National Library of Energy BETA

Sample records for threat analysis framework

  1. Threat Analysis Framework | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutory Authority J-I-12 GeVAuditTheChallengeThreat Analysis

  2. PITTSBURGH REGIONAL ENVIRONMENTAL THREATS ANALYSIS

    E-Print Network [OSTI]

    Jiang, Huiqiang

    AND COMMUNITIES PITTSBURGH, PA. | AUGUST 2013 #12;PRETA AIR: HAZARDOUS AIR POLLUTANTS 32 PITTSBURGH REGIONAL ENVIRONMENTAL THREATS ANALYSIS REPORT PRETA AIR: HAZARDOUS AIR POLLUTANTS (HAPs)/AIR TOXICS PREPARED BY AUTHORSPITTSBURGH REGIONAL ENVIRONMENTAL THREATS ANALYSIS (PRETA) REPORT PRETA AIR: HAZARDOUS AIR

  3. SPECIAL ISSUE PAPER Threat scenariobased security risk analysis using use

    E-Print Network [OSTI]

    SPECIAL ISSUE PAPER Threat scenariobased security risk analysis using use case modeling & Sons, Ltd. KEYWORDS security risk analysis; qualitative risk analysis; scenario method; use case the risks posed by security threats and prevent them effectively. Security Risk Analysis (SRA

  4. Threat Analysis Framework | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Laclede GasEfficiency MaineAutoSecuritythomas.wheeler@hq.doe.govThe need to

  5. A margin-based approach to vehicle threat assessment in a homotopy framework for semi-autonomous highway navigation

    E-Print Network [OSTI]

    Constantin, Alexandre, S.M. Massachusetts Institute of Technology

    2014-01-01

    This thesis describes the design of an unified framework for threat assessment and the shared control between a human driver and the onboard controller, based on the notion of fields of safe travel. It allows to perform ...

  6. ANALYSIS OF ELECTRIC GRID SECURITY UNDER TERRORIST THREAT Javier Salmeron

    E-Print Network [OSTI]

    Baldick, Ross

    ANALYSIS OF ELECTRIC GRID SECURITY UNDER TERRORIST THREAT Javier Salmeron Kevin Wood Operations techniques for analyzing the security and resilience of electrical power grids against disruptions caused analytical techniques to help mitigate the disruptions to electric power grids caused by terrorist attacks

  7. A Holistic Framework for Bridging Physical Threats to USC/ISI Technical Report ISI-TR-687, December 2013

    E-Print Network [OSTI]

    Heidemann, John

    A Holistic Framework for Bridging Physical Threats to User QoE USC/ISI Technical Report ISI-TR-687, December 2013 Xue Cai USC/ISI, Marina del Rey, CA xuecai@isi.edu John Heidemann USC/ISI, Marina del Rey, CA johnh@isi.edu Walter Willinger Niksun, Inc., Princeton, NJ wwillinger@niksun.com ABSTRACT Submarine

  8. Threat to the point: improving the value of comparative extinction risk analysis for conservation action

    E-Print Network [OSTI]

    Davidson, Ana

    Threat to the point: improving the value of comparative extinction risk analysis for conservation, QLD 4072, Australia Abstract Comparative extinction risk analysis is a common approach for assessing application (species ranking). We conclude that the use of threats in comparative extinction risk analysis

  9. Detection and Analysis of Threats to the Energy Sector: DATES

    SciTech Connect (OSTI)

    Alfonso Valdes

    2010-03-31

    This report summarizes Detection and Analysis of Threats to the Energy Sector (DATES), a project sponsored by the United States Department of Energy and performed by a team led by SRI International, with collaboration from Sandia National Laboratories, ArcSight, Inc., and Invensys Process Systems. DATES sought to advance the state of the practice in intrusion detection and situational awareness with respect to cyber attacks in energy systems. This was achieved through adaptation of detection algorithms for process systems as well as development of novel anomaly detection techniques suited for such systems into a detection suite. These detection components, together with third-party commercial security systems, were interfaced with the commercial Security Information Event Management (SIEM) solution from ArcSight. The efficacy of the integrated solution was demonstrated on two testbeds, one based on a Distributed Control System (DCS) from Invensys, and the other based on the Virtual Control System Environment (VCSE) from Sandia. These achievements advance the DOE Cybersecurity Roadmap [DOE2006] goals in the area of security monitoring. The project ran from October 2007 until March 2010, with the final six months focused on experimentation. In the validation phase, team members from SRI and Sandia coupled the two test environments and carried out a number of distributed and cross-site attacks against various points in one or both testbeds. Alert messages from the distributed, heterogeneous detection components were correlated using the ArcSight SIEM platform, providing within-site and cross-site views of the attacks. In particular, the team demonstrated detection and visualization of network zone traversal and denial-of-service attacks. These capabilities were presented to the DistribuTech Conference and Exhibition in March 2010. The project was hampered by interruption of funding due to continuing resolution issues and agreement on cost share for four months in 2008. This resulted in delays in finalizing agreements with commercial partners, and in particular the Invensys testbed was not installed until December 2008 (as opposed to the March 2008 plan). The project resulted in a number of conference presentations and publications, and was well received when presented at industry forums. In spite of some interest on the part of the utility sector, we were unfortunately not able to engage a utility for a full-scale pilot deployment.

  10. Project Programming and Commissioning as a Risk Mitigation and Threat Analysis Tool 

    E-Print Network [OSTI]

    Weiss, M. L.

    2006-01-01

    beyond traditional disciplines including risk/threat analysis and mitigation programs. This paper discusses the growing trend of using a commissioning approach as a documentation process for the validation requirements, which are documented in the study...

  11. Threat Analysis of Portable Hack Tools from USB Storage Devices and Protection Solutions

    E-Print Network [OSTI]

    Halgamuge, Malka N.

    Threat Analysis of Portable Hack Tools from USB Storage Devices and Protection Solutions Dung V hack tools. However, beside U3 technology, attackers also have another more flexible alternative, portable application or application virtualization, which allows a wide range of hack tools to be compiled

  12. Potential Threats from a Likely Nuclear Power Plant Accident: a Climatological Trajectory Analysis

    E-Print Network [OSTI]

    Chen, Shu-Hua

    in the near future as insecure nuclear power plants with a high risk of accidents remain in the regionPotential Threats from a Likely Nuclear Power Plant Accident: a Climatological Trajectory Analysis at the Metsamor Nuclear Power Plant would influence all of Turkey. Furthermore, vulnerable regions in Turkey after

  13. A Comprehensive Ionosphere Storm Data Analysis Method to Support LAAS Threat

    E-Print Network [OSTI]

    Stanford University

    . In this region, solar radiation produces free electrons and ions that cause phase advance and group delayA Comprehensive Ionosphere Storm Data Analysis Method to Support LAAS Threat Model Development developed to analyze WAAS Supertruth data as well as both raw and JPL-processed data from the IGS

  14. Data Flow Analysis Frameworks for Concurrent Programs

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Data Flow Analysis Frameworks for Concurrent Programs 1 Matthew B. Dwyer Department of Computer Science University of Massachusetts, Amherst Abstract Data flow analysis is a well studied family of static program analyses. A rich theoretical basis for data flow analysis has been developed. Central

  15. A threat-rigidity analysis of the Apache Software Foundation's response to reported server security issues

    E-Print Network [OSTI]

    Shapira, Yoav

    2006-01-01

    There exists a broad body of literature documenting organizational responses to competitive threats, including those responses which fit into the threat-rigidity hypothesis. The purpose of this thesis is to investigate how ...

  16. Novel Threat-risk Index Using Probabilistic Risk Assessment and Human Reliability Analysis - Final Report

    SciTech Connect (OSTI)

    George A. Beitel

    2004-02-01

    In support of a national need to improve the current state-of-the-art in alerting decision makers to the risk of terrorist attack, a quantitative approach employing scientific and engineering concepts to develop a threat-risk index was undertaken at the Idaho National Engineering and Environmental Laboratory (INEEL). As a result of this effort, a set of models has been successfully integrated into a single comprehensive model known as Quantitative Threat-Risk Index Model (QTRIM), with the capability of computing a quantitative threat-risk index on a system level, as well as for the major components of the system. Such a threat-risk index could provide a quantitative variant or basis for either prioritizing security upgrades or updating the current qualitative national color-coded terrorist threat alert.

  17. Initial Risk Analysis and Decision Making Framework

    SciTech Connect (OSTI)

    Engel, David W.

    2012-02-01

    Commercialization of new carbon capture simulation initiative (CCSI) technology will include two key elements of risk management, namely, technical risk (will process and plant performance be effective, safe, and reliable) and enterprise risk (can project losses and costs be controlled within the constraints of market demand to maintain profitability and investor confidence). Both of these elements of risk are incorporated into the risk analysis subtask of Task 7. Thus far, this subtask has developed a prototype demonstration tool that quantifies risk based on the expected profitability of expenditures when retrofitting carbon capture technology on a stylized 650 MW pulverized coal electric power generator. The prototype is based on the selection of specific technical and financial factors believed to be important determinants of the expected profitability of carbon capture, subject to uncertainty. The uncertainty surrounding the technical performance and financial variables selected thus far is propagated in a model that calculates the expected profitability of investments in carbon capture and measures risk in terms of variability in expected net returns from these investments. Given the preliminary nature of the results of this prototype, additional work is required to expand the scope of the model to include additional risk factors, additional information on extant and proposed risk factors, the results of a qualitative risk factor elicitation process, and feedback from utilities and other interested parties involved in the carbon capture project. Additional information on proposed distributions of these risk factors will be integrated into a commercial implementation framework for the purpose of a comparative technology investment analysis.

  18. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.

    SciTech Connect (OSTI)

    Merkle, Peter Benedict

    2006-03-01

    Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

  19. An Integrated Framework for CO2 Accounting and Risk Analysis...

    Office of Scientific and Technical Information (OSTI)

    for CO2 Accounting and Risk Analysis in CO2-EOR Sites An integrated framework for CO2 accounting and risk analysis of CO2-EOR Authors: Dai, Zhenxue 1 ; Viswanathan, Hari S....

  20. Microsoft Word - Threat Analysis Framework Sept07_comments-final.doc

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i nAand DOE SafetyofDepartment. " 21 ranDay:OCIO AuditU . SDAVID GEISER2

  1. Flexible Framework for Building Energy Analysis: Preprint

    SciTech Connect (OSTI)

    Hale, E.; Macumber, D.; Weaver, E.; Shekhar, D.

    2012-09-01

    In the building energy research and advanced practitioner communities, building models are perturbed across large parameter spaces to assess energy and cost performance in the face of programmatic and economic constraints. This paper describes the OpenStudio software framework for performing such analyses.

  2. Practical Analysis of Gadget Framework on Android OS

    E-Print Network [OSTI]

    Practical Analysis of Gadget Framework on Android OS Studienarbeit im Rahmen des Diplomstudiengangs on Android 4 2.1 USB Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.1 Topology . . . . . . . . . . . . . . . . . . . . . 12 2.2.5 Gadgetfs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 2.3 Embedded Android

  3. A HIERARCHICAL DESIGN OPTIMIZATION FRAMEWORK FOR BUILDING PERFORMANCE ANALYSIS

    E-Print Network [OSTI]

    Papalambros, Panos

    A HIERARCHICAL DESIGN OPTIMIZATION FRAMEWORK FOR BUILDING PERFORMANCE ANALYSIS Ruchi Choudhary1 the consistency between decisions made at various points during building performance analysis. Analytical Target values of performance goals compatible with one another. Application to the energy analysis of a three

  4. Analysis framework for the J-PET scanner

    E-Print Network [OSTI]

    Krzemie?, W; Gruntowski, A; Stola, K; Trybek, D; Bednarski, T; Bia?as, P; Czerwi?ski, E; Kami?ska, D; Kap?on, L; Kochanowski, A; Korcyl, G; Kowal, J; Kowalski, P; Kozik, T; Kubicz, E; Moskal, P; Nied?wiecki, Sz; Pa?ka, M; Raczy?ski, L; Rudy, Z; Salabura, P; Sharma, N G; Silarski, M; S?omski, A; Smyrski, J; Strzelecki, A; Wieczorek, A; Wi?licki, W; Zieli?ski, M; Zo?, N

    2015-01-01

    J-PET analysis framework is a flexible, lightweight, ROOT-based software package which provides the tools to develop reconstruction and calibration procedures for PET tomography. In this article we present the implementation of the full data-processing chain in the J-PET framework which is used for the data analysis of the J-PET tomography scanner. The Framework incorporates automated handling of PET setup parameters' database as well as high level tools for building data reconstruction procedures. Each of these components is briefly discussed.

  5. Decerns: A framework for multi-criteria decision analysis

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Yatsalo, Boris; Didenko, Vladimir; Gritsyuk, Sergey; Sullivan, Terry

    2015-02-27

    A new framework, Decerns, for multicriteria decision analysis (MCDA) of a wide range of practical problems on risk management is introduced. Decerns framework contains a library of modules that are the basis for two scalable systems: DecernsMCDA for analysis of multicriteria problems, and DecernsSDSS for multicriteria analysis of spatial options. DecernsMCDA includes well known MCDA methods and original methods for uncertainty treatment based on probabilistic approaches and fuzzy numbers. As a result, these MCDA methods are described along with a case study on analysis of multicriteria location problem.

  6. Anonymity Analysis of Onion Routing in the Universally Composable Framework

    E-Print Network [OSTI]

    Johnson, Aaron

    deployed anonymous communications systems. The Tor onion routing network currently comprises some threeAnonymity Analysis of Onion Routing in the Universally Composable Framework Joan Feigenbaum Yale. Specifically we present a probabilistic analysis of onion routing in a black-box model of anonymous

  7. An XML Driven Framework for Test Control and Data Analysis

    E-Print Network [OSTI]

    Nogiec, J M; Walbridge, D G C; Desavouret, E

    2001-01-01

    An extensible, component-based framework has been developed at Fermilab to promote software reuse and provide a common platform for developing a family of test and data analysis systems. The framework allows for configuring applications from components through the use of XML configurations. It can be easily extended by adding new components and many application independent components are already provided with the framework. The core of the system has been developed in Java which guarantees its portability and facilitates the use of object-oriented development technologies.

  8. Grain - A Java Analysis Framework for Total Data Readout

    E-Print Network [OSTI]

    P. Rahkila

    2007-11-21

    Grain is a data analysis framework developed to be used with the novel Total Data Readout data acquisition system. In Total Data Readout all the electronics channels are read out asynchronously in singles mode and each data item is timestamped. Event building and analysis has to be done entirely in the software post-processing the data stream. A flexible and efficient event parser and the accompanying software framework have been written entirely in Java. The design and implementation of the software are discussed along with experiences gained in running real-life experiments.

  9. A Framework for Analysis of the Uncertainty of Socioeconomic Growth

    E-Print Network [OSTI]

    A Framework for Analysis of the Uncertainty of Socioeconomic Growth and Climate Change on the Risk of Technology 77 Massachusetts Avenue, E19-411 Cambridge, MA 02139 (USA) Location: Building E19, Room 411 400 Growth and Climate Change on the Risk of Water Stress: a Case Study in Asia Charles Fant* , C. Adam

  10. Framework for Interactive Parallel Dataset Analysis on the Grid

    SciTech Connect (OSTI)

    Alexander, David A.; Ananthan, Balamurali; /Tech-X Corp.; Johnson, Tony; Serbo, Victor; /SLAC

    2007-01-10

    We present a framework for use at a typical Grid site to facilitate custom interactive parallel dataset analysis targeting terabyte-scale datasets of the type typically produced by large multi-institutional science experiments. We summarize the needs for interactive analysis and show a prototype solution that satisfies those needs. The solution consists of desktop client tool and a set of Web Services that allow scientists to sign onto a Grid site, compose analysis script code to carry out physics analysis on datasets, distribute the code and datasets to worker nodes, collect the results back to the client, and to construct professional-quality visualizations of the results.

  11. A Complexity Science-Based Framework for Global Joint Operations Analysis to Support Force Projection: LDRD Final Report.

    SciTech Connect (OSTI)

    Lawton, Craig R.

    2015-01-01

    The military is undergoing a significant transformation as it modernizes for the information age and adapts to address an emerging asymmetric threat beyond traditional cold war era adversaries. Techniques such as traditional large-scale, joint services war gaming analysis are no longer adequate to support program evaluation activities and mission planning analysis at the enterprise level because the operating environment is evolving too quickly. New analytical capabilities are necessary to address modernization of the Department of Defense (DoD) enterprise. This presents significant opportunity to Sandia in supporting the nation at this transformational enterprise scale. Although Sandia has significant experience with engineering system of systems (SoS) and Complex Adaptive System of Systems (CASoS), significant fundamental research is required to develop modeling, simulation and analysis capabilities at the enterprise scale. This report documents an enterprise modeling framework which will enable senior level decision makers to better understand their enterprise and required future investments.

  12. Towards secure virtual directories : a risk analysis framework.

    SciTech Connect (OSTI)

    Claycomb, William R.

    2010-07-01

    Directory services are used by almost every enterprise computing environment to provide data concerning users, computers, contacts, and other objects. Virtual directories are components that provide directory services in a highly customized manner. Unfortunately, though the use of virtual directory services are widespread, an analysis of risks posed by their unique position and architecture has not been completed. We present a detailed analysis of six attacks to virtual directory services, including steps for detection and prevention. We also describe various categories of attack risks, and discuss what is necessary to launch an attack on virtual directories. Finally, we present a framework to use in analyzing risks to individual enterprise computing virtual directory instances. We show how to apply this framework to an example implementation, and discuss the benefits of doing so.

  13. A multi attribute trade off and analysis framework for electric utility integrated resource planning

    E-Print Network [OSTI]

    Bespolka, Carl G.

    1989-01-01

    The application of this framework to a 1988 Energy Laboratory study served to illustrate the flow of the analysis and the interrelationships among the various components of the framework. The trade off analysis stage - ...

  14. HistFitter software framework for statistical data analysis

    E-Print Network [OSTI]

    M. Baak; G. J. Besjes; D. Cote; A. Koutsman; J. Lorenz; D. Short

    2014-10-06

    We present a software framework for statistical data analysis, called HistFitter, that has been used extensively by the ATLAS Collaboration to analyze big datasets originating from proton-proton collisions at the Large Hadron Collider at CERN. Since 2012 HistFitter has been the standard statistical tool in searches for supersymmetric particles performed by ATLAS. HistFitter is a programmable and flexible framework to build, book-keep, fit, interpret and present results of data models of nearly arbitrary complexity. Starting from an object-oriented configuration, defined by users, the framework builds probability density functions that are automatically fitted to data and interpreted with statistical tests. A key innovation of HistFitter is its design, which is rooted in core analysis strategies of particle physics. The concepts of control, signal and validation regions are woven into its very fabric. These are progressively treated with statistically rigorous built-in methods. Being capable of working with multiple data models at once, HistFitter introduces an additional level of abstraction that allows for easy bookkeeping, manipulation and testing of large collections of signal hypotheses. Finally, HistFitter provides a collection of tools to present results with publication-quality style through a simple command-line interface.

  15. Cyber threat metrics.

    SciTech Connect (OSTI)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  16. A high-level analysis framework for HAWC

    E-Print Network [OSTI]

    Younk, Patrick W; Vianello, Giacomo; Harding, J Patrick; Solares, Hugo Alberto Ayala; Zhou, Hao

    2015-01-01

    The High Altitude Water Cherenkov (HAWC) Observatory continuously observes gamma-rays between 100 GeV to 100 TeV in an instantaneous field of view of about 2 steradians above the array. The large amount of raw data, the importance of small number statistics, the large dynamic range of gamma-ray signals in time (1 - $10^8$ sec) and angular extent (0.1 - 100 degrees), and the growing need to directly compare results from different observatories pose some special challenges for the analysis of HAWC data. To address these needs, we have designed and implemented a modular analysis framework based on the method of maximum likelihood. The framework facilitates the calculation of a binned Poisson Log-likelihood value for a given physics model (i.e., source model), data set, and detector response. The parameters of the physics model (sky position, spectrum, angular extent, etc.) can be optimized through a likelihood maximization routine to obtain a best match to the data. In a similar way, the parameters of the detect...

  17. Modeling air pollution in the Tracking and Analysis Framework (TAF)

    SciTech Connect (OSTI)

    Shannon, J.D.

    1998-12-31

    The Tracking and Analysis Framework (TAF) is a set of interactive computer models for integrated assessment of the Acid Rain Provisions (Title IV) of the 1990 Clean Air Act Amendments. TAF is designed to execute in minutes on a personal computer, thereby making it feasible for a researcher or policy analyst to examine quickly the effects of alternate modeling assumptions or policy scenarios. Because the development of TAF involves researchers in many different disciplines, TAF has been given a modular structure. In most cases, the modules contain reduced-form models that are based on more complete models exercised off-line. The structure of TAF as of December 1996 is shown. Both the Atmospheric Pathways Module produce estimates for regional air pollution variables.

  18. A Topological Framework for Local Structure Analysis in Condensed Matter

    E-Print Network [OSTI]

    Lazar, Emanuel A; Srolovitz, David J

    2015-01-01

    Physical systems are frequently modeled as sets of points in space, each representing the position of an atom, molecule, or mesoscale particle. As many properties of such systems depend on the underlying ordering of their constituent particles, understanding that structure is a primary objective of condensed matter research. Although perfect crystals are fully described by a set of translation and basis vectors, real-world materials are never perfect, as thermal vibrations and defects introduce significant deviation from ideal order. Meanwhile, liquids and glasses present yet more complexity. A complete understanding of structure thus remains a central, open problem. Here we propose a unified mathematical framework, based on the topology of the Voronoi cell of a particle, for classifying local structure in ordered and disordered systems that is powerful and practical. We explain the underlying reason why this topological description of local structure is better suited for structural analysis than continuous d...

  19. Multivariate analysis of neuronal interactions in the generalized partial least squares framework: simulations and empirical studies

    E-Print Network [OSTI]

    Multivariate analysis of neuronal interactions in the generalized partial least squares framework the brain. Multivariate analysis can explicitly test for multiple statistical models, including the designed paradigm, and allows for spatial and temporal model detection. Here, we investigate multivariate analysis

  20. The Nature of the Bioterrorism Threat

    SciTech Connect (OSTI)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  1. Analysis, Design and Development of a Generic Framework for Power Trading

    E-Print Network [OSTI]

    Analysis, Design and Development of a Generic Framework for Power Trading Rasmus Skovmark, s001509 analysis, design and development of a generic framework for automatic real- time trading of power among in their producing plans (e.g. wind power plant). The bid model is the best model for clients with units having

  2. A parallel and matrix free framework for global stability analysis of compressible flows

    E-Print Network [OSTI]

    Henze, O; Sesterhenn, J

    2015-01-01

    An numerical iterative framework for global modal stability analysis of compressible flows using a parallel environment is presented. The framework uses a matrix-free implementation to allow computations of large scale problems. Various methods are tested with regard to convergence acceleration of the framework. The methods consist of a spectral Cayley transformation used to select desired Eigenvalues from a large spectrum, an improved linear solver and a parallel block-Jacobi preconditioning scheme.

  3. A macro-micro system architecture analysis framework applied to Smart Grid meter data management systems by Sooraj Prasannan.

    E-Print Network [OSTI]

    Prasannan, Sooraj

    2010-01-01

    This thesis proposes a framework for architectural analysis of a system at the Macro and Micro levels. The framework consists of two phases -- Formulation and Analysis. Formulation is made up of three steps -- Identifying ...

  4. A Comparative Analysis of Architecture Frameworks Antony Tang Jun Han Pin Chen

    E-Print Network [OSTI]

    Han, Jun

    A Comparative Analysis of Architecture Frameworks Antony Tang Jun Han Pin Chen School of Information Technology DSTO C3 Research Centre Swinburne University of Technology Department of Defence.Chen@dsto.defence.gov.au Abstract Architecture frameworks are methods used in architecture modeling. They provide a structured

  5. A Collaborative Framework for Scientific Data Analysis and Visualization Jaliya Ekanayake, Shrideep Pallickara, and Geoffrey Fox

    E-Print Network [OSTI]

    Pallickara, Shrideep

    the world to a single data analysis session. The typical steps of a large-scale scientific data analysis areA Collaborative Framework for Scientific Data Analysis and Visualization Jaliya Ekanayake, Shrideep {jekanaya,spallick,gcf}@indiana.edu ABSTRACT Human interpretation is a common practice in many scientific

  6. Joint propagation of probability and possibility in risk analysis: Towards a formal framework

    E-Print Network [OSTI]

    Winckler, Marco Antonio Alba

    Joint propagation of probability and possibility in risk analysis: Towards a formal framework Ce by propagating uncertainty in risk analysis when some input parameters are stochastic and perfectly observable to the output of some function of interest from the risk analysis model can be either represented by a fuzzy

  7. Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid

    E-Print Network [OSTI]

    Kundur, Deepa

    Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid Deepa Kundur analysis of a smart grid. We focus on the model synthesis stage in which both cyber and physical grid-effect relationships can be conveniently expressed for both analysis and extension to large-scale smart grid systems. I

  8. A Conceptual Framework for Semantic Case-based Safety Analysis Olawande Daramola, Tor Stlhane

    E-Print Network [OSTI]

    .biffl}@tuwien.ac.at Abstract Hazard and Operability (HAZOP) Analysis and Fail- ure Mode and Effect Analysis (FMEA) are among-based framework for safety analy- sis, which facilitates the reuse of previous HAZOP and FMEA experiences in order application. Key words: Safety analysis, HAZOP, FMEA, ontology, requirements, case-based reasoning, natural

  9. Additive Manufacturing in China: Threats, Opportunities, and Developments (Part I)

    E-Print Network [OSTI]

    ANDERSON, Eric

    2013-01-01

    application of additive manufacturing in China’s aviationAnalysis May 2013 Additive Manufacturing in China: Threats,of China’s additive manufacturing industry is presented,

  10. Energy and Greenhouse Impacts of Biofuels: A Framework for Analysis

    E-Print Network [OSTI]

    Kammen, Daniel M.; Farrell, Alexander E.; Plevin, Richard J.; Jones, Andrew D.; Nemet, Gregory F.; Delucchi, Mark A.

    2008-01-01

    Greenhouse Gas Impacts of Biofuels Wang, M. (2001) "Energy & Greenhouse Gas Impacts of Biofuels Fuels and MotorLifecycle Analysis of Biofuels." Report UCD-ITS-RR-06-08.

  11. Accepted to Energy Policy, December 2011. A generic framework for the description and analysis of

    E-Print Network [OSTI]

    Hughes, Larry

    Accepted to Energy Policy, December 2011. ERG/201104 A generic framework for the description and analysis of energy security in an energy system Larry Hughes Energy Research Group Electrical and Computer for the description and analysis of energy security in an energy system Larry Hughes Energy Research Group Electrical

  12. Sustainability principles in strategic environmental assessment: A framework for analysis and examples from Italian urban planning

    SciTech Connect (OSTI)

    Lamorgese, Lydia Geneletti, Davide

    2013-09-15

    This paper presents a framework for analysing the degree of consideration of sustainability principles in Strategic environmental assessment (SEA), and demonstrates its application to a sample of SEA of Italian urban plans. The framework is based on Gibson's (2006) sustainability principles, which are linked to a number of guidance criteria and eventually to review questions, resulting from an extensive literature review. A total of 71 questions are included in the framework, which gives particular emphasis to key concepts, such as intragenerational and intergenerational equity. The framework was applied to review the Environmental Report of the urban plans of 15 major Italian cities. The results of this review show that, even if sustainability is commonly considered as a pivotal concept, there is still work to be done in order to effectively integrate sustainability principles into SEA. In particular, most of the attention is given to mitigation and compensation measures, rather than to actual attempts to propose more sustainable planning decisions in the first place. Concerning the proposed framework of analysis, further research is required to clarify equity concerns and particularly to identify suitable indicators for operationalizing the concepts of intra/inter-generational equity in decision-making. -- Highlights: ? A framework was developed in order to evaluate planning against sustainability criteria. ? The framework was applied to analyse how sustainable principles are addressed in 15 Italian SEA reports. ? Over 85% of the reports addressed, to some extent, at least 40% of the framework questions. ? Criteria explicitly linked to intra and inter-generational equity are rarely addressed.

  13. Proliferation: Threat and response

    SciTech Connect (OSTI)

    NONE

    1996-04-01

    During the height of the Cold War, the Russian physicist Andre Sakharov said, `Reducing the risk of annihilating humanity in a nuclear war carries an absolute priority over all other considerations.` The end of the Cold War has reduced the threat of global nuclear war, but today a new threat is rising from the global spread of nuclear, biological, and chemical weapons. Hostile groups and nations have tried - or have been able - to obtain these weapons, the technology, and homegrown ability to make them or ballistic missiles that can deliver the massive annihilation, poison, and death of these weapons hundreds of miles away. For rogue nations, these weapons are a ticket to power, stature, and confidence in regional war.

  14. A UNIFIED FRAMEWORK OF INFORMATION ASSURANCE FOR THE DESIGN AND ANALYSIS OF SECURITY ALGORITHMS

    E-Print Network [OSTI]

    Baras, John S.

    A UNIFIED FRAMEWORK OF INFORMATION ASSURANCE FOR THE DESIGN AND ANALYSIS OF SECURITY ALGORITHMS several information security goals, such as authentication, integrity and secrecy, have often been and the Institute for Systems Research, University of Maryland, College Park, MD, 20742 ABSTRACT Most information

  15. On a Modeling Framework for the Analysis of Interdependencies in Electric Power Systems

    E-Print Network [OSTI]

    Firenze, Università degli Studi di

    On a Modeling Framework for the Analysis of Interdependencies in Electric Power Systems Silvano, including the Electric Power System (EPS), through which vital services are provided. In existing EPS two co to single infrastruc- tures. Electric Power Systems (EPSs) are prominent rep- resentatives of critical

  16. A stochastic framework for uncertainty analysis in electric power transmission systems with wind generation

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    of generating units, the transfer of electric power over networks of transmission lines and, finally1 A stochastic framework for uncertainty analysis in electric power transmission systems with wind an electric transmission network with wind power generation and their impact on its reliability. A stochastic

  17. A unified framework for high-dimensional analysis of M-estimators with decomposable regularizers

    E-Print Network [OSTI]

    McAuliffe, Jon

    ] and hyper-spectral imaging in ecology [38], also lead to high-dimensional data sets. 1 #12;In the regime pA unified framework for high-dimensional analysis of M-estimators with decomposable regularizers of CS2 Department of Statistics3 UC Berkeley UT Austin UC Berkeley October 2010 Abstract High-dimensional

  18. A unified framework for high-dimensional analysis of M-estimators with decomposable regularizers

    E-Print Network [OSTI]

    Yu, Bin

    ] and hyper-spectral imaging in ecology [38], also lead to high-dimensional data sets. 1 #12;In the regime p nA unified framework for high-dimensional analysis of M-estimators with decomposable regularizers of CS2 Department of Statistics3 UC Berkeley UT Austin UC Berkeley October 2010 Abstract High-dimensional

  19. A Network Equilibrium Framework for Internet Advertising: Models, Qualitative Analysis, and Algorithms

    E-Print Network [OSTI]

    Nagurney, Anna

    A Network Equilibrium Framework for Internet Advertising: Models, Qualitative Analysis engaged in Internet advertising among multiple websites. The model allows for the determination of both the equilibrium online advertising budget as well as the advertising expenditures on the different websites. We

  20. A Security Framework for the Analysis and Design of Software Attestation

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    A Security Framework for the Analysis and Design of Software Attestation Frederik Armknecht.schulz@intel.com Christian Wachsmann Intel CRI-SC at TU Darmstadt, Germany christian.wachsmann@cased.de ABSTRACT Software with an expected strong impact in practice. It aims at verifying the software integrity of (typically) resource

  1. Aligning Technology Solutions to Address Over-the-Horizon Threats

    E-Print Network [OSTI]

    Aligning Technology Solutions to Address Over-the-Horizon Threats As the world's geopolitical for the U.S. Government bridging the gap between policy development and technology implementation WHAT WE-the-horizon security threats and issues Analysis results to support U.S. policymakers and the science and technology

  2. Fuel Cycle Analysis Framework Base Cases for the IAEA/INPRO GAINS Collaborative Project

    SciTech Connect (OSTI)

    Brent Dixon

    2012-09-01

    Thirteen countries participated in the Collaborative Project GAINS “Global Architecture of Innovative Nuclear Energy Systems Based on Thermal and Fast Reactors Including a Closed Fuel Cycle”, which was the primary activity within the IAEA/INPRO Program Area B: “Global Vision on Sustainable Nuclear Energy” for the last three years. The overall objective of GAINS was to develop a standard framework for assessing future nuclear energy systems taking into account sustainable development, and to validate results through sample analyses. This paper details the eight scenarios that constitute the GAINS framework base cases for analysis of the transition to future innovative nuclear energy systems. The framework base cases provide a reference for users of the framework to start from in developing and assessing their own alternate systems. Each base case is described along with performance results against the GAINS sustainability evaluation metrics. The eight cases include four using a moderate growth projection and four using a high growth projection for global nuclear electricity generation through 2100. The cases are divided into two sets, addressing homogeneous and heterogeneous scenarios developed by GAINS to model global fuel cycle strategies. The heterogeneous world scenario considers three separate nuclear groups based on their fuel cycle strategies, with non-synergistic and synergistic cases. The framework base case analyses results show the impact of these different fuel cycle strategies while providing references for future users of the GAINS framework. A large number of scenario alterations are possible and can be used to assess different strategies, different technologies, and different assumptions about possible futures of nuclear power. Results can be compared to the framework base cases to assess where these alternate cases perform differently versus the sustainability indicators.

  3. A Weighted Residual Framework for Formulation and Analysis of Direct Transcription Methods for Optimal Control 

    E-Print Network [OSTI]

    Singh, Baljeet

    2012-02-14

    . I am grateful to my roommates Surinder Pal and Navdeep Singh for making my stay at TAMU much like home. I thank my colleagues and friends, Hrishikesh, Shalom, Luis, Avinash, Roshmik, Parikshit, Sandeep, Abhishek, Xiaoli, Monika and Mrinal...-1 A WEIGHTED RESIDUAL FRAMEWORK FOR FORMULATION AND ANALYSIS OF DIRECT TRANSCRIPTION METHODS FOR OPTIMAL CONTROL A Dissertation by BALJEET SINGH Submitted to the O ce of Graduate Studies of Texas A&M University in partial ful llment...

  4. Bio-threat microparticle simulants

    DOE Patents [OSTI]

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  5. Additive Manufacturing in China: Threats, Opportunities, and Developments (Part I)

    E-Print Network [OSTI]

    ANDERSON, Eric

    2013-01-01

    application of additive manufacturing in China’s aviationAnalysis May 2013 Additive Manufacturing in China: Threats,an overview of China’s additive manufacturing industry is

  6. Integrated Information Technology Framework for Analysis of Data from Enrichment Plants to Support the Safeguards Mission

    SciTech Connect (OSTI)

    Marr, Clifton T.; Thurman, David A.; Jorgensen, Bruce V.

    2008-07-15

    ABSTRACT Many examples of software architectures exist that support process monitoring and analysis applications which could be applied to enrichment plants in a fashion that supports the Safeguards Mission. Pacific Northwest National Laboratory (PNNL) has developed mature solutions that will provide the framework to support online statistical analysis of enrichment plans and the entire nuclear fuel cycle. Most recently, PNNL has developed a refined architecture and supporting tools that address many of the common problems analysis and modeling environments experience: pipelining, handling large data volumes, and real-time performance. We propose the architecture and tools may be successfully used in furthering the goals of nuclear material control and accountability as both an aid to processing plant owners and as comprehensive monitoring for oversight teams.

  7. Failure Analysis of a Complex Learning Framework Incorporating Multi-Modal and Semi-Supervised Learning

    SciTech Connect (OSTI)

    Pullum, Laura L [ORNL; Symons, Christopher T [ORNL

    2011-01-01

    Machine learning is used in many applications, from machine vision to speech recognition to decision support systems, and is used to test applications. However, though much has been done to evaluate the performance of machine learning algorithms, little has been done to verify the algorithms or examine their failure modes. Moreover, complex learning frameworks often require stepping beyond black box evaluation to distinguish between errors based on natural limits on learning and errors that arise from mistakes in implementation. We present a conceptual architecture, failure model and taxonomy, and failure modes and effects analysis (FMEA) of a semi-supervised, multi-modal learning system, and provide specific examples from its use in a radiological analysis assistant system. The goal of the research described in this paper is to provide a foundation from which dependability analysis of systems using semi-supervised, multi-modal learning can be conducted. The methods presented provide a first step towards that overall goal.

  8. Preliminary thoughts concerning potential US Army threats/roles

    SciTech Connect (OSTI)

    Greene, R.A.; Solomon, K.A.; Miles, J.T.

    1991-06-01

    The rate at which the current world military/political perspective is changing demands consideration of a broader spectrum of potential threats then has been the case for the past few decades--during which the Soviet Union was the preeminent threat. Seemingly overnight, the cold war ceased, the requirement for massive U.S. military counters to the Soviet Union forces faded, and an era of constant (obvious) military threat disappeared. This situation has in turn been revolutionized by the Iraq invasion of Kuwait and the U.S. response. The paper addresses part of the problem facing military planners by defining a spectrum of threats that typify those the U.S. Army might face over the next decade or two. The purpose of the threat set is to support the evaluation of the effectiveness and usefulness, to the U.S. Army, of advanced technologies. The set of threats is intended to provide a complete set of characteristics rather then to be a complete list of the possibilities; it is illustrative rather than exhaustive. Although largely completed before the war with Iraq started, its content is still valid in that its purpose is to provide a framework for thinking about future U.S. Army technology needs.

  9. Bridging Human Reliability Analysis and Psychology, Part 2: A Cognitive Framework to Support HRA

    SciTech Connect (OSTI)

    April M. Whaley; Stacey M. L. Hendrickson; Ronald L. Boring; Jing Xing

    2012-06-01

    This is the second of two papers that discuss the literature review conducted as part of the U.S. Nuclear Regulatory Commission (NRC) effort to develop a hybrid human reliability analysis (HRA) method in response to Staff Requirements Memorandum (SRM) SRM-M061020. This review was conducted with the goal of strengthening the technical basis within psychology, cognitive science and human factors for the hybrid HRA method being proposed. An overview of the literature review approach and high-level structure is provided in the first paper, whereas this paper presents the results of the review. The psychological literature review encompassed research spanning the entirety of human cognition and performance, and consequently produced an extensive list of psychological processes, mechanisms, and factors that contribute to human performance. To make sense of this large amount of information, the results of the literature review were organized into a cognitive framework that identifies causes of failure of macrocognition in humans, and connects those proximate causes to psychological mechanisms and performance influencing factors (PIFs) that can lead to the failure. This cognitive framework can serve as a tool to inform HRA. Beyond this, however, the cognitive framework has the potential to also support addressing human performance issues identified in Human Factors applications.

  10. Uncertainty Analysis Framework - Hanford Site-Wide Groundwater Flow and Transport Model

    SciTech Connect (OSTI)

    Cole, Charles R.; Bergeron, Marcel P.; Murray, Christopher J.; Thorne, Paul D.; Wurstner, Signe K.; Rogers, Phillip M.

    2001-11-09

    Pacific Northwest National Laboratory (PNNL) embarked on a new initiative to strengthen the technical defensibility of the predictions being made with a site-wide groundwater flow and transport model at the U.S. Department of Energy Hanford Site in southeastern Washington State. In FY 2000, the focus of the initiative was on the characterization of major uncertainties in the current conceptual model that would affect model predictions. The long-term goals of the initiative are the development and implementation of an uncertainty estimation methodology in future assessments and analyses using the site-wide model. This report focuses on the development and implementation of an uncertainty analysis framework.

  11. A FRAMEWORK FOR THE ANALYSIS OF LOCALIZED CORROSION AT THE PROPOSED YUCCA MOUNTAIN REPOSITORY

    SciTech Connect (OSTI)

    Dr. J.H. Payer

    2006-04-18

    Corrosion is a primary determinant of waste package performance at the proposed Yucca Mountain Repository: (1) the most likely degradation process; (2) controls the delay time for radionuclide transport from the waste package; and (3) determines when packages will be penetrated and the shape size and distribution of those penetrations. In this presentation a framework for the analysis of localized corrosion is presented and demonstrated for a scenario: (1) water chemistry of mixed salt solutions (sodium chloride-potassium nitrate); and (2) time-temperature-relative humidity profiles for a hot, mid and cool temperature waste package.

  12. A Data Analytics Framework for Smart Grids: Spatio-temporal Wind Power Analysis and Synchrophasor Data Mining

    E-Print Network [OSTI]

    Zhang, Junshan

    A Data Analytics Framework for Smart Grids: Spatio-temporal Wind Power Analysis and Synchrophasor-temporal wind power analysis for wind generation forecast and integration, and II) data mining and information fusion of synchrophasor measurements toward secure power grids. Part I is centered around wind power

  13. Tracking and Analysis Framework (TAF) model documentation and user`s guide

    SciTech Connect (OSTI)

    Bloyd, C.; Camp, J.; Conzelmann, G.

    1996-12-01

    With passage of the 1990 Clean Air Act Amendments, the United States embarked on a policy for controlling acid deposition that has been estimated to cost at least $2 billion. Title IV of the Act created a major innovation in environmental regulation by introducing market-based incentives - specifically, by allowing electric utility companies to trade allowances to emit sulfur dioxide (SO{sub 2}). The National Acid Precipitation Assessment Program (NAPAP) has been tasked by Congress to assess what Senator Moynihan has termed this {open_quotes}grand experiment.{close_quotes} Such a comprehensive assessment of the economic and environmental effects of this legislation has been a major challenge. To help NAPAP face this challenge, the U.S. Department of Energy (DOE) has sponsored development of an integrated assessment model, known as the Tracking and Analysis Framework (TAF). This section summarizes TAF`s objectives and its overall design.

  14. An impulse framework for hydrodynamic force analysis : fish propulsion, water entry of spheres, and marine propellers

    E-Print Network [OSTI]

    Epps, Brenden P

    2010-01-01

    This thesis presents an impulse framework for analyzing the hydrodynamic forces on bodies in flow. This general theoretical framework is widely applicable, and it is used to address the hydrodynamics of fish propulsion, ...

  15. Cyber Threats to Nuclear Infrastructures

    SciTech Connect (OSTI)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  16. Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Frincke, Deborah A.

    2010-09-01

    The purpose of this chapter is to motivate the combination of traditional cyber security audit data with psychosocial data, so as to move from an insider threat detection stance to one that enables prediction of potential insider presence. Two distinctive aspects of the approach are the objective of predicting or anticipating potential risks and the use of organizational data in addition to cyber data to support the analysis. The chapter describes the challenges of this endeavor and progress in defining a usable set of predictive indicators, developing a framework for integrating the analysis of organizational and cyber security data to yield predictions about possible insider exploits, and developing the knowledge base and reasoning capability of the system. We also outline the types of errors that one expects in a predictive system versus a detection system and discuss how those errors can affect the usefulness of the results.

  17. A life cycle cost analysis framework for geologic storage of hydrogen : a scenario analysis.

    SciTech Connect (OSTI)

    Kobos, Peter Holmes; Lord, Anna Snider; Borns, David James

    2010-10-01

    The U.S. Department of Energy has an interest in large scale hydrogen geostorage, which would offer substantial buffer capacity to meet possible disruptions in supply. Geostorage options being considered are salt caverns, depleted oil/gas reservoirs, aquifers and potentially hard rock cavrns. DOE has an interest in assessing the geological, geomechanical and economic viability for these types of hydrogen storage options. This study has developed an ecocomic analysis methodology to address costs entailed in developing and operating an underground geologic storage facility. This year the tool was updated specifically to (1) a version that is fully arrayed such that all four types of geologic storage options can be assessed at the same time, (2) incorporate specific scenarios illustrating the model's capability, and (3) incorporate more accurate model input assumptions for the wells and storage site modules. Drawing from the knowledge gained in the underground large scale geostorage options for natural gas and petroleum in the U.S. and from the potential to store relatively large volumes of CO{sub 2} in geological formations, the hydrogen storage assessment modeling will continue to build on these strengths while maintaining modeling transparency such that other modeling efforts may draw from this project.

  18. Baseline Inputs for BEAMS: Data used in preparing Methodological Framework for Analysis of Building-Related Programs: The GPRA Metrics Effort, June 2004

    SciTech Connect (OSTI)

    Elliott, Douglas B.; Anderson, Dave M.; Belzer, David B.; Cort, Katherine A.; Dirks, James A.; Hostick, Donna J.

    2004-06-18

    This report contains the appendix to the PNNL report, Methodological Framework for Analysis of Buildings-Related Programs: The GPRA Metrics Effort.

  19. A system-of-systems framework of Nuclear Power Plant Probabilistic Seismic Hazard Analysis by Fault Tree analysis and Monte Carlo simulation

    E-Print Network [OSTI]

    Boyer, Edmond

    A system-of-systems framework of Nuclear Power Plant Probabilistic Seismic Hazard Analysis by Fault consider the impacts produced on a nuclear power plant (the critical plant) embedded in the connected power simulation. As outcome of the analysis, the probability that the nuclear power plant reaches an unsafe state

  20. The nature of threat category changes in three Mediterranean biodiversity hotspots Felipe Domnguez Lozano a,e,

    E-Print Network [OSTI]

    Moreno Saiz, Juan Carlos

    Conservation assessments Red List Spain Threat analysis Threatened plants IUCN categories Western Australia a b practitioners to rank threatened species according to their threat status. Specifically for plants, a Red List is a floristic catalogue where plants are classified according to their level of threat. Usually these Red Lists

  1. Running head: PLSCA FOR BEHAVIORALAND GENETIC DATA 1 Partial Least Squares-Correspondence Analysis: A framework to simultaneously analyze

    E-Print Network [OSTI]

    Abdi, Hervé

    : A framework to simultaneously analyze behavioral and genetic data Derek Beaton* School of Behavioral and BrainRunning head: PLSCA FOR BEHAVIORALAND GENETIC DATA 1 Partial Least Squares-Correspondence Analysis Sciences The University of Texas at Dallas MS: GR4.1 800 West Campbell Rd. Richardson, TX 75080 USA Joseph

  2. An Analysis Framework for Investigating the Trade-offs Between System Performance and Energy Consumption in a Heterogeneous Computing Environment

    E-Print Network [OSTI]

    Maciejewski, Anthony A. "Tony"

    An Analysis Framework for Investigating the Trade-offs Between System Performance and Energy that will allow a system administrator to investigate the trade- offs between system energy consumption be useful to examine the trade-offs between minimizing energy consumption and maximizing computing

  3. Nuclear Radiological Threat Task Force Established | National...

    National Nuclear Security Administration (NNSA)

    Radiological Threat Task Force Established | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  4. Chlorine Gas: An Evolving Hazardous Material Threat and Unconventional Weapon

    E-Print Network [OSTI]

    Jones, Robert; Wills, Brandon; Kang, Christopher

    2010-01-01

    Chlorine Gas: An Evolving Hazardous Material Threat andChlorine gas represents a hazardous material threat fromrepresents a persistent hazardous material (HAZMAT) threat.

  5. A Mathematical Framework for the Analysis of Cyber-Resilient Control Systems

    SciTech Connect (OSTI)

    Melin, Alexander M; Ferragut, Erik M; Laska, Jason A; Fugate, David L; Kisner, Roger

    2013-01-01

    The increasingly recognized vulnerability of industrial control systems to cyber-attacks has inspired a considerable amount of research into techniques for cyber-resilient control systems. The majority of this effort involves the application of well known information security (IT) techniques to control system networks. While these efforts are important to protect the control systems that operate critical infrastructure, they are never perfectly effective. Little research has focused on the design of closed-loop dynamics that are resilient to cyber-attack. The majority of control system protection measures are concerned with how to prevent unauthorized access and protect data integrity. We believe that the ability to analyze how an attacker can effect the closed loop dynamics of a control system configuration once they have access is just as important to the overall security of a control system. To begin to analyze this problem, consistent mathematical definitions of concepts within resilient control need to be established so that a mathematical analysis of the vulnerabilities and resiliencies of a particular control system design methodology and configuration can be made. In this paper, we propose rigorous definitions for state awareness, operational normalcy, and resiliency as they relate to control systems. We will also discuss some mathematical consequences that arise from the proposed definitions. The goal is to begin to develop a mathematical framework and testable conditions for resiliency that can be used to build a sound theoretical foundation for resilient control research.

  6. Gradient Analysis and Classification of Carolina Bay Vegetation: A Framework for Bay Wetlands Conservation and Restoration

    SciTech Connect (OSTI)

    Diane De Steven,Ph.D.; Maureen Tone,PhD.

    1997-10-01

    This report address four project objectives: (1) Gradient model of Carolina bay vegetation on the SRS--The authors use ordination analyses to identify environmental and landscape factors that are correlated with vegetation composition. Significant factors can provide a framework for site-based conservation of existing diversity, and they may also be useful site predictors for potential vegetation in bay restorations. (2) Regional analysis of Carolina bay vegetation diversity--They expand the ordination analyses to assess the degree to which SRS bays encompass the range of vegetation diversity found in the regional landscape of South Carolina's western Upper Coastal Plain. Such comparisons can indicate floristic status relative to regional potentials and identify missing species or community elements that might be re-introduced or restored. (3) Classification of vegetation communities in Upper Coastal Plain bays--They use cluster analysis to identify plant community-types at the regional scale, and explore how this classification may be functional with respect to significant environmental and landscape factors. An environmentally-based classification at the whole-bay level can provide a system of templates for managing bays as individual units and for restoring bays to desired plant communities. (4) Qualitative model for bay vegetation dynamics--They analyze present-day vegetation in relation to historic land uses and disturbances. The distinctive history of SRS bays provides the possibility of assessing pathways of post-disturbance succession. They attempt to develop a coarse-scale model of vegetation shifts in response to changing site factors; such qualitative models can provide a basis for suggesting management interventions that may be needed to maintain desired vegetation in protected or restored bays.

  7. A life cycle cost analysis framework for geologic storage of hydrogen : a user's tool.

    SciTech Connect (OSTI)

    Kobos, Peter Holmes; Lord, Anna Snider; Borns, David James; Klise, Geoffrey T.

    2011-09-01

    The U.S. Department of Energy (DOE) has an interest in large scale hydrogen geostorage, which could offer substantial buffer capacity to meet possible disruptions in supply or changing seasonal demands. The geostorage site options being considered are salt caverns, depleted oil/gas reservoirs, aquifers and hard rock caverns. The DOE has an interest in assessing the geological, geomechanical and economic viability for these types of geologic hydrogen storage options. This study has developed an economic analysis methodology and subsequent spreadsheet analysis to address costs entailed in developing and operating an underground geologic storage facility. This year the tool was updated specifically to (1) incorporate more site-specific model input assumptions for the wells and storage site modules, (2) develop a version that matches the general format of the HDSAM model developed and maintained by Argonne National Laboratory, and (3) incorporate specific demand scenarios illustrating the model's capability. Four general types of underground storage were analyzed: salt caverns, depleted oil/gas reservoirs, aquifers, and hard rock caverns/other custom sites. Due to the substantial lessons learned from the geological storage of natural gas already employed, these options present a potentially sizable storage option. Understanding and including these various geologic storage types in the analysis physical and economic framework will help identify what geologic option would be best suited for the storage of hydrogen. It is important to note, however, that existing natural gas options may not translate to a hydrogen system where substantial engineering obstacles may be encountered. There are only three locations worldwide that currently store hydrogen underground and they are all in salt caverns. Two locations are in the U.S. (Texas), and are managed by ConocoPhillips and Praxair (Leighty, 2007). The third is in Teeside, U.K., managed by Sabic Petrochemicals (Crotogino et al., 2008; Panfilov et al., 2006). These existing H{sub 2} facilities are quite small by natural gas storage standards. The second stage of the analysis involved providing ANL with estimated geostorage costs of hydrogen within salt caverns for various market penetrations for four representative cities (Houston, Detroit, Pittsburgh and Los Angeles). Using these demand levels, the scale and cost of hydrogen storage necessary to meet 10%, 25% and 100% of vehicle summer demands was calculated.

  8. A Framework for Coupled Deformation-Diffusion Analysis with Application to Degradation/Healing 

    E-Print Network [OSTI]

    Mudunuru, Maruti Kumar

    2012-07-16

    . Representative numerical examples are presented to show the robustness, convergence, and performance of the proposed computational framework. Another contribution is to systematically study the affect of transport of the diffusant on the deformation of the solid...

  9. Rapidly assessing the activation conditions and porosity of metal-organic frameworks using thermogravimetric analysis

    SciTech Connect (OSTI)

    McDonald, TM; Bloch, ED; Long, JR

    2015-01-01

    A methodology utilizing a thermogravimetric analyzer to monitor propane uptake following incremental increases of the temperature is demonstrated as a means of rapidly identifying porous materials and determining the optimum activation conditions of metal-organic frameworks.

  10. Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity

    E-Print Network [OSTI]

    Cho, Yiseul

    2012-01-01

    The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and ...

  11. Political Economy As A Conceptual Framework For The Analysis Of School-University Cooperation

    E-Print Network [OSTI]

    Mahlios, Marc C.; Carpenter, Robert L.

    1982-01-01

    This article presents a further explication of school-university cooperation, a subject initially addressed by these authors in the Summer, 1982 issue of this Journal. Political economy theory is used as a framework for analyzing...

  12. An Integrated Geovisual Analytics Framework for Analysis of Energy Consumption Data and Renewable Energy Potentials

    SciTech Connect (OSTI)

    Omitaomu, Olufemi A; Maness, Christopher S; Kramer, Ian S; Kodysh, Jeffrey B; Bhaduri, Budhendra L; Steed, Chad A; Karthik, Rajasekar; Nugent, Philip J; Myers, Aaron T

    2012-01-01

    We present an integrated geovisual analytics framework for utility consumers to interactively analyze and benchmark their energy consumption. The framework uses energy and property data already available with the utility companies and county governments respectively. The motivation for the developed framework is the need for citizens to go beyond the conventional utility bills in understanding the patterns in their energy consumption. There is also a need for citizens to go beyond one-time improvements that are often not monitored and measured over time. Some of the features of the framework include the ability for citizens to visualize their historical energy consumption data along with weather data in their location. The quantity of historical energy data available is significantly more than what is available from utility bills. An overlay of the weather data provides users with a visual correlation between weather patterns and their energy consumption patterns. Another feature of the framework is the ability for citizens to compare their consumption on an aggregated basis to that of their peers other citizens living in houses of similar size and age and within the same or different geographical boundaries, such as subdivision, zip code, or county. The users could also compare their consumption to others based on the size of their family and other attributes. This feature could help citizens determine if they are among the best in class . The framework can also be used by the utility companies to better understand their customers and to plan their services. To make the framework easily accessible, it is developed to be compatible with mobile consumer electronics devices.

  13. An Analysis Framework for Investigating the Trade-offs Between System Performance and Energy Consumption in a Heterogeneous Computing Environment

    SciTech Connect (OSTI)

    Friese, Ryan; Khemka, Bhavesh; Maciejewski, Anthony A; Siegel, Howard Jay; Koenig, Gregory A; Powers, Sarah S; Hilton, Marcia M; Rambharos, Rajendra; Okonski, Gene D; Poole, Stephen W

    2013-01-01

    Rising costs of energy consumption and an ongoing effort for increases in computing performance are leading to a significant need for energy-efficient computing. Before systems such as supercomputers, servers, and datacenters can begin operating in an energy-efficient manner, the energy consumption and performance characteristics of the system must be analyzed. In this paper, we provide an analysis framework that will allow a system administrator to investigate the tradeoffs between system energy consumption and utility earned by a system (as a measure of system performance). We model these trade-offs as a bi-objective resource allocation problem. We use a popular multi-objective genetic algorithm to construct Pareto fronts to illustrate how different resource allocations can cause a system to consume significantly different amounts of energy and earn different amounts of utility. We demonstrate our analysis framework using real data collected from online benchmarks, and further provide a method to create larger data sets that exhibit similar heterogeneity characteristics to real data sets. This analysis framework can provide system administrators with insight to make intelligent scheduling decisions based on the energy and utility needs of their systems.

  14. Systems analysis of past, present, and future chemical terrorism scenarios.

    SciTech Connect (OSTI)

    Hoette, Trisha Marie

    2012-03-01

    Throughout history, as new chemical threats arose, strategies for the defense against chemical attacks have also evolved. As a part of an Early Career Laboratory Directed Research and Development project, a systems analysis of past, present, and future chemical terrorism scenarios was performed to understand how the chemical threats and attack strategies change over time. For the analysis, the difficulty in executing chemical attack was evaluated within a framework of three major scenario elements. First, historical examples of chemical terrorism were examined to determine how the use of chemical threats, versus other weapons, contributed to the successful execution of the attack. Using the same framework, the future of chemical terrorism was assessed with respect to the impact of globalization and new technologies. Finally, the efficacy of the current defenses against contemporary chemical terrorism was considered briefly. The results of this analysis justify the need for continued diligence in chemical defense.

  15. Flashback: Rapid scanning for radiological threats

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    threats The ability to identify distinct material density enables the Multi-Mode Passive Detection System (MMPDS)to quickly detect unshielded to heavily shielded nuclear...

  16. Autonomous Realtime Threat-Hunting Robot (ARTHR

    ScienceCinema (OSTI)

    INL

    2009-09-01

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  17. A nanotubular metal-organic framework with permanent porosity : structure analysis and gas sorption studies.

    SciTech Connect (OSTI)

    Ma, S.; Simmons, J. M.; Li, J. R.; Yuan, D.; Weng, W.; Liu, D. J.; Zhou, H. C.; Chemical Sciences and Engineering Division; Texas A&M Univ.; NIST

    2009-01-01

    A nanotubular metal-organic framework, PCN-19, was constructed based on a micro3-oxo-trinickel basic carboxylate secondary building unit (SBU) and the 9,10-anthracenedicarboxylate ligand; its permanent porosity was confirmed by N2 adsorption isotherms, and its H2 storage performances were evaluated under both low and high pressures at 77 K.

  18. An Image Analysis Framework for the Early Assessment of Hypertensive Retinopathy Signs

    E-Print Network [OSTI]

    Zabulis, Xenophon

    of the image processing, much effort has been devoted for segmenting the retinal vasculature and extracting its a framework for the detection and measurement of retinal vessels in fundoscopy images. The proposed method segments retinal vessels, enabling the actual measurement of the vessel diameter. A Graphical User

  19. Hardware Trojan Attacks: Threat Analysis and

    E-Print Network [OSTI]

    Bhunia, Swarup

    . The nomenclature is derived from a mythological incident attributed to the ancient Greeks in the Trojan war, where a wooden horse was gifted to the Trojan army who took it into their city walls without realizing that the enemy (Greek) soldiers were hidden inside the hollow horse. The seemingly trustworthy horse

  20. EM threat analysis for wireless systems.

    SciTech Connect (OSTI)

    Burkholder, R. J. (Ohio State University Electroscience Laboratory); Mariano, Robert J.; Schniter, P. (Ohio State University Electroscience Laboratory); Gupta, I. J. (Ohio State University Electroscience Laboratory)

    2006-06-01

    Modern digital radio systems are complex and must be carefully designed, especially when expected to operate in harsh propagation environments. The ability to accurately predict the effects of propagation on wireless radio performance could lead to more efficient radio designs as well as the ability to perform vulnerability analyses before and after system deployment. In this report, the authors--experts in electromagnetic (EM) modeling and wireless communication theory--describe the construction of a simulation environment that is capable of quantifying the effects of wireless propagation on the performance of digital communication.

  1. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    of cryptography as it relates to the computer security industry. We will look at some of the underlying technologyIBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net September . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly

  2. Commercial Aircraft Corporation of China (Comac) attempts to break the Airbus-Boeing duopoly, will it succeed? : an industry analysis framework applied

    E-Print Network [OSTI]

    Fuentes, Jose L., S.M. Massachusetts Institute of Technology

    2011-01-01

    Using an industry analysis framework, this thesis analyzes whether the recently established Commercial Aircraft Corporation of China (Comac) is likely to break the Boeing-Airbus duopoly in the industry of large commercial ...

  3. A Framework for Risk Analysis for Ecological Restoration Projects in the U.S. Army Corps of Engineers

    SciTech Connect (OSTI)

    Diefenderfer, Heida L.; Thom, Ronald M.; Hofseth, Keith

    2005-01-03

    This report provides a framework for incorporating risk analysis into the six-step planning process for ecosystem restoration projects. This report is part of a larger research and development effort to develop procedures and guidelines for risk analysis in USACE ecosystem restoration planning. The focus is on risk analysis: identifying the range of possible outcomes from alternative ecosystem restoration actions, assessing the potential for achieving the desired outcome, characterizing the likelihood of adverse consequences, and communicating these findings to stakeholders and decision makers. This framework document makes simplifying assumptions to allow a focus on incorporating risk information in the planning and decision-making process. A conceptual model of the site and landscape is advocated as a central organizing structure within the six-step process for ecosystem restoration project planning. This is responsive to USACE directives that restoration projects be conceived in a systems context using an ecosystem and/or watershed approach. The conceptual model delineates the empirical quantities to be addressed in risk analysis and modeling. Although the planning process is described in six distinct steps, in practice these steps are iterative and often carried out simultaneously. Risk analysis within this context has the same character. The approach for incorporating risk analysis into the planning process provides direction intended to help the planner: • Identify the levels of uncertainty that are acceptable, at the start of the planning process. • Use conceptual and numerical models to communicate the planning team’s understanding of the ecosystem to others, and reduce the risk of mis-specifying the system. • Consider the uncertainty associated with the variables chosen to measure project effects. • Use alternative designs to manage identified uncertainty. • Use risk information to eliminate alternatives with unacceptable risk from consideration. • Incorporate risk analysis into the USACE four criteria of effectiveness, efficiency, completeness, and acceptability. • Use an alternative’s irreducible uncertainty as an attribute to be considered along with other attributes in the comparison of alternative plans. • Use risk information in the final plan selection process. There are three other efforts associated with this framework document, which offer information and guidance for incorporating risk analysis into cost-estimation, and biological and hydrologic modeling.

  4. THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS

    SciTech Connect (OSTI)

    J. F. PILAT

    2000-03-01

    Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

  5. A mathematical framework for delay analysis in single source networks Axel Parmentier, Samitha Samaranayake, Yiguang (Ethan) Xuan, Alexandre Bayen

    E-Print Network [OSTI]

    Samaranayake, Yiguang (Ethan) Xuan, Alexandre Bayen Abstract-- This article presents a mathematical framework

  6. 2014 Annual Planning Summary for the NNSA Global Threat Reduction...

    Energy Savers [EERE]

    Global Threat Reduction Initiative Office 2014 Annual Planning Summary for the NNSA Global Threat Reduction Initiative Office The ongoing and projected Environmental Assessments...

  7. Before the House Subcommittee on Emerging Threats, Cyber Security...

    Office of Environmental Management (EM)

    Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and...

  8. The rise of "china threat" arguments

    E-Print Network [OSTI]

    Ueki, Chikako

    2006-01-01

    The study seeks to explain the rise of "China threat" arguments in the United States and Japan in the 1990s by using three theories of states behavior- realism, organization theory, and democratic peace theory. The rise ...

  9. Overlooked? The Growing Threat of Desertification

    E-Print Network [OSTI]

    Zhu, Julian

    2012-01-01

    of land degradation and desertification in Libya: Need forLu, J. (2010). Aeolian desertification and its causes in thethat the threat of desertification is both very real and

  10. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    ScienceCinema (OSTI)

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2010-01-08

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  11. Framework for the Economic Analysis of Hybrid Systems Based on Exergy Consumption

    SciTech Connect (OSTI)

    Cristian Rabiti; Robert S. Cherry; Wesley R. Deason; Piyush Sabharwall; Shannon M. Bragg-Sitton; Richard D. Boardman

    2014-08-01

    Starting from an overview of the dynamic behavior of the electricity market the need of the introduction of energy users that will provide a damping capability to the system is derived as also a qualitative analysis of the impact of uncertainty, both in the demand and supply side, is performed. Then it follows an introduction to the investment analysis methodologies based on the discounting of the cash flow, and then work concludes with the illustration and application of the exergonomic principles to provide a sound methodology for the cost accounting of the plant components to be used in the cash flow analysis.

  12. Bio-Terrorism Threat and Casualty Prevention

    SciTech Connect (OSTI)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  13. RIS-M-2519 A FRAMEWORK FOR COGNITIVE TASK ANALYSIS IN SYSTEMS DESIGN

    E-Print Network [OSTI]

    activities in decision making. Automation removes the humans from routine tasks, and operators are left; FUNCTIONAL ANALYSIS; HUMAN FACTORS; INDUSTRIAL PLANTS; MAN-MACHINE SYSTEMS; MONITORING; PLANNING; RISK the early phases of the industrial deve

  14. Energy and Greenhouse Gas Impacts of Biofuels: A Framework for Analysis

    E-Print Network [OSTI]

    Kammen, Daniel M.; Farrell, Alexander E; Plevin, Richard J; Jones, Andrew; Nemet, Gregory F; Delucchi, Mark

    2008-01-01

    Greenhouse Gas Impacts of Biofuels Wang, M. (2001) "Energy & Greenhouse Gas Impacts of Biofuels Fuels and MotorLifecycle Analysis of Biofuels." Report UCD-ITS-RR-06-08.

  15. Improvement of a Multiscale Framework for the Analysis of Composite Materials 

    E-Print Network [OSTI]

    Ballard, Michael Keith

    2014-08-11

    methods used in the inverse analyses include:finite element analysis (FEA) with a hexagonal microstructure, FEA with a random microstructure, and Mori-Tanaka averaging scheme. Fiber properties determined using FEA with a hexagonal microstructure...

  16. Biogranat: An Extensible Framework for the Visualization and Analysis of Gene Regulatory Networks

    E-Print Network [OSTI]

    Ahlers, Volker - Fakultät IV

    -06-04 10 #12;Existing Solutions Existing software tools and libraries (selection): Tools: Cytoscape, Pajek and Analysis of Gene Regulatory Networks Volker Ahlers ­ 2008-06-04 7 Graph Drawing Aesthetic criteria of graph within new plugins. Platform-independent open-source software. Command logging/scripting functionality

  17. SEME FRAMEWORK

    Energy Science and Technology Software Center (OSTI)

    003284MLTPL00 Sequentially Executed Model Evaluation Framework  https://software.sandia.gov/svn/teva/canary 

  18. GridOPTICS(TM) A Novel Software Framework for Integrating Power Grid Data Storage, Management and Analysis

    SciTech Connect (OSTI)

    Gorton, Ian; Yin, Jian; Akyol, Bora A.; Ciraci, Selim; Critchlow, Terence; Liu, Yan; Gibson, Tara D.; Purohit, Sumit; Sharma, Poorva; Vlachopoulou, Maria

    2013-01-09

    This paper describes the architecture and design of GridOPTICSTM, a novel software framework to integrate a collection of software tools developed by PNNL’s Future Power Grid Initiative (FPGI) into a coherent, powerful operations and planning tool for the power grid of the future. GridOPTICSTM enables plug-and-play of various analysis, modeling and visualization software tools for fast and accurate control of the power grid. To bridge the data access for different control purposes, GridOPTICSTM provides a scalable and thin layer of event processing that hides the complexity of data storage and management. The initial prototype of GridOPTICSTM was demonstrated with several use cases from PNNL’s FPGI.

  19. Approach to proliferation risk assessment based on multiple objective analysis framework

    SciTech Connect (OSTI)

    Andrianov, A.; Kuptsov, I.

    2013-07-01

    The approach to the assessment of proliferation risk using the methods of multi-criteria decision making and multi-objective optimization is presented. The approach allows the taking into account of the specifics features of the national nuclear infrastructure, and possible proliferation strategies (motivations, intentions, and capabilities). 3 examples of applying the approach are shown. First, the approach has been used to evaluate the attractiveness of HEU (high enriched uranium)production scenarios at a clandestine enrichment facility using centrifuge enrichment technology. Secondly, the approach has been applied to assess the attractiveness of scenarios for undeclared production of plutonium or HEU by theft of materials circulating in nuclear fuel cycle facilities and thermal reactors. Thirdly, the approach has been used to perform a comparative analysis of the structures of developing nuclear power systems based on different types of nuclear fuel cycles, the analysis being based on indicators of proliferation risk.

  20. Mathematical framework for the analysis of dynamic stochastic systems with the RAVEN code

    SciTech Connect (OSTI)

    Rabiti, C.; Mandelli, D.; Alfonsi, A.; Cogliati, J.; Kinoshita, R.

    2013-07-01

    RAVEN (Reactor Analysis and Virtual control Environment) is a software code under development at Idaho National Laboratory aimed at performing probabilistic risk assessment and uncertainty quantification using RELAP-7, for which it acts also as a simulation controller. In this paper we will present the equations characterizing a dynamic stochastic system and we will then discuss the behavior of each stochastic term and how it is accounted for in the RAVEN software design. Moreover we will present preliminary results of the implementation. (authors)

  1. MATHEMATICAL FRAMEWORK FOR THE ANALYSIS OF DYNAMC STOCHASTIC SYSTEMS WITH THE RAVEN CODE

    SciTech Connect (OSTI)

    C. Rabiti; D. Mandelli; J. Cogliati; R. Kinoshita

    2013-05-01

    RAVEN (Reactor Analysis and Virtual control Environment) is a software code under development at Idaho National Laboratory aimed at performing probabilistic risk assessment and uncertainty quantification using RELAP-7, for which it acts also as a simulation controller. In this paper we will present the equations characterizing a dynamic stochastic system and we will then discuss the behavior of each stochastic term and how it is accounted for in the RAVEN software design. Moreover we will present preliminary results of the implementation.

  2. FUTURE THREATS AYCOCK & MAURUSHAT 275VIRUS BULLETIN CONFERENCE SEPTEMBER 2007

    E-Print Network [OSTI]

    Aycock, John

    FUTURE THREATS AYCOCK & MAURUSHAT 275VIRUS BULLETIN CONFERENCE SEPTEMBER 2007 FUTURE THREATS John.maurushat@unsw.edu.au ABSTRACT `Aren't you just giving the virus writers ideas?' Research into future security threats begin to examine how far security research can go in terms of looking at future threats, particularly

  3. Methodological Framework for Analysis of Buildings-Related Programs: The GPRA Metrics Effort

    SciTech Connect (OSTI)

    Elliott, Douglas B.; Anderson, Dave M.; Belzer, David B.; Cort, Katherine A.; Dirks, James A.; Hostick, Donna J.

    2004-06-18

    The requirements of the Government Performance and Results Act (GPRA) of 1993 mandate the reporting of outcomes expected to result from programs of the Federal government. The U.S. Department of Energy’s (DOE’s) Office of Energy Efficiency and Renewable Energy (EERE) develops official metrics for its 11 major programs using its Office of Planning, Budget Formulation, and Analysis (OPBFA). OPBFA conducts an annual integrated modeling analysis to produce estimates of the energy, environmental, and financial benefits expected from EERE’s budget request. Two of EERE’s major programs include the Building Technologies Program (BT) and Office of Weatherization and Intergovernmental Program (WIP). Pacific Northwest National Laboratory (PNNL) supports the OPBFA effort by developing the program characterizations and other market information affecting these programs that is necessary to provide input to the EERE integrated modeling analysis. Throughout the report we refer to these programs as “buildings-related” programs, because the approach is not limited in application to BT or WIP. To adequately support OPBFA in the development of official GPRA metrics, PNNL communicates with the various activities and projects in BT and WIP to determine how best to characterize their activities planned for the upcoming budget request. PNNL then analyzes these projects to determine what the results of the characterizations would imply for energy markets, technology markets, and consumer behavior. This is accomplished by developing nonintegrated estimates of energy, environmental, and financial benefits (i.e., outcomes) of the technologies and practices expected to result from the budget request. These characterizations and nonintegrated modeling results are provided to OPBFA as inputs to the official benefits estimates developed for the Federal Budget. This report documents the approach and methodology used to estimate future energy, environmental, and financial benefits produced by technologies and practices supported by BT and by WIP. However, the approach is general enough for analysis of buildings-related technologies, independent of any specific program. An overview describes the GPRA process and the models used to estimate energy savings. The body of the document describes the algorithms used and the diffusion curve estimates.

  4. Left-Wing Extremism: The Current Threat

    SciTech Connect (OSTI)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  5. A framework of motion capture system based human behaviours simulation for ergonomic analysis

    E-Print Network [OSTI]

    Ma, Ruina; Bennis, Fouad; Ma, Liang

    2011-01-01

    With the increasing of computer capabilities, Computer aided ergonomics (CAE) offers new possibilities to integrate conventional ergonomic knowledge and to develop new methods into the work design process. As mentioned in [1], different approaches have been developed to enhance the efficiency of the ergonomic evaluation. Ergonomic expert systems, ergonomic oriented information systems, numerical models of human, etc. have been implemented in numerical ergonomic software. Until now, there are ergonomic software tools available, such as Jack, Ergoman, Delmia Human, 3DSSPP, and Santos, etc. [2-4]. The main functions of these tools are posture analysis and posture prediction. In the visualization part, Jack and 3DSSPP produce results to visualize virtual human tasks in 3-dimensional, but without realistic physical properties. Nowadays, with the development of computer technology, the simulation of physical world is paid more attention. Physical engines [5] are used more and more in computer game (CG) field. The a...

  6. Structural analysis of three global land models on carbon cycle simulations using a traceability framework

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Rafique, R.; Xia, J.; Hararuk, O.; Luo, Y.

    2014-06-27

    Modeled carbon (C) storage capacity is largely determined by the C residence time and net primary productivity (NPP). Extensive research has been done on NPP dynamics but the residence time and their relationships with C storage are much less studied. In this study, we implemented a traceability analysis to understand the modeled C storage and residence time in three land surface models: CSIRO's Atmosphere Biosphere Land Exchange (CABLE) with 9 C pools, Community Land Model (version 3.5) combined with Carnegie-Ames-Stanford Approach (CLM3.5-CASA) with 12 C pools and Community Land Model (version 4) (CLM4) with 26 C pools. The globally averagedmore »C storage and residence time was computed at both individual pool and total ecosystem levels. The spatial distribution of total ecosystem C storage and residence time differ greatly among the three models. The CABLE model showed a closer agreement with measured C storage and residence time in plant and soil pools than CLM3.5-CASA and CLM4. However, CLM3.5-CASA and CLM4 were close to each other in modeled C storage but not with measured data. CABLE stores more C in root whereas CLM3.5-CASA and CLM4 store more C in woody pools, partly due to differential NPP allocation in respective pools. The C residence time in individual C pools is greatly different among models, largely because of different transfer coefficient values among pools. CABLE had higher bulk residence time for soil C pools than the other two models. Overall, the traceability analysis used in this study can help fully characterizes the behavior of complex land models.« less

  7. Open Educational Resources from Performance Task using Video Analysis and Modeling - Tracker and K12 science education framework

    E-Print Network [OSTI]

    Wee, Loo Kang

    2014-01-01

    This invited paper discusses why Physics performance task by grade 9 students in Singapore is worth participating in for two reasons; 1) the video analysis and modeling are open access, licensed creative commons attribution for advancing open educational resources in the world and 2) allows students to be like physicists, where the K12 science education framework is adopted. Personal reflections on how physics education can be made more meaningful in particular Practice 1: Ask Questions, Practice 2: Use Models and Practice 5: Mathematical and Computational Thinking using Video Modeling supported by evidence based data from video analysis. This paper hopes to spur fellow colleagues to look into open education initiatives such as our Singapore Tracker community open educational resources curate on http://weelookang.blogspot.sg/p/physics-applets-virtual-lab.html as well as digital libraries http://iwant2study.org/lookangejss/ directly accessible through Tracker 4.86, EJSS reader app on Android and iOS and EJS 5....

  8. Global Warming: The Threat to the Planet*

    E-Print Network [OSTI]

    Hansen, James E.

    Global Warming: The Threat to the Planet* Jim Hansen 17 April 2007 2007 Leo Szilard Lecture. Graham Red Squirrel #12;Survival of Species 1. "Business-as-Usual" Scenario - Global Warming ~ 3ºC - Likely Extinctions ~ 50 percent 2. "Alternative" Scenario - Global Warming ~ 1ºC - Likely Extinctions

  9. Android Keylogging Threat Fadi Mohsen, Mohammed Shehab

    E-Print Network [OSTI]

    Shehab, Mohamed

    Android Keylogging Threat Fadi Mohsen, Mohammed Shehab Department of Software and Information--The openness of Android platform has attracted users, developers and attackers. Android offers bunch of capabil-similar to Android soft keyboards-using the KeyboardView class. This class is available since api level 3.0 and can

  10. Unauthorized Collaboration on Facebook: Threats and Responses

    E-Print Network [OSTI]

    McQuade, D. Tyler

    Unauthorized Collaboration on Facebook: Threats and Responses Recent events at FSU have uncovered and collaboration. The Problem: When students, faculty, and staff join Facebook using a valid FSU email address this and believe it is affiliated with or endorsed by Florida State University. Facebook also allows students

  11. Analysis of head pose, faces, and eye dynamics in images and videos : a multilevel framework and algorithms

    E-Print Network [OSTI]

    Wu, Junwen

    2007-01-01

    II.C. Head Pose Estimation . . . . . . . . . . . . II.D.V.D.1. Stage 1: “Coarse” Pose Estimation . . . . . . . . . .Chapter V Two Stage Head Pose Estimation: Framework and

  12. Introduction to Administrative Programs that Mitigate the Insider Threat

    SciTech Connect (OSTI)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  13. Nonproliferation, Nuclear Security, and the Insider Threat

    SciTech Connect (OSTI)

    Balatsky, Galya I. [Los Alamos National Laboratory; Duggan, Ruth [SNL

    2012-07-12

    Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

  14. An analysis of options available for developing a common laser ray tracing package for Ares and Kull code frameworks

    SciTech Connect (OSTI)

    Weeratunga, S K

    2008-11-06

    Ares and Kull are mature code frameworks that support ALE hydrodynamics for a variety of HEDP applications at LLNL, using two widely different meshing approaches. While Ares is based on a 2-D/3-D block-structured mesh data base, Kull is designed to support unstructured, arbitrary polygonal/polyhedral meshes. In addition, both frameworks are capable of running applications on large, distributed-memory parallel machines. Currently, both these frameworks separately support assorted collections of physics packages related to HEDP, including one for the energy deposition by laser/ion-beam ray tracing. This study analyzes the options available for developing a common laser/ion-beam ray tracing package that can be easily shared between these two code frameworks and concludes with a set of recommendations for its development.

  15. A Noninvasive Threat Analyzer for Advanced Metering Infrastructure in Smart Grid

    E-Print Network [OSTI]

    Wang, Yongge

    1 A Noninvasive Threat Analyzer for Advanced Metering Infrastructure in Smart Grid Mohammad Ashiqur--Advanced Metering Infrastructure (AMI) is the core component in a smart grid that exhibits a highly complex network--Advanced metering infrastructure, security analysis, formal verification. I. INTRODUCTION Smart grids provide

  16. nuclear threat science | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26th AnnualHistoryMIII:National1-2130nsc |safeguards |threat

  17. An Integrated Electric Power Supply Chain and Fuel Market Network Framework: Theoretical Modeling with Empirical Analysis for New England

    E-Print Network [OSTI]

    Nagurney, Anna

    An Integrated Electric Power Supply Chain and Fuel Market Network Framework: Theoretical Modeling regions and multiple electricity markets under deregulation to quantify the interactions in electric power an oligopolistic electricity market model with a nitrogen ox- ide permit market, and provided examples based

  18. An Integrated Electric Power Supply Chain and Fuel Market Network Framework: Theoretical Modeling with Empirical Analysis for New England

    E-Print Network [OSTI]

    Nagurney, Anna

    An Integrated Electric Power Supply Chain and Fuel Market Network Framework: Theoretical Modeling investigate how changes in the demand for electricity influence the electric power and the fuel markets from markets to quantify the interactions in electric power/energy supply chains and their effects on flows

  19. arXiv:q-bio.PE/0403014v113Mar2004 A Theoretical Framework for the Analysis of the

    E-Print Network [OSTI]

    Kenkre, V.M.

    for Interdisciplinary Science and Department of Physics and Astronomy, University of New Mexico, Albuquerque, New Mexico 87131 2 Department of Biology, University of New Mexico, Albuquerque, New Mexico 87131 3 Instituto-state infection. An outline of a framework is provided to treat mosquito diffusion and bird migration. Keywords

  20. IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 19, NO. 1, FEBRUARY 2004 243 Framework for the Design and Analysis

    E-Print Network [OSTI]

    Gross, George

    . INTRODUCTION THE advent of open access transmission and the spread of competitive markets in electricity have charges in the day-ahead market and thereby provide transmission service customers with price certainty notions with salient characteristics of electric power systems and electricity markets. The framework

  1. Mitigating the Insider Threat Using Behavioral Science Workshop

    SciTech Connect (OSTI)

    Landers, John; De Castro, Kara

    2012-11-26

    PowerPoint presentations are included on: the Insider Threat; Detecting the Malicious Insider through Behavioral Science; and Psychological Barriers to Effective Nuclear Security.

  2. NNSA's Global Threat Reduction Initiative Removes More Than One...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Threat Reduction Initiative Removes More Than One Ton of Food | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  3. Beyond Adapting to Climate Change: Embedding Adaptation in Responses to Multiple Threats and Stresses

    SciTech Connect (OSTI)

    Wilbanks, Thomas J; Kates, Dr. Robert W.

    2010-01-01

    Climate change impacts are already being experienced in every region of the United States and every part of the world most severely in Arctic regions and adaptation is needed now. Although climate change adaptation research is still in its infancy, significant adaptation planning in the United States has already begun in a number of localities. This article seeks to broaden the adaptation effort by integrating it with broader frameworks of hazards research, sustainability science, and community and regional resilience. To extend the range of experience, we draw from ongoing case studies in the Southeastern United States and the environmental history of New Orleans to consider the multiple threats and stresses that all communities and regions experience. Embedding climate adaptation in responses to multiple threats and stresses helps us to understand climate change impacts, themselves often products of multiple stresses, to achieve community acceptance of needed adaptations as co-benefits of addressing multiple threats, and to mainstream the process of climate adaptation through the larger envelope of social relationships, communication channels, and broad-based awareness of needs for risk management that accompany community resilience.

  4. National security panics : overestimating threats to national security

    E-Print Network [OSTI]

    Cramer, Jane Kellett, 1964-

    2002-01-01

    Three times in this century the US public has panicked with fear because of exaggerations of external threats to the nation. These panics peaked in 1950,1960, and 1980. Why did the U.S. markedly exaggerate the Soviet threat ...

  5. A Pervasive Parallel Processing Framework For Data Visualization And Analysis At Extreme Scale Final Scientific and Technical Report

    SciTech Connect (OSTI)

    Geveci, Berk

    2014-10-31

    The evolution of the computing world from teraflop to petaflop has been relatively effortless,with several of the existing programming models scaling effectively to the petascale. The migration to exascale, however, poses considerable challenges. All industry trends infer that the exascale machine will be built using processors containing hundreds to thousands of cores per chip. It can be inferred that efficient concurrency on exascale machines requires a massive amount of concurrent threads, each performing many operations on a localized piece of data. Currently, visualization libraries and applications are based off what is known as the visualization pipeline. In the pipeline model, algorithms are encapsulated as filters with inputs and outputs. These filters are connected by setting the output of one component to the input of another. Parallelism in the visualization pipeline is achieved by replicating the pipeline for each processing thread. This works well for today’s distributed memory parallel computers but cannot be sustained when operating on processors with thousands of cores. Our project investigates a new visualization framework designed to exhibit the pervasive parallelism necessary for extreme scale machines. Our framework achieves this by defining algorithms in terms of worklets, which are localized stateless operations. Worklets are atomic operations that execute when invoked unlike filters, which execute when a pipeline request occurs. The worklet design allows execution on a massive amount of lightweight threads with minimal overhead. Only with such fine-grained parallelism can we hope to fill the billions of threads we expect will be necessary for efficient computation on an exascale machine.

  6. DAKOTA : a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis.

    SciTech Connect (OSTI)

    Eldred, Michael Scott; Vigil, Dena M.; Dalbey, Keith R.; Bohnhoff, William J.; Adams, Brian M.; Swiler, Laura Painton; Lefantzi, Sophia; Hough, Patricia Diane; Eddy, John P.

    2011-12-01

    The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic expansion methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a theoretical manual for selected algorithms implemented within the DAKOTA software. It is not intended as a comprehensive theoretical treatment, since a number of existing texts cover general optimization theory, statistical analysis, and other introductory topics. Rather, this manual is intended to summarize a set of DAKOTA-related research publications in the areas of surrogate-based optimization, uncertainty quantification, and optimization under uncertainty that provide the foundation for many of DAKOTA's iterative analysis capabilities.

  7. Conceptual Framework and Levels of Abstraction for a Complex Large-Scale System

    SciTech Connect (OSTI)

    Simpson, Mary J.

    2005-03-23

    A conceptual framework and levels of abstraction are created to apply across all potential threats. Bioterrorism is used as a complex example to describe the general framework. Bioterrorism is unlimited with respect to the use of a specific agent, mode of dissemination, and potential target. Because the threat is open-ended, there is a strong need for a common, systemic understanding of attack scenarios related to bioterrorism. In recognition of this large-scale complex problem, systems are being created to define, design and use the proper level of abstraction and conceptual framework in bioterrorism. The wide variety of biological agents and delivery mechanisms provide an opportunity for dynamic scale changes by the linking or interlinking of existing threat components. Concurrent impacts must be separated and evaluated in terms of a given environment and/or ‘abstraction framework.’

  8. Dakota, a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis :

    SciTech Connect (OSTI)

    Adams, Brian M.; Ebeida, Mohamed Salah; Eldred, Michael S.; Jakeman, John Davis; Swiler, Laura Painton; Stephens, John Adam; Vigil, Dena M.; Wildey, Timothy Michael; Bohnhoff, William J.; Eddy, John P.; Hu, Kenneth T.; Dalbey, Keith R.; Bauman, Lara E; Hough, Patricia Diane

    2014-05-01

    The Dakota (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a exible and extensible interface between simulation codes and iterative analysis methods. Dakota contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quanti cation with sampling, reliability, and stochastic expansion methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the Dakota toolkit provides a exible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a user's manual for the Dakota software and provides capability overviews and procedures for software execution, as well as a variety of example studies.

  9. Sequential Threat Detection for Harbor Defense: An X-ray Physics...

    Office of Scientific and Technical Information (OSTI)

    Sequential Threat Detection for Harbor Defense: An X-ray Physics-Based Bayesian Approach Citation Details In-Document Search Title: Sequential Threat Detection for Harbor Defense:...

  10. Fear and frustration : rising state perceptions of threats and opportunities

    E-Print Network [OSTI]

    Priebe, Miranda

    2015-01-01

    Do a dominant state's policies have a greater effect on a rising state's threat perceptions or its assessment of the dominant state's resolve? Existing theory, rooted in Jervis's spiral and deterrence models, contends that ...

  11. A Risk Management Approach to the 'Insider Threat'

    E-Print Network [OSTI]

    2010-01-01

    Dir90] [DOD08] [FK92] A Risk Management Approach to the “A Risk Management Approach to the “Insider Threat” Mattgleep” is useless un- A Risk Management Approach to the “

  12. A Risk Management Approach to the 'Insider Threat'

    E-Print Network [OSTI]

    2010-01-01

    554–563, October 1992. A Risk Management Approach to the “A Risk Management Approach to the “Insider Threat” Mattgleep” is useless un- A Risk Management Approach to the “

  13. Invited Paper New Frontiers of Network Security: The Threat Within

    E-Print Network [OSTI]

    Sanyal, Sugata

    for either material gain or for wilful damage. Easy availability of hacking tools on the Internet, USB the organization. The insider threat mitigation solutions are required for the following business challenges: 1

  14. A New Framework for Adaptive Sampling and Analysis During Long-Term Monitoring and Remedial Action Management

    SciTech Connect (OSTI)

    Minsker, Barbara; Albert Valocchi; Barbara Bailey

    2008-01-27

    DOE and other Federal agencies are making a significant investment in the development of field analytical techniques, nonintrusive technologies, and sensor technologies that will have a profound impact on the way environmental monitoring is conducted. Monitoring and performance evaluation networks will likely be base on suites of in situ sensors, with physical sampling playing a much more limited role. Designing and using these types of networks effectively will require development of a new paradigm for sampling and analysis of remedial actions, which is the overall goal of this project.

  15. A Framework for Secure Cloud-Empowered Mobile Biometrics

    E-Print Network [OSTI]

    Valenti, Matthew C.

    1 A Framework for Secure Cloud-Empowered Mobile Biometrics A. A framework for secure cloud biometrics 4. System analysis 5. Conclusion #12;3 3 for secure cloud biometrics 4. System analysis 5. Conclusion #12;4 4 Introduc

  16. A framework and review of customer outage costs: Integration and analysis of electric utility outage cost surveys

    SciTech Connect (OSTI)

    Lawton, Leora; Sullivan, Michael; Van Liere, Kent; Katz, Aaron; Eto, Joseph

    2003-11-01

    A clear understanding of the monetary value that customers place on reliability and the factors that give rise to higher and lower values is an essential tool in determining investment in the grid. The recent National Transmission Grid Study recognizes the need for this information as one of growing importance for both public and private decision makers. In response, the U.S. Department of Energy has undertaken this study, as a first step toward addressing the current absence of consistent data needed to support better estimates of the economic value of electricity reliability. Twenty-four studies, conducted by eight electric utilities between 1989 and 2002 representing residential and commercial/industrial (small, medium and large) customer groups, were chosen for analysis. The studies cover virtually all of the Southeast, most of the western United States, including California, rural Washington and Oregon, and the Midwest south and east of Chicago. All variables were standardized to a consistent metric and dollar amounts were adjusted to the 2002 CPI. The data were then incorporated into a meta-database in which each outage scenario (e.g., the lost of electric service for one hour on a weekday summer afternoon) is treated as an independent case or record both to permit comparisons between outage characteristics and to increase the statistical power of analysis results. Unadjusted average outage costs and Tobit models that estimate customer damage functions are presented. The customer damage functions express customer outage costs for a given outage scenario and customer class as a function of location, time of day, consumption, and business type. One can use the damage functions to calculate outage costs for specific customer types. For example, using the customer damage functions, the cost experienced by an ''average'' customer resulting from a 1 hour summer afternoon outage is estimated to be approximately $3 for a residential customer, $1,200 for small-medium commercial and industrial customer, and $82,000 for large commercial and industrial customer. Future work to improve the quality and coverage of information on the value of electricity reliability to customers is described.

  17. Protecting Networked Systems from Malware Threats 

    E-Print Network [OSTI]

    Shin, Seung Won

    2013-07-26

    . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.2 Data Collection and Term De nition . . . . . . . . . . . . . . . . . . 9 2.3 Cross-Analysis of Botnet Victims . . . . . . . . . . . . . . . . . . . . 12 2.3.1 Point of Departure . . . . . . . . . . . . . . . . . . . . . . . . 12 2... Implementation . . . . . . . . . . . . 54 3.3.3 Correlation Engine Implementation . . . . . . . . . . . . . . . 54 3.4 Benign Data Collection and Detection Model Training . . . . . . . . 54 v 3.4.1 Data Collection and Usage...

  18. Enterprise Risk Management Framework

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Framework The Enterprise Risk Management (ERM) framework includes four steps: identify the risks, determine the probability and impact of each one, identify controls that are...

  19. Sustainability Framework 1 Queen's University

    E-Print Network [OSTI]

    Fletcher, Robin

    Sustainability Framework 1 Queen's University Sustainability Strategic Framework #12;Sustainability Framework 2 Contents Introduction .................................................................................................................................................. 2 Queen's Sustainability Mission

  20. Climate Tipping Points* The Threat to the Planet

    E-Print Network [OSTI]

    Hansen, James E.

    Climate Tipping Points* The Threat to the Planet Jim Hansen 19 February 2008 Illinois Wesleyan/policymakers) 2. A Planetary Emergency - Climate Inertia Pipeline Effect - Positive Feedbacks Predominate 3. Good. Great Inertia of Systems - Climate: >½ Warming Still `in Pipeline' - Energy Infrastructure: Decades

  1. Climate Threat to the Planet:* Implications for Intergenerational

    E-Print Network [OSTI]

    Hansen, James E.

    Climate Threat to the Planet:* Implications for Intergenerational Equity and Justice Jim Hansen) - What is Known (public/policymakers) 2. Planetary Emergency - Climate Inertia Warming in Pipeline;#12;Why be concerned about human-made climate change? There have been huge climate changes during Earth

  2. Ionosphere Threat to LAAS: Updated Model, User Impact, and Mitigations

    E-Print Network [OSTI]

    Stanford University

    " (post-processed, bias-corrected) data during ionosphere storm events at the time of the last solar-4], a "linear spatial gradient front" model was established and a threat space was extrapolated based on data, the cost and complexity of LBM deployment would be severe. Although the worst-case ionosphere anomaly poses

  3. Secretarial Succession, Threat Level Notification, and Successor Tracking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-01-28

    This order establishes the Secretarial Order of Succession in the Department of Energy pursuant to section 202(a) of the Department of Energy Organization Act, 42 U.S.C. 7132(a) and establish a mechanism for tracking the locations of successors at the various threat levels. Admin Chg 1, dated 9-13-2013, supersedes DOE O 100.1E.

  4. Secretarial Succession, Threat Level Notification and Successor Tracking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-01-28

    The Order establishes the Secretarial Order of Succession pursuant to section 202(a) of the Department of Energy Organization Act, 42 U.S.C. 7132(a) and establishes a mechanism for tracking the locations of successors at various threat levels. Cancels DOE O 100.1D.

  5. Secretarial Succession, Threat Level Notification, and Successor Tracking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-04-20

    This Order establishes the Secretarial Order of Succession pursuant to section 202(a) of the Department of Energy Organization Act and establishes a mechanism for tracking the locations of successors at various threat levels. Supersedes DOE O 100.1C. Superseded by DOE O 100.1E

  6. Climate Threat to the Planet:* Implications for Energy Policy

    E-Print Network [OSTI]

    Hansen, James E.

    Climate Threat to the Planet:* Implications for Energy Policy and Intergenerational Justice Jim implications for energy policy and intergenerational justice. The propriety of a scientist discussing these implications is self evident. Global Warming Story 1. Science Update - Climate Sensitivity - Faustian Bargain

  7. Automating Threat Modeling through the Software Development Life-Cycle

    E-Print Network [OSTI]

    Miller, Barton P.

    in the development life-cycle reduces its cost dramati- cally. Companies doing software development know this realityAutomating Threat Modeling through the Software Development Life-Cycle Guifr´e Ruiz1 , Elisa process through the development life-cycle. It does not require developers to have any security training

  8. Is climate change the greatest threat to global health?

    E-Print Network [OSTI]

    Jones, Peter JS

    Commentary Is climate change the greatest threat to global health? ANDREW PAPWORTH, MARK MASLIN for publication in October 2014 This commentary critically engages with the argument that climate change that although it is important to be aware of the risk that climate change presents, health status is caused

  9. A Framework for Using Web

    E-Print Network [OSTI]

    Goy, Anna

    A Framework for Using Web Services to Enhance QoS for Content Delivery Francesco Buccafurri presence and low price drove the success of early Web-content delivery. Cur- rently, however, quality designed to enable the QoS analysis of Web-service processes for real-time service provisioning (RTSP

  10. Notice of Intent to Develop DOE O 470.X, Insider Threat Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-10-17

    The Order establishes top-level responsibilities and requirements for DOE's Insider Threat Program, which is intended to deter, detect, and mitigate insider threat actions by all Federal and contractor employees.

  11. A threat taxonomy for mHealth privacy Institute for Security, Technology, and Society

    E-Print Network [OSTI]

    A threat taxonomy for mHealth privacy David Kotz Institute for Security, Technology, and SocietyHealth technologies. We develop a taxonomy of the privacy-related threats, and discuss some of the technologies

  12. Complex Systems Architecture Framework. Extension to Multi-

    E-Print Network [OSTI]

    de Weck, Olivier L.

    Complex Systems Architecture Framework. Extension to Multi- Objective Optimization Abdelkrim Doufene1, Hugo G. Chalé2 and Daniel Krob3 Abstract. This paper shows the utility to follow an architecture techniques extend and complete the architecture framework to support trade-off analysis and decision making

  13. University Planning Framework Prepared By: University Planning Committee

    E-Print Network [OSTI]

    Kavanagh, Karen L.

    University Planning Framework Prepared By: University Planning Committee Date Prepared: July 2014 Contact: Scott Penney, Director, Planning & Analysis scott_penney@sfu.ca | 778-782-7513 #12;University Planning Framework Page 1 Contents Contents

  14. A decision making framework for cruise ship design

    E-Print Network [OSTI]

    Katsoufis, George P. (George Paraskevas)

    2006-01-01

    This thesis develops a new decision making framework for initial cruise ship design. Through review of effectiveness analysis and multi-criteria decision making, a uniform philosophy is created to articulate a framework ...

  15. An Integrated Framework for Spatio-Temporal-Textual Search and Mining

    E-Print Network [OSTI]

    Cortes, Corinna

    An Integrated Framework for Spatio-Temporal-Textual Search and Mining Bingsheng Wang1 , Haili Dong1 and implement a search and mining system that adapts to the needs of both desktop and mobile users. Although there exist search engines [2] and pattern mining techniques [3] for crime incidents and terrorism threats

  16. Raising consciousness about the nuclear threat through music

    SciTech Connect (OSTI)

    Ungerleider, J.H.

    1987-01-01

    This dissertation examines the use of music, in particular topical collaborative group song writing, as a tool for raising consciousness about the threat of nuclear war. Consciousness raising is one way to overcome the phenomenon of denial and to increase discussion and social action in response to the nuclear threat. This dissertation measures the impact of a group song writing workshop on developing critical problem-solving in adult groups; it reviews how music is applied in psychological research and clinical work, has been used historically as a tool in social-change movements in America, and is used in the contemporary field of peace education. The perspectives of several theorists who discuss the potential of music to contribute to social change are presented. It is concluded that consciousness about the nuclear threat - in terms of naming and analyzing - can be raised by working with music's potential for developing affective, expressive, and collaborative capabilities in individuals and groups. Potential applications of the group song writing workshop are in schools, with peace organizations, music groups, and in relation to other social issues.

  17. A Framework for Technology Forecasting and Visualization

    E-Print Network [OSTI]

    Woon, Wei Lee

    This paper presents a novel framework for supporting the development of well-informed research policies and plans. The proposed methodology is based on the use of bibliometrics; i.e., analysis is conducted using information ...

  18. A framework for technology forecasting and visualization

    E-Print Network [OSTI]

    Woon, Wei Lee

    This paper presents a novel framework for supporting the development of well-informed research policies and plans. The proposed methodology is based on the use of bibliometrics; i.e., analysis is conducted using information ...

  19. Development, analysis, and evaluation of a commercial software framework for the study of Extremely Low Probability of Rupture (xLPR) events at nuclear power plants.

    SciTech Connect (OSTI)

    Kalinich, Donald A.; Helton, Jon Craig; Sallaberry, Cedric M.; Mattie, Patrick D.

    2010-12-01

    Sandia National Laboratories (SNL) participated in a Pilot Study to examine the process and requirements to create a software system to assess the extremely low probability of pipe rupture (xLPR) in nuclear power plants. This project was tasked to develop a prototype xLPR model leveraging existing fracture mechanics models and codes coupled with a commercial software framework to determine the framework, model, and architecture requirements appropriate for building a modular-based code. The xLPR pilot study was conducted to demonstrate the feasibility of the proposed developmental process and framework for a probabilistic code to address degradation mechanisms in piping system safety assessments. The pilot study includes a demonstration problem to assess the probability of rupture of DM pressurizer surge nozzle welds degraded by primary water stress-corrosion cracking (PWSCC). The pilot study was designed to define and develop the framework and model; then construct a prototype software system based on the proposed model. The second phase of the project will be a longer term program and code development effort focusing on the generic, primary piping integrity issues (xLPR code). The results and recommendations presented in this report will be used to help the U.S. Nuclear Regulatory Commission (NRC) define the requirements for the longer term program.

  20. A general probabilistic framework for volumetric articulated body pose estimation and driver gesture, activity and intent analysis for human-centric driver assistance

    E-Print Network [OSTI]

    Cheng, Shinko Yuanhsien

    2007-01-01

    Driver body-pose analysis . . . . . . . . . . . . . . . . .Body Pose Estimation . . . . . . . . . . . . . . . . .Mixture Model . . 4. Learning Pose using EM . . . . . .

  1. Neutron Interrogation System For Underwater Threat Detection And Identification

    SciTech Connect (OSTI)

    Barzilov, Alexander P.; Novikov, Ivan S.; Womble, Phil C.

    2009-03-10

    Wartime and terrorist activities, training and munitions testing, dumping and accidents have generated significant munitions contamination in the coastal and inland waters in the United States and abroad. Although current methods provide information about the existence of the anomaly (for instance, metal objects) in the sea bottom, they fail to identify the nature of the found objects. Field experience indicates that often in excess of 90% of objects excavated during the course of munitions clean up are found to be non-hazardous items (false alarm). The technology to detect and identify waterborne or underwater threats is also vital for protection of critical infrastructures (ports, dams, locks, refineries, and LNG/LPG). We are proposing a compact neutron interrogation system, which will be used to confirm possible threats by determining the chemical composition of the suspicious underwater object. The system consists of an electronic d-T 14-MeV neutron generator, a gamma detector to detect the gamma signal from the irradiated object and a data acquisition system. The detected signal then is analyzed to quantify the chemical elements of interest and to identify explosives or chemical warfare agents.

  2. Global Threat Reduction Initiative Fuel Thermo-Physical Characterization Project: Sample Management Plan

    SciTech Connect (OSTI)

    Casella, Amanda J.; Pereira, Mario M.; Steen, Franciska H.

    2013-01-01

    This sample management plan provides guidelines for sectioning, preparation, acceptance criteria, analytical path, and end-of-life disposal for the fuel element segments utilized in the Global Threat Reduction Initiative (GTRI), Fuel Thermo-Physical Characterization Project. The Fuel Thermo-Physical Characterization Project is tasked with analysis of irradiated Low Enriched Uranium (LEU) Molybdenum (U-Mo) fuel element samples to support the GTRI conversion program. Sample analysis may include optical microscopy (OM), scanning electron microscopy (SEM) fuel-surface interface analysis, gas pycnometry (density) measurements, laser flash analysis (LFA), differential scanning calorimetry (DSC), thermogravimetry and differential thermal analysis with mass spectroscopy (TG /DTA-MS), Inductively Coupled Plasma Spectrophotometry (ICP), alpha spectroscopy, and Thermal Ionization Mass Spectroscopy (TIMS). The project will utilize existing Radiochemical Processing Laboratory (RPL) operating, technical, and administrative procedures for sample receipt, processing, and analyses. Test instructions (TIs), which are documents used to provide specific details regarding the implementation of an existing RPL approved technical or operational procedure, will also be used to communicate to staff project specific parameters requested by the Principal Investigator (PI). TIs will be developed, reviewed, and issued in accordance with the latest revision of the RPL-PLN-700, RPL Operations Plan. Additionally, the PI must approve all project test instructions and red-line changes to test instructions.

  3. Bioenergy Knowledge Discovery Framework (KDF) Fact Sheet

    SciTech Connect (OSTI)

    2013-07-29

    The Bioenergy Knowledge Discovery Framework (KDF) is an online collaboration and geospatial analysis tool that allows researchers, policymakers, and investors to explore and engage the latest bioenergy research. This publication describes how the KDF harnesses Web 2.0 and social networking technologies to build a collective knowledge system that facilitates collaborative production, integration, and analysis of bioenergy-related information.

  4. U.S. Support for Philippine Dictatorship: Threat to Peace and Security in Asia

    E-Print Network [OSTI]

    Schirmer, Daniel Boone

    1973-01-01

    Srhirmer representing The Philippines Information Tidier in.U.S. Support for Philippine Dictatorship: Threat to Peaceaf the fjjst year in the Philippines that also merit The

  5. Low Activation Materials Design & Analysis Lab (LAMDA) | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Low Activation Materials Design and Analysis Lab June 01, 2013 The LAMDA facility is a multipurpose laboratory for evaluation of materials with low radiological threat without the...

  6. Cluster Analysis-Based Approaches for Geospatiotemporal Data...

    Office of Scientific and Technical Information (OSTI)

    Cluster Analysis-Based Approaches for Geospatiotemporal Data Mining of Massive Data Sets for Identification of Forest Threats Mills, Richard T ORNL ORNL; Hoffman, Forrest M...

  7. Hybrid methods for cybersecurity analysis : LDRD final report.

    SciTech Connect (OSTI)

    Davis, Warren Leon,; Dunlavy, Daniel M.

    2014-01-01

    Early 2010 saw a signi cant change in adversarial techniques aimed at network intrusion: a shift from malware delivered via email attachments toward the use of hidden, embedded hyperlinks to initiate sequences of downloads and interactions with web sites and network servers containing malicious software. Enterprise security groups were well poised and experienced in defending the former attacks, but the new types of attacks were larger in number, more challenging to detect, dynamic in nature, and required the development of new technologies and analytic capabilities. The Hybrid LDRD project was aimed at delivering new capabilities in large-scale data modeling and analysis to enterprise security operators and analysts and understanding the challenges of detection and prevention of emerging cybersecurity threats. Leveraging previous LDRD research e orts and capabilities in large-scale relational data analysis, large-scale discrete data analysis and visualization, and streaming data analysis, new modeling and analysis capabilities were quickly brought to bear on the problems in email phishing and spear phishing attacks in the Sandia enterprise security operational groups at the onset of the Hybrid project. As part of this project, a software development and deployment framework was created within the security analyst work ow tool sets to facilitate the delivery and testing of new capabilities as they became available, and machine learning algorithms were developed to address the challenge of dynamic threats. Furthermore, researchers from the Hybrid project were embedded in the security analyst groups for almost a full year, engaged in daily operational activities and routines, creating an atmosphere of trust and collaboration between the researchers and security personnel. The Hybrid project has altered the way that research ideas can be incorporated into the production environments of Sandias enterprise security groups, reducing time to deployment from months and years to hours and days for the application of new modeling and analysis capabilities to emerging threats. The development and deployment framework has been generalized into the Hybrid Framework and incor- porated into several LDRD, WFO, and DOE/CSL projects and proposals. And most importantly, the Hybrid project has provided Sandia security analysts with new, scalable, extensible analytic capabilities that have resulted in alerts not detectable using their previous work ow tool sets.

  8. STEP Utility Bill Analysis Report

    Broader source: Energy.gov [DOE]

    STEP Utility Bill Analysis Report, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  9. DAKOTA, a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis:version 4.0 reference manual

    SciTech Connect (OSTI)

    Griffin, Joshua D. (Sandai National Labs, Livermore, CA); Eldred, Michael Scott; Martinez-Canales, Monica L.; Watson, Jean-Paul; Kolda, Tamara Gibson; Adams, Brian M.; Swiler, Laura Painton; Williams, Pamela J.; Hough, Patricia Diane; Gay, David M.; Dunlavy, Daniel M.; Eddy, John P.; Hart, William Eugene; Guinta, Anthony A.; Brown, Shannon L.

    2006-10-01

    The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a reference manual for the commands specification for the DAKOTA software, providing input overviews, option descriptions, and example specifications.

  10. A SERVICE DISCOVERY THREAT MODEL FOR AD HOC Adrian Leung and Chris Mitchell

    E-Print Network [OSTI]

    Mitchell, Chris

    A SERVICE DISCOVERY THREAT MODEL FOR AD HOC NETWORKS Adrian Leung and Chris Mitchell Information.Leung,C.Mitchell}@rhul.ac.uk Keywords: Security, Secure Service Discovery, Threat Model, Mobile Ad Hoc Networks, MANETs. Abstract. Securing the process of service discovery is one of them. Novel solutions are therefore required. However

  11. SmartAnalyzer: A Noninvasive Security Threat Analyzer for AMI Smart Grid

    E-Print Network [OSTI]

    Wang, Yongge

    SmartAnalyzer: A Noninvasive Security Threat Analyzer for AMI Smart Grid Mohammad Ashiqur Rahman) is the core component in the smart grid that exhibits a highly complex network configuration comprising configuration in order to verify the potential threats. In this paper, we present SmartAnalyzer, a security

  12. Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid

    E-Print Network [OSTI]

    Wang, Wenye

    Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid Zhuo Lu Park, NC 27709 Email: cliff.wang@us.army.mil Abstract--The smart grid, generally referred in the smart grid. In this paper, we aim at classifying and evaluating the security threats

  13. The Threat to the Planet: How Can We Avoid Dangerous Human-Made Climate Change?

    E-Print Network [OSTI]

    Hansen, James E.

    The Threat to the Planet: How Can We Avoid Dangerous Human-Made Climate Change? Remarks of James E to the threat of climate change has been sudden and profound. Only in recent years has the extent and immediacy-made climate change, but what level is dangerous? Chart 4. Critical metrics defining dangerous, I believe

  14. Climate change is one of the greatest threats facing us today. CICERO's mission

    E-Print Network [OSTI]

    Johansen, Tom Henning

    Climate change is one of the greatest threats facing us today. CICERO's mission is to provide reliable and comprehensive knowledge about all aspects of the climate change problem. Foto: Scanpix #12;Climate change is one of the greatest threats facing us today. CICERO's mission is to provide reliable

  15. DAKOTA : a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis. Version 5.0, user's manual.

    SciTech Connect (OSTI)

    Eldred, Michael Scott; Dalbey, Keith R.; Bohnhoff, William J.; Adams, Brian M.; Swiler, Laura Painton; Hough, Patricia Diane; Gay, David M.; Eddy, John P.; Haskell, Karen H.

    2010-05-01

    The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a user's manual for the DAKOTA software and provides capability overviews and procedures for software execution, as well as a variety of example studies.

  16. DAKOTA, a multilevel parellel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis:version 4.0 uers's manual.

    SciTech Connect (OSTI)

    Griffin, Joshua D.; Eldred, Michael Scott; Martinez-Canales, Monica L.; Watson, Jean-Paul; Kolda, Tamara Gibson; Giunta, Anthony Andrew; Adams, Brian M.; Swiler, Laura Painton; Williams, Pamela J.; Hough, Patricia Diane; Gay, David M.; Dunlavy, Daniel M.; Eddy, John P.; Hart, William Eugene; Brown, Shannon L.

    2006-10-01

    The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a user's manual for the DAKOTA software and provides capability overviews and procedures for software execution, as well as a variety of example studies.

  17. DAKOTA : a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis. Version 5.0, developers manual.

    SciTech Connect (OSTI)

    Eldred, Michael Scott; Dalbey, Keith R.; Bohnhoff, William J.; Adams, Brian M.; Swiler, Laura Painton; Hough, Patricia Diane; Gay, David M.; Eddy, John P.; Haskell, Karen H.

    2010-05-01

    The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a developers manual for the DAKOTA software and describes the DAKOTA class hierarchies and their interrelationships. It derives directly from annotation of the actual source code and provides detailed class documentation, including all member functions and attributes.

  18. Dakota, a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis:version 4.0 developers manual.

    SciTech Connect (OSTI)

    Griffin, Joshua D. (Sandia National lababoratory, Livermore, CA); Eldred, Michael Scott; Martinez-Canales, Monica L.; Watson, Jean-Paul; Kolda, Tamara Gibson (Sandia National lababoratory, Livermore, CA); Giunta, Anthony Andrew; Adams, Brian M.; Swiler, Laura Painton; Williams, Pamela J.; Hough, Patricia Diane (Sandia National lababoratory, Livermore, CA); Gay, David M.; Dunlavy, Daniel M.; Eddy, John P.; Hart, William Eugene; Brown, Shannon L.

    2006-10-01

    The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a developers manual for the DAKOTA software and describes the DAKOTA class hierarchies and their interrelationships. It derives directly from annotation of the actual source code and provides detailed class documentation, including all member functions and attributes.

  19. Global Threat Reduction Initiative Fuel-Thermo-Physical Characterization Project Quality Assurance Plan

    SciTech Connect (OSTI)

    Pereira, Mario M.; Slonecker, Bruce D.

    2012-06-01

    The charter of the Fuel Thermo-Physical Characterization Project is to ready Pacific Northwest National Laboratory (PNNL) facilities and processes for the receipt of unirradiated and irradiated low enriched uranium (LEU) molybdenum (U-Mo) fuel element samples, and to perform analysis to support the Global Threat Reduction Initiative conversion program. PNNL’s support for the program will include the establishment of post-irradiation examination processes, including thermo-physical properties, unique to the U.S. Department of Energy laboratories. These processes will ultimately support the submission of the base fuel qualification (BFQ) to the U.S. Nuclear Regulatory Commission (NRC) and revisions to High Performance Research Reactor Safety Analysis Reports to enable conversion from highly enriched uranium to LEU fuel. This quality assurance plan (QAP) provides the quality assurance requirements and processes that support the NRC BFQ. This QAP is designed to be used by project staff, and prescribes the required management control elements that are to be met and how they are implemented. Additional controls are captured in Fuel Thermo-Physical Characterization Project plans, existing procedures, and procedures to be developed that provide supplemental information on how work is conducted on the project.

  20. Marine Introduced Species Q13: Are threats from marine invasive species increasing in Massachusetts and Cape Cod Bays?

    E-Print Network [OSTI]

    Pappal, Adrienne

    2010-01-01

    Non-native species have emerged as one of the leading environmental threats to our coastal habitats. These species have been recognized globally as a major threat to biological diversity as well as to agriculture and other ...

  1. Open literature review of threats including sabotage and theft of fissile material transport in Japan.

    SciTech Connect (OSTI)

    Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

    2005-06-01

    This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically and religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty.

  2. DownloadedBy:[NorthwesternUniversity]At:03:5419April2008 Conscious intrusion of threat information via

    E-Print Network [OSTI]

    Reber, Paul J.

    via unconscious priming in anxiety Wen Li, Ken A. Paller, and Richard E. Zinbarg Northwestern, unconscious priming was greater for threat than for neutral words in the high-trait-anxiety group, and for neutral than for threat words in the low-trait-anxiety group. Enhanced unconscious priming of threat

  3. Framework Programme for Research

    E-Print Network [OSTI]

    Framework Programme for Research on Organic Production and Consumption 2010­2012 Centre for Research on Organic Production and Consumption 2010­2012 1 Preface The interest in organic products (Organic Agriculture ­ Production and Consumption. Frame- work Programme for Research 2007­2009; CUL, 2007

  4. DLab leads national conversation on emerging threats to critical national

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of raregovAboutRecoveryplanningCoalSocialFrameworksNOW TAKINGservices

  5. DLab leads national conversation on emerging threats to critical national

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory of raregovAboutRecoveryplanningCoalSocialFrameworksNOW

  6. Threat assessment for safe navigation in environments with uncertainty in predictability

    E-Print Network [OSTI]

    Aoudé, Georges Salim

    2011-01-01

    This thesis develops threat assessment algorithms to improve the safety of the decision making of autonomous and human-operated vehicles navigating in dynamic and uncertain environments, where the source of uncertainty is ...

  7. Sequential Threat Detection for Harbor Defense: An X-ray Physics...

    Office of Scientific and Technical Information (OSTI)

    Sequential Threat Detection for Harbor Defense: An X-ray Physics-Based Bayesian Approach Candy, J V 42 ENGINEERING; 73 NUCLEAR PHYSICS AND RADIATION PHYSICS Abstract not provided...

  8. Tackling the Triple-Threat Genome of Miscanthus x giganteus (2010 JGI User Meeting)

    ScienceCinema (OSTI)

    Moose, Steve

    2011-04-25

    Steve Moose from the University of Illinois at Urbana-Champaign and the Energy Biosciences Institute on "Tackling the Triple-Threat Genome of Miscanthus x giganteus" on March 25, 2010 at the 5th Annual DOE JGI User Meeting

  9. Threat to UK participation in International Linear Collider 12th December 2007

    E-Print Network [OSTI]

    Crowther, Paul

    Threat to UK participation in International Linear Collider 12th December 2007 The UK's Linear of their intention to withdraw from the International Linear Collider (ILC) due to funding problems. The UK has been

  10. Droidel: A General Approach to Android Framework Modeling Sam Blackshear

    E-Print Network [OSTI]

    Chang, Bor-Yuh Evan

    Droidel: A General Approach to Android Framework Modeling Sam Blackshear University of Colorado.chang@colorado.edu Abstract We present an approach and tool for general-purpose modeling of Android for static analysis. Our approach is to explicate the reflective bridge between the Android framework and an application to make

  11. MTRG/Ascension Management Plan 2002 SECTION 5: THREATS AND RECOMMENDED MANAGEMENT

    E-Print Network [OSTI]

    Exeter, University of

    ) Control of light pollution 6) Control of human recreational disturbance 7) Eradication of feral cats.1 General Habitat Degradation 5.1.1. Mining of Beach Sand 5.1.2. Light Pollution 5.1.3 Threat of Fuel Spill of other Females 5.4. Threats to Hatchlings 5.4.1. Light Pollution 5.4.2. Predation by Cats and Dogs 5

  12. An urban intervention : enabling frameworks

    E-Print Network [OSTI]

    Harrigan, Neil Patrick

    1993-01-01

    The relationship between design and the idea of a framework is essentially an attitude about ordering. A framework is an Intellectual proposition which can support a variety ideas, and in doing so, it provides a resolution ...

  13. Preparation of functionalized zeolitic frameworks

    DOE Patents [OSTI]

    Yaghi, Omar M.; Hayashi, Hideki; Banerjee, Rahul; Park, Kyo Sung; Wang, Bo; Cote, Adrien P.

    2014-08-19

    The disclosure provides zeolitic frameworks for gas separation, gas storage, catalysis and sensors. More particularly the disclosure provides zeolitic frameworks (ZIFs). The ZIF of the disclosure comprises any number of transition metals or a homogenous transition metal composition.

  14. A framework for digital watercolor 

    E-Print Network [OSTI]

    O'Brien, Patrick Michael

    2008-10-10

    This research develops an extendible framework for reproducing watercolor in a digital environment, with a focus on interactivity using the GPU. The framework uses the lattice Boltzmann method, a relatively new approach to fluid dynamics...

  15. Preparation of functionalized zeolitic frameworks

    DOE Patents [OSTI]

    Yaghi, Omar M; Furukawa, Hiroyasu; Wang, Bo

    2013-07-09

    The disclosure provides zeolitic frameworks for gas separation, gas storage, catalysis and sensors. More particularly the disclosure provides zeolitic frameworks (ZIFs). The ZIF of the disclosure comprises any number of transition metals or a homogenous transition metal composition.

  16. Preparation of functionalized zeolitic frameworks

    DOE Patents [OSTI]

    Yaghi, Omar M; Hayashi, Hideki; Banerjee, Rahul; Park, Kyo Sung; Wang, Bo; Cote, Adrien P

    2012-11-20

    The disclosure provides zeolitic frameworks for gas separation, gas storage, catalysis and sensors. More particularly the disclosure provides zeolitic frameworks (ZIFs). The ZIF of the disclosure comprises any number of transition metals or a homogenous transition metal composition.

  17. A Qualitative Risk Analysis for the GPRS Technology Christos Xenakis1

    E-Print Network [OSTI]

    Stavrakakis, Ioannis

    A Qualitative Risk Analysis for the GPRS Technology Christos Xenakis1 , Danae Apostolopoulou2 a qualitative risk analysis of the General Packet Radio Service (GPRS) technology. GPRS presents several. The understanding gained from the analysis is used to classify the threats in low and high risk threats and define

  18. Threats to the Promise of Synergy in Interdisciplinary Reearch 

    E-Print Network [OSTI]

    Kruse, Ronald J; Anbar, Michael; Cohen, Bernard P

    2015-08-15

    The authors analyze structures and processes in multidisciplinary teams to identify factors that lead to synergistic outcomes from those that do not. They use the analysis to describe settings most likely to produce synergistic outcomes. Generally...

  19. A framework for annotating information structure in discourse 

    E-Print Network [OSTI]

    Calhoun, Sasha; Nissim, Malvina; Steedman, Mark; Brenier, Jason

    2005-01-01

    We present a framework for the integrated analysis of the textual and prosodic characteristics of information structure in the Switchboard corpus of conversational English. Information structure describes the availability, ...

  20. Grief consolation in eulogy rhetoric: An integrative framework

    E-Print Network [OSTI]

    Kunkel, Adrianne; Dennis, Michael Robert

    2003-01-01

    or analyze its rhetorical execution. This article introduces a framework for the critical analysis and production of eulogia that draws from comforting mechanisms recognized in the interpersonal communication, social psychology, and grief therapy literatures...

  1. Enterprise Risk Management Framework

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submitKansasCommunities EnergyU.S.Engineering Metal(2) Cu (3)Enrico RossitheFramework

  2. Design requirements formulation : a framework and analysis

    E-Print Network [OSTI]

    Morocz Bazzani, Francisco Andres

    2013-01-01

    This thesis focuses on the early stages of the product development process, during which the set of design requirements is formulated. Given the proven importance of a comprehensive set of design requirements in the market ...

  3. LIGHTEnUp Tool & Analysis Framework

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i nAand DOE Safety Standards Implementationfy 2015 June 2, 2015;Washers

  4. Content Analysis for Proactive Protective Intelligence

    SciTech Connect (OSTI)

    Sanfilippo, Antonio P.

    2010-12-15

    The aim of this paper is to outline a plan for developing and validating a Proactive Protective Intelligence approach that prevents targeted violence through the analysis and assessment of threats overtly or covertly expressed in abnormal communications to USSS protectees.

  5. Energy Sector Cybersecurity Framework Implementation Guidance

    Broader source: Energy.gov (indexed) [DOE]

    FOR PUBLIC COMMENT SEPTEMBER, 2014 ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE Energy Sector Cybersecurity Framework Implementation Guidance Table of Contents...

  6. Preparation of metal-triazolate frameworks

    SciTech Connect (OSTI)

    Yaghi, Omar M; Uribe-Romo, Fernando J; Gandara-Barragan, Felipe; Britt, David K

    2014-10-07

    The disclosure provides for novel metal-triazolate frameworks, methods of use thereof, and devices comprising the frameworks thereof.

  7. Proliferation profile assessment of emerging biological weapons threats. Research paper

    SciTech Connect (OSTI)

    Archuleta, M.G.; Bland, M.S.; Duann, T.P.; Tucker, A.B.

    1996-04-01

    This project develops a first generation biological warfare (BW) program system model for use in the DOD`s counterproliferation workstation, identifies key issues the U.S. military must address to assure its forces are prepared to fight in a BW environment, and develops a concise BW primer for use by any DOD activity requiring such information. The greatest lesson to be learned from this study is that only through the collective analysis of all the sub-systems of a suspected BW program will conclusive evidence of the program be found. Still, with current counterproliferation capabilities the U.S. may only be able to slow, not stop a motivated proliferant.

  8. UC DAVIS PHYSICAL DESIGN FRAMEWORK PHYSICAL DESIGN FRAMEWORK

    E-Print Network [OSTI]

    Ullrich, Paul

    the criteria the campus will use to judge the success of proposed projects with regard to planning and designUC DAVIS PHYSICAL DESIGN FRAMEWORK PHYSICAL DESIGN FRAMEWORK 2008 /2009 #12;ACKNOWLEDGEMENTS, Environmental and Capital Planning Karl Mohr, Physical, Environmental and Capital Planning Joseph Perry, Safety

  9. The Threat to the Planet* Dark & Bright Sides of Global Warming

    E-Print Network [OSTI]

    Hansen, James E.

    The Threat to the Planet* Dark & Bright Sides of Global Warming Jim Hansen 3 October 2007 presented provides most important information on global warming. Recorded human history occurs within the Holocene for these large climate change is perturbations of Earth's orbit. #12;Continental Drift Fig. 1 "Global Warming

  10. DO GLOBAL WARMING AND CLIMATE CHANGE REPRESENT A SERIOUS THREAT TO OUR WELFARE

    E-Print Network [OSTI]

    DO GLOBAL WARMING AND CLIMATE CHANGE REPRESENT A SERIOUS THREAT TO OUR WELFARE AND ENVIRONMENT? By Michael E. Mann I. Introduction The subjects of "global warming" and "climate change" have become parts of both the popular lexicon and the public discourse. Discussions of global warming often evoke passionate

  11. Power Attack: An Increasing Threat to Data Centers Zhang Xu Haining Wang

    E-Print Network [OSTI]

    Wang, Haining

    Power Attack: An Increasing Threat to Data Centers Zhang Xu Haining Wang Department of Computer of servers being deployed in data centers, the data center power distribution systems have already approached peak capacities. Since the upgrades of the power systems are extremely expensive, power

  12. Damage Threats and Response of Final Optics for Laser-Fusion Power Plants

    E-Print Network [OSTI]

    Tillack, Mark

    Damage Threats and Response of Final Optics for Laser-Fusion Power Plants M. S. Tillack1 , S. A-1597 The final optics for laser-IFE (inertial fusion energy) power plants will be exposed to a variety of damage to be the most serious concerns for a power plant. 1. Introduction Survival of the final optic is one of the most

  13. Bacterial resistance to antibiotics continues to pose a serious threat to human and animal

    E-Print Network [OSTI]

    Singer, Randall

    of resistance15 . In addition to exposure to naturally produced antibiotics, bacteria at a given site canBacterial resistance to antibiotics continues to pose a serious threat to human and animal health. The relationship between antibiotic use and the development of resistance has been studied extensively, with some

  14. International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions

    E-Print Network [OSTI]

    Aloul, Fadi

    International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid, controlling and managing the demands of customers. A smart grid is a huge complex network composed of millions

  15. Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats

    E-Print Network [OSTI]

    Wang, Wenye

    Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui- grates communication networks into traditional power grid. This integration, however, makes the power and applications. But in power grid, these data-centric attacks may result in instable power systems, and further

  16. Airborne Volcanic Ash--A Global Threat to Aviation U.S. Department of the Interior

    E-Print Network [OSTI]

    Airborne Volcanic Ash--A Global Threat to Aviation U.S. Department of the Interior U.S. Geological on the aviation industry. Airborne volcanic ash can be a serious hazard to aviation even hundreds of miles from an eruption. Encounters with high-concentration ash clouds can diminish visibility, damage flight control

  17. Sentinel: Intelligent Information Sharing for Controlling the Emerald Ash Borer Threat

    E-Print Network [OSTI]

    Medjahed, Brahim

    Sentinel: Intelligent Information Sharing for Controlling the Emerald Ash Borer Threat Brahim - Dearborn 4901 Evergreen Road, Dearborn, MI 48120, USA {brahim,wgrosky}@umich.edu Abstract. The Emerald Ash Borer (EAB) has killed or infested millions of ash trees in Michigan and is fast spreading

  18. Framework for Adaptable Operating and Runtime Systems: Final Project Report

    SciTech Connect (OSTI)

    Patrick G. Bridges

    2012-02-01

    In this grant, we examined a wide range of techniques for constructing high-performance con#12;gurable system software for HPC systems and its application to DOE-relevant problems. Overall, research and development on this project focused in three specifc areas: (1) software frameworks for constructing and deploying con#12;gurable system software, (2) applcation of these frameworks to HPC-oriented adaptable networking software, (3) performance analysis of HPC system software to understand opportunities for performance optimization.

  19. Threats in the Frog Pond: A Multilevel Analysis of College Enrollment and Completion

    E-Print Network [OSTI]

    Whang Sayson, Hannah

    2015-01-01

    Eds. ), American higher education in the twenty-firstThe Journal of Higher Education, 53(1), 32-50. Alicke,selectivity. Sociology of Education, 78, 294-315. antonio,

  20. Department of Horticultural Sciences Strengths, Weaknesses, Opportunities, and ThreatsSWOT Analysis

    E-Print Network [OSTI]

    Improvement Center has had a strong link to industry and has been productive in terms of generating both the very best landscape plants and sustainable management strategies available to Texas consumers and generate considerable interest in horticulture. · The newly created Endowed Chair in Floricultural

  1. Threats in the Frog Pond: A Multilevel Analysis of College Enrollment and Completion

    E-Print Network [OSTI]

    Whang Sayson, Hannah

    2015-01-01

    rise? Changes in 5-year degree completion and postsecondaryA. (2011). The college completion agenda: 2011 progressCompletion .

  2. Threats in the Frog Pond: A Multilevel Analysis of College Enrollment and Completion

    E-Print Network [OSTI]

    Whang Sayson, Hannah

    2015-01-01

    Mere categorization and the frog-pond effect. Psychologicaland Chung, C.Y. (2005). The frog pond revisited: High schoolexperiences: The frog pond revisited (again). Journal of

  3. Systems analysis of emerging IPTV entertainment platform : stakeholders, threats and opportunities

    E-Print Network [OSTI]

    Sharma, Shantnu

    2008-01-01

    Why do certain types of companies, goods, services survive and others do not. Why does one set continuously reinvent themselves and others wither away and die? Why does Cisco continue to provide exciting and innovative ...

  4. Fact Sheet: Detection and Analysis of Threats to the Energy Sector (DATES)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12, 2015Executive Order14, 20111,FY 2007TrafficDepartmentinof

  5. Engineering an Anthropocene Citizenship Framework

    E-Print Network [OSTI]

    Beigi, Shima

    2015-01-01

    This article presents an Anthropocene citizen-cantered framework by incorporating the neuroscience of sustainability related stressors, the biology of collaboration in multi-agent ecosystems such as urban systems, and by emphasising on the importance of harnessing the collective intelligence of the crowd in addressing wicked challenges of sustainable development. The Anthropocene citizenship framework aims to transcend the cognitive model of global citizenship and sustainability to a dynamic, resilient and thriving mental model of collective cooperation.

  6. Backscatter from the Data Plane --- Threats to Stability and Security in Information-Centric Networking

    E-Print Network [OSTI]

    Vahlenkamp, Matthias Wählisch Thomas C Schmidt Markus

    2012-01-01

    Information-centric networking approaches attract much attention in the ongoing search for a future communication paradigm of the Internet. Replacing the host-to-host connectivity by a data-oriented publish/subscribe service eases content distribution and authentication by concept, while eliminating all threats from unwanted traffic. However, current proposals to content routing heavily rely on data-driven protocol events and thereby introduce a strong coupling of the control to the data plane in the underlying routing infrastructure. In this paper, we analyze in theory and practical experiments threats to the stability and performance of the content distribution system. We discuss new attack vectors present in its current state of development, as well as possibilities and limitations to mitigate them.

  7. Review of July 2013 Nuclear Security Insider Threat Exercise November 2013

    SciTech Connect (OSTI)

    Pederson, Ann C.; Snow, Catherine L.; Townsend, Jeremy; Shannon, Michael

    2013-11-01

    This document is a review of the Nuclear Security Insider Threat Exercise which was hosted at ORNL in July 2013. Nuclear security culture and the insider threat are best learned through experience. Culture is inherently difficult to teach, and as such is best learned through modeled behaviors and learning exercise. This TTX, NSITE, is a tool that strives to aid students in learning what an effective (and ineffective) nuclear security culture might look like by simulating dynamic events that strengthen or weaken the nuclear security regime. The goals of NSITE are to stimulate complex thought and discussion and assist decision makers and management in determining the most effective policies and procedures for their country or facility.

  8. Representing Meaning in the Headlines of News Reports: A Critical Linguistic Analysis

    E-Print Network [OSTI]

    Min, So Jung

    1998-01-01

    linguistic analysis is used to examine the New York Times and the Korea Herald coverage of `the North Korean nuclear threat'. The analysis contributes to the understanding of the ideological role of language within news discourse in constructing...

  9. British intelligence and threats to national security, c.1941-1951

    E-Print Network [OSTI]

    Walton, James Calder

    2007-02-13

    'British intelligence and threats to national security, c.1941-1951'. CAMBRIDGE UNIVERSITY LIBRARY Dissertation submitted for the degree of Doctor of Philosophy Faculty of History University of Cambridge CALDER WALTON Trinity College... communist involvement in African decolonisation movements. Although it is hardly discussed in the existing historical literature, MIS played a significant role in London's response to 'national liberation' movements in West Africa and East Africa...

  10. Microsoft Word - DOE Framework Final.docx

    Office of Environmental Management (EM)

    Washington, D.C. 20585 Hanford Tank Waste Retrieval, Treatment, and Disposition Framework September 24, 2013 Hanford Tank Waste Retrieval, Treatment, and Disposition Framework ii...

  11. Secure Policy-Based Configuration Framework (PBCONF)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Policy-Based Configuration Framework (PBCONF) Interoperable, open-source framework for secure remote configuration of modern and legacy devices Background Energy delivery devices...

  12. International Framework for Nuclear Energy Cooperation (IFNEC...

    Energy Savers [EERE]

    International Framework for Nuclear Energy Cooperation (IFNEC) Expert meetings in Romania International Framework for Nuclear Energy Cooperation (IFNEC) Expert meetings in Romania...

  13. Thermoelectric Activities of European Community within Framework...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Community within Framework Programme 7 and additional activities in Germany Thermoelectric Activities of European Community within Framework Programme 7 and additional...

  14. Risk assessment as a framework for decisions.

    SciTech Connect (OSTI)

    Rechard, Robert Paul; McKenna, Sean Andrew; Borns, David James

    2010-12-01

    The risk assessment approach has been applied to support numerous radioactive waste management activities over the last 30 years. A risk assessment methodology provides a solid and readily adaptable framework for evaluating the risks of CO2 sequestration in geologic formations to prioritize research, data collection, and monitoring schemes. This paper reviews the tasks of a risk assessment, and provides a few examples related to each task. This paper then describes an application of sensitivity analysis to identify important parameters to reduce the uncertainty in the performance of a geologic repository for radioactive waste repository, which because of importance of the geologic barrier, is similar to CO2 sequestration. The paper ends with a simple stochastic analysis of idealized CO2 sequestration site with a leaking abandoned well and a set of monitoring wells in an aquifer above the CO2 sequestration unit in order to evaluate the efficacy of monitoring wells to detect adverse leakage.

  15. Discriminating Nuclear Threats from Benign Sources in Gamma-ray Spectra using a Spectral Comparison Ratio Method

    SciTech Connect (OSTI)

    Anderson, Kevin K.; Jarman, Kenneth D.; Mann, Matthew L.; Pfund, David M.; Runkle, Robert C.

    2008-06-15

    This manuscript presents a method for categorizing gamma-ray spectra as benign or threatening. It is widely believed that the goal of segregating gamma-ray spectra into benign and threatening populations can achieved with fewer counts than are required for confident characterization of a spectrum’s isotopic composition, while still providing improvement over count-based algorithms. This has potentially important implications on the detection of radiological and nuclear threats, where decisions must be made from analysis of count-starved spectra that dominate the landscape of monitoring special nuclear material transport and lost-or-stolen source search. We report here the method of Spectral Comparison Ratios (SCRs) which is useful in the targeted detection of specific gamma-ray signatures or signature classes. SCRs discriminate between benign and target sources by comparing counts in broad, pre-defined energy bins that are pre-determined using statistical discrimination criteria. The integral component of the SCR algorithm is the location and interdependence of the energy bins, and we discuss the statistical methods used for choosing their locations along with the decision criteria that maximally separate targets from benign sources.

  16. Prospects of GPGPU in the Auger Offline Software Framework

    E-Print Network [OSTI]

    Winchen, Tobias

    2015-01-01

    The Pierre Auger Observatory is the currently largest experiment dedicated to unveil the nature and origin of the highest energetic cosmic rays. The software framework 'Offline' has been developed by the Pierre Auger Collaboration for joint analysis of data from different independent detector systems used in one observatory. While reconstruction modules are specific to the Pierre Auger Observatory components of the Offline framework are also used by other experiments. The software framework has recently been extended to incorporate data from the Auger Engineering Radio Array (AERA), the radio extension of the Pierre Auger Observatory. The reconstruction of the data of such radio detectors requires the repeated evaluation of complex antenna gain patterns which significantly increases the required computing resources in the joint analysis. In this contribution we explore the usability of massive parallelization of parts of the Offline code on the GPU. We present the result of a systematic profiling of the joint...

  17. Appendix A: Scientific Framework Appendix A: Scientific Framework

    E-Print Network [OSTI]

    The scientific framework and the hatchery review approach used in the APRE process is based on the work products of the Hatchery Scientific Review Group (HSRG). These work products and the background on the HSRG project Collection The proportion of the spawners brought into the hatchery should follow a "spread-the-risk

  18. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  19. Cybersecurity Framework AccessControl

    E-Print Network [OSTI]

    Cybersecurity Framework AccessControl Policy Machine Cloud Computing Cryptography Evaluation Guidelines Standards Systems SecurityPractices Critical Infrastructure Verification Security Controls Assets-170 Computer Security Division 2013 Annual Report #12;#12;NIST Special Publication 800-170 Computer Security

  20. The Global Threat Reduction Initiative's Orphan Source Recovery Project in the Russian Federation

    SciTech Connect (OSTI)

    Russell, J. W. [NSTec; Ahumada, A. D. [NSTec; Blanchard, T. A. [NNSA

    2012-06-04

    After 9/11, officials at the United States Department of Energy (DOE), National Nuclear Security Administration (NNSA) grew more concerned about radiological materials that were vulnerable to theft and illicit use around the world. The concern was that terrorists could combine stolen radiological materials with explosives to build and detonate a radiological dispersal device (RDD), more commonly known as a “dirty bomb.” In response to this and other terrorist threats, the DOE/NNSA formed what is now known as the Global Threat Reduction Initiative (GTRI) to consolidate and accelerate efforts to reduce and protect vulnerable nuclear and radiological materials located at civilian sites worldwide. Although a cooperative program was already underway in the Russian Federation to secure nuclear materials at a range of different facilities, thousands of sealed radioactive sources remained vulnerable at medical, research, and industrial sites. In response, GTRI began to focus efforts on addressing these materials. GTRI’s Russia Orphan Source Recovery Project, managed at the Nevada National Security Site’s North Las Vegas facility, was initiated in 2002. Throughout the life of the project, Joint Stock Company “Isotope” has served as the primary Russian subcontractor, and the organization has proven to be a successful partner. Since the first orphan source recovery of an industrial cobalt-60 irradiator with 647 curies (Ci) at an abandoned facility in Moscow in 2003, the GTRI Orphan Source Recovery Project in the Russian Federation has accomplished substantial levels of threat reduction. To date, GTRI has recovered and securely disposed of more than 5,100 sources totaling more that 628,000 Ci. This project serves as an extraordinary example of how international cooperation can be implemented by partners with mutual interests to achieve significant goals.

  1. Supporting the Global Threat Reduction Initiative through Nuclear Material Recovery: Collaboration between NNSA and AREVA

    SciTech Connect (OSTI)

    Bieniawski, Andrew; Sheely, Ken; Hunter, Ian; Louvet, Thibault

    2007-07-01

    The Global Threat Reduction Initiative (GTRI) was established by the U.S. Department of Energy National Nuclear Security Administration (NNSA) in response to the growing need to comprehensively and internationally address the potential threat posed by vulnerable high-risk nuclear material. GTRI's mission is to foster international support for national programs to identify, secure, remove and/or facilitate the disposition, as quickly and expeditiously as possible, of vulnerable, high-risk nuclear and other radioactive materials around the world that pose a potential threat to the international community. Specifically, GTRI establishes international partnerships to address this global issue. To achieve these objectives, GTRI works with international, regional, and domestic partners to: (1) minimize and, to the extent possible, eliminate the use of highly enriched uranium (HEU) in civil nuclear applications worldwide by converting research reactors to LEU fuels; (2) accelerate the removal or final disposition of vulnerable nuclear material throughout the world; (3) accelerate securing and/or removing vulnerable high-risk radiological materials throughout the world; and (4) address the 'gaps' of other programs by identifying throughout the world, recovering and facilitating permanent disposition of vulnerable high-risk nuclear material not previously addressed by other threat reduction programs. DOE desires to work with more partners, both government and industry, to develop options for the disposal of nuclear material in the most expeditious manner. This paper will present the recent success of the first Plutonium Gap Material recycling contract signed by AREVA thanks to the collaboration developed between NNSA and AREVA. Another item which will be presented and illustrates how GTRI supports government-to-industry partnership, is the willingness to consider the treatment option for Gap Materials used-fuel. This new step represents another broadening of the collaboration that already exists between NNSA and AREVA for achieving the goal of GTRI. Such collaboration was already illustrated in 2006 by the recovery of more than 45 Kg of HEU from facilities within Europe and another 15 Kg of fresh HEU were transported from Europe to the U.S. An additional 40 Kg of fresh HEU will be transported from facilities within Europe to the AREVA-CERCA facility before the end of 2007. (authors)

  2. GLOBAL THREAT REDUCTION INITIATIVE REACTOR CONVERSION PROGRAM: STATUS AND CURRENT PLANS

    SciTech Connect (OSTI)

    Staples, Parrish A.; Leach, Wayne; Lacey, Jennifer M.

    2009-10-07

    The U.S. Department of Energy’s National Nuclear Security Administration (NNSA) Reactor Conversion Program supports the minimization, and to the extent possible, elimination of the use of high enriched uranium (HEU) in civilian nuclear applications by working to convert research and test reactors and radioisotope production processes to the use of low enriched uranium (LEU). The Reactor Conversion Program is a technical pillar of the NNSA Global Threat Reduction Initiative (GTRI) which is a key organization for implementing U.S. HEU minimization policy and works to reduce and protect vulnerable nuclear and radiological material domestically and abroad.

  3. Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Frederick T; Hauser, Katie R; Lantz, Margaret W; Mili, Ali

    2013-01-01

    In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardware and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.

  4. Intelligent Control in Automation Based on Wireless Traffic Analysis

    SciTech Connect (OSTI)

    Kurt Derr; Milos Manic

    2007-09-01

    Wireless technology is a central component of many factory automation infrastructures in both the commercial and government sectors, providing connectivity among various components in industrial realms (distributed sensors, machines, mobile process controllers). However wireless technologies provide more threats to computer security than wired environments. The advantageous features of Bluetooth technology resulted in Bluetooth units shipments climbing to five million per week at the end of 2005 [1, 2]. This is why the real-time interpretation and understanding of Bluetooth traffic behavior is critical in both maintaining the integrity of computer systems and increasing the efficient use of this technology in control type applications. Although neuro-fuzzy approaches have been applied to wireless 802.11 behavior analysis in the past, a significantly different Bluetooth protocol framework has not been extensively explored using this technology. This paper presents a new neurofuzzy traffic analysis algorithm of this still new territory of Bluetooth traffic. Further enhancements of this algorithm are presented along with the comparison against the traditional, numerical approach. Through test examples, interesting Bluetooth traffic behavior characteristics were captured, and the comparative elegance of this computationally inexpensive approach was demonstrated. This analysis can be used to provide directions for future development and use of this prevailing technology in various control type applications, as well as making the use of it more secure.

  5. Intelligent Control in Automation Based on Wireless Traffic Analysis

    SciTech Connect (OSTI)

    Kurt Derr; Milos Manic

    2007-08-01

    Wireless technology is a central component of many factory automation infrastructures in both the commercial and government sectors, providing connectivity among various components in industrial realms (distributed sensors, machines, mobile process controllers). However wireless technologies provide more threats to computer security than wired environments. The advantageous features of Bluetooth technology resulted in Bluetooth units shipments climbing to five million per week at the end of 2005 [1, 2]. This is why the real-time interpretation and understanding of Bluetooth traffic behavior is critical in both maintaining the integrity of computer systems and increasing the efficient use of this technology in control type applications. Although neuro-fuzzy approaches have been applied to wireless 802.11 behavior analysis in the past, a significantly different Bluetooth protocol framework has not been extensively explored using this technology. This paper presents a new neurofuzzy traffic analysis algorithm of this still new territory of Bluetooth traffic. Further enhancements of this algorithm are presented along with the comparison against the traditional, numerical approach. Through test examples, interesting Bluetooth traffic behavior characteristics were captured, and the comparative elegance of this computationally inexpensive approach was demonstrated. This analysis can be used to provide directions for future development and use of this prevailing technology in various control type applications, as well as making the use of it more secure.

  6. Static Model Analysis with Lattice-based Ontologies

    E-Print Network [OSTI]

    Lickly, Ben

    2012-01-01

    3 Static Analysis 3.1 Heuristics-based tools . . . . .Ontology Framework for Static Model Analysis”. In: EMSOFT ’Murawski and Kwangkeun Yi. “Static Monotonicity Analysis for

  7. EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework

    E-Print Network [OSTI]

    Chen, Yan

    EdgeMiner: Automatically Detecting Implicit Control Flow Transitions through the Android Framework of Android applications. One of the building blocks that these analysis systems rely upon is the computation of a precise control flow graph. The callback mechanism provided and orchestrated by the Android framework

  8. INTEGRATING AGRICULTURAL AND FORESTRY GHG MITIGATION RESPONSE INTO GENEARL ECONOMY FRAMEWORKS

    E-Print Network [OSTI]

    McCarl, Bruce A.

    INTEGRATING AGRICULTURAL AND FORESTRY GHG MITIGATION RESPONSE INTO GENEARL ECONOMY FRAMEWORKS GHG MITIGATION RESPONSE INTO GENEARL ECONOMY FRAMEWORKS: DEVELOPING A FAMILY OF RESPONSE FUNCTIONS 1 of economy-wide analysis of greenhouse gas mitigation options can be found in a special issue of the Energy

  9. COLDEX New Data Acquisition Framework

    E-Print Network [OSTI]

    Grech, Christian

    2015-01-01

    COLDEX (COLD bore EXperiment) is an experiment of the TE-VSC group installed in the Super Proton Synchrotron (SPS) which mimics a LHC type cryogenic vacuum system. In the framework of the High Luminosity upgrade of the LHC (HL-LHC project), COLDEX has been recommissioned in 2014 in order to validate carbon coatings performances at cryogenic temperature with LHC type beams. To achieve this mission, a data acquisition system is needed to retrieve and store information from the different experiment’s systems (vacuum, cryogenics, controls, safety) and perform specific calculations. This work aimed to completely redesign, implement, test and operate a brand new data acquisition framework based on communication with the experiment’s PLCs for the devices potentially available over network. The communication protocol to the PLCs is based on data retrieval both from CERN middleware infrastructures (CMW, JAPC) and on a novel open source Simatic S7 data exchange package over TCP/IP (libnodave).

  10. A Mediation Framework for Mobile Web Service Provisioning

    E-Print Network [OSTI]

    Srirama, Satish Narayana; Prinz, Wolfgang; 10.1109/EDOCW.2006.9

    2010-01-01

    Web Services and mobile data services are the newest trends in information systems engineering in wired and wireless domains, respectively. Web Services have a broad range of service distributions while mobile phones have large and expanding user base. To address the confluence of Web Services and pervasive mobile devices and communication environments, a basic mobile Web Service provider was developed for smart phones. The performance of this Mobile Host was also analyzed in detail. Further analysis of the Mobile Host to provide proper QoS and to check Mobile Host's feasibility in the P2P networks, identified the necessity of a mediation framework. The paper describes the research conducted with the Mobile Host, identifies the tasks of the mediation framework and then discusses the feasible realization details of such a mobile Web Services mediation framework.

  11. Gas adsorption on metal-organic frameworks

    DOE Patents [OSTI]

    Willis, Richard R. (Cary, IL); Low, John J. (Schaumburg, IL), Faheem, Syed A. (Huntley, IL); Benin, Annabelle I. (Oak Forest, IL); Snurr, Randall Q. (Evanston, IL); Yazaydin, Ahmet Ozgur (Evanston, IL)

    2012-07-24

    The present invention involves the use of certain metal organic frameworks that have been treated with water or another metal titrant in the storage of carbon dioxide. The capacity of these frameworks is significantly increased through this treatment.

  12. A framework for the architecting of aerospace systems portfolios with commonality

    E-Print Network [OSTI]

    Hofstetter, Wilfried Konstantin

    2009-01-01

    (cont.) The framework was applied to three case studies: commonality analysis for a portfolio of future and legacy exploration life support systems, for the historical Saturn launch vehicle portfolio, and for a portfolio ...

  13. “If your vagina could speak, what would it say?”: Dangerous Femininity, Anxious Masculinity and the Threat of Female Desire in the 1975 Pornographic Movie "The Sex that Speaks"

    E-Print Network [OSTI]

    Garrigou-Kempton, Emilie

    2010-01-01

    speak, what would it say? ” Dangerous Femininity, Anxiouslies the threat of a dangerous feminine sexuality that needsthat women’s desire is dangerous without the implementation

  14. Functional programming framework for GRworkbench

    E-Print Network [OSTI]

    Andrew J. Moylan; Susan M. Scott; Antony C. Searle

    2007-10-16

    The software tool GRworkbench is an ongoing project in visual, numerical General Relativity at The Australian National University. Recently, the numerical differential geometric engine of GRworkbench has been rewritten using functional programming techniques. By allowing functions to be directly represented as program variables in C++ code, the functional framework enables the mathematical formalism of Differential Geometry to be more closely reflected in GRworkbench . The powerful technique of `automatic differentiation' has replaced numerical differentiation of the metric components, resulting in more accurate derivatives and an order-of-magnitude performance increase for operations relying on differentiation.

  15. Framework for SCADA Security Policy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:FinancingPetroleum12, 2015ExecutiveFluorescent LampFort Collins,47328 Vol. 77, No.Framework

  16. recently carried out an analysis of the results of cross-weld creep tests that have been reported in the literature using neural networks in a Bayesian framework [9]. This

    E-Print Network [OSTI]

    Cambridge, University of

    #12;recently carried out an analysis of the results of cross-weld creep tests that have been-weld creep testing is then described. Finally, the preliminary results of the creep testing are presented that the weld preheat temperature has a significant effect on creep life, while the weld heat input

  17. Research Article Automating Risk Analysis of Software Design Models

    E-Print Network [OSTI]

    Miller, Barton P.

    Research Article Automating Risk Analysis of Software Design Models Maxime Frydman,1 Guifré Ruiz,2 to reduce the need for costly human expertise to perform risk analysis in software, which is common of these secure development methodologies share one essential risk analysis activity, called threat modeling [4

  18. A framework for benchmarking land models

    SciTech Connect (OSTI)

    Luo, Yiqi; Randerson, J.; Abramowitz, G.; Bacour, C.; Blyth, E.; Carvalhais, N.; Ciais, Philippe; Dalmonech, D.; Fisher, J.B.; Fisher, R.; Friedlingstein, P.; Hibbard, Kathleen A.; Hoffman, F. M.; Huntzinger, Deborah; Jones, C.; Koven, C.; Lawrence, David M.; Li, D.J.; Mahecha, M.; Niu, S.L.; Norby, Richard J.; Piao, S.L.; Qi, X.; Peylin, P.; Prentice, I.C.; Riley, William; Reichstein, M.; Schwalm, C.; Wang, Y.; Xia, J. Y.; Zaehle, S.; Zhou, X. H.

    2012-10-09

    Land models, which have been developed by the modeling community in the past few decades to predict future states of ecosystems and climate, have to be critically evaluated for their performance skills of simulating ecosystem responses and feedback to climate change. Benchmarking is an emerging procedure to measure performance of models against a set of defined standards. This paper proposes a benchmarking framework for evaluation of land model performances and, meanwhile, highlights major challenges at this infant stage of benchmark analysis. The framework includes (1) targeted aspects of model performance to be evaluated, (2) a set of benchmarks as defined references to test model performance, (3) metrics to measure and compare performance skills among models so as to identify model strengths and deficiencies, and (4) model improvement. Land models are required to simulate exchange of water, energy, carbon and sometimes other trace gases between the atmosphere and land surface, and should be evaluated for their simulations of biophysical processes, biogeochemical cycles, and vegetation dynamics in response to climate change across broad temporal and spatial scales. Thus, one major challenge is to select and define a limited number of benchmarks to effectively evaluate land model performance. The second challenge is to develop metrics of measuring mismatches between models and benchmarks. The metrics may include (1) a priori thresholds of acceptable model performance and (2) a scoring system to combine data–model mismatches for various processes at different temporal and spatial scales. The benchmark analyses should identify clues of weak model performance to guide future development, thus enabling improved predictions of future states of ecosystems and climate. The near-future research effort should be on development of a set of widely acceptable benchmarks that can be used to objectively, effectively, and reliably evaluate fundamental properties of land models to improve their prediction performance skills.

  19. A general framework for complete positivity

    E-Print Network [OSTI]

    Jason M. Dominy; Alireza Shabani; Daniel A. Lidar

    2015-03-18

    Complete positivity of quantum dynamics is often viewed as a litmus test for physicality, yet it is well known that correlated initial states need not give rise to completely positive evolutions. This observation spurred numerous investigations over the past two decades attempting to identify necessary and sufficient conditions for complete positivity. Here we describe a complete and consistent mathematical framework for the discussion and analysis of complete positivity for correlated initial states of open quantum systems. This formalism is built upon a few simple axioms and is sufficiently general to contain all prior methodologies going back to Pechakas, PRL (1994). The key observation is that initial system-bath states with the same reduced state on the system must evolve under all admissible unitary operators to system-bath states with the same reduced state on the system, in order to ensure that the induced dynamical maps on the system are well-defined. Once this consistency condition is imposed, related concepts like the assignment map and the dynamical maps are uniquely defined. In general, the dynamical maps may not be applied to arbitrary system states, but only to those in an appropriately defined physical domain. We show that the constrained nature of the problem gives rise to not one but three inequivalent types of complete positivity. Using this framework we elucidate the limitations of recent attempts to provide conditions for complete positivity using quantum discord and the quantum data-processing inequality. The problem remains open, and may require fresh perspectives and new mathematical tools. The formalism presented herein may be one step in that direction.

  20. A Framework for Comparative Assessments of Energy Efficiency Policy Measures

    SciTech Connect (OSTI)

    Blum, Helcio; Atkinson, Barbara; Lekov, Alex

    2011-05-24

    When policy makers propose new policies, there is a need to assess the costs and benefits of the proposed policy measures, to compare them to existing and alternative policies, and to rank them according to their effectiveness. In the case of equipment energy efficiency regulations, comparing the effects of a range of alternative policy measures requires evaluating their effects on consumers’ budgets, on national energy consumption and economics, and on the environment. Such an approach should be able to represent in a single framework the particularities of each policy measure and provide comparable results. This report presents an integrated methodological framework to assess prospectively the energy, economic, and environmental impacts of energy efficiency policy measures. The framework builds on the premise that the comparative assessment of energy efficiency policy measures should (a) rely on a common set of primary data and parameters, (b) follow a single functional approach to estimate the energy, economic, and emissions savings resulting from each assessed measure, and (c) present results through a set of comparable indicators. This framework elaborates on models that the U.S. Department of Energy (DOE) has used in support of its rulemakings on mandatory energy efficiency standards. In addition to a rigorous analysis of the impacts of mandatory standards, DOE compares the projected results of alternative policy measures to those projected to be achieved by the standards. The framework extends such an approach to provide a broad, generic methodology, with no geographic or sectoral limitations, that is useful for evaluating any type of equipment energy efficiency market intervention. The report concludes with a demonstration of how to use the framework to compare the impacts estimated for twelve policy measures focusing on increasing the energy efficiency of gas furnaces in the United States.

  1. GLOSSARY OF INFORMATION SECURITY THREATS Computer any electronic device used for storing, processing and transmitting data according

    E-Print Network [OSTI]

    Sun, Yi

    a computer virus. Can appear to be a legitimate program or system resource. WormGLOSSARY OF INFORMATION SECURITY THREATS Computer · any electronic device used or damage your computer. Pharming ·(aka Vishing) a hacker's attack aiming to redirect

  2. Modest carbon price could save Borneo forests: study Reuters, 4 June 2009 -Tropical forests in Borneo under threat of conversion to palm oil

    E-Print Network [OSTI]

    in Borneo under threat of conversion to palm oil plantations could be more profitable left standing threat of being converted to oil palm plantations. "They are not meant to be clearing forest for palm oil development. It's pretty clear that forests are being felled for oil palm," said Venter, a conservation

  3. Radiological Threat Reduction (RTR) program : implementing physical security to protect large radioactive sources worldwide.

    SciTech Connect (OSTI)

    Lowe, Daniel L.

    2004-11-01

    The U.S. Department of Energy's Radiological Threat Reduction (RTR) Program strives to reduce the threat of a Radiological Dispersion Device (RDD) incident that could affect U.S. interests worldwide. Sandia National Laboratories supports the RTR program on many different levels. Sandia works directly with DOE to develop strategies, including the selection of countries to receive support and the identification of radioactive materials to be protected. Sandia also works with DOE in the development of guidelines and in training DOE project managers in physical protection principles. Other support to DOE includes performing rapid assessments and providing guidance for establishing foreign regulatory and knowledge infrastructure. Sandia works directly with foreign governments to establish cooperative agreements necessary to implement the RTR Program efforts to protect radioactive sources. Once necessary agreements are in place, Sandia works with in-country organizations to implement various security related initiatives, such as installing security systems and searching for (and securing) orphaned radioactive sources. The radioactive materials of interest to the RTR program include Cobalt 60, Cesium 137, Strontium 90, Iridium 192, Radium 226, Plutonium 238, Americium 241, Californium 252, and Others. Security systems are implemented using a standardized approach that provides consistency through out the RTR program efforts at Sandia. The approach incorporates a series of major tasks that overlap in order to provide continuity. The major task sequence is to: Establish in-country contacts - integrators, Obtain material characterizations, Perform site assessments and vulnerability assessments, Develop upgrade plans, Procure and install equipment, Conduct acceptance testing and performance testing, Develop procedures, and Conduct training. Other tasks are incorporated as appropriate and commonly include such as support of reconfiguring infrastructure, and developing security plans, etc. This standardized approach is applied to specific country and regional needs. Recent examples (FY 2003-2004) include foreign missions to Lithuania, Russian Federation Navy, Russia - PNPI, Greece (joint mission with IAEA), Tanzania, Iraq, Chile, Ecuador, and Egypt. Some of the ambitions and results of the RTR program may be characterized by the successes in Lithuania, Greece, and Russia.

  4. Developpement WebFrameworks AJAX Developpement Web

    E-Print Network [OSTI]

    Richer, Jean-Michel

    D´eveloppement WebFrameworks AJAX D´eveloppement Web Frameworks AJAX Jean-Michel Richer jean-michel.richer@univ-angers.fr http://www.info.univ-angers.fr/pub/richer 2009 1 / 27 #12;D´eveloppement WebFrameworks AJAX Objectif d´eveloppement Web et augmenter l'interactivit´e avec l'utilisateur 2 / 27 #12;D´eveloppement Web

  5. Energy Sector Cybersecurity Framework Implementation Guidance

    Broader source: Energy.gov (indexed) [DOE]

    JANUARY 2015 ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE U.S. DEPARTMENT OF ENERGY OFFICE OF ELECTRICITY DELIVERY AND ENERGY RELIABILITY Energy Sector...

  6. Gas sensor incorporating a porous framework

    DOE Patents [OSTI]

    Yaghi, Omar M; Czaja, Alexander U; Wang, Bo; Galatsis, Kosmas; Wang, Kang L; Furukawa, Hiroyasu

    2014-05-27

    The disclosure provides sensor for gas sensing including CO.sub.2 gas sensors comprising a porous framework sensing area for binding an analyte gas.

  7. Gas sensor incorporating a porous framework

    DOE Patents [OSTI]

    Yaghi, Omar M.; Czaja, Alexander U.; Wang, Bo; Furukawa, Hiroyasu; Galatsis, Kosmas; Wang, Kang L.

    2013-07-09

    The disclosure provides sensor for gas sensing including CO.sub.2 gas sensors comprising a porous framework sensing area for binding an analyte gas.

  8. Energy Sector Cybersecurity Framework Implementation Guidance...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    released guidance to help the energy sector establish or align existing cybersecurity risk management programs to meet the objectives of the Cybersecurity Framework released by...

  9. Bioenergy Knowledge Discovery Framework Recognized at National...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    50 papers with wide-ranging topics in the field of geospatial information systems. The paper explains how the Bioenergy Knowledge Discovery Framework (KDF) is bringing together...

  10. Preparation of metal-catecholate frameworks

    SciTech Connect (OSTI)

    Yaghi, Omar M.; Gandara-Barragan, Felipe; Lu, Zheng; Wan, Shun

    2014-06-03

    The disclosure provides for metal catecholate frameworks, and methods of use thereof, including gas separation, gas storage, catalysis, tunable conductors, supercapacitors, and sensors.

  11. An overview of the global threat reduction initiative's physical protection work in Tanzania.

    SciTech Connect (OSTI)

    Banzi, Firmi Paul; Itamura, Michael Takeshi; Robinson, Phillip W.; Strosinski, Micheal Vernon

    2010-06-01

    The U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) established the Global Threat Reduction Initiative's (GTRI) mission to reduce and protect nuclear and radiological materials located at civilian sites worldwide. Internationally, over 80 countries are cooperating with GTRI to enhance security of facilities with these materials. In 2004, a GTRI delegation began working with the Tanzania Atomic Energy Commission, (TAEC). The team conducted site assessments for the physical protection of radiological materials in Tanzania. Today, GTRI and the Government of Tanzania continue cooperative efforts to enhance physical security at several radiological sites, including a central sealed-source storage facility, and sites in the cities of Arusha, Dar Es Salaam, and Tanga. This paper describes the scope of physical protection work, lessons learned, and plans for future cooperation between the GTRI program and the TAEC. Additionally the paper will review the cooperative efforts between TAEC and the International Atomic Energy Agency (IAEA) with regards to a remote monitoring system at a storage facility and to the repackaging of radioactive sources.

  12. Identifying at-risk employees: A behavioral model for predicting potential insider threats

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Kangas, Lars J.; Noonan, Christine F.; Dalton, Angela C.

    2010-09-01

    A psychosocial model was developed to assess an employee’s behavior associated with an increased risk of insider abuse. The model is based on case studies and research literature on factors/correlates associated with precursor behavioral manifestations of individuals committing insider crimes. In many of these crimes, managers and other coworkers observed that the offenders had exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers to using such psychosocial indicators include the inability to recognize the signs and the failure to record the behaviors so that they could be assessed by a person experienced in psychosocial evaluations. We have developed a model using a Bayesian belief network with the help of human resources staff, experienced in evaluating behaviors in staff. We conducted an experiment to assess its agreement with human resources and management professionals, with positive results. If implemented in an operational setting, the model would be part of a set of management tools for employee assessment that can raise an alarm about employees who pose higher insider threat risks. In separate work, we combine this psychosocial model’s assessment with computer workstation behavior to raise the efficacy of recognizing an insider crime in the making.

  13. Threat of a sinkhole: A reevaluation of Cavern 4, Bayou Choctaw salt dome, Louisiana

    SciTech Connect (OSTI)

    Neal, J.T.; Todd, J.L.; Linn, J.K. [Sandia National Labs., Albuquerque, NM (United States); Magorian, T.R. [Magorian (Thomas R.), Amherst, NY (United States)

    1993-09-01

    Cavern Lake at Bayou Choctaw salt dome resulted from the failure of Cavern 7 in 1954. Uncontrolled solutioning of this cavern through the thin caprock had set the stage for overburden to collapse into the cavern below. A similar situation developed with nearby Cavern 4, but with less dissolutioning of the caprock. Because pressure loss was already a problem and because another 800 ft diameter lake would have endangered surface operations, solutioning of Cavern 4 was stopped and the cavern abandoned in 1957 in order to protect the already-small site. In 1978 the Strategic Petroleum Reserve (SPR) acquired a number of caverns at Bayou Choctaw, including Cavern 4, and the possible repeat of the Cavern 7 failure and formation of another lake thus became an issue. The cavern dimensions were re-sonared in 1980 for comparison with 1963 and 1977 surveys. Annual surface leveling between 1982--1992 showed less subsidence occurring than the site average, and a cavern monitoring system, installed in 1984, has revealed no anomalous motion. Repeat sonar surveys in 1992 showed very little, if any, change occurred since 1980 although a small amount of uncertainty exists as a result of changing sonar techniques. We conclude that significant additional solutioning or erosion of the caprock has not occurred and that there is no increased threat to SPR operations.

  14. Theoretical Framework for Microscopic Osmotic Phenomena Theoretical Framework for Microscopic Osmotic Phenomena

    E-Print Network [OSTI]

    Kramer, Peter

    Theoretical Framework for Microscopic Osmotic Phenomena Theoretical Framework for Microscopic Osmotic Phenomena Paul J. Atzberger Department of Mathematics University of California, Santa Barbara 25, 2007) The basic ingredients of osmotic pressure are a solvent fluid with a soluble molecular

  15. Demand Response Valuation Frameworks Paper

    SciTech Connect (OSTI)

    Heffner, Grayson

    2009-02-01

    While there is general agreement that demand response (DR) is a valued component in a utility resource plan, there is a lack of consensus regarding how to value DR. Establishing the value of DR is a prerequisite to determining how much and what types of DR should be implemented, to which customers DR should be targeted, and a key determinant that drives the development of economically viable DR consumer technology. Most approaches for quantifying the value of DR focus on changes in utility system revenue requirements based on resource plans with and without DR. This ''utility centric'' approach does not assign any value to DR impacts that lower energy and capacity prices, improve reliability, lower system and network operating costs, produce better air quality, and provide improved customer choice and control. Proper valuation of these benefits requires a different basis for monetization. The review concludes that no single methodology today adequately captures the wide range of benefits and value potentially attributed to DR. To provide a more comprehensive valuation approach, current methods such as the Standard Practice Method (SPM) will most likely have to be supplemented with one or more alternative benefit-valuation approaches. This report provides an updated perspective on the DR valuation framework. It includes an introduction and four chapters that address the key elements of demand response valuation, a comprehensive literature review, and specific research recommendations.

  16. High-Resolution Numerical Simulation and Analysis of Mach Reflection Structures in Detonation Waves in Low-Pressure H2–O2–Ar Mixtures: A Summary of Results Obtained with the Adaptive Mesh Refinement Framework AMROC

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Deiterding, Ralf

    2011-01-01

    Numerical simulation can be key to the understanding of the multidimensional nature of transient detonation waves. However, the accurate approximation of realistic detonations is demanding as a wide range of scales needs to be resolved. This paper describes a successful solution strategy that utilizes logically rectangular dynamically adaptive meshes. The hydrodynamic transport scheme and the treatment of the nonequilibrium reaction terms are sketched. A ghost fluid approach is integrated into the method to allow for embedded geometrically complex boundaries. Large-scale parallel simulations of unstable detonation structures of Chapman-Jouguet detonations in low-pressure hydrogen-oxygen-argon mixtures demonstrate the efficiency of the described techniquesmore »in practice. In particular, computations of regular cellular structures in two and three space dimensions and their development under transient conditions, that is, under diffraction and for propagation through bends are presented. Some of the observed patterns are classified by shock polar analysis, and a diagram of the transition boundaries between possible Mach reflection structures is constructed.« less

  17. A Coalgebraic Framework for Games in Economics

    E-Print Network [OSTI]

    Blumensath, Achim

    A Coalgebraic Framework for Games in Economics Achim Blumensath Department of Mathematics Technical University of Darmstadt Viktor Winschel Department of Economics University of Mannheim June 6, 2013 Abstract We present an abstract framework to compose economic games. It is sufficiently general to represent

  18. Cambridge University Library Collection Development Policy framework

    E-Print Network [OSTI]

    Cambridge, University of

    importance by stating that it will continue its cultural heritage role as a National Research LibraryCambridge University Library Collection Development Policy framework 1. Scope This policy is intended as a framework to guide collection development in Cambridge University Library and its affiliated

  19. An interdisciplinary process based framework for sandy

    E-Print Network [OSTI]

    Langendoen, Koen

    An interdisciplinary process based framework for sandy coastal developments Inspired by the Sand FRAMEWORK FOR SANDY COASTAL DEVELOPMENTS INSPIRED BY THE SAND MOTOR PROJECT by L.N. van der Moolen A sandy coastal system delivers various advantages to human beings, such as recreation possibilities like

  20. HI-C: Diagnosing Object Churn in Framework-Based Applications

    E-Print Network [OSTI]

    Ryder, Barbara G.

    HI-C: Diagnosing Object Churn in Framework-Based Applications Marc Fisher II University of Memphis an escape analysis to help devel- opers identify sources of object churn (i.e., excessive use of tempo users to visualize, filter, and explore analysis results to aid them in diagnosis of object churn

  1. International Experiences and Frameworks to Support Country-Driven Low-Emissions Development

    SciTech Connect (OSTI)

    Benioff, R.; Cochran, J.; Cox, S.

    2012-08-01

    Countries can use low-emission development strategies (LEDS) to advance sustainable development, promote private-sector growth, and reduce greenhouse gas emissions. This paper proposes a framework -- or support infrastructure -- to enable the efficient exchange of LEDS-related knowledge and technical assistance. Under the proposed framework, countries share LEDS-related resources via coordinating forums, 'knowledge platforms,' and networks of experts and investors. The virtual 'knowledge platforms' foster learning by allowing countries to communicate with each other and share technical reports, data, and analysis tools in support of LEDS development. Investing in all elements of the framework in an integrated fashion increases the efficacy of support for country-driven LEDS.

  2. An Optimization Framework for Dynamic Hybrid Energy Systems

    SciTech Connect (OSTI)

    Wenbo Du; Humberto E Garcia; Christiaan J.J. Paredis

    2014-03-01

    A computational framework for the efficient analysis and optimization of dynamic hybrid energy systems (HES) is developed. A microgrid system with multiple inputs and multiple outputs (MIMO) is modeled using the Modelica language in the Dymola environment. The optimization loop is implemented in MATLAB, with the FMI Toolbox serving as the interface between the computational platforms. Two characteristic optimization problems are selected to demonstrate the methodology and gain insight into the system performance. The first is an unconstrained optimization problem that optimizes the dynamic properties of the battery, reactor and generator to minimize variability in the HES. The second problem takes operating and capital costs into consideration by imposing linear and nonlinear constraints on the design variables. The preliminary optimization results obtained in this study provide an essential step towards the development of a comprehensive framework for designing HES.

  3. An expert system framework for nondestructive waste assay

    SciTech Connect (OSTI)

    Becker, G.K.

    1996-10-01

    Management and disposition of transuranic (RU) waste forms necessitates determining entrained RU and associated radioactive material quantities as per National RU Waste Characterization Program requirements. Technical justification and demonstration of a given NDA method used to determine RU mass and uncertainty in accordance with program quality assurance is difficult for many waste forms. Difficulties are typically founded in waste NDA methods that employ standards compensation and/or employment of simplifying assumptions on waste form configurations. Capability to determine and justify RU mass and mass uncertainty can be enhanced through integration of waste container data/information using expert system and empirical data-driven techniques with conventional data acquisition and analysis. Presented is a preliminary expert system framework that integrates the waste form data base, alogrithmic techniques, statistical analyses, expert domain knowledge bases, and empirical artificial intelligence modules into a cohesive system. The framework design and bases in addition to module development activities are discussed.

  4. In the face of threat: neural and endocrine correlates of impaired facial emotion recognition in cocaine dependence

    E-Print Network [OSTI]

    Ersche, Karen D.; Hagan, Cindy C.; Smith, Dana G.; Jones, P. Simon; Calder, Andrew J.; Williams, Guy B.

    2015-01-01

    , such as cortisol and testosterone, may play a mediating role. Cortisol and testosterone are the end products of the hypothalamus-pituitary- adrenal (HPA) axis and the hypothalamus-pituitary-gonadal (HPG) axis, respectively, and together they regulate... -activity at the level of the hypothalamus17. Facing threat in cocaine dependence page 4 Ersche et al Submission to Translational Psychiatry An imbalance between the HPA and HPG axes, as measured by peripheral levels of cortisol...

  5. The OME Framework for genome-scale systems biology

    SciTech Connect (OSTI)

    Palsson, Bernhard O.; Ebrahim, Ali; Federowicz, Steve

    2014-12-19

    The life sciences are undergoing continuous and accelerating integration with computational and engineering sciences. The biology that many in the field have been trained on may be hardly recognizable in ten to twenty years. One of the major drivers for this transformation is the blistering pace of advancements in DNA sequencing and synthesis. These advances have resulted in unprecedented amounts of new data, information, and knowledge. Many software tools have been developed to deal with aspects of this transformation and each is sorely needed [1-3]. However, few of these tools have been forced to deal with the full complexity of genome-scale models along with high throughput genome- scale data. This particular situation represents a unique challenge, as it is simultaneously necessary to deal with the vast breadth of genome-scale models and the dizzying depth of high-throughput datasets. It has been observed time and again that as the pace of data generation continues to accelerate, the pace of analysis significantly lags behind [4]. It is also evident that, given the plethora of databases and software efforts [5-12], it is still a significant challenge to work with genome-scale metabolic models, let alone next-generation whole cell models [13-15]. We work at the forefront of model creation and systems scale data generation [16-18]. The OME Framework was borne out of a practical need to enable genome-scale modeling and data analysis under a unified framework to drive the next generation of genome-scale biological models. Here we present the OME Framework. It exists as a set of Python classes. However, we want to emphasize the importance of the underlying design as an addition to the discussions on specifications of a digital cell. A great deal of work and valuable progress has been made by a number of communities [13, 19-24] towards interchange formats and implementations designed to achieve similar goals. While many software tools exist for handling genome-scale metabolic models or for genome-scale data analysis, no implementations exist that explicitly handle data and models concurrently. The OME Framework structures data in a connected loop with models and the components those models are composed of. This results in the first full, practical implementation of a framework that can enable genome-scale design-build-test. Over the coming years many more software packages will be developed and tools will necessarily change. However, we hope that the underlying designs shared here can help to inform the design of future software.

  6. An analysis of how climate policies and the threat of stranded fossil fuel assets incentivize CCS deployment

    E-Print Network [OSTI]

    Clark, Victoria (Victoria Reeves)

    2015-01-01

    To be on track to stabilize climate change, scientists estimate that up to two thirds of global coal, oil, and natural gas reserves will need to remain stranded in the ground. Carbon capture and storage (CCS) is the only ...

  7. New framework hydrous silicate K{sub 3}Sc[Si{sub 3}O{sub 9}] {center_dot} H{sub 2}O related to the high-temperature anhydrous silicate K{sub 3}Ho[Si{sub 3}O{sub 9}] and symmetry analysis of a phase transition with prediction of structures

    SciTech Connect (OSTI)

    Belokoneva, E. L., E-mail: elbel@geol.msu.ru; Zorina, A. P.; Dimitrova, O. V. [Moscow State University, Faculty of Geology (Russian Federation)

    2013-07-15

    Crystals of a new framework silicate K{sub 3}Sc[Si{sub 3}O{sub 9}] {center_dot} H{sub 2}O, space group Pm2{sub 1}n (nonstandard setting of space group Pmn2{sub 1} = C{sub 2v}{sup 7}), are obtained under hydrothermal conditions. The structure is determined without preliminary knowledge of the chemical formula. The absolute configuration is determined. The structure is close to that of the high-temperature K{sub 3}Ho[Si{sub 3}O{sub 9}] phase, which was obtained upon the heating of K{sub 3}HoSi{sub 3}O{sub 8}(OH){sub 2}. This structural similarity is due to the specific conditions of synthesis and an analogous formula, where holmium is replaced by scandium. A symmetry analysis shows that the high local symmetry of a block (rod) is responsible for the first-order phase transition of both the order-disorder (OD) and displacement type. The number of structures in which the simplest and high-symmetry layers are multiplied by different symmetry elements are predicted.

  8. Enterprise Risk Management (ERM) Framework for Directives

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2012-09-30

    Explains the new ERM framework for developing, revising, and reviewing directives. This memo directs the Office of Management to institutionalize ERM into the directives process no later than September 30, 2012.

  9. A global framework for scene gist

    E-Print Network [OSTI]

    Greene, Michelle R

    2009-01-01

    Human observers are able to rapidly and accurately categorize natural scenes, but the representation mediating this feat is still unknown. Here we propose a framework of rapid scene categorization that does not segment a ...

  10. A Computational Framework Incorporating Human and Social

    E-Print Network [OSTI]

    Stanford University

    A Computational Framework Incorporating Human and Social Behaviors for Occupant-centric Egress BEHAVIORS FOR OCCUPANT- CENTRIC EGRESS SIMULATION A DISSERTATION SUBMITTED TO THE DEPARTMENT OF CIVIL. Studies of catastrophic incidents have highlighted the need to consider occupants' behaviors

  11. Constructibility review process framework for transportation facilities 

    E-Print Network [OSTI]

    Liman, Majed

    1995-01-01

    Constructibility is the optimum use of construction knowledge and experience in planning, design, procurement, and field operations in order to achieve overall project objectives ("Constructibility: a primer" 1986). This Thesis presents a framework...

  12. A flexible design framework for autonomous mowing

    E-Print Network [OSTI]

    Kraft, Justin (Justin A.)

    2011-01-01

    This work outlines the creation of a flexible design framework for autonomous mowing to meet changing customer needs and functionality across a spectrum of applications from residential areas to sport complexes. The thesis ...

  13. Energy and Greenhouse Impacts of Biofuels: A Framework for Analysis

    E-Print Network [OSTI]

    Kammen, Daniel M.; Farrell, Alexander E.; Plevin, Richard J.; Jones, Andrew D.; Nemet, Gregory F.; Delucchi, Mark A.

    2008-01-01

    Roundtable – Energy & Greenhouse Gas Impacts of Biofuelsin Emissions, Energy Use, and Greenhouse Gases,” Journal ofRoundtable – Energy & Greenhouse Gas Impacts of Biofuels

  14. Energy and Greenhouse Impacts of Biofuels: A Framework for Analysis

    E-Print Network [OSTI]

    Kammen, Daniel M.; Farrell, Alexander E.; Plevin, Richard J.; Jones, Andrew D.; Nemet, Gregory F.; Delucchi, Mark A.

    2008-01-01

    extraction (e.g. crude oil production and shipment),production arises in petroleum refineries. A refinery turns crude oil

  15. Analysis of sourcing & procurement practices : a cross industry framework

    E-Print Network [OSTI]

    Koliousis, Ioannis G

    2006-01-01

    This thesis presents and analyzes the various practices in the functional area of Sourcing and Procurement. The 21 firms that are studied operate in one of the following industries: Aerospace, Apparel/ Footwear, Automotive, ...

  16. Nonpoint Source Pollution Assessment: Framework, Vulnerability Analysis, and Modeling

    E-Print Network [OSTI]

    Pasternack, Gregory B.

    Regulating Water Pollution Sources Surface Water Quality Ground Water Quality Point Sources of Pollution Regulating Water Pollution Sources Surface Water Quality Ground Water Quality Point Sources of Pollution Quality Ground Water Quality Point Sources of Pollution Nonpoint Sources of Pollution 1970s now Clean

  17. NREL's Enhanced Scenario Framework for Electricity Sector Analysis...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    have been used to inform U.S. region inputs to the International Energy Agency's (IEA) and Nuclear Energy Agency's recent report on "Projected Costs of Generating...

  18. ORIGINAL PAPER A framework for the probabilistic analysis

    E-Print Network [OSTI]

    ten Brink, Uri S.

    .S. examples of many meteotsunamis around the world that have proved to be hazardous. Other locations where A probabilistic technique is developed to assess the hazard from meteotsuna- mis. Meteotsunamis are unusual sea model. Aggregation of the results from the Monte Carlo scheme results in a meteotsunami hazard curve

  19. A NON-EQUILIBRIUM ANALYSIS & CONTROL FRAMEWORK FOR COMMUNICATION NETWORKS

    E-Print Network [OSTI]

    Alpcan, Tansu

    and Prashant G. Mehta Tamer Bas¸ar Deutsche Telekom Laboratories Ernst-Reuter-Platz 7, Berlin 10587 Germany., University of Illinois 1308 West Main Street, Urbana IL 61801 USA E-mail: tbasar

  20. A Framework for Analysis of Energy-Water Interdependency Problems

    SciTech Connect (OSTI)

    Robert F. Jeffers; Jacob J. Jacobson

    2011-08-01

    The overall objective of this work is to improve the holistic value of energy development strategies by integrating management criteria for water availability, water quality, and ecosystem health into the energy system planning process. The Snake River Basin (SRB) in southern Idaho is used as a case study to show options for improving full economic utilization of aquatic resources given multiple scenarios such as changing climate, additional regulations, and increasing population. Through the incorporation of multiple management criteria, potential crosscutting solutions to energy and water issues in the SRB can be developed. The final result of this work will be a multi-criteria decision support tool - usable by policy makers and researchers alike - that will give insight into the behavior of the management criteria over time and will allow the user to experiment with a range of potential solutions. Because several basins in the arid west are dealing with similar water, energy, and ecosystem issues, the tool and conclusions will be transferable to a wide range of locations and applications. This is a very large, multi-year project to be completed in phases. This paper deals with interactions between the hydrologic system and water use at a basin level. Future work will include the interdependency between energy use and water use in these systems.

  1. Design theoretic analysis of three system modeling frameworks.

    SciTech Connect (OSTI)

    McDonald, Michael James

    2007-05-01

    This paper analyzes three simulation architectures from the context of modeling scalability to address System of System (SoS) and Complex System problems. The paper first provides an overview of the SoS problem domain and reviews past work in analyzing model and general system complexity issues. It then identifies and explores the issues of vertical and horizontal integration as well as coupling and hierarchical decomposition as the system characteristics and metrics against which the tools are evaluated. In addition, it applies Nam Suh's Axiomatic Design theory as a construct for understanding coupling and its relationship to system feasibility. Next it describes the application of MATLAB, Swarm, and Umbra (three modeling and simulation approaches) to modeling swarms of Unmanned Flying Vehicle (UAV) agents in relation to the chosen characteristics and metrics. Finally, it draws general conclusions for analyzing model architectures that go beyond those analyzed. In particular, it identifies decomposition along phenomena of interaction and modular system composition as enabling features for modeling large heterogeneous complex systems.

  2. A Framework for Analysis of Energy-Water Interdependency Problems

    SciTech Connect (OSTI)

    Robert Jeffers; Jacob J. Jacobson; Kristyn Scott

    2011-07-01

    The overall objective of this work is to improve the holistic value of energy development strategies by integrating management criteria for water availability, water quality, and ecosystem health into the energy system planning process. The Snake River Basin (SRB) in southern Idaho is used as a case study to show options for improving full economic utilization of aquatic resources given multiple scenarios such as changing climate, additional regulations, and increasing population. Through the incorporation of multiple management criteria, potential crosscutting solutions to energy and water issues in the SRB can be developed. The final result of this work will be a multi-criteria decision support tool - usable by policy makers and researchers alike - that will give insight into the behavior of the management criteria over time and will allow the user to experiment with a range of potential solutions. Because several basins in the arid west are dealing with similar water, energy, and ecosystem issues, the tool and conclusions will be transferrable to a wide range of locations and applications. This is a very large project to be completed in phases. This paper deals with interactions between the hydrologic system and water use at a basin level. Future work will include the interdependency between energy use and water use in these systems.

  3. Energy and Greenhouse Impacts of Biofuels: A Framework for Analysis

    E-Print Network [OSTI]

    Kammen, Daniel M.; Farrell, Alexander E.; Plevin, Richard J.; Jones, Andrew D.; Nemet, Gregory F.; Delucchi, Mark A.

    2008-01-01

    activity in the field of bio-energy 3 to federal R&Dassessment of U.S. Bio-energy patents and federal R&D. Blackgranted Our definition of “bio-energy” includes the use of

  4. LCFIPlus: A Framework for Jet Analysis in Linear Collider Studies

    E-Print Network [OSTI]

    Taikan Suehara; Tomohiko Tanabe

    2015-06-28

    We report on the progress in flavor identification tools developed for a future $e^+e^-$ linear collider such as the International Linear Collider (ILC) and Compact Linear Collider (CLIC). Building on the work carried out by the LCFIVertex collaboration, we employ new strategies in vertex finding and jet finding, and introduce new discriminating variables for jet flavor identification. We present the performance of the new algorithms in the conditions simulated using a detector concept designed for the ILC. The algorithms have been successfully used in ILC physics simulation studies, such as those presented in the ILC Technical Design Report.

  5. Analysis of the Periodical Payment Framework using Restricted Proxy Certificates

    E-Print Network [OSTI]

    Brown, Lawrie

    Lawrie Brown School of Information Technology and Electrical Engineering University of New South Wales immediate problems in a quickest and likely cheapest way possible. There does not seem to be any effort

  6. LCFIPlus: A Framework for Jet Analysis in Linear Collider Studies

    E-Print Network [OSTI]

    Suehara, Taikan

    2015-01-01

    We report on the progress in flavor identification tools developed for a future $e^+e^-$ linear collider such as the International Linear Collider (ILC) and Compact Linear Collider (CLIC). Building on the work carried out by the LCFIVertex collaboration, we employ new strategies in vertex finding and jet finding, and introduce new discriminating variables for jet flavor identification. We present the performance of the new algorithms in the conditions simulated using a detector concept designed for the ILC. The algorithms have been successfully used in ILC physics simulation studies, such as those presented in the ILC Technical Design Report.

  7. Preliminary Analysis Framework for State Sustainable Transportation system

    E-Print Network [OSTI]

    Naganathan, Hariharan

    2013-12-31

    Sustainable practices have become the cornerstone of the transportation sector, and widely adopted by many states' transportation agencies. The nerve center of the economic development today circles around resource utilization and energy use...

  8. Energy and Greenhouse Impacts of Biofuels: A Framework for Analysis

    E-Print Network [OSTI]

    Kammen, Daniel M.; Farrell, Alexander E.; Plevin, Richard J.; Jones, Andrew D.; Nemet, Gregory F.; Delucchi, Mark A.

    2008-01-01

    cases. (bottom) Net energy and petroleum inputs for theboth petroleum feedstock and petroleum energy inputs arethe coal, natural gas and petroleum energy consumed at each

  9. Energy and Greenhouse Impacts of Biofuels: A Framework for Analysis

    E-Print Network [OSTI]

    Kammen, Daniel M.; Farrell, Alexander E.; Plevin, Richard J.; Jones, Andrew D.; Nemet, Gregory F.; Delucchi, Mark A.

    2008-01-01

    International Journal of Life Cycle Assessment 7(4): 237-Journal of Life Cycle Assessment, March (2007).Boundaries of Life-Cycle Assessment Through Environmental

  10. Energy and Greenhouse Impacts of Biofuels: A Framework for Analysis

    E-Print Network [OSTI]

    Kammen, Daniel M.; Farrell, Alexander E.; Plevin, Richard J.; Jones, Andrew D.; Nemet, Gregory F.; Delucchi, Mark A.

    2008-01-01

    The rapid rise in biofuel production is driven by governmentprices. Globally, biofuel production is dominated bysoybeans) and current biofuel production processes are many

  11. Screening Metal-Organic Frameworks by Analysis of Transient Breakthrough

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its inceptionLaboratoryof

  12. Online Monitoring Technical Basis and Analysis Framework for Emergency

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties -DepartmentAvailableHighOffice ofProject |(FebruaryOneOneOneDiesel

  13. Online Monitoring Technical Basis and Analysis Framework for Large Power

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on DeliciousMathematicsEnergyInterested Parties -DepartmentAvailableHighOffice ofProject

  14. Hanford Tank Waste Retrieval, Treatment, and Disposition Framework...

    Office of Environmental Management (EM)

    Hanford Tank Waste Retrieval, Treatment, and Disposition Framework Hanford Tank Waste Retrieval, Treatment, and Disposition Framework Forty years of plutonium production at the...

  15. Conceptual Framework for Developing Resilience Metrics for the...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Conceptual Framework for Developing Resilience Metrics for the Electricity, Oil, and Gas Sectors in the United States (September 2014) Conceptual Framework for Developing...

  16. Mesoscale Modeling Framework Design: Subcontract Report | SciTech...

    Office of Scientific and Technical Information (OSTI)

    Mesoscale Modeling Framework Design: Subcontract Report Citation Details In-Document Search Title: Mesoscale Modeling Framework Design: Subcontract Report You are accessing a...

  17. Conceptual Framework for Developing Resilience Metrics for the...

    Office of Environmental Management (EM)

    Conceptual Framework for Developing Resilience Metrics for the Electricity, Oil, and Gas Sectors in the United States Conceptual Framework for Developing Resilience Metrics for the...

  18. EV Everywhere Consumer/Charging Workshop: Target-Setting Framework...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ConsumerCharging Workshop: Target-Setting Framework and Consumer Behavior EV Everywhere ConsumerCharging Workshop: Target-Setting Framework and Consumer Behavior Presentation...

  19. EV Everywhere Battery Workshop: Preliminary Target-Setting Framework...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Publications EV Everywhere Electric Drive Workshop: Preliminary Target-Setting Framework EV Everywhere ConsumerCharging Workshop: Target-Setting Framework and Consumer Behavior...

  20. Optimization Online - A Security Framework for Smart Metering with ...

    E-Print Network [OSTI]

    Cristina Rottondi

    2011-12-05

    Dec 5, 2011 ... A Security Framework for Smart Metering with Multiple Data Consumers. Cristina ... This paper proposes a framework for allowing information ...

  1. Tunable Electrical Conductivity in Metal-Organic Framework Thin...

    Office of Scientific and Technical Information (OSTI)

    Tunable Electrical Conductivity in Metal-Organic Framework Thin-Film Devices Citation Details In-Document Search Title: Tunable Electrical Conductivity in Metal-Organic Framework...

  2. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) Jump to: navigation, search Project Name AFTER A Framework...

  3. Deputy Secretary Poneman to Attend International Framework for...

    Energy Savers [EERE]

    to Attend International Framework for Nuclear Energy Cooperation Meeting in Jordan Deputy Secretary Poneman to Attend International Framework for Nuclear Energy Cooperation Meeting...

  4. International Framework for Nuclear Energy Cooperation to Hold...

    Energy Savers [EERE]

    International Framework for Nuclear Energy Cooperation to Hold Ministerial-Level Meeting Sept. 29 in Warsaw, Poland International Framework for Nuclear Energy Cooperation to Hold...

  5. ACCOLADES: A Scalable Workflow Framework for Large-Scale Simulation...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ACCOLADES: A Scalable Workflow Framework for Large-Scale Simulation and Analyses of Automotive Engines Title ACCOLADES: A Scalable Workflow Framework for Large-Scale Simulation and...

  6. Agricultural pathogen decontamination technology-reducing the threat of infectious agent spread.

    SciTech Connect (OSTI)

    Betty, Rita G.; Bieker, Jill Marie; Tucker, Mark David

    2005-10-01

    Outbreaks of infectious agricultural diseases, whether natural occurring or introduced intentionally, could have catastrophic impacts on the U.S. economy. Examples of such agricultural pathogens include foot and mouth disease (FMD), avian influenza (AI), citrus canker, wheat and soy rust, etc. Current approaches to mitigate the spread of agricultural pathogens include quarantine, development of vaccines for animal diseases, and development of pathogen resistant crop strains in the case of plant diseases. None of these approaches is rapid, and none address the potential persistence of the pathogen in the environment, which could lead to further spread of the agent and damage after quarantine is lifted. Pathogen spread in agricultural environments commonly occurs via transfer on agricultural equipment (transportation trailers, tractors, trucks, combines, etc.), having components made from a broad range of materials (galvanized and painted steel, rubber tires, glass and Plexiglas shields, etc), and under conditions of heavy organic load (mud, soil, feces, litter, etc). A key element of stemming the spread of an outbreak is to ensure complete inactivation of the pathogens in the agricultural environment and on the equipment used in those environments. Through the combination of enhanced agricultural pathogen decontamination chemistry and a validated inactivation verification methodology, important technologies for incorporation as components of a robust response capability will be enabled. Because of the potentially devastating economic impact that could result from the spread of infectious agricultural diseases, the proposed capability components will promote critical infrastructure protection and greater border and food supply security. We investigated and developed agricultural pathogen decontamination technologies to reduce the threat of infectious-agent spread, and thus enhance agricultural biosecurity. Specifically, enhanced detergency versions of the patented Sandia decontamination chemistry were developed and tested against a few surrogate pathogens under conditions of relatively heavy organic load. Tests were conducted on surfaces commonly found in agricultural environments. Wide spectrum decontamination efficacy, low corrosivity, and biodegradability issues were addressed in developing an enhanced detergency formulation. A method for rapid assessment of loss of pathogenic activity (inactivation) was also assessed. This enhanced technology will enable rapid assessment of contamination following an intentional event, and will also be extremely useful in routine assessment of agricultural environments. The primary effort during the second year was progress towards a demonstration of both decontamination and viral inactivation technologies of Foot and Mouth virus (FMDv) using the modified SNL chemistry developed through this project. Lab studies using a surrogate virus (bovine enterovirus) were conducted using DF200, modified DF200 chemistry, and decontaminants currently recommended for use in heavily loaded organic, agricultural environments (VirkonS, 10% bleach, sodium hydroxide and citric acid). Tests using actual FMD virus will be performed at the Department of Homeland Security's Plum Island facilities in the fall of 2005. Success and the insight gained from this project will lead to enhanced response capability, which will benefit agencies such as USDA, DHS, DOD, and the agricultural industry.

  7. Towards a framework of nuclear competencies

    SciTech Connect (OSTI)

    Ghitescu, P.

    2012-07-01

    For the countries considering the introduction of a nuclear energy program, the management of human resources should be a part of the wider integrated management system in order to ensure long term safe and reliable operation. Nuclear energy strategy and approaches to human resources development should take into consideration such fundamental aspects as: development and implementation of a workforce plan, required competencies and qualifications, prerequisites for staffing a nuclear energy program, needed training programs and training facilities, qualification and training requirements. Development of common instruments that respond to the above needs and vision has lead to a new concept of European Credit System for Vocational Education and Training. The European Credit System for Vocational Education and Training (ECVET) is based on definition of 'learning outcomes ' in terms of knowledge, skills and competence, and on identification of portfolios of learning outcomes that allow an individual to prove competencies in a coherent manner. ECVET proposes a common understanding of basic definitions of education and training as well as of the new proposed concepts and it should be recognized by all employers in the EU. In this context, a number of 'Euratom Fission Training Schemes' (EFTS) have been launched in specific areas where a shortage of skilled professionals has been identified. In these schemes the competence building is the result of traditional education plus life-long learning, non-traditional learning, and other forms of educational experiences, relying, in particular, on border-less mobility to get acquainted with various sectors. Each particular Training Scheme should follow a similar path for the achievement of the designed learning outcomes (knowledge, skills, and attitudes). This path to the Training Scheme consists of different activities regarding: definition of training scheme learning outcomes and modules, assessment of prerequisites and student selection, student interview for development of individual training plan, start of the training activities under a specific training scheme. The introduction and recognition of ECVET will lead to a common taxonomy of competencies, and will provide also information about qualifications and units in numerical form, enabling mutual recognition of a training scheme. The description of the learning outcomes to be achieved for qualifying to a specific job profile may follow the analysis phase of the systematic approach to training (SAT). This would ensure a common tool, already used by all trainers. All these steps contribute to establishing of a framework of nuclear competencies recognized and accepted throughout member states. (authors)

  8. Multichannel framework for singular quantum mechanics

    SciTech Connect (OSTI)

    Camblong, Horacio E.; Epele, Luis N.; Fanchiotti, Huner; García Canal, Carlos A.; Ordóñez, Carlos R.

    2014-01-15

    A multichannel S-matrix framework for singular quantum mechanics (SQM) subsumes the renormalization and self-adjoint extension methods and resolves its boundary-condition ambiguities. In addition to the standard channel accessible to a distant (“asymptotic”) observer, one supplementary channel opens up at each coordinate singularity, where local outgoing and ingoing singularity waves coexist. The channels are linked by a fully unitary S-matrix, which governs all possible scenarios, including cases with an apparent nonunitary behavior as viewed from asymptotic distances. -- Highlights: •A multichannel framework is proposed for singular quantum mechanics and analogues. •The framework unifies several established approaches for singular potentials. •Singular points are treated as new scattering channels. •Nonunitary asymptotic behavior is subsumed in a unitary multichannel S-matrix. •Conformal quantum mechanics and the inverse quartic potential are highlighted.

  9. Anion separation with metal-organic frameworks

    SciTech Connect (OSTI)

    Custelcean, Radu; Moyer, Bruce A

    2007-01-01

    The application of metal-organic frameworks (MOFs) to anion separations with a special emphasis on anion selectivity is reviewed. The coordination frameworks are classified on the basis of the main interactions to the included anion, from weak and non-specific van der Waals forces to more specific interactions such as coordination to Lewis acid metal centers or hydrogen bonding. The importance of anion solvation phenomena to the observed anion selectivities is highlighted, and strategies for reversing the Hofmeister bias that favors large, less hydrophilic anions, and for obtaining peak selectivities based on shape recognition are delineated. Functionalization of the anion-binding sites in MOFs with strong and directional hydrogen-bonding groups that are complementary to the included anion, combined with organizational rigidity of the coordination framework, appears to be the most promising approach for achieving non-Hofmeister selectivity.

  10. System architecture analysis and selection under uncertainty

    E-Print Network [OSTI]

    Smaling, Rudolf M

    2005-01-01

    A system architecture analysis and selection methodology is presented that builds on the Multidisciplinary Analysis and Optimization framework. It addresses a need and opportunity to extend the MAO techniques to include a ...

  11. The impact of the threat of violence on selected school districts in Texas 

    E-Print Network [OSTI]

    Neeley, Martha Ann

    2004-09-30

    assault, robbery, and aggravated assault. Statistics have remained consistent at seven percent to eight percent for students who have been injured or threatened with a weapon such as a gun, knife, or club since 1993. At the middle and high school levels... Design.................................................. 53 Data Collection........................................................... 56 Analysis and Design Techniques................................. 58 vii CHAPTER Page IV RESULTS OF THE STUDY...

  12. Teaching OOT Using a Framework and Both Direct and Net-based Tutoring1

    E-Print Network [OSTI]

    -oriented application framework as a common base for the projects. That way, the students are given an architecture software life cycle and of a proper requirements analysis (see e.g. Wilkin- son 1995, Wirfs@informatik.unibw-muenchen.de Abstract: We report on experience from teaching OO project courses to undergraduate students. Before

  13. Comprehensive study of carbon dioxide adsorption in the metalorganic frameworks M2(dobdc)

    E-Print Network [OSTI]

    Comprehensive study of carbon dioxide adsorption in the metal­organic frameworks M2(dobdc) (M ¼ Mg and Craig M. Brown*bl Analysis of the CO2 adsorption properties of a well-known series of metal and single crystal X-ray di raction experiments are used to unveil the site-speci c binding properties of CO2

  14. A performance vs. cost framework for evaluating DHT design tradeoffs under churn

    E-Print Network [OSTI]

    Li, Jinyang

    A performance vs. cost framework for evaluating DHT design tradeoffs under churn Jinyang Li, Jeremy tables (DHTs) incor- porate features to achieve low latency for lookup requests in the face of churn to understand which features are more important under churn. PVC analysis shows that the key to efficiently

  15. Process Mining Framework for Software Processes

    E-Print Network [OSTI]

    van der Aalst, Wil

    Process Mining Framework for Software Processes Vladimir Rubin1,2 , Christian W. G¨unther1 , Wil M.P. van der Aalst1 , Ekkart Kindler2 , Boudewijn F. van Dongen1 , and Wilhelm Sch¨afer2 1 Eindhoven University of Paderborn, Paderborn, Germany {vroubine,kindler,wilhelm}@uni-paderborn.de Abstract. Software

  16. A GENERIC FRAMEWORK FOR COMMUNICATION OF

    E-Print Network [OSTI]

    A GENERIC FRAMEWORK FOR COMMUNICATION OF DISTRIBUTED ENERGY RESOURCES THROUGH A CLOUD-BASED SERVICE energy resources (DER) are starting to appear. In Denmark the government has set an ambitious goal of 50 energy resources through a cloud-based service Technical University of Denmark Informatics

  17. Proton++: A Customizable Declarative Multitouch Framework

    E-Print Network [OSTI]

    California at Irvine, University of

    Proton++: A Customizable Declarative Multitouch Framework Kenrick Kin1,2 Bj¨orn Hartmann1 Tony DeRose2 Maneesh Agrawala1 1 University of California, Berkeley 2 Pixar Animation Studios ABSTRACT Proton- sions of touch event symbols. It builds on the Proton frame- work by allowing developers to incorporate

  18. Problem Solving Framework Read the problem carefully.

    E-Print Network [OSTI]

    Minnesota, University of

    Problem Solving Framework Read the problem carefully. Draw a useful picture (sketch) that shows how identified in Step 1. 1. Understand the Problem 2. Analyze the Problem 3. Construct a Solution Apply constraint equations) to eliminate the unwanted unknowns? Use math (algebra/calculus) to solve for target

  19. A Unifying Framework for Modelling and Analysing

    E-Print Network [OSTI]

    Gilbert, David

    developed an approach for modelling and analysing biochemical networks using discrete and continuous PetriA Unifying Framework for Modelling and Analysing Biochemical Pathways Using Petri Nets David Cottbus, Germany sebastian.lehrack@informatik.tu-cottbus.de Abstract. We give a description of a Petri net

  20. Rocky Mountain Research Station 20142017 Strategic Framework

    E-Print Network [OSTI]

    Rocky Mountain Research Station 2014­2017 Strategic Framework #12;Rocky Mountain Research Station 240 West Prospect Fort Collins, CO 80526 (970) 498-1100 www.fs.fed.us/rmrs High mountain lake at GLEES (Glacier Lakes Ecosystem Experiments Site) #12;1ROCKY MOUNTAIN RESEARCH STATION -- 2014­2017 STRATEg

  1. depositional framework 30 ka isochronous surface

    E-Print Network [OSTI]

    Chen, Wen-Shan

    in the Quaternary of the Virginia coast, USA. Sedimentology, 50, 81-111. #12;114 How to reconstruct the depositional, it is difficult to reconstruct the subsurface depositional framework of litho-stratigraphy due to strong lateral be derived through the study of chrono-stratigraphy Key words: the last glacial period, sequence stratigraphy

  2. A Formal Framework for Java Separate Compilation

    E-Print Network [OSTI]

    Robbiano, Lorenzo

    A Formal Framework for Java Separate Compilation Davide Ancona, Giovanni Lagorio, and Elena Zucca,lagorio,zuccag@disi.unige.it Abstract. We de#12;ne a formal notion, called compilation schema, allow- ing to specify di#11;erent possibilities for performing the overall process of Java compilation, which includes type-checking of source

  3. ARTIFICIAL INTELLIGENCE PLANNING PROBLEMS PETRI NET FRAMEWORK

    E-Print Network [OSTI]

    Antsaklis, Panos

    ARTIFICIAL INTELLIGENCE PLANNING PROBLEMS IN A PETRI NET FRAMEWORK K.M Passino and PJ. Antsaluis defined and then used to model a class of Artificial Intelligence planning problems. A planning stegy. As an iJlustration of the results three Artificial Intelligence planning problems are modelled and soved

  4. A Framework for Optimizing Distributed Workflow Executions

    E-Print Network [OSTI]

    Su, Jianwen

    on families of "communicat- ing flowcharts" (CFs). In the framework, a workflow schema is first rewritten as a family of CFs that are essentially atomic and execute in parallel. The CFs can be grouped into "clus- ters". Several CFs can be combined to form a single CF, which is useful when executing a sub

  5. A Statistical Framework for Spatial Comparative Genomics

    E-Print Network [OSTI]

    A Statistical Framework for Spatial Comparative Genomics Rose Hoberman May 2007 CMU-CS-07, or the U.S. Government. #12;Keywords: spatial comparative genomics, comparative genomics, gene clusters, max-gap clusters, gene teams, whole genome duplication, paralogons, synteny, ortholog detection #12

  6. JavaKollektionen Java Collection Framework

    E-Print Network [OSTI]

    Schürmann, Michael

    459 JavaKollektionen Java Collection Framework Bereitstellung wichtiger Kollektionen (Listen Implementierung häufig benutzter Algorithmen (Suchen, Sortieren, kleines/grö�tes Element, ...) Basis: java.util.Collection #12;460 Schnittstelle für alle Kollektionsklassen (1) Schnittstelle java.util.Collection Grö�e der

  7. A Retasking Framework For Wireless Sensor Networks

    E-Print Network [OSTI]

    Weigle, Michele

    used in scientific research, industrial manufacturing, and environmental monitoring over the past-effective. In this paper, we present Alert, a software framework for retasking wireless sensor networks, enabling, built upon Deluge [1], is a wireless network code distribution protocol enabling node group management

  8. Performance Analysis of Stochastic Network Coverage with Limited ...

    E-Print Network [OSTI]

    2009-10-30

    exact matching of the sensor's coverage profile with the region's threat profile. ... port [4] states that the main decision of where to place a limited amount of ..... We indicate the condition ... analysis needs to be modified with some care. Our main.

  9. Decision Analysis Vol. 7, No. 2, June 2010, pp. 151154

    E-Print Network [OSTI]

    Chen, Zhongping

    . W. Merrick and Laura A. McLay ask "Is Screening Cargo Containers for Smuggled Nuclear Threats Options Using an Implied Binomial Tree," is by Tianyang Wang and James S. Dyer. The next article; common value; Cox's axioms; decision analysis; decision-focused transformation; elicitation; expert

  10. Will Cyber-Insurance Improve Network Security? A Market Analysis

    E-Print Network [OSTI]

    , Microsoft, etc.), cyber-insurers (e.g., ISPs, cloud providers, security vendors, etc.), regulatory agenciesWill Cyber-Insurance Improve Network Security? A Market Analysis Ranjan Pal University of Southern--Recent work in security has illustrated that solutions aimed at detection and elimination of security threats

  11. The Multi-Mission Maximum Likelihood framework (3ML)

    E-Print Network [OSTI]

    Vianello, Giacomo; Younk, Patrick; Tibaldo, Luigi; Burgess, James M; Ayala, Hugo; Harding, Patrick; Hui, Michelle; Omodei, Nicola; Zhou, Hao

    2015-01-01

    Astrophysical sources are now observed by many different instruments at different wavelengths, from radio to high-energy gamma-rays, with an unprecedented quality. Putting all these data together to form a coherent view, however, is a very difficult task. Each instrument has its own data format, software and analysis procedure, which are difficult to combine. It is for example very challenging to perform a broadband fit of the energy spectrum of the source. The Multi-Mission Maximum Likelihood framework (3ML) aims to solve this issue, providing a common framework which allows for a coherent modeling of sources using all the available data, independent of their origin. At the same time, thanks to its architecture based on plug-ins, 3ML uses the existing official software of each instrument for the corresponding data in a way which is transparent to the user. 3ML is based on the likelihood formalism, in which a model summarizing our knowledge about a particular region of the sky is convolved with the instrument...

  12. Defining resilience within a risk-informed assessment framework

    SciTech Connect (OSTI)

    Coles, Garill A.; Unwin, Stephen D.; Holter, Gregory M.; Bass, Robert B.; Dagle, Jeffery E.

    2011-08-01

    The concept of resilience is the subject of considerable discussion in academic, business, and governmental circles. The United States Department of Homeland Security for one has emphasised the need to consider resilience in safeguarding critical infrastructure and key resources. The concept of resilience is complex, multidimensional, and defined differently by different stakeholders. The authors contend that there is a benefit in moving from discussing resilience as an abstraction to defining resilience as a measurable characteristic of a system. This paper proposes defining resilience measures using elements of a traditional risk assessment framework to help clarify the concept of resilience and as a way to provide non-traditional risk information. The authors show various, diverse dimensions of resilience can be quantitatively defined in a common risk assessment framework based on the concept of loss of service. This allows the comparison of options for improving the resilience of infrastructure and presents a means to perform cost-benefit analysis. This paper discusses definitions and key aspects of resilience, presents equations for the risk of loss of infrastructure function that incorporate four key aspects of resilience that could prevent or mitigate that loss, describes proposed resilience factor definitions based on those risk impacts, and provides an example that illustrates how resilience factors would be calculated using a hypothetical scenario.

  13. Towards a public analysis database for LHC new physics searches using MadAnalysis 5

    E-Print Network [OSTI]

    B. Dumont; B. Fuks; S. Kraml; S. Bein; G. Chalons; E. Conte; S. Kulkarni; D. Sengupta; C. Wymant

    2015-01-27

    We present the implementation, in the MadAnalysis 5 framework, of several ATLAS and CMS searches for supersymmetry in data recorded during the first run of the LHC. We provide extensive details on the validation of our implementations and propose to create a public analysis database within this framework.

  14. EMC studies using the simulation framework of PANDA

    E-Print Network [OSTI]

    Biegun, Aleksandra

    2010-01-01

    The Anti-Proton ANnihilation at DArmstadt (PANDA) experiment proposed at the Facility for Antiproton and Ion Research (FAIR) in Darmstadt (Germany) will perform a high precision spectroscopy of charmonium and exotic hadrons, such as hybrids, glueballs and hypernuclei. A highly intense beam of anti-protons provided by High Energy Storage Ring (HESR) with an unprecedented resolution will scan a mass range of 2 to 5.5 GeV/c2. In preparation for experiments with PANDA, careful and large-scale simulation studies need to be performed in the coming years to determine analysis strategies, to provide feedback for the design, construction and performance optimization of individual detector components and to design methods for the calibration and interpretation of the experimental results. Results of a simulation for the ElectroMagnetic Calorimeter (EMC), built from lead tungstate (PWO) crystals and placed inside the Target Spectrometer (TS), are presented. The simulations were carried out using the PandaRoot framework,...

  15. PUC's New Evaluation, Measurement and Verification Framework 

    E-Print Network [OSTI]

    Osterloh, P.

    2013-01-01

    ) (6) ensuring that programs are evaluated, measured, and verified using a framework established by the commission that promotes effective program design and consistent and streamlined reporting; The Beginning ESL-KT-13-12-11 CATEE 2013: Clean Air... techniques and reporting ? Increase accuracy of demand and energy savings while fostering confidence in results ? Provide information to improve accuracy of program performance EM&V Goals ESL-KT-13-12-11 CATEE 2013: Clean Air Through Energy Efficiency...

  16. ESCO Framework for Public/Federal Buildings 

    E-Print Network [OSTI]

    Liehr, G.

    2008-01-01

    S ? Siemens 2008 Building Technologies ESCO Framework for Public / Federal Buildings Gunnar Liehr Siemens Building Technologies Energy & Environmental Solutions ICEBO 20 th October 2008, Berlin ESL-IC-08-10-01 Proceedings of the Eighth International...Building Program Partnership with Clinton Climate Initiative resulted in projects with City of Houston and Allegheny College, PA USA 1st LEED Platinum Project Completed in USA - The Tahoe Center for Environmental Sciences at Sierra Nevada College BAU is a...

  17. UNITY: Confronting Supernova Cosmology's Statistical and Systematic Uncertainties in a Unified Bayesian Framework

    E-Print Network [OSTI]

    Rubin, David; Barbary, Kyle; Boone, Kyle; Chappell, Greta; Currie, Miles; Deustua, Susana; Fagrelius, Parker; Fruchter, Andrew; Hayden, Brian; Lidman, Chris; Nordin, Jakob; Perlmutter, Saul; Saunders, Clare; Sofiatti, Caroline

    2015-01-01

    While recent supernova cosmology research has benefited from improved measurements, current analysis approaches are not statistically optimal and will prove insufficient for future surveys. This paper discusses the limitations of current supernova cosmological analyses in treating outliers, selection effects, shape- and color-standardization relations, intrinsic dispersion, and heterogeneous observations. We present a new Bayesian framework, called UNITY (Unified Nonlinear Inference for Type-Ia cosmologY), that incorporates significant improvements in our ability to confront these effects. We apply the framework to real supernova observations and demonstrate smaller statistical and systematic uncertainties. We verify earlier results that SNe Ia require nonlinear shape and color standardizations, but we now include these nonlinear relations in a statistically well-justified way. This analysis was blinded, in that the method was first validated on simulated data, and no analysis changes were made after transiti...

  18. Knowledge Framework Implementation with Multiple Architectures - 13090

    SciTech Connect (OSTI)

    Upadhyay, H.; Lagos, L.; Quintero, W.; Shoffner, P.; DeGregory, J.

    2013-07-01

    Multiple kinds of knowledge management systems are operational in public and private enterprises, large and small organizations with a variety of business models that make the design, implementation and operation of integrated knowledge systems very difficult. In recent days, there has been a sweeping advancement in the information technology area, leading to the development of sophisticated frameworks and architectures. These platforms need to be used for the development of integrated knowledge management systems which provides a common platform for sharing knowledge across the enterprise, thereby reducing the operational inefficiencies and delivering cost savings. This paper discusses the knowledge framework and architecture that can be used for the system development and its application to real life need of nuclear industry. A case study of deactivation and decommissioning (D and D) is discussed with the Knowledge Management Information Tool platform and framework. D and D work is a high priority activity across the Department of Energy (DOE) complex. Subject matter specialists (SMS) associated with DOE sites, the Energy Facility Contractors Group (EFCOG) and the D and D community have gained extensive knowledge and experience over the years in the cleanup of the legacy waste from the Manhattan Project. To prevent the D and D knowledge and expertise from being lost over time from the evolving and aging workforce, DOE and the Applied Research Center (ARC) at Florida International University (FIU) proposed to capture and maintain this valuable information in a universally available and easily usable system. (authors)

  19. Comparative analysis of twelve Dothideomycete plant pathogens

    SciTech Connect (OSTI)

    Ohm, Robin; Aerts, Andrea; Salamov, Asaf; Goodwin, Stephen B.; Grigoriev, Igor

    2011-03-11

    The Dothideomycetes are one of the largest and most diverse groups of fungi. Many are plant pathogens and pose a serious threat to agricultural crops grown for biofuel, food or feed. Most Dothideomycetes have only a single host and related Dothideomycete species can have very diverse host plants. Twelve Dothideomycete genomes have currently been sequenced by the Joint Genome Institute and other sequencing centers. They can be accessed via Mycocosm which has tools for comparative analysis

  20. National Infrastructure Simulation and Analysis Center Overview

    SciTech Connect (OSTI)

    Berscheid, Alan P. [Los Alamos National Laboratory

    2012-07-30

    National Infrastructure Simulation and Analysis Center (NISAC) mission is to: (1) Improve the understanding, preparation, and mitigation of the consequences of infrastructure disruption; (2) Provide a common, comprehensive view of U.S. infrastructure and its response to disruptions - Scale & resolution appropriate to the issues and All threats; and (3) Built an operations-tested DHS capability to respond quickly to urgent infrastructure protection issues.

  1. A Systems Framework for Assessing Plumbing Products-Related Water Conservation

    SciTech Connect (OSTI)

    Williams, Alison; Dunham Whitehead, Camilla; Lutz, James

    2011-12-02

    Reducing the water use of plumbing products—toilets, urinals, faucets, and showerheads —has been a popular conservation measure. Improved technologies have created opportunities for additional conservation in this area. However, plumbing products do not operate in a vacuum. This paper reviews the literature related to plumbing products to determine a systems framework for evaluating future conservation measures using these products. The main framework comprises the following categories: water use efficiency, product components, product performance, source water, energy, and plumbing/sewer infrastructure. This framework for analysis provides a starting point for professionals considering future water conservation measures to evaluate the need for additional research, collaboration with other standards or codes committees, and attachment of additional metrics to water use efficiency (such as performance).

  2. Evaluation Framework and Analyses for Thermal Energy Storage Integrated with Packaged Air Conditioning

    SciTech Connect (OSTI)

    Kung, F.; Deru, M.; Bonnema, E.

    2013-10-01

    Few third-party guidance documents or tools are available for evaluating thermal energy storage (TES) integrated with packaged air conditioning (AC), as this type of TES is relatively new compared to TES integrated with chillers or hot water systems. To address this gap, researchers at the National Renewable Energy Laboratory conducted a project to improve the ability of potential technology adopters to evaluate TES technologies. Major project outcomes included: development of an evaluation framework to describe key metrics, methodologies, and issues to consider when assessing the performance of TES systems integrated with packaged AC; application of multiple concepts from the evaluation framework to analyze performance data from four demonstration sites; and production of a new simulation capability that enables modeling of TES integrated with packaged AC in EnergyPlus. This report includes the evaluation framework and analysis results from the project.

  3. Analysis of Hydrogen and Competing Technologies for Utility-Scale Energy Storage (Presentation)

    SciTech Connect (OSTI)

    Steward, D.

    2010-02-11

    Presentation about the National Renewable Energy Laboratory's analysis of hydrogen energy storage scenarios, including analysis framework, levelized cost comparison of hydrogen and competing technologies, analysis results, and conclusions drawn from the analysis.

  4. An object-oriented framework to organize genomic data 

    E-Print Network [OSTI]

    Wei, Ning

    2009-05-15

    interface. A genome object-oriented framework (GOOF) was proposed with object-oriented Java technology and is independent of any database system. This framework seamlessly links the database system and web presentation components. The data models of GOOF...

  5. A COMPUTATIONAL FRAMEWORK INCORPORATING HUMAN AND SOCIAL BEHAVIORS FOR OCCUPANT-

    E-Print Network [OSTI]

    Stanford University

    A COMPUTATIONAL FRAMEWORK INCORPORATING HUMAN AND SOCIAL BEHAVIORS FOR OCCUPANT- CENTRIC highlighted the need to consider occupants' behaviors for better understanding of evacuation framework, occupants' behaviors in emergencies are analyzed by conducting a thorough review

  6. Brønsted Acidity in Metal-Organic Frameworks | Center for Gas...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Brnsted Acidity in Metal-Organic Frameworks Previous Next List Jiang, Juncong and Yaghi, Omar, M. Bronsted Acidity in Metal-Organic Frameworks. Chem. Rev., 115, 6966-6997 (2015)....

  7. Metal-Organic Frameworks Based on Main Group Metals

    E-Print Network [OSTI]

    Zhao, Xiang

    2011-01-01

    Based Frameworks with Open Metal Sites In previous work, weClusters Introduction Porous metal-organic frameworks (MOFs)abundant choice of metal ions and clusters, numerous organic

  8. State Regulatory Framework Will Most Likely Result in Robust...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    State Regulatory Framework Will Most Likely Result in Robust CO2 Pipeline System, New Study Says State Regulatory Framework Will Most Likely Result in Robust CO2 Pipeline System,...

  9. Evaluation of pedestrian data collection methods within a simulation framework

    E-Print Network [OSTI]

    Bierlaire, Michel

    Evaluation of pedestrian data collection methods within a simulation framework Mamy Fetiarison Gunnar Flötteröd Michel Bierlaire STRC 2010 September 2010 #12;Evaluation of pedestrian data collection methods within a simulation framework September 2010 STRC 2010 Evaluation of pedestrian data collection

  10. A framework for sustainable buildings : an application to China

    E-Print Network [OSTI]

    Ospelt, Christoph, 1970-

    1999-01-01

    A framework has been established to discuss the different topics of Sustainability in the context of buildings. The framework includes the dimensions of time and space and the dimensions of ecology, society, and economy. ...

  11. Edinburgh Research Explorer Strengthening conceptual foundations: Analysing frameworks

    E-Print Network [OSTI]

    Millar, Andrew J.

    for ecosystem services and poverty alleviation research Citation for published version: Fisher, JA, Patenaude, G foundations: Analysing frameworks for ecosystem services and poverty alleviation research' Global: Analysing frameworks for ecosystem services and poverty alleviation research§ Janet A. Fisher a

  12. A Framework for Modeling Uncertainty in Regional Climate Change

    E-Print Network [OSTI]

    climate models). The modeling framework revolves around the Massachusetts Institute of Technology (MITA Framework for Modeling Uncertainty in Regional Climate Change Erwan Monier, Xiang Gao, Jeffery processes of policy development and implementation, climate change research needs to focus on improving

  13. A modeling and control framework for operating large-scale electric power systems under present and newly evolving competitive industry structures

    E-Print Network [OSTI]

    Ilic, Marija

    1995-01-01

    This paper introduces a systematic, structure-based modeling framework for analysis and control of electric power systems for processes evolving over the mid-term and long-term time horizons. Much simpler models than the ...

  14. Synthesis of Cationic Extended Frameworks for Anion-Based Applications

    E-Print Network [OSTI]

    Fei, Honghan

    2012-01-01

    and their metabolites). 116 The discovery of Tb(btc) (btc=1,3,5-benzenetricarboxylate) framework has been

  15. Risk assessment framework for geologic carbon sequestration sites

    E-Print Network [OSTI]

    Oldenburg, C.

    2010-01-01

    carbon sequestration risk assessment, in Carbon Dioxidecarbon sequestration risk assessment, Energy Procedia,Risk Assessment Framework for Geologic Carbon Sequestration

  16. The threat of running out of fossil fuels has increased demand for alternative fuel sources. Grain-based ethanol production is one such

    E-Print Network [OSTI]

    Rock, Chris

    The threat of running out of fossil fuels has increased demand for alternative fuel sources. Grain-based ethanol production is one such alternative fuel option, but it relies heavily on grains previously availability. With the growing legislative endorsement for alternative fuel sources, grain production

  17. A Change Management Framework for Service Oriented Enterprises

    E-Print Network [OSTI]

    Rosenberg, Florian

    A Change Management Framework for Service Oriented Enterprises Salman Akram1 Athman Bouguettaya2@cs.rit.edu3 We propose a change management framework for Service-Oriented Enterprise (SOEs). We present, respectively. We propose an automatic change management framework that is based on the above Petri net models

  18. The matrix approach for abstract argumentation frameworks Claudette CAYROL,

    E-Print Network [OSTI]

    Winckler, Marco Antonio Alba

    The matrix approach for abstract argumentation frameworks Claudette CAYROL, Yuming XU IRIT Report- tion framework can be represented by a matrix, and the basic extensions (such as admissible, stable, complete) of an argumentation framework can be determined by sub-blocks of its matrix. In particular

  19. Records Management Framework Policy Version 1.1

    E-Print Network [OSTI]

    Qu, Rong

    Records Management Framework Policy Version 1.1 Last amended: 01 August 2015 1. Introduction The Records Management Framework, or `RM Framework', is a network of Records Officers who will support the University in delivering its aims and responsibilities under the Records Management Policy. Through the work

  20. Records Management Framework Policy Version 1.0

    E-Print Network [OSTI]

    Aickelin, Uwe

    Records Management Framework Policy Version 1.0 Last amended: 01 September 2014 1. Introduction The Records Management Framework, or `RM Framework', is a network of Records Officers who will support the University in delivering its aims and responsibilities under the Records Management Policy. Through the work

  1. 0-7803-9508-5/05/$20.00 2005 IEEE Risk Analysis Terminology for IT-systems: Does it match intuition?

    E-Print Network [OSTI]

    Stølen, Ketil

    0-7803-9508-5/05/$20.00 ©2005 IEEE Risk Analysis Terminology for IT-systems: Does it match specific concepts like "threat", "consequence" and "risk" belong to the daily language. In a risk analysis analysis definitions. Risk analyses often use brainstorming techniques to identify risks based

  2. Distributed micro-releases of bioterror pathogens : threat characterizations and epidemiology from uncertain patient observables.

    SciTech Connect (OSTI)

    Wolf, Michael M. (University of Illinois, Urbana-Champaign, Urbana, IL); Marzouk, Youssef M.; Adams, Brian M.; Devine, Karen Dragon; Ray, Jaideep; Najm, Habib N.

    2008-10-01

    Terrorist attacks using an aerosolized pathogen preparation have gained credibility as a national security concern since the anthrax attacks of 2001. The ability to characterize the parameters of such attacks, i.e., to estimate the number of people infected, the time of infection, the average dose received, and the rate of disease spread in contemporary American society (for contagious diseases), is important when planning a medical response. For non-contagious diseases, we address the characterization problem by formulating a Bayesian inverse problem predicated on a short time-series of diagnosed patients exhibiting symptoms. To keep the approach relevant for response planning, we limit ourselves to 3.5 days of data. In computational tests performed for anthrax, we usually find these observation windows sufficient, especially if the outbreak model employed in the inverse problem is accurate. For contagious diseases, we formulated a Bayesian inversion technique to infer both pathogenic transmissibility and the social network from outbreak observations, ensuring that the two determinants of spreading are identified separately. We tested this technique on data collected from a 1967 smallpox epidemic in Abakaliki, Nigeria. We inferred, probabilistically, different transmissibilities in the structured Abakaliki population, the social network, and the chain of transmission. Finally, we developed an individual-based epidemic model to realistically simulate the spread of a rare (or eradicated) disease in a modern society. This model incorporates the mixing patterns observed in an (American) urban setting and accepts, as model input, pathogenic transmissibilities estimated from historical outbreaks that may have occurred in socio-economic environments with little resemblance to contemporary society. Techniques were also developed to simulate disease spread on static and sampled network reductions of the dynamic social networks originally in the individual-based model, yielding faster, though approximate, network-based epidemic models. These reduced-order models are useful in scenario analysis for medical response planning, as well as in computationally intensive inverse problems.

  3. The Grail Framework: Making Stories Playable on Three Levels in CRPGs

    E-Print Network [OSTI]

    Sullivan, Anne Margaret

    2012-01-01

    Choices, CRPGs, and the Grail Framework. Leonardo ElectronicOF CALIFORNIA SANTA CRUZ THE GRAIL FRAMEWORK: MAKING STORIES8 3.2 Grail Framework and

  4. Periodic relativity: basic framework of the theory

    E-Print Network [OSTI]

    Vikram H. Zaveri

    2014-11-25

    An alternative gravity theory is proposed which does not rely on Riemannian geometry and geodesic trajectories. The theory named periodic relativity (PR) does not use the weak field approximation and allows every two body system to deviate differently from the flat Minkowski metric. PR differs from general relativity (GR) in predictions of the proper time intervals of distant objects. PR proposes a definite connection between the proper time interval of an object and gravitational frequency shift of its constituent particles as the object travels through the gravitational field. PR is based on the dynamic weak equivalence principle which equates the gravitational mass with the relativistic mass. PR provides very accurate solutions for the Pioneer anomaly and the rotation curves of galaxies outside the framework of general relativity. PR satisfies Einstein's field equations with respect to the three major GR tests within the solar system and with respect to the derivation of Friedmann equation in cosmology. This article defines the underlying framework of the theory.

  5. Theoretical Framework for Microscopic Osmotic Phenomena

    E-Print Network [OSTI]

    P. J. Atzberger; P. R. Kramer

    2009-10-29

    The basic ingredients of osmotic pressure are a solvent fluid with a soluble molecular species which is restricted to a chamber by a boundary which is permeable to the solvent fluid but impermeable to the solute molecules. For macroscopic systems at equilibrium, the osmotic pressure is given by the classical van't Hoff Law, which states that the pressure is proportional to the product of the temperature and the difference of the solute concentrations inside and outside the chamber. For microscopic systems the diameter of the chamber may be comparable to the length-scale associated with the solute-wall interactions or solute molecular interactions. In each of these cases, the assumptions underlying the classical van't Hoff Law may no longer hold. In this paper we develop a general theoretical framework which captures corrections to the classical theory for the osmotic pressure under more general relationships between the size of the chamber and the interaction length scales. We also show that notions of osmotic pressure based on the hydrostatic pressure of the fluid and the mechanical pressure on the bounding walls of the chamber must be distinguished for microscopic systems. To demonstrate how the theoretical framework can be applied, numerical results are presented for the osmotic pressure associated with a polymer of N monomers confined in a spherical chamber as the bond strength is varied.

  6. Nanoheterostructure Cation Exchange: Anionic Framework Conservation

    SciTech Connect (OSTI)

    Jain, Prashant K.; Amirav, Lilac; Aloni, Shaul; Alivisatos, A. Paul

    2010-05-11

    In ionic nanocrystals the cationic sub-lattice can be replaced with a different metal ion via a fast, simple, and reversible place-exchange, allowing post-synthetic modification of the composition of the nanocrystal, while preserving its size and shape. Here, we demonstrate for the first time that during such an exchange, the anionic framework of the crystal is preserved. When applied to nanoheterostructures, this phenomenon ensures that compositional interfaces within the heterostructure are conserved throughout the transformation. For instance, a morphology composed of a CdSe nanocrystal embedded in a CdS rod (CdSe/CdS) was exchanged to a PbSe/PbS nanorod via a Cu2Se/Cu2S structure. During every exchange cycle, the seed size and position within the nanorod were preserved, as evident by excitonic features, Z-contrast imaging, and elemental line-scans. Anionic framework conservation extends the domain of cation exchange to the design of more complex and unique nanostructures.

  7. Radioactive and other environmental threats to the United States and the Arctic resulting from past Soviet activities

    SciTech Connect (OSTI)

    1993-12-31

    Earlier this year the Senate Intelligence Committee began to receive reports from environmental and nuclear scientists in Russia detailing the reckless nuclear waste disposal practices, nuclear accidents and the use of nuclear detonations. We found that information disturbing to say the least. Also troubling is the fact that 15 Chernobyl style RBMK nuclear power reactors continue to operate in the former Soviet Union today. These reactors lack a containment structure and they`re designed in such a way that nuclear reaction can actually increase when the reactor overheats. As scientists here at the University of Alaska have documented, polar air masses and prevailing weather patterns provide a pathway for radioactive contaminants from Eastern Europe and Western Russia, where many of these reactors are located. The threats presented by those potential radioactive risks are just a part of a larger Arctic pollution problem. Every day, industrial activities of the former Soviet Union continue to create pollutants. I think we should face up to the reality that in a country struggling for economic survival, environment protection isn`t necessarily the high priority. And that could be very troubling news for the Arctic in the future.

  8. Decision Support Tool: Integrated REDD+ accounting frameworks...

    Open Energy Info (EERE)

    approaches AgencyCompany Organization: USAID LEAF Focus Area: Other Topics: Analysis Tools Resource Type: Guidemanual User Interface: Website ComplexityEase of Use: Simple...

  9. Metal Organic Framework Research: High Throughput Discovery of Robust Metal Organic Framework for CO2 Capture

    SciTech Connect (OSTI)

    None

    2010-08-01

    IMPACCT Project: LBNL is developing a method for identifying the best metal organic frameworks for use in capturing CO2 from the flue gas of coal-fired power plants. Metal organic frameworks are porous, crystalline compounds that, based on their chemical structure, vary considerably in terms of their capacity to grab hold of passing CO2 molecules and their ability to withstand the harsh conditions found in the gas exhaust of coal-fired power plants. Owing primarily to their high tunability, metal organic frameworks can have an incredibly wide range of different chemical and physical properties, so identifying the best to use for CO2 capture and storage can be a difficult task. LBNL uses high-throughput instrumentation to analyze nearly 100 materials at a time, screening them for the characteristics that optimize their ability to selectively adsorb CO2 from coal exhaust. Their work will identify the most promising frameworks and accelerate their large-scale commercial development to benefit further research into reducing the cost of CO2 capture and storage.

  10. Integrating Empirical Measures of Energy Efficiency into an Energy Modeling Framework 

    E-Print Network [OSTI]

    Boyd, G.

    2006-01-01

    Measures of Energy Efficiency Into An Energy Modeling Framework Gale Boyd, Argonne National Laboratory Tools such as Data Envelopment Analysis and Stochastic Frontier Regressions provide a basis for empirical measures of efficiency. The definition... of efficiency these tools encompass can be as broadly defined as total factor productivity, or narrowly defined in terms of single inputs like energy. Given the ability to generate empirical measures of energy efficiency, the question is how to incorporate...

  11. Comprehensive measurement framework for enterprise architectures

    E-Print Network [OSTI]

    Dube, Mahesh R; 10.5121/ijcsit.2011.3406

    2011-01-01

    Enterprise Architecture defines the overall form and function of systems across an enterprise involving the stakeholders and providing a framework, standards and guidelines for project-specific architectures. Project-specific Architecture defines the form and function of the systems in a project or program, within the context of the enterprise as a whole with broad scope and business alignments. Application-specific Architecture defines the form and function of the applications that will be developed to realize functionality of the system with narrow scope and technical alignments. Because of the magnitude and complexity of any enterprise integration project, a major engineering and operations planning effort must be accomplished prior to any actual integration work. As the needs and the requirements vary depending on their volume, the entire enterprise problem can be broken into chunks of manageable pieces. These pieces can be implemented and tested individually with high integration effort. Therefore it bec...

  12. Draft framework for watershed-based trading

    SciTech Connect (OSTI)

    1996-05-30

    Effluent trading is an innovative way for water quality agencies and community stakeholders to develop common-sense, cost-effective solutions for water quality problems in their watersheds. Trading can allow communities to grow and prosper while retaining their commitment to water quality. The bulk of this framework discusses effluent trading in watersheds. Remaining sections discuss transactions that, while not technically fulfilling the definition of `effluent` trade, do involve the exchange of valued water quality or other ecological improvements between partners responding to market initiatives. This document therefore includes activities such as trades within a facility (intra-plant trading) and wetland mitigation banking, effluent trading/watersheds/watershed management/water quality protection/water quality management.

  13. An Electrically Switchable Metal-Organic Framework

    SciTech Connect (OSTI)

    Fernandez, Carlos A.; Martin, Paul F.; Schaef, Herbert T.; Bowden, Mark E.; Thallapally, Praveen K.; Dang, Liem X.; Xu, Wu; Chen, Xilin; McGrail, B. Peter

    2014-08-19

    Crystalline metal organic framework (MOF) materials containing interconnected porosity can be chemically modified to promote stimulus-driven (light, magnetic or electric fields) structural transformations that can be used in a number of devices. Innovative research strategies are now focused on understanding the role of chemical bond manipulation to reversibly alter the free volume in such structures of critical importance for electro-catalysis, molecular electronics, energy storage technologies, sensor devices and smart membranes. In this letter, we study the mechanism for which an electrically switchable MOF composed of Cu(TCNQ) (TCNQ 5 7,7,8,8-tetracyanoquinodimethane) transitions from a high-resistance state to a conducting state in a reversible fashion by an applied potential. The actual mechanism for this reversible electrical switching is still not understood even though a number of reports are available describing the application of electric-field-induced switching of Cu(TCNQ) in device fabrication.

  14. An Electrically Switchable Metal-Organic Framework

    SciTech Connect (OSTI)

    Fernandez, CA; Martin, PC; Schaef, T; Bowden, ME; Thallapally, PK; Dang, L; Xu, W; Chen, XL; McGrail, BP

    2014-08-19

    Crystalline metal organic framework (MOF) materials containing interconnected porosity can be chemically modified to promote stimulus-driven (light, magnetic or electric fields) structural transformations that can be used in a number of devices. Innovative research strategies are now focused on understanding the role of chemical bond manipulation to reversibly alter the free volume in such structures of critical importance for electro-catalysis, molecular electronics, energy storage technologies, sensor devices and smart membranes. In this letter, we study the mechanism for which an electrically switchable MOF composed of Cu(TCNQ) (TCNQ = 7,7,8,8-tetracyanoquinodimethane) transitions from a high-resistance state to a conducting state in a reversible fashion by an applied potential. The actual mechanism for this reversible electrical switching is still not understood even though a number of reports are available describing the application of electric-field-induced switching of Cu(TCNQ) in device fabrication.

  15. Fluorocarbon Adsorption in Hierarchical Porous Frameworks

    SciTech Connect (OSTI)

    Motkuri, Radha K.; Annapureddy, Harsha V.; Vijayakumar, M.; Schaef, Herbert T.; Martin, P F.; McGrail, B. Peter; Dang, Liem X.; Krishna, Rajamani; Thallapally, Praveen K.

    2014-07-09

    The adsorption behavior of a series of fluorocarbon derivatives was examined on a set of microporous metal organic framework (MOF) sorbents and another set of hierarchical mesoporous MOFs. The microporous M-DOBDC (M = Ni, Co) showed a saturation uptake capacity for R12 of over 4 mmol/g at a very low relative saturation pressure (P/Po) of 0.02. In contrast, the mesoporous MOF MIL-101 showed an exceptionally high uptake capacity reaching over 14 mmol/g at P/Po of 0.4. Adsorption affinity in terms of mass loading and isosteric heats of adsorption were found to generally correlate with the polarizability of the refrigerant with R12 > R22 > R13 > R14 > methane. These results suggest the possibility of exploiting MOFs for separation of azeotropic mixtures of fluorocarbons and use in eco-friendly fluorocarbon-based adsorption cooling and refrigeration applications.

  16. Characterize Framework for Igneous Activity at Yucca Mountain, Nevada

    SciTech Connect (OSTI)

    F. Perry; R. Youngs

    2004-10-14

    The purpose of this scientific analysis report is threefold: (1) Present a conceptual framework of igneous activity in the Yucca Mountain region (YMR) consistent with the volcanic and tectonic history of this region and the assessment of this history by experts who participated in the probabilistic volcanic hazard analysis (PVHA) (CRWMS M&O 1996 [DIRS 100116]). Conceptual models presented in the PVHA are summarized and applied in areas in which new information has been presented. Alternative conceptual models are discussed, as well as their impact on probability models. The relationship between volcanic source zones defined in the PVHA and structural features of the YMR are described based on discussions in the PVHA and studies presented since the PVHA. (2) Present revised probability calculations based on PVHA outputs for a repository footprint proposed in 2003 (BSC 2003 [DIRS 162289]), rather than the footprint used at the time of the PVHA. This analysis report also calculates the probability of an eruptive center(s) forming within the repository footprint using information developed in the PVHA. Probability distributions are presented for the length and orientation of volcanic dikes located within the repository footprint and for the number of eruptive centers (conditional on a dike intersecting the repository) located within the repository footprint. (3) Document sensitivity studies that analyze how the presence of potentially buried basaltic volcanoes may affect the computed frequency of intersection of the repository footprint by a basaltic dike. These sensitivity studies are prompted by aeromagnetic data collected in 1999, indicating the possible presence of previously unrecognized buried volcanoes in the YMR (Blakely et al. 2000 [DIRS 151881]; O'Leary et al. 2002 [DIRS 158468]). The results of the sensitivity studies are for informational purposes only and are not to be used for purposes of assessing repository performance.

  17. Variation of Pore Metrics in Metal-Organic Frameworks for Enhanced Storage and Catalytic Applications

    E-Print Network [OSTI]

    Brown, Jonathan Ward

    2015-01-01

    palladium functionalized framework (Figure 3.1). The structural integrity of the framework was confirmed by a powder

  18. Global Threat Reduction Initiative

    Office of Environmental Management (EM)

    eliminating the need for HEU in civilian applications - each reactor converted or shut down eliminates a source of bomb material. Convert Defense Nuclear Nonproliferation...

  19. nuclear threat science

    National Nuclear Security Administration (NNSA)

    8%2A en Office of Counterterrorism Policy and Cooperation http:www.nnsa.energy.govaboutusourprogramsctcppolicyandcooperation

  20. Protecting Against Nuclear Threats

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid youOxygen Generation | CenterPressthis siteProspective Users

  1. design basis threat

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) August 20123/%2A en46A NAME6/%2A encore3/%2A0/%2A en

  2. nuclear threat science

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia4) August 20123/%2A en46Afedkcp8/%2A en0/%2A8/%2A en

  3. Global Threat Reduction Initiative

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i nA Guide to Tapping intoandMinimaland(GTO)GetSafeguards |Global

  4. Emerging Threats and Opportunities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not find what youSummer InternshipPowerEmerging TechnologiesMission

  5. THREAT OF MALICIOUS CODE

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutory Authority SustainXSystemTraining (MERRTT)THE

  6. Simulation framework for spatio-spectral anomalous change detection

    SciTech Connect (OSTI)

    Theiler, James P; Harvey, Neal R; Porter, Reid B; Wohlberg, Brendt E

    2009-01-01

    The authors describe the development of a simulation framework for anomalous change detection that considers both the spatial and spectral aspects of the imagery. A purely spectral framework has previously been introduced, but the extension to spatio-spectral requires attention to a variety of new issues, and requires more careful modeling of the anomalous changes. Using this extended framework, they evaluate the utility of spatial image processing operators to enhance change detection sensitivity in (simulated) remote sensing imagery.

  7. A fuel cycle framework for evaluating greenhouse gas emission reduction technology

    SciTech Connect (OSTI)

    Ashton, W.B.; Barns, D.W. (Pacific Northwest Lab., Richland, WA (USA)); Bradley, R.A. (USDOE Office of Policy, Planning and Analysis, Washington, DC (USA). Office of Environmental Analysis)

    1990-05-01

    Energy-related greenhouse gas (GHG) emissions arise from a number of fossil fuels, processes and equipment types throughout the full cycle from primary fuel production to end-use. Many technology alternatives are available for reducing emissions based on efficiency improvements, fuel switching to low-emission fuels, GHG removal, and changes in end-use demand. To conduct systematic analysis of how new technologies can be used to alter current emission levels, a conceptual framework helps develop a comprehensive picture of both the primary and secondary impacts of a new technology. This paper describes a broad generic fuel cycle framework which is useful for this purpose. The framework is used for cataloging emission source technologies and for evaluating technology solutions to reduce GHG emissions. It is important to evaluate fuel mix tradeoffs when investigating various technology strategies for emission reductions. For instance, while substituting natural gas for coal or oil in end-use applications to reduce CO{sub 2} emissions, natural gas emissions of methane in the production phase of the fuel cycle may increase. Example uses of the framework are given.

  8. 8D Likelihood Effective Higgs Couplings Extraction Framework in the Golden Channel

    SciTech Connect (OSTI)

    Chen, Yi [California Institute of Technology, Pasadena, CA (United States); Di Marco, Emanuele [Fermi National Accelerator Laboratory (FNAL), Batavia, IL (United States); Lykken, Joe [Fermi National Accelerator Laboratory (FNAL), Batavia, IL (United States); Spiropulu, Maria [California Institute of Technology, Pasadena, CA (United States); Vega-Morales, Roberto [Universite Paris-Sud, Orsay, (France); Xie, Si [California Institute of Technology, Pasadena, CA (United States)

    2015-01-01

    In this paper we build a comprehensive analysis framework to perform direct extraction of all possible effective Higgs couplings to neutral electroweak gauge bosons in the decay to electrons and muons, the so called `golden channel'. Our framework is based on a maximum likelihood method constructed from analytic expressions of the fully differential cross sections for $h \\rightarrow 4\\ell$ and for the dominant irreducible $q\\bar{q} \\rightarrow 4\\ell$ background, where $4\\ell = 2e2\\mu, 4e, 4\\mu$. Detector effects are included by an explicit convolution of these analytic expressions with the appropriate transfer function over all center of mass variables. Using the full set of decay observables, we construct an unbinned 8-dimensional detector-level likelihood function which is continuous in the effective couplings and includes systematic uncertainties. We consider all possible $ZZ$, $Z\\gamma$ and $\\gamma\\gamma$ couplings, allowing for general CP odd/even admixtures and any possible phases. We describe how the convolution is performed and demonstrate the validity and power of the framework with a number of supporting checks and example fits. The framework can be used to perform a variety of multi-parameter extractions, including their correlations, to determine the Higgs couplings to neutral electroweak gauge bosons using data obtained at the LHC and other future colliders.

  9. 8D likelihood effective Higgs couplings extraction framework in h ? 4?

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Chen, Yi; Di Marco, Emanuele; Lykken, Joe; Spiropulu, Maria; Vega-Morales, Roberto; Univ. Paris-Sud, Orsay Cedex; Northwestern Univ., Evanston, IL; Xie, Si

    2015-01-23

    We present an overview of a comprehensive analysis framework aimed at performing direct extraction of all possible effective Higgs couplings to neutral electroweak gauge bosons in the decay to electrons and muons, the so called ‘golden channel’. Our framework is based primarily on a maximum likelihood method constructed from analytic expressions of the fully differential cross sections for h ? 4l and for the dominant irreducible $ q\\overline{q} $ ? 4l background, where 4l = 2e2?, 4e, 4?. Detector effects are included by an explicit convolution of these analytic expressions with the appropriate transfer function over all center of massmore »variables. Utilizing the full set of observables, we construct an unbinned detector-level likelihood which is continuous in the effective couplings. We consider possible ZZ, Z?, and ?? couplings simultaneously, allowing for general CP odd/even admixtures. A broad overview is given of how the convolution is performed and we discuss the principles and theoretical basis of the framework. This framework can be used in a variety of ways to study Higgs couplings in the golden channel using data obtained at the LHC and other future colliders.« less

  10. An integrative framework for architecting supply chains

    E-Print Network [OSTI]

    Cela Díaz, Fernando

    2006-01-01

    This thesis explores the limitations of classic models of supply chain management, and proposes a new view based on the concept of value-driven supply chains, and a method of analysis and design based on the concepts of ...

  11. Better Buildings Alliance Tech Team Impact Framework - 2014 BTO...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Framework - 2014 BTO Peer Review Presenter: Amy Jiron, U.S. Department of Energy The High Impact Technology (HIT) catalyst is designed to help identify and prioritize...

  12. Transaction-Based Building Controls Framework, Volume 1: Reference Guide

    SciTech Connect (OSTI)

    Somasundaram, Sriram; Pratt, Robert G.; Akyol, Bora A.; Fernandez, Nicholas; Foster, Nikolas AF; Katipamula, Srinivas; Mayhorn, Ebony T.; Somani, Abhishek; Steckley, Andrew C.; Taylor, Zachary T.

    2014-04-28

    This document proposes a framework concept to achieve the objectives of raising buildings’ efficiency and energy savings potential benefitting building owners and operators. We call it a transaction-based framework, wherein mutually-beneficial and cost-effective market-based transactions can be enabled between multiple players across different domains. Transaction-based building controls are one part of the transactional energy framework. While these controls realize benefits by enabling automatic, market-based intra-building efficiency optimizations, the transactional energy framework provides similar benefits using the same market -based structure, yet on a larger scale and beyond just buildings, to the society at large.

  13. Optimal aeroacoustic shape design using the surrogate management framework

    E-Print Network [OSTI]

    Marsden, Alison L.

    engineering applications including airframe noise, submarine detection, wind turbine design, and rotorcraft to control aerodynamic noise. In the work presented here, the surrogate management framework, developed

  14. A Single Crystalline Porphyrinic Titanium Metal-Organic Framework...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Single Crystalline Porphyrinic Titanium Metal-Organic Framework Previous Next List Yuan, Shuai; Liu, Tian-Fu; Feng, Dawei; Tian, Jian; Wang, Kecheng; Qin, Junsheng; Zhang, Qiang;...

  15. Crystalline Open Framework Materials: from Structure to Function

    E-Print Network [OSTI]

    Wang, Le

    2012-01-01

    Chapter 1 An Overview of Crystalline Functional FrameworkMaterials 1.1 Crystalline Frameworkseparation into different crystalline phase). Conclusion and

  16. COMMUNICATION TO THE EDITOR A Restructured Framework for Modeling

    E-Print Network [OSTI]

    Daugulis, Andrew J.

    COMMUNICATION TO THE EDITOR A Restructured Framework for Modeling Oxygen Transfer in Two: This communication proposes a mechanistic modification to a recently published method for analyzing oxygen mass

  17. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Ireland) Jump to: navigation, search Project Name AFTER A...

  18. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (France) Jump to: navigation, search Project Name AFTER A...

  19. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (United Kingdom) Jump to: navigation, search Project Name...

  20. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Germany) Jump to: navigation, search Project Name AFTER A...

  1. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Norway) Jump to: navigation, search Project Name AFTER A...

  2. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Czech Republic) Jump to: navigation, search Project Name...

  3. AFTER A Framework for electrical power sysTems vulnerability...

    Open Energy Info (EERE)

    AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration (Smart Grid Project) (Belgium) Jump to: navigation, search Project Name AFTER A...

  4. Metal-organic framework materials with ultrahigh surface areas

    DOE Patents [OSTI]

    Farha, Omar K.; Hupp, Joseph T.; Wilmer, Christopher E.; Eryazici, Ibrahim; Snurr, Randall Q.; Gomez-Gualdron, Diego A.; Borah, Bhaskarjyoti

    2015-12-22

    A metal organic framework (MOF) material including a Brunauer-Emmett-Teller (BET) surface area greater than 7,010 m.sup.2/g. Also a metal organic framework (MOF) material including hexa-carboxylated linkers including alkyne bond. Also a metal organic framework (MOF) material including three types of cuboctahedron cages fused to provide continuous channels. Also a method of making a metal organic framework (MOF) material including saponifying hexaester precursors having alkyne bonds to form a plurality of hexa-carboxylated linkers including alkyne bonds and performing a solvothermal reaction with the plurality of hexa-carboxylated linkers and one or more metal containing compounds to form the MOF material.

  5. Tool Kit Framework: Small Town University Energy Program (STEP)

    Broader source: Energy.gov [DOE]

    Tool Kit Framework: Small Town University Energy Program (STEP), as posted on the U.S. Department of Energy's Better Buildings Neighborhood Program website.

  6. An Analytical Framework for Long Term Policy for Commercial Deployment...

    Open Energy Info (EERE)

    An Analytical Framework for Long Term Policy for Commercial Deployment and Innovation in Carbon Capture and Sequestration Technology in the United States Jump to: navigation,...

  7. Piezofluorochromic Metal-Organic Framework: A Microscissor Lift...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Piezofluorochromic Metal-Organic Framework: A Microscissor Lift Previous Next List Zhang, Qiang; Su, Jie; Feng, Dawei; Wei, Zhangwen; Zou, Xiaodong; Zhou, Hong-Cai....

  8. Synthesis of Cationic Extended Frameworks for Anion-Based Applications

    E-Print Network [OSTI]

    Fei, Honghan

    2012-01-01

    frameworks based on rare earth metals are the most developedwhere M is rare earth metals. The first structurallybased on trivalent rare earth metals, including Yb 3+ , Y 3

  9. Risk assessment framework for geologic carbon sequestration sites

    E-Print Network [OSTI]

    Oldenburg, C.

    2010-01-01

    Framework for geologic carbon sequestration risk assessment,for geologic carbon sequestration risk assessment, Energyfor Geologic Carbon Sequestration, Int. J. of Greenhouse Gas

  10. Developing a Regulatory Framework for Extended Storage and Transportat...

    Office of Environmental Management (EM)

    Path Forward 2 Current NRC Regulatory Framework for Storage * Renewable Term Licenses * Aging Management Plan - Time-limited aging analyses - Design for prevention - Monitoring -...

  11. Toward a theory of institutional analysis

    E-Print Network [OSTI]

    Nutt-Powell, Thomas E.

    This paper provides the basic analytic framework for institutional analysis with particular reference to the acceptance of innovations. A theory of institutions is developed, then assessed in light of various

  12. Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices

    E-Print Network [OSTI]

    Cizelj, Leon

    strength and injuries of human beings with nuclear power plant models used in probabilistic safetyVulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices Marko threats to a nuclear power plant in the year 1991 and after the 9/11 events in 2001. The methodology which

  13. A Run-Time Verification Framework for Smart Grid Applications Implemented on Simulation Frameworks

    SciTech Connect (OSTI)

    Ciraci, Selim; Sozer, Hasan; Tekinerdogan, Bedir

    2013-05-18

    Smart grid applications are implemented and tested with simulation frameworks as the developers usually do not have access to large sensor networks to be used as a test bed. The developers are forced to map the implementation onto these frameworks which results in a deviation between the architecture and the code. On its turn this deviation makes it hard to verify behavioral constraints that are de- scribed at the architectural level. We have developed the ConArch toolset to support the automated verification of architecture-level behavioral constraints. A key feature of ConArch is programmable mapping for architecture to the implementation. Here, developers implement queries to identify the points in the target program that correspond to architectural interactions. ConArch generates run- time observers that monitor the flow of execution between these points and verifies whether this flow conforms to the behavioral constraints. We illustrate how the programmable mappings can be exploited for verifying behavioral constraints of a smart grid appli- cation that is implemented with two simulation frameworks.

  14. Acceptance Criteria Framework for Autonomous Biological Detectors

    SciTech Connect (OSTI)

    Dzenitis, J M

    2006-12-12

    The purpose of this study was to examine a set of user acceptance criteria for autonomous biological detection systems for application in high-traffic, public facilities. The test case for the acceptance criteria was the Autonomous Pathogen Detection System (APDS) operating in high-traffic facilities in New York City (NYC). However, the acceptance criteria were designed to be generally applicable to other biological detection systems in other locations. For such detection systems, ''users'' will include local authorities (e.g., facility operators, public health officials, and law enforcement personnel) and national authorities [including personnel from the Department of Homeland Security (DHS), the BioWatch Program, the Centers for Disease Control and Prevention (CDC), and the Federal Bureau of Investigation (FBI)]. The panel members brought expertise from a broad range of backgrounds to complete this picture. The goals of this document are: (1) To serve as informal guidance for users in considering the benefits and costs of these systems. (2) To serve as informal guidance for developers in understanding the needs of users. In follow-up work, this framework will be used to systematically document the APDS for appropriateness and readiness for use in NYC.

  15. Optimized Uncertainty Quantification Algorithm Within a Dynamic Event Tree Framework

    SciTech Connect (OSTI)

    J. W. Nielsen; Akira Tokuhiro; Robert Hiromoto

    2014-06-01

    Methods for developing Phenomenological Identification and Ranking Tables (PIRT) for nuclear power plants have been a useful tool in providing insight into modelling aspects that are important to safety. These methods have involved expert knowledge with regards to reactor plant transients and thermal-hydraulic codes to identify are of highest importance. Quantified PIRT provides for rigorous method for quantifying the phenomena that can have the greatest impact. The transients that are evaluated and the timing of those events are typically developed in collaboration with the Probabilistic Risk Analysis. Though quite effective in evaluating risk, traditional PRA methods lack the capability to evaluate complex dynamic systems where end states may vary as a function of transition time from physical state to physical state . Dynamic PRA (DPRA) methods provide a more rigorous analysis of complex dynamic systems. A limitation of DPRA is its potential for state or combinatorial explosion that grows as a function of the number of components; as well as, the sampling of transition times from state-to-state of the entire system. This paper presents a method for performing QPIRT within a dynamic event tree framework such that timing events which result in the highest probabilities of failure are captured and a QPIRT is performed simultaneously while performing a discrete dynamic event tree evaluation. The resulting simulation results in a formal QPIRT for each end state. The use of dynamic event trees results in state explosion as the number of possible component states increases. This paper utilizes a branch and bound algorithm to optimize the solution of the dynamic event trees. The paper summarizes the methods used to implement the branch-and-bound algorithm in solving the discrete dynamic event trees.

  16. Faculty Taskforce to Establish a Framework for Identifying Teaching Excellence

    E-Print Network [OSTI]

    Colorado at Boulder, University of

    employed; · providing resources for promoting evidence-based measures of educational practice in seven of lead scholars in education will be convened to establish a framework to define scholarly teaching and educational practice. This framework will provide explicit guidance on the expectations for educational

  17. A Distributed Machine Learning Framework Tansu Alpcan and Christian Bauckhage

    E-Print Network [OSTI]

    Alpcan, Tansu

    A Distributed Machine Learning Framework Tansu Alpcan and Christian Bauckhage Abstract-- A distributed online learning framework for sup- port vector machines (SVMs) is presented and analyzed. First is derived under which synchronous and asynchronous gradient algorithms converge to the approximate solution

  18. A STATISTICAL NEURAL NETWORK FRAMEWORK FOR RISK MANAGEMENT PROCESS

    E-Print Network [OSTI]

    Basili, Victor R.

    A STATISTICAL NEURAL NETWORK FRAMEWORK FOR RISK MANAGEMENT PROCESS From the Proposal to its of Maryland, A.V. Williams Bldg. 115, College Park 20742, MD, USA basili@cs.umd.edu Keywords: Risk Management available formal risk management models and related frameworks by providing an independent mechanism

  19. Towards a Universal Data Provenance Framework using Dynamic Instrumentation

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    Towards a Universal Data Provenance Framework using Dynamic Instrumentation Eleni Gessiou1 instrumentation, which gathers data provenance information for real-world applications without any code modifications. Our framework simplifies the task of finding the right points to instrument, which can

  20. A framework for assessing the political economy of post-2012

    E-Print Network [OSTI]

    Watson, Andrew

    A framework for assessing the political economy of post-2012 global climate regime Bettina Centre for Climate Change Research Working Paper 80 #12;A framework for assessing the political economy, Environment, Energy 3: Tyndall Centre for Climate Change Research, School of Environmental Sciences

  1. SmartOpt: An Industrial Strength Framework for Logic Synthesis

    E-Print Network [OSTI]

    Mishchenko, Alan

    SmartOpt: An Industrial Strength Framework for Logic Synthesis Stephen Jang, Dennis Wu, Mark Jarvin are not representative of modern industrial FPGAs. This paper presents a framework (SmartOpt) for mapping complex FPGA the LUT count and performance of large industrial circuits described in HDL. Xilinx Synthesis Technology

  2. A national data collection framework for recreational fishing

    E-Print Network [OSTI]

    A national data collection framework for recreational fishing Aqua reports 2015:16 In fisheries & Stig Thörnqvist #12;A national data collection framework for recreational fishing In fisheries, sea fishing. In fisheries, sea and water management. Aqua reports 2015:16. Swedish University of Agricultural

  3. A Framework for Specifying, Prototyping, and Reasoning about Computational Systems

    E-Print Network [OSTI]

    Minnesota, University of

    A Framework for Specifying, Prototyping, and Reasoning about Computational Systems (Doctoral in a framework for specifying, prototyping, and reasoning about systems that describe computations over formal. The development of these computational systems is often an iterative process where one refines the specification

  4. An Intentional Framework for Communication in Multi-Agent Systems

    E-Print Network [OSTI]

    Idaho, University of

    An Intentional Framework for Communication in Multi-Agent Systems Kaylani Merrill, Michael O for designing communication for multi-agent systems that allows for the construction of novel messages by agents. To provide a speech-act framework for communication in multi-agent systems, we begin by giving an account

  5. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Risk Management Framework

    E-Print Network [OSTI]

    NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1 Risk Management Framework Computer Security Enterprise Risk Key activities in managing enterprise-level risk--risk resulting from the operation on a continuous basis #12;NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 3 Risk Management Framework Security Life

  6. Edinburgh Research Explorer A framework for evolutionary systems biology

    E-Print Network [OSTI]

    Millar, Andrew J.

    Edinburgh Research Explorer A framework for evolutionary systems biology Citation for published version: Loewe, L 2009, 'A framework for evolutionary systems biology' BMC Systems Biology, vol 3, 27., 10 Systems Biology Publisher Rights Statement: © 2009 Loewe; licensee BioMed Central Ltd. This is an Open

  7. ForPeerReview SMC Framework in Motion Control Systems

    E-Print Network [OSTI]

    Yanikoglu, Berrin

    ForPeerReview SMC Framework in Motion Control Systems Journal: International Journal of Adaptive, Mechatronics Keywords: Motion Control, Sliding Mode Control, Bilateral Control , Interconnected Systems http acsauth.cls [Version: 2002/11/11 v1.00] SMC Framework in Motion Control Systems A. S¸abanovi¸c Sabanci

  8. Designing Agents for Derivatives Markets: a preliminary framework

    E-Print Network [OSTI]

    McBurney, Peter

    Designing Agents for Derivatives Markets: a preliminary framework Omar Baqueiro Espinosa, Wiebe van framework for a model of agents which are able to trade in futures and options derivatives markets. We design a basic logical model for the exchange process and extend it to depict futures and options

  9. An Optimization-Based Framework for Combinatorial Prediction Market Design

    E-Print Network [OSTI]

    Chen, Yiling

    An Optimization-Based Framework for Combinatorial Prediction Market Design Jacob Abernethy UC framework for the design of efficient prediction markets over very large outcome spaces. 1 Introduction) is then C(q)/qi, and is denoted pi(q). The market designer is free to choose any differentiable cost

  10. An Integrated, Modular Framework for Computer Vision and Cognitive Robotics

    E-Print Network [OSTI]

    Förster, Alexander

    on perception has been an active component of developing artificial vision (or computer vision) systemsAn Integrated, Modular Framework for Computer Vision and Cognitive Robotics Research (icVision) J an easy-to-use, modular framework for performing computer vision related tasks in support of cognitive

  11. BIOMECHANICAL MODELING AND SIMULATION WITHIN A MEDICAL SIMULATOR FRAMEWORK

    E-Print Network [OSTI]

    Wolf, Christian

    BIOMECHANICAL MODELING AND SIMULATION WITHIN A MEDICAL SIMULATOR FRAMEWORK -- 18 months post the LIRIS Lab. (http://liris.cnrs.fr/~saara) is involved in the elaboration of an optimal biomechanical in the development of modules for bio-mechanical modeling and simulation, and their integrated within a framework (i

  12. A Web Usage Mining Framework for Web Directories Personalization

    E-Print Network [OSTI]

    Kouroupetroglou, Georgios

    A Web Usage Mining Framework for Web Directories Personalization Dimitrios Pierrakos Department framework that combines Web personalization and Web directories, which results in the concept of Community Web Directories. Community Web directories is a novel form of personalization performed on Web

  13. 417MEASURING HPC PRODUCTIVITY A FRAMEWORK FOR MEASURING

    E-Print Network [OSTI]

    Bader, David A.

    417MEASURING HPC PRODUCTIVITY A FRAMEWORK FOR MEASURING SUPERCOMPUTER PRODUCTIVITY Marc Snir 1 David A. Bader 2 Abstract We propose a framework for measuring the productivity of high performance that productivity is prop- erly measured, as improper measures will lead to subop- timal investment and policy

  14. The growth of business firms: Theoretical framework and empirical evidence

    E-Print Network [OSTI]

    Buldyrev, Sergey

    Pg(g) of business-firm growth rates. The model pre- dicts that Pg(g) is exponential in the central rate at all levels of aggregation studied. The Theoretical Framework We model business firms as classesThe growth of business firms: Theoretical framework and empirical evidence Dongfeng Fu* , Fabio

  15. Geological and mathematical framework for failure modes in granular rock

    E-Print Network [OSTI]

    Borja, Ronaldo I.

    Geological and mathematical framework for failure modes in granular rock Atilla Aydina, *, Ronaldo I. Borjab , Peter Eichhubla,1 a Department of Geological and Environmental Sciences, Stanford processes in granular rock and provide a geological framework for the corresponding structures. We describe

  16. Road Transport Informatics -Conceptual Framework and Technologica Components

    E-Print Network [OSTI]

    Aamodt, Agnar

    Road Transport Informatics - Conceptual Framework and Technologica Components Dr. Techn. Mads Nyg of informationtech- nology within the road transport field. The main motivation for our investigation framework for road transport informatics in order to estab- lish a common basis for researchers from both

  17. The NMI Build & Test Laboratory: Continuous Integration Framework for

    E-Print Network [OSTI]

    Wisconsin at Madison, University of

    other systems for automated builds and tests, our framework is not tied to a specific developer toolThe NMI Build & Test Laboratory: Continuous Integration Framework for Distributed Computing semantics. The system balances the need to continually integrate software changes while still providing on

  18. The IBM Government Industry Framework: Accelerating solutions for smarter governments

    E-Print Network [OSTI]

    ISVs and IBM solutions that are built on industry standards and pre-integrated into the frameworkThe IBM Government Industry Framework: Accelerating solutions for smarter governments IBM operating. No wonder they perceive a growing gap between concept and realization. #12;3 IBM Industry

  19. Sandia Energy - Modeling & Analysis

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    by chemical facilities under a program for imposing greater security requirements on high-threat sites. DHS is collaborating with Sandia to determine how the Chemical Facility...

  20. Simulated, Emulated, and Physical Investigative Analysis (SEPIA) of networked systems.

    SciTech Connect (OSTI)

    Burton, David P.; Van Leeuwen, Brian P.; McDonald, Michael James; Onunkwo, Uzoma A.; Tarman, Thomas David; Urias, Vincent E.

    2009-09-01

    This report describes recent progress made in developing and utilizing hybrid Simulated, Emulated, and Physical Investigative Analysis (SEPIA) environments. Many organizations require advanced tools to analyze their information system's security, reliability, and resilience against cyber attack. Today's security analysis utilize real systems such as computers, network routers and other network equipment, computer emulations (e.g., virtual machines) and simulation models separately to analyze interplay between threats and safeguards. In contrast, this work developed new methods to combine these three approaches to provide integrated hybrid SEPIA environments. Our SEPIA environments enable an analyst to rapidly configure hybrid environments to pass network traffic and perform, from the outside, like real networks. This provides higher fidelity representations of key network nodes while still leveraging the scalability and cost advantages of simulation tools. The result is to rapidly produce large yet relatively low-cost multi-fidelity SEPIA networks of computers and routers that let analysts quickly investigate threats and test protection approaches.

  1. A framework for optimization and quantification of uncertainty and sensitivity for developing carbon capture systems

    SciTech Connect (OSTI)

    Eslick, John C.; Ng, Brenda; Gao, Qianwen; Tong, Charles H.; Sahinidis, Nikolaos V.; Miller, David C.

    2014-12-31

    Under the auspices of the U.S. Department of Energy’s Carbon Capture Simulation Initiative (CCSI), a Framework for Optimization and Quantification of Uncertainty and Sensitivity (FOQUS) has been developed. This tool enables carbon capture systems to be rapidly synthesized and rigorously optimized, in an environment that accounts for and propagates uncertainties in parameters and models. FOQUS currently enables (1) the development of surrogate algebraic models utilizing the ALAMO algorithm, which can be used for superstructure optimization to identify optimal process configurations, (2) simulation-based optimization utilizing derivative free optimization (DFO) algorithms with detailed black-box process models, and (3) rigorous uncertainty quantification through PSUADE. FOQUS utilizes another CCSI technology, the Turbine Science Gateway, to manage the thousands of simulated runs necessary for optimization and UQ. Thus, this computational framework has been demonstrated for the design and analysis of a solid sorbent based carbon capture system.

  2. A framework for optimization and quantification of uncertainty and sensitivity for developing carbon capture systems

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Eslick, John C.; Ng, Brenda; Gao, Qianwen; Tong, Charles H.; Sahinidis, Nikolaos V.; Miller, David C.

    2014-12-31

    Under the auspices of the U.S. Department of Energy’s Carbon Capture Simulation Initiative (CCSI), a Framework for Optimization and Quantification of Uncertainty and Sensitivity (FOQUS) has been developed. This tool enables carbon capture systems to be rapidly synthesized and rigorously optimized, in an environment that accounts for and propagates uncertainties in parameters and models. FOQUS currently enables (1) the development of surrogate algebraic models utilizing the ALAMO algorithm, which can be used for superstructure optimization to identify optimal process configurations, (2) simulation-based optimization utilizing derivative free optimization (DFO) algorithms with detailed black-box process models, and (3) rigorous uncertainty quantification throughmore »PSUADE. FOQUS utilizes another CCSI technology, the Turbine Science Gateway, to manage the thousands of simulated runs necessary for optimization and UQ. Thus, this computational framework has been demonstrated for the design and analysis of a solid sorbent based carbon capture system.« less

  3. A new scenario framework for Climate Change Research: Scenario matrix architecture

    SciTech Connect (OSTI)

    Van Vuuren, Detlef; Kriegler, Elmar; O'Neill, Brian; Ebi, Kristie L.; Riahi, Keywan; Carter, Tim; Edmonds, James A.; Hallegatte, Stephane; Kram, Tom; Mathur, Ritu; Winkler, Harald

    2014-02-01

    In this paper, we present the scenario matrix architecture as part of the new scenario framework for climate change research. The matrix architecture focuses on a key question of current climate research, namely the identification of trade-offs and synergies (in terms of risks, costs and other consequences) of different adaptation and mitigation strategies. The framework has two main axes: 1) the level of forcing (as represented by the RCPs) and 2) different socio-economic reference pathways. The matrix can be used as a tool to guide new scenario development and analytical analysis. It can also be used as a heuristic tool for classifying new and existing scenarios for assessment. Key elements of the architecture, in particular the shared socio-economic reference pathways and the shared policy assumptions, are elaborated in other papers in this special issue.

  4. An Assessment of Integrated Health Management Frameworks

    SciTech Connect (OSTI)

    Lybeck, Nancy; Coble, Jamie B.; Tawfik, Magdy; Bond, Leonard J.

    2012-05-18

    In order to meet the ever increasing demand for energy, the United States nuclear industry is turning to life extension of existing nuclear power plants (NPPs). Economically ensuring the safe, secure, and reliable operation of aging NPPs presents many challenges. The 2009 Light Water Reactor Sustainability Workshop identified online monitoring of active and structural components as essential to better understanding and management of the challenges posed by aging NPPs. Additionally, there is increasing adoption of condition-based maintenance (CBM) for active components in NPPs. These techniques provide a foundation upon which a variety of advanced online surveillance, diagnostic, and prognostic techniques can be deployed to continuously monitor and assess the health of NPP systems and components. The next step in the development of advanced online monitoring is to move beyond CBM to estimating the remaining useful life of active components using prognostic tools. Deployment of prognostic health management (PHM) on the scale of an NPP requires the use of an integrated health management (IHM) framework - a software product (or suite of products) used to manage the necessary elements needed for a complete implementation of online monitoring and prognostics. This paper provides a thoughtful look at the desirable functions and features of IHM architectures. A full PHM system involves several modules, including data acquisition, system modeling, fault detection, fault diagnostics, system prognostics, and advisory generation (operations and maintenance planning). The standards applicable to PHM applications are indentified and summarized. A list of evaluation criteria for PHM software products, developed to ensure scalability of the toolset to an environment with the complexity of an NPP, is presented. Fourteen commercially available PHM software products are identified and classified into four groups: research tools, PHM system development tools, deployable architectures, and peripheral tools.

  5. Characterization and analysis of process variability in deeply-scaled MOSFETs

    E-Print Network [OSTI]

    Balakrishnan, Karthik, Ph. D. Massachusetts Institute of Technology

    2012-01-01

    Variability characterization and analysis in advanced technologies are needed to ensure robust performance as well as improved process capability. This thesis presents a framework for device variability characterization ...

  6. Comparative Climate Change Law A flexible international legal framework is emerging to deal with climate change. Within this framework each

    E-Print Network [OSTI]

    Judd, Martin

    2 Comparative Climate Change Law A flexible international legal framework is emerging to deal with climate change. Within this framework each country is free to choose its own climate policy with climate change, including emission standards, while a growing number of countries have decided to rely

  7. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    SciTech Connect (OSTI)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between those threats and the defensive capabilities of control systems can be analyzed. The results of the gap analysis drive changes in the cyber security of critical infrastructure networks to close the gap between current exploits and existing defenses. The analysis also provides defenders with an idea of how threat technology is evolving and how defenses will need to be modified to address these emerging trends.

  8. Hydrogen Storage in Metal-Organic Frameworks

    SciTech Connect (OSTI)

    Omar M. Yaghi

    2012-04-26

    Conventional storage of large amounts of hydrogen in its molecular form is difficult and expensive because it requires employing either extremely high pressure gas or very low temperature liquid. Because of the importance of hydrogen as a fuel, the DOE has set system targets for hydrogen storage of gravimetric (5.5 wt%) and volumetric (40 g L-1) densities to be achieved by 2015. Given that these are system goals, a practical material will need to have higher capacity when the weight of the tank and associated cooling or regeneration system is considered. The size and weight of these components will vary substantially depending on whether the material operates by a chemisorption or physisorption mechanism. In the latter case, metal-organic frameworks (MOFs) have recently been identified as promising adsorbents for hydrogen storage, although little data is available for their sorption behavior. This grant was focused on the study of MOFs with these specific objectives. (1) To examine the effects of functionalization, catenation, and variation of the metal oxide and organic linkers on the low-pressure hydrogen adsorption properties of MOFs. (2) To develop a strategy for producing MOFs with high surface area and porosity to reduce the dead space and increase the hydrogen storage capacity per unit volume. (3) To functionalize MOFs by post synthetic functionalization with metals to improve the adsorption enthalpy of hydrogen for the room temperature hydrogen storage. This effort demonstrated the importance of open metal sites to improve the adsorption enthalpy by the systematic study, and this is also the origin of the new strategy, which termed isoreticular functionalization and metalation. However, a large pore volume is still a prerequisite feature. Based on our principle to design highly porous MOFs, guest-free MOFs with ultrahigh porosity have been experimentally synthesized. MOF-210, whose BET surface area is 6240 m2 g-1 (the highest among porous solids), takes up 15 wt% of total H2 uptake at 80 bar and 77 K. More importantly, the total H2 uptake by MOF-210 was 2.7 wt% at 80 bar and 298 K, which is the highest number reported for physisorptive materials.

  9. Summary report on transportation of nuclear fuel materials in Japan : transportation infrastructure, threats identified in open literature, and physical protection regulations.

    SciTech Connect (OSTI)

    Cochran, John Russell; Ouchi, Yuichiro (Japan Atomic Energy Agency, Japan); Furaus, James Phillip; Marincel, Michelle K.

    2008-03-01

    This report summarizes the results of three detailed studies of the physical protection systems for the protection of nuclear materials transport in Japan, with an emphasis on the transportation of mixed oxide fuel materials1. The Japanese infrastructure for transporting nuclear fuel materials is addressed in the first section. The second section of this report presents a summary of baseline data from the open literature on the threats of sabotage and theft during the transport of nuclear fuel materials in Japan. The third section summarizes a review of current International Atomic Energy Agency, Japanese and United States guidelines and regulations concerning the physical protection for the transportation of nuclear fuel materials.

  10. Hypercrosslinked Phenolic Polymers with Well Developed Mesoporous Frameworks

    SciTech Connect (OSTI)

    Zhang, Jinshui; Qiao, Zhenan; Mahurin, Shannon Mark; Jiang, Xueguang; Chai, Songhai; Lu, Hanfeng; Nelson, Kimberly M; Dai, Sheng

    2015-01-01

    A soft chemistry synthetic strategy based on a Friedel Crafts alkylation reaction is developed for the textural engineering of phenolic resin (PR) with a robust mesoporous framework to avoid serious framework shrinkage and maximize retention of organic functional moieties. By taking advantage of the structural benefits of molecular bridges, the resultant sample maintains a bimodal micro-mesoporous architecture with well-preserved organic functional groups, which is effective for carbon capture. Moreover, this soft chemistry synthetic protocol can be further extended to nanotexture other aromatic-based polymers with robust frameworks.

  11. Primer Control System Cyber Security Framework and Technical Metrics

    SciTech Connect (OSTI)

    Wayne F. Boyer; Miles A. McQueen

    2008-05-01

    The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

  12. Power to the people : a framework for enhancing environmental stewardship through community design

    E-Print Network [OSTI]

    Rosenfeld, Mathias

    2007-01-01

    The actions and activities of average Americans contribute greatly to global warming, fossil fuel consumption, natural resource depletion, and other environmentally-related threats to humankind. Currently, the negative ...

  13. NIST Smart Grid Framework Status Report This summary report provides a status update on the NIST smart grid interoperability framework. The

    E-Print Network [OSTI]

    NIST Smart Grid Framework Status Report This summary report provides a status update on the NIST smart grid interoperability framework. The NIST smart grid framework is a NIST special publication document (NIST SP1108, NIST Framework and Roadmap for Smart Grid Interoperability Standards, Releases 1, 2

  14. GIS Framework for Large River Geomorphic Classification to Aid...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    GIS Framework for Large River Geomorphic Classification to Aid in the Evaluation of Flow-Ecology Relationships CR Vernon EV Arntzen MC Richmond RA McManamay 1 TP Hanrahan CL...

  15. Eco-Growth: A Framework for Sustainable Growth

    E-Print Network [OSTI]

    Blanco, Edgar E.

    Growth is imperative for corporate success and yet the environmental impact of this growth is not sustainable. In this paper we offer a framework for thinking about the stages of tackling the environmental sustainability ...

  16. RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS

    E-Print Network [OSTI]

    RISK MANAGEMENT FRAMEWORK: HELPING ORGANIZATIONS IMPLEMENT EFFECTIVE INFORMATION SECURITY PROGRAMS of Standards and Technology The management of risks to information technology (IT) systems is a fundamental component of every organization's information security program. An effective risk management process enables

  17. A flexible browsing framework for the Morpheus transform repository

    E-Print Network [OSTI]

    Dohzen, Tiffany (Tiffany Kumi)

    2007-01-01

    This thesis describes the design and implementation of a flexible browsing framework for the Morpheus project. The goal of the Morpheus project is to address the problem of heterogeneous information integration by providing ...

  18. National Action Plan Vision for 2025: A Framework for Change

    SciTech Connect (OSTI)

    National Action Plan for Energy Efficiency

    2008-11-01

    Establishes a goal of achieving all cost-effective energy efficiency by 2025 and presents 10 implementation goals as a framework for advancing the National Action Plan’s key policy recommendations.

  19. Actors, coalitions and the framework convention on climate change

    E-Print Network [OSTI]

    Sewell, Granville C

    2005-01-01

    This study examines the political processes through which the Framework Convention on Climate Change was negotiated and the initial efforts of the United States, the Netherlands, and Japan to adopt national policies and ...

  20. Supporting Concurrent Ontology Development: Framework, Algorithms and Tool

    E-Print Network [OSTI]

    Grau, Bernardo Cuenca

    Supporting Concurrent Ontology Development: Framework, Algorithms and Tool Author1a , Author2b addresses: Mail1 (Author1), Mail2 (Author2), Mail3 (Author3), Mail4 (Author4) Preprint submitted to Elsevier