Moderate threat causes longer lasting disruption to processing in anxious individuals Sophie: Forster S, Castle E, Nunez-elizalde AO and Bishop SJ(2014) Moderate threat causes longer lasting in anxiety1 Moderate threat causes longer lasting disruption to processing2 in anxious individuals.3 Sophie

Bishop, Sonia

314

umankind faces a wide range of threats to its security and safety, from ter-  

E-Print Network (OSTI)

H umankind faces a wide range of threats to its security and safety, from ter- rorist groups and cybercriminals to disease pandemics and climate change. All these threats share one characteristic threats. Two years ago we suggested in our book Natural Security: A Darwinian Approach to a Dangerous

Grether, Gregory

315

Responses to Ecological and Human Threats to a California Water Basin Governance System  

E-Print Network (OSTI)

W06-41 Responses to Ecological and Human Threats to a California Water Basin Governance System to the management regime as well. This paper describes the threats to water management arrangements in the San increasingly robust to certain disturbances (or threats), the complex social ecological system has remained

Janssen, Marco

316

Passive Threats among Agents in State Oriented Domains Yair B. Weinberger and Jeffrey S. Rosenschein  

E-Print Network (OSTI)

Passive Threats among Agents in State Oriented Domains Yair B. Weinberger and Jeffrey S systems work considered the notion of threats during negotiation, but in order to do so introduced additional assumptions on the domain. This paper presents a new model of threats among negotiating agents

Rosenschein, Jeff

317

Learning about social threats in RS Learning biases underlying individual differences in sensitivity to social rejection  

E-Print Network (OSTI)

Learning about social threats in RS 1 Learning biases underlying individual differences. Ochsner, Department of Psychology, Columbia University Running Head: Learning about social threats in RS University, Northwest Science Bldg 290, Cambridge, MA 0213. #12;Learning about social threats in RS 2

Ochsner, Kevin

318

Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security  

E-Print Network (OSTI)

Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security Marwan Abi Science Carnegie Mellon University Pittsburgh, PA 15213 # Center for Software Excellence Abstract Threat Foundation. #12; Keywords: Threat modeling, data flow diagrams, reflexion models, architecture­level security

319

Ionospheric Threat Mitigation by Geometry Screening in Ground-Based Augmentation Systems  

E-Print Network (OSTI)

Ionospheric Threat Mitigation by Geometry Screening in Ground-Based Augmentation Systems Jiyun Lee observed during severe ionospheric storms pose potential threats to the integrity of the Ground threats, because ionospheric gradients are not observable to the ground monitor if they impact

Stanford University

320

CERNA WORKING PAPER SERIES Spatial price homogeneity as a mechanism to reduce the threat of  

E-Print Network (OSTI)

CERNA WORKING PAPER SERIES Spatial price homogeneity as a mechanism to reduce the threat price homogeneity as a mechanism to reduce the threat of regulatory intervention in locally monopolistic to retaliations from local elected officials. When investor-owned monopolies are exposed to this threat

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Protecting Against Unsampled Ionospheric Threats Todd Walter, Sriram Rajagopal, Seebany Datta-Barua, and Juan Blanch  

E-Print Network (OSTI)

Protecting Against Unsampled Ionospheric Threats Todd Walter, Sriram Rajagopal, Seebany Datta features. Therefore, it is essential to understand the magnitude of such threats given the gaps in our observations. The methodology used to study these features is to start with well-observed threats from previous

Stanford University

322

MTRG/Ascension Management Plan 2002 SECTION 5: THREATS AND RECOMMENDED MANAGEMENT  

E-Print Network (OSTI)

MTRG/Ascension Management Plan 2002 14 SECTION 5: THREATS AND RECOMMENDED MANAGEMENT and control of pet cats 8) Continuation of ban on harvest of turtle products We give an account of all threats.1 General Habitat Degradation 5.1.1. Mining of Beach Sand 5.1.2. Light Pollution 5.1.3 Threat of Fuel Spill

Exeter, University of

323

Validity Threats in Empirical Software Engineering Research -An Initial Survey Robert Feldt, Ana Magazinius  

E-Print Network (OSTI)

Validity Threats in Empirical Software Engineering Research - An Initial Survey Robert Feldt, Ana important to consider threats to the validity of the study and the results. This is particularly important for empirical research where there is often a multitude of possible threats. With a growing focus on empirical

Feldt, Robert

324

Fast Threat Detection and Localization Using Super-Regenerative Transceiver in  

E-Print Network (OSTI)

Fast Threat Detection and Localization Using Super-Regenerative Transceiver in Random Noise Radar-Regenerative (SRG) transceiver as a type of ultra-fast electronics platform for threat detection and localization the Angle-of-Arrival (AOA) information of the inbound threats. Simulations and detailed laboratory

Zhang, Yan

325

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang  

E-Print Network (OSTI)

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang Rochester Institute on how to evaluate a threat assessment algorithm, especially for cyber security. Because of the variety and the constantly changing nature of hacker behavior and network vulnerabilities, a cyber threat assessment

Jay Yang, Shanchieh

326

THE GLOBALIzATION OF CHINESE SCIENCE: A THREAT OR AN  

E-Print Network (OSTI)

THE GLOBALIzATION OF CHINESE SCIENCE: A THREAT OR AN OPPORTuNITy? recently, I attended the 50th?" and "Is China a threat to the power of the United states?" We have known the host and his family for years). are they a welcome expansion or a threat to the quality of programs? In some years, conferencegoers have expressed

Zhu, Chen

327

Threat Modeling as a Basis for Security Requirements Suvda Myagmar Adam J. Lee William Yurcik  

E-Print Network (OSTI)

Threat Modeling as a Basis for Security Requirements Suvda Myagmar Adam J. Lee William Yurcik. Prior to claiming the security of a system, it is important to iden- tify the threats to the system in question. Enumerating the threats to a system helps system architects develop realis- tic and meaningful

328

High-Level Information Fusion and Mission Planning in Highly Anisotropic Threat Spaces  

E-Print Network (OSTI)

High-Level Information Fusion and Mission Planning in Highly Anisotropic Threat Spaces Mark sharing and high-level information fusion to allow for the visualisation of highly anisotropic threat options. Keywords: Information Fusion, Threat Map, Tactical Planning. 1 Introduction We present a first

Witkowski, Mark

329

Behavioral/Systems/Cognitive Neural Correlates of the Automatic Processing of Threat  

E-Print Network (OSTI)

Behavioral/Systems/Cognitive Neural Correlates of the Automatic Processing of Threat Facial Signals threat. Attention was focused on either scenes or faces presented in a single overlapping display. Facial. These results suggest that automaticity is not funda- mental to the processing of all facial signals of threat

Toronto, University of

330

Workplace Violence Prevention Policy Threats at imminent violence, violent incidents, or dangerous or emergency  

E-Print Network (OSTI)

Workplace Violence Prevention Policy Threats at imminent violence, violent incidents, or dangerous and staff, employees, students and visitors. Violent behavior, threats of violence, or physical intimidation of threatening or violent conduct in the workplace, or who observes such behavior or believes a credible threat

Goldberg, Bennett

331

The Effects of Age and Experience on Drivers Ability to Identify Threats  

E-Print Network (OSTI)

The Effects of Age and Experience on Drivers Ability to Identify Threats Ethan Fisher Professor The purpose of this study was to determine how long it takes for a driver to identify if a threat exists and where the threat is located in a static image. It is known that both older experienced and younger

Mountziaris, T. J.

332

Threats, design limits and design windows for laser IFE dry wall chambers  

E-Print Network (OSTI)

Threats, design limits and design windows for laser IFE dry wall chambers A. Rene´ Raffray-drive targets and a dry wall chamber. The dry wall must accommodate the ion and photon threat spectra from. The neutron energy is deposited deeper in the first wall and blanket and does not represent a major threat

Raffray, A. René

333

Preempting Uncertain Regulatory Threats Thomas P. Lyon and John W. Maxwelly  

E-Print Network (OSTI)

Preempting Uncertain Regulatory Threats Thomas P. Lyon and John W. Maxwelly September 15, 2004 assume certainty regarding the likelihood of the regulatory threat. We examine industry voluntary self and credible regulatory threat is needed to induce industry to take voluntary self-regulatory actions. 1

Lyon, Thomas P.

334

Stopping the Insider Threat: the case for implementing integrated autonomic defense mechanisms in computing systems  

E-Print Network (OSTI)

Stopping the Insider Threat: the case for implementing integrated autonomic defense mechanisms that are inseparable from the systems that are being defended. 1. Introduction Threats to the security of an information system may be initiated from either outside or from within an organization. Detecting such threats

Menascé, Daniel A.

335

Security threats on EPC based RFID systems J. G. Alfaro ,, M. Barbeau, and E. Kranakis  

E-Print Network (OSTI)

Security threats on EPC based RFID systems J. G. Alfaro ,, M. Barbeau, and E. Kranakis Abstract: We present an evaluation of threats on the Radio Frequency IDentification (RFID) system of the Electronic components due to the use of an insecure wireless channel. We analyze the threats according

Garcia-Alfaro, Joaquin

336

Threats to Security in DSRC/WAVE Christine Laurendeau and Michel Barbeau  

E-Print Network (OSTI)

Threats to Security in DSRC/WAVE Christine Laurendeau and Michel Barbeau School of Computer Science be reliable, accurate and confidential. To this end, we propose to identify the security threats inherent in the emerging DSRC Wireless Access in Vehicular Environments (WAVE) architecture. We rank the identified threats

Barbeau, Michel

337

Hydrothermal Synthesis and Characterization of a Metal–Organic Framework by Thermogravimetric Analysis, Powder X-ray Diffraction, and Infrared Spectroscopy: An Integrative Inorganic Chemistry Experiment  

Science Journals Connector (OSTI)

Upper-Division Undergraduate; Inorganic Chemistry; Laboratory Instruction; Gravimetric Analysis; Hydrogen Bonding; IR Spectroscopy; Materials Science; Thermal Analysis ...

Johanna L. Crane; Kelly E. Anderson; Samantha G. Conway

2014-10-10T23:59:59.000Z

338

Development, analysis, and evaluation of a commercial software framework for the study of Extremely Low Probability of Rupture (xLPR) events at nuclear power plants.  

SciTech Connect

Sandia National Laboratories (SNL) participated in a Pilot Study to examine the process and requirements to create a software system to assess the extremely low probability of pipe rupture (xLPR) in nuclear power plants. This project was tasked to develop a prototype xLPR model leveraging existing fracture mechanics models and codes coupled with a commercial software framework to determine the framework, model, and architecture requirements appropriate for building a modular-based code. The xLPR pilot study was conducted to demonstrate the feasibility of the proposed developmental process and framework for a probabilistic code to address degradation mechanisms in piping system safety assessments. The pilot study includes a demonstration problem to assess the probability of rupture of DM pressurizer surge nozzle welds degraded by primary water stress-corrosion cracking (PWSCC). The pilot study was designed to define and develop the framework and model; then construct a prototype software system based on the proposed model. The second phase of the project will be a longer term program and code development effort focusing on the generic, primary piping integrity issues (xLPR code). The results and recommendations presented in this report will be used to help the U.S. Nuclear Regulatory Commission (NRC) define the requirements for the longer term program.

Kalinich, Donald A.; Helton, Jon Craig; Sallaberry, Cedric M.; Mattie, Patrick D.

2010-12-01T23:59:59.000Z

339

The cyber threat landscape: Challenges and future research directions  

Science Journals Connector (OSTI)

Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain personal and confidential information, as highlighted in this paper. We describe how the Routine Activity Theory can be applied to mitigate these risks by reducing the opportunities for cyber crime to occur, making cyber crime more difficult to commit and by increasing the risks of detection and punishment associated with committing cyber crime. Potential research questions are also identified.

Kim-Kwang Raymond Choo

2011-01-01T23:59:59.000Z

340

Multiferroic Metal Organic Frameworks  

NLE Websites -- All DOE Office Websites (Extended Search)

with the oxygen of the framework. Upon cooling the compounds go under a phase transition, due to the ordering of nitrogen, leading to ferroelectric ordering. They also order...

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Nuclear Safety Regulatory Framework  

Energy Savers (EERE)

Department of Energy Nuclear Safety Regulatory Framework DOE's Nuclear Safety Enabling Legislation Regulatory Enforcement & Oversight Regulatory Governance Atomic Energy Act 1946...

342

Human-Centered Fusion Framework  

SciTech Connect

In recent years the benefits of fusing signatures extracted from large amounts of distributed and/or heterogeneous data sources have been largely documented in various problems ranging from biological protein function prediction to cyberspace monitoring. In spite of significant progress in information fusion research, there is still no formal theoretical framework for defining various types of information fusion systems, defining and analyzing relations among such types, and designing information fusion systems using a formal method approach. Consequently, fusion systems are often poorly understood, are less than optimal, and/or do not suit user needs. To start addressing these issues, we outline a formal humancentered fusion framework for reasoning about fusion strategies. Our approach relies on a new taxonomy for fusion strategies, an alternative definition of information fusion in terms of parameterized paths in signature related spaces, an algorithmic formalization of fusion strategies and a library of numeric and dynamic visual tools measuring the impact as well as the impact behavior of fusion strategies. Using a real case of intelligence analysis we demonstrate that the proposed framework enables end users to rapidly 1) develop and implement alternative fusion strategies, 2) understand the impact of each strategy, 3) compare the various strategies, and 4) perform the above steps without having to know the mathematical foundations of the framework. We also demonstrate that the human impact on a fusion system is critical in the sense that small changes in strategies do not necessarily correspond to small changes in results.

Posse, Christian; White, Amanda M.; Beagley, Nathaniel

2007-05-16T23:59:59.000Z

343

Environmental threats to children's health – a global problem  

Science Journals Connector (OSTI)

Today's children are exposed to a wide range of environmental threats, whose consequences on health and development may appear early in life, throughout their youth and even later, in adulthood. Health problems linked to environmental hazards are multiplying and becoming more visible due to a rapidly changing environment, rapid population growth, overcrowding, fast industrialisation and uncontrolled pollution from many anthropogenic and also natural sources, and as a result of the effects of climate change. A World Health Organization report on the global burden of disease estimated that nearly a quarter of the global disease burden is related to environmental causes. These environmental-mediated diseases cause more than three million deaths in children under five every year. Such a large burden is unacceptable. Both industrialised and developing countries should reinforce their capacities to assess the environmental burden of paediatric diseases and characterise their impact on children's health. This will enable all responsible sectors to distinguish the main environmental threats affecting children's health and identify their specific roles in improving children's environments. Implementing these activities and turning efforts into prevention, education, policy-making and other actions will reduce the burden of disease affecting children globally, therefore contributing towards achieving the Millennium Development Goals (MDGs).

Maria Neira; Fiona Gore; Marie-Noel Brune; Tom Hudson; Jenny Pronczuk de Garbino

2008-01-01T23:59:59.000Z

344

A Risk Management Approach to the "Insider Threat"  

SciTech Connect

Abstract Recent surveys indicate that the financial impact and operating losses due to insider intrusions are increasing. But these studies often disagree on what constitutes an insider; indeed, many define it only implicitly. In theory, appropriate selection of, and enforcement of, properly specified security policies should prevent legitimate users from abusing their access to computer systems, information, and other resources. However, even if policies could be expressed precisely, the natural mapping between the natural language expression of a security policy, and the expression of that policy in a form that can be implemented on a computer system or network, creates gaps in enforcement. This paper defines insider precisely, in terms of these gaps, and explores an access-based model for analyzing threats that include those usually termed insider threats. This model enables an organization to order its resources based on the business value for that resource and of the information it contains. By identifying those users with access to high-value resources, we obtain an ordered list of users who can cause the greatest amount of damage. Concurrently with this, we examine psychological indicators in order to determine which users are at the greatest risk of acting inappropriately.We conclude by examining how to merge this model with one of forensic logging and auditing.

Bishop, Matt; Engle, Sophie J.; Frincke, Deborah A.; Gates, Carrie; Greitzer, Frank L.; Peisert, Sean; Whalen, Sean

2010-09-01T23:59:59.000Z

345

Geospatiotemporal Data Mining in an Early Warning System for Forest Threats in the United States  

SciTech Connect

We investigate the potential of geospatiotemporal data mining of multi-year land surface phenology data (250~m Normalized Difference Vegetation Index (NDVI) values derived from the Moderate Resolution Imaging Spectroradiometer (MODIS) in this study) for the conterminous United States as part of an early warning system to identify threats to forest ecosystems. Cluster analysis of this massive data set, using high-performance computing, provides a basis for several possible approaches to defining the bounds of ``normal'' phenological patterns, indicating healthy vegetation in a given geographic location. We demonstrate the applicability of such an approach, using it to identify areas in Colorado, USA, where an ongoing mountain pine beetle outbreak has caused significant tree mortality.

Hoffman, Forrest M [ORNL; Mills, Richard T [ORNL; Kumar, Jitendra [ORNL; Vulli, Srinivasa S [ORNL; HargroveJr., William Walter [United States Department of Agriculture (USDA), United States Forest Service (USFS)

2010-01-01T23:59:59.000Z

346

Chapter 1 - Social engineering: The ultimate low tech hacking threat  

Science Journals Connector (OSTI)

Publisher Summary This chapter presents various social engineering topics, from understanding the minds of hackers and victims to methods for protecting personal, household and business information from theft and destruction. Social engineering has become the low tech hacker's most valuable and effective tool. The bad guys have continued to use the art of the con to gain access to intellectual property and if necessary the buildings that house that property. In this chapter, several examples illustrate how social engineering attacks happen in homes and businesses, and possible measures to prevent them. Today, every area of concern with security involves managing the risks associated with staying safe and secure. Most of the social engineering tools come from yard sales, thrift stores, flea markets, pawn shops, and Internet. This ranges from hats, jackets with corporate logos, tool belts, tools, listening devices, briefcases, spyware, and locks that can be used quite effectively for social engineering. The overall sneakiness of the threats associated with social engineering make it very easy for social engineers to catch anyone off guard. Several useful risk management countermeasures against social engineering are also described in the chapter. Social engineering is not a new phenomenon. Yet, it is still one of the most effective outsider-insider threats to any security plan. Despite valiant attempts by corporations to manage risk by not becoming victims of social engineering attacks, it is often far too easy for hackers to use the art of the con to gain access to intellectual property and to the buildings housing that property. This chapter explores the phenomenon of social engineering and explains why it is the ultimate low tech hacking threat. The chapter begins by explaining what social engineering is and how easy it is to pull off. Next, it digs into the minds of a social engineering attacker and a victim of an attack, and covers some of the more popular tools of the trade. The chapter also includes interviews with specialists in technical security issues, and closes with a few countermeasures associated with social engineering.

Jack Wiles; Terry Gudaitis; Jennifer Jabbusch; Russ Rogers; Sean Lowther

2012-01-01T23:59:59.000Z

347

Preparation and Analysis of Cyclodextrin-Based Metal–Organic Frameworks: Laboratory Experiments Adaptable for High School through Advanced Undergraduate Students  

Science Journals Connector (OSTI)

First-Year Undergraduate/General; Second-Year Undergraduate; Upper-Division Undergraduate; Laboratory Instruction; Inorganic Chemistry; High School/Introductory Chemistry; Hands-On Learning/Manipulatives; Materials Science; Crystals/Crystallography; Green Chemistry ... The authors gratefully acknowledge financial support from Wesleyan University and the National Science Foundation CAREER program (award CHE-1352239). ... (a) Furukawa, H.; Cordova, K. E.; O’Keeffe, M.; Yaghi, O. M.The Chemistry and Applications of Metal-Organic Frameworks Science 2013, 341 ( 6149) 974– 986 ...

Merry K. Smith; Samantha R. Angle; Brian H. Northrop

2014-11-06T23:59:59.000Z

348

2014 Annual Planning Summary for the NNSA Global Threat Reduction Initiative Office  

Energy.gov (U.S. Department of Energy (DOE))

The ongoing and projected Environmental Assessments and Environmental Impact Statements for 2014 and 2015 within the NNSA Global Threat Reduction Initiative Office.

349

Game Theoretic Evaluation of Threat Detection Problems-The Central Role of the Adversary  

SciTech Connect

A wide variety of security problems hinge on the detection of threats and discrimination of threats from innocuous objects. The theory that frames these problems is common among medical diagnostics, radar and sonar imaging, and detection of radiological, chemical, and biological agents. In many of these problems, the nature of the threat is subject to control by a malicious adversary, and the choice of a reference (or "design basis") threat is a very diffcult, and often intractable, aspect of the problem. It is this class of problems that this report considers.

Heasler, Patrick G.; Wood, Thomas W.; Reichmuth, Barbara A.

2007-01-01T23:59:59.000Z

350

How ORISE is Making a Difference: Preparing for the Threat of...  

NLE Websites -- All DOE Office Websites (Extended Search)

Amber Waves ORISE coordinates tabletop exercise to help agencies prepare for the threat of dirty bombs Radiological dispersion devices (RDDs), also known as dirty bombs, are...

351

Chapter Five - Hazards and Threats to a Pipeline System  

Science Journals Connector (OSTI)

Abstract It is important to understand what the threats are that raise the risk probability in a pipeline system and how to assess them. External corrosion on a pipeline could be from microbiological (MIC), galvanic action or electrochemical reaction, where the steel pipe becomes an anode in an electrochemical cell. External corrosion direct assessment (ECDA) is a structured process that is intended to improve safety by assessing and reducing the impact of external corrosion on a pipeline. Other tools for assessing external corrosion are direct current voltage gradient (DCVG), CIP, ILI using intelligent pigging, and pressure testing. Use of guided wave ultrasonic testing (GWUT) as an alternative tool for ECDA has been promoted and sometimes used.

Ramesh Singh

2014-01-01T23:59:59.000Z

352

High tech criminal threats to the national information infrastructure  

Science Journals Connector (OSTI)

National information infrastructure (NII), vital to the nation's security and economic stability, comprises both physical and electronic infrastructures. Information and communications technologies (ICT) form the backbone of many aspects of the NII and reliance on ICT has created many new risks. Cyberthreats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. This paper examines the technology-related risks associated with the NII and provides examples of existing incidents and areas in which new threats might emerge. To be able to mitigate these risks, it remains crucial to understand infrastructure interdependencies and to establish public-private partnerships to ensure that weaknesses in systems are not able to be exploited.

Kim-Kwang Raymond Choo

2010-01-01T23:59:59.000Z

353

The Partnership Evaluation Framework  

Energy.gov (U.S. Department of Energy (DOE))

U.S. Department of Energy Better Buildings Neighborhood Program: The Partnership Evaluation Framework: How to evaluate a potential partner’s business model and identify areas for collaboration.

354

Demand Response Valuation Frameworks Paper  

E-Print Network (OSTI)

Framework, Dr. Daniel M. Violette, Summit Blue Consulting,Response Resources by Daniel M. Violette, Rachel Freeman andFramework, Dr. Daniel M. Violette, Summit Blue Consulting,

Heffner, Grayson

2010-01-01T23:59:59.000Z

355

Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid  

E-Print Network (OSTI)

Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid Zhuo Lu Park, NC 27709 Email: cliff.wang@us.army.mil Abstract--The smart grid, generally referred in the smart grid. In this paper, we aim at classifying and evaluating the security threats

Wang, Wenye

356

Climate change is one of the greatest threats facing us today. CICERO's mission  

E-Print Network (OSTI)

Climate change is one of the greatest threats facing us today. CICERO's mission is to provide reliable and comprehensive knowledge about all aspects of the climate change problem. Foto: Scanpix #12;Climate change is one of the greatest threats facing us today. CICERO's mission is to provide reliable

Johansen, Tom Henning

357

NOM's National Marine Fisheries Service (NMFS) is working to reduce these threats to  

E-Print Network (OSTI)

NOM's National Marine Fisheries Service (NMFS) is working to reduce these threats to help conserve threats to marine turtles, NMFS and the U.S. Fish and Wildlife Service have developed recovery plans you see turtles and/or jellyfish at the surface, slow down and ma¡nta¡n a ded¡cated lookout. 0 Wear

358

Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization, 1st edition  

Science Journals Connector (OSTI)

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue ...

Eric Cole

2012-12-01T23:59:59.000Z

359

A threat taxonomy for mHealth privacy Institute for Security, Technology, and Society  

E-Print Network (OSTI)

A threat taxonomy for mHealth privacy David Kotz Institute for Security, Technology, and Society and to manage medical conditions. In this paper, we examine the privacy-related threats to these so-called mHealth that could support privacy-sensitive mHealth systems. We conclude with a brief summary of research challenges

360

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems  

E-Print Network (OSTI)

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan and Wei Zhao Abstract--In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack, which can accurately and invisibly localize monitors of Internet threat monitoring

Xuan, Dong

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Conceptual Framework Presentation, 2006, Slide 1 The Conceptual Framework for  

E-Print Network (OSTI)

Conceptual Framework Presentation, 2006, Slide 1 The Conceptual Framework for Programs that Prepare Professionals Who Work in Schools What - Why - and Why You? #12;Conceptual Framework Presentation, 2006, Slide 2 on and develop your philosophy as a professional. . . WHY YOU? #12;Conceptual Framework Presentation, 2006, Slide

de Lijser, Peter

362

DAKOTA : a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis. Version 5.0, user's reference manual.  

SciTech Connect

The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a reference manual for the commands specification for the DAKOTA software, providing input overviews, option descriptions, and example specifications.

Eldred, Michael Scott; Dalbey, Keith R.; Bohnhoff, William J.; Adams, Brian M.; Swiler, Laura Painton; Hough, Patricia Diane (Sandia National Laboratories, Livermore, CA); Gay, David M.; Eddy, John P.; Haskell, Karen H.

2010-05-01T23:59:59.000Z

363

DAKOTA, a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis:version 4.0 reference manual  

SciTech Connect

The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a reference manual for the commands specification for the DAKOTA software, providing input overviews, option descriptions, and example specifications.

Griffin, Joshua D. (Sandai National Labs, Livermore, CA); Eldred, Michael Scott; Martinez-Canales, Monica L. (Sandai National Labs, Livermore, CA); Watson, Jean-Paul; Kolda, Tamara Gibson (Sandai National Labs, Livermore, CA); Adams, Brian M.; Swiler, Laura Painton; Williams, Pamela J. (Sandai National Labs, Livermore, CA); Hough, Patricia Diane (Sandai National Labs, Livermore, CA); Gay, David M.; Dunlavy, Daniel M.; Eddy, John P.; Hart, William Eugene; Guinta, Anthony A.; Brown, Shannon L.

2006-10-01T23:59:59.000Z

364

Environmental Literacy and Sustainability Values: A Content Analysis of National EE Frameworks and State Standards through the Lens of the Earth Charter  

E-Print Network (OSTI)

to be addressed through environmental education. This mixed-methods content analysis examines and compares five state environmental education standards, national environmental education guidelines and the Earth Charter for inclusion of sustainability values...

Singleton, Julie

2012-02-14T23:59:59.000Z

365

Framework for Physics Computation  

SciTech Connect

The Georgia Tech team has been working in collaboration with ORNL and Rutgers on improved I/O for petascale fusion codes, specifically, to integrate staging methods into the ADIOS framework. As part of this on-going work, we have released the DataTap server as part of the ADIOS release, and we have been working on improving the ‘in situ’ processing capabilities of the ADIOS framework. In particular, we have been moving forward with a design that adds additional metadata to describe the data layout and structure of data that is being moved for I/O purposes, building on the FFS type system developed in our past research

Schwan, Karsten [Georgia Institute of Technology

2012-01-13T23:59:59.000Z

366

The Shanghai Six:The Shanghai Six: Milit Th t E i Alli ?Milit Th t E i Alli ?Military Threat or Economic Alliance?Military Threat or Economic Alliance?  

E-Print Network (OSTI)

or Economic Alliance?Military Threat or Economic Alliance? Anna BrownAnna Brown #12;Maps courtesy of Google

New Hampshire, University of

367

Global Framework for Climate Risk Exposure | Open Energy Information  

Open Energy Info (EERE)

Framework for Climate Risk Exposure Framework for Climate Risk Exposure Jump to: navigation, search Tool Summary Name: Global Framework for Climate Risk Exposure Agency/Company /Organization: United Nations Environment Programme Topics: Finance, Co-benefits assessment, Market analysis Resource Type: Publications, Guide/manual Website: www.unepfi.org/fileadmin/documents/global_framework.pdf Global Framework for Climate Risk Exposure Screenshot References: Global Framework for Climate Risk Exposure[1] Summary "A group of leading institutional investors from around the world released the Global Framework for Climate Risk Disclosure-a new statement on disclosure that investors expect from companies-in October 2006. Investors require this information in order to analyze a company's business risks and opportunities resulting from climate change, as well as

368

An Investment Framework for Clean Energy and Development | Open Energy  

Open Energy Info (EERE)

An Investment Framework for Clean Energy and Development An Investment Framework for Clean Energy and Development Jump to: navigation, search Tool Summary LAUNCH TOOL Name: An Investment Framework for Clean Energy and Development Agency/Company /Organization: World Bank, International Monetary Fund Sector: Energy Focus Area: Energy Efficiency, Renewable Energy, Solar Topics: Finance, Pathways analysis Resource Type: Guide/manual Website: siteresources.worldbank.org/DEVCOMMINT/Documentation/21046509/DC2006-0 An Investment Framework for Clean Energy and Development Screenshot References: An Investment Framework for Clean Energy and Development[1] Overview "This paper reports on progress in developing an Investment Framework for Clean Energy and Development. The Investment Framework is intended to be a vehicle to accelerate investments to address developing country energy

369

Global Threat Reduction Initiative Fuel-Thermo-Physical Characterization Project Quality Assurance Plan  

SciTech Connect

The charter of the Fuel Thermo-Physical Characterization Project is to ready Pacific Northwest National Laboratory (PNNL) facilities and processes for the receipt of unirradiated and irradiated low enriched uranium (LEU) molybdenum (U-Mo) fuel element samples, and to perform analysis to support the Global Threat Reduction Initiative conversion program. PNNL’s support for the program will include the establishment of post-irradiation examination processes, including thermo-physical properties, unique to the U.S. Department of Energy laboratories. These processes will ultimately support the submission of the base fuel qualification (BFQ) to the U.S. Nuclear Regulatory Commission (NRC) and revisions to High Performance Research Reactor Safety Analysis Reports to enable conversion from highly enriched uranium to LEU fuel. This quality assurance plan (QAP) provides the quality assurance requirements and processes that support the NRC BFQ. This QAP is designed to be used by project staff, and prescribes the required management control elements that are to be met and how they are implemented. Additional controls are captured in Fuel Thermo-Physical Characterization Project plans, existing procedures, and procedures to be developed that provide supplemental information on how work is conducted on the project.

Pereira, Mario M.; Slonecker, Bruce D.

2012-06-01T23:59:59.000Z

370

Human-UAV Coordinated Flight Path Planning of UAV Low-Altitude Penetration on Pop-Up Threats  

Science Journals Connector (OSTI)

Human-UAV coordinated flight path planning of UAV low-altitude penetration on pop-up threats is a key technology achieving manned and ... of the flight path planning on pop-up threats. A lot of simulation studies...

Peng Ren; Xiao-guang Gao; Jun Chen

2014-01-01T23:59:59.000Z

371

Annex A -Potential threats in EU Organism(s) Means of spread Control measures Control approaches being used in  

E-Print Network (OSTI)

Annex A - Potential threats in EU Organism(s) Means of spread Control measures Control approaches options Potential threats in EU keep out, knowledge of trade routes, awareness on nurseries, foresters

372

DAKOTA, a multilevel parellel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis:version 4.0 uers's manual.  

SciTech Connect

The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a user's manual for the DAKOTA software and provides capability overviews and procedures for software execution, as well as a variety of example studies.

Griffin, Joshua D. (Sandai National Labs, Livermore, CA); Eldred, Michael Scott; Martinez-Canales, Monica L. (Sandai National Labs, Livermore, CA); Watson, Jean-Paul; Kolda, Tamara Gibson (Sandai National Labs, Livermore, CA); Giunta, Anthony Andrew; Adams, Brian M.; Swiler, Laura Painton; Williams, Pamela J. (Sandai National Labs, Livermore, CA); Hough, Patricia Diane (Sandai National Labs, Livermore, CA); Gay, David M.; Dunlavy, Daniel M.; Eddy, John P.; Hart, William Eugene; Brown, Shannon L.

2006-10-01T23:59:59.000Z

373

Dakota, a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis:version 4.0 developers manual.  

SciTech Connect

The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a developers manual for the DAKOTA software and describes the DAKOTA class hierarchies and their interrelationships. It derives directly from annotation of the actual source code and provides detailed class documentation, including all member functions and attributes.

Griffin, Joshua D. (Sandia National lababoratory, Livermore, CA); Eldred, Michael Scott; Martinez-Canales, Monica L. (Sandia National lababoratory, Livermore, CA); Watson, Jean-Paul; Kolda, Tamara Gibson (Sandia National lababoratory, Livermore, CA); Giunta, Anthony Andrew; Adams, Brian M.; Swiler, Laura Painton; Williams, Pamela J. (Sandia National lababoratory, Livermore, CA); Hough, Patricia Diane (Sandia National lababoratory, Livermore, CA); Gay, David M.; Dunlavy, Daniel M.; Eddy, John P.; Hart, William Eugene; Brown, Shannon L.

2006-10-01T23:59:59.000Z

374

DAKOTA : a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis. Version 5.0, user's manual.  

SciTech Connect

The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a user's manual for the DAKOTA software and provides capability overviews and procedures for software execution, as well as a variety of example studies.

Eldred, Michael Scott; Dalbey, Keith R.; Bohnhoff, William J.; Adams, Brian M.; Swiler, Laura Painton; Hough, Patricia Diane (Sandia National Laboratories, Livermore, CA); Gay, David M.; Eddy, John P.; Haskell, Karen H.

2010-05-01T23:59:59.000Z

375

The Framework of Astronomy  

Science Journals Connector (OSTI)

... FOR his inaugural lecture as Perren professor of astronomy in the University of London, which he gave last year at University College, London ... , London, Prof. C. W. Allen chose as his subject "The Framework of Astronomy". At the beginning of this lecture, which has now been published*, Prof. ...

1953-09-12T23:59:59.000Z

376

Semantic resource framework  

Science Journals Connector (OSTI)

The Semantic Resource Framework (SRF) is a multi-level description of the data sources for search computing applications. It responds to the need of having a structured representation of search services, amenable to service exploration, selection, and ... Keywords: ontology, search services, semantic annotation, service description, service repository

Marco Brambilla; Alessandro Campi; Stefano Ceri; Silvia Quarteroni

2011-01-01T23:59:59.000Z

377

Open literature review of threats including sabotage and theft of fissile material transport in Japan.  

SciTech Connect

This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically and religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty.

Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

2005-06-01T23:59:59.000Z

378

INFECTIOUS DISEASE OUTBREAKS Avian Flu, measles, Mumps, SARs, and other infectious diseases can pose a threat to the  

E-Print Network (OSTI)

pose a threat to the University community as they do to communities worldwide. If there is an outbreak has extensive information on these and other health threats on their website (http are appropriate to the emerging threat and ready for implementation. Response team meets with increasing frequency

Meyers, Steven D.

379

Detecting Threat-Related Intentional Actions of Others: Effects of Image Quality, Response Mode, and Target Cuing on Vigilance  

E-Print Network (OSTI)

Detecting Threat-Related Intentional Actions of Others: Effects of Image Quality, Response Mode to detect infrequent threat-related actions. Participants indicated detection of target actions either vigilance task. Irrespective of response mode, the detection rate of intentional threats declined over time

Parasuraman, Raja

380

The CSUF Center for Entrepreneurship and CSUF Center for Family Business present: "Patent Trolls and Other IP-Related Threats  

E-Print Network (OSTI)

and Other IP-Related Threats: How to Protect Your Business from a New Kind of Predator" Mihaylo College trolls, with threats of lawsuits and litigation. At this seminar, panelists Roger N. Behle (IP litigator Other intellectual property threats Current and pending legislation designed to address patent trolling

de Lijser, Peter

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Stereotype Threat Excerpt from Malcolm Gladwell's "The Art of Failure" in the New Yorker, August 21 & 28,  

E-Print Network (OSTI)

Stereotype Threat Excerpt from Malcolm Gladwell's "The Art of Failure" in the New Yorker, August 21 they call "stereotype threat": when black students are put into a situation where they are directly-- the resulting pressure causes their performance to suffer." "Steele and others have found stereotype threat

McMains, Sara

382

Threat of Bodily Harm Has Opposing Effects on Cognition Kesong Hu, Andrew Bauer, Srikanth Padmala, and Luiz Pessoa  

E-Print Network (OSTI)

Emotion Threat of Bodily Harm Has Opposing Effects on Cognition Kesong Hu, Andrew Bauer, Srikanth., Bauer, A., Padmala, S., & Pessoa, L. (2011, June 27). Threat of Bodily Harm Has Opposing Effects on Cognition. Emotion. Advance online publication. doi: 10.1037/a0024345 #12;Threat of Bodily Harm Has Opposing

Pessoa, Luiz

383

Distributed Localization of Threats using Sensor PI: I. Schizas (schizas@uta.edu)/ 817 272-3467  

E-Print Network (OSTI)

Distributed Localization of Threats using Sensor Nets PI: I. Schizas (schizas@uta.edu)/ 817 272 AT ARLINGTON Technical barriers/problems: · Utilize sensor networks to locate threats · Develop distributed algorithms · Limited power resources in sensors · Threats unpredictable both spatially and temporally

Texas at Arlington, University of

384

Stereotype Threat Reinterpreted as a Regulatory Mismatch Lisa R. Grimm, Arthur B. Markman, W. Todd Maddox, and Grant C. Baldwin  

E-Print Network (OSTI)

Stereotype Threat Reinterpreted as a Regulatory Mismatch Lisa R. Grimm, Arthur B. Markman, W. Todd of strands of work to identify causes of stereotype threat in a way that allows them to reverse the effects. This work suggests that stereotype threat effects emerge from a prevention focus combined with tasks

Maddox, W. Todd

385

34.07.99.M0.02 Bomb Threat Procedures Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE  

E-Print Network (OSTI)

34.07.99.M0.02 Bomb Threat Procedures Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 34.07.99.M0 4, 2016 Standard Administrative Procedure Statement Any and all bomb threats are regarded seriously. 2. ADDITIONAL NOTIFICATION AND EVALUATION 2.1 Upon receipt of a bomb threat to a particular building

386

Climate Literacy Framework  

NLE Websites -- All DOE Office Websites (Extended Search)

Climate Literacy Framework Print E-mail Climate Literacy Framework Print E-mail A Guide for Individuals and Communities The Essential Principles of Climate Science presents important information for individuals and communities to understand Earth's climate, impacts of climate change, and approaches for adapting and mitigating change. Principles in the guide can serve as discussion starters or launching points for scientific inquiry. The guide can also serve educators who teach climate science as part of their science curricula. Development of the guide began at a workshop sponsored by the National Oceanic and Atmospheric Administration (NOAA) and the American Association for the Advancement of Science (AAAS). Multiple science agencies, non-governmental organizations, and numerous individuals also contributed through extensive review and comment periods. Discussion at the National Science Foundation (NSF) and NOAA-sponsored Atmospheric Sciences and Climate Literacy workshop contributed substantially to the refinement of the document.

387

Feedback Control RealTime Scheduling: Framework, Modeling, and Algorithms *  

E-Print Network (OSTI)

1 Feedback Control Real­Time Scheduling: Framework, Modeling, and Algorithms * Chenyang Lu John A}@virginia.edu Abstract This paper presents a feedback control real­time scheduling (FCS) framework for adaptive real. In particular, we establish a dynamic model and performance analysis of several feedback control scheduling

Son, Sang H.

388

Feedback Control Real-Time Scheduling: Framework, Modeling, and Algorithms*  

E-Print Network (OSTI)

1 Feedback Control Real-Time Scheduling: Framework, Modeling, and Algorithms* Chenyang Lu John A}@virginia.edu Abstract This paper presents a feedback control real-time scheduling (FCS) framework for adaptive real. In particular, we establish a dynamic model and performance analysis of several feedback control scheduling

Son, Sang H.

389

Complex Network Framework Based Dependency Matrix of Electric Power Grid  

E-Print Network (OSTI)

Complex Network Framework Based Dependency Matrix of Electric Power Grid A. B. M. Nasiruzzaman, H scale analysis of power grid using complex network framework a network matrix is formed. The elements. INTRODUCTION Power grid is one of the most complex man made in- frastructures of modern day. For example

Pota, Himanshu Roy

390

A decision process framework: selecting strategies for rehabilitation of rigid pavements subjected to high traffic volumes  

E-Print Network (OSTI)

framework for selecting strategies for MRR. The factors, steps, and information involved in the MRR decision process were identified. A decision analysis tool, IDEF0, was used to model the decision process framework. The IDEF0 model is hierarchical...

Valls, Marc Edouard Josep

2012-06-07T23:59:59.000Z

391

The Global Threat Reduction Initiative's Molybdenum-99 Program, OAS-L-12-07  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Global Threat Reduction Global Threat Reduction Initiative's Molybdenum-99 Program OAS-L-12-07 July 2012 Department of Energy Washington, DC 20585 July 20, 2012 MEMORANDUM FOR THE ASSISTANT DEPUTY ADMINISTRATOR FOR GLOBAL THREAT REDUCTION, NATIONAL NUCLEAR SECURITY ADMINISTRATION FROM: David Sedillo, Director Western Audits Division Office of Inspector General SUBJECT: INFORMATION: Audit Report on "The Global Threat Reduction Initiative's Molybdenum-99 Program" BACKGROUND Molybdenum-99 (Mo-99) is used in the production of technetium-99m (Tc-99m), the most commonly used medical radioisotope in the world. The United States accounts for approximately half of the global demand for Mo-99 at approximately 6,000 units per week. Because Mo-99's short half-life of 66 hours prevents it from being stockpiled, consistent

392

Detecting Nuclear Threats | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

Detecting Nuclear Threats Detecting Nuclear Threats Stories of Discovery & Innovation Detecting Nuclear Threats Enlarge Photo Photo: Denise Applewhite The MINDS device was invented by a team of engineers at the Princeton Plasma Physics Laboratory, including, from left: Kenny Silber, Henry Carnevale, Charles Gentile, Dana Mastrovito, and Bill Davis. Enlarge Photo 03.28.11 Detecting Nuclear Threats Plasma physics challenge yields portable nuclear detector for homeland security. In 1999, faced with the task of decommissioning the legendary Tokamak Fusion Test Reactor (TFTR), officials at the U.S. Department of Energy's Princeton Plasma Physics Laboratory (PPPL) realized they needed something that didn't yet exist-a non-destructive, real time device to detect certain "hot" elements lacing the inner vessel of the doughnut-

393

Integrating species traits with extrinsic threats: closing the gap between predicting and preventing species declines  

Science Journals Connector (OSTI)

...Centre for Plant Biodiversity...the Amphibian Disease Ecology Group...this pandemic disease [13]. Nevertheless...key threats (disease, invasive...to powerful prediction of species...the field of machine learning [29], for...

2011-01-01T23:59:59.000Z

394

Natural and Human Threats to Biodiversity in the Marine Ecosystem of Coastal Pakistan  

Science Journals Connector (OSTI)

There exist several natural and made-made threats to biodiversity along the coast of Pakistan. Natural stresses include high wave action, high temperatures and salinity, and seasonal spread of oxygen-poor wate...

Muzammil Ahmad

1997-01-01T23:59:59.000Z

395

Agriculture, Ecosystems and Environment 84 (2001) 120 Economic and environmental threats of alien plant,  

E-Print Network (OSTI)

Agriculture, Ecosystems and Environment 84 (2001) 1­20 Economic and environmental threats of alien. Precise economic costs associated with some of the most ecologically damaging alien species; Animals; Alien; Economic; Ecology; Environment; Agriculture; Non-indigenous 1. Introduction Quantifying

California at Berkeley, University of

396

Threats to observers, keepers, visitors, and others by zoo mangabeys (Cercocebus galeritus chrysogaster)  

Science Journals Connector (OSTI)

The facial threats of ten captive golden-bellied mangabeys (Cercocebus galeritus chrysogaster...) were categorized by object threatened. Adult males threatened more than did females except when the object was a n...

G. Mitchell; Stephanie D. Obradovich; Fred H. Herring; Brad Dowd…

1991-10-01T23:59:59.000Z

397

Environmental Scanning and Knowledge Representation for the Detection of Organised Crime Threats  

Science Journals Connector (OSTI)

...ePOOLICE aims at developing an efficient and effective strategic early warning system that utilises environmental scanning for the early warning and detection of current, emergent and future organised crime threats

Ben Brewster; Simon Andrews; Simon Polovina…

2014-01-01T23:59:59.000Z

398

Effects of Threats to Self-Esteem and Goal Orientation on Asking for Help.  

E-Print Network (OSTI)

??This paper studied whether threats to self-esteem and goal orientation affected an individual?s propensity to ask for help. Eighty-two undergraduate students from the University of… (more)

Chung, Andrew

2006-01-01T23:59:59.000Z

399

Postural threat during walking: effects on energy cost and accompanying gait changes  

Science Journals Connector (OSTI)

Balance control during walking has been shown to involve a metabolic cost in healthy subjects, but it is unclear how this cost changes as a function of postural threat. ... determine the influence of postural thr...

Trienke IJmker; Claudine J Lamoth…

2014-04-01T23:59:59.000Z

400

Modeling and analysis framework for core damage propagation during flow-blockage-initiated accidents in the Advanced Neutron Source reactor at Oak Ridge National Laboratory  

SciTech Connect

This paper describes modeling and analysis to evaluate the extent of core damage during flow blockage events in the Advanced Neutron Source (ANS) reactor planned to be built at ORNL. Damage propagation is postulated to occur from thermal conduction between dmaged and undamaged plates due to direct thermal contact. Such direct thermal contact may occur beause of fuel plate swelling during fission product vapor release or plate buckling. Complex phenomena of damage propagation were modeled using a one-dimensional heat transfer model. A parametric study was done for several uncertain variables. The study included investigating effects of plate contact area, convective heat transfer coefficient, thermal conductivity on fuel swelling, and initial temperature of the plate being contacted by the damaged plate. Also, the side support plates were modeled to account for their effects of damage propagation. Results provide useful insights into how variouss uncertain parameters affect damage propagation.

Kim, S.H.; Taleyarkhan, R.P.; Navarro-Valenti, S.; Georgevich, V.

1995-12-31T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Preparation of functionalized zeolitic frameworks  

DOE Patents (OSTI)

The disclosure provides zeolitic frameworks for gas separation, gas storage, catalysis and sensors. More particularly the disclosure provides zeolitic frameworks (ZIFs). The ZIF of the disclosure comprises any number of transition metals or a homogenous transition metal composition.

Yaghi, Omar M.; Hayashi, Hideki; Banerjee, Rahul; Park, Kyo Sung; Wang, Bo; Cote, Adrien P.

2014-08-19T23:59:59.000Z

402

A Conceptual Framework for Progressing Towards Sustainability in the  

Open Energy Info (EERE)

A Conceptual Framework for Progressing Towards Sustainability in the A Conceptual Framework for Progressing Towards Sustainability in the Agriculture and Food Sector Jump to: navigation, search Tool Summary LAUNCH TOOL Name: A Conceptual Framework for Progressing Towards Sustainability in the Agriculture and Food Sector Agency/Company /Organization: Food and Agriculture Organization of the United Nations Sector: Land Focus Area: Agriculture Topics: Policies/deployment programs, Pathways analysis Resource Type: Publications Website: www.fao.org/docrep/012/al322e/al322e00.pdf A Conceptual Framework for Progressing Towards Sustainability in the Agriculture and Food Sector Screenshot References: A Conceptual Framework for Progressing Towards Sustainability in the Agriculture and Food Sector[1] Logo: A Conceptual Framework for Progressing Towards Sustainability in the Agriculture and Food Sector

403

Modeling and analysis framework for core damage propagation during flow-blockage-initiated accidents in the Advanced Neutron Source Reactor at Oak Ridge National Laboratory  

SciTech Connect

This paper describes modeling and analysis to evaluate the extent of core damage during flow blockage events in the Advanced Neutron Source (ANS) reactor planned to be built at the Oak Ridge National Laboratory (ORNL). Damage propagation is postulated to occur from thermal conduction between damaged and undamaged plates due to direct thermal contact. Such direct thermal contact may occur because of fuel plate swelling during fission product vapor release or plate buckling. Complex phenomena of damage propagation were modeled using a one-dimensional heat transfer model. A scoping study was conducted to learn what parameters are important for core damage propagation, and to obtain initial estimates of core melt mass for addressing recriticality and steam explosion events. The study included investigating the effects of the plate contact area, the convective heat transfer coefficient, thermal conductivity upon fuel swelling, and the initial temperature of the plate being contacted by the damaged plate. Also, the side support plates were modeled to account for their effects on damage propagation. The results provide useful insights into how various uncertain parameters affect damage propagation.

Kim, S.H.; Taleyarkhan, R.P.; Navarro-Valenti, S.; Georgevich, V.

1995-09-01T23:59:59.000Z

404

Rwanda-Developing a Strategic Climate Change Framework | Open Energy  

Open Energy Info (EERE)

Rwanda-Developing a Strategic Climate Change Framework Rwanda-Developing a Strategic Climate Change Framework (Redirected from CDKN-Rwanda-Developing a Strategic Climate Change Framework) Jump to: navigation, search Name CDKN-Rwanda-Developing a Strategic Climate Change Framework and Design of a Climate Change and Environmental Fund Agency/Company /Organization Climate and Development Knowledge Network (CDKN), United Kingdom Department for International Development Partner REMA, Government of Rwanda Sector Climate, Energy, Land Topics Background analysis, Low emission development planning, Pathways analysis Website http://cdkn.org/project/a-stra Program Start 2010 Program End 2012 Country Rwanda UN Region Middle Africa References CDKN-Rwanda-Developing a Strategic Climate Change Framework[1] Rwanda's ambitious Green Growth and Climate Resilience Strategy was

405

Examining Threats to the Economic Aspects of Globalization  

Science Journals Connector (OSTI)

Based on scholarship in economics and related fields and analysis of current events, this paper examined international economic institutions, shifting US priorities and natural-resources diplomacy as key elements...

James M. Quirk

2008-02-01T23:59:59.000Z

406

A methodological framework for assessing the employment effects associated with energy efficiency interventions in buildings  

Science Journals Connector (OSTI)

Abstract The global trend toward a low carbon, sustainable economy is widely acknowledged to create a large number of jobs across many sectors of the economy. The deployment of renewable and energy efficiency projects represent a large share of the so called green jobs and help retain current levels of employment especially in countries facing the socio-economic threat of increasing unemployment rates. These effects should be taken into account during the process of energy planning, but due to difficulties in their quantification this is not always feasible. This paper utilizes the input–output analysis and the adjusted earnings gain approach for assessing the employment effects associated with the implementation of energy saving interventions in the building sector, with a view to produce results that can be easily incorporated into cost–benefit analyses. The proposed framework, which comprises four basic steps, namely identification of all the potential changes in employment due to energy efficiency interventions, quantification of these employment effects in physical terms, calculation of the net present value of the estimated employment effects and monetization, has been implemented for three energy efficiency interventions widely implemented in Greek buildings. The results of the analysis clearly show that the exploitation of energy saving technologies in the Greek building stock generates significant employment benefits, ranging between €0.11 and 0.23 million per €1 million of investment in the base case scenario and reaching the 10–24% of the energy costs savings attributed to the implementation of these interventions throughout their entire lifetime.

S. Mirasgedis; C. Tourkolias; E. Pavlakis; D. Diakoulaki

2014-01-01T23:59:59.000Z

407

Botnets: To what extent are they a threat to information security?  

Science Journals Connector (OSTI)

Russian advertisement offering botnet services The purpose of this article is to examine to what extent botnets pose a threat to information security. In Chapter 1 the terms in the title are defined, and a comprehensive overview of botnets is provided in order to equip the reader with an understanding of the context for the remaining chapters. The motives for using botnets and the methods in which they are used are outlined. The methods of botnet attack are then analysed in terms of their potential impact on information security and a conclusion is drawn that botnets are indeed a threat to information security in general terms. Chapter 2 then goes on to examine the extent of the threat from the three different perspectives of governments, corporate and the general public. The threats from each perspective and their impacts are identified, and each threat type for each perspective is then categorised in terms of probability and potential impact. The extent of the threat of each botnet-related attack from each perspective is then assessed using a model recommended by ISO/IEC 27005:2008, and the conclusion is drawn that the extent of the threat that botnets pose to governments, corporates and the general public is High. In Chapter 3, we look at how law enforcement agencies investigate botnets and the criminals behind them, and establish the challenges they face in doing so. It is clear that law enforcement face an uphill struggle due to technical tricks employed by the botherders to remain untraceable, lack of resources with the necessary skillset, the legal complexity of working with multiple jurisdictions, and procedural delays working with foreign law enforcement agencies. The conclusion is drawn that botnets are here to stay and that for the time being the botherders will have the upper hand.

Claire Elliott

2010-01-01T23:59:59.000Z

408

Situation Threat Assessment Policy and Protocol (Updated 9/1/11) Rowan University is committed to promoting a safe and secure learning environment. It is  

E-Print Network (OSTI)

Situation Threat Assessment Policy and Protocol (Updated 9/1/11) Rowan University is committed resources within the Division of Student Life in responding to alleged threats or acts of violence by students. Definitions Threat: A threat is defined as any behavior that suggests intent to harm self

Rusu, Adrian

409

Energy Sector Cybersecurity Framework Implementation Guidance  

Energy Savers (EERE)

DRAFT FOR PUBLIC COMMENT SEPTEMBER, 2014 ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE Energy Sector Cybersecurity Framework Implementation Guidance Table of...

410

Preparation of metal-triazolate frameworks  

DOE Patents (OSTI)

The disclosure provides for novel metal-triazolate frameworks, methods of use thereof, and devices comprising the frameworks thereof.

Yaghi, Omar M; Uribe-Romo, Fernando J; Gandara-Barragan, Felipe; Britt, David K

2014-10-07T23:59:59.000Z

411

National and international policies to mitigate disease threats  

Science Journals Connector (OSTI)

...the perception of risk, the strength of...public interest, political opportunity, institutional...and politics, the risk analysis had to be...figure 2). The political outcome was a discrete...the perception of risk, the strength of...public interest, political opportunity, institutional...

2012-01-01T23:59:59.000Z

412

GTT Framework | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

GTT Framework GTT Framework GTT Framework GTT Framework Strategic Framework The GTT proposes a strategic framework that organizes these activities into three interrelated dimensions (informational, analytical, and physical), representative of the systems nature of the grid. Each of these dimensions have a corresponding strategic focus: The informational dimension aims to improve the visibility of grid conditions. The analytical dimension increases our understanding of the implications of the observed conditions. The physical dimension enhances the flexibility of the grid to respond to that understanding. The logic behind these focus areas is that a modernized grid should be able to "see" an event or condition, "know" what is happening or about to happen, and "do" something appropriate in response - quickly and

413

PCC Framework for Program-Generators Soonho Kong Wontae Choi Kwangkeun Yi  

E-Print Network (OSTI)

PCC Framework for Program-Generators Soonho Kong Wontae Choi Kwangkeun Yi Seoul National framework for program-generators. The en- abling technique is abstract parsing, a static string analysis technique, which is used as a component for generating and validating certificates. Our framework provides

Yi, Kwangkeun "Kwang"

414

Assessing the integrity of local area network materials accountability systems against insider threats  

SciTech Connect

DOE facilities rely increasingly on computerized systems to manage nuclear materials accountability data and to protect against diversion of nuclear materials or other malevolent acts (e.g., hoax due to falsified data) by insider threats. Aspects of modern computerized material accountability (MA) systems including powerful personal computers and applications on networks, mixed security environments, and more users with increased knowledge, skills and abilities help heighten the concern about insider threats to the integrity of the system. In this paper, we describe a methodology for assessing MA applications to help decision makers identify ways of and compare options for preventing or mitigating possible additional risks from the insider threat. We illustrate insights from applying the methodology to local area network materials accountability systems.

Jones, E.; Sicherman, A.

1996-07-01T23:59:59.000Z

415

A threat-based definition of IA and IA-enabled products.  

SciTech Connect

This paper proposes a definition of 'IA and IA-enabled products' based on threat, as opposed to 'security services' (i.e., 'confidentiality, authentication, integrity, access control or non-repudiation of data'), as provided by Department of Defense (DoD) Instruction 8500.2, 'Information Assurance (IA) Implementation.' The DoDI 8500.2 definition is too broad, making it difficult to distinguish products that need higher protection from those that do not. As a consequence the products that need higher protection do not receive it, increasing risk. The threat-based definition proposed in this paper solves those problems by focusing attention on threats, thereby moving beyond compliance to risk management. (DoDI 8500.2 provides the definitions and controls that form the basis for IA across the DoD.) Familiarity with 8500.2 is assumed.

Shakamuri, Mayuri; Schaefer, Mark A.; Campbell, Philip LaRoche

2010-09-01T23:59:59.000Z

416

A threat-based definition of IA- and IA-enabled products.  

SciTech Connect

This paper proposes a definition of 'IA and IA-enabled products' based on threat, as opposed to 'security services' (i.e., 'confidentiality, authentication, integrity, access control or non-repudiation of data'), as provided by Department of Defense (DoD) Instruction 8500.2, 'Information Assurance (IA) Implementation.' The DoDI 8500.2 definition is too broad, making it difficult to distinguish products that need higher protection from those that do not. As a consequence the products that need higher protection do not receive it, increasing risk. The threat-based definition proposed in this paper solves those problems by focusing attention on threats, thereby moving beyond compliance to risk management. (DoDI 8500.2 provides the definitions and controls that form the basis for IA across the DoD.) Familiarity with 8500.2 is assumed.

Shakamuri, Mayuri; Schaefer, Mark A.; Campbell, Philip LaRoche

2010-07-01T23:59:59.000Z

417

Comprehensive test ban treaty international monitoring system security threats and proposed security attributes  

SciTech Connect

To monitor compliance with a Comprehensive Test Ban Treaty (CTBT), a sensing network, referred to as the International Monitoring System (IMS), is being deployed. Success of the IMS depends on both its ability to preform its function and the international community`s confidence in the system. To ensure these goals, steps must be taken to secure the system against attacks that would undermine it; however, it is not clear that consensus exists with respect to the security requirements that should be levied on the IMS design. In addition, CTBT has not clearly articulated what threats it wishes to address. This paper proposes four system-level threats that should drive IMS design considerations, identifies potential threat agents, and collects into one place the security requirements that have been suggested by various elements of the IMS community. For each such requirement, issues associated with the requirement are identified and rationale for the requirement is discussed.

Draelos, T.J.; Craft, R.L.

1996-03-01T23:59:59.000Z

418

Content Analysis for Proactive Protective Intelligence  

SciTech Connect

The aim of this paper is to outline a plan for developing and validating a Proactive Protective Intelligence approach that prevents targeted violence through the analysis and assessment of threats overtly or covertly expressed in abnormal communications to USSS protectees.

Sanfilippo, Antonio P.

2010-12-15T23:59:59.000Z

419

Rwanda-Developing a Strategic Climate Change Framework | Open Energy  

Open Energy Info (EERE)

Rwanda-Developing a Strategic Climate Change Framework Rwanda-Developing a Strategic Climate Change Framework Jump to: navigation, search Name CDKN-Rwanda-Developing a Strategic Climate Change Framework and Design of a Climate Change and Environmental Fund Agency/Company /Organization Climate and Development Knowledge Network (CDKN), United Kingdom Department for International Development Partner REMA, Government of Rwanda Sector Climate, Energy, Land Topics Background analysis, Low emission development planning, Pathways analysis Website http://cdkn.org/project/a-stra Program Start 2010 Program End 2012 Country Rwanda UN Region Middle Africa References CDKN-Rwanda-Developing a Strategic Climate Change Framework[1] Rwanda's ambitious Green Growth and Climate Resilience Strategy was launched at a UNFCCC side event at CoP17 in Durban. Rwanda joins Korea,

420

An Integrated Framework for Parametric Design Using Building Energy Models  

NLE Websites -- All DOE Office Websites (Extended Search)

An Integrated Framework for Parametric Design Using Building Energy Models An Integrated Framework for Parametric Design Using Building Energy Models Speaker(s): Bryan Eisenhower Date: September 22, 2011 - 12:00pm Location: 90-3122 Seminar Host/Point of Contact: Michael Wetter In this talk we will present a framework for analyses of building energy models including uncertainty and sensitivity analysis, optimization, calibration, and failure mode effect analysis. The methodology begins with efficient uniformly ergodic numerical sampling and regression analysis based on machine learning to derive an analytic representation of the full energy model (e.g. EnergyPlus, TRNSYS, etc). Once these steps are taken, and an analytical representation of the dynamics is obtained, multiple avenues for analysis are opened that were previously impeded by the

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures  

E-Print Network (OSTI)

Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures Federico Maggi, and to what extent these abuses can impact the end users. With these questions in mind, we first analyzed and April 2012, and collected 24,953,881 distinct short URLs. With this large dataset, we studied the abuse

California at Santa Barbara, University of

422

Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures  

E-Print Network (OSTI)

DRAFT COPY Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures URLs, and to what extent these abuses can impact the end users. With these questions in mind, we first and April 2012, and collected 24,953,881 distinct short URLs. With this large dataset, we studied the abuse

Vigna, Giovanni

423

Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats  

E-Print Network (OSTI)

Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui- grates communication networks into traditional power grid. This integration, however, makes the power and applications. But in power grid, these data-centric attacks may result in instable power systems, and further

Wang, Wenye

424

Evaluating and managing the integrity of computerized accountability systems against insider threats  

SciTech Connect

Accountability applications such as nuclear material accountability systems at Department of Energy (DOE) facilities provide for tracking inventories, documenting transactions, issuing periodic reports, and assisting in the detection of unauthorized system access and data falsification. Insider threats against the system represent the potential to degrade the integrity with which these functions are addressed. While preventing unauthorized access by external threats is vital, it is also critical to understand how application features affect the ability of insiders to impact the integrity of data in the system. Aspects of modern computing systems including powerful personal computers and applications on networks, mixed security environments, and more users with increased software knowledge and skills help heighten the concern about insider threats. A question arises as follows. How can managers and policy makers logically and pragmatically analyze the myriad customization and design options for accountability applications with respect to the insider threat. In this paper, we describe a methodology for addressing this question, along with insights from its application to local area network (LAN) material accountability systems.

Jones, E.; Sicherman, A.

1996-06-01T23:59:59.000Z

425

What You Need to Know about the Threat to Forests in Colorado  

E-Print Network (OSTI)

locations throughout the western U.S., including Colorado. Detecting GM GM traps in a tree9 (leftGypsy Moth What You Need to Know about the Threat to Forests in Colorado Controlling GM Quarantines to become established in Colorado a response plan would be executed by state and federal agencies

426

Marine biodiversity in the Caribbean UK overseas territories: Perceived threats and constraints to environmental management  

Science Journals Connector (OSTI)

Islands are often considered to be a priority for conservation, because of their relatively high levels of biodiversity and their vulnerability to a range of natural and anthropogenic threats. However, the capacity of islands to conserve and manage biodiversity may depend upon their governance structures. Many island states are affiliated to other countries through an ‘overseas territory’ status, which may provide them with access to resources and support mechanisms, but which may also influence the capacity for local-scale management of environmental issues. The United Kingdom has 12 island Overseas Territories (UKOTs), most of which support biodiversity of high conservation concern. This study investigates perceptions of current and future threats to marine ecosystems and constraints to environmental protection on the six Caribbean UKOTs, through semi-structured interviews with officials from UK and UKOT government departments and non-governmental organisations. Coastal development, pollution and over-fishing were perceived as threats of most concern for the next decade, but climate change was perceived as by far the greatest future threat to the islands' marine ecosystems. However, a series of common institutional limitations that currently constrain mitigation and conservation efforts were also identified, including insufficient personnel and financial support, a lack of long-term, sustainable projects for persistent environmental problems and inadequate environmental legislation. These findings highlight the need for regional cooperation and capacity-building throughout the Caribbean and a more concerted approach to an UKOT environmental management by the UK and UKOTs' governments.

J. Forster; I.R. Lake; A.R. Watkinson; J.A. Gill

2011-01-01T23:59:59.000Z

427

Recent advances to address European Union Health Security from cross border chemical health threats  

Science Journals Connector (OSTI)

Abstract The European Union (EU) Decision (1082/2013/EU) on serious cross border threats to health was adopted by the European Parliament in November 2013, in recognition of the need to strengthen the capacity of Member States to coordinate the public health response to cross border threats, whether from biological, chemical, environmental events or events which have an unknown origin. Although mechanisms have been in place for years for reporting cross border health threats from communicable diseases, this has not been the case for incidents involving chemicals and/or environmental events. A variety of collaborative EU projects have been funded over the past 10 years through the Health Programme to address gaps in knowledge on health security and to improve resilience and response to major incidents involving chemicals. This paper looks at the EU Health Programme that underpins recent research activities to address gaps in resilience, planning, responding to and recovering from a cross border chemical incident. It also looks at how the outputs from the research programme will contribute to improving public health management of transnational incidents that have the potential to overwhelm national capabilities, putting this into context with the new requirements as the Decision on serious cross border threats to health as well as highlighting areas for future development.

R. Duarte-Davidson; R. Orford; S. Wyke; M. Griffiths; R. Amlôt; R. Chilcott

2014-01-01T23:59:59.000Z

428

Reducing the Wildland Fire Threat to Homes: Where and How Much?1  

E-Print Network (OSTI)

Reducing the Wildland Fire Threat to Homes: Where and How Much?1 Jack D. Cohen2 Abstract Understanding how ignitions occur is critical for effectively mitigating home fire losses during wildland fires, and local agencies that have responsibilities involving homes within and adjacent to wildlands. Agencies

Standiford, Richard B.

429

Botnets: To what extent are they a threat to information security?  

Science Journals Connector (OSTI)

Russian advertisement offering botnet services The purpose of this article is to examine to what extent botnets pose a threat to information security. In Chapter 1 the terms in the title are defined, and a comprehensive overview of botnets is provided ...

Claire Elliott

2010-08-01T23:59:59.000Z

430

Factoring species, non-species values and threats into biodiversity prioritisation across the ecoregions  

E-Print Network (OSTI)

population density, and the extinction risk of species. This threat index is positively correlated with all the ecoregions of Africa and its islands Neil D. Burgessa,b, *, Jennifer D'Amico Halesa , Taylor H. Rickettsa I N F O Article history: Received 3 September 2004 Available online 11 October 2005 Keywords: Africa

Vermont, University of

431

Threat-based evaluation for context-aware multimedia surveillance system  

Science Journals Connector (OSTI)

Multimedia surveillance has become commonplace and getting increasingly intelligent in recent years. The technological advances in computer-vision techniques help to detect suspicious movement and identify objects. Meanwhile, as surveillance system is ... Keywords: context-aware, cost, multimedia surveillance, privacy, security, threat evaluation

Yuan Tian; Biao Song; Mznah Al-Rodhaan; Abdullah Al-Dhelaan; Eui-Nam Huh

2014-01-01T23:59:59.000Z

432

Identification of Genomic Signatures for the Design of Assays for the Detection and Monitoring of Anthrax Threats  

E-Print Network (OSTI)

of Anthrax Threats S. Draghici, P. Khatri, Y. Liu, K.J. Chase, E.A. Bode, D.A. Kulesh, L.P. Wasieloski, D OF ASSAYS FOR THE DETECTION AND MONITORING OF ANTHRAX THREATS SORIN DRAGHICI1, , PURVESH KHATRI1

433

A Formal Framework of AOC  

Science Journals Connector (OSTI)

For an AOC system, autonomous entities and an environment are ... their environment are the force that drives an AOC system to evolve towards certain desired states. ... and have provided a general framework for ...

2005-01-01T23:59:59.000Z

434

Sample Business Plan Framework 3  

Energy.gov (U.S. Department of Energy (DOE))

U.S. Department of Energy Better Buildings Neighborhood Program: Sample Business Plan Framework 1: A program seeking to continue operations in the post-grant period as a not-for-profit (NGO) entity.

435

Sample Business Plan Framework 5  

Energy.gov (U.S. Department of Energy (DOE))

U.S. Department of Energy Better Buildings Neighborhood Program: Sample Business Plan Framework 1: A program seeking to continue operations in the post-grant period as a not-for-profit (NGO) entity.

436

Sample Business Plan Framework 2  

Energy.gov (U.S. Department of Energy (DOE))

U.S. Department of Energy Better Buildings Neighborhood Program: Sample Business Plan Framework 1: A program seeking to continue operations in the post-grant period as a not-for-profit (NGO) entity.

437

Sample Business Plan Framework 1  

Energy.gov (U.S. Department of Energy (DOE))

U.S. Department of Energy Better Buildings Neighborhood Program: Sample Business Plan Framework 1: A program seeking to continue operations in the post-grant period as a not-for-profit (NGO) entity.

438

Decision-Based Design Framework  

Science Journals Connector (OSTI)

With methods for modeling designer preference and customer preference presented in Chaps. 2 and 3, respectively, the decision-based design (DBD) framework and taxonomy is fully developed in this chapter. DBD i...

Wei Chen; Christopher Hoyle; Henk Jan Wassenaar

2013-01-01T23:59:59.000Z

439

Sample Business Plan Framework 4  

Energy.gov (U.S. Department of Energy (DOE))

U.S. Department of Energy Better Buildings Neighborhood Program: Sample Business Plan Framework 1: A program seeking to continue operations in the post-grant period as a not-for-profit (NGO) entity.

440

Geologic Framework Model (GFM2000)  

SciTech Connect

The purpose of this report is to document the geologic framework model, version GFM2000 with regard to input data, modeling methods, assumptions, uncertainties, limitations, and validation of the model results, and the differences between GFM2000 and previous versions. The version number of this model reflects the year during which the model was constructed. This model supersedes the previous model version, documented in Geologic Framework Model (GFM 3.1) (CRWMS M&O 2000 [DIRS 138860]). The geologic framework model represents a three-dimensional interpretation of the geology surrounding the location of the monitored geologic repository for spent nuclear fuel and high-level radioactive waste at Yucca Mountain. The geologic framework model encompasses and is limited to an area of 65 square miles (168 square kilometers) and a volume of 185 cubic miles (771 cubic kilometers). The boundaries of the geologic framework model (shown in Figure 1-1) were chosen to encompass the exploratory boreholes and to provide a geologic framework over the area of interest for hydrologic flow and radionuclide transport modeling through the unsaturated zone (UZ). The upper surface of the model is made up of the surface topography and the depth of the model is constrained by the inferred depth of the Tertiary-Paleozoic unconformity. The geologic framework model was constructed from geologic map and borehole data. Additional information from measured stratigraphic sections, gravity profiles, and seismic profiles was also considered. The intended use of the geologic framework model is to provide a geologic framework over the area of interest consistent with the level of detailed needed for hydrologic flow and radionuclide transport modeling through the UZ and for repository design. The model is limited by the availability of data and relative amount of geologic complexity found in an area. The geologic framework model is inherently limited by scale and content. The grid spacing used in the geologic framework model (200 feet [61 meters]), discussed in Section 6.4.2, limits the size of features that can be resolved by the model but is appropriate for the distribution of data available and its intended use. Uncertainty and limitations are discussed in Section 6.6 and model validation is discussed in Section 7.

T. Vogt

2004-08-26T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

iVIBRATE: Interactive Visualization Based Framework for Clustering Large Datasets  

E-Print Network (OSTI)

iVIBRATE: Interactive Visualization Based Framework for Clustering Large Datasets Keke Chen Ling of large datasets continues to be one of the most important problems in large- scale data analysis. A commonly used methodology for cluster analysis on large datasets is the three-phase framework of "sampling

442

Project Programming and Commissioning as a Risk Mitigation and Threat Analysis Tool  

E-Print Network (OSTI)

As a quality process, commissioning has been successfully used in the design, construction and validation process for over a decade with valuable results. Owners of high risk and complex projects are now starting to use the commissioning process...

Weiss, M. L.

2006-01-01T23:59:59.000Z

443

Thermoelectric Activities of European Community within Framework...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

of European Community within Framework Programme 7 and additional activities in Germany Thermoelectric Activities of European Community within Framework Programme 7 and...

444

Energy Sector Cybersecurity Framework Implementation Guidance...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cybersecurity Framework Implementation Guidance - Notice of Public Comment: Federal Register Notice, Volume 79, No. 177, September 12, 2014 Energy Sector Cybersecurity Framework...

445

Energy 101 Undergraduate Course Framework: Infosheet | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Undergraduate Course Framework: Infosheet Energy 101 Undergraduate Course Framework: Infosheet Energy101infosheet.pdf More Documents & Publications Energy 101 Webinar Energy...

446

Nuclear Safety Regulatory Framework | Department of Energy  

Energy Savers (EERE)

Presentation that outlines the rules, policies and orders that comprise the Department of Energy Nuclear Safety Regulatory Framework. Nuclear Safety Regulatory Framework More...

447

Sustainable Bioenergy: A Framework for Decision Makers | Open Energy  

Open Energy Info (EERE)

Sustainable Bioenergy: A Framework for Decision Makers Sustainable Bioenergy: A Framework for Decision Makers Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Sustainable Bioenergy: A Framework for Decision Makers Agency/Company /Organization: Food and Agriculture Organization of the United Nations Sector: Energy, Land Focus Area: Renewable Energy, Biomass Topics: Implementation, Policies/deployment programs Resource Type: Guide/manual, Lessons learned/best practices Website: esa.un.org/un-energy/pdf/susdev.Biofuels.FAO.pdf References: Sustainable Bioenergy: A Framework for Decision Makers[1] "In this publication, UN-Energy seeks to structure an approach to the current discussion on bioenergy, it is the contribution of the UN system to the issues that need further attention, analysis and valuation, so that

448

NNSA's Global Threat Reduction Initiative Removes More Than One Ton of  

NLE Websites -- All DOE Office Websites (Extended Search)

Removes More Than One Ton of Removes More Than One Ton of Food | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative Removes More ... NNSA's Global Threat Reduction Initiative Removes More Than One Ton of Food Posted By Office of Public Affairs Contributing to DOE/NNSA's efforts to support the Office of Personnel

449

Review of July 2013 Nuclear Security Insider Threat Exercise November 2013  

SciTech Connect

This document is a review of the Nuclear Security Insider Threat Exercise which was hosted at ORNL in July 2013. Nuclear security culture and the insider threat are best learned through experience. Culture is inherently difficult to teach, and as such is best learned through modeled behaviors and learning exercise. This TTX, NSITE, is a tool that strives to aid students in learning what an effective (and ineffective) nuclear security culture might look like by simulating dynamic events that strengthen or weaken the nuclear security regime. The goals of NSITE are to stimulate complex thought and discussion and assist decision makers and management in determining the most effective policies and procedures for their country or facility.

Pederson, Ann C. [ORNL] [ORNL; Snow, Catherine L. [ORNL] [ORNL; Townsend, Jeremy [ORNL] [ORNL; Shannon, Michael [ORNL] [ORNL

2013-11-01T23:59:59.000Z

450

Backscatter from the Data Plane --- Threats to Stability and Security in Information-Centric Networking  

E-Print Network (OSTI)

Information-centric networking approaches attract much attention in the ongoing search for a future communication paradigm of the Internet. Replacing the host-to-host connectivity by a data-oriented publish/subscribe service eases content distribution and authentication by concept, while eliminating all threats from unwanted traffic. However, current proposals to content routing heavily rely on data-driven protocol events and thereby introduce a strong coupling of the control to the data plane in the underlying routing infrastructure. In this paper, we analyze in theory and practical experiments threats to the stability and performance of the content distribution system. We discuss new attack vectors present in its current state of development, as well as possibilities and limitations to mitigate them.

Vahlenkamp, Matthias Wählisch Thomas C Schmidt Markus

2012-01-01T23:59:59.000Z

451

Anti-Chinese Sentiment in Russia: Threats of "Chinese Invasion" or Fears of Russian Xenophobia  

E-Print Network (OSTI)

Ruoxi Du Laird Essay Competition 2012 Anti-Chinese Sentiment in Russia: Threats of “Chinese Invasion” or Fears of Russian Xenophobia Try googling the keywords “Russian Far East” and “China” (“Dal’nii vostok” and “Kitai”), and you... East” (Express Gazeta). Results from English sources are similar, where typical titles include “China Looms over the Russian Far East” (The Diplomat) and “Russia’s Far East Turning Chinese” (ABC News). Indeed, Russia has all kinds of reasons...

Du, Ruoxi

2014-08-25T23:59:59.000Z

452

Attitudes and perceptions of urban households in sub-Saharan Africa on water sources, threats and sustainability: A study in Bondo, Kenya  

E-Print Network (OSTI)

, threats and sustainability: A study in Bondo, Kenya Daniel M Nzengya School of Sustainability, Arizona to clean water in Bondo township. 2. To describe what urban residents perceive as threats to households, during June 2011 to examine how attitudes and perceptions of urban residents on water sources, threats

Hall, Sharon J.

453

The City University of New York Medical Withdrawal and Re-entry Policy and Procedures Governing Student Behavior that Presents a Direct Threat of  

E-Print Network (OSTI)

Student Behavior that Presents a Direct Threat of Harm to Self or Others or Substantially Disrupts of a medical condition, engage in behavior that presents a direct threat of harm to themselves or to others 911 or taking other immediate action in case of imminent threat to life or limb. In addition to taking

Qiu, Weigang

454

34.07.99.M0.01 Prevention of Workplace Violence, Threats of Page 1 of 4 Violence, and Response to Trauma  

E-Print Network (OSTI)

34.07.99.M0.01 Prevention of Workplace Violence, Threats of Page 1 of 4 Violence, and Response to Trauma STANDARD ADMINISTRATIVE PROCEDURE 34.07.99.M0.01 Prevention of Workplace Violence, Threats&M administration will not tolerate violence or threats of violence. To foster a safe and supportive work

455

An Overview of the New USGS Environmental Health Mission Area The health of aquatic and terrestrial organisms and people is under continuing threats from  

E-Print Network (OSTI)

and terrestrial organisms and people is under continuing threats from pathogenic diseases and exposure to a diverse array of chemical contaminants. The emergence of new health threats and changing patterns of established threats are affected by land use changes, habitat degradation, climatic trends, air and water

Fleskes, Joe

456

The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration, OAS-L-12-01  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Audit and Inspections Audit and Inspections Audit Report The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration OAS-L-12-01 October 2011 Department of Energy Washington, DC 20585 October 25, 2011 MEMORANDUM FOR THE DEPUTY ADMINISTRATOR FOR DEFENSE NUCLEAR NONPROLIFERATION FROM: David Sedillo Director Western Audits Division SUBJECT: INFORMATION: Audit Report on "The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration" BACKGROUND The National Nuclear Security Administration's (NNSA) Office of Defense Nuclear Nonproliferation established the Global Threat Reduction Initiative (GTRI) in May 2004, as a vital part of the efforts to combat nuclear and radiological terrorism. GTRI's mission is to reduce

457

Programmatic Framework | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Programmatic Framework Programmatic Framework Programmatic Framework PROGRAM FACT SHEETS FUSRAP Nevada Offsites UMTRCA Title I and II PROGRAM TYPES UMTRCA Title I Sites UMTRCA Title II Sites FUSRAP Sites D&D Sites Nevada Offsites CERCLA/RCRA Sites NWPA Section 151 Site Other UMTRCA Title I Disposal and Processing Sites (Regulatory Drivers) For UMTRCA Title I disposal sites managed by LM, DOE becomes a licensee to the U.S. Nuclear Regulatory Commission (NRC). Inspection, reporting, and record-keeping requirements are defined in Title 10 Code of Federal Regulations (CFR) Part 40.27, "General License for Custody and Long-Term Care of Residual Radioactive Material Disposal Sites." The general license for long-term custody is indefinite in duration. Usually, title for the land is assigned to an agency of the Federal government, and the land is

458

Framework for SCADA Security Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

459

What are the security threats to further development of nuclear power plants in the U.S.? .  

E-Print Network (OSTI)

??What are the security threats to further development of nuclear power plants in the U.S.? The U.S. stands alone today in terms of the vast… (more)

Nottestad, Tammie L.

2010-01-01T23:59:59.000Z

460

GLOSSARY OF INFORMATION SECURITY THREATS Computer any electronic device used for storing, processing and transmitting data according  

E-Print Network (OSTI)

GLOSSARY OF INFORMATION SECURITY THREATS Computer · any electronic device used listening agent. A favored method of stealing passwords. Malware · a general term and malware in order to infiltrate, compromise, exploit and disable any device

Brinkmann, Peter

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Development of a Monitoring Framework for the Detection of Diversion of Intermediate Products in a Generic Natural Uranium Conversion Plant.  

E-Print Network (OSTI)

??The objective of this work is the development of an on-line monitoring and data analysis framework that could detect the diversion of intermediate products such… (more)

Ladd-Lively, Jennifer L.

2013-01-01T23:59:59.000Z

462

UTS Policy Framework: Introduction 11.  

E-Print Network (OSTI)

UTS Policy Framework: user guide Contents Introduction 11. TheroleofpolicywithintheUniversity 12 Policytemplate 64kbWord Directivetemplate 64kbWord Coversheets Coversheet--policies 48kbWord Coversheet--academicpolicies 48kbWord Coversheet--directives 48kbWord Policy Tools PolicyTool1:IssuesLog 60kbWord PolicyTool2

University of Technology, Sydney

463

A Formal Framework for Secure Routing Protocols Wenchao Zhou3  

E-Print Network (OSTI)

verifies its security claims. Existing model-checking-based protocol analysis tools cannot be directlyA Formal Framework for Secure Routing Protocols Chen Chen1 Limin Jia2 Hao Xu1 Cheng Luo1 Wenchao routing protocol, is vulner- able to various attacks. Redesigns of Internet routing infrastructure (e.g. S

Sandholm, Tuomas W.

464

The Global Threat Reduction Initiative's Orphan Source Recovery Project in the Russian Federation  

SciTech Connect

After 9/11, officials at the United States Department of Energy (DOE), National Nuclear Security Administration (NNSA) grew more concerned about radiological materials that were vulnerable to theft and illicit use around the world. The concern was that terrorists could combine stolen radiological materials with explosives to build and detonate a radiological dispersal device (RDD), more commonly known as a “dirty bomb.” In response to this and other terrorist threats, the DOE/NNSA formed what is now known as the Global Threat Reduction Initiative (GTRI) to consolidate and accelerate efforts to reduce and protect vulnerable nuclear and radiological materials located at civilian sites worldwide. Although a cooperative program was already underway in the Russian Federation to secure nuclear materials at a range of different facilities, thousands of sealed radioactive sources remained vulnerable at medical, research, and industrial sites. In response, GTRI began to focus efforts on addressing these materials. GTRI’s Russia Orphan Source Recovery Project, managed at the Nevada National Security Site’s North Las Vegas facility, was initiated in 2002. Throughout the life of the project, Joint Stock Company “Isotope” has served as the primary Russian subcontractor, and the organization has proven to be a successful partner. Since the first orphan source recovery of an industrial cobalt-60 irradiator with 647 curies (Ci) at an abandoned facility in Moscow in 2003, the GTRI Orphan Source Recovery Project in the Russian Federation has accomplished substantial levels of threat reduction. To date, GTRI has recovered and securely disposed of more than 5,100 sources totaling more that 628,000 Ci. This project serves as an extraordinary example of how international cooperation can be implemented by partners with mutual interests to achieve significant goals.

Russell, J. W. [NSTec; Ahumada, A. D. [NSTec; Blanchard, T. A. [NNSA

2012-06-04T23:59:59.000Z

465

Radioactive Threat Detection with Scattering Physics: A Model-Based Application  

SciTech Connect

The detection of radioactive contraband is a critical problem in maintaining national security for any country. Emissions from threat materials challenge both detection and measurement technologies especially when concealed by various types of shielding complicating the transport physics significantly. The development of a model-based sequential Bayesian processor that captures both the underlying transport physics including scattering offers a physics-based approach to attack this challenging problem. It is shown that this processor can be used to develop an effective detection technique.

Candy, J V; Chambers, D H; Breitfeller, E F; Guidry, B L; Verbeke, J M; Axelrod, M A; Sale, K E; Meyer, A M

2010-01-21T23:59:59.000Z

466

GLOBAL THREAT REDUCTION INITIATIVE REACTOR CONVERSION PROGRAM: STATUS AND CURRENT PLANS  

SciTech Connect

The U.S. Department of Energy’s National Nuclear Security Administration (NNSA) Reactor Conversion Program supports the minimization, and to the extent possible, elimination of the use of high enriched uranium (HEU) in civilian nuclear applications by working to convert research and test reactors and radioisotope production processes to the use of low enriched uranium (LEU). The Reactor Conversion Program is a technical pillar of the NNSA Global Threat Reduction Initiative (GTRI) which is a key organization for implementing U.S. HEU minimization policy and works to reduce and protect vulnerable nuclear and radiological material domestically and abroad.

Staples, Parrish A.; Leach, Wayne; Lacey, Jennifer M.

2009-10-07T23:59:59.000Z

467

SDS: A Framework for Scientific Data Services  

SciTech Connect

Large-scale scientific applications typically write their data to parallel file systems with organizations designed to achieve fast write speeds. Analysis tasks frequently read the data in a pattern that is different from the write pattern, and therefore experience poor I/O performance. In this paper, we introduce a prototype framework for bridging the performance gap between write and read stages of data access from parallel file systems. We call this framework Scientific Data Services, or SDS for short. This initial implementation of SDS focuses on reorganizing previously written files into data layouts that benefit read patterns, and transparently directs read calls to the reorganized data. SDS follows a client-server architecture. The SDS Server manages partial or full replicas of reorganized datasets and serves SDS Clients' requests for data. The current version of the SDS client library supports HDF5 programming interface for reading data. The client library intercepts HDF5 calls and transparently redirects them to the reorganized data. The SDS client library also provides a querying interface for reading part of the data based on user-specified selective criteria. We describe the design and implementation of the SDS client-server architecture, and evaluate the response time of the SDS Server and the performance benefits of SDS.

Dong, Bin; Byna, Surendra; Wu, Kesheng

2013-10-31T23:59:59.000Z

468

Development of a framework for truss-braced wing conceptual MDO  

Science Journals Connector (OSTI)

The paper describes the development of a multidisciplinary design optimization framework for conceptual design of truss-braced wing configurations. This unconventional configuration requires specialized analysis tools supported by a modular and flexible ... Keywords: Design environment, Framework, MDO, Truss-Braced Wing

Ohad Gur; Manav Bhatia; William H. Mason; Joseph A. Schetz; Rakesh K. Kapania; Taewoo Nam

2011-08-01T23:59:59.000Z

469

Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)  

SciTech Connect

In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardware and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.

Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Hauser, Katie R [ORNL] [ORNL; Lantz, Margaret W [ORNL] [ORNL; Mili, Ali [New Jersey Insitute of Technology] [New Jersey Insitute of Technology

2013-01-01T23:59:59.000Z

470

Scientific American: Threats of War, Chances for Peace http://www.sciam.com/print_version.cfm?articleID=C7412A92-E7F2-... 1 of 2 4/24/2007 11:34 AM  

E-Print Network (OSTI)

Scientific American: Threats of War, Chances for Peace http://www.sciam.com/print_version.cfm?articleID=C7412A92-E7F2-... 1 of 2 4/24/2007 11:34 AM February 18, 2007 Threats of War, Chances for Peace threats to sustainable development, the biggest threat to future well-being remains the specter of war

471

Gas adsorption on metal-organic frameworks  

DOE Patents (OSTI)

The present invention involves the use of certain metal organic frameworks that have been treated with water or another metal titrant in the storage of carbon dioxide. The capacity of these frameworks is significantly increased through this treatment.

Willis, Richard R. (Cary, IL); Low, John J. (Schaumburg, IL), Faheem, Syed A. (Huntley, IL); Benin, Annabelle I. (Oak Forest, IL); Snurr, Randall Q. (Evanston, IL); Yazaydin, Ahmet Ozgur (Evanston, IL)

2012-07-24T23:59:59.000Z

472

Feature identification framework and applications (FIFA)  

E-Print Network (OSTI)

collections that provides a general framework for applications while allowing decisions about the details of document representation and features identification to be deferred to domain specific implementations of that framework. These deferred decisions...

Audenaert, Michael Neal

2006-04-12T23:59:59.000Z

473

A Virtual Environment Framework For Software Engineering  

E-Print Network (OSTI)

A Virtual Environment Framework For Software Engineering Stephen E. Dossick Submitted in partial Environment Framework for Software Engineering Stephen E. Dossick The field of Software Engineering, responsible for mapping project artifacts into virtual environment furnishings, and the CHIME Theme Manager

Kaiser, Gail E.

474

Technology Enhanced Interaction Framework Kewalin Angkananon  

E-Print Network (OSTI)

Technology Enhanced Interaction Framework Kewalin Angkananon ECS University of Southampton interaction framework to help design technology to support communication between people and improve interactions between people, technology and objects, particularly in complex situations. A review of existing

475

Renewable energy market in Mexico: a research framework  

Science Journals Connector (OSTI)

A high potential growth for renewable energy technologies is available in Mexico. However, oil consumption has hindered the transition to a green economy. This paper analyses the Mexican stage and the factors influencing the renewable energy market using PESTL technique. A research framework for renewable energy in Mexico is proposed. Such framework involve the analysis of incentives to energy, the dissemination knowledge among market participants, the fostering of government-private-NGO partnering in projects deployment, the development of organisational capabilities, and the promotion of feasible technologies and uses. The comprehension of the Mexican stage will promote awareness of renewable energies need, which, in turn, allow the transition to a green economy. This paper concludes that only this transition will allow the country to achieve the economic, social and environmental benefits of such type of economy. The resulting framework from this study will offer new insights to corporate strategists and policy makers and help them increase the share of renewable energies.

Pável Reyes-Mercado; Rajagopal

2013-01-01T23:59:59.000Z

476

Isomerism in Metal–Organic Frameworks: “Framework Isomers”  

Science Journals Connector (OSTI)

His research interest focuses on the controlled formation, and eventual design, of metal–organic frameworks for application in gas storage for clean energy technologies. ... After that, he completed his M.Sc. in Applied Chemistry at New Mexico Highlands University where he worked on X-ray structure determination of low-melting organic materials and their complexes with mercury-organic compounds. ... This was observed upon heating Cd(abdc)bipy-1 under pressure to generate Cd(abdc)bipy-3, and exposing Cd(abdc)bipy-3 to air to reform Cd(abdc)bipy-1. ...

Trevor A. Makal; Andrey A. Yakovenko; Hong-Cai Zhou

2011-06-28T23:59:59.000Z

477

Shale Gas Development: A Smart Regulation Framework  

Science Journals Connector (OSTI)

Shale Gas Development: A Smart Regulation Framework ... Mandatory reporting of greenhouse gases: Petroleum and natural gas systems; Final rule. ...

Katherine E. Konschnik; Mark K. Boling

2014-02-24T23:59:59.000Z

478

Framework for Improving Critical Infrastructure Cybersecurity  

E-Print Network (OSTI)

Framework for Improving Critical Infrastructure Cybersecurity Version 1.0 National Institute of Standards and Technology February 12, 2014 #12;February 12, 2014 Cybersecurity Framework Version 1.0 Table............................................................................................................. 20 ii #12;February 12, 2014 Cybersecurity Framework Version 1.0 Executive Summary The national

479

A Ripplet Transform Based Statistical Framework for Natural Color Image Retrieval  

Science Journals Connector (OSTI)

We present a novel Content Based Image Retrieval (CBIR) scheme for natural color images using Multi-scale Geometric Analysis (MGA) of Ripplet Transform (RT) Type-I in the statistical framework based on General...

Manish Chowdhury; Sudeb Das; Malay K. Kundu

2013-01-01T23:59:59.000Z

480

Integrated simulation environment for unmanned autonomous systems: towards a conceptual framework  

Science Journals Connector (OSTI)

The paper initiates a comprehensive conceptual framework for an integrated simulation environment for unmanned autonomous systems (UAS) that is capable of supporting the design, analysis, testing, and evaluation from a "system of systems" perspective. ...

M. G. Perhinschi; M. R. Napolitano; S. Tamayo

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Synthesis and Properties of Nano Zeolitic Imidazolate Frameworks...  

NLE Websites -- All DOE Office Websites (Extended Search)

Properties of Nano Zeolitic Imidazolate Frameworks. Synthesis and Properties of Nano Zeolitic Imidazolate Frameworks. Abstract: Nano sized zeolitic imidazolate frameworks nZIF-8...

482

News Briefs: The U.S. chemical industry's Responsible Care program "has not encouraged pollution prevention or greater public access to information about toxic threats,"  

Science Journals Connector (OSTI)

News Briefs: The U.S. chemical industry's Responsible Care program "has not encouraged pollution prevention or greater public access to information about toxic threats," ...

2011-06-08T23:59:59.000Z

483

Ghana-Support for Future National Climate Change Policy Framework | Open  

Open Energy Info (EERE)

Page Page Edit with form History Facebook icon Twitter icon » Ghana-Support for Future National Climate Change Policy Framework Jump to: navigation, search Name CDKN-Ghana-Support for Future National Climate Change Policy Framework Agency/Company /Organization Climate and Development Knowledge Network (CDKN), United Kingdom Department for International Development Partner Energy Research Centre of the Netherlands (ECN), University of Ghana Sector Climate, Energy, Land Topics Background analysis, Low emission development planning, Pathways analysis Website http://cdkn.org/project/assist Program Start 2010 Program End 2011 Country Ghana UN Region Western Africa References CDKN-Ghana-Support for Future National Climate Change Policy Framework[1] Policy brief[2]

484

Identifying At-Risk Employees: Modeling Psychosocial Precursors of Potential Insider Threats  

SciTech Connect

In many insider crimes, managers and other coworkers observed that the offenders had exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers to using such psychosocial indicators include the inability to recognize the signs and the failure to record the behaviors so that they can be assessed. A psychosocial model was developed to assess an employee's behavior associated with an increased risk of insider abuse. The model is based on case studies and research literature on factors/correlates associated with precursor behavioral manifestations of individuals committing insider crimes. To test the model's agreement with human resources and management professionals, we conducted an experiment with positive results. If implemented in an operational setting, the model would be part of a set of management tools for employee assessment to identify employees who pose a greater insider threat.

Greitzer, Frank L.; Kangas, Lars J.; Noonan, Christine F.; Dalton, Angela C.; Hohimer, Ryan E.

2012-01-04T23:59:59.000Z

485

Combining Radiography and Passive Measurements for Radiological Threat Detection in Cargo  

SciTech Connect

Abstract Radiography is widely understood to provide information complimentary to passive detection: while not directly sensitive to radiological materials, radiography can reveal highly shielded regions which may mask a passive radiological signal. We present a method for combining radiographic and passive data which uses the radiograph to provide an estimate of scatter and attenuation for possible sources. This approach allows quantitative use of radiographic images without relying on image interpretation, and results in a probabilistic description of likely source locations and strengths. We present first results for this method for a simple modeled test case of a cargo container driving through a PVT portal. With this inversion approach, we address criteria for an integrated passive and radiographic screening system and how detection of SNM threats might be improved in such a system.

Miller, Erin A.; White, Timothy A.; Jarman, Kenneth D.; Kouzes, Richard T.; Kulisek, Jonathan A.; Robinson, Sean M.; Scherrer, Charles; Wittman, Richard S.

2012-12-01T23:59:59.000Z

486

Nuclear threat on the Korean peninsula: The present and the future. Final report  

SciTech Connect

Forty years after they were divided by the Cold War, South and North Korea are closer to reunification than ever before. However, North Korea's nuclear weapons program might cause South Koreans to be much less sure about reunification. Today the Cold War is over, but the Korean peninsula is still divided into two Koreas despite the new era of reconciliation. Since December 1991 when a non-aggression pact was signed barring nuclear weapons, North Korea has pursued its nuclear weapon development. In March 1993, North Korea declared its intention to withdraw from the Nuclear Non-Proliferation Treaty, and has been refusing a full inspection of its nuclear program. North Korea's nuclear issue is an international issue today. This paper discusses 'what threat we have today' and 'what should be done in the future.'.

Kang, S.

1994-04-01T23:59:59.000Z

487

Propane Market Outlook Assessment of Key Market Trends, Threats, and Opportunities Facing  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

0 0 Propane Market Outlook Assessment of Key Market Trends, Threats, and Opportunities Facing the Propane Industry Through 2020 P r e s e n T e d B y : Declining Sales in the Recent Past and Near-Term Future After peaking in 2003, nationwide propane consumption fell by more than 10 percent through 2006. Although propane demand rebounded somewhat in 2007 and 2008 due to colder weather, propane demand appears to have declined again in 2009. The collapse of the new housing market, combined with decreases in fuel use per customer resulting from efficiency upgrades in homes and equipment, resulted in a decline in residential propane sales. The recession also reduced demand in the industrial and commercial sectors. Colder weather in the last half of 2009 and in January

488

A framework for benchmarking land models  

SciTech Connect

Land models, which have been developed by the modeling community in the past few decades to predict future states of ecosystems and climate, have to be critically evaluated for their performance skills of simulating ecosystem responses and feedback to climate change. Benchmarking is an emerging procedure to measure performance of models against a set of defined standards. This paper proposes a benchmarking framework for evaluation of land model performances and, meanwhile, highlights major challenges at this infant stage of benchmark analysis. The framework includes (1) targeted aspects of model performance to be evaluated, (2) a set of benchmarks as defined references to test model performance, (3) metrics to measure and compare performance skills among models so as to identify model strengths and deficiencies, and (4) model improvement. Land models are required to simulate exchange of water, energy, carbon and sometimes other trace gases between the atmosphere and land surface, and should be evaluated for their simulations of biophysical processes, biogeochemical cycles, and vegetation dynamics in response to climate change across broad temporal and spatial scales. Thus, one major challenge is to select and define a limited number of benchmarks to effectively evaluate land model performance. The second challenge is to develop metrics of measuring mismatches between models and benchmarks. The metrics may include (1) a priori thresholds of acceptable model performance and (2) a scoring system to combine data–model mismatches for various processes at different temporal and spatial scales. The benchmark analyses should identify clues of weak model performance to guide future development, thus enabling improved predictions of future states of ecosystems and climate. The near-future research effort should be on development of a set of widely acceptable benchmarks that can be used to objectively, effectively, and reliably evaluate fundamental properties of land models to improve their prediction performance skills.

Luo, Yiqi; Randerson, J.; Abramowitz, G.; Bacour, C.; Blyth, E.; Carvalhais, N.; Ciais, Philippe; Dalmonech, D.; Fisher, J.B.; Fisher, R.; Friedlingstein, P.; Hibbard, Kathleen A.; Hoffman, F. M.; Huntzinger, Deborah; Jones, C.; Koven, C.; Lawrence, David M.; Li, D.J.; Mahecha, M.; Niu, S.L.; Norby, Richard J.; Piao, S.L.; Qi, X.; Peylin, P.; Prentice, I.C.; Riley, William; Reichstein, M.; Schwalm, C.; Wang, Y.; Xia, J. Y.; Zaehle, S.; Zhou, X. H.

2012-10-09T23:59:59.000Z

489

Low-Altitude Airbursts and the Impact Threat - Final LDRD Report.  

SciTech Connect

The purpose of this nine-week project was to advance the understanding of low-altitude airbursts by developing the means to model them at extremely high resolution in order to span the scales of entry physics as well as blast wave and plume formation. Small asteroid impacts on Earth are a recognized hazard, but the full nature of the threat is still not well understood. We used shock physics codes to discover emergent phenomena associated with low-altitude airbursts such as the Siberian Tunguska event of 1908 and the Egyptian glass-forming event 29 million years ago. The planetary defense community is beginning to recognize the significant threat from such airbursts. Low-altitude airbursts are the only class of impacts that have a significant probability of occurring within a planning time horizon. There is roughly a 10% chance of a megaton-scale low-altitude airburst event in the next decade.The first part of this LDRD final project report is a preprint of our proceedings paper associated with the plenary presentation at the Hypervelocity Impact Society 2007 Symposium in Williamsburg, Virginia (International Journal of Impact Engineering, in press). The paper summarizes discoveries associated with a series of 2D axially-symmetric CTH simulations. The second part of the report contains slides from an invited presentation at the American Geophysical Union Fall 2007 meeting in San Francisco. The presentation summarizes the results of a series of 3D oblique impact simulations of the 1908 Tunguska explosion. Because of the brevity of this late-start project, the 3D results have not yet been written up for a peer-reviewed publication. We anticipate the opportunity to eventually run simulations that include the actual topography at Tunguska, at which time these results will be published.3

Boslough, Mark B.; Crawford, David A.

2007-12-01T23:59:59.000Z

490

A framework to characterize energy efficiency measures  

Science Journals Connector (OSTI)

Abstract The need to increase the diffusion of energy efficiency measures (EEMs) is of crucial importance to achieve a consistent reduction of energy consumption and green house gases (GHG) emissions. A clear comprehension of the characteristics of such \\{EEMs\\} could assist in gathering and capitalizing all the information needed by industrial firms in selecting and adopting technologies, as well as by policy-makers in designing appropriate policies for their diffusion. Therefore, in this study, starting from a literature review of the studies analyzing the attributes of EEMs, we aim at providing an innovative and comprehensive framework to characterize such measures, based on 17 attributes grouped according to six categories, such as: economic, energy, environmental, production-related, implementation-related and the possible interaction with other systems. We applied this scheme to an extensive range of \\{EEMs\\} in cross-cutting technologies, i.e. motors, compressed air, lighting and HVAC systems. The analysis provides a relevant contribution firstly to the structuring and the sharing of knowledge on \\{EEMs\\} and hence to the comprehension of the barriers currently hindering their adoption; secondly, it provides a structured basis for the analysis of the drivers that policy-makers should develop in order to promote industrial energy efficiency.

Andrea Trianni; Enrico Cagno; Alessio De Donatis

2014-01-01T23:59:59.000Z

491

A Framework for Comparative Assessments of Energy Efficiency Policy Measures  

SciTech Connect

When policy makers propose new policies, there is a need to assess the costs and benefits of the proposed policy measures, to compare them to existing and alternative policies, and to rank them according to their effectiveness. In the case of equipment energy efficiency regulations, comparing the effects of a range of alternative policy measures requires evaluating their effects on consumers’ budgets, on national energy consumption and economics, and on the environment. Such an approach should be able to represent in a single framework the particularities of each policy measure and provide comparable results. This report presents an integrated methodological framework to assess prospectively the energy, economic, and environmental impacts of energy efficiency policy measures. The framework builds on the premise that the comparative assessment of energy efficiency policy measures should (a) rely on a common set of primary data and parameters, (b) follow a single functional approach to estimate the energy, economic, and emissions savings resulting from each assessed measure, and (c) present results through a set of comparable indicators. This framework elaborates on models that the U.S. Department of Energy (DOE) has used in support of its rulemakings on mandatory energy efficiency standards. In addition to a rigorous analysis of the impacts of mandatory standards, DOE compares the projected results of alternative policy measures to those projected to be achieved by the standards. The framework extends such an approach to provide a broad, generic methodology, with no geographic or sectoral limitations, that is useful for evaluating any type of equipment energy efficiency market intervention. The report concludes with a demonstration of how to use the framework to compare the impacts estimated for twelve policy measures focusing on increasing the energy efficiency of gas furnaces in the United States.

Blum, Helcio; Atkinson, Barbara; Lekov, Alex

2011-05-24T23:59:59.000Z

492

Demand Response Valuation Frameworks Paper  

E-Print Network (OSTI)

24 3.5. Avoided Costeconomic analysis of DR. Avoided cost approaches are simplecase include not only avoided costs of supply but also the

Heffner, Grayson

2010-01-01T23:59:59.000Z

493

ITL BULLETIN FOR NOVEMBER 2013 ITL RELEASES PRELIMINARY CYBERSECURITY FRAMEWORK  

E-Print Network (OSTI)

ITL BULLETIN FOR NOVEMBER 2013 ITL RELEASES PRELIMINARY CYBERSECURITY FRAMEWORK The Information a Preliminary Cybersecurity Framework for public review and comment. ITL developed the framework based is developing the framework under Executive Order 13636, Improving Critical Infrastructure Cybersecurity, which

494

CDC 24/7: Saving Lives. Protecting People from Health Threats. Saving Money through Prevention. Environmental Health  

E-Print Network (OSTI)

in Fukushima, Japan underscored the need to maintain CDC's expertise in radiation. · · · Pl CDC's RadiationCS238593 Radiation CDC 24/7: Saving Lives. Protecting People from Health Threats. Saving Money of every dollar entrusted to the agency. Radiation exists all around us. People are exposed to varying

495

CDC's Core Environmental Health Services CDC 24/7: Saving Lives. Protecting People from Health Threats. Saving Money through Prevention.  

E-Print Network (OSTI)

healthy. But when your environment exposes you to hazardous substances or dangerous events, your healthCS237904 CDC's Core Environmental Health Services CDC 24/7: Saving Lives. Protecting People from Health Threats. Saving Money through Prevention. Your environment is everything around you -- the air you

496

CDC's National Asthma Control Program CDC 24/7: Saving Lives. Protecting People from Health Threats. Saving Money Through Prevention.  

E-Print Network (OSTI)

Health Threats. Saving Money Through Prevention. Environmental Health Your environment is everything, you are more likely to stay healthy. But when your environment exposes you to dangerous events or toxic substances, your health can be negatively affected. CDC is committed to saving lives

497

CDC 24/7: Saving Lives. Protecting People from Health Threats. Saving Money through Prevention. National Center for Environmental Health  

E-Print Network (OSTI)

. But when your environment exposes you to hazardous substances or dangerous events, your health canCS239266-A CDC 24/7: Saving Lives. Protecting People from Health Threats. Saving Money through Prevention. National Center for Environmental Health Agency for Toxic Substances and Disease Registry CDC

498

Microsoft Word - DOE Framework Final.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Washington, D.C. 20585 Washington, D.C. 20585 Hanford Tank Waste Retrieval, Treatment, and Disposition Framework September 24, 2013 Hanford Tank Waste Retrieval, Treatment, and Disposition Framework ii This page intentionally left blank. Hanford Tank Waste Retrieval, Treatment, and Disposition Framework iii CONTENTS 1. Introduction ............................................................................................................................................. 1 Immobilizing Radioactive Tank Waste at the Office of River Protection .................................................. 1 Current System Design ........................................................................................................................... 2 Addressing Technical Risks and Challenges .......................................................................................... 2

499

Site Transition Framework | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

(April 2004) Site Transition Framework More Documents & Publications Process for Transition of Uranium Mill Tailings Radiation Control Act Title II Disposal Sites to the...

500

Crystallography of metal-organic frameworks  

Science Journals Connector (OSTI)

Recent advances in the crystallography of metal-organic frameworks (MOFs) are reviewed, including crystal growth, structural elucidation, in-situ and non-ambient crystallography.

G?ndara, F.

2014-10-28T23:59:59.000Z