Powered by Deep Web Technologies
Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Threat Analysis Framework | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Threat Analysis Framework The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be...

2

Microsoft Word - Threat Analysis Framework Sept07_comments-final.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5792 5792 Unlimited Release September 2007 Threat Analysis Framework David P. Duggan and John T. Michalski Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. Threat Analysis Framework 2 Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government, nor any agency

3

Threats analysis for e-learning  

Science Conference Proceedings (OSTI)

The purpose of this paper is to investigate and define the information security threats within an e-learning environment. A threat analysis has been conducted for each application in the managed learning environment (MLE) system used in the ... Keywords: MLEs, Microsoft, application systems, e-learning, electronic learning, host vulnerabilities, information security, managed learning environments, network vulnerability, online learning, potential threats, risk management, risk matrix, security strategies, technology enhanced learning, threat matrix, threats analysis, user awareness

Najwa Hayaati Mohd Alwi; Ip-Shing Fan

2010-10-01T23:59:59.000Z

4

Behavioral analysis of botnets for threat intelligence  

Science Conference Proceedings (OSTI)

This paper examines the behavioral patterns of fast-flux botnets for threat intelligence. The Threat Intelligence infrastructure, which we have specifically developed for fast-flux botnet detection and monitoring, enables this analysis. Cyber criminals ... Keywords: Advanced persistent threat, Botnet, Bulletproof hosting, Cyber threat intelligence, Fast-flux, Malware, Phishing

Alper Caglayan; Mike Toothaker; Dan Drapeau; Dustin Burke; Gerry Eaton

2012-12-01T23:59:59.000Z

5

A unified framework for trajectory planning, threat assessment, and semi-autonomous control of passenger vehicles  

E-Print Network (OSTI)

This thesis describes the design of an active safety framework that performs trajectory planning, threat assessment, and semi-autonomous control of passenger vehicles in hazard avoidance scenarios. The vehicle navigation ...

Anderson, Sterling J., Ph. D. Massachusetts Institute of Technology

2009-01-01T23:59:59.000Z

6

Anomaly Detection in Multiple Scale for Insider Threat Analysis  

Science Conference Proceedings (OSTI)

We propose a method to quantify malicious insider activity with statistical and graph-based analysis aided with semantic scoring rules. Different types of personal activities or interactions are monitored to form a set of directed weighted graphs. The semantic scoring rules assign higher scores for the events more significant and suspicious. Then we build personal activity profiles in the form of score tables. Profiles are created in multiple scales where the low level profiles are aggregated toward more stable higherlevel profiles within the subject or object hierarchy. Further, the profiles are created in different time scales such as day, week, or month. During operation, the insider s current activity profile is compared to the historical profiles to produce an anomaly score. For each subject with a high anomaly score, a subgraph of connected subjects is extracted to look for any related score movement. Finally the subjects are ranked by their anomaly scores to help the analysts focus on high-scored subjects. The threat-ranking component supports the interaction between the User Dashboard and the Insider Threat Knowledge Base portal. The portal includes a repository for historical results, i.e., adjudicated cases containing all of the information first presented to the user and including any additional insights to help the analysts. In this paper we show the framework of the proposed system and the operational algorithms.

Kim, Yoohwan [ORNL; Sheldon, Frederick T [ORNL; Hively, Lee M [ORNL

2012-01-01T23:59:59.000Z

7

Threat Characterization  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Michalski Michalski SNL Department 5621 Threat Characterization Summary Slide: Threat Characterization Outcomes: Develop a network analysis toolset to allow an analyst to efficiently "crawl" large data sets to discover relevant threat information. Road Map Challenges:"The ability to discover & understand emerging threats and vulnerabilities is a prerequisite to developing effective countermeasures" Major Successes: * Implemented prototype front end crawler and semantic analysis engine (Sandia National Labs). * Transition Development work to the Institute for Complex Additive System Analysis (ICASA) Center (NMTech) * Quarterly threat reports being produced  Schedule: Improvements to both the analyst process and GUI Interface, 4Q 2009; Transition maintenance and development to

8

An analysis of security threats to mobile IPv6  

Science Conference Proceedings (OSTI)

In parallel with the design of IPv6, several protocol extensions for mobility support of IPv6 nodes have been proposed and these continue to evolve. However, a variety of security threats arise and these have to be taken in to account in the design of ... Keywords: CGA, MIPv6, binding update attacks, care-of address tests, cryptographically generated addresses, flooding attacks, home tests, internet protocol, mobile IPv6, replay attacks, return routability, security threats, triangular routing

Michael Durr; Ray Hunt

2008-09-01T23:59:59.000Z

9

Fact Sheet: Detection and Analysis of Threats to the Energy Sector (DATES)  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Detection and Analysis of Threats Detection and Analysis of Threats to the Energy Sector (DATES) A groundbreaking integrated capability in intrusion detection, security event management, and sector-wide threat analysis Detecting cyber attacks against digital control systems quickly and accurately is essential to energy sector security. Current intrusion detection systems (IDS) continuously scan control system communication paths and alert operators of suspicious network traffic. But existing IDS, often not tailored to the control environment, typically offer limited attack response capability and frequently produce false alarms or fail to alert. Without carefully deployed monitoring, these devices can produce an overwhelming number of alarms

10

Detection and Analysis of Threats to the Energy Sector: DATES  

Science Conference Proceedings (OSTI)

This report summarizes Detection and Analysis of Threats to the Energy Sector (DATES), a project sponsored by the United States Department of Energy and performed by a team led by SRI International, with collaboration from Sandia National Laboratories, ArcSight, Inc., and Invensys Process Systems. DATES sought to advance the state of the practice in intrusion detection and situational awareness with respect to cyber attacks in energy systems. This was achieved through adaptation of detection algorithms for process systems as well as development of novel anomaly detection techniques suited for such systems into a detection suite. These detection components, together with third-party commercial security systems, were interfaced with the commercial Security Information Event Management (SIEM) solution from ArcSight. The efficacy of the integrated solution was demonstrated on two testbeds, one based on a Distributed Control System (DCS) from Invensys, and the other based on the Virtual Control System Environment (VCSE) from Sandia. These achievements advance the DOE Cybersecurity Roadmap [DOE2006] goals in the area of security monitoring. The project ran from October 2007 until March 2010, with the final six months focused on experimentation. In the validation phase, team members from SRI and Sandia coupled the two test environments and carried out a number of distributed and cross-site attacks against various points in one or both testbeds. Alert messages from the distributed, heterogeneous detection components were correlated using the ArcSight SIEM platform, providing within-site and cross-site views of the attacks. In particular, the team demonstrated detection and visualization of network zone traversal and denial-of-service attacks. These capabilities were presented to the DistribuTech Conference and Exhibition in March 2010. The project was hampered by interruption of funding due to continuing resolution issues and agreement on cost share for four months in 2008. This resulted in delays in finalizing agreements with commercial partners, and in particular the Invensys testbed was not installed until December 2008 (as opposed to the March 2008 plan). The project resulted in a number of conference presentations and publications, and was well received when presented at industry forums. In spite of some interest on the part of the utility sector, we were unfortunately not able to engage a utility for a full-scale pilot deployment.

Alfonso Valdes

2010-03-31T23:59:59.000Z

11

Multivariate statistical analysis of the influence of global threats on the security of countries of the world  

Science Conference Proceedings (OSTI)

Methods of multivariate statistical analysis are applied to the investigation of the influence of global threats on the security of countries and regions of the world. The use of the principal component analysis method made it possible to reveal three ... Keywords: Minkowsky norm, cluster analysis, correlation analysis, global threat, principal component analysis., stable development

T. N. Pomerantseva; A. A. Boldak

2010-03-01T23:59:59.000Z

12

A Statistical Pattern Analysis Framework for Rooftop Unit Diagnostics  

NLE Websites -- All DOE Office Websites (Extended Search)

A Statistical Pattern Analysis Framework for Rooftop Unit Diagnostics Title A Statistical Pattern Analysis Framework for Rooftop Unit Diagnostics Publication Type Journal Article...

13

Online Monitoring Technical Basis and Analysis Framework for...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Online Monitoring Technical Basis and Analysis Framework for Emergency Diesel Generators-Interim Report for FY 2013 Online Monitoring Technical Basis and Analysis Framework for...

14

Shiva: An astronomical data analysis framework  

SciTech Connect

A key online and off-line software component of the Sloan Digital Sky Survey (SDSS) is Shiva. Shiva provides a readily extendible framework upon which the SDSS data reduction pipeline software is built. In this paper we present an introduction to the Shiva data analysis framework. We briefly discuss the features and the inherent prototyping and rapid development capabilities that make Shiva an integral part in the on-going development of SDSS software.

Sergey, G.; Berman, E.; Huang, C.H.; Kent, S.; Newberg, H; Nicinski, T.; Petravick, D; Stoughton, C. [Fermi National Accelerator Lab., Batavia, IL (United States); Lupton, R. [Princeton Univ., NJ (United States). Dept. of Astronomy

1995-12-01T23:59:59.000Z

15

A threat-rigidity analysis of the Apache Software Foundation's response to reported server security issues  

E-Print Network (OSTI)

There exists a broad body of literature documenting organizational responses to competitive threats, including those responses which fit into the threat-rigidity hypothesis. The purpose of this thesis is to investigate how ...

Shapira, Yoav

2006-01-01T23:59:59.000Z

16

Security Requirements Engineering: A Framework for Representation and Analysis  

E-Print Network (OSTI)

Security Requirements Engineering: A Framework for Representation and Analysis Charles B. Haley Abstract--This paper presents a framework for security requirements elicitation and analysis. The framework is based on constructing a context for the system, representing security requirements as constraints

Haley, Charles B.

17

Threat Characterization  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to work with publicprivate stakeholders - Develop a mechanism for sharing threat information Technology Transfer, Collaborations, and Partnerships Next Steps * Approach...

18

Initial Risk Analysis and Decision Making Framework  

Science Conference Proceedings (OSTI)

Commercialization of new carbon capture simulation initiative (CCSI) technology will include two key elements of risk management, namely, technical risk (will process and plant performance be effective, safe, and reliable) and enterprise risk (can project losses and costs be controlled within the constraints of market demand to maintain profitability and investor confidence). Both of these elements of risk are incorporated into the risk analysis subtask of Task 7. Thus far, this subtask has developed a prototype demonstration tool that quantifies risk based on the expected profitability of expenditures when retrofitting carbon capture technology on a stylized 650 MW pulverized coal electric power generator. The prototype is based on the selection of specific technical and financial factors believed to be important determinants of the expected profitability of carbon capture, subject to uncertainty. The uncertainty surrounding the technical performance and financial variables selected thus far is propagated in a model that calculates the expected profitability of investments in carbon capture and measures risk in terms of variability in expected net returns from these investments. Given the preliminary nature of the results of this prototype, additional work is required to expand the scope of the model to include additional risk factors, additional information on extant and proposed risk factors, the results of a qualitative risk factor elicitation process, and feedback from utilities and other interested parties involved in the carbon capture project. Additional information on proposed distributions of these risk factors will be integrated into a commercial implementation framework for the purpose of a comparative technology investment analysis.

Engel, David W.

2012-02-01T23:59:59.000Z

19

Novel Threat-risk Index Using Probabilistic Risk Assessment and Human Reliability Analysis - Final Report  

SciTech Connect

In support of a national need to improve the current state-of-the-art in alerting decision makers to the risk of terrorist attack, a quantitative approach employing scientific and engineering concepts to develop a threat-risk index was undertaken at the Idaho National Engineering and Environmental Laboratory (INEEL). As a result of this effort, a set of models has been successfully integrated into a single comprehensive model known as Quantitative Threat-Risk Index Model (QTRIM), with the capability of computing a quantitative threat-risk index on a system level, as well as for the major components of the system. Such a threat-risk index could provide a quantitative variant or basis for either prioritizing security upgrades or updating the current qualitative national color-coded terrorist threat alert.

George A. Beitel

2004-02-01T23:59:59.000Z

20

Flexible Framework for Building Energy Analysis: Preprint  

SciTech Connect

In the building energy research and advanced practitioner communities, building models are perturbed across large parameter spaces to assess energy and cost performance in the face of programmatic and economic constraints. This paper describes the OpenStudio software framework for performing such analyses.

Hale, E.; Macumber, D.; Weaver, E.; Shekhar, D.

2012-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.  

SciTech Connect

Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

Merkle, Peter Benedict

2006-03-01T23:59:59.000Z

22

Grain - A Java Analysis Framework for Total Data Readout  

E-Print Network (OSTI)

Grain is a data analysis framework developed to be used with the novel Total Data Readout data acquisition system. In Total Data Readout all the electronics channels are read out asynchronously in singles mode and each data item is timestamped. Event building and analysis has to be done entirely in the software post-processing the data stream. A flexible and efficient event parser and the accompanying software framework have been written entirely in Java. The design and implementation of the software are discussed along with experiences gained in running real-life experiments.

P. Rahkila

2007-11-21T23:59:59.000Z

23

A framework for formal modeling and analysis of organizations  

Science Conference Proceedings (OSTI)

A new, formal, role-based, framework for modeling and analyzing both real world and artificial organizations is introduced. It exploits static and dynamic properties of the organizational model and includes the (frequently ignored) environment. The transition ... Keywords: Analysis, Computational, Logic-based, Modeling, Organization model, Simulation, Verification

Catholijn M. Jonker; Alexei Sharpanskykh; Jan Treur; Pinar Yolum

2007-08-01T23:59:59.000Z

24

Cluster Analysis-Based Approaches for Geospatiotemporal Data Mining of Massive Data Sets for Identification of Forest Threats  

SciTech Connect

We investigate methods for geospatiotemporal data mining of multi-year land surface phenology data (250 m2 Normalized Difference Vegetation Index (NDVI) values derived from the Moderate Resolution Imaging Spectrometer (MODIS) in this study) for the conterminous United States (CONUS) as part of an early warning system for detecting threats to forest ecosystems. The approaches explored here are based on k-means cluster analysis of this massive data set, which provides a basis for defining the bounds of the expected or normal phenological patterns that indicate healthy vegetation at a given geographic location. We briefly describe the computational approaches we have used to make cluster analysis of such massive data sets feasible, describe approaches we have explored for distinguishing between normal and abnormal phenology, and present some examples in which we have applied these approaches to identify various forest disturbances in the CONUS.

Mills, Richard T [ORNL; Hoffman, Forrest M [ORNL; Kumar, Jitendra [ORNL; HargroveJr., William Walter [USDA Forest Service

2011-01-01T23:59:59.000Z

25

nicter: a large-scale network incident analysis system: case studies for understanding threat landscape  

Science Conference Proceedings (OSTI)

We have been developing the Network Incident analysis Center for Tactical Emergency Response (nicter), whose objective is to detect and identify propagating malwares. The nicter mainly monitors darknet, a set of unused IP addresses, to observe global ... Keywords: correlation analysis, malware analysis, network monitoring

Masashi Eto; Daisuke Inoue; Jungsuk Song; Junji Nakazato; Kazuhiro Ohtaka; Koji Nakao

2011-04-01T23:59:59.000Z

26

Analysis and System Design Framework for Infrared Spatial Heterodyne Spectrometers  

SciTech Connect

The authors present a preliminary analysis and design framework developed for the evaluation and optimization of infrared, Imaging Spatial Heterodyne Spectrometer (SHS) electro-optic systems. Commensurate with conventional interferometric spectrometers, SHS modeling requires an integrated analysis environment for rigorous evaluation of system error propagation due to detection process, detection noise, system motion, retrieval algorithm and calibration algorithm. The analysis tools provide for optimization of critical system parameters and components including : (1) optical aperture, f-number, and spectral transmission, (2) SHS interferometer grating and Littrow parameters, and (3) image plane requirements as well as cold shield, optical filtering, and focal-plane dimensions, pixel dimensions and quantum efficiency, (4) SHS spatial and temporal sampling parameters, and (5) retrieval and calibration algorithm issues.

Cooke, B.J.; Smith, B.W.; Laubscher, B.E.; Villeneuve, P.V.; Briles, S.D.

1999-04-05T23:59:59.000Z

27

A fuzzy opportunity and threat aggregation approach in multicriteria decision analysis  

Science Conference Proceedings (OSTI)

Economic expansion in developed countries coupled with dramatically growing economies in countries such as China and India have precipitated a steady increase in demand for oil and natural gas. The Caspian Sea region holds large quantities of both oil ... Keywords: Analytic network process, Defuzzification, Entropy, Fuzzy scoring, Group decision making, Level-2 fuzzy sets, Multi-criteria decision analysis, Theory of displaced ideal

Madjid Tavana; Mariya A. Sodenkamp; Mohsen Pirdashti

2010-12-01T23:59:59.000Z

28

Cyber threat metrics.  

SciTech Connect

Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

2012-03-01T23:59:59.000Z

29

Online Monitoring Technical Basis and Analysis Framework for Large Power  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for Large for Large Power Transformers; Interim Report for FY 2012 Online Monitoring Technical Basis and Analysis Framework for Large Power Transformers; Interim Report for FY 2012 The Light Water Reactor Sustainability Program is a research, development, and deployment program sponsored by the U.S. Department of Energy Office of Nuclear Energy. The program is operated in collaboration with the Electric Power Research Institute's (EPRI's) research and development efforts in the Long-Term Operations (LTO) Program. The LTO Program is managed as a separate technical program operating in the Plant Technology Department of the EPRI Nuclear Power Sector with the guidance of an industry advisory Integration Committee. Because both the Department of Energy Office of Nuclear Energy and EPRI conduct research and development in technologies

30

Online Monitoring Technical Basis and Analysis Framework for Emergency  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

for for Emergency Diesel Generators-Interim Report for FY 2013 Online Monitoring Technical Basis and Analysis Framework for Emergency Diesel Generators-Interim Report for FY 2013 The Light Water Reactor Sustainability Program is a research, development, and deployment program sponsored by the U.S. Department of Energy Office of Nuclear Energy. The program is operated in collaboration with the Electric Power Research Institute's (EPRI's) research and development efforts in the Long-Term Operations Program. The Long-Term Operations Program is managed as a separate technical program operating in the Plant Technology Department of the EPRI Nuclear Power Sector with the guidance of an industry advisory Integration Committee. Because both the Department of Energy Office of Nuclear Energy and EPRI conduct research and development

31

A Reference Based Analysis Framework for Analyzing System Call Traces  

SciTech Connect

Reference based analysis (RBA) is a novel data mining tool for exploring a test data set with respect to a reference data set. The power of RBA lies in it ability to transform any complex data type, such as symbolic sequences and multi-variate categorical data instances, into a multivariate continuous representation. The transformed representation not only allows visualization of the complex data, which cannot be otherwise visualized in its original form, but also allows enhanced anomaly detection in the transformed feature space. We demonstrate the application of the RBA framework in analyzing system call traces and show how the transformation results in improved intrusion detection performance over state of art data mining based intrusion detection methods developed for system call traces.

Chandola, Varun [ORNL; Kumar, Vipin [University of Minnesota; Boriah, Shyam [University of Minnesota

2010-01-01T23:59:59.000Z

32

Power transmission investment analysis: a new financial Evaluation framework for South Africa  

Science Conference Proceedings (OSTI)

A proposed framework for power transmission expansion projects in South Africa incorporates the modeling of project options and uncertainties, Monte Carlo simulations, real option analysis, and decision analysis, based on a foundation of strategic analysis. (author)

Maboke, Silky Ntombifuthi; Kachienga, Michael Ogembo

2008-05-15T23:59:59.000Z

33

A macro-micro system architecture analysis framework applied to Smart Grid meter data management systems by Sooraj Prasannan.  

E-Print Network (OSTI)

??This thesis proposes a framework for architectural analysis of a system at the Macro and Micro levels. The framework consists of two phases  – Formulation… (more)

Prasannan, Sooraj

2010-01-01T23:59:59.000Z

34

Facebook: Threats to Privacy  

E-Print Network (OSTI)

End-users share a wide variety of information on Facebook, but a discussion of the privacy implications of doing so has yet to emerge. We examined how Facebook affects privacy, and found serious flaws in the system. Privacy on Facebook is undermined by three principal factors: users disclose too much, Facebook does not take adequate steps to protect user privacy, and third parties are actively seeking out end-user information using Facebook. We based our end-user findings on a survey of MIT students and statistical analysis of Facebook data from MIT, Harvard, NYU, and the University of Oklahoma. We analyzed the Facebook system in terms of Fair Information Practices as recommended by the Federal Trade Commission. In light of the information available and the system that protects it, we used a threat model to analyze specific privacy risks. Specifically, university administrators are using Facebook for disciplinary purposes, firms are using it for marketing purposes, and intruders are exploiting security holes. For each threat, we analyze the efficacy of the current protection, and where solutions are inadequate, we make recommendations on how to address the issue.

Harvey Jones; José Hiram Soltren

2005-01-01T23:59:59.000Z

35

On sensitivity analysis in the 4dVar framework  

Science Conference Proceedings (OSTI)

The sensitivity of model forecasts to uncertainties in the control variables is evaluated using the adjoint technique and the ensemble generated by the reduced-order 4d variational (R4dVar) algorithm in the framework of twin-data experiments with ...

Max Yaremchuk; Paul Martin

36

C-Meter: A Framework for Performance Analysis of Computing Clouds  

E-Print Network (OSTI)

C-Meter: A Framework for Performance Analysis of Computing Clouds Nezih Yigitbasi, Alexandru Iosup virtualization and network communications overheads. To address these issues, we have designed and implemented C-Meter of computing clouds. Then, we present the architecture of the C-Meter framework and discuss several cloud

Epema, Dick H.J.

37

A macro-micro system architecture analysis framework applied to Smart Grid meter data management systems by Sooraj Prasannan.  

E-Print Network (OSTI)

This thesis proposes a framework for architectural analysis of a system at the Macro and Micro levels. The framework consists of two phases -- Formulation and Analysis. Formulation is made up of three steps -- Identifying ...

Prasannan, Sooraj

2010-01-01T23:59:59.000Z

38

Program partitioning: a framework for combining static and dynamic analysis  

Science Conference Proceedings (OSTI)

For higher quality software, static analysis and dynamic analysis should be used in a complementary manner. In this work, we explore the concept of partitioning a program such that the partitions can be analyzed separately. With such partitioning, potentially ... Keywords: dynamic analysis, program partitioning, static analysis

Pankaj Jalote; Vipindeep Vangala; Taranbir Singh; Prateek Jain

2006-05-01T23:59:59.000Z

39

Knowledge-centric and language independent framework for safety analysis tools  

Science Conference Proceedings (OSTI)

This paper presents a knowledge-centric and language independent framework and its application to develop safety analysis tools for avionics systems. A knowledge-centric approach is important to address domain-specific needs, with respect to the types ...

S. C. Kothari; Luke Bishop; Jeremias Sauceda; Gary Daugherty

2004-03-01T23:59:59.000Z

40

DIALOG: A framework for modeling, analysis and reuse of digital forensic knowledge  

Science Conference Proceedings (OSTI)

This paper presents DIALOG (Digital Investigation Ontology); a framework for the management, reuse, and analysis of Digital Investigation knowledge. DIALOG provides a general, application independent vocabulary that can be used to describe an investigation ... Keywords: Digital, Investigation, Ontology, Registry, Windows

Damir Kahvedi?; Tahar Kechadi

2009-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

A Framework for the Statistical Analysis of Large Radar and Lightning Datasets: Results from STEPS 2000  

Science Conference Proceedings (OSTI)

A framework for the statistical analysis of large radar and lightning datasets is described and implemented in order to analyze two research questions in atmospheric electricity: storms dominated by positive cloud-to-ground (+CG) lightning and ...

Timothy J. Lang; Steven A. Rutledge

2011-08-01T23:59:59.000Z

42

Categorizing Threat Building and Using a Generic Threat Matrix | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Categorizing Threat Building and Using a Generic Threat Matrix Categorizing Threat Building and Using a Generic Threat Matrix Categorizing Threat Building and Using a Generic Threat Matrix The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general

43

Integrated framework for analysis: electric sector expansion in developing countries  

Science Conference Proceedings (OSTI)

The objective of this dissertation is the development of an analytical framework for the assessment of electric sector expansion strategies in developing countries, in the context of overall development planning, and with particular emphasis on macroeconomic and social implications. The framework will ensure that each electric capacity expansion alternative is linked quantitatively and consistently with a given economic development plan. The analytical model employs an integrated set of technological and economic models to explore the national energy and economy response to electric sector expansion planning for the Korean case. In this study, two integrated models were developed. The integrated model 1 is composed of a macroeconomic model, an energy input-output model, and an energy network flow model. This model accounts for the relationships of energy demand with overall economic development, and interfuel substitution, for the relationships between the investment capital required to meet astated levels of electric demand and overall investment planning and foreign exchange requirements, and economic impacts of the energy sector on gross national product (GNP) and balance of payments (BOP). The integrated model 2 is composed of an energy input-output model, and energy network flow model, and a GNP identify constraint,and calculates the macroeconomic-balanced level of comsumption, electric sector investments, industrial sector investments, and energy imports given policy-determined GNP and other GNP components. The two models were applied ot the Korean case by using a trial scenario and assumed input data. Computational results demonstrate and prove the workability of the models.

Lee, M.K.

1982-01-01T23:59:59.000Z

44

Evaluation of preliminary data analysis framework in software cost estimation based on ISBSG R9 Data  

Science Conference Proceedings (OSTI)

Previous research has argued that preliminary data analysis is necessary for software cost estimation. In this paper, a framework for such analysis is applied to a substantial corpus of historical project data (ISBSG R9 data), selected without explicit ... Keywords: ISBSG Data R9, Software cost estimation, Software engineering data analysis

Qin Liu; Wen Zhong Qin; Robert Mintram; Margaret Ross

2008-09-01T23:59:59.000Z

45

CIMS: A FRAMEWORK FOR INFRASTRUCTURE INTERDEPENDENCY MODELING AND ANALYSIS  

SciTech Connect

Today’s society relies greatly upon an array of complex national and international infrastructure networks such as transportation, utilities, telecommunication, and even financial networks. While modeling and simulation tools have provided insight into the behavior of individual infrastructure networks, a far less understood area is that of the interrelationships among multiple infrastructure networks including the potential cascading effects that may result due to these interdependencies. This paper first describes infrastructure interdependencies as well as presenting a formalization of interdependency types. Next the paper describes a modeling and simulation framework called CIMS© and the work that is being conducted at the Idaho National Laboratory (INL) to model and simulate infrastructure interdependencies and the complex behaviors that can result.

Donald D. Dudenhoeffer; May R. Permann; Milos Manic

2006-12-01T23:59:59.000Z

46

Energy and Greenhouse Impacts of Biofuels: A Framework for Analysis  

E-Print Network (OSTI)

Greenhouse Gas Impacts of Biofuels Wang, M. (2001) "Energy & Greenhouse Gas Impacts of Biofuels Fuels and MotorLifecycle Analysis of Biofuels." Report UCD-ITS-RR-06-08.

Kammen, Daniel M.; Farrell, Alexander E.; Plevin, Richard J.; Jones, Andrew D.; Nemet, Gregory F.; Delucchi, Mark A.

2008-01-01T23:59:59.000Z

47

A spatially-distributed cost-effectiveness analysis framework for controlling water pollution  

Science Conference Proceedings (OSTI)

With the aim of comparing various agro-environmental measures to control pesticide pollution in surface waters, we propose a methodological framework for spatially-distributed cost-effectiveness analysis. We use the Soil and Water Assessment Tool (SWAT) ... Keywords: Bio-economic modelling, Cost-effectiveness analysis, Integrated modelling, Pesticides, SWAT

Jean-Marie Lescot; Paul Bordenave; Kevin Petit; Odile Leccia

2013-03-01T23:59:59.000Z

48

DUA-forensics: a fine-grained dependence analysis and instrumentation framework based on Soot  

Science Conference Proceedings (OSTI)

We describe DUA-Forensics, our open-source Java-bytecode program analysis and instrumentation system built on top of Soot. DUA-Forensics has been in development for more than six years and has supported multiple research projects on efficient monitoring, ... Keywords: Soot analysis framework, instrumentation, library model, program dependence

Raul Santelices, Yiji Zhang, Haipeng Cai, Siyuan Jiang

2013-06-01T23:59:59.000Z

49

Integrated probabilistic framework for domino effect and risk analysis  

Science Conference Proceedings (OSTI)

The present paper deals with domino effect analysis for industrial facilities. Actually, an explosion or accident may generate various sets of projectiles. In their trajectory, they may impact other existing facilities, such as tanks under high-pressure ... Keywords: Domino effect, Explosion, Impact, Reliability, Risk, Tanks

Q. B. Nguyen; A. Mebarki; R. Ami Saada; F. Mercier; M. Reimeringer

2009-09-01T23:59:59.000Z

50

Global Threat Reduction Initiative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

comprehensive comprehensive strategy to prevent nuclear terrorism; and  The key organization responsible for implementing the U.S. HEU minimization policy. GTRI MISSION Reduce and protect vulnerable nuclear and radiological material located at civilian sites worldwide. DOE STRATEGIC GOAL 2.2 Prevent the acquisition of nuclear and radiological materials for use in weapons of mass destruction and other acts of terrorism Protect high priority nuclear and radiological materials from theft and sabotage These efforts result in threat reduction by improving security on the bomb material remaining at civilian sites - each vulnerable building that is protected reduces the risk until a permanent threat reduction solution can be implemented.

51

Insider Threat.pptx  

NLE Websites -- All DOE Office Websites (Extended Search)

Mitigating the Insider Threat Mitigating the Insider Threat (and Other Security Issues) Roger G. Johnston, Ph.D., CPP Vulnerability Assessment Team Argonne National Laboratory http://www.ne.anl.gov/capabilities/vat Argonne National Laboratory ~$738 million annual budget 1500 acres, 3400 employees, 4400 facility users, 1500 students R&D and technical assistance for government & industry Sponsors * DHS * DoD * DOS * IAEA * Euratom * DOE/NNSA * private companies * intelligence agencies * public interest organizations The VAT has done detailed vulnerability assessments on hundreds of different security devices, systems, & programs. Vulnerability Assessment Team (VAT) The greatest of faults, I should say, is to be conscious of none.

52

Task parallel sensitivity analysis and parameter estimation of groundwater simulations through the SALSSA framework  

Science Conference Proceedings (OSTI)

The Support Architecture for Large-Scale Subsurface Analysis (SALSSA) provides an extensible framework, sophisticated graphical user interface, and underlying data management system that simplifies the process of running subsurface models, tracking provenance information, and analyzing the model results. Initially, SALSSA supported two styles of job control: user directed execution and monitoring of individual jobs, and load balancing of jobs across multiple machines taking advantage of many available workstations. Recent efforts in subsurface modelling have been directed at advancing simulators to take advantage of leadership class supercomputers. We describe two approaches, current progress, and plans toward enabling efficient application of the subsurface simulator codes via the SALSSA framework: automating sensitivity analysis problems through task parallelism, and task parallel parameter estimation using the PEST framework.

Schuchardt, Karen L.; Agarwal, Khushbu; Chase, Jared M.; Rockhold, Mark L.; Freedman, Vicky L.; Elsethagen, Todd O.; Scheibe, Timothy D.; Chin, George; Sivaramakrishnan, Chandrika

2010-07-15T23:59:59.000Z

53

Software Addresses Terrorist Building Threats  

Science Conference Proceedings (OSTI)

... guard against terrorist threats to their facilities. ... Its essential components are risk assessment, identification ... strategies to reduce facility vulnerability. ...

2013-04-23T23:59:59.000Z

54

Fuel Cycle Analysis Framework Base Cases for the IAEA/INPRO GAINS Collaborative Project  

SciTech Connect

Thirteen countries participated in the Collaborative Project GAINS “Global Architecture of Innovative Nuclear Energy Systems Based on Thermal and Fast Reactors Including a Closed Fuel Cycle”, which was the primary activity within the IAEA/INPRO Program Area B: “Global Vision on Sustainable Nuclear Energy” for the last three years. The overall objective of GAINS was to develop a standard framework for assessing future nuclear energy systems taking into account sustainable development, and to validate results through sample analyses. This paper details the eight scenarios that constitute the GAINS framework base cases for analysis of the transition to future innovative nuclear energy systems. The framework base cases provide a reference for users of the framework to start from in developing and assessing their own alternate systems. Each base case is described along with performance results against the GAINS sustainability evaluation metrics. The eight cases include four using a moderate growth projection and four using a high growth projection for global nuclear electricity generation through 2100. The cases are divided into two sets, addressing homogeneous and heterogeneous scenarios developed by GAINS to model global fuel cycle strategies. The heterogeneous world scenario considers three separate nuclear groups based on their fuel cycle strategies, with non-synergistic and synergistic cases. The framework base case analyses results show the impact of these different fuel cycle strategies while providing references for future users of the GAINS framework. A large number of scenario alterations are possible and can be used to assess different strategies, different technologies, and different assumptions about possible futures of nuclear power. Results can be compared to the framework base cases to assess where these alternate cases perform differently versus the sustainability indicators.

Brent Dixon

2012-09-01T23:59:59.000Z

55

PageRank, HITS and a unified framework for link analysis  

SciTech Connect

Two popular webpage ranking algorithms are HITS and PageRank. HITS emphasizes mutual reinforcement between authority and hub webpages, while PageRank emphasizes hyperlink weight normalization and web surfing based on random walk models. We systematically generalize/combine these concepts into a unified framework. The ranking framework contains a large algorithm space; HITS and PageRank are two extreme ends in this space. We study several normalized ranking algorithms which are intermediate between HITS and PageRank, and obtain closed-form solutions. We show that, to first order approximation, all ranking algorithms in this framework, including PageRank and HITS, lead to same ranking which is highly correlated with ranking by indegree. These results support the notion that in web resource ranking indegree and outdegree are of fundamental importance. Rankings of webgraphs of different sizes and queries are presented to illustrate our analysis.

Ding, Chris; He, Xiaofeng; Husbands, Parry; Zha, Hongyuan; Simon, Horst

2001-10-01T23:59:59.000Z

56

Development of a Geological and Geomechanical Framework for the Analysis of  

Open Energy Info (EERE)

Geological and Geomechanical Framework for the Analysis of Geological and Geomechanical Framework for the Analysis of MEQ in EGS Experiments (Geysers) Geothermal Project Jump to: navigation, search Last modified on July 22, 2011. Project Title Development of a Geological and Geomechanical Framework for the Analysis of MEQ in EGS Experiments (Geysers) Project Type / Topic 1 Recovery Act: Enhanced Geothermal Systems Component Research and Development/Analysis Project Type / Topic 2 Induced Seismicity Project Description Water injection is used in engineered or enhanced geothermal systems (EGS) to increase rock permeability, a process which involves fracture initiation and/or reactivation of joints through pore pressure and stress perturbations. This stimulation process is often accompanied by multiple microseismic events associated with rock failure or shear slip on pre-existing fractures. The microseismic signals can be used to understand the hydraulic fracturing process and the properties of the created reservoir. Despite progress in quantitative and qualitative analysis of reservoir stimulation using MEQs, the fundamental mechanisms still are poorly understood and several key questions remain unresolved namely, the variation of seismic activity with injection rate, delayed micro-seismicity, the relation of the stimulated zone to the injected volume and its rate, the connectivity of fractures hosting MEQs, and the resulting reservoir permeability. In addition, longer term phenomena such as permeability evolution related to thermal contraction remain to be investigated.

57

Collaborative e-business process modelling: a holistic analysis framework focused on small and medium-sized enterprises  

Science Conference Proceedings (OSTI)

In this work, we propose a holistic analysis framework for collaborative e-Business process modelling approaches that takes into account the specific challenges small and medium-sized enterprises (SME) are facing with regard to modelling inter-organizational ... Keywords: analysis framework, business process management, collaborative business process, e-business, service-oriented architecture, sme

Volker Hoyer; Oliver Christ

2007-04-01T23:59:59.000Z

58

Proliferation: Threat and response  

Science Conference Proceedings (OSTI)

The May 1997 Report of the Quadrennial Defense Review (QDR) concluded that the threat or use of nuclear, biological, or chemical (NBC) weapons is a likely condition of future warfare and could occur in the early stages of war to disrupt US operations and logistics. These weapons may be delivered by ballistic missiles, cruise missiles, aircraft, special operations forces, or other means. In many of the world`s regions where the United States is likely to deploy forces--including Northeast Asia and the Middle East--potential adversaries have chemical and/or biological weapons and the missile systems to deliver them, and actively seek nuclear weapons. Potential adversaries may seek to counter American conventional military superiority using less expensive and more attainable, asymmetrical means, including NBC weapons. To meet this challenge, as well as the possibility that NBC weapons might also be used in some smaller-scale contingencies, US forces must be properly trained and equipped to operate effectively and decisively in the face of NBC attacks. The first section of this report details the proliferation of NBC weapons and the threat it poses to US interests and forces.

NONE

1997-11-01T23:59:59.000Z

59

FTIR and 27 Al MAS NMR analysis of the effect of framework Al-and Si-defects  

E-Print Network (OSTI)

FTIR and 27 Al MAS NMR analysis of the effect of framework Al- and Si-defects in micro- and micro 2011 Keywords: Micro-mesoporous H-ZSM-5 zeolite Framework defects FTIR 27 Al MAS NMR Methanol, and their activity was investigated in transformation of methanol to low olefins, aromatics and paraffins. 27 Al MAS

Sklenak, Stepan

60

iGlobe: an interactive visualization and analysis framework for geospatial data  

Science Conference Proceedings (OSTI)

We demonstrate an interactive visualization and analysis system for integrating climate data with other geospatial data sets, such as environmental and demographic data. The \\eviz system is a desktop-based visualization and analysis environment which allows seamless integration of multiple geospatial data sets from varied sources and provides an interface to interactively analyze the different data sets and apply sophisticated data analysis and mining algorithms in a near real time fashion. The framework is highly desirable in domains such as earth and climate sciences where great emphasis is placed on simultaneous analysis of different data sets such as remote sensing images, climate model simulation outputs, and other environmental and demographic databases, to understand weather and climate systems and the impact of climate change on nature and people.

Chandola, Varun [ORNL; Vatsavai, Raju [ORNL; Bhaduri, Budhendra L [ORNL

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Global Threat Reduction Initiative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nonproliferation Nonproliferation U.S. DEPARTMENT OF ENERGY 1 The Current Status of Gap and U.S.-Origin Nuclear Fuel Removals 2011 Jeff Galan, Deputy Project Manager U.S.-Origin Nuclear Remove Program National Nuclear Security Administration Global Threat Reduction Initiative Defense Nuclear Nonproliferation U.S. DEPARTMENT OF ENERGY 2 GTRI Mission and Goals GTRI is: A part of President Obama's comprehensive strategy to prevent nuclear terrorism; and The key organization responsible for implementing the U.S. HEU minimization policy. GTRI MISSION Reduce and protect vulnerable nuclear and radiological material located at civilian sites worldwide. DOE STRATEGIC GOAL 2.2 Prevent the acquisition of nuclear and radiological materials for use in weapons of mass destruction and other

62

Bridging Human Reliability Analysis and Psychology, Part 2: A Cognitive Framework to Support HRA  

SciTech Connect

This is the second of two papers that discuss the literature review conducted as part of the U.S. Nuclear Regulatory Commission (NRC) effort to develop a hybrid human reliability analysis (HRA) method in response to Staff Requirements Memorandum (SRM) SRM-M061020. This review was conducted with the goal of strengthening the technical basis within psychology, cognitive science and human factors for the hybrid HRA method being proposed. An overview of the literature review approach and high-level structure is provided in the first paper, whereas this paper presents the results of the review. The psychological literature review encompassed research spanning the entirety of human cognition and performance, and consequently produced an extensive list of psychological processes, mechanisms, and factors that contribute to human performance. To make sense of this large amount of information, the results of the literature review were organized into a cognitive framework that identifies causes of failure of macrocognition in humans, and connects those proximate causes to psychological mechanisms and performance influencing factors (PIFs) that can lead to the failure. This cognitive framework can serve as a tool to inform HRA. Beyond this, however, the cognitive framework has the potential to also support addressing human performance issues identified in Human Factors applications.

April M. Whaley; Stacey M. L. Hendrickson; Ronald L. Boring; Jing Xing

2012-06-01T23:59:59.000Z

63

musrfit: A free platform-independent framework for muSR data analysis  

E-Print Network (OSTI)

A free data-analysis framework for muSR has been developed. musrfit is fully written in C++, is running under GNU/Linux, Mac OS X, as well as Microsoft Windows, and is distributed under the terms of the GNU GPL. It is based on the CERN ROOT framework and is utilizing the Minuit optimization routines for fitting. It consists of a set of programs allowing the user to analyze and visualize the data. The fitting process is controlled by an ascii-input file with an extended syntax. A dedicated text editor is helping the user to create and handle these files in an efficient way, execute the fitting, show the data, get online help, and so on. A versatile tool for the generation of new input files and the extraction of fit parameters is provided as well. musrfit facilitates a plugin mechanism allowing to invoke user-defined functions. Hence, the functionality of the framework can be extended with a minimal amount of overhead for the user. Currently, musrfit can read the following facility raw-data files: PSI-BIN, MDU...

Suter, A

2011-01-01T23:59:59.000Z

64

Uncertainty Analysis Framework - Hanford Site-Wide Groundwater Flow and Transport Model  

Science Conference Proceedings (OSTI)

Pacific Northwest National Laboratory (PNNL) embarked on a new initiative to strengthen the technical defensibility of the predictions being made with a site-wide groundwater flow and transport model at the U.S. Department of Energy Hanford Site in southeastern Washington State. In FY 2000, the focus of the initiative was on the characterization of major uncertainties in the current conceptual model that would affect model predictions. The long-term goals of the initiative are the development and implementation of an uncertainty estimation methodology in future assessments and analyses using the site-wide model. This report focuses on the development and implementation of an uncertainty analysis framework.

Cole, Charles R.; Bergeron, Marcel P.; Murray, Christopher J.; Thorne, Paul D.; Wurstner, Signe K.; Rogers, Phillip M.

2001-11-09T23:59:59.000Z

65

Bio-threat microparticle simulants  

SciTech Connect

A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

Farquar, George Roy; Leif, Roald N

2012-10-23T23:59:59.000Z

66

Understanding cyber threats and vulnerabilities  

Science Conference Proceedings (OSTI)

This chapter reviews current and anticipated cyber-related threats to the Critical Information Infrastructure (CII) and Critical Infrastructures (CI). The potential impact of cyber-terrorism to CII and CI has been coined many times since the term was ... Keywords: actor, critical infrastructure, cyber crime, cyber terrorism, cyber threat, cyber vulnerabilities

Eric Luiijf

2012-01-01T23:59:59.000Z

67

The Tracking and Analysis Framework (TAF): A tool for the integrated assessment of acid deposition  

SciTech Connect

A major challenge that has faced policy makers concerned with acid deposition is obtaining an integrated view of the underlying science related to acid deposition. In response to this challenge, the US Department of Energy is sponsoring the development of an integrated Tracking and Analysis Framework (TAF) which links together the key acid deposition components of emissions, air transport, atmospheric deposition, and aquatic effects in a single modeling structure. The goal of TAF is to integrate credible models of the scientific and technical issues into an assessment framework that can directly address key policy issues, and in doing so act as a bridge between science and policy. Key objectives of TAF are to support coordination and communication among scientific researchers; to support communications with policy makers, and to provide rapid response for analyzing newly emerging policy issues; and to provide guidance for prioritizing research programs. This paper briefly describes how TAF was formulated to meet those objectives and the underlying principals which form the basis for its development.

Bloyd, C.N. [Argonne National Lab., IL (United States); Henrion, M. [Lumina Decision Systems, Los Altos, CA (United States); Marnicio, R.J. [Foster Wheeler Environmental Corp., Columbus, Ohio (United States)

1995-06-01T23:59:59.000Z

68

A framework for graph-based synthesis, analysis, and visualization of HPC cluster job data.  

Science Conference Proceedings (OSTI)

The monitoring and system analysis of high performance computing (HPC) clusters is of increasing importance to the HPC community. Analysis of HPC job data can be used to characterize system usage and diagnose and examine failure modes and their effects. This analysis is not straightforward, however, due to the complex relationships that exist between jobs. These relationships are based on a number of factors, including shared compute nodes between jobs, proximity of jobs in time, etc. Graph-based techniques represent an approach that is particularly well suited to this problem, and provide an effective technique for discovering important relationships in job queuing and execution data. The efficacy of these techniques is rooted in the use of a semantic graph as a knowledge representation tool. In a semantic graph job data, represented in a combination of numerical and textual forms, can be flexibly processed into edges, with corresponding weights, expressing relationships between jobs, nodes, users, and other relevant entities. This graph-based representation permits formal manipulation by a number of analysis algorithms. This report presents a methodology and software implementation that leverages semantic graph-based techniques for the system-level monitoring and analysis of HPC clusters based on job queuing and execution data. Ontology development and graph synthesis is discussed with respect to the domain of HPC job data. The framework developed automates the synthesis of graphs from a database of job information. It also provides a front end, enabling visualization of the synthesized graphs. Additionally, an analysis engine is incorporated that provides performance analysis, graph-based clustering, and failure prediction capabilities for HPC systems.

Mayo, Jackson R.; Kegelmeyer, W. Philip, Jr.; Wong, Matthew H.; Pebay, Philippe Pierre; Gentile, Ann C.; Thompson, David C.; Roe, Diana C.; De Sapio, Vincent; Brandt, James M.

2010-08-01T23:59:59.000Z

69

Nuclear Radiological Threat Task Force Established | National...  

National Nuclear Security Administration (NNSA)

Force Established Nuclear Radiological Threat Task Force Established November 03, 2003 Washington, DC Nuclear Radiological Threat Task Force Established NNSA's Administrator...

70

IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 19, NO. 1, FEBRUARY 2004 243 Framework for the Design and Analysis  

E-Print Network (OSTI)

is represented as information flows. The framework has sufficient scope to allow the analysis of a broad range- ment is also at the heart of the standard market design (SMD) proposal of the U.S. Federal Energy and Analysis of Congestion Revenue Rights Minghai Liu, Student Member, IEEE, and George Gross, Fellow, IEEE

Gross, George

71

An impulse framework for hydrodynamic force analysis : fish propulsion, water entry of spheres, and marine propellers  

E-Print Network (OSTI)

This thesis presents an impulse framework for analyzing the hydrodynamic forces on bodies in flow. This general theoretical framework is widely applicable, and it is used to address the hydrodynamics of fish propulsion, ...

Epps, Brenden P

2010-01-01T23:59:59.000Z

72

Tracking and Analysis Framework (TAF) model documentation and user`s guide  

SciTech Connect

With passage of the 1990 Clean Air Act Amendments, the United States embarked on a policy for controlling acid deposition that has been estimated to cost at least $2 billion. Title IV of the Act created a major innovation in environmental regulation by introducing market-based incentives - specifically, by allowing electric utility companies to trade allowances to emit sulfur dioxide (SO{sub 2}). The National Acid Precipitation Assessment Program (NAPAP) has been tasked by Congress to assess what Senator Moynihan has termed this {open_quotes}grand experiment.{close_quotes} Such a comprehensive assessment of the economic and environmental effects of this legislation has been a major challenge. To help NAPAP face this challenge, the U.S. Department of Energy (DOE) has sponsored development of an integrated assessment model, known as the Tracking and Analysis Framework (TAF). This section summarizes TAF`s objectives and its overall design.

Bloyd, C.; Camp, J.; Conzelmann, G. [and others

1996-12-01T23:59:59.000Z

73

Economic and Nonproliferation Analysis Framework for Assessing Reliable Nuclear Fuel Service Arrangements  

Science Conference Proceedings (OSTI)

Nuclear power is now broadly recognized as an essential technology in national strategies to provide energy security while meeting carbon management goals. Yet a long standing conundrum remains: how to enable rapid growth in the global nuclear power infrastructure while controlling the spread of sensitive enrichment and reprocessing technologies that lie at the heart of nuclear fuel supply and nuclear weapons programs. Reducing the latent proliferation risk posed by a broader horizontal spread of enrichment and reprocessing technology has been a primary goal of national nuclear supplier policies since the beginning of the nuclear power age. Attempts to control the spread of sensitive nuclear technology have been the subject of numerous initiatives in the intervening decades sometimes taking the form of calls to develop fuel supply and service assurances to reduce market pull to increase the number of states with fuel cycle capabilities. A clear understanding of what characteristics of specific reliable nuclear fuel service (RNFS) and supply arrangements qualify them as 'attractive offers' is critical to the success of current and future efforts. At a minimum, RNFS arrangements should provide economic value to all participants and help reduce latent proliferation risks posed by the global expansion of nuclear power. In order to inform the technical debate and the development of policy, Pacific Northwest National Laboratory has been developing an analytical framework to evaluate the economics and nonproliferation merits of alternative approaches to RNFS arrangements. This paper provides a brief overview of the economic analysis framework developed and applied to a model problem of current interest: full-service nuclear fuel leasing arrangements. Furthermore, this paper presents an extended outline of a proposed analysis approach to evaluate the non-proliferation merits of various RNFS alternatives.

Phillips, Jon R.; Kreyling, Sean J.; Short, Steven M.; Weimar, Mark R.

2010-04-14T23:59:59.000Z

74

A life cycle cost analysis framework for geologic storage of hydrogen : a scenario analysis.  

DOE Green Energy (OSTI)

The U.S. Department of Energy has an interest in large scale hydrogen geostorage, which would offer substantial buffer capacity to meet possible disruptions in supply. Geostorage options being considered are salt caverns, depleted oil/gas reservoirs, aquifers and potentially hard rock cavrns. DOE has an interest in assessing the geological, geomechanical and economic viability for these types of hydrogen storage options. This study has developed an ecocomic analysis methodology to address costs entailed in developing and operating an underground geologic storage facility. This year the tool was updated specifically to (1) a version that is fully arrayed such that all four types of geologic storage options can be assessed at the same time, (2) incorporate specific scenarios illustrating the model's capability, and (3) incorporate more accurate model input assumptions for the wells and storage site modules. Drawing from the knowledge gained in the underground large scale geostorage options for natural gas and petroleum in the U.S. and from the potential to store relatively large volumes of CO{sub 2} in geological formations, the hydrogen storage assessment modeling will continue to build on these strengths while maintaining modeling transparency such that other modeling efforts may draw from this project.

Kobos, Peter Holmes; Lord, Anna Snider; Borns, David James

2010-10-01T23:59:59.000Z

75

Enhancement of Watershed Analysis Risk Management Framework (WARMF) for Mercury Watershed Management and Total Maximum Daily Loads (TMDLs)  

Science Conference Proceedings (OSTI)

This report documents the enhancement of EPRI's Watershed Analysis Risk Management Framework (WARMF) to enable it to simulate the biogeochemical cycling and fish accumulation of mercury in the environment. This report should be of value to the power sector, industry, environmental organizations, government, and public agencies concerned about environmental mercury.

2006-03-13T23:59:59.000Z

76

Methodological Framework for Analysis of Buildings-Related Programs with BEAMS, 2008  

Science Conference Proceedings (OSTI)

The U.S. Department of Energy’s (DOE’s) Office of Energy Efficiency and Renewable Energy (EERE) develops official “benefits estimates” for each of its major programs using its Planning, Analysis, and Evaluation (PAE) Team. PAE conducts an annual integrated modeling and analysis effort to produce estimates of the energy, environmental, and financial benefits expected from EERE’s budget request. These estimates are part of EERE’s budget request and are also used in the formulation of EERE’s performance measures. Two of EERE’s major programs are the Building Technologies Program (BT) and the Weatherization and Intergovernmental Program (WIP). Pacific Northwest National Laboratory (PNNL) supports PAE by developing the program characterizations and other market information necessary to provide input to the EERE integrated modeling analysis as part of PAE’s Portfolio Decision Support (PDS) effort. Additionally, PNNL also supports BT by providing line-item estimates for the Program’s internal use. PNNL uses three modeling approaches to perform these analyses. This report documents the approach and methodology used to estimate future energy, environmental, and financial benefits using one of those methods: the Building Energy Analysis and Modeling System (BEAMS). BEAMS is a PC-based accounting model that was built in Visual Basic by PNNL specifically for estimating the benefits of buildings-related projects. It allows various types of projects to be characterized including whole-building, envelope, lighting, and equipment projects. This document contains an overview section that describes the estimation process and the models used to estimate energy savings. The body of the document describes the algorithms used within the BEAMS software. This document serves both as stand-alone documentation for BEAMS, and also as a supplemental update of a previous document, Methodological Framework for Analysis of Buildings-Related Programs: The GPRA Metrics Effort, (Elliott et al. 2004b). The areas most changed since the publication of that previous document are those discussing the calculation of lighting and HVAC interactive effects (for both lighting and envelope/whole-building projects). This report does not attempt to convey inputs to BEAMS or the methodology of their derivation.

Elliott, Douglas B.; Dirks, James A.; Hostick, Donna J.

2008-09-30T23:59:59.000Z

77

Accepted to Energy Policy, December 2011. A generic framework for the description and analysis of  

E-Print Network (OSTI)

Accepted to Energy Policy, December 2011. ERG/201104 A generic framework for the description policies. The framework can be employed to capture the evolution of energy security in an energy system associated with the system's constituent processes. Energy security policies are treated as flows

Hughes, Larry

78

Multidisciplinary framework for human reliability analysis with an application to errors of commission and dependencies  

Science Conference Proceedings (OSTI)

Since the early 1970s, human reliability analysis (HRA) has been considered to be an integral part of probabilistic risk assessments (PRAs). Nuclear power plant (NPP) events, from Three Mile Island through the mid-1980s, showed the importance of human performance to NPP risk. Recent events demonstrate that human performance continues to be a dominant source of risk. In light of these observations, the current limitations of existing HRA approaches become apparent when the role of humans is examined explicitly in the context of real NPP events. The development of new or improved HRA methodologies to more realistically represent human performance is recognized by the Nuclear Regulatory Commission (NRC) as a necessary means to increase the utility of PRAS. To accomplish this objective, an Improved HRA Project, sponsored by the NRC`s Office of Nuclear Regulatory Research (RES), was initiated in late February, 1992, at Brookhaven National Laboratory (BNL) to develop an improved method for HRA that more realistically assesses the human contribution to plant risk and can be fully integrated with PRA. This report describes the research efforts including the development of a multidisciplinary HRA framework, the characterization and representation of errors of commission, and an approach for addressing human dependencies. The implications of the research and necessary requirements for further development also are discussed.

Barriere, M.T.; Luckas, W.J. [Brookhaven National Lab., Upton, NY (United States); Wreathall, J. [Wreathall (John) and Co., Dublin, OH (United States); Cooper, S.E. [Science Applications International Corp., Reston, VA (United States); Bley, D.C. [PLG, Inc., Newport Beach, CA (United States); Ramey-Smith, A. [Nuclear Regulatory Commission, Washington, DC (United States). Div. of Systems Technology

1995-08-01T23:59:59.000Z

79

A Mathematical Framework for the Analysis of Cyber-Resilient Control Systems  

Science Conference Proceedings (OSTI)

The increasingly recognized vulnerability of industrial control systems to cyber-attacks has inspired a considerable amount of research into techniques for cyber-resilient control systems. The majority of this effort involves the application of well known information security (IT) techniques to control system networks. While these efforts are important to protect the control systems that operate critical infrastructure, they are never perfectly effective. Little research has focused on the design of closed-loop dynamics that are resilient to cyber-attack. The majority of control system protection measures are concerned with how to prevent unauthorized access and protect data integrity. We believe that the ability to analyze how an attacker can effect the closed loop dynamics of a control system configuration once they have access is just as important to the overall security of a control system. To begin to analyze this problem, consistent mathematical definitions of concepts within resilient control need to be established so that a mathematical analysis of the vulnerabilities and resiliencies of a particular control system design methodology and configuration can be made. In this paper, we propose rigorous definitions for state awareness, operational normalcy, and resiliency as they relate to control systems. We will also discuss some mathematical consequences that arise from the proposed definitions. The goal is to begin to develop a mathematical framework and testable conditions for resiliency that can be used to build a sound theoretical foundation for resilient control research.

Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Fugate, David L [ORNL; Kisner, Roger [ORNL

2013-01-01T23:59:59.000Z

80

California Santa Cruz THREAT MANAGEMENT  

E-Print Network (OSTI)

University of California Santa Cruz THREAT MANAGEMENT Personal Safety Handbook UCSC Police www2 Department Safety Handbook - 15 - #12;Any supervisor, manager, or other person in authority who receives the key to maintenance or delivery people. Don't hide a key outdoors; burglars know all the hiding places

California at Santa Cruz, University of

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Hostile intelligence threat: US technology  

Science Conference Proceedings (OSTI)

This publication outlines the hostile intelligence threat to U.S. industry and Western technology, including the operational capabilities of hostile intelligence services and their scientific and technological (S T) targets. Current intelligence strategies used against the United States are described and sources of information providing countermeasures guidance are listed. Points of contact for security and counterintelligence assistance are also included.

Whitman, D.

1988-11-01T23:59:59.000Z

82

A life cycle cost analysis framework for geologic storage of hydrogen : a user's tool.  

DOE Green Energy (OSTI)

The U.S. Department of Energy (DOE) has an interest in large scale hydrogen geostorage, which could offer substantial buffer capacity to meet possible disruptions in supply or changing seasonal demands. The geostorage site options being considered are salt caverns, depleted oil/gas reservoirs, aquifers and hard rock caverns. The DOE has an interest in assessing the geological, geomechanical and economic viability for these types of geologic hydrogen storage options. This study has developed an economic analysis methodology and subsequent spreadsheet analysis to address costs entailed in developing and operating an underground geologic storage facility. This year the tool was updated specifically to (1) incorporate more site-specific model input assumptions for the wells and storage site modules, (2) develop a version that matches the general format of the HDSAM model developed and maintained by Argonne National Laboratory, and (3) incorporate specific demand scenarios illustrating the model's capability. Four general types of underground storage were analyzed: salt caverns, depleted oil/gas reservoirs, aquifers, and hard rock caverns/other custom sites. Due to the substantial lessons learned from the geological storage of natural gas already employed, these options present a potentially sizable storage option. Understanding and including these various geologic storage types in the analysis physical and economic framework will help identify what geologic option would be best suited for the storage of hydrogen. It is important to note, however, that existing natural gas options may not translate to a hydrogen system where substantial engineering obstacles may be encountered. There are only three locations worldwide that currently store hydrogen underground and they are all in salt caverns. Two locations are in the U.S. (Texas), and are managed by ConocoPhillips and Praxair (Leighty, 2007). The third is in Teeside, U.K., managed by Sabic Petrochemicals (Crotogino et al., 2008; Panfilov et al., 2006). These existing H{sub 2} facilities are quite small by natural gas storage standards. The second stage of the analysis involved providing ANL with estimated geostorage costs of hydrogen within salt caverns for various market penetrations for four representative cities (Houston, Detroit, Pittsburgh and Los Angeles). Using these demand levels, the scale and cost of hydrogen storage necessary to meet 10%, 25% and 100% of vehicle summer demands was calculated.

Kobos, Peter Holmes; Lord, Anna Snider; Borns, David James; Klise, Geoffrey T.

2011-09-01T23:59:59.000Z

83

Global Threat Reduction Initiative | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Threat Reduction Initiative | National Nuclear Security Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Global Threat Reduction Initiative Home > About Us > Our Programs > Nonproliferation > Global Threat Reduction Initiative Global Threat Reduction Initiative The mission of the Global Threat Reduction Initiative (GTRI) is to reduce

84

Global Threat Reduction Initiative | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Threat Reduction Initiative | National Nuclear Security Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Global Threat Reduction Initiative Home > About Us > Our Programs > Nonproliferation > Global Threat Reduction Initiative Global Threat Reduction Initiative The mission of the Global Threat Reduction Initiative (GTRI) is to reduce

85

Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity  

E-Print Network (OSTI)

The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and ...

Cho, Yiseul

2012-01-01T23:59:59.000Z

86

Stepwise adsorption in a mesoporous metal?organic framework: experimental and computational analysis  

SciTech Connect

Stepwise adsorption in a metal-organic framework with both micro- and meso-pores is caused by adsorbates first filling the micropores, then adsorbing along the mesopore walls, and finally filling the mesopores.

Yuan, Daqiang; Getman, Rachel B.; Wei, Zhangwen; Snurr, Randall Q.; Zhou, Hong-Cai (TAM)

2012-04-02T23:59:59.000Z

87

Nuclear Radiological Threat Task Force Established | National...  

NLE Websites -- All DOE Office Websites (Extended Search)

Radiological Threat Task Force Established | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

88

An Integrated Geovisual Analytics Framework for Analysis of Energy Consumption Data and Renewable Energy Potentials  

SciTech Connect

We present an integrated geovisual analytics framework for utility consumers to interactively analyze and benchmark their energy consumption. The framework uses energy and property data already available with the utility companies and county governments respectively. The motivation for the developed framework is the need for citizens to go beyond the conventional utility bills in understanding the patterns in their energy consumption. There is also a need for citizens to go beyond one-time improvements that are often not monitored and measured over time. Some of the features of the framework include the ability for citizens to visualize their historical energy consumption data along with weather data in their location. The quantity of historical energy data available is significantly more than what is available from utility bills. An overlay of the weather data provides users with a visual correlation between weather patterns and their energy consumption patterns. Another feature of the framework is the ability for citizens to compare their consumption on an aggregated basis to that of their peers other citizens living in houses of similar size and age and within the same or different geographical boundaries, such as subdivision, zip code, or county. The users could also compare their consumption to others based on the size of their family and other attributes. This feature could help citizens determine if they are among the best in class . The framework can also be used by the utility companies to better understand their customers and to plan their services. To make the framework easily accessible, it is developed to be compatible with mobile consumer electronics devices.

Omitaomu, Olufemi A [ORNL; Maness, Christopher S [ORNL; Kramer, Ian S [ORNL; Kodysh, Jeffrey B [ORNL; Bhaduri, Budhendra L [ORNL; Steed, Chad A [ORNL; Karthik, Rajasekar [ORNL; Nugent, Philip J [ORNL; Myers, Aaron T [ORNL

2012-01-01T23:59:59.000Z

89

The New Nuclear Threat John Deutch  

E-Print Network (OSTI)

), although experts agree that Israel, Pakistan and South Africa also have a nuclear weapons capabilityThe New Nuclear Threat John Deutch FOREIGN AFFAIRS Volume 71 · Number 4 Foreign AffairsThe contents. Deutch THE NEW NUCLEAR THREAT he threat of nuclear weapons spread across the world has displaced the fear

Deutch, John

90

Implementation of the Watershed Analysis Risk Management Framework (WARMF) Watershed Model for Nutrient Trading in the Ohio River Ba sin  

Science Conference Proceedings (OSTI)

As part of the Ohio River Water Quality Trading Program, the Scioto, Muskingum, and Allegheny watersheds were analyzed, using the Watershed Analysis Risk Management Framework (WARMF) model, to determine their capacity for nutrient trading. For consistency across the Ohio River Basin, the watershed models were implemented using the hydrological unit code (HUC) 10 delineation available from the United States Geological Survey. Data from the Ohio Environmental Protection Agency, Pennsylvania Department ...

2012-07-20T23:59:59.000Z

91

What is an Asset-Based Threat Profile?...............................................................4  

E-Print Network (OSTI)

Threats to information technology are ever increasing and many organizations are spending much money and time in attempting to fix security problems. Before one can think about remediation, assets worth protecting and knowing what to protect those assets from must be defined. OCTAVE ® characterizes a self-directed methodology for defining an organization’s assets and the assets’ risks. Critical to OCTAVE ® are the tools and processes toward developing assetbased threat profiles. The threat profile includes network risks, also known as vulnerabilities that often times analysis team members are not qualified to assess. Vulnerability assessment tools aid the OCTAVE ® analysis team to determine exactly what network-aware technological risks face any certain asset and often times help to further define the asset itself. By applying the results of a vulnerability assessment to an OCTAVE ® Risk Profile, many unanswered questions pertaining to the asset and its risks are fulfilled in an autonomous and

Andrew Storms

2003-01-01T23:59:59.000Z

92

An Analysis Framework for Investigating the Trade-offs Between System Performance and Energy Consumption in a Heterogeneous Computing Environment  

SciTech Connect

Rising costs of energy consumption and an ongoing effort for increases in computing performance are leading to a significant need for energy-efficient computing. Before systems such as supercomputers, servers, and datacenters can begin operating in an energy-efficient manner, the energy consumption and performance characteristics of the system must be analyzed. In this paper, we provide an analysis framework that will allow a system administrator to investigate the tradeoffs between system energy consumption and utility earned by a system (as a measure of system performance). We model these trade-offs as a bi-objective resource allocation problem. We use a popular multi-objective genetic algorithm to construct Pareto fronts to illustrate how different resource allocations can cause a system to consume significantly different amounts of energy and earn different amounts of utility. We demonstrate our analysis framework using real data collected from online benchmarks, and further provide a method to create larger data sets that exhibit similar heterogeneity characteristics to real data sets. This analysis framework can provide system administrators with insight to make intelligent scheduling decisions based on the energy and utility needs of their systems.

Friese, Ryan [Colorado State University, Fort Collins; Khemka, Bhavesh [Colorado State University, Fort Collins; Maciejewski, Anthony A [Colorado State University, Fort Collins; Siegel, Howard Jay [Colorado State University, Fort Collins; Koenig, Gregory A [ORNL; Powers, Sarah S [ORNL; Hilton, Marcia M [ORNL; Rambharos, Rajendra [ORNL; Okonski, Gene D [ORNL; Poole, Stephen W [ORNL

2013-01-01T23:59:59.000Z

93

Energy star product specification development framework: Using data and analysis to make program decisions  

SciTech Connect

The Product Development Team (PD) in the US Environmental Protection Agency's ENERGY STAR Labeling Program fuels the long-term market transformation process by delivering new specifications. PD's goal is to expand the reach and visibility of ENERGY STAR as well as the market for new energy-efficient products. Since 2000, PD has launched nine new ENERGY STAR specifications and continues to evaluate new program opportunities. To evaluate the ENERGY STAR carbon savings potential for a diverse group of products, PD prepared a framework for developing new and updating existing specifications that rationalizes new product opportunities and draws upon the expertise and resources of other stakeholders, including manufacturers, utilities, environmental groups and other government agencies. By systematically reviewing the potential of proposed product areas, PD makes informed decisions as to whether or not to proceed with developing a specification. In support of this strategy, PD ensures that new product specifications are consistent with the ENERGY STAR guidelines and that these guidelines are effectively communicated to stakeholders during the product development process. To date, the framework has been successful in providing consistent guidance on collecting the necessary information on which to base sound program decisions. Through the application of this framework, PD increasingly recognizes that each industry has unique market and product characteristics that can require reconciliation with the ENERGY STAR guidelines. The new framework allows PD to identify where reconciliation is needed to justify program decisions.

McWhinney, Marla; Fanara, Andrew; Clark, Robin; Hershberg, Craig; Schmeltz, Rachel; Roberson, Judy

2003-09-12T23:59:59.000Z

94

Invariance via group-integration: a feature framework for 3D biomedical image analysis  

Science Conference Proceedings (OSTI)

One very generic approach towards the construction of features achieves invariance against a certain transformation via integration over the respective mathematical group. In this paper we present a general framework for invariant feature design via ... Keywords: classification, group-integration, invariant features, landmark-detection, segmentation

J. Fehr; O. Ronneberger; J. Schulz; T. Schmidt; M. Reisert; H. Burkhardt

2008-02-01T23:59:59.000Z

95

A Novel Gain Time Reclaiming Framework Integrating WCET Analysis for Object-Oriented Real-Time Systems  

E-Print Network (OSTI)

This paper proposes a novel gain time reclaiming framework integrating WCET analysis for objectoriented real-time systems in order to provide greater flexibility and without loss of the predictability and e#- ciency of the whole system. In this paper we present an approach which demonstrates how to improve the utilisation and overall performance of the whole system by reclaiming gain time at run-time. Our approach shows that integrating WCET with gain time reclaiming not only can provide a more flexible environment to develop object-oriented real-time applications, but it also does not necessarily result in unsafe or unpredictable timing analysis.

Erik Yu-shing Hu; Andy Wellings; Guillem Bernat

2002-01-01T23:59:59.000Z

96

Energy transition and the macroeconomy: a framework for policy analysis. Final report  

Science Conference Proceedings (OSTI)

The United States is currently undergoing a transition from rapidly depleting, nonrenewable oil and gas to unconventional energy sources. Unlike previous transitions, the current transition will be marked by rising real energy prices and may profoundly affect the economy. This report describes an integrating framework designed to evaluate the effects of depletion and rising energy prices on economic growth, inflation, and other key economic and energy indicators over the time frame 1980 to 2050. The framework provides a general disequilibrium representation of the major linkages between the energy sector and the economy. GNP, consumption, investment, wages and prices, and other major energy and economic aggregates are determined endogenously. Though the framework generates the macroeconomic dynamics of the economy, it is based on an explicitly behavioral theory of economic decision-making at the microeconomic level of individuals and firms. Results show a substantial potential for the first-order effects of depletion (rising capital requirements for energy production, rising real energy prices) to be amplified by feedback mechanisms in the economy, worsening economic performance. Delays in substitution and the development of new energy sources further exacerbate the intermediate term impact of depletion.

Not Available

1981-12-01T23:59:59.000Z

97

A new framework for elimination-based data flow analysis using DJ graphs  

Science Conference Proceedings (OSTI)

Keywords: DJ graphs, Tarjan's interval, exhaustive and incremental data flow analysis, irreducible flowgraphs, reducible flowgraphs

Vugranam C. Sreedhar; Guang R. Gao; Yong-Fong Lee

1998-03-01T23:59:59.000Z

98

A behavioral theory of insider-threat risks: A system dynamics approach  

Science Conference Proceedings (OSTI)

The authors describe a behavioral theory of the dynamics of insider-threat risks. Drawing on data related to information technology security violations and on a case study created to explain the dynamics observed in that data, the authors constructed ... Keywords: Insider threat, behavioral theory, judgment and decision making, policy analysis, risk, security modeling, signal detection theory, system dynamics modeling

Ignacio J. Martinez-Moyano; Eliot Rich; Stephen Conrad; David F. Andersen; Thomas R. Stewart

2008-04-01T23:59:59.000Z

99

A Framework for Risk Analysis for Ecological Restoration Projects in the U.S. Army Corps of Engineers  

SciTech Connect

This report provides a framework for incorporating risk analysis into the six-step planning process for ecosystem restoration projects. This report is part of a larger research and development effort to develop procedures and guidelines for risk analysis in USACE ecosystem restoration planning. The focus is on risk analysis: identifying the range of possible outcomes from alternative ecosystem restoration actions, assessing the potential for achieving the desired outcome, characterizing the likelihood of adverse consequences, and communicating these findings to stakeholders and decision makers. This framework document makes simplifying assumptions to allow a focus on incorporating risk information in the planning and decision-making process. A conceptual model of the site and landscape is advocated as a central organizing structure within the six-step process for ecosystem restoration project planning. This is responsive to USACE directives that restoration projects be conceived in a systems context using an ecosystem and/or watershed approach. The conceptual model delineates the empirical quantities to be addressed in risk analysis and modeling. Although the planning process is described in six distinct steps, in practice these steps are iterative and often carried out simultaneously. Risk analysis within this context has the same character. The approach for incorporating risk analysis into the planning process provides direction intended to help the planner: • Identify the levels of uncertainty that are acceptable, at the start of the planning process. • Use conceptual and numerical models to communicate the planning team’s understanding of the ecosystem to others, and reduce the risk of mis-specifying the system. • Consider the uncertainty associated with the variables chosen to measure project effects. • Use alternative designs to manage identified uncertainty. • Use risk information to eliminate alternatives with unacceptable risk from consideration. • Incorporate risk analysis into the USACE four criteria of effectiveness, efficiency, completeness, and acceptability. • Use an alternative’s irreducible uncertainty as an attribute to be considered along with other attributes in the comparison of alternative plans. • Use risk information in the final plan selection process. There are three other efforts associated with this framework document, which offer information and guidance for incorporating risk analysis into cost-estimation, and biological and hydrologic modeling.

Diefenderfer, Heida L.; Thom, Ronald M.; Hofseth, Keith

2005-01-03T23:59:59.000Z

100

Commercial Aircraft Corporation of China (Comac) attempts to break the Airbus-Boeing duopoly, will it succeed? : an industry analysis framework applied  

E-Print Network (OSTI)

Using an industry analysis framework, this thesis analyzes whether the recently established Commercial Aircraft Corporation of China (Comac) is likely to break the Boeing-Airbus duopoly in the industry of large commercial ...

Fuentes, Jose L., S.M. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Countering the Nuclear Terrorist Threat  

SciTech Connect

The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant psychological consequences. The greatest impact of a small release would probably be economic, associated with cleanup and restoration of the contaminated area. Another category of threat is the attack on a facility, either a power reactor or sabotage of a large radiation source. In general these facilities are hard targets (structurally), and damage and contamination are localized. The final category of threat is the use of radioactive materials to deliver a radiation dose to individuals. This type of attack is again localized and does not readily fall into the category of a weapon of mass destruction.

Vantine, H C

2002-10-04T23:59:59.000Z

102

Decontamination of Biological Threats in Water Supplies  

Science Conference Proceedings (OSTI)

Decontamination of Biological Threats in Water Supplies. ... The availability of safe pure drinking water in the United States is taken for granted. ...

2012-10-01T23:59:59.000Z

103

Incorporation of a risk analysis approach for the nuclear fuel cycle advanced transparency framework.  

SciTech Connect

Proliferation resistance features that reduce the likelihood of diversion of nuclear materials from the civilian nuclear power fuel cycle are critical for a global nuclear future. A framework that monitors process information continuously can demonstrate the ability to resist proliferation by measuring and reducing diversion risk, thus ensuring the legitimate use of the nuclear fuel cycle. The automation of new nuclear facilities requiring minimal manual operation makes this possible by generating instantaneous system state data that can be used to track and measure the status of the process and material at any given time. Sandia National Laboratories (SNL) and the Japan Atomic Energy Agency (JAEA) are working in cooperation to develop an advanced transparency framework capable of assessing diversion risk in support of overall plant transparency. The ''diversion risk'' quantifies the probability and consequence of a host nation diverting nuclear materials from a civilian fuel cycle facility. This document introduces the details of the diversion risk quantification approach to be demonstrated in the fuel handling training model of the MONJU Fast Reactor.

Mendez, Carmen Margarita (Sociotecnia Solutions, LLC); York, David L.; Inoue, Naoko (Japan Atomic Energy Agency); Kitabata, Takuya (Japan Atomic Energy Agency); Vugrin, Eric D.; Vugrin, Kay White; Rochau, Gary Eugene; Cleary, Virginia D.

2007-05-01T23:59:59.000Z

104

Bio-PEPA: A framework for the modelling and analysis of biological systems  

Science Conference Proceedings (OSTI)

In this work we present Bio-PEPA, a process algebra for the modelling and the analysis of biochemical networks. It is a modification of PEPA, originally defined for the performance analysis of computer systems, in order to handle some features of biological ... Keywords: Analysis, Biochemical networks, Modelling, Process algebras

Federica Ciocchetta; Jane Hillston

2009-08-01T23:59:59.000Z

105

Systems analysis of past, present, and future chemical terrorism scenarios.  

Science Conference Proceedings (OSTI)

Throughout history, as new chemical threats arose, strategies for the defense against chemical attacks have also evolved. As a part of an Early Career Laboratory Directed Research and Development project, a systems analysis of past, present, and future chemical terrorism scenarios was performed to understand how the chemical threats and attack strategies change over time. For the analysis, the difficulty in executing chemical attack was evaluated within a framework of three major scenario elements. First, historical examples of chemical terrorism were examined to determine how the use of chemical threats, versus other weapons, contributed to the successful execution of the attack. Using the same framework, the future of chemical terrorism was assessed with respect to the impact of globalization and new technologies. Finally, the efficacy of the current defenses against contemporary chemical terrorism was considered briefly. The results of this analysis justify the need for continued diligence in chemical defense.

Hoette, Trisha Marie

2012-03-01T23:59:59.000Z

106

An Empirical Framework for Large-Scale Policy Analysis, with an Application to School Finance Reform in Michigan  

E-Print Network (OSTI)

In this paper I develop an empirical framework for the analysis of large-scale policies, and apply it to study the effects of Michigan’s 1994 school finance reform on the Detroit metropolitan area. The framework includes estimating a general equilibrium model of multiple jurisdictions with data before the reform, predicting the post-reform equilibrium, and comparing this prediction with postreform data to validate the model. According to my analysis, the Michigan reform had little impact on household demographics or school quality in Detroit. The alternative school funding policies analyzed here do not seem to affect school quality much either. (JEL C52, I22, H73) I thank the Berkman Faculty Development Fund at Carnegie Mellon University for financial support. I also thank Julie Berry Cullen and Susanna Loeb for providing me with data on pass rates for Michigan. Mary Ann Cleary, Jeff Guilfoyle, Andrew Lockwood, and Glenda Rader from the government of the state of Michigan answered many of my questions on Proposal A. I am indebted to Dennis Epple, George-Levy Gayle, Holger Sieg, and Fallaw Sowell for valuable conversations, and to participants at the 2004 summer workshop at the Federal Reserve of Cleveland for comments on an

Maria Marta Ferreyra

2009-01-01T23:59:59.000Z

107

nAIT: A source analysis and instrumentation framework for nesC  

Science Conference Proceedings (OSTI)

Automated software engineering methods support the construction, maintenance, and analysis of both new and legacy systems. Their application is commonplace in desktop- and enterprise-class systems due to the productivity and reliability benefits they ... Keywords: Instrumentation, Static analysis, Wireless sensor networks, nesC

Andrew R. Dalton; Jason O. Hallstrom

2009-07-01T23:59:59.000Z

108

EM threat analysis for wireless systems.  

SciTech Connect

Modern digital radio systems are complex and must be carefully designed, especially when expected to operate in harsh propagation environments. The ability to accurately predict the effects of propagation on wireless radio performance could lead to more efficient radio designs as well as the ability to perform vulnerability analyses before and after system deployment. In this report, the authors--experts in electromagnetic (EM) modeling and wireless communication theory--describe the construction of a simulation environment that is capable of quantifying the effects of wireless propagation on the performance of digital communication.

Burkholder, R. J. (Ohio State University Electroscience Laboratory); Mariano, Robert J.; Schniter, P. (Ohio State University Electroscience Laboratory); Gupta, I. J. (Ohio State University Electroscience Laboratory)

2006-06-01T23:59:59.000Z

109

Analysis of Agricultural Greenhouse Gas Mitigation Options within a Multi-sector Economic Framework  

DOE Green Energy (OSTI)

National-scale analysis of greenhouse gas mitigation options is generally carried out using top-down economic models with moderate energy detail but very limited detail in agriculture and forestry. However, a complete analysis of greenhouse gas mitigation options requires an improved representation of agriculture within the top-down economic models used for analysis of climate policy. Greenhouse gas mitigation options within the agricultural sector include changes in afforestation of agricultural lands, crop and livestock management practices, harvesting of biomass crops for fuel, and the sequestration of carbon in agricultural soils. Analysis of such options is usually carried out in a bottom-up model such as the Agricultural Sector Model (ASM). We report on activities to combine the bottom-up agricultural detail from ASM with the top-down economic and energy structure used at Pacific Northwest National Laboratory (PNNL), which has been used extensively for analysis of alternative carbon mitigation strategies.

Sands, Ronald D.; Mccarl, Bruce A.; Gillig, Dhazn; Blanford, Geoffrey J.; Gale, J.; Kaya, Y.

2003-01-01T23:59:59.000Z

110

Design Basis Threat | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Design Basis Threat | National Nuclear Security Administration Design Basis Threat | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Design Basis Threat Home > About Us > Our Programs > Nuclear Security > Design Basis Threat Design Basis Threat NNSA has taken aggressive action to improve the security of its nuclear weapons material (often referred to as special nuclear material, or SNM)

111

IBRD Operational Decision Framework  

SciTech Connect

The IBRD Operational Decision Framework in this document is an expansion of an emerging general risk management framework under development by an interagency working group. It provides the level of detail necessary to develop a general Consequence Management Guidance Document for biological contamination remediation and restoration. It is the intent of this document to support both wide area and individual site remediation and restoration activities. This product was initiated as a portion of the IBRD Task 1 Systems Analysis to aid in identification of wide area remediation and restoration shortcomings and gaps. The draft interagency general risk management framework was used as the basis for the analysis. The initial Task 1 analysis document expanded the draft interagency framework to a higher level of resolution, building on both the logic structure and the accompanying text explanations. It was then employed in a qualitative manner to identify responsible agencies, data requirements, tool requirements, and current capabilities for each decision and task. This resulted in identifying shortcomings and gaps needing resolution. Several meetings of a joint LLNL/SNL working group reviewed and approved the initial content of this analysis. At the conclusion of Task 1, work continued on the expanded framework to generate this Operational Decision Framework which is consistent with the existing interagency general risk management framework. A large LLNL task group met repeatedly over a three-month period to develop the expanded framework, coordinate the framework with the biological remediation checklist, and synchronize the logic with the Consequence Management Plan table of contents. The expanded framework was briefed at a large table top exercise reviewing the interagency risk management framework. This exercise had representation from major US metropolitan areas as well as national agencies. This product received positive comments from the participants. Upon completion of the Operational Decision Framework, another joint LLNL/SNL working group conducted a day-long review. Identified modifications were made to the document, resulting in the included product.

Greenwalt, R; Hibbard, W; Raber, E; Carlsen, T; Folks, K; MacQueen, D; Mancieri, S; Bunt, T; Richards, J; Hirabayashi-Dethier, J

2010-11-12T23:59:59.000Z

112

Energy and Greenhouse Gas Impacts of Biofuels: A Framework for Analysis  

E-Print Network (OSTI)

Greenhouse Gas Impacts of Biofuels Wang, M. (2001) "Energy & Greenhouse Gas Impacts of Biofuels Fuels and MotorLifecycle Analysis of Biofuels." Report UCD-ITS-RR-06-08.

Kammen, Daniel M.; Farrell, Alexander E; Plevin, Richard J; Jones, Andrew; Nemet, Gregory F; Delucchi, Mark

2008-01-01T23:59:59.000Z

113

Evaluating energy and non-energy impacts of energy conservation programs: A supply curve framework of analysis  

Science Conference Proceedings (OSTI)

Historically, the evaluation of energy conservation programs has focused primarily on energy savings and costs. The recent, increased interest in global environmental problems (e.g., acid rain, ozone depletion, and the greenhouse effect), has made decision makers, as well as program evaluators, sensitive to the environmental impacts of all programs, including energy conservation programs. Economic impacts of programs remain important policy concerns. Many state and local jurisdictions are concerned with the net effects of energy policies on economic growth, jobs, and tax revenues, as well as the impacts of growth and development on local energy issues (e.g., construction of new power plants). Consequently, policy makers need a methodology to compare easily the energy and non-energy impacts of a specific program in a consistent way, for both retrospective analysis and for prospective planning. We present the general concepts of a proposed new approach to multi-attribute analysis, as an extension of the concept of ''supply curves of conserved energy.'' In their simplest form, energy conservation supply curves rank and display the savings from conservation measures in order of their cost-effectiveness. This simple concept is extended to reflect multiple decision criteria and some important linkages between energy and non-energy policy decisions (e.g., a ''supply curve of reduced carbon emissions, ''or a ''supply curve of net local job-creation''). The framework is flexible enough, so that policy makers can weigh and compare each of the impacts to reflect their concerns, and see the results in terms of program rankings. The advantages of this analysis framework are that it is simple to use, flexible, and replicable. 15 refs., 6 figs.

Vine, E.; Harris, J.

1989-06-01T23:59:59.000Z

114

Cybersecurity Framework  

Science Conference Proceedings (OSTI)

... the Executive Order “Improving Critical Infrastructure Cybersecurity” has directed NIST to work with stakeholders to develop a voluntary framework ...

2013-08-30T23:59:59.000Z

115

Cascaded refactoring for framework  

Science Conference Proceedings (OSTI)

Refactoring of source code has been studied as a preliminary step in the evolution of object-oriented software. We extend the concept of refactoring to the whole range of models used to describe a framework in our methodology: feature model, use case ... Keywords: architecture, design pattern, domain analysis, evolution, feature model, framework, hotspot, refactoring, role, use case

Greg Butler; Lugang Xu

2001-05-01T23:59:59.000Z

116

A distributed data-parallel framework for analysis and visualization algorithm development  

Science Conference Proceedings (OSTI)

The coming generation of supercomputing architectures will require fundamental changes in programming models to effectively make use of the expected million to billion way concurrency and thousand-fold reduction in per-core memory. Most current parallel ... Keywords: GPGPU, analysis, visualization

Jeremy S. Meredith; Robert Sisneros; David Pugmire; Sean Ahern

2012-03-01T23:59:59.000Z

117

Manager, International Chemical Threat Reduction Department, Sandia  

NLE Websites -- All DOE Office Websites (Extended Search)

International Chemical Threat Reduction Department, Sandia International Chemical Threat Reduction Department, Sandia National Laboratories | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Nancy Jackson Manager, International Chemical Threat Reduction Department, Sandia National Laboratories

118

Manager, International Chemical Threat Reduction Department, Sandia  

National Nuclear Security Administration (NNSA)

International Chemical Threat Reduction Department, Sandia International Chemical Threat Reduction Department, Sandia National Laboratories | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Nancy Jackson Manager, International Chemical Threat Reduction Department, Sandia National Laboratories

119

THE BIOTERRORISM THREAT: TECHNOLOGICAL AND POLITICAL CONSIDERATIONS  

SciTech Connect

Bioterrorism--along with biowarfare, from which it may not always be distinguishable in practice--will be a feature of the strategic landscape in the 21st century and is high on the US national security agenda. Bioterrorism poses a potential threat to the US population, agriculture, interests, friends and allies, and military forces (asymmetric threats). Yet these possibilities have not been widely pursued or realized by terrorists. The perceived threat is far worse than anything experienced to date, and is largely technologically driven.

J. F. PILAT

2000-03-01T23:59:59.000Z

120

The rise of "china threat" arguments  

E-Print Network (OSTI)

The study seeks to explain the rise of "China threat" arguments in the United States and Japan in the 1990s by using three theories of states behavior- realism, organization theory, and democratic peace theory. The rise ...

Ueki, Chikako

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Methodological Framework for Analysis of Buildings-Related Programs: The GPRA Metrics Effort  

SciTech Connect

The requirements of the Government Performance and Results Act (GPRA) of 1993 mandate the reporting of outcomes expected to result from programs of the Federal government. The U.S. Department of Energy’s (DOE’s) Office of Energy Efficiency and Renewable Energy (EERE) develops official metrics for its 11 major programs using its Office of Planning, Budget Formulation, and Analysis (OPBFA). OPBFA conducts an annual integrated modeling analysis to produce estimates of the energy, environmental, and financial benefits expected from EERE’s budget request. Two of EERE’s major programs include the Building Technologies Program (BT) and Office of Weatherization and Intergovernmental Program (WIP). Pacific Northwest National Laboratory (PNNL) supports the OPBFA effort by developing the program characterizations and other market information affecting these programs that is necessary to provide input to the EERE integrated modeling analysis. Throughout the report we refer to these programs as “buildings-related” programs, because the approach is not limited in application to BT or WIP. To adequately support OPBFA in the development of official GPRA metrics, PNNL communicates with the various activities and projects in BT and WIP to determine how best to characterize their activities planned for the upcoming budget request. PNNL then analyzes these projects to determine what the results of the characterizations would imply for energy markets, technology markets, and consumer behavior. This is accomplished by developing nonintegrated estimates of energy, environmental, and financial benefits (i.e., outcomes) of the technologies and practices expected to result from the budget request. These characterizations and nonintegrated modeling results are provided to OPBFA as inputs to the official benefits estimates developed for the Federal Budget. This report documents the approach and methodology used to estimate future energy, environmental, and financial benefits produced by technologies and practices supported by BT and by WIP. However, the approach is general enough for analysis of buildings-related technologies, independent of any specific program. An overview describes the GPRA process and the models used to estimate energy savings. The body of the document describes the algorithms used and the diffusion curve estimates.

Elliott, Douglas B.; Anderson, Dave M.; Belzer, David B.; Cort, Katherine A.; Dirks, James A.; Hostick, Donna J.

2004-06-18T23:59:59.000Z

122

Microsoft Word - Categorizing Threat Oct10-final.doc  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

threats, all in an unclassified venue for use by critical infrastructure providers and utility owners. One of the primary activities necessary to move classified threat information...

123

Bio-Terrorism Threat and Casualty Prevention  

SciTech Connect

The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

NOEL,WILLIAM P.

2000-01-01T23:59:59.000Z

124

FRamework Assessing Notorious Contributing Influences for Error (FRANCIE): Perspective on Taxonomy Development to Support Error Reporting and Analysis  

Science Conference Proceedings (OSTI)

Beginning in the 1980s a primary focus of human reliability analysis was estimation of human error probabilities. However, detailed qualitative modeling with comprehensive representation of contextual variables often was lacking. This was likely due to the lack of comprehensive error and performance shaping factor taxonomies, and the limited data available on observed error rates and their relationship to specific contextual variables. In the mid 90s Boeing, America West Airlines, NASA Ames Research Center and INEEL partnered in a NASA sponsored Advanced Concepts grant to: assess the state of the art in human error analysis, identify future needs for human error analysis, and develop an approach addressing these needs. Identified needs included the need for a method to identify and prioritize task and contextual characteristics affecting human reliability. Other needs identified included developing comprehensive taxonomies to support detailed qualitative modeling and to structure meaningful data collection efforts across domains. A result was the development of the FRamework Assessing Notorious Contributing Influences for Error (FRANCIE) with a taxonomy for airline maintenance tasks. The assignment of performance shaping factors to generic errors by experts proved to be valuable to qualitative modeling. Performance shaping factors and error types from such detailed approaches can be used to structure error reporting schemes. In a recent NASA Advanced Human Support Technology grant FRANCIE was refined, and two new taxonomies for use on space missions were developed. The development, sharing, and use of error taxonomies, and the refinement of approaches for increased fidelity of qualitative modeling is offered as a means to help direct useful data collection strategies.

Lon N. Haney; David I. Gertman

2003-04-01T23:59:59.000Z

125

Left-Wing Extremism: The Current Threat  

SciTech Connect

Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

Karl A. Seger

2001-04-30T23:59:59.000Z

126

Bio-Terrorism Threat and Casualty Prevention  

SciTech Connect

The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

NOEL,WILLIAM P.

2000-01-01T23:59:59.000Z

127

Anomaly metrics to differentiate threat sources from benign sources in primary vehicle screening.  

SciTech Connect

Discrimination of benign sources from threat sources at Port of Entries (POE) is of a great importance in efficient screening of cargo and vehicles using Radiation Portal Monitors (RPM). Currently RPM's ability to distinguish these radiological sources is seriously hampered by the energy resolution of the deployed RPMs. As naturally occurring radioactive materials (NORM) are ubiquitous in commerce, false alarms are problematic as they require additional resources in secondary inspection in addition to impacts on commerce. To increase the sensitivity of such detection systems without increasing false alarm rates, alarm metrics need to incorporate the ability to distinguish benign and threat sources. Principal component analysis (PCA) and clustering technique were implemented in the present study. Such techniques were investigated for their potential to lower false alarm rates and/or increase sensitivity to weaker threat sources without loss of specificity. Results of the investigation demonstrated improved sensitivity and specificity in discriminating benign sources from threat sources.

Cohen, Israel Dov; Mengesha, Wondwosen

2011-09-01T23:59:59.000Z

128

A resilience assessment framework for infrastructure and economic systems : quantitative and qualitative resilience analysis of petrochemical supply chains to a hurricane.  

SciTech Connect

In recent years, the nation has recognized that critical infrastructure protection should consider not only the prevention of disruptive events, but also the processes that infrastructure systems undergo to maintain functionality following disruptions. This more comprehensive approach has been termed critical infrastructure resilience (CIR). Given the occurrence of a particular disruptive event, the resilience of a system to that event is the system's ability to efficiently reduce both the magnitude and duration of the deviation from targeted system performance levels. Sandia National Laboratories (Sandia) has developed a comprehensive resilience assessment framework for evaluating the resilience of infrastructure and economic systems. The framework includes a quantitative methodology that measures resilience costs that result from a disruption to infrastructure function. The framework also includes a qualitative analysis methodology that assesses system characteristics that affect resilience in order to provide insight and direction for potential improvements to resilience. This paper describes the resilience assessment framework. This paper further demonstrates the utility of the assessment framework through application to a hypothetical scenario involving the disruption of a petrochemical supply chain by a hurricane.

Ehlen, Mark Andrew; Vugrin, Eric D.; Warren, Drake E.

2010-03-01T23:59:59.000Z

129

Threat Mitigation: The Asteroid Tugboat  

E-Print Network (OSTI)

The Asteroid Tugboat (AT) is a fully controlled asteroid deflection concept using a robotic spacecraft powered by a high efficiency, electric propulsion system (ion or plasma) which docks with and attaches to the asteroid, conducts preliminary operations, and then thrusts continuously parallel to the asteroid velocity vector until the desired velocity change is achieved. Based on early warning, provided by ground tracking and orbit prediction, it would be deployed a decade or more prior to a potential impact. On completion of the initial rendezvous with the near-Earth object (NEO) the AT would first reduce the uncertainty in the orbit of the asteroid via Earth tracking of its radio transponder while it is station keeping with the asteroid. If on analysis of tracking data a deflection is required the AT would execute a reconnaissance phase collecting and processing information about the physical characteristics of the asteroid to support subsequent operations. The AT would then dock at the appropriate pole (i....

Schweickart, R; Durda, D; Hut, P; Chapman, Clark; Durda, Dan; Hut, Piet; Schweickart, Russell

2006-01-01T23:59:59.000Z

130

IBM Internet Security Systems Threat Insight Monthly  

E-Print Network (OSTI)

. http://docs.info.apple.com/article.html?artnum=303411 BEA Systems - 2007 Daylight Savings Time ChangesIBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net February 2007 Shellcode Heuristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 The 2007 Daylight

131

Insider Threat - Material Control and Accountability Mitigation  

Science Conference Proceedings (OSTI)

The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur by an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with compensating mitigation can decrease the risk of an insider performing a malicious act without detection.

Powell, Danny H [ORNL; Elwood Jr, Robert H [ORNL; Roche, Charles T [ORNL

2011-01-01T23:59:59.000Z

132

Review and analysis of the adequacy of the legal and institutional framework for geothermal development in Washington State  

DOE Green Energy (OSTI)

The legal and institutional framework within which geothermal energy must develop has its origin in the early 1970s. In 1970, the Federal Geothermal Steam Act was passed into law and in 1974 the Washington State Geothermal Act was passed. The legal and institutional framework thus established by the state and federal governments differed substantially in format, content, and direction. In many instances, the legal and institutional framework established left as many questions unanswered as answered, and in some cases, the framework has proven to be more of an obstacle to development than an aid. From an examination of how the state and federal governments have addressed the varying needs of geothermal development and how the courts have interpreted some of their decisions, it is clear that in order to ensure that the legal and institutional framework is adequate to serve the needs of geothermal development, it must address, at a minimum, the following topics: (1) providing developers with access and a priority right to carry out exploration and development activities; (2) characterization of the resource so as to minimize conflicts with other natural resources; (3) establishing ownership; and (4) giving careful consideration to such lease terms as rentals and royalties, lease renewals, and diligence requirements. In addition, the framework must address groundwater law and its implications for geothermal development and how geothermal development will be considered in terms of establishing utility law. At the local level, it is imperative that geothermal be given careful consideration when decisions on resource management, zoning, and regulation are made. Local governments also have the power to establish programs which can provide substantial incentives for geothermal development and, by so doing, ensure that geothermal energy contributes to economic stability and growth.

Bloomquist, R.G.

1985-12-01T23:59:59.000Z

133

EPR Severe Accident Threats and Mitigation  

SciTech Connect

Despite the extremely low EPR core melt frequency, an improved defence-in-depth approach is applied in order to comply with the EPR safety target: no stringent countermeasures should be necessary outside the immediate plant vicinity like evacuation, relocation or food control other than the first harvest in case of a severe accident. Design provisions eliminate energetic events and maintain the containment integrity and leak-tightness during the entire course of the accident. Based on scenarios that cover a broad range of physical phenomena and which provide a sound envelope of boundary conditions associated with each containment challenge, a selection of representative loads has been done, for which mitigation measures have to cope with. This paper presents the main critical threats and the approach used to mitigate those threats. (authors)

Azarian, G. [Framatome ANP SAS, Tour Areva, Place de la Coupole 92084 Paris la Defense (France); Kursawe, H.M.; Nie, M.; Fischer, M.; Eyink, J. [Framatome ANP GmbH, Freyeslebenstrasse, 1, D-91058 Erlangen (Germany); Stoudt, R.H. [Framatome ANP Inc. - 3315 Old Forest Rd, Lynchburgh, VA 24501 (United States)

2004-07-01T23:59:59.000Z

134

Nonproliferation, Nuclear Security, and the Insider Threat  

SciTech Connect

Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

Balatsky, Galya I. [Los Alamos National Laboratory; Duggan, Ruth [SNL

2012-07-12T23:59:59.000Z

135

NIST Official Testifies on Threat Detection Science for National ...  

Science Conference Proceedings (OSTI)

NIST Official Testifies on Threat Detection Science for National Security. From NIST Tech Beat: July 25, 2012. ...

2012-07-25T23:59:59.000Z

136

GTRI: Reducing Nuclear Threats | National Nuclear Security Administrat...  

NLE Websites -- All DOE Office Websites (Extended Search)

Reducing Nuclear Threats | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

137

Office of Global Threat Reduction | National Nuclear Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Threat Reduction | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

138

The Cyber Threat to National Critical Infrastructures: Beyond Theory  

Science Conference Proceedings (OSTI)

Adversary threats to critical infrastructures have always existed during times of conflict, but threat scenarios now include peacetime attacks from anonymous computer hackers. Current events, including examples from Israel and Estonia, prove that a certain ... Keywords: Estonia, business continuity and disaster recover planning, critical, cyber, infrastructure, security architecture and design, telecommunications and network security threat

Kenneth Geers

2009-01-01T23:59:59.000Z

139

Crypto Key Management Framework  

Science Conference Proceedings (OSTI)

... A Framework for Designing Cryptographic Key Management Systems ... A Framework for Designing Cryptographic Key Management Systems ...

2013-08-13T23:59:59.000Z

140

The Atlantic Forest of South America: Biodiversity Status, Threats, and Outlook  

E-Print Network (OSTI)

Status, Threats, and Outlook By Carlos Galindo-Leal andStatus, Threats, and Outlook. (Center for Appliedstatus, threats, and outlook. The book begins with a

Sayre, Don

2003-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Modeling threat assessments of water supply systems using markov latent effects methodology.  

SciTech Connect

Recent amendments to the Safe Drinking Water Act emphasize efforts toward safeguarding our nation's water supplies against attack and contamination. Specifically, the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 established requirements for each community water system serving more than 3300 people to conduct an assessment of the vulnerability of its system to a terrorist attack or other intentional acts. Integral to evaluating system vulnerability is the threat assessment, which is the process by which the credibility of a threat is quantified. Unfortunately, full probabilistic assessment is generally not feasible, as there is insufficient experience and/or data to quantify the associated probabilities. For this reason, an alternative approach is proposed based on Markov Latent Effects (MLE) modeling, which provides a framework for quantifying imprecise subjective metrics through possibilistic or fuzzy mathematics. Here, an MLE model for water systems is developed and demonstrated to determine threat assessments for different scenarios identified by the assailant, asset, and means. Scenario assailants include terrorists, insiders, and vandals. Assets include a water treatment plant, water storage tank, node, pipeline, well, and a pump station. Means used in attacks include contamination (onsite chemicals, biological and chemical), explosives and vandalism. Results demonstrated highest threats are vandalism events and least likely events are those performed by a terrorist.

Silva, Consuelo Juanita

2006-12-01T23:59:59.000Z

142

Office of Nuclear Threat Science | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Threat Science | National Nuclear Security Administration Nuclear Threat Science | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Office of Nuclear Threat Science Home > About Us > Our Programs > Counterterrorism and Counterproliferation > Office of Nuclear Threat Science Office of Nuclear Threat Science

143

Office of Nuclear Threat Science | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Threat Science | National Nuclear Security Administration Threat Science | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Office of Nuclear Threat Science Home > About Us > Our Programs > Counterterrorism and Counterproliferation > Office of Nuclear Threat Science Office of Nuclear Threat Science

144

NNSA Launches Global Threat Reduction Initiative | National Nuclear  

National Nuclear Security Administration (NNSA)

Global Threat Reduction Initiative | National Nuclear Global Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > NNSA Launches Global Threat Reduction Initiative NNSA Launches Global Threat Reduction Initiative May 26, 2004 Vienna, Austria NNSA Launches Global Threat Reduction Initiative

145

NNSA Launches Global Threat Reduction Initiative | National Nuclear  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Threat Reduction Initiative | National Nuclear Global Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > NNSA Launches Global Threat Reduction Initiative NNSA Launches Global Threat Reduction Initiative May 26, 2004 Vienna, Austria NNSA Launches Global Threat Reduction Initiative

146

RunMC - an object-oriented analysis framework for Monte Carlo simulation of high-energy particle collisions  

E-Print Network (OSTI)

RunMC is an object-oriented framework aimed to generate and to analyse high-energy collisions of elementary particles using Monte Carlo simulations. This package, being based on C++ adopted by CERN as the main programming language for the LHC experiments, provides a common interface to different Monte Carlo models using modern physics libraries. Physics calculations (projects) can easily be loaded and saved as external modules. This simplifies the development of complicated calculations for high energy physics in large collaborations.This desktop program is open-source licensed and is available on the LINUX and Windows/Cygwin platforms.

S. Chekanov

2004-11-05T23:59:59.000Z

147

General pattern of global system conflicts and global threats of the 21st century  

Science Conference Proceedings (OSTI)

Data on global conflicts took place from 750 B.C. up to now are analyzed and their general pattern is revealed. An attempt is made to foresee the next global conflict called the conflict of the 21st century. Its nature and main characteristics are analyzed. ... Keywords: Fibonacci sequence, cluster analysis, global system conflicts, global threats, scenarios

M. Z. Zgurovsky

2007-09-01T23:59:59.000Z

148

IRF: Information Retrieval Framework  

Science Conference Proceedings (OSTI)

is a freely available object-oriented framework for information retrieval (IR) applications. A framework is software which ...

149

JM to Develop DOE O 470.X, Insider Threat Program  

Directives, Delegations, and Requirements

The Order establishes top-level responsibilities and requirements for DOE's Insider Threat Program, which is intended to deter, detect, and mitigate insider ...

2013-10-17T23:59:59.000Z

150

Before the House Subcommittee on Emerging Threats, Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee...

151

Insider Threat to Nuclear and Radiological Materials: Fact Sheet...  

NLE Websites -- All DOE Office Websites (Extended Search)

Insider Threat to Nuclear and Radiological Materials: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the...

152

Responding to WMD Terrorism Threats: The Role of Insurance Markets  

E-Print Network (OSTI)

Threat: Lessons From Nuclear Reactor Accidents A nuclearbomb. 2) An attack on a nuclear reactor, also with the goalHowever, approximately 443 nuclear reactors exist worldwide,

Jaffee, Dwight M.; Russell, Thomas

2007-01-01T23:59:59.000Z

153

BioLattice: A framework for the biological interpretation of microarray gene expression data using concept lattice analysis  

Science Conference Proceedings (OSTI)

Motivation: A challenge in microarray data analysis is to interpret observed changes in terms of biological properties and relationships. One powerful approach is to make associations of gene expression clusters with biomedical ontologies and/or biological ... Keywords: Clustering, Concept analysis, Concept lattice, DNA microarray, Gene expression

Jihun Kim; Hee-Joon Chung; Yong Jung; Kack-Kyun Kim; Ju Han Kim

2008-04-01T23:59:59.000Z

154

Detection and Analysis of Threatsto the Energy Sector (DATES) May 2008  

Energy.gov (U.S. Department of Energy (DOE))

A groundbreaking integrated capability in intrusion detection, security event management, and sector-wide threat analysis.

155

Conceptual Framework and Levels of Abstraction for a Complex Large-Scale System  

SciTech Connect

A conceptual framework and levels of abstraction are created to apply across all potential threats. Bioterrorism is used as a complex example to describe the general framework. Bioterrorism is unlimited with respect to the use of a specific agent, mode of dissemination, and potential target. Because the threat is open-ended, there is a strong need for a common, systemic understanding of attack scenarios related to bioterrorism. In recognition of this large-scale complex problem, systems are being created to define, design and use the proper level of abstraction and conceptual framework in bioterrorism. The wide variety of biological agents and delivery mechanisms provide an opportunity for dynamic scale changes by the linking or interlinking of existing threat components. Concurrent impacts must be separated and evaluated in terms of a given environment and/or ‘abstraction framework

Simpson, Mary J.

2005-03-23T23:59:59.000Z

156

SWN Nets as a Framework for the Specification and the Analysis of FT Techniques Adopted in Electric Plant Automation  

Science Conference Proceedings (OSTI)

The use of formal methods for specification and analysis of dependable systems is considered a promising opportunity to support the evaluation of critical issues since the early design phases. Stochastic Petri nets can play an important role not only ...

Lorenzo Capra; Rossano Gaeta; Oliver Botti

1999-06-01T23:59:59.000Z

157

DAKOTA : a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis.  

SciTech Connect

The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic expansion methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a theoretical manual for selected algorithms implemented within the DAKOTA software. It is not intended as a comprehensive theoretical treatment, since a number of existing texts cover general optimization theory, statistical analysis, and other introductory topics. Rather, this manual is intended to summarize a set of DAKOTA-related research publications in the areas of surrogate-based optimization, uncertainty quantification, and optimization under uncertainty that provide the foundation for many of DAKOTA's iterative analysis capabilities.

Eldred, Michael Scott; Vigil, Dena M.; Dalbey, Keith R.; Bohnhoff, William J.; Adams, Brian M.; Swiler, Laura Painton; Lefantzi, Sophia (Sandia National Laboratories, Livermore, CA); Hough, Patricia Diane (Sandia National Laboratories, Livermore, CA); Eddy, John P.

2011-12-01T23:59:59.000Z

158

Sensor Data Processing for Tracking Underwater Threats Using Terascale Optical Core Devices  

SciTech Connect

A critical aspect of littoral surveillance (including port protection) involves the localization and tracking of underwater threats such as manned or unmanned autonomous underwater vehicles. In this article, we present a methodology for locating underwater threat sources from uncertain sensor network data, and illustrate the threat tracking aspects using active sonars in a matched filter framework. The novelty of the latter paradigm lies in its implementation on a tera-scale optical core processor, EnLight , recently introduced by Lenslet Laboratories. This processor is optimized for array operations, which it performs in a fixed point arithmetic architecture at tera-scale throughput. Using the EnLight 64 prototype processor, our results (i) illustrate the ability to reach a robust tracking accuracy, and (ii) demonstrate that a considerable speed-up (a factor of over 13,000) can be achieved when compared to an Intel XeonTM processor in the computation of sets of 80K-sample complex Fourier transforms that are associated with our matched filter techniques.

Barhen, Jacob [ORNL; Imam, Neena [ORNL

2009-01-01T23:59:59.000Z

159

Using Author Topic to detect insider threats from email traffic  

Science Conference Proceedings (OSTI)

One means of preventing insider theft is by stopping potential insiders from becoming actual thieves. This article discusses an approach to assist managers in identifying potential insider threats. By using the Author Topic [Rosen-Zvi Michal, Griffiths ... Keywords: Author Topic (AT), Datamining, Insider threat, Large data set, Social networks

James S. Okolica; Gilbert L. Peterson; Robert F. Mills

2007-09-01T23:59:59.000Z

160

Before the House Subcommittee on Emerging Threats, Cyber Security and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Emerging Threats, Cyber Security Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability 7-21-09_Final_Testimony_Hoffman.pdf More Documents & Publications Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Before the House Science and Technology Subcommittee on Energy and

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Global Threat Reduction Initiative | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Threat Reduction Global Threat Reduction ... Global Threat Reduction Initiative The Global Threat Reduction Initiative's Alarm Response Training provides training in the area of response for radiological events and provides an opportunity for the security forces, health and safety personnel, and other responsible parties such as the supporting local law enforcement to develop, discuss, and exercise their own tactics, techniques, procedures, and protocols when responding to a theft and/or sabotage event involving radioactive materials of significance. This voluntary program is free, and all expenses (travel, meals, etc.), other than the trainee's training time, will be paid by the GTRI Domestic Threat Reduction Program. Facilities participating in the Domestic Security Program are scheduled for

162

GTRI: Reducing Nuclear Threats | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Reducing Nuclear Threats | National Nuclear Security Administration Reducing Nuclear Threats | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > GTRI: Reducing Nuclear Threats Fact Sheet GTRI: Reducing Nuclear Threats Apr 12, 2013 Mission In 2004, NNSA established the Global Threat Reduction Initiative (GTRI) in the Office of Defense Nuclear Nonproliferation to, as quickly as possible,

163

Nuclear Radiological Threat Task Force Established | National Nuclear  

NLE Websites -- All DOE Office Websites (Extended Search)

Radiological Threat Task Force Established | National Nuclear Radiological Threat Task Force Established | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > Nuclear Radiological Threat Task Force Established Nuclear Radiological Threat Task Force Established November 03, 2003 Washington, DC Nuclear Radiological Threat Task Force Established

164

Framework for creating large-scale content-based image retrieval system (cbir) for solar data analysis  

Science Conference Proceedings (OSTI)

With the launch of NASA's Solar Dynamics Observatory mission, a whole new age of high-quality solar image analysis was started. With the generation of over 1.5 Terabytes of solar images, per day, that are ten times higher resolution than high-definition ...

Juan Banda / Rafal A. Angryk

2011-01-01T23:59:59.000Z

165

An integrative approach to requirements analysis: How task models support requirements reuse in a user-centric design framework  

Science Conference Proceedings (OSTI)

Many software systems fail to address their intended purpose because of a lack of user involvement and requirements deficiencies. This paper discusses the elaboration of a requirements-analysis process that integrates a critical-parameter-based approach ... Keywords: Critical parameters, Requirements engineering, Reuse, Task modeling

Cyril Montabert; D. Scott McCrickard; Woodrow W. Winchester; Manuel A. Pérez-Quiñones

2009-08-01T23:59:59.000Z

166

NIST Cybersecurity Framework - DRAFT Framework Glossary  

Science Conference Proceedings (OSTI)

DRAFT - Framework Glossary Term Draft Definition Category The logical subdivision of a function; one or more categories comprise a function. ...

2013-06-28T23:59:59.000Z

167

A situational awareness framework for securing the smart grid using monitoring sensors and threat models  

Science Conference Proceedings (OSTI)

Security, access control and risk mitigation in the smart grid are matters of great impact for this important sector of the critical infrastructure. Situational awareness requires a means of aggregating information and presenting that information in ...

Anastasia Mavridou; Victor Zhou; Jerald Dawkins; Mauricio Papa

2012-08-01T23:59:59.000Z

168

Nuclear Safety Regulatory Framework  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy Department of Energy Nuclear Safety Regulatory Framework DOE's Nuclear Safety Enabling Legislation Regulatory Enforcement & Oversight Regulatory Governance Atomic Energy Act 1946 Atomic Energy Act 1954 Energy Reorganization Act 1974 DOE Act 1977 Authority and responsibility to regulate nuclear safety at DOE facilities 10 CFR 830 10 CFR 835 10 CFR 820 Regulatory Implementation Nuclear Safety Radiological Safety Procedural Rules ISMS-QA; Operating Experience; Metrics and Analysis Cross Cutting DOE Directives & Manuals DOE Standards Central Technical Authorities (CTA) Office of Health, Safety, and Security (HSS) Line Management SSO/ FAC Reps 48 CFR 970 48 CFR 952 Federal Acquisition Regulations External Oversight *Defense Nuclear Facility

169

A framework and review of customer outage costs: Integration and analysis of electric utility outage cost surveys  

Science Conference Proceedings (OSTI)

A clear understanding of the monetary value that customers place on reliability and the factors that give rise to higher and lower values is an essential tool in determining investment in the grid. The recent National Transmission Grid Study recognizes the need for this information as one of growing importance for both public and private decision makers. In response, the U.S. Department of Energy has undertaken this study, as a first step toward addressing the current absence of consistent data needed to support better estimates of the economic value of electricity reliability. Twenty-four studies, conducted by eight electric utilities between 1989 and 2002 representing residential and commercial/industrial (small, medium and large) customer groups, were chosen for analysis. The studies cover virtually all of the Southeast, most of the western United States, including California, rural Washington and Oregon, and the Midwest south and east of Chicago. All variables were standardized to a consistent metric and dollar amounts were adjusted to the 2002 CPI. The data were then incorporated into a meta-database in which each outage scenario (e.g., the lost of electric service for one hour on a weekday summer afternoon) is treated as an independent case or record both to permit comparisons between outage characteristics and to increase the statistical power of analysis results. Unadjusted average outage costs and Tobit models that estimate customer damage functions are presented. The customer damage functions express customer outage costs for a given outage scenario and customer class as a function of location, time of day, consumption, and business type. One can use the damage functions to calculate outage costs for specific customer types. For example, using the customer damage functions, the cost experienced by an ''average'' customer resulting from a 1 hour summer afternoon outage is estimated to be approximately $3 for a residential customer, $1,200 for small-medium commercial and industrial customer, and $82,000 for large commercial and industrial customer. Future work to improve the quality and coverage of information on the value of electricity reliability to customers is described.

Lawton, Leora; Sullivan, Michael; Van Liere, Kent; Katz, Aaron; Eto, Joseph

2003-11-01T23:59:59.000Z

170

Framework Oriented Approach to Eco-Tourism  

Science Conference Proceedings (OSTI)

This paper discusses an approach for eco-tourism. The paper also addresses the cost-benefit analysis of different parameters which can help in designing a framework. The principles of eco tourism emphasizes on the win-win situation for both the Commercial ... Keywords: Cost-Benefit Analysis, Eco-Tourism, Framework for Eco-Tourism, Green Technology, Stakeholders Issues

Sanjay Mohapatra, Tripti Naswa

2013-01-01T23:59:59.000Z

171

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

172

Insider Threat to Nuclear and Radiological Materials: Fact Sheet | National  

National Nuclear Security Administration (NNSA)

Insider Threat to Nuclear and Radiological Materials: Fact Sheet | National Insider Threat to Nuclear and Radiological Materials: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Insider Threat to Nuclear and Radiological Materials: ... Fact Sheet Insider Threat to Nuclear and Radiological Materials: Fact Sheet

173

NNSA's Global Threat Reduction Initiative Removes More Than One...  

National Nuclear Security Administration (NNSA)

food items and household goods, that was donated to local food banks for direct distribution to those in need in the D.C. area. NNSA's Global Threat Reduction Initiative...

174

The optimization of situational awareness for insider threat detection  

Science Conference Proceedings (OSTI)

In recent years, organizations ranging from defense and other government institutions to commercial enterprises, research labs, etc., have witnessed an increasing amount of sophisticated insider attacks that manage to bypass existing security controls. ... Keywords: data exfiltration, insider threat

Kenneth Brancik; Gabriel Ghinita

2011-02-01T23:59:59.000Z

175

Receiver Operating Characteristic Analysis for Detecting Explosives-related Threats  

SciTech Connect

The Department of Homeland Security (DHS) and the Transportation Security Administration (TSA) are interested in developing a standardized testing procedure for determining the performance of candidate detection systems. This document outlines a potential method for judging detection system performance as well as determining if combining the information from a legacy system with a new system can signi��������cantly improve performance. In this document, performance corresponds to the Neyman-Pearson criterion applied to the Receiver Operating Characteristic (ROC) curves of the detection systems in question. A simulation was developed to investigate how the amount of data provided by the vendor in the form of the ROC curve e�������¤ects the performance of the combined detection system. Furthermore, the simulation also takes into account the potential e�������¤ects of correlation and how this information can also impact the performance of the combined system.

Mark E. Oxley; Alexander M. Venzin

2012-11-14T23:59:59.000Z

176

Watershed Mercury Loading Framework  

Science Conference Proceedings (OSTI)

This report explains and illustrates a simplified stochastic framework, the Watershed Mercury Loading Framework, for organizing and framing site-specific knowledge and information on mercury loading to waterbodies. The framework permits explicit treatment of data uncertainties. This report will be useful to EPRI members, state and federal regulatory agencies, and watershed stakeholders concerned with mercury-related human and ecological health risk.

2003-05-23T23:59:59.000Z

177

Protecting the Nation's Electric Grid from Cyber Threats | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats January 11, 2012 - 11:28am Addthis A smarter, modernized, and more secure grid will be pivotal to the United States’ world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. A smarter, modernized, and more secure grid will be pivotal to the United States' world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. Howard A. Schmidt White House Cybersecurity Coordinator Secretary Steven Chu: "Establishing a comprehensive cybersecurity approach will give utility companies and grid operators another important tool to improve the grid's ability to respond to cybersecurity risks."

178

NNSA's Global Threat Reduction Initiative launches mobile app | National  

National Nuclear Security Administration (NNSA)

launches mobile app | National launches mobile app | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative launches mobile app NNSA's Global Threat Reduction Initiative launches mobile app Posted By Office of Public Affairs NNSA's Global Threat Reduction Initiative (GTRI) recently launched a

179

NNSA's Global Threat Reduction Initiative food face-off | National  

NLE Websites -- All DOE Office Websites (Extended Search)

food face-off | National food face-off | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative food face-off NNSA's Global Threat Reduction Initiative food face-off Posted By Office of Public Affairs NNSA's Global Threat Reduction Initiative holds a Feds Feeds Family face-off

180

Reference framework for E-participation projects  

Science Conference Proceedings (OSTI)

Accommodating the various requirements from distinct perspectives in e-participation calls for a holistic engineering approach for e-participation systems analysis and design. This paper presents research results towards a reference framework for e-participation ... Keywords: E-participation, reference framework, reference model

Sabrina Scherer; Maria A. Wimmer

2011-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

NNSA's Global Threat Reduction Initiative Receives 2010 Distinguished  

NLE Websites -- All DOE Office Websites (Extended Search)

Receives 2010 Distinguished Receives 2010 Distinguished Project Award from PMI | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Press Releases > NNSA's Global Threat Reduction Initiative Receives 2010 ... Press Release NNSA's Global Threat Reduction Initiative Receives 2010 Distinguished

182

A decision making framework for cruise ship design  

E-Print Network (OSTI)

This thesis develops a new decision making framework for initial cruise ship design. Through review of effectiveness analysis and multi-criteria decision making, a uniform philosophy is created to articulate a framework ...

Katsoufis, George P. (George Paraskevas)

2006-01-01T23:59:59.000Z

183

A framework for technology forecasting and visualization  

E-Print Network (OSTI)

This paper presents a novel framework for supporting the development of well-informed research policies and plans. The proposed methodology is based on the use of bibliometrics; i.e., analysis is conducted using information ...

Woon, Wei Lee

184

A Framework for Technology Forecasting and Visualization  

E-Print Network (OSTI)

This paper presents a novel framework for supporting the development of well-informed research policies and plans. The proposed methodology is based on the use of bibliometrics; i.e., analysis is conducted using information ...

Woon, Wei Lee

185

Ontological semantic technology for detecting insider threat and social engineering  

Science Conference Proceedings (OSTI)

This paper describes a computational system for detecting unintentional inferences in casual unsolicited and unrestricted verbal output of individuals, potentially responsible for leaked classified information to people with unauthorized access. Uses ... Keywords: default override, insider threat, natural language information assurance and security, ontological semantic technology, social engineering, unintended inference

Victor Raskin; Julia M. Taylor; Christian F. Hempelmann

2010-09-01T23:59:59.000Z

186

Review: TCP/IP security threats and attack methods  

Science Conference Proceedings (OSTI)

The TCP/IP protocol suite is vulnerable to a variety of attacks ranging from password sniffing to denial of service. Software to carry out most of these attacks is freely available on the Internet. These vulnerabilities-unless carefully controlled-can ... Keywords: IP spoofing, Ping O' Death, SYN flooding, TCP sequence number attack, TCP session hijacking, TCP/IP service threats

B. Harris; R. Hunt

1999-06-01T23:59:59.000Z

187

Security and privacy threats in IoT architectures  

Science Conference Proceedings (OSTI)

In this paper, we describe developments towards the Internet of Things (IoT) and discuss architecture visions for the IoT. Our emphasis is to analyze the known and new threats for the security, privacy and trust (SPT) at different levels of architecture. ... Keywords: IoT architecture, energy consumption, future internet, privacy, security, trust

Denis Kozlov; Jari Veijalainen; Yasir Ali

2012-02-01T23:59:59.000Z

188

Climate Threat to the Planet:* Implications for Energy Policy  

E-Print Network (OSTI)

Climate Threat to the Planet:* Implications for Energy Policy and Intergenerational Justice Jim Policy-Related Statements are Personal Opinion I changed the title of my talk. Global warming has implications for energy policy and intergenerational justice. The propriety of a scientist discussing

Hansen, James E.

189

Climate Threat to the Planet * Implications for Energy Policy  

E-Print Network (OSTI)

Climate Threat to the Planet * Implications for Energy Policy Jim Hansen 3 June 2008 PACON International Honolulu, Hawaii *Any statements relating to policy are personal opinion #12;Global Warming Status Definitions 1. Tipping Level - Climate forcing (greenhouse gas amount) reaches a point such that no additional

Hansen, James E.

190

Sensor Resource Management driven by threat projection and priorities  

Science Conference Proceedings (OSTI)

This paper extends previous Sensor Resource Management (SRM) work by addressing information flow from sensor inputs to SRM, through four levels of the US DoD's Joint Directors of Laboratories (JDL) sensor fusion model. The method flexibly adapts to several ... Keywords: Prioritization, Radar, Sensor Resource Management, Situation Calculus, Threat projection

Joseph Anderson; Lang Hong

2008-04-01T23:59:59.000Z

191

Forecasting Lightning Threat Using Cloud-Resolving Model Simulations  

Science Conference Proceedings (OSTI)

Two new approaches are proposed and developed for making time- and space-dependent, quantitative short-term forecasts of lightning threats, and a blend of these approaches is devised that capitalizes on the strengths of each. The new methods are ...

Eugene W. McCaul Jr.; Steven J. Goodman; Katherine M. LaCasse; Daniel J. Cecil

2009-06-01T23:59:59.000Z

192

2nd Cybersecurity Framework Workshop Welcome Remarks  

Science Conference Proceedings (OSTI)

... The Business of Cyber Risk; Threat Management; Cybersecurity Dependencies and Resiliency; and Cybersecurity Progression and Maturity. ...

2013-06-14T23:59:59.000Z

193

Distributed Resource Integration Framework  

Science Conference Proceedings (OSTI)

This report defines a framework for assessing current issues and considerations associated with the deployment and operation of distributed resources. The framework is a guide that can assist utility personnel, distributed resource owners, and other stakeholders in planning integration projects and in relating different integration projects to one another. The framework provides a structured organization of the various elements associated with distributed resource integration, including regulatory, busin...

2009-12-23T23:59:59.000Z

194

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

195

Development, analysis, and evaluation of a commercial software framework for the study of Extremely Low Probability of Rupture (xLPR) events at nuclear power plants.  

SciTech Connect

Sandia National Laboratories (SNL) participated in a Pilot Study to examine the process and requirements to create a software system to assess the extremely low probability of pipe rupture (xLPR) in nuclear power plants. This project was tasked to develop a prototype xLPR model leveraging existing fracture mechanics models and codes coupled with a commercial software framework to determine the framework, model, and architecture requirements appropriate for building a modular-based code. The xLPR pilot study was conducted to demonstrate the feasibility of the proposed developmental process and framework for a probabilistic code to address degradation mechanisms in piping system safety assessments. The pilot study includes a demonstration problem to assess the probability of rupture of DM pressurizer surge nozzle welds degraded by primary water stress-corrosion cracking (PWSCC). The pilot study was designed to define and develop the framework and model; then construct a prototype software system based on the proposed model. The second phase of the project will be a longer term program and code development effort focusing on the generic, primary piping integrity issues (xLPR code). The results and recommendations presented in this report will be used to help the U.S. Nuclear Regulatory Commission (NRC) define the requirements for the longer term program.

Kalinich, Donald A.; Helton, Jon Craig; Sallaberry, Cedric M.; Mattie, Patrick D.

2010-12-01T23:59:59.000Z

196

Review: An integrated biophysical and socio-economic framework for analysis of climate change adaptation strategies: The case of a New Zealand dairy farming system  

Science Conference Proceedings (OSTI)

The development of effective climate change adaptation strategies for complex, adaptive socio-ecological systems such as farming systems, requires an in-depth understanding of both the dynamic nature of the systems themselves and the changing environment ... Keywords: Adaptation, Climate change, Framework, Interdisciplinary research, Modelling, Resilience, Soft systems

Electra Kalaugher; Janet F. Bornman; Anthony Clark; Pierre Beukes

2013-01-01T23:59:59.000Z

197

Mobility changes anonymity: new passive threats in mobile ad hoc networks  

E-Print Network (OSTI)

Mobility Changes Anonymity: New Passive Threats in Mobile AdThese new aspects are all introduced by mobility and leftThese new threats are all introduced by mobility and are

Hong, Xiaoyan; Kong, Jiejun; Gerla, Mario

2006-01-01T23:59:59.000Z

198

NNSA's Global Threat Reduction Initiative Completes First Plutonium  

National Nuclear Security Administration (NNSA)

Completes First Plutonium Completes First Plutonium Shipment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative Completes First ... NNSA's Global Threat Reduction Initiative Completes First Plutonium Shipment Posted By NNSA Public Affairs NNSA Blog The United States and Sweden announced today at the 2012 Nuclear Security

199

NNSA's Global Threat Reduction Initiative Completes First Plutonium  

NLE Websites -- All DOE Office Websites (Extended Search)

Completes First Plutonium Completes First Plutonium Shipment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative Completes First ... NNSA's Global Threat Reduction Initiative Completes First Plutonium Shipment Posted By NNSA Public Affairs NNSA Blog The United States and Sweden announced today at the 2012 Nuclear Security

200

NETL: News Release - State Regulatory Framework Will Most Likely...  

NLE Websites -- All DOE Office Websites (Extended Search)

February 1, 2011 State Regulatory Framework Will Most Likely Result in Robust CO2 Pipeline System, New Study Says Analysis Funded by NETL May Help Speed Commercialization of...

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

EV Everywhere Battery Workshop: Preliminary Target-Setting Framework  

NLE Websites -- All DOE Office Websites (Extended Search)

Battery Workshop: Preliminary Target-Setting Framework Jacob Ward, Vehicle Technologies Senior Analyst July 26, 2012 Doubletree-Rosemont, Chicago, IL For this Analysis, Three "EV "...

202

Grammatical framework web service  

Science Conference Proceedings (OSTI)

We present a web service for natural language parsing, prediction, generation, and translation using grammars in Portable Grammar Format (PGF), the target format of the Grammatical Framework (GF) grammar compiler. The web service implementation is open ...

Björn Bringert; Krasimir Angelov; Aarne Ranta

2009-04-01T23:59:59.000Z

203

Realm Specific IP: Framework  

Science Conference Proceedings (OSTI)

This document examines the general framework of Realm Specific IP (RSIP). RSIP is intended as a alternative to NAT in which the end- to-end integrity of packets is maintained. We focus on implementation issues, deployment scenarios, and interaction ...

M. Borella; J. Lo; D. Grabelsky; G. Montenegro

2001-10-01T23:59:59.000Z

204

New Planning Framework  

Science Conference Proceedings (OSTI)

This report describes an investigation into how various regulatory, economic, and technical changes are likely to affect the framework for transmission planning. It begins with an overview of the Existing Planning Framework, structured along the lines of five key aspects that encompass the purview, role, and responsibilities of transmission planning. The report then explores seven scenarios (future states) of transformative change in the electricity industryranging from the greater penetration of wind ge...

2010-12-22T23:59:59.000Z

205

Using a Bayesian framework and global sensitivity analysis to identify strengths and weaknesses of two process-based models differing in representation of autotrophic respiration  

Science Conference Proceedings (OSTI)

Process-based models are powerful tools for sustainable and adaptive forest management. Bayesian statistics and global sensitivity analysis allow to reduce uncertainties in parameters and outputs, and they provide better insight of model behaviour. In ... Keywords: 3-PG, Bayesian calibration, Bayesian model comparison, Carbon cycle, Global sensitivity analysis, Morris screening, Net primary production, Respiration, Uncertainty analysis

F. Minunno; M. Van Oijen; D. R. Cameron; S. Cerasoli; J. S. Pereira; M. Tomé

2013-04-01T23:59:59.000Z

206

Belief-based risk analysis  

Science Conference Proceedings (OSTI)

This paper describes a method for risk analysis based on the approach used in CRAMM, but instead of using discrete measures for threats and vulnerabilities and look-up tables to derive levels of risk, it uses subjective beliefs about threats and vulnerabilities ... Keywords: belief calculus, risk analysis, security

Audun Jøsang; Daniel Bradley; Svein J. Knapskog

2004-01-01T23:59:59.000Z

207

Cybersecurity Framework Development Overview - 3rd ...  

Science Conference Proceedings (OSTI)

... “The cyber threat to critical infrastructure continues to grow and ... cyber environment that encourages efficiency, innovation, and ...

2013-07-12T23:59:59.000Z

208

Neutron Interrogation System For Underwater Threat Detection And Identification  

Science Conference Proceedings (OSTI)

Wartime and terrorist activities, training and munitions testing, dumping and accidents have generated significant munitions contamination in the coastal and inland waters in the United States and abroad. Although current methods provide information about the existence of the anomaly (for instance, metal objects) in the sea bottom, they fail to identify the nature of the found objects. Field experience indicates that often in excess of 90% of objects excavated during the course of munitions clean up are found to be non-hazardous items (false alarm). The technology to detect and identify waterborne or underwater threats is also vital for protection of critical infrastructures (ports, dams, locks, refineries, and LNG/LPG). We are proposing a compact neutron interrogation system, which will be used to confirm possible threats by determining the chemical composition of the suspicious underwater object. The system consists of an electronic d-T 14-MeV neutron generator, a gamma detector to detect the gamma signal from the irradiated object and a data acquisition system. The detected signal then is analyzed to quantify the chemical elements of interest and to identify explosives or chemical warfare agents.

Barzilov, Alexander P.; Novikov, Ivan S.; Womble, Phil C. [Department of Physics and Astronomy, Western Kentucky University, 1906 College Heights Blvd, 11077 Bowling Green, KY 42101 (United States)

2009-03-10T23:59:59.000Z

209

Knowledge transfer frameworks  

Science Conference Proceedings (OSTI)

While theories abound concerning knowledge transfer in organisations, little empirical work has been undertaken to assess any possible relationship between repositories of knowledge and those responsible for the use of knowledge. This paper develops ... Keywords: hybrid approach, knowledge administration, knowledge management, knowledge storage, knowledge transfer framework

Sajjad M Jasimuddin; Nigel Connell; Jonathan H Klein

2012-05-01T23:59:59.000Z

210

Because It's Not There: Verbal Visuality and the Threat of Graphics in Interactive Fiction  

E-Print Network (OSTI)

of the power of computer graphics, text still has access tothat are unavailable in graphics – including visual effects.Visuality and the Threat of Graphics in Interactive Fiction

Kashtan, Aaron

2009-01-01T23:59:59.000Z

211

How ORISE is Making a Difference: Preparing for the Threat of...  

NLE Websites -- All DOE Office Websites (Extended Search)

fear and confusion as officials grapple with the added complexity of a radiological emergency response. To help agencies prepare to manage such a threat, ORISE assisted the...

212

Global Framework for Climate Risk Exposure | Open Energy Information  

Open Energy Info (EERE)

Framework for Climate Risk Exposure Framework for Climate Risk Exposure Jump to: navigation, search Tool Summary Name: Global Framework for Climate Risk Exposure Agency/Company /Organization: United Nations Environment Programme Topics: Finance, Co-benefits assessment, Market analysis Resource Type: Publications, Guide/manual Website: www.unepfi.org/fileadmin/documents/global_framework.pdf Global Framework for Climate Risk Exposure Screenshot References: Global Framework for Climate Risk Exposure[1] Summary "A group of leading institutional investors from around the world released the Global Framework for Climate Risk Disclosure-a new statement on disclosure that investors expect from companies-in October 2006. Investors require this information in order to analyze a company's business risks and opportunities resulting from climate change, as well as

213

An Investment Framework for Clean Energy and Development | Open Energy  

Open Energy Info (EERE)

An Investment Framework for Clean Energy and Development An Investment Framework for Clean Energy and Development Jump to: navigation, search Tool Summary LAUNCH TOOL Name: An Investment Framework for Clean Energy and Development Agency/Company /Organization: World Bank, International Monetary Fund Sector: Energy Focus Area: Energy Efficiency, Renewable Energy, Solar Topics: Finance, Pathways analysis Resource Type: Guide/manual Website: siteresources.worldbank.org/DEVCOMMINT/Documentation/21046509/DC2006-0 An Investment Framework for Clean Energy and Development Screenshot References: An Investment Framework for Clean Energy and Development[1] Overview "This paper reports on progress in developing an Investment Framework for Clean Energy and Development. The Investment Framework is intended to be a vehicle to accelerate investments to address developing country energy

214

Risk analysis of nuclear safeguards regulations. [Aggregated Systems Model (ASM)  

Science Conference Proceedings (OSTI)

The Aggregated Systems Model (ASM), a probabilisitic risk analysis tool for nuclear safeguards, was applied to determine benefits and costs of proposed amendments to NRC regulations governing nuclear material control and accounting systems. The objective of the amendments was to improve the ability to detect insiders attempting to steal large quantities of special nuclear material (SNM). Insider threats range from likely events with minor consequences to unlikely events with catastrophic consequences. Moreover, establishing safeguards regulations is complicated by uncertainties in threats, safeguards performance, and consequences, and by the subjective judgments and difficult trade-offs between risks and safeguards costs. The ASM systematically incorporates these factors in a comprehensive, analytical framework. The ASM was used to evaluate the effectiveness of current safeguards and to quantify the risk of SNM theft. Various modifications designed to meet the objectives of the proposed amendments to reduce that risk were analyzed. Safeguards effectiveness was judged in terms of the probability of detecting and preventing theft, the expected time to detection, and the expected quantity of SNM diverted in a year. Data were gathered in tours and interviews at NRC-licensed facilities. The assessment at each facility was begun by carefully selecting scenarios representing the range of potential insider threats. A team of analysts and facility managers assigned probabilities for detection and prevention events in each scenario. Using the ASM we computed the measures of system effectiveness and identified cost-effective safeguards modifications that met the objectives of the proposed amendments.

Al-Ayat, R.A.; Altman, W.D.; Judd, B.R.

1982-06-01T23:59:59.000Z

215

DAKOTA, a multilevel parellel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis:version 4.0 uers's manual.  

Science Conference Proceedings (OSTI)

The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a user's manual for the DAKOTA software and provides capability overviews and procedures for software execution, as well as a variety of example studies.

Griffin, Joshua D. (Sandai National Labs, Livermore, CA); Eldred, Michael Scott; Martinez-Canales, Monica L. (Sandai National Labs, Livermore, CA); Watson, Jean-Paul; Kolda, Tamara Gibson (Sandai National Labs, Livermore, CA); Giunta, Anthony Andrew; Adams, Brian M.; Swiler, Laura Painton; Williams, Pamela J. (Sandai National Labs, Livermore, CA); Hough, Patricia Diane (Sandai National Labs, Livermore, CA); Gay, David M.; Dunlavy, Daniel M.; Eddy, John P.; Hart, William Eugene; Brown, Shannon L.

2006-10-01T23:59:59.000Z

216

DAKOTA : a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis. Version 5.0, user's manual.  

Science Conference Proceedings (OSTI)

The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a user's manual for the DAKOTA software and provides capability overviews and procedures for software execution, as well as a variety of example studies.

Eldred, Michael Scott; Dalbey, Keith R.; Bohnhoff, William J.; Adams, Brian M.; Swiler, Laura Painton; Hough, Patricia Diane (Sandia National Laboratories, Livermore, CA); Gay, David M.; Eddy, John P.; Haskell, Karen H.

2010-05-01T23:59:59.000Z

217

Climate Literacy Framework  

NLE Websites -- All DOE Office Websites (Extended Search)

Climate Literacy Framework Print E-mail Climate Literacy Framework Print E-mail A Guide for Individuals and Communities The Essential Principles of Climate Science presents important information for individuals and communities to understand Earth's climate, impacts of climate change, and approaches for adapting and mitigating change. Principles in the guide can serve as discussion starters or launching points for scientific inquiry. The guide can also serve educators who teach climate science as part of their science curricula. Development of the guide began at a workshop sponsored by the National Oceanic and Atmospheric Administration (NOAA) and the American Association for the Advancement of Science (AAAS). Multiple science agencies, non-governmental organizations, and numerous individuals also contributed through extensive review and comment periods. Discussion at the National Science Foundation (NSF) and NOAA-sponsored Atmospheric Sciences and Climate Literacy workshop contributed substantially to the refinement of the document.

218

A framework for schema matcher composition  

Science Conference Proceedings (OSTI)

Enterprise schemas tend to be different, which is the key issue when the seamless communication between systems is of utmost importance. One solution could be the development of standards which then could be enforced, however, vendors seem to be reluctant ... Keywords: algorithm analysis, framework definition, optimization, performance improvement, schema matching

Balazs Villanyi; Peter Martinek; Bela Szikora

2010-10-01T23:59:59.000Z

219

Preparation of functionalized zeolitic frameworks  

DOE Patents (OSTI)

The disclosure provides zeolitic frameworks for gas separation, gas storage, catalysis and sensors. More particularly the disclosure provides zeolitic frameworks (ZIFs). The ZIF of the disclosure comprises any number of transition metals or a homogenous transition metal composition.

Yaghi, Omar M; Furukawa, Hiroyasu; Wang, Bo

2013-07-09T23:59:59.000Z

220

Preparation of functionalized zeolitic frameworks  

DOE Patents (OSTI)

The disclosure provides zeolitic frameworks for gas separation, gas storage, catalysis and sensors. More particularly the disclosure provides zeolitic frameworks (ZIFs). The ZIF of the disclosure comprises any number of transition metals or a homogenous transition metal composition.

Yaghi, Omar M; Hayashi, Hideki; Banerjee, Rahul; Park, Kyo Sung; Wang, Bo; Cote, Adrien P

2012-11-20T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Automatically locating framework extension examples  

Science Conference Proceedings (OSTI)

Using and extending a framework is a challenging task whose difficulty is exacerbated by the poor documentation that generally comes with the framework. Even in the presence of documentation, developers often desire implementation examples for concrete ...

Barthélémy Dagenais; Harold Ossher

2008-11-01T23:59:59.000Z

222

A Bayesian Framework for Combining Valuation Estimates  

E-Print Network (OSTI)

Obtaining more accurate equity value estimates is the starting point for stock selection, value-based indexing in a noisy market, and beating benchmark indices through tactical style rotation. Unfortunately, discounted cash flow, method of comparables, and fundamental analysis typically yield discrepant valuation estimates. Moreover, the valuation estimates typically disagree with market price. Can one form a superior valuation estimate by averaging over the individual estimates, including market price? This article suggests a Bayesian framework for combining two or more estimates into a superior valuation estimate. The framework justifies the common practice of averaging over several estimates to arrive at a final point estimate.

Kenton K. Yee

2007-07-24T23:59:59.000Z

223

An evaluation of potential solar radio emission power threat on GPS and GLONASS performance  

Science Conference Proceedings (OSTI)

The L-band solar radio emission has recently been regarded as a potential threat to stable GPS and GLONASS performance. However, the threat has not been completely investigated or assessed so far. We evaluate in detail the occurrence of GPS/GLONASS signal ... Keywords: GLONASS performance, GPS, Solar flares, Solar radio emission

Vladislav V. Demyanov; Edward L. Afraimovich; Shuanggen Jin

2012-10-01T23:59:59.000Z

224

A methodology and supporting techniques for the quantitative assessment of insider threats  

Science Conference Proceedings (OSTI)

Security is a major challenge for today's companies, especially ICT ones which manages large scale cyber-critical systems. Amongst the multitude of attacks and threats to which a system is potentially exposed, there are insiders attackers i.e., users ... Keywords: attack path, insider threats, risk assessment, security

Nicola Nostro, Andrea Ceccarelli, Andrea Bondavalli, Francesco Brancati

2013-09-01T23:59:59.000Z

225

A theoretical framework to characterize multichannel interaction in electronic commerce  

Science Conference Proceedings (OSTI)

This paper presents an initial study of multichannel interactions within the framework of the E-Marketing. A analysis and prediction theoretical framework, based on the one hand on concepts resulting from psycholinguistics, and the other hand on information ... Keywords: E-marketing, interaction, media richness theory, multichannel, psycholinguistics

Vincent Chevrin; Alain Derycke; José Rouillard

2003-11-01T23:59:59.000Z

226

Global threat reduction initiative Russian nuclear material removal progress  

SciTech Connect

In December 1999 representatives from the United States, the Russian Federation, and the International Atomic Energy Agency (IAEA) started discussing a program to return to Russia Soviet- or Russian-supplied highly enriched uranium (HEU) fuel stored at the Russian-designed research reactors outside Russia. Trilateral discussions among the United States, Russian Federation, and the International Atomic Energy Agency (IAEA) have identified more than 20 research reactors in 17 countries that have Soviet- or Russian-supplied HEU fuel. The Global Threat Reduction Initiative's Russian Research Reactor Fuel Return Program is an important aspect of the U.S. Government's commitment to cooperate with the other nations to prevent the proliferation of nuclear weapons and weapons-usable proliferation-attractive nuclear materials. To date, 496 kilograms of Russian-origin HEU have been shipped to Russia from Serbia, Latvia, Libya, Uzbekistan, Romania, Bulgaria, Poland, Germany, and the Czech Republic. The pilot spent fuel shipment from Uzbekistan to Russia was completed in April 2006. (author)

Cummins, Kelly [DOE/NNSA (United States); Bolshinsky, Igor [INL/NNSA (United States)

2008-07-15T23:59:59.000Z

227

Insider Threat - Material Control and Accountability Mitigation (Presentation)  

SciTech Connect

Why is the insider a concern? There are many documented cases of nuclear material available for sale - there are more insider diversions than outsider attacks and more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. Insider attributes are: have access, has authority, possesses knowledge, works with absence of timeline, can test system, and may act alone or support a team. Material control and accountability (MC&A) is an essential part of an integrated safeguards system. Objectives of MC&A are: (1) Ongoing confirmation of the presence of special nuclear material (SNM) in assigned locations; (2) Prompt investigation of anomalies that may indicate a loss of SNM; (3) Timely and localized detection of loss, diversion, or theft of a goal quantity; (4) Rapid assessment and response to detection alarms; and (5) Timely generation of information to aid in the recovery of SNM in the event of an actual loss, diversion, or theft from the purview of the MC&A system. Control and accountability of material, equipment, and data are essential to minimizing insider threats.

Powell, Danny H [ORNL; Elwood Jr, Robert H [ORNL

2011-01-01T23:59:59.000Z

228

FIPS 191, Specifications for Guideline for The Analysis Local ...  

Science Conference Proceedings (OSTI)

... instead of waiting for the print job to be ... threats produced in the high level analysis, will, in ... Responsible for conducting timely audits of LAN server ...

2012-02-26T23:59:59.000Z

229

A Conceptual Framework for Progressing Towards Sustainability in the  

Open Energy Info (EERE)

A Conceptual Framework for Progressing Towards Sustainability in the A Conceptual Framework for Progressing Towards Sustainability in the Agriculture and Food Sector Jump to: navigation, search Tool Summary LAUNCH TOOL Name: A Conceptual Framework for Progressing Towards Sustainability in the Agriculture and Food Sector Agency/Company /Organization: Food and Agriculture Organization of the United Nations Sector: Land Focus Area: Agriculture Topics: Policies/deployment programs, Pathways analysis Resource Type: Publications Website: www.fao.org/docrep/012/al322e/al322e00.pdf A Conceptual Framework for Progressing Towards Sustainability in the Agriculture and Food Sector Screenshot References: A Conceptual Framework for Progressing Towards Sustainability in the Agriculture and Food Sector[1] Logo: A Conceptual Framework for Progressing Towards Sustainability in the Agriculture and Food Sector

230

Rwanda-Developing a Strategic Climate Change Framework | Open Energy  

Open Energy Info (EERE)

Rwanda-Developing a Strategic Climate Change Framework Rwanda-Developing a Strategic Climate Change Framework (Redirected from CDKN-Rwanda-Developing a Strategic Climate Change Framework) Jump to: navigation, search Name CDKN-Rwanda-Developing a Strategic Climate Change Framework and Design of a Climate Change and Environmental Fund Agency/Company /Organization Climate and Development Knowledge Network (CDKN), United Kingdom Department for International Development Partner REMA, Government of Rwanda Sector Climate, Energy, Land Topics Background analysis, Low emission development planning, Pathways analysis Website http://cdkn.org/project/a-stra Program Start 2010 Program End 2012 Country Rwanda UN Region Middle Africa References CDKN-Rwanda-Developing a Strategic Climate Change Framework[1] Rwanda's ambitious Green Growth and Climate Resilience Strategy was

231

GTT Framework | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

GTT Framework GTT Framework GTT Framework GTT Framework Strategic Framework The GTT proposes a strategic framework that organizes these activities into three interrelated dimensions (informational, analytical, and physical), representative of the systems nature of the grid. Each of these dimensions have a corresponding strategic focus: The informational dimension aims to improve the visibility of grid conditions. The analytical dimension increases our understanding of the implications of the observed conditions. The physical dimension enhances the flexibility of the grid to respond to that understanding. The logic behind these focus areas is that a modernized grid should be able to "see" an event or condition, "know" what is happening or about to happen, and "do" something appropriate in response - quickly and

232

Second Cybersecurity Infrastructure Framework Workshop ...  

Science Conference Proceedings (OSTI)

... framework to reduce cybersecurity risks for critical infrastructure from May 29 ... industry experts in all sectors—such as energy, finance, transportation ...

2013-05-01T23:59:59.000Z

233

Complex Structure Forewarning System Framework  

This invention is a novel predictive framework to control the in-service health of structures or equipment by ... Oak Ridge National Laboratory Rm ...

234

Framework forensic examination computer systems.  

E-Print Network (OSTI)

??This thesis discusses the features and requirements of a computationally intelligent computer forensic system. By introducing a novel concept, "Case-Relevance", a computationally intelligent forensic framework… (more)

Gong, Ruibin.

2008-01-01T23:59:59.000Z

235

The Global Threat Reduction Initiative's Molybdenum-99 Program, OAS-L-12-07  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Global Threat Reduction Global Threat Reduction Initiative's Molybdenum-99 Program OAS-L-12-07 July 2012 Department of Energy Washington, DC 20585 July 20, 2012 MEMORANDUM FOR THE ASSISTANT DEPUTY ADMINISTRATOR FOR GLOBAL THREAT REDUCTION, NATIONAL NUCLEAR SECURITY ADMINISTRATION FROM: David Sedillo, Director Western Audits Division Office of Inspector General SUBJECT: INFORMATION: Audit Report on "The Global Threat Reduction Initiative's Molybdenum-99 Program" BACKGROUND Molybdenum-99 (Mo-99) is used in the production of technetium-99m (Tc-99m), the most commonly used medical radioisotope in the world. The United States accounts for approximately half of the global demand for Mo-99 at approximately 6,000 units per week. Because Mo-99's short half-life of 66 hours prevents it from being stockpiled, consistent

236

Detecting Nuclear Threats | U.S. DOE Office of Science (SC)  

NLE Websites -- All DOE Office Websites (Extended Search)

Detecting Nuclear Threats Detecting Nuclear Threats Stories of Discovery & Innovation Detecting Nuclear Threats Enlarge Photo Photo: Denise Applewhite The MINDS device was invented by a team of engineers at the Princeton Plasma Physics Laboratory, including, from left: Kenny Silber, Henry Carnevale, Charles Gentile, Dana Mastrovito, and Bill Davis. Enlarge Photo 03.28.11 Detecting Nuclear Threats Plasma physics challenge yields portable nuclear detector for homeland security. In 1999, faced with the task of decommissioning the legendary Tokamak Fusion Test Reactor (TFTR), officials at the U.S. Department of Energy's Princeton Plasma Physics Laboratory (PPPL) realized they needed something that didn't yet exist-a non-destructive, real time device to detect certain "hot" elements lacing the inner vessel of the doughnut-

237

Microsoft Forefront Threat Management Gateway (TMG) Administrator's Companion, 1st edition  

Science Conference Proceedings (OSTI)

Get your Web security, network perimeter security, and application layer security gateway up and running smoothly. This indispensible, single-volume reference details the features and capabilities of Microsoft Forefront Threat Management Gateway (TMG). ...

Jim Harrison; Yuri Diogenes; Mohit Saxena

2010-02-01T23:59:59.000Z

238

Consequences of Sprawl: Threats to California's Natural Environment and Human Health  

E-Print Network (OSTI)

threats both on land and at sea. Aquatic pollution. Degradeddeterminants of ozone pollution. Land use patterns affectLand Management37 Align Infrastructure Investment with Long-Term Objectives..38 Promote Pollution

Goldman, Todd

2001-01-01T23:59:59.000Z

239

Toward High-Resolution, Rapid, Probabilistic Forecasting of the Inundation Threat from Landfalling Hurricanes  

Science Conference Proceedings (OSTI)

State-of-the-art coupled hydrodynamic and wave models can predict the inundation threat from an approaching hurricane with high resolution and accuracy. However, these models are not highly efficient and often cannot be run sufficiently fast to ...

Andrew J. Condon; Y. Peter Sheng; Vladimir A. Paramygin

2013-04-01T23:59:59.000Z

240

Tackling the Triple-Threat Genome of Miscanthus x giganteus (2010 JGI User Meeting)  

Science Conference Proceedings (OSTI)

Steve Moose from the University of Illinois at Urbana-Champaign and the Energy Biosciences Institute on "Tackling the Triple-Threat Genome of Miscanthus x giganteus" on March 25, 2010 at the 5th Annual DOE JGI User Meeting

Moose, Steve

2010-03-25T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Proximity breeds danger: emerging threats in metro-area wireless networks  

Science Conference Proceedings (OSTI)

The growing popularity of wireless networks and mobile devices is starting to attract unwanted attention especially as potential targets for malicious activities reach critical mass. In this study, we try to quantify the threat from large-scale distributed ...

P. Akritidis; W. Y. Chin; V. T. Lam; S. Sidiroglou; K. G. Anagnostakis

2007-08-01T23:59:59.000Z

242

Initial Analysis of Cybersecurity Framework RFI Response  

Science Conference Proceedings (OSTI)

... of replacing billions of dollars in aging infrastructure, not to ... that have expertise in utility networks. ... have experience in the utilities sector.” • “…ensure ...

2013-05-16T23:59:59.000Z

243

Development framework components as commonplaces  

Science Conference Proceedings (OSTI)

This paper examines the practice of using front-end web development frameworks and associated plug-ins to develop web application interfaces and suggests returning to a rhetorical foundation for determining the propriety of code use and vetting of an ... Keywords: code libraries, commonplaces, design, development frameworks, extreme usability, front-end development, rhetoric, topoi, user interfaces

Tom Lindsley

2012-10-01T23:59:59.000Z

244

Practical management of malicious insider threat - An enterprise CSIRT perspective  

Science Conference Proceedings (OSTI)

Communication and Information Systems (CIS) now form the primary information store, exchange and data analysis for all modern military and are crucial to command and control. The ubiquitousness of CIS within the military not only means that there is ...

Terrence Walker

2008-11-01T23:59:59.000Z

245

Rwanda-Developing a Strategic Climate Change Framework | Open Energy  

Open Energy Info (EERE)

Rwanda-Developing a Strategic Climate Change Framework Rwanda-Developing a Strategic Climate Change Framework Jump to: navigation, search Name CDKN-Rwanda-Developing a Strategic Climate Change Framework and Design of a Climate Change and Environmental Fund Agency/Company /Organization Climate and Development Knowledge Network (CDKN), United Kingdom Department for International Development Partner REMA, Government of Rwanda Sector Climate, Energy, Land Topics Background analysis, Low emission development planning, Pathways analysis Website http://cdkn.org/project/a-stra Program Start 2010 Program End 2012 Country Rwanda UN Region Middle Africa References CDKN-Rwanda-Developing a Strategic Climate Change Framework[1] Rwanda's ambitious Green Growth and Climate Resilience Strategy was launched at a UNFCCC side event at CoP17 in Durban. Rwanda joins Korea,

246

Framework for Adaptable Operating and Runtime Systems: Final Project Report  

SciTech Connect

In this grant, we examined a wide range of techniques for constructing high-performance con#12;gurable system software for HPC systems and its application to DOE-relevant problems. Overall, research and development on this project focused in three specifc areas: (1) software frameworks for constructing and deploying con#12;gurable system software, (2) applcation of these frameworks to HPC-oriented adaptable networking software, (3) performance analysis of HPC system software to understand opportunities for performance optimization.

Patrick G. Bridges

2012-02-01T23:59:59.000Z

247

UC SECURITY FRAMEWORK 2011 -2012  

E-Print Network (OSTI)

1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

Hickman, Mark

248

The FRESCO Framework: An Overview  

E-Print Network (OSTI)

The dynamic composition of existing services into new services is at the core of service-oriented computing. The objective of FRESCO (Foundational Research on Service Composition) is to develop a framework that service providers can use in order to model, develop, and execute composite services. The FRESCO framework will include conceptual tools, such as models for service composition and aggregation. The framework will also include technology elements, such as an integrated development environment and specific components of the infrastructure for service execution. A methodology will be given for the use of the FRESCO framework in the development of composite service solutions. In this paper, we describe the main aspects of the approach to service composition adopted in FRESCO. 1.

Giacomo Piccinelli; Christian Zirpins; Winfried Lamersdorf

2003-01-01T23:59:59.000Z

249

An Integrated Framework for Parametric Design Using Building Energy Models  

NLE Websites -- All DOE Office Websites (Extended Search)

An Integrated Framework for Parametric Design Using Building Energy Models An Integrated Framework for Parametric Design Using Building Energy Models Speaker(s): Bryan Eisenhower Date: September 22, 2011 - 12:00pm Location: 90-3122 Seminar Host/Point of Contact: Michael Wetter In this talk we will present a framework for analyses of building energy models including uncertainty and sensitivity analysis, optimization, calibration, and failure mode effect analysis. The methodology begins with efficient uniformly ergodic numerical sampling and regression analysis based on machine learning to derive an analytic representation of the full energy model (e.g. EnergyPlus, TRNSYS, etc). Once these steps are taken, and an analytical representation of the dynamics is obtained, multiple avenues for analysis are opened that were previously impeded by the

250

Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile?  

Science Conference Proceedings (OSTI)

In recent years, Customs and Border Protection has installed radiation sensors to screen cargo containers entering the United States. They are concerned that terrorists could use containers to smuggle radiological material into the country and carry ... Keywords: applications, multiple-objective decision analysis, probability, terrorism

Jason R. W. Merrick; Laura A. McLay

2010-06-01T23:59:59.000Z

251

Making frameworks work: a project retrospective  

Science Conference Proceedings (OSTI)

Various issues make framework development harder than regular development. Building product lines and frameworks requires increased coordination and communication between stakeholders and across the organization. The difficulty of building the right ... Keywords: experience report, object-oriented frameworks, product lines

Marwan Abi-Antoun

2007-10-01T23:59:59.000Z

252

UNCLASSIFIED Texas Gang Threat Assessment 2012 Texas Gang Threat Assessment 2012 A State Intelligence Estimate Produced by the Texas Fusion Center  

E-Print Network (OSTI)

The key analytic judgments of this assessment are: Gangs continue to represent a significant public safety threat to the State of Texas, and are responsible for a disproportionate amount of crime in our communities. Of incarcerated members of Tier 1 and Tier 2 gangs, more than half are serving a sentence for a violent crime, including robbery (25 percent), homicide (14 percent), and assault/terroristic threat (12 percent). The Tier 1 gangs in Texas are Tango Blast (estimated at 10,000 members), Texas Syndicate (4,500 members), Barrio Azteca (3,500 members), and Texas Mexican Mafia (6,000 members). These organizations pose the greatest gang threat to Texas due to their relationships with Mexican cartels, large membership numbers, high levels of transnational criminal activity, and organizational effectiveness. Mexican cartels continue to use gangs in Texas as they smuggle drugs, people, weapons, and cash across the border. Members of Tier 1 gangs have been recruited by the cartels to carry out acts of violence in both Texas and Mexico. The relationships between gangs and cartels have evolved over the past year, due in part to volatility and changes in cartel

unknown authors

2013-01-01T23:59:59.000Z

253

A Conceptual Framework for Progressing Towards Sustainability...  

Open Energy Info (EERE)

Conceptual Framework for Progressing Towards Sustainability in the Agriculture and Food Sector Jump to: navigation, search Logo: A Conceptual Framework for Progressing Towards...

254

Environment analysis via ?CFA  

Science Conference Proceedings (OSTI)

We describe a new program-analysis framework, based on CPS and procedure-string abstractions, that can handle critical analyses which the k-CFA framework cannot. We present the main theorems concerning correctness, show an application analysis, ... Keywords: CPS, continuations, delta-CFA, environment analysis, flow analysis, functional languages, inlining, lambda calculus, program analysis, super-beta

Matthew Might; Olin Shivers

2006-01-01T23:59:59.000Z

255

New study sees greater low-level radiation threat  

SciTech Connect

A new analysis of Energy Department medical records has found higher than expected cancer rates among workers at DOE's Hanford nuclear weapons plant, suggesting occupational exposure to low-level radiation may be more dangerous than previously thought. The study, released Tuesday by the Philadelphia-based Three Mile Island Public Health Fund, is important not only because of its controversial conclusions, but also because it represents the first independent review of DOE's long-secret worker medical records. The new study done by Stewart and Kneale looked at Hanford worker health records dating up to 1986 - part of a huge trove of data withheld by DOE from independent researchers until two years ago. In their re-analysis of the Hanford worker records, Stewart and Kneale found increased cancer rates among older workers who were over 40 years of age when exposed. And they said that increased susceptibility of older people to radiation-induced cancer was not reflected in the highly influential Japanese atomic bomb studies because people over 50 years of age were [open quotes]grossly under-represented[close quotes] in the A-bomb analyses, possibly because many bomb victims suffered early deaths from high doses.

Lobsenz, G.

1992-12-09T23:59:59.000Z

256

Programmatic Framework | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Programmatic Framework Programmatic Framework Programmatic Framework PROGRAM FACT SHEETS FUSRAP Nevada Offsites UMTRCA Title I and II PROGRAM TYPES UMTRCA Title I Sites UMTRCA Title II Sites FUSRAP Sites D&D Sites Nevada Offsites CERCLA/RCRA Sites NWPA Section 151 Site Other UMTRCA Title I Disposal and Processing Sites (Regulatory Drivers) For UMTRCA Title I disposal sites managed by LM, DOE becomes a licensee to the U.S. Nuclear Regulatory Commission (NRC). Inspection, reporting, and record-keeping requirements are defined in Title 10 Code of Federal Regulations (CFR) Part 40.27, "General License for Custody and Long-Term Care of Residual Radioactive Material Disposal Sites." The general license for long-term custody is indefinite in duration. Usually, title for the land is assigned to an agency of the Federal government, and the land is

257

Sustainable Bioenergy: A Framework for Decision Makers | Open Energy  

Open Energy Info (EERE)

Sustainable Bioenergy: A Framework for Decision Makers Sustainable Bioenergy: A Framework for Decision Makers Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Sustainable Bioenergy: A Framework for Decision Makers Agency/Company /Organization: Food and Agriculture Organization of the United Nations Sector: Energy, Land Focus Area: Renewable Energy, Biomass Topics: Implementation, Policies/deployment programs Resource Type: Guide/manual, Lessons learned/best practices Website: esa.un.org/un-energy/pdf/susdev.Biofuels.FAO.pdf References: Sustainable Bioenergy: A Framework for Decision Makers[1] "In this publication, UN-Energy seeks to structure an approach to the current discussion on bioenergy, it is the contribution of the UN system to the issues that need further attention, analysis and valuation, so that

258

Framework for SCADA Security Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

259

A Framework for Bioelectronics: Discovery and Innovation  

Science Conference Proceedings (OSTI)

A Framework for Bioelectronics: Discovery and Innovation. There is an opportunity for dramatically increased synergy between ...

2013-06-25T23:59:59.000Z

260

The Observational?Inductive Framework for Science  

Science Conference Proceedings (OSTI)

A new observational?inductive framework for science is emerging due to recent developments in sensors

Timothy E. Eastman

2006-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

NIST Prototypes Framework for Evaluating Sustainability ...  

Science Conference Proceedings (OSTI)

NIST Prototypes Framework for Evaluating Sustainability Standards. ... Whatever the drivers, businesses are boosting their sustainability efforts. ...

2011-10-26T23:59:59.000Z

262

ICMPV6 Vulnerability: The Importance of Threat Model and SF-ICMP6  

Science Conference Proceedings (OSTI)

Handling Internet Control Message Protocol version 6 ICMPv6 vulnerabilities is among the challenges in securing the IPv6 deployment. Since ICMPv6 messages are crucial in IPv6 communications, this paper discusses the discovery of ICMPv6 vulnerabilities ... Keywords: ICMPv6 Policy, ICMPv6 Related Attacks, ICMPv6 Security, ICMPv6 Threat Model, Selective Filtering

Abidah Hj Mat Taib, Wan Nor Ashiqin Wan Ali, Nurul Sharidah Shaari

2013-04-01T23:59:59.000Z

263

Original Research Chlorine Gas: An Evolving Hazardous Material Threat and Unconventional Weapon  

E-Print Network (OSTI)

Chlorine gas represents a hazardous material threat from industrial accidents and as a terrorist weapon. This review will summarize recent events involving chlorine disasters and its use by terrorists, discuss pre-hospital considerations and suggest strategies for the initial management for acute chlorine exposure events. [West J Emerg Med. 2010; 11(2):151-156.

Robert Jones Md; Brandon Wills Do; Christopher Kang Md

2009-01-01T23:59:59.000Z

264

Security Issues in Cloud Computing: A Survey of Risks, Threats and Vulnerabilities  

Science Conference Proceedings (OSTI)

Cloud Computing CC is revolutionizing the methodology by which IT services are being utilized. It is being introduced and marketed with many attractive promises that are enticing to many companies and managers, such as reduced capital costs and relief ... Keywords: Cloud Computing, Risks, Security, Threats, Vulnerabilities

Kamal Dahbur; Bassil Mohammad; Ahmad Bisher Tarakji

2011-07-01T23:59:59.000Z

265

A Generic Framework for Network Forensics  

E-Print Network (OSTI)

Internet is the most powerful medium as on date, facilitating varied services to numerous users. It has also become the environment for cyber warfare where attacks of many types (financial, ideological, revenge) are being launched. The e-commerce transactions being carried out online are of major interest to cybercriminals. The Internet needs to be protected from these attacks and an appropriate response has to be generated to handle them to reduce the impact. Network forensics is the science that deals with capture, recording, and analysis of network traffic for investigative purpose and incident response. There are many tools which assist in capturing data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. This paper presents a generic framework for network forensic analysis by specifically identifying the steps connected only to network forensics from the already proposed models for digital investigation. Each of the phases in the framework is elucidated. A comparison of the proposed model is done with the existing models for digital investigation. Research challenges in various phases of the model are approached with specific reference to network forensics.

Emmanuel S. Pilli; R. C. Joshi; Rajdeep Niyogi

2010-01-01T23:59:59.000Z

266

Developing a Regional Recovery Framework  

Science Conference Proceedings (OSTI)

Abstract A biological attack would present an unprecedented challenge for local, state, and federal agencies; the military; the private sector; and individuals on many fronts ranging from vaccination and treatment to prioritization of cleanup actions to waste disposal. To prepare the Seattle region to recover from a biological attack, the Seattle Urban Area Security Initiative (UASI) partners collaborated with military and federal agencies to develop a Regional Recovery Framework for a Biological Attack in the Seattle Urban Area. The goal was to reduce the time and resources required to recover and restore wide urban areas, military installations, and other critical infrastructure following a biological incident by providing a coordinated systems approach. Based on discussions in small workshops, tabletop exercises, and interviews with emergency response agency staff, the partners identified concepts of operation for various areas to address critical issues the region will face as recovery progresses. Key to this recovery is the recovery of the economy. Although the Framework is specific to a catastrophic, wide-area biological attack using anthrax, it was designed to be flexible and scalable so it could also serve as the recovery framework for an all-hazards approach. The Framework also served to coalesce policy questions that must be addressed for long-term recovery. These questions cover such areas as safety and health, security, financial management, waste management, legal issues, and economic development.

Lesperance, Ann M.; Olson, Jarrod; Stein, Steven L.; Clark, Rebecca; Kelly, Heather; Sheline, Jim; Tietje, Grant; Williamson, Mark; Woodcock, Jody

2011-09-01T23:59:59.000Z

267

A Framework for Proof Systems  

Science Conference Proceedings (OSTI)

Linear logic can be used as a meta-logic to specify a range of object-level proof systems. In particular, we show that by providing different polarizations within a focused proof system for linear logic, one can account for natural ... Keywords: Focusing, Linear logic, Logical framework, Meta-logic

Vivek Nigam; Dale Miller

2010-08-01T23:59:59.000Z

268

Autonomic load-testing framework  

Science Conference Proceedings (OSTI)

In this paper, we present a method for performance testing of transactional systems. The methods models the system under test, finds the software and hardware bottlenecks and generate the workloads that saturate them. The framework is autonomic, the ... Keywords: autonomic system, performance models, performance testing, stress testing

Cornel Barna; Marin Litoiu; Hamoun Ghanbari

2011-06-01T23:59:59.000Z

269

A framework for linguistic modelling  

Science Conference Proceedings (OSTI)

A new framework for linguistic reasoning is proposed based on a random set model of the degree of appropriateness of a label. Labels are assumed to be chosen from a finite predefined set of labels and the set of appropriate labels for a value is defined ... Keywords: Bayesian inference, fuzzy labels, label semantics, linguistic constraints, random sets

Jonathan Lawry

2004-05-01T23:59:59.000Z

270

Content Analysis for Proactive Protective Intelligence  

SciTech Connect

The aim of this paper is to outline a plan for developing and validating a Proactive Protective Intelligence approach that prevents targeted violence through the analysis and assessment of threats overtly or covertly expressed in abnormal communications to USSS protectees.

Sanfilippo, Antonio P.

2010-12-15T23:59:59.000Z

271

Calculational framework for safety analyses of non-reactor nuclear facilities  

DOE Green Energy (OSTI)

A calculational framework for the consequences analysis of non-reactor nuclear facilities is presented. The analysis framework starts with accident scenarios which are developed through a traditional hazard analysis and continues with a probabilistic framework for the consequences analysis. The framework encourages the use of response continua derived from engineering judgment and traditional deterministic engineering analyses. The general approach consists of dividing the overall problem into a series of interrelated analysis cells and then devising Markov chain like probability transition matrices for each of the cells. An advantage of this division of the problem is that intermediate output (as probability state vectors) are generated at each calculational interface. The series of analyses when combined yield risk analysis output. The analysis approach is illustrated through application to two non-reactor nuclear analyses: the Ulysses Space Mission, and a hydrogen burn in the Hanford waste storage tanks.

Coleman, J.R.

1994-06-01T23:59:59.000Z

272

EXTERNAL TERRORIST THREATS TO CIVILIAN AIRLINERS: A SUMMARY RISK ANALYSIS OF  

E-Print Network (OSTI)

, and Optimization », in : Algorithms For Robotic Motion and Manipulation, J.-P. Laumond and M. Overmars (Eds.), A.K

Wang, Hai

273

Systems analysis of emerging IPTV entertainment platform : stakeholders, threats and opportunities  

E-Print Network (OSTI)

Why do certain types of companies, goods, services survive and others do not. Why does one set continuously reinvent themselves and others wither away and die? Why does Cisco continue to provide exciting and innovative ...

Sharma, Shantnu

2008-01-01T23:59:59.000Z

274

An evaluation framework for higher education ERP systems  

Science Conference Proceedings (OSTI)

A Higher Education ERP system can be used as a solution to integrate and increase the efficiency of the Romanian university processes. This paper examines the application of ERP software in Romanian Universities. We made an SWOT analysis for implementing ... Keywords: ERP systems, evaluation framework, higher education, integration, quality services, university management

Gheorghe Sabau; Mihaela Munten; Ana-Ramona Bologa; Razvan Bologa; Traian Surcel

2009-11-01T23:59:59.000Z

275

NNSA's Global Threat Reduction Initiative Removes More Than One Ton of  

NLE Websites -- All DOE Office Websites (Extended Search)

Removes More Than One Ton of Removes More Than One Ton of Food | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative Removes More ... NNSA's Global Threat Reduction Initiative Removes More Than One Ton of Food Posted By Office of Public Affairs Contributing to DOE/NNSA's efforts to support the Office of Personnel

276

Exposure Levels for Chemical Threat Compounds; Information to Facilitate Chemical Incident Response  

Science Conference Proceedings (OSTI)

Exposure Standards, Limits and Guidelines for Chemical Threat Compunds ABSTRACT Exposure criteria for chemical warfare (CW) agents and certain toxic industrial chemicals (TICs) used as CW agents (such as chlorine fill in an improvised explosive device) have been developed for protection of the civilian general public, civilian employees in chemical agent processing facilities and deployed military populations. In addition, compound-specific concentrations have been developed to serve as how clean is clean enough clearance criteria guiding facility recovery following chemical terrorist or other hazardous release events. Such criteria are also useful to verify compound absence, identify containment boundaries and expedite facility recovery following chemical threat release. There is no single right value or concentration appropriate for all chemical hazard control applications. It is acknowledged that locating and comparing the many sources of CW agent and TIC exposure criteria has not been previously well-defined. This paper summarizes many of these estimates and assembles critical documentation regarding their derivation and use.

Hauschild, Veronique [U.S. Army Public Health Command] [U.S. Army Public Health Command; Watson, Annetta Paule [ORNL] [ORNL

2013-01-01T23:59:59.000Z

277

Global Threat  

NLE Websites -- All DOE Office Websites (Extended Search)

dual application of splitting the atom, U.S. policy towards civilian use of highly enriched uranium (HEU) has historically exhibited contradictory traits. During these early...

278

A General Framework for Convective Trigger Functions  

Science Conference Proceedings (OSTI)

A general framework for the trigger function used in convective parameterization routines in mesoscale models is proposed. The framework is based on the diagnosis of the accessibility of potential buoyant energy. Specifically, the trigger ...

Robert F. Rogers; J. M. Fritsch

1996-11-01T23:59:59.000Z

279

Toward a Systematic Framework for Deploying Synchrophasors  

E-Print Network (OSTI)

Toward a Systematic Framework for Deploying Synchrophasors and their Utilization for Improving for Deploying Synchrophasors and their Utilization for Improving Performance of Future Electric Energy Systems a Systematic Framework for Deploying Synchrophasors and their Utilization for Improving Performance of Future

280

Metis: a thin-client application framework  

Science Conference Proceedings (OSTI)

This paper introduces a thin-client programming model and then presents an object-oriented framework for developing applications using the model. The programming model and the framework have evolved from interactions with developers and users of commercial ...

Deborra J. Zukowski; Apratim Purakayastha; Ajay Mohindra; Murthy Devarakonda

1997-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Gas adsorption on metal-organic frameworks  

SciTech Connect

The present invention involves the use of certain metal organic frameworks that have been treated with water or another metal titrant in the storage of carbon dioxide. The capacity of these frameworks is significantly increased through this treatment.

Willis, Richard R. (Cary, IL); Low, John J. (Schaumburg, IL), Faheem, Syed A. (Huntley, IL); Benin, Annabelle I. (Oak Forest, IL); Snurr, Randall Q. (Evanston, IL); Yazaydin, Ahmet Ozgur (Evanston, IL)

2012-07-24T23:59:59.000Z

282

A General Framework for Forecast Verification  

Science Conference Proceedings (OSTI)

A general framework for forecast verification based on the joint distribution of forecasts and observations is described. For further elaboration of the framework, two factorizations of the joint distribution are investigated: 1) the calibration-...

Allan H. Murphy; Robert L. Winkler

1987-07-01T23:59:59.000Z

283

The Effects of Slack Resources and Environmental Threat on Product Exploration and Exploitation  

E-Print Network (OSTI)

In a U.S. sample of nonprofit professional theaters, we examine how slack resources interact with environmental threat appraisal to influence product exploration and exploitation. We find systematic variation depending on the extent to which a resource is rare and absorbed in operations, and the extent of perceived environmental threats. Absorbed, generic resources are associated with increased exploitation and decreased exploration. Unabsorbed resources, both generic and rare, result in higher exploration and lower exploitation, but only when perceived environmental threat is high. Overall, results reveal pragmatic decision making balancing the benefits of superior strategic position against the risks of jeopardizing viability. The overall strategic emphasis of an organization is reflected in investments of resources in activities and processes that promote exploration or exploitation (Siggelkow & Levinthal, 2003). Exploration creates novel competencies that enable ongoing innovation and generally results in superior longterm returns (Geroski, Machin, & Van Reenen, 1993). These benefits are balanced by the higher level of risk inherent in exploratory activities, which require significant investments with uncertain payoffs (Gupta, Smith, & Shalley, 2006). Exploitation creates value through existing or minimally modified competencies that sustain longterm viability following successful exploration. Successful exploitation provides a buffer from the shocks of exploration and entails less risk than

Glenn B. Voss; Zannie Giraud Voss

2008-01-01T23:59:59.000Z

284

Coupling measurement and lightning threat assessment report for Pantex Cell 12-44-1  

SciTech Connect

This report is the first of a series that will quantify the lightning threat to the Pantex Plant where high-risk operations occur. More information can be found in the report written by the Lightning Protection Team [1] and Sandia National Laboratory documents. Low-power RF coupling measurements were completed on Cell 12-44-1 in May 1998. These measurements quantify the voltage and current levels that could leak into the cell from possible lightning strike points. Cell 1 is representative of the most ?leaky? class of cells at Pantex because the floor was not intentionally electrically connected to the walls. From the measurement data, linear models were developed. These transfer functions allow us to calculate the effect in the cell from the much higher power lightning threat. Two types of coupling paths were characterized: (1) external ventilation stack to cell interior and (2) cell ceiling to other cell elements. For the maximum lightning threat [2], an estimate of the maximum cell-to-floor voltage is 150 kV. The extrapolated voltage levels at normal working heights are lower. The potential between the air duct and the electro-static ground is estimated to be 4 kV. A secondary goal was to compare results with Sandia as a quality control check. While the estimated maximum ceiling-to-floor voltages are similar, the comparison was limited by high-frequency resonances on the drive wire.

Anderson, R; Ong, M

1998-09-01T23:59:59.000Z

285

Coupling measurement and lightning threat assessment report for Pantex Cell 12-44-1  

SciTech Connect

This report is the first of a series that will quantify the lightning threat to the Pantex Plant where high-risk operations occur. More information can be found in the report written by the Lightning Protection Team [1] and Sandia National Laboratory documents. Low-power RF coupling measurements were completed on Cell 12-44-1 in May 1998. These measurements quantify the voltage and current levels that could leak into the cell from possible lightning strike points. Cell 1 is representative of the most leaky class of cells at Pantex because the floor was not intentionally electrically connected to the walls. From the measurement data, linear models were developed. These transfer functions allow us to calculate the effect in the cell from the much higher power lightning threat. Two types of coupling paths were characterized: (1) external ventilation stack to cell interior and (2) cell ceiling to other cell elements. For the maximum lightning threat [2], an estimate of the maximum cell-to-floor voltage is 150 kV. The extrapolated voltage levels at normal working heights are lower. The potential between the air duct and the electro-static ground is estimated to be 4 kV. A secondary goal was to compare results with Sandia as a quality control check. While the estimated maximum ceiling-to-floor voltages are similar, the comparison was limited by high-frequency resonances on the drive wire.

Anderson, R; Ong, M.

1998-09-01T23:59:59.000Z

286

NICE Cybersecurity Workforce Framework Tutorial  

Science Conference Proceedings (OSTI)

... Conducting Internet searches and collecting documents ... Specialty Area: Systems Security Analysis ... Example Job Titles: Information Assurance ...

2011-10-24T23:59:59.000Z

287

DRAFT Outline - Preliminary Framework to Reduce Cyber ...  

Science Conference Proceedings (OSTI)

Page 1. 1 DRAFT Outline - Preliminary Framework to Reduce Cyber Risks to Critical Infrastructure, July 1, 2013 NOTES ...

2013-07-02T23:59:59.000Z

288

Developing a Framework to Improve Critical Infrastructure ...  

Science Conference Proceedings (OSTI)

... To that end any risk framework ... financial, telecommunications, transportation, energy, chemical, information ... heating and cooling, physical security ...

2013-04-08T23:59:59.000Z

289

DOE Competency Framework | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

managers, and supervisors. DOE Competency Framework More Documents & Publications Federal Employee Training Desk Reference DOE Competency Dictionary DOE General Competencies...

290

Comparison of Novel Microstructure Quantification Frameworks for ...  

Science Conference Proceedings (OSTI)

Bayesian inference of grain boundary properties from heterogeneous data · Comparison of Novel Microstructure Quantification Frameworks for Visualization,  ...

291

The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration, OAS-L-12-01  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Audit and Inspections Audit and Inspections Audit Report The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration OAS-L-12-01 October 2011 Department of Energy Washington, DC 20585 October 25, 2011 MEMORANDUM FOR THE DEPUTY ADMINISTRATOR FOR DEFENSE NUCLEAR NONPROLIFERATION FROM: David Sedillo Director Western Audits Division SUBJECT: INFORMATION: Audit Report on "The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration" BACKGROUND The National Nuclear Security Administration's (NNSA) Office of Defense Nuclear Nonproliferation established the Global Threat Reduction Initiative (GTRI) in May 2004, as a vital part of the efforts to combat nuclear and radiological terrorism. GTRI's mission is to reduce

292

The CloudBrowser web application framework  

Science Conference Proceedings (OSTI)

CloudBrowser is a web application framework that supports the development of rich Internet applications whose entire user interface and application logic resides on the server, while all client/server communication is provided by the framework. CloudBrowser ... Keywords: ajax, cloud applications, paas, remote display, server-centric, web application framework

Brian McDaniel; Godmar Back

2012-10-01T23:59:59.000Z

293

A Statistical Model for Generating a Population of Unclassified Objects and Radiation Signatures Spanning Nuclear Threats  

Science Conference Proceedings (OSTI)

This report describes an approach for generating a simulated population of plausible nuclear threat radiation signatures spanning a range of variability that could be encountered by radiation detection systems. In this approach, we develop a statistical model for generating random instances of smuggled nuclear material. The model is based on physics principles and bounding cases rather than on intelligence information or actual threat device designs. For this initial stage of work, we focus on random models using fissile material and do not address scenarios using non-fissile materials. The model has several uses. It may be used as a component in a radiation detection system performance simulation to generate threat samples for injection studies. It may also be used to generate a threat population to be used for training classification algorithms. In addition, we intend to use this model to generate an unclassified 'benchmark' threat population that can be openly shared with other organizations, including vendors, for use in radiation detection systems performance studies and algorithm development and evaluation activities. We assume that a quantity of fissile material is being smuggled into the country for final assembly and that shielding may have been placed around the fissile material. In terms of radiation signature, a nuclear weapon is basically a quantity of fissile material surrounded by various layers of shielding. Thus, our model of smuggled material is expected to span the space of potential nuclear weapon signatures as well. For computational efficiency, we use a generic 1-dimensional spherical model consisting of a fissile material core surrounded by various layers of shielding. The shielding layers and their configuration are defined such that the model can represent the potential range of attenuation and scattering that might occur. The materials in each layer and the associated parameters are selected from probability distributions that span the range of possibilities. Once an object is generated, its radiation signature is calculated using a 1-dimensional deterministic transport code. Objects that do not make sense based on physics principles or other constraints are rejected. Thus, the model can be used to generate a population of spectral signatures that spans a large space, including smuggled nuclear material and nuclear weapons.

Nelson, K; Sokkappa, P

2008-10-29T23:59:59.000Z

294

A Topological Framework for the Interactive Exploration of Large Scale Turbulent Combustion  

E-Print Network (OSTI)

A Topological Framework for the Interactive Exploration of Large Scale Turbulent Combustion Peer a new topological framework for the analysis of large scale, time-varying, turbulent combustion consumption thresh- olds for an entire time-dependent combustion simulation. By computing augmented merge

Tierny, Julien

295

Development of a framework for truss-braced wing conceptual MDO  

Science Conference Proceedings (OSTI)

The paper describes the development of a multidisciplinary design optimization framework for conceptual design of truss-braced wing configurations. This unconventional configuration requires specialized analysis tools supported by a modular and flexible ... Keywords: Design environment, Framework, MDO, Truss-Braced Wing

Ohad Gur; Manav Bhatia; William H. Mason; Joseph A. Schetz; Rakesh K. Kapania; Taewoo Nam

2011-08-01T23:59:59.000Z

296

The Offline Software Framework of the Pierre Auger Observatory  

E-Print Network (OSTI)

The Pierre Auger Observatory is designed to unveil the nature and the origins of the highest energy cosmic rays. The large and geographically dispersed collaboration of physicists and the wide-ranging collection of simulation and reconstruction tasks pose some special challenges for the offline analysis software. We have designed and implemented a general purpose framework which allows collaborators to contribute algorithms and sequencing instructions to build up the variety of applications they require. The framework includes machinery to manage these user codes, to organize the abundance of user-contributed configuration files, to facilitate multi-format file handling, and to provide access to event and time-dependent detector information which can reside in various data sources. A number of utilities are also provided, including a novel geometry package which allows manipulation of abstract geometrical objects independent of coordinate system choice. The framework is implemented in C++, and takes advantage...

Argiro, S; González, J; Nellen, L; Paul, T; Porter, T A; Prado, L; Roth, M; Ulrich, R; Veberic, D

2007-01-01T23:59:59.000Z

297

The Offline Software Framework of the Pierre Auger Observatory  

E-Print Network (OSTI)

The Pierre Auger Observatory is designed to unveil the nature and the origins of the highest energy cosmic rays. The large and geographically dispersed collaboration of physicists and the wide-ranging collection of simulation and reconstruction tasks pose some special challenges for the offline analysis software. We have designed and implemented a general purpose framework which allows collaborators to contribute algorithms and sequencing instructions to build up the variety of applications they require. The framework includes machinery to manage these user codes, to organize the abundance of user-contributed configuration files, to facilitate multi-format file handling, and to provide access to event and time-dependent detector information which can reside in various data sources. A number of utilities are also provided, including a novel geometry package which allows manipulation of abstract geometrical objects independent of coordinate system choice. The framework is implemented in C++, and takes advantage...

Argiro, S; González, J; Nellen, L; Paul, T; Porter, T A; Roth, M; Ulrich, R; Veberic, D

2005-01-01T23:59:59.000Z

298

Determining the Flight Icing Threat to Aircraft with Single-Layer Cloud Parameters Derived from Operational Satellite Data  

Science Conference Proceedings (OSTI)

An algorithm is developed to determine the flight icing threat to aircraft utilizing quantitative information on clouds derived from meteorological satellite data as input. Algorithm inputs include the satellite-derived cloud-top temperature, ...

William L. Smith Jr.; Patrick Minnis; Cecilia Fleeger; Douglas Spangenberg; Rabindra Palikonda; Louis Nguyen

2012-10-01T23:59:59.000Z

299

What are the security threats to further development of nuclear power plants in the U.S.? .  

E-Print Network (OSTI)

??What are the security threats to further development of nuclear power plants in the U.S.? The U.S. stands alone today in terms of the vast… (more)

Nottestad, Tammie L.

2010-01-01T23:59:59.000Z

300

Network Security Framework: Robustness Strategy  

Science Conference Proceedings (OSTI)

... Effective Key Length Key Management Anti- Tamper TEMPEST TRANSEC Cover & Deception SML1 ... TEMPEST design and analysis ...

1999-11-05T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

The offline software framework of the Pierre Auger Observatory  

SciTech Connect

The Pierre Auger Observatory is designed to unveil the nature and origin of the highest energy cosmic rays through the analysis of extensive air showers. The large and geographically dispersed collaboration of physicists and the wide-ranging collection of simulation and reconstruction tasks pose some special challenges for the offline analysis software. They have designed and implemented a general purpose framework which allows Auger collaborators to contribute algorithms and configuration instructions to build up the variety of applications they require. The framework includes machinery to manage these user codes, to organize the abundance of user-contributed configuration files, to facilitate multi-format file handling, and to provide access to event and time-dependent detector information residing in many data sources. A number of utilities are also provided, including a novel geometry package allowing manipulation of abstract geometrical objects independent of coordinate system choice. The framework is implemented in C++ and takes advantage of object oriented design and common open source tools, while keeping the user-side simple enough for C++ novices to learn in a reasonable time. The distribution system incorporates unit and acceptance testing in order to support rapid development of both the core framework and the contributed user codes.

Argiro, S.; Barroso, S.L.C.; Dagoret-Campagne, S.; Gonzalez, Javier G.; Nellen, L.; Paul, T.; Porter, T.; Prado, L., Jr.; Roth, M.; Ulrich, R.; Veberic, D.

2005-08-01T23:59:59.000Z

302

On symbolic analysis of cryptographic protocols  

E-Print Network (OSTI)

The universally composable symbolic analysis (UCSA) framework layers Dolev-Yao style symbolic analysis on top of the universally composable (UC) secure framework to construct computationally sound proofs of cryptographic ...

Patil, Akshay (Akshay R.)

2005-01-01T23:59:59.000Z

303

A framework for benchmarking land models  

SciTech Connect

Land models, which have been developed by the modeling community in the past few decades to predict future states of ecosystems and climate, have to be critically evaluated for their performance skills of simulating ecosystem responses and feedback to climate change. Benchmarking is an emerging procedure to measure performance of models against a set of defined standards. This paper proposes a benchmarking framework for evaluation of land model performances and, meanwhile, highlights major challenges at this infant stage of benchmark analysis. The framework includes (1) targeted aspects of model performance to be evaluated, (2) a set of benchmarks as defined references to test model performance, (3) metrics to measure and compare performance skills among models so as to identify model strengths and deficiencies, and (4) model improvement. Land models are required to simulate exchange of water, energy, carbon and sometimes other trace gases between the atmosphere and land surface, and should be evaluated for their simulations of biophysical processes, biogeochemical cycles, and vegetation dynamics in response to climate change across broad temporal and spatial scales. Thus, one major challenge is to select and define a limited number of benchmarks to effectively evaluate land model performance. The second challenge is to develop metrics of measuring mismatches between models and benchmarks. The metrics may include (1) a priori thresholds of acceptable model performance and (2) a scoring system to combine data model mismatches for various processes at different temporal and spatial scales. The benchmark analyses should identify clues of weak model performance to guide future development, thus enabling improved predictions of future states of ecosystems and climate. The near-future research effort should be on development of a set of widely acceptable benchmarks that can be used to objectively, effectively, and reliably evaluate fundamental properties of land models to improve their prediction performance skills.

Luo, Yiqi [University of Oklahoma; Randerson, James T. [University of California, Irvine; Hoffman, Forrest [ORNL; Norby, Richard J [ORNL

2012-01-01T23:59:59.000Z

304

A framework for benchmarking land models  

SciTech Connect

Land models, which have been developed by the modeling community in the past few decades to predict future states of ecosystems and climate, have to be critically evaluated for their performance skills of simulating ecosystem responses and feedback to climate change. Benchmarking is an emerging procedure to measure performance of models against a set of defined standards. This paper proposes a benchmarking framework for evaluation of land model performances and, meanwhile, highlights major challenges at this infant stage of benchmark analysis. The framework includes (1) targeted aspects of model performance to be evaluated, (2) a set of benchmarks as defined references to test model performance, (3) metrics to measure and compare performance skills among models so as to identify model strengths and deficiencies, and (4) model improvement. Land models are required to simulate exchange of water, energy, carbon and sometimes other trace gases between the atmosphere and land surface, and should be evaluated for their simulations of biophysical processes, biogeochemical cycles, and vegetation dynamics in response to climate change across broad temporal and spatial scales. Thus, one major challenge is to select and define a limited number of benchmarks to effectively evaluate land model performance. The second challenge is to develop metrics of measuring mismatches between models and benchmarks. The metrics may include (1) a priori thresholds of acceptable model performance and (2) a scoring system to combine data–model mismatches for various processes at different temporal and spatial scales. The benchmark analyses should identify clues of weak model performance to guide future development, thus enabling improved predictions of future states of ecosystems and climate. The near-future research effort should be on development of a set of widely acceptable benchmarks that can be used to objectively, effectively, and reliably evaluate fundamental properties of land models to improve their prediction performance skills.

Luo, Yiqi; Randerson, J.; Abramowitz, G.; Bacour, C.; Blyth, E.; Carvalhais, N.; Ciais, Philippe; Dalmonech, D.; Fisher, J.B.; Fisher, R.; Friedlingstein, P.; Hibbard, Kathleen A.; Hoffman, F. M.; Huntzinger, Deborah; Jones, C.; Koven, C.; Lawrence, David M.; Li, D.J.; Mahecha, M.; Niu, S.L.; Norby, Richard J.; Piao, S.L.; Qi, X.; Peylin, P.; Prentice, I.C.; Riley, William; Reichstein, M.; Schwalm, C.; Wang, Y.; Xia, J. Y.; Zaehle, S.; Zhou, X. H.

2012-10-09T23:59:59.000Z

305

A framework for the architecting of aerospace systems portfolios with commonality  

E-Print Network (OSTI)

(cont.) The framework was applied to three case studies: commonality analysis for a portfolio of future and legacy exploration life support systems, for the historical Saturn launch vehicle portfolio, and for a portfolio ...

Hofstetter, Wilfried Konstantin

2009-01-01T23:59:59.000Z

306

Integrated simulation environment for unmanned autonomous systems: towards a conceptual framework  

Science Conference Proceedings (OSTI)

The paper initiates a comprehensive conceptual framework for an integrated simulation environment for unmanned autonomous systems (UAS) that is capable of supporting the design, analysis, testing, and evaluation from a "system of systems" perspective. ...

M. G. Perhinschi; M. R. Napolitano; S. Tamayo

2010-01-01T23:59:59.000Z

307

Balanced feature matching in probabilistic framework and its application on object localisation  

Science Conference Proceedings (OSTI)

A new algorithm of feature matching is proposed after balancing analysis of adjacency matrix of the matching model in a probabilistic framework. Considering all the interaction of the two feature point sets, a probabilistic model is established and solved ...

Ying Chen; Chunlu Ai

2013-02-01T23:59:59.000Z

308

A general framework for variable aliasing: towards optimal operators for sharing properties  

Science Conference Proceedings (OSTI)

We face the problem of devising optimal unification operators for sharing and linearity analysis of logic programs by abstract interpretation. We propose a new (infinite) domain ShLin? which can be thought of as a general framework from ...

Gianluca Amato; Francesca Scozzari

2002-09-01T23:59:59.000Z

309

A Revised Framework for Analyzing Soil Moisture Memory in Climate Data: Derivation and Interpretation  

Science Conference Proceedings (OSTI)

A revised framework for the analysis of soil moisture memory characteristics of climate models and observational data is derived from the approach proposed by Koster and Suarez. The resulting equation allows the expression of the month-to-month ...

Sonia I. Seneviratne; Randal D. Koster

2012-02-01T23:59:59.000Z

310

GLOBAL THREAT REDUCTION INITIATIVE REACTOR CONVERSION PROGRAM: STATUS AND CURRENT PLANS  

SciTech Connect

The U.S. Department of Energy’s National Nuclear Security Administration (NNSA) Reactor Conversion Program supports the minimization, and to the extent possible, elimination of the use of high enriched uranium (HEU) in civilian nuclear applications by working to convert research and test reactors and radioisotope production processes to the use of low enriched uranium (LEU). The Reactor Conversion Program is a technical pillar of the NNSA Global Threat Reduction Initiative (GTRI) which is a key organization for implementing U.S. HEU minimization policy and works to reduce and protect vulnerable nuclear and radiological material domestically and abroad.

Staples, Parrish A.; Leach, Wayne; Lacey, Jennifer M.

2009-10-07T23:59:59.000Z

311

A Framework for Comparative Assessments of Energy Efficiency Policy Measures  

SciTech Connect

When policy makers propose new policies, there is a need to assess the costs and benefits of the proposed policy measures, to compare them to existing and alternative policies, and to rank them according to their effectiveness. In the case of equipment energy efficiency regulations, comparing the effects of a range of alternative policy measures requires evaluating their effects on consumers’ budgets, on national energy consumption and economics, and on the environment. Such an approach should be able to represent in a single framework the particularities of each policy measure and provide comparable results. This report presents an integrated methodological framework to assess prospectively the energy, economic, and environmental impacts of energy efficiency policy measures. The framework builds on the premise that the comparative assessment of energy efficiency policy measures should (a) rely on a common set of primary data and parameters, (b) follow a single functional approach to estimate the energy, economic, and emissions savings resulting from each assessed measure, and (c) present results through a set of comparable indicators. This framework elaborates on models that the U.S. Department of Energy (DOE) has used in support of its rulemakings on mandatory energy efficiency standards. In addition to a rigorous analysis of the impacts of mandatory standards, DOE compares the projected results of alternative policy measures to those projected to be achieved by the standards. The framework extends such an approach to provide a broad, generic methodology, with no geographic or sectoral limitations, that is useful for evaluating any type of equipment energy efficiency market intervention. The report concludes with a demonstration of how to use the framework to compare the impacts estimated for twelve policy measures focusing on increasing the energy efficiency of gas furnaces in the United States.

Blum, Helcio; Atkinson, Barbara; Lekov, Alex

2011-05-24T23:59:59.000Z

312

Ghana-Support for Future National Climate Change Policy Framework | Open  

Open Energy Info (EERE)

Page Page Edit with form History Facebook icon Twitter icon » Ghana-Support for Future National Climate Change Policy Framework Jump to: navigation, search Name CDKN-Ghana-Support for Future National Climate Change Policy Framework Agency/Company /Organization Climate and Development Knowledge Network (CDKN), United Kingdom Department for International Development Partner Energy Research Centre of the Netherlands (ECN), University of Ghana Sector Climate, Energy, Land Topics Background analysis, Low emission development planning, Pathways analysis Website http://cdkn.org/project/assist Program Start 2010 Program End 2011 Country Ghana UN Region Western Africa References CDKN-Ghana-Support for Future National Climate Change Policy Framework[1] Policy brief[2]

313

Developing a Regulatory Framework for Extended Storage and Transportat...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Storage and Transportation Developing a Regulatory Framework for Extended Storage and Transportation Outline: Current Regulatory Framework Future Regulatory Needs Technical...

314

Microsoft Word - DOE Framework Final.docx  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Washington, D.C. 20585 Washington, D.C. 20585 Hanford Tank Waste Retrieval, Treatment, and Disposition Framework September 24, 2013 Hanford Tank Waste Retrieval, Treatment, and Disposition Framework ii This page intentionally left blank. Hanford Tank Waste Retrieval, Treatment, and Disposition Framework iii CONTENTS 1. Introduction ............................................................................................................................................. 1 Immobilizing Radioactive Tank Waste at the Office of River Protection .................................................. 1 Current System Design ........................................................................................................................... 2 Addressing Technical Risks and Challenges .......................................................................................... 2

315

Enterprise Risk Management (ERM) Framework for Directives  

Directives, Delegations, and Requirements

Explains the new ERM framework for developing, revising, and reviewing directives. This memo directs the Office of Management to institutionalize ERM into the ...

2012-07-09T23:59:59.000Z

316

Building Energy Transparency: A Framework for Implementing.....  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Transparency: A Framework for Implementing... Energy Rating & Disclosure Policy Secondary menu About us Press room Contact Us Portfolio Manager Login Facility owners and...

317

California Evaluation Framework | Building Energy Codes Program  

NLE Websites -- All DOE Office Websites (Extended Search)

those studies. bpCaliforniaEvaluationFramework.pdf Document Details Affiliation: California Public Utilities Commission and the Project Advisory Group Focus: Adoption...

318

Gas sensor incorporating a porous framework  

DOE Patents (OSTI)

The disclosure provides sensor for gas sensing including CO.sub.2 gas sensors comprising a porous framework sensing area for binding an analyte gas.

Yaghi, Omar M.; Czaja, Alexander U.; Wang, Bo; Furukawa, Hiroyasu; Galatsis, Kosmas; Wang, Kang L.

2013-07-09T23:59:59.000Z

319

Metal Organic Frameworks for Clean Energy Applications  

Science Conference Proceedings (OSTI)

Symposium, Materials Issues in Nuclear Waste Management in the 21st Century. Presentation Title, Metal Organic Frameworks for Clean Energy Applications.

320

Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)  

SciTech Connect

In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardware and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.

Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Hauser, Katie R [ORNL; Lantz, Margaret W [ORNL; Mili, Ali [New Jersey Insitute of Technology

2013-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Demand Response Valuation Frameworks Paper  

Science Conference Proceedings (OSTI)

While there is general agreement that demand response (DR) is a valued component in a utility resource plan, there is a lack of consensus regarding how to value DR. Establishing the value of DR is a prerequisite to determining how much and what types of DR should be implemented, to which customers DR should be targeted, and a key determinant that drives the development of economically viable DR consumer technology. Most approaches for quantifying the value of DR focus on changes in utility system revenue requirements based on resource plans with and without DR. This ''utility centric'' approach does not assign any value to DR impacts that lower energy and capacity prices, improve reliability, lower system and network operating costs, produce better air quality, and provide improved customer choice and control. Proper valuation of these benefits requires a different basis for monetization. The review concludes that no single methodology today adequately captures the wide range of benefits and value potentially attributed to DR. To provide a more comprehensive valuation approach, current methods such as the Standard Practice Method (SPM) will most likely have to be supplemented with one or more alternative benefit-valuation approaches. This report provides an updated perspective on the DR valuation framework. It includes an introduction and four chapters that address the key elements of demand response valuation, a comprehensive literature review, and specific research recommendations.

Heffner, Grayson

2009-02-01T23:59:59.000Z

322

The Offline Software Framework of the Pierre Auger Observatory  

E-Print Network (OSTI)

The Pierre Auger Observatory is designed to unveil the nature and the origins of the highest energy cosmic rays. The large and geographically dispersed collaboration of physicists and the wide-ranging collection of simulation and reconstruction tasks pose some special challenges for the offline analysis software. We have designed and implemented a general purpose framework which allows collaborators to contribute algorithms and sequencing instructions to build up the variety of applications they require. The framework includes machinery to manage these user codes, to organize the abundance of user-contributed configuration files, to facilitate multi-format file handling, and to provide access to event and time-dependent detector information which can reside in various data sources. A number of utilities are also provided, including a novel geometry package which allows manipulation of abstract geometrical objects independent of coordinate system choice. The framework is implemented in C++, and takes advantage of object oriented design and common open source tools, while keeping the user side simple enough for C++ novices to learn in a reasonable time. The distribution system incorporates unit and acceptance testing in order to support rapid development of both the core framework and contributed user code.

S. Argiro; S. L. C. Barroso; J. Gonzalez; L. Nellen; T. Paul; T. A. Porter; L. Prado Jr.; M. Roth; R. Ulrich; D. Veberic

2007-07-11T23:59:59.000Z

323

The Offline Software Framework of the Pierre Auger Observatory  

E-Print Network (OSTI)

The Pierre Auger Observatory is designed to unveil the nature and the origins of the highest energy cosmic rays. The large and geographically dispersed collaboration of physicists and the wide-ranging collection of simulation and reconstruction tasks pose some special challenges for the offline analysis software. We have designed and implemented a general purpose framework which allows collaborators to contribute algorithms and sequencing instructions to build up the variety of applications they require. The framework includes machinery to manage these user codes, to organize the abundance of user-contributed configuration files, to facilitate multi-format file handling, and to provide access to event and time-dependent detector information which can reside in various data sources. A number of utilities are also provided, including a novel geometry package which allows manipulation of abstract geometrical objects independent of coordinate system choice. The framework is implemented in C++, and takes advantage of object oriented design and common open source tools, while keeping the user side simple enough for C++ novices to learn in a reasonable time. The distribution system incorporates unit and acceptance testing in order to support rapid development of both the core framework and contributed user code.

S. Argiro; S. L. C Barroso; J. Gonzalez; L. Nellen; T. Paul; T. A. Porter; L. Prado Jr.; M. Roth; R. Ulrich; D. Veberic

2006-01-01T23:59:59.000Z

324

Control and Navigation Framework for Quadrotor Helicopters  

Science Conference Proceedings (OSTI)

This paper presents the development of a nonlinear quadrotor simulation framework together with a nonlinear controller. The quadrotor stabilization and navigation problems are tackled using a nested loops control architecture. A nonlinear Backstepping ... Keywords: Backstepping, Gazebo, Navigation, Nonlinear control, Open dynamics engine, Quadrotor, Simulation framework

Amr Nagaty; Sajad Saeedi; Carl Thibault; Mae Seto; Howard Li

2013-04-01T23:59:59.000Z

325

A Risk Minimization Framework for Information Retrieval  

E-Print Network (OSTI)

A Risk Minimization Framework for Information Retrieval ChengXiang Zhai a John Lafferty b Carnegie Mellon University Abstract This paper presents a probabilistic information retrieval framework of decades of research in information retrieval, many different information retrieval models have been

Lafferty, John

326

A Risk Minimization Framework for Information Retrieval  

E-Print Network (OSTI)

A Risk Minimization Framework for Information Retrieval ChengXiang Zhai a John Lafferty b a University Abstract This paper presents a probabilistic information retrieval framework in which in information retrieval, many different information retrieval models have been proposed and studied. While

Lafferty, John

327

From patterns to frameworks to parallel programs  

Science Conference Proceedings (OSTI)

Object-oriented programming, design patterns, and frameworks are abstraction techniques that have been used to reduce the complexity of sequential programming. This paper describes our approach of applying these three techniques to the more difficult ... Keywords: design patterns, object-oriented frameworks, parallel programming systems

S. MacDonald; J. Anvik; S. Bromling; J. Schaeffer; D. Szafron; K. Tan

2002-12-01T23:59:59.000Z

328

Cellular Energy Efficiency Evaluation Framework (Invited Paper)  

E-Print Network (OSTI)

Cellular Energy Efficiency Evaluation Framework (Invited Paper) Gunther Auer, Vito Giannini, Istv, the power consumption of the entire system needs to be captured and an appropriate energy efficiency evaluation frameworks are discussed, such that the energy efficiency of the entire network comprising

Stevenson, Paul

329

Intelligent Control in Automation Based on Wireless Traffic Analysis  

SciTech Connect

Wireless technology is a central component of many factory automation infrastructures in both the commercial and government sectors, providing connectivity among various components in industrial realms (distributed sensors, machines, mobile process controllers). However wireless technologies provide more threats to computer security than wired environments. The advantageous features of Bluetooth technology resulted in Bluetooth units shipments climbing to five million per week at the end of 2005 [1, 2]. This is why the real-time interpretation and understanding of Bluetooth traffic behavior is critical in both maintaining the integrity of computer systems and increasing the efficient use of this technology in control type applications. Although neuro-fuzzy approaches have been applied to wireless 802.11 behavior analysis in the past, a significantly different Bluetooth protocol framework has not been extensively explored using this technology. This paper presents a new neurofuzzy traffic analysis algorithm of this still new territory of Bluetooth traffic. Further enhancements of this algorithm are presented along with the comparison against the traditional, numerical approach. Through test examples, interesting Bluetooth traffic behavior characteristics were captured, and the comparative elegance of this computationally inexpensive approach was demonstrated. This analysis can be used to provide directions for future development and use of this prevailing technology in various control type applications, as well as making the use of it more secure.

Kurt Derr; Milos Manic

2007-08-01T23:59:59.000Z

330

Intelligent Control in Automation Based on Wireless Traffic Analysis  

SciTech Connect

Wireless technology is a central component of many factory automation infrastructures in both the commercial and government sectors, providing connectivity among various components in industrial realms (distributed sensors, machines, mobile process controllers). However wireless technologies provide more threats to computer security than wired environments. The advantageous features of Bluetooth technology resulted in Bluetooth units shipments climbing to five million per week at the end of 2005 [1, 2]. This is why the real-time interpretation and understanding of Bluetooth traffic behavior is critical in both maintaining the integrity of computer systems and increasing the efficient use of this technology in control type applications. Although neuro-fuzzy approaches have been applied to wireless 802.11 behavior analysis in the past, a significantly different Bluetooth protocol framework has not been extensively explored using this technology. This paper presents a new neurofuzzy traffic analysis algorithm of this still new territory of Bluetooth traffic. Further enhancements of this algorithm are presented along with the comparison against the traditional, numerical approach. Through test examples, interesting Bluetooth traffic behavior characteristics were captured, and the comparative elegance of this computationally inexpensive approach was demonstrated. This analysis can be used to provide directions for future development and use of this prevailing technology in various control type applications, as well as making the use of it more secure.

Kurt Derr; Milos Manic

2007-09-01T23:59:59.000Z

331

A framework for web science  

Science Conference Proceedings (OSTI)

This text sets out a series of approaches to the analysis and synthesis of the World Wide Web, and other web-like information structures. A comprehensive set of research questions is outlined, together with a sub-disciplinary breakdown, emphasising the ...

Tim Berners-Lee; Wendy Hall; James A. Hendler; Kieron O'Hara; Nigel Shadbolt; Daniel J. Weitzner

2006-01-01T23:59:59.000Z

332

Responding to the threat of global warming: Options for the Pacific and Asia  

SciTech Connect

During the past few years, global climate change has rapidly been transformed from an esoteric topic of interest mainly to scientists to one of worldwide concern to policymakers, the business communities, the media, and the general public. In response to this heightened interest, a number of high-level international meetings dealing with this issue have been held in the past two years. With growing recognition that the global climate change phenomenon would result in different regional (and local) effects, a workshop was organized by Argonne National Laboratory and the East-West Center to assess the likely consequences of this threat and the possible remediation options available to the countries of the Pacific Asia. This paper summarizes the deliberations and conclusion of the workshop, which was held at the East-West center in Honolulu, Hawaii, from June 21--27, 1989. 35 refs., 4 figs.

Bhatti, N.; Streets, D.G.; Siddiqi, T.A. (Argonne National Lab., IL (USA); Environment and Policy Inst., Honolulu, HI (USA))

1989-01-01T23:59:59.000Z

333

Does nitrate deposition following astrophysical ionizing radiation events pose an additional threat to amphibians?  

E-Print Network (OSTI)

It is known that amphibians are especially susceptible to the combination of heightened UVB radiation and increased nitrate concentrations. Various astrophysical events have been suggested as sources of ionizing radiation that could pose a threat to life on Earth, through destruction of the ozone layer and subsequent increase in UVB, followed by deposition of nitrate. In this study, we investigate whether the nitrate deposition following an ionizing event is sufficiently large to cause an additional stress beyond that of the heightened UVB previously considered. We have converted predicted nitrate depositions to concentration values, utilizing data from the New York State Department of Environmental Conservation Acid Rain Monitoring Network web site. Our results show that the increase in nitrate concentration in bodies of water following the most intense ionization event likely in the last billion years would not be sufficient to cause a serious additional stress on amphibian populations and may actually provide some benefit by acting as fertilizer.

Brian C. Thomas; Michelle D. Honeyman

2008-04-22T23:59:59.000Z

334

Amphibian nitrate stress as an additional terrestrial threat from astrophysical ionizing radiation events?  

E-Print Network (OSTI)

As diversity in amphibian species declines, the search for causes has intensified. Work in this area has shown that amphibians are especially susceptible to the combination of heightened UVB radiation and increased nitrate concentrations. Various astrophysical events have been suggested as sources of ionizing radiation that could pose a threat to life on Earth, through destruction of the ozone layer and subsequent increase in UVB, followed by deposition of nitrate. In this study, we investigate whether the nitrate deposition following an ionizing event is sufficiently large to cause an additional stress beyond that of the heightened UVB previously considered. We have converted predicted nitrate depositions to concentration values, utilizing data from the New York State Department of Environmental Conservation Acid Rain Monitoring Network web site. Our results show that the increase in nitrate concentration in bodies of water following the most intense ionization event likely in the last billion years would no...

Thomas, Brian C

2008-01-01T23:59:59.000Z

335

Propane Market Outlook Assessment of Key Market Trends, Threats, and Opportunities Facing  

Alternative Fuels and Advanced Vehicles Data Center (EERE)

0 0 Propane Market Outlook Assessment of Key Market Trends, Threats, and Opportunities Facing the Propane Industry Through 2020 P r e s e n T e d B y : Declining Sales in the Recent Past and Near-Term Future After peaking in 2003, nationwide propane consumption fell by more than 10 percent through 2006. Although propane demand rebounded somewhat in 2007 and 2008 due to colder weather, propane demand appears to have declined again in 2009. The collapse of the new housing market, combined with decreases in fuel use per customer resulting from efficiency upgrades in homes and equipment, resulted in a decline in residential propane sales. The recession also reduced demand in the industrial and commercial sectors. Colder weather in the last half of 2009 and in January

336

A novel ball detection framework for real soccer video  

E-Print Network (OSTI)

Despite a lot of research efforts in sports video analysis, soccer video indexing remains a challenging task due to the lack of structure in a soccer game that could help in structure analysis. In particular, little work was done in detecting and tracking the ball whose trajectory could play a crucial role for detecting key events. We propose a novel framework for accurately detecting the ball for broadcast soccer video. Our framework combines both direct and indirect insights to identify the ball rather than conventional simple template matching methods. It has three key components. First we infer the ball size range from the player size. Next non-ball objects are removed to reduce the possible ball candidates. Last but not least, a Kalman filer-based procedure mines candidate trajectories in candidate feature images. Then, a procedure selects the reliable ball trajectories from them. The experimental results on two 1000-frame sequences confirm that the proposed framework is very effective and obtain a better result than existing methods. 1.

Xinguo Yu; Qi Tian; Kong Wah Wan

2003-01-01T23:59:59.000Z

337

The Framework for Approximate Queries on Simulation Data  

SciTech Connect

AQSim is a system intended to enable scientists to query and analyze a large volume of scientific simulation data. The system uses the state of the art in approximate query processing techniques to build a novel framework for progressive data analysis. These techniques are used to define a multi-resolution index, where each node contains multiple models of the data. The benefits of these models are two-fold: (1) they are compact representations, reconstructing only the information relevant to the analysis, and (2) the variety of models capture different aspects of the data which may be of interest to the user but are not readily apparent in their raw form. To be able to deal with the data interactively, AQSim allows the scientist to make an informed tradeoff between query response accuracy and time. In this paper, we present the framework of AQSim with a focus on its architectural design. We also show the results from an initial proof-of-concept prototype developed at LLNL. The presented framework is generic enough to handle more than just simulation data.

Abdulla, G; Baldwin, C; Critchlow, T; Kamimura, R; Lee, B; Musick, R; Snapp, R; Tang, N

2001-09-27T23:59:59.000Z

338

An expert system framework for nondestructive waste assay  

Science Conference Proceedings (OSTI)

Management and disposition of transuranic (RU) waste forms necessitates determining entrained RU and associated radioactive material quantities as per National RU Waste Characterization Program requirements. Technical justification and demonstration of a given NDA method used to determine RU mass and uncertainty in accordance with program quality assurance is difficult for many waste forms. Difficulties are typically founded in waste NDA methods that employ standards compensation and/or employment of simplifying assumptions on waste form configurations. Capability to determine and justify RU mass and mass uncertainty can be enhanced through integration of waste container data/information using expert system and empirical data-driven techniques with conventional data acquisition and analysis. Presented is a preliminary expert system framework that integrates the waste form data base, alogrithmic techniques, statistical analyses, expert domain knowledge bases, and empirical artificial intelligence modules into a cohesive system. The framework design and bases in addition to module development activities are discussed.

Becker, G.K.

1996-10-01T23:59:59.000Z

339

CDKN-Ghana-Support for Future National Climate Change Policy Framework |  

Open Energy Info (EERE)

Support for Future National Climate Change Policy Framework Support for Future National Climate Change Policy Framework Jump to: navigation, search Name CDKN-Ghana-Support for Future National Climate Change Policy Framework Agency/Company /Organization Climate and Development Knowledge Network (CDKN), United Kingdom Department for International Development Partner Energy Research Centre of the Netherlands (ECN), University of Ghana Sector Climate, Energy, Land Topics Background analysis, Low emission development planning, Pathways analysis Website http://cdkn.org/project/assist Program Start 2010 Program End 2011 Country Ghana UN Region Western Africa References CDKN-Ghana-Support for Future National Climate Change Policy Framework[1] Policy brief[2] "CDKN responded to a request by the Government of Ghana to help develop a

340

International Experiences and Frameworks to Support Country-Driven Low-Emissions Development  

SciTech Connect

Countries can use low-emission development strategies (LEDS) to advance sustainable development, promote private-sector growth, and reduce greenhouse gas emissions. This paper proposes a framework -- or support infrastructure -- to enable the efficient exchange of LEDS-related knowledge and technical assistance. Under the proposed framework, countries share LEDS-related resources via coordinating forums, 'knowledge platforms,' and networks of experts and investors. The virtual 'knowledge platforms' foster learning by allowing countries to communicate with each other and share technical reports, data, and analysis tools in support of LEDS development. Investing in all elements of the framework in an integrated fashion increases the efficacy of support for country-driven LEDS.

Benioff, R.; Cochran, J.; Cox, S.

2012-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Interoperability Context-Setting Framework  

SciTech Connect

As the deployment of automation technology advances, it touches upon many areas of our corporate and personal lives. A trend is emerging where systems are growing to the extent that integration is taking place with other systems to provide even greater capabilities more efficiently and effectively. GridWise™ provides a vision for this type of integration as it applies to the electric system. Imagine a time in the not too distant future when homeowners can offer the management of their electricity demand to participate in a more efficient and environmentally friendly operation of the electric power grid. They will do this using technology that acts on their behalf in response to information from other components of the electric system. This technology will recognize their preferences to parameters such as comfort and the price of energy to form responses that optimize the local need to a signal that satisfies a higher-level need in the grid. For example, consider a particularly hot day with air stagnation in an area with a significant dependence on wind generation. To manage the forecasted peak electricity demand, the bulk system operator issues a critical peak price warning. Their automation systems alert electric service providers who distribute electricity from the wholesale electricity system to consumers. In response, the electric service providers use their automation systems to inform consumers of impending price increases for electricity. This information is passed to an energy management system at the premises, which acts on the homeowner’s behalf, to adjust the electricity usage of the onsite equipment (which might include generation from such sources as a fuel cell). The objective of such a system is to honor the agreement with the electricity service provider and reduce the homeowner’s bill while keeping the occupants as comfortable as possible. This will include actions such as moving the thermostat on the heating, ventilation, and air-conditioning (HVAC) unit up several degrees. The resulting load reduction becomes part of an aggregated response from the electricity service provider to the bulk system operator who is now in a better position to manage total system load with available generation. Looking across the electric system, from generating plants, to transmission substations, to the distribution system, to factories, office parks, and buildings, automation is growing, and the opportunities for unleashing new value propositions are exciting. How can we facilitate this change and do so in a way that ensures the reliability of electric resources for the wellbeing of our economy and security? The GridWise Architecture Council (GWAC) mission is to enable interoperability among the many entities that interact with the electric power system. A good definition of interoperability is, “The capability of two or more networks, systems, devices, applications, or components to exchange information between them and to use the information so exchanged.” As a step in the direction of enabling interoperability, the GWAC proposes a context-setting framework to organize concepts and terminology so that interoperability issues can be identified and debated, improvements to address issues articulated, and actions prioritized and coordinated across the electric power community.

Widergren, Steven E.; Hardin, Dave; Ambrosio, Ron; Drummond, R.; Gunther, E.; Gilchrist, Grant; Cohen, David

2007-01-31T23:59:59.000Z

342

Program on Technology Innovation: EPRI Framework for Assessment of Nuclear Fuel Cycle Options  

Science Conference Proceedings (OSTI)

EPRI is building a suite of tools for assessing nuclear fuel cycle options based on a platform of software, simplified relationships, and explicit decision-making and evaluation guidelines. This report describes a decision-support framework for assembling and structuring information for transparent auditable assessments as well as knowledge capture and transfer.The EPRI framework comprises evaluation and analysis at strategic, tactical, and readiness levels in regard to transformational ...

2013-03-28T23:59:59.000Z

343

A proposed open cognitive architecture framework  

Science Conference Proceedings (OSTI)

This paper describes a proposed general-purpose cognitive architecture known as the Open Cognitive Architecture Framework (OpenCAF) capable of representing complex intelligent behavior for a variety of applications. This new cognitive architecture ...

Jeffrey S. Steinman; Craig N. Lammers; Maria E. Valinski

2009-12-01T23:59:59.000Z

344

IDebug: An Advanced Debugging Framework for Java  

E-Print Network (OSTI)

IDebug, the Infospheres debugging framework, is an advanced debugging framework for Java. This framework provides the standard core debugging and specification constructs such as assertions, debug levels and categories, stack traces, and specialized exceptions. Debugging functionality can be fine-tuned to a per-thread and/or a per-class basis, debugging contexts can be stored to and recovered from persistent storage, and several aspects of the debugging run-time are configurable at the meta-level. Additionally, the framework is designed for extensibility. Planned improvements include support for debugging distributed object systems via currying call stacks across virtual machine contexts and debug information logging with a variety of networking media including unicast, multicast, RMI, distributed events, and JavaSpaces. Finally, we are adding support for debugging mobile agent systems by providing mobile debug logs. 1 Introduction Programming technologies have evolved greatly over th...

Joseph R. Kiniry

1998-01-01T23:59:59.000Z

345

A Bayesian Framework for Multimodel Regression  

Science Conference Proceedings (OSTI)

This paper presents a framework based on Bayesian regression and constrained least squares methods for incorporating prior beliefs in a linear regression problem. Prior beliefs are essential in regression theory when the number of predictors is ...

Timothy DelSole

2007-06-01T23:59:59.000Z

346

Netgauge: a network performance measurement framework  

Science Conference Proceedings (OSTI)

This paper introduces Netgauge, an extensible open-source framework for implementing network benchmarks. The structure of Netgauge abstracts and explicitly separates communication patterns from communication modules. As a result of this separation of ...

Torsten Hoefler; Torsten Mehlan; Andrew Lumsdaine; Wolfgang Rehm

2007-09-01T23:59:59.000Z

347

A hierarchical systems knowledge representation framework  

E-Print Network (OSTI)

We present the design and implementation of a framework for storing and analysing knowledge about engineering systems. The hierarchical entity-relation-attribute model is useful for large data sets, in which it can abstract ...

Sylvester, Igor Andrade

2007-01-01T23:59:59.000Z

348

Flexible Residential Smart Grid Simulation Framework  

E-Print Network (OSTI)

Different scheduling and coordination algorithms controlling household appliances’ operations can potentially lead to energy consumption reduction and/or load balancing in conjunction with different electricity pricing methods used in smart grid programs. In order to easily implement different algorithms and evaluate their efficiency against other ideas, a flexible simulation framework is desirable in both research and business fields. However, such a platform is currently lacking or underdeveloped. In this thesis, we provide a simulation framework to focus on demand side residential energy consumption coordination in response to different pricing methods. This simulation framework, equipped with an appliance consumption library using realistic values, aims to closely represent the average usage of different types of appliances. The simulation results of traditional usage yield close matching values compared to surveyed real life consumption records. Several sample coordination algorithms, pricing schemes, and communication scenarios are also implemented to illustrate the use of the simulation framework.

Wang Xiang; Thomas Kunz; Marc St-hilaire; Wang Xiang

2013-01-01T23:59:59.000Z

349

A flexible design framework for autonomous mowing  

E-Print Network (OSTI)

This work outlines the creation of a flexible design framework for autonomous mowing to meet changing customer needs and functionality across a spectrum of applications from residential areas to sport complexes. The thesis ...

Kraft, Justin (Justin A.)

2011-01-01T23:59:59.000Z

350

Aranea: web framework construction and integration kit  

Science Conference Proceedings (OSTI)

Currently there exist dozens of web controller frameworks that are incompatible, but at the same time have large portions of overlapping functionality that is implemented over and over again. Web programmers are facing limitations on code reuse, application ...

Oleg Mürk; Jevgeni Kabanov

2006-08-01T23:59:59.000Z

351

The Sensitivity of the Number of Correctly Forecasted Events to the Threat Score:A Practical Application  

Science Conference Proceedings (OSTI)

The sensitivity (S) of the number of correctly forecast events (“hits”) to changes in threat score is explored. An emphasis is placed on the practical utility of S for end users of operational systems who may need to further assess a system's ...

Joby L. Hilliker

2004-06-01T23:59:59.000Z

352

A general framework for semantics-based bottom-up abstract interpretation of logic programs  

Science Conference Proceedings (OSTI)

The theory of abstract interpretation provides a formal framework to develop advanced dataflow analysis tools. The idea is to define a nonstandard semantics which is able to compute, in finite time, an approximated model of the program. In this paper, ... Keywords: abstract interpretation, logic programming, program analysis

Roberto Barbuti; Roberto Giacobazzi; Giorgio Levi

1993-01-01T23:59:59.000Z

353

A framework for estimating NBTI degradation of microarchitectural components  

Science Conference Proceedings (OSTI)

Degradation of device parameters over the lifetime of a system is emerging as a significant threat to system reliability. Among the aging mechanisms, wearout resulting from NBTI is of particular concern in deep submicron technology generations. To facilitate ...

Michael DeBole; K. Ramakrishnan; Varsha Balakrishnan; Wenping Wang; Hong Luo; Yu Wang; Yuan Xie; Yu Cao; N. Vijaykrishnan

2009-01-01T23:59:59.000Z

354

International Framework for Nuclear Energy Cooperation to Hold...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for Nuclear Energy Cooperation to Hold Ministerial-Level Meeting Sept. 29 in Warsaw, Poland International Framework for Nuclear Energy Cooperation to Hold...

355

A Systems Framework for Assessing Plumbing Products-Related Water...  

NLE Websites -- All DOE Office Websites (Extended Search)

A Systems Framework for Assessing Plumbing Products-Related Water Conservation Title A Systems Framework for Assessing Plumbing Products-Related Water Conservation Publication Type...

356

A Framework for Comparative Assessments of Energy Efficiency...  

NLE Websites -- All DOE Office Websites (Extended Search)

A Framework for Comparative Assessments of Energy Efficiency Policy Measures Title A Framework for Comparative Assessments of Energy Efficiency Policy Measures Publication Type...

357

A Methodological Framework for Comparative Assessments of Equipment...  

NLE Websites -- All DOE Office Websites (Extended Search)

Methodological Framework for Comparative Assessments of Equipment Energy Efficiency Policy Measures Title A Methodological Framework for Comparative Assessments of Equipment Energy...

358

Security Framework for Control System Data Classification and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for Control System Data Classification and Protection Security Framework for Control System Data Classification and Protection This document presents a data...

359

3rd Cybersecurity Framework Workshop - July 10-12 2013 ...  

Science Conference Proceedings (OSTI)

... Cybersecurity Framework, July 1, 2013 The purpose of this document is to define the overall Framework and provide guidance on its usage. ...

2013-07-19T23:59:59.000Z

360

Deputy Secretary Poneman to Attend International Framework for...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to Attend International Framework for Nuclear Energy Cooperation Meeting in Jordan Deputy Secretary Poneman to Attend International Framework for Nuclear Energy Cooperation Meeting...

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Recovery Act: Smart Grid Interoperability Standards and Framework...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Act: Smart Grid Interoperability Standards and Framework Recovery Act: Smart Grid Interoperability Standards and Framework Congressional Testimony Recovery Act Recovery Act...

362

Framework Application for Core Edge Transport Simulation (FACETS)  

SciTech Connect

The goal of the FACETS project (Framework Application for Core-Edge Transport Simulations) was to provide a multiphysics, parallel framework application (FACETS) that will enable whole-device modeling for the U.S. fusion program, to provide the modeling infrastructure needed for ITER, the next step fusion confinement device. Through use of modern computational methods, including component technology and object oriented design, FACETS is able to switch from one model to another for a given aspect of the physics in a flexible manner. This enables use of simplified models for rapid turnaround or high-fidelity models that can take advantage of the largest supercomputer hardware. FACETS does so in a heterogeneous parallel context, where different parts of the application execute in parallel by utilizing task farming, domain decomposition, and/or pipelining as needed and applicable. ParaTools, Inc. was tasked with supporting the performance analysis and tuning of the FACETS components and framework in order to achieve the parallel scaling goals of the project. The TAU Performance System�������������������������������® was used for instrumentation, measurement, archiving, and profile / tracing analysis. ParaTools, Inc. also assisted in FACETS performance engineering efforts. Through the use of the TAU Performance System, ParaTools provided instrumentation, measurement, analysis and archival support for the FACETS project. Performance optimization of key components has yielded significant performance speedups. TAU was integrated into the FACETS build for both the full coupled application and the UEDGE component. The performance database provided archival storage of the performance regression testing data generated by the project, and helped to track improvements in the software development.

Dr. Allen D. Malony; Dr. Sameer S. Shende; Dr. Kevin A. Huck; Mr. Alan Morris, and Mr. Wyatt Spear

2012-03-14T23:59:59.000Z

363

Threat of a sinkhole: A reevaluation of Cavern 4, Bayou Choctaw salt dome, Louisiana  

Science Conference Proceedings (OSTI)

Cavern Lake at Bayou Choctaw salt dome resulted from the failure of Cavern 7 in 1954. Uncontrolled solutioning of this cavern through the thin caprock had set the stage for overburden to collapse into the cavern below. A similar situation developed with nearby Cavern 4, but with less dissolutioning of the caprock. Because pressure loss was already a problem and because another 800 ft diameter lake would have endangered surface operations, solutioning of Cavern 4 was stopped and the cavern abandoned in 1957 in order to protect the already-small site. In 1978 the Strategic Petroleum Reserve (SPR) acquired a number of caverns at Bayou Choctaw, including Cavern 4, and the possible repeat of the Cavern 7 failure and formation of another lake thus became an issue. The cavern dimensions were re-sonared in 1980 for comparison with 1963 and 1977 surveys. Annual surface leveling between 1982--1992 showed less subsidence occurring than the site average, and a cavern monitoring system, installed in 1984, has revealed no anomalous motion. Repeat sonar surveys in 1992 showed very little, if any, change occurred since 1980 although a small amount of uncertainty exists as a result of changing sonar techniques. We conclude that significant additional solutioning or erosion of the caprock has not occurred and that there is no increased threat to SPR operations.

Neal, J.T.; Todd, J.L.; Linn, J.K. [Sandia National Labs., Albuquerque, NM (United States); Magorian, T.R. [Magorian (Thomas R.), Amherst, NY (United States)

1993-09-01T23:59:59.000Z

364

Identifying at-risk employees: A behavioral model for predicting potential insider threats  

SciTech Connect

A psychosocial model was developed to assess an employee’s behavior associated with an increased risk of insider abuse. The model is based on case studies and research literature on factors/correlates associated with precursor behavioral manifestations of individuals committing insider crimes. In many of these crimes, managers and other coworkers observed that the offenders had exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers to using such psychosocial indicators include the inability to recognize the signs and the failure to record the behaviors so that they could be assessed by a person experienced in psychosocial evaluations. We have developed a model using a Bayesian belief network with the help of human resources staff, experienced in evaluating behaviors in staff. We conducted an experiment to assess its agreement with human resources and management professionals, with positive results. If implemented in an operational setting, the model would be part of a set of management tools for employee assessment that can raise an alarm about employees who pose higher insider threat risks. In separate work, we combine this psychosocial model’s assessment with computer workstation behavior to raise the efficacy of recognizing an insider crime in the making.

Greitzer, Frank L.; Kangas, Lars J.; Noonan, Christine F.; Dalton, Angela C.

2010-09-01T23:59:59.000Z

365

An overview of the global threat reduction initiative's physical protection work in Tanzania.  

SciTech Connect

The U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) established the Global Threat Reduction Initiative's (GTRI) mission to reduce and protect nuclear and radiological materials located at civilian sites worldwide. Internationally, over 80 countries are cooperating with GTRI to enhance security of facilities with these materials. In 2004, a GTRI delegation began working with the Tanzania Atomic Energy Commission, (TAEC). The team conducted site assessments for the physical protection of radiological materials in Tanzania. Today, GTRI and the Government of Tanzania continue cooperative efforts to enhance physical security at several radiological sites, including a central sealed-source storage facility, and sites in the cities of Arusha, Dar Es Salaam, and Tanga. This paper describes the scope of physical protection work, lessons learned, and plans for future cooperation between the GTRI program and the TAEC. Additionally the paper will review the cooperative efforts between TAEC and the International Atomic Energy Agency (IAEA) with regards to a remote monitoring system at a storage facility and to the repackaging of radioactive sources.

Banzi, Firmi Paul (Tanzania Atomic Energy Commission Arusha, United Republic of Tanzania); Itamura, Michael Takeshi (U.S. Department of Energy National Nuclear Security Administration, Washington, DC); Robinson, Phillip W. (U.S. Department of Energy National Nuclear Security Administration, Washington, DC); Strosinski, Micheal Vernon

2010-06-01T23:59:59.000Z

366

Underwater Threat Source Localization: Processing Sensor Network TDOAs with a Terascale Optical Core Device  

Science Conference Proceedings (OSTI)

Revolutionary computing technologies are defined in terms of technological breakthroughs, which leapfrog over near-term projected advances in conventional hardware and software to produce paradigm shifts in computational science. For underwater threat source localization using information provided by a dynamical sensor network, one of the most promising computational advances builds upon the emergence of digital optical-core devices. In this article, we present initial results of sensor network calculations that focus on the concept of signal wavefront time-difference-of-arrival (TDOA). The corresponding algorithms are implemented on the EnLight processing platform recently introduced by Lenslet Laboratories. This tera-scale digital optical core processor is optimized for array operations, which it performs in a fixed-point-arithmetic architecture. Our results (i) illustrate the ability to reach the required accuracy in the TDOA computation, and (ii) demonstrate that a considerable speed-up can be achieved when using the EnLight 64a prototype processor as compared to a dual Intel XeonTM processor.

Barhen, Jacob [ORNL; Imam, Neena [ORNL

2007-01-01T23:59:59.000Z

367

The need for carbon dioxide disposal: A threat and an opportunity  

SciTech Connect

Ready energy is a cornerstone of modern society. The policies outlined at the recent Kyoto conference have put in question the largest, most readily available and most cost-effective energy resource available. Even if a doubling of atmospheric CO{sub 2} is deemed acceptable, emission reductions worldwide would have to be drastic. For 10 billion people to share equally into the 1990 emission level would allow a per capita emission of 10% of the current US level. Substantial reductions in CO{sub 2} emissions to the atmosphere are unavoidable. Uncertain is the time available to accomplish this reduction. There are also reasons to be optimistic about the future of coal and other fossil fuels. Barring a surprise technological breakthrough in alternative energies, fossil energy consumption is bound to grow. Political and economic drivers even stronger than the threat of climate change favor economic growth and therefore increased energy consumption. To resolve this apparent contradiction requires new technologies that prevent CO{sub 2} generated by combustion from entering the atmosphere. The authors will outline available technologies and show how the coal industry can adapt to them.

Lackner, K.S.; Butt, D.P.; Wendt, C.H.

1998-08-01T23:59:59.000Z

368

Introduction to Framework | Open Energy Information  

Open Energy Info (EERE)

Introduction to Framework Introduction to Framework (Redirected from Introduction to Methodology) Jump to: navigation, search Stage 1 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other

369

Introduction to Framework | Open Energy Information  

Open Energy Info (EERE)

Introduction to Framework Introduction to Framework Jump to: navigation, search Stage 1 LEDS Home Introduction to Framework Assess current country plans, policies, practices, and capacities Develop_BAU Stage 4: Prioritizing and Planning for Actions Begin execution of implementation plans 1.0. Organizing the LEDS Process 1.1. Institutional Structure for LEDS 1.2. Workplan to Develop the LEDS 1.3. Roles and responsibilities to develop LEDS 2.1. Assess current country plans, policies, practices, and capacities 2.2. Compile lessons learned and good practices from ongoing and previous sustainable development efforts in the country 2.3. Assess public and private sector capacity to support initiatives 2.4. Assess and improve the national GHG inventory and other economic and resource data as needed for LEDS development

370

A Probabilistic Framework for Discriminative Dictionary Learning  

E-Print Network (OSTI)

In this paper, we address the problem of discriminative dictionary learning (DDL), where sparse linear representation and classification are combined in a probabilistic framework. As such, a single discriminative dictionary and linear binary classifiers are learned jointly. By encoding sparse representation and discriminative classification models in a MAP setting, we propose a general optimization framework that allows for a data-driven tradeoff between faithful representation and accurate classification. As opposed to previous work, our learning methodology is capable of incorporating a diverse family of classification cost functions (including those used in popular boosting methods), while avoiding the need for involved optimization techniques. We show that DDL can be solved by a sequence of updates that make use of well-known and well-studied sparse coding and dictionary learning algorithms from the literature. To validate our DDL framework, we apply it to digit classification and face recognition and tes...

Ghanem, Bernard

2011-01-01T23:59:59.000Z

371

Complete Security Framework for Wireless Sensor Networks  

E-Print Network (OSTI)

Security concern for a Sensor Networks and level of security desired may differ according to application specific needs where the sensor networks are deployed. Till now, most of the security solutions proposed for sensor networks are layer wise i.e a particular solution is applicable to single layer itself. So, to integrate them all is a new research challenge. In this paper we took up the challenge and have proposed an integrated comprehensive security framework that will provide security services for all services of sensor network. We have added one extra component i.e. Intelligent Security Agent (ISA) to assess level of security and cross layer interactions. This framework has many components like Intrusion Detection System, Trust Framework, Key Management scheme and Link layer communication protocol. We have also tested it on three different application scenarios in Castalia and Omnet++ simulator.

Sharma, Kalpana; Kuldeep,

2009-01-01T23:59:59.000Z

372

Modular analysis and modelling of risk scenarios with dependencies  

Science Conference Proceedings (OSTI)

The risk analysis of critical infrastructures such as the electric power supply or telecommunications is complicated by the fact that such infrastructures are mutually dependent. We propose a modular approach to the modelling and analysis of risk scenarios ... Keywords: Critical infrastructure, Dependency, Modular risk analysis, Risk scenario, Threat modelling

Gyrd Brændeland; Atle Refsdal; Ketil Stølen

2010-10-01T23:59:59.000Z

373

Energy and Greenhouse Impacts of Biofuels: A Framework for Analysis  

E-Print Network (OSTI)

and in the fifth, nuclear fission a correlation exists, butR&D (2002 $m) Patents Nuclear Fission Nuclear Fusion R&D (

Kammen, Daniel M.; Farrell, Alexander E.; Plevin, Richard J.; Jones, Andrew D.; Nemet, Gregory F.; Delucchi, Mark A.

2008-01-01T23:59:59.000Z

374

A framework and analysis for cooperative search using UAV swarms  

Science Conference Proceedings (OSTI)

We design and analyze the performance of cooperative search strategies for unmanned aerial vehicles (UAVs) searching for moving, possibly evading, targets in a hazardous environment. Rather than engaging in independent sensing missions, the sensing agents ... Keywords: UAV swarms, adaptive systems, cooperative robots, path and motion planning

Patrick Vincent; Izhak Rubin

2004-03-01T23:59:59.000Z

375

An enhanced framework of subjective logic for semantic document analysis  

Science Conference Proceedings (OSTI)

Unlike propositional logic which works on truth or falsity of statements, human judgements are subjective in nature having certain degree of uncertainty. Two different people will analyse and interpret a document in two different ways based on their ...

Sukanya Manna; B. Sumudu. U. Mendis; Tom Gedeon

2010-10-01T23:59:59.000Z

376

A Framework for Analysis of Energy-Water Interdependency Problems  

SciTech Connect

The overall objective of this work is to improve the holistic value of energy development strategies by integrating management criteria for water availability, water quality, and ecosystem health into the energy system planning process. The Snake River Basin (SRB) in southern Idaho is used as a case study to show options for improving full economic utilization of aquatic resources given multiple scenarios such as changing climate, additional regulations, and increasing population. Through the incorporation of multiple management criteria, potential crosscutting solutions to energy and water issues in the SRB can be developed. The final result of this work will be a multi-criteria decision support tool - usable by policy makers and researchers alike - that will give insight into the behavior of the management criteria over time and will allow the user to experiment with a range of potential solutions. Because several basins in the arid west are dealing with similar water, energy, and ecosystem issues, the tool and conclusions will be transferrable to a wide range of locations and applications. This is a very large project to be completed in phases. This paper deals with interactions between the hydrologic system and water use at a basin level. Future work will include the interdependency between energy use and water use in these systems.

Robert Jeffers; Jacob J. Jacobson; Kristyn Scott

2011-07-01T23:59:59.000Z

377

An Analysis Framework for Evaluation of Traffic Compliance Measures  

E-Print Network (OSTI)

must make it beyond the street light on the left before thepath vehicle passes the street light on the right, or themust make it beyond the street light on the left before the

Campbell, Robert Jay

2012-01-01T23:59:59.000Z

378

A COMPUTATIONAL FRAMEWORK FOR THE DESIGN AND ANALYSIS OF  

E-Print Network (OSTI)

Chennai ­ 600036 June 2012 #12;i ABSTRACT Vertical Axis Wind Turbines (VAWT) are ideal options for small scale generation of electricity from wind. Savonius, one of the widely developed and used VAWTs

Ramu, Palaniappan

379

Sensor network calculus – a framework for worst case analysis  

Science Conference Proceedings (OSTI)

To our knowledge, at the time of writing no methodology exists to dimension a sensor network so that a worst case traffic scenario can be definitely supported. In this paper, the well known network calculus is tailored so that it can be used as a tool ...

Jens B. Schmitt; Utz Roedig

2005-06-01T23:59:59.000Z

380

Energy and Greenhouse Impacts of Biofuels: A Framework for Analysis  

E-Print Network (OSTI)

in the Manufacture of Corn Ethanol." National Corn GrowersThermodynamics of the Corn-Ethanol Biofuel Cycle." CriticalNet Energy Balance of Corn-Ethanol. Corn Utilization and

Kammen, Daniel M.; Farrell, Alexander E.; Plevin, Richard J.; Jones, Andrew D.; Nemet, Gregory F.; Delucchi, Mark A.

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

A framework for jitter analysis in cell based multiplexers  

Science Conference Proceedings (OSTI)

Keywords: ATM, B-ISDN, cell based networks, cell delay variation, discrete time queues, jitter, periodic arrivals, statistical multiplexing

Chatschik Bisdikian; Wassim Matragi; Khosrow Sohraby

1995-05-01T23:59:59.000Z

382

CIMS: a framework for infrastructure interdependency modeling and analysis  

Science Conference Proceedings (OSTI)

Today's society relies greatly upon an array of complex national and international infrastructure networks, such as transportation, utilities, telecommunication, and even financial networks. While modeling and simulation tools have provided insight into ...

Donald D. Dudenhoeffer; May R. Permann; Milos Manic

2006-12-01T23:59:59.000Z

383

Energy and Greenhouse Impacts of Biofuels: A Framework for Analysis  

E-Print Network (OSTI)

Conversion) - GHG Emissions - Biodiversity Biofuel Production Inputs Export Animal Feed Other (chemicals,

Kammen, Daniel M.; Farrell, Alexander E.; Plevin, Richard J.; Jones, Andrew D.; Nemet, Gregory F.; Delucchi, Mark A.

2008-01-01T23:59:59.000Z

384

Energy and Greenhouse Impacts of Biofuels: A Framework for Analysis  

E-Print Network (OSTI)

The rapid rise in biofuel production is driven by governmentprices. Globally, biofuel production is dominated bysoybeans) and current biofuel production processes are many

Kammen, Daniel M.; Farrell, Alexander E.; Plevin, Richard J.; Jones, Andrew D.; Nemet, Gregory F.; Delucchi, Mark A.

2008-01-01T23:59:59.000Z

385

A Framework for Analysis of Energy-Water Interdependency Problems  

DOE Green Energy (OSTI)

The overall objective of this work is to improve the holistic value of energy development strategies by integrating management criteria for water availability, water quality, and ecosystem health into the energy system planning process. The Snake River Basin (SRB) in southern Idaho is used as a case study to show options for improving full economic utilization of aquatic resources given multiple scenarios such as changing climate, additional regulations, and increasing population. Through the incorporation of multiple management criteria, potential crosscutting solutions to energy and water issues in the SRB can be developed. The final result of this work will be a multi-criteria decision support tool - usable by policy makers and researchers alike - that will give insight into the behavior of the management criteria over time and will allow the user to experiment with a range of potential solutions. Because several basins in the arid west are dealing with similar water, energy, and ecosystem issues, the tool and conclusions will be transferable to a wide range of locations and applications. This is a very large, multi-year project to be completed in phases. This paper deals with interactions between the hydrologic system and water use at a basin level. Future work will include the interdependency between energy use and water use in these systems.

Robert F. Jeffers; Jacob J. Jacobson

2011-08-01T23:59:59.000Z

386

Analysis of sourcing & procurement practices : a cross industry framework  

E-Print Network (OSTI)

This thesis presents and analyzes the various practices in the functional area of Sourcing and Procurement. The 21 firms that are studied operate in one of the following industries: Aerospace, Apparel/ Footwear, Automotive, ...

Koliousis, Ioannis G

2006-01-01T23:59:59.000Z

387

Energy and Greenhouse Impacts of Biofuels: A Framework for Analysis  

E-Print Network (OSTI)

Crop Production (farming) Inputs Water Pesticides Fertilizers Capital Energy (equipment) Land Environmental Effects -

Kammen, Daniel M.; Farrell, Alexander E.; Plevin, Richard J.; Jones, Andrew D.; Nemet, Gregory F.; Delucchi, Mark A.

2008-01-01T23:59:59.000Z

388

Energy and Greenhouse Impacts of Biofuels: A Framework for Analysis  

E-Print Network (OSTI)

EU to abandon targets for biofuel use in Europe." 14 http://of the Corn-Ethanol Biofuel Cycle." Critical Reviews inthe resource base for biofuel research, as well as at some

Kammen, Daniel M.; Farrell, Alexander E.; Plevin, Richard J.; Jones, Andrew D.; Nemet, Gregory F.; Delucchi, Mark A.

2008-01-01T23:59:59.000Z

389

Evaluation Framework and Tools for Distributed Energy Resources  

E-Print Network (OSTI)

Glossary Executive Summary Introduction Total Societal Impact Framework i iii v vii Effects of Distributed Energy

Gumerman, Etan Z.; Bharvirkar, Ranjit R.; LaCommare, Kristina Hamachi; Marnay, Chris

2003-01-01T23:59:59.000Z

390

Frameworks for model-driven development of web applications  

Science Conference Proceedings (OSTI)

This paper describes model driven development of dynamic web application using a few different frameworks. Those are the following open source Java frameworks: Modelibra, ModelibraWicket and Wicket. Modelibra is a domain model framework. ModelibraWicket ... Keywords: application development, framework, model, web component

Vensada Okanovi?; Dzenana Donko; Tadej Mateljan

2010-11-01T23:59:59.000Z

391

Building Technologies Office: Residential Furnaces and Boilers Framework  

NLE Websites -- All DOE Office Websites (Extended Search)

Residential Furnaces Residential Furnaces and Boilers Framework Meeting to someone by E-mail Share Building Technologies Office: Residential Furnaces and Boilers Framework Meeting on Facebook Tweet about Building Technologies Office: Residential Furnaces and Boilers Framework Meeting on Twitter Bookmark Building Technologies Office: Residential Furnaces and Boilers Framework Meeting on Google Bookmark Building Technologies Office: Residential Furnaces and Boilers Framework Meeting on Delicious Rank Building Technologies Office: Residential Furnaces and Boilers Framework Meeting on Digg Find More places to share Building Technologies Office: Residential Furnaces and Boilers Framework Meeting on AddThis.com... About Standards & Test Procedures Implementation, Certification & Enforcement

392

Analysis  

NLE Websites -- All DOE Office Websites (Extended Search)

Analysis Analysis of Short-Bunch Production with the APS Booster and a Bunch Compressor Michael Borland, AOD/OAG ∗ August 8, 2003 1 Abstract There is significant interest among x-ray scientists in short-pulse x-rays. The x-rays from the APS ring, although very bright, are produced by an electron bunch with an rms length of more than 30 ps. Typically, it is only a linear accelerator that can produce a very short bunch. An idea was brought to my attention by Glenn Decker that might allow us to produce a short bunch using the APS booster. This idea involves extracting the beam from the booster at 3 to 4 GeV, while it is still relatively short, then compressing it with a magnetic bunch compressor. In this note, we present a preliminary analysis of this idea, along with the related idea of using a nonequilibrium beam from the APS photoinjector. 2 Background We will begin with an examination of the ideal result

393

A Framework for Measuring Supercomputer Productivity  

Science Conference Proceedings (OSTI)

We propose a framework for measuring the productivity of high performance computing (HPC) systems, based on common economic definitions of productivity and on utility theory. We discuss how these definitions can capture essential aspects of HPC systems, ... Keywords: High-performance computing, Productivity, benchmarks, performance metrics

Marc Snir; David A. Bader

2004-11-01T23:59:59.000Z

394

A compiler framework for speculative optimizations  

Science Conference Proceedings (OSTI)

Speculative execution, such as control speculation or data speculation, is an effective way to improve program performance. Using edge/path profile information or simple heuristic rules, existing compiler frameworks can adequately incorporate and exploit ... Keywords: Data speculation, partial redundancy elimination, register promotion, speculative SSA form, speculative weak update

Jin Lin; Tong Chen; Wei-Chung Hsu; Pen-Chung Yew; Roy Dz-Ching Ju; Tin-Fook Ngai; Sun Chan

2004-09-01T23:59:59.000Z

395

An autonomic routing framework for sensor networks  

Science Conference Proceedings (OSTI)

Current routing services for sensor networks are often designed for specific applications and network conditions, thus have difficulty in adapting to application and network dynamics. This paper proposes an autonomic framework to promote the adaptivity ... Keywords: Autonomic routing, Feature functions, Monitoring policies, Sensor networks

Yu He; Cauligi S. Raghavendra; Steven Berson; Robert Braden

2006-04-01T23:59:59.000Z

396

GCspy: an adaptable heap visualisation framework  

Science Conference Proceedings (OSTI)

GCspy is an architectural framework for the collection, transmission, storage and replay of memory management behaviour. It makes new contributions to the understanding of the dynamic memory behaviour of programming languages (and especially object-oriented ... Keywords: Java, garbage collection, language implementation, memory management, visualisation of objects

Tony Printezis; Richard Jones

2002-11-01T23:59:59.000Z

397

A Clustering-Driven LDAP Framework  

Science Conference Proceedings (OSTI)

LDAP directories have proliferated as the appropriate storage framework for various and heterogeneous data sources, operating under a wide range of applications and services. Due to the increased amount and heterogeneity of the LDAP data, there is a ... Keywords: DIT organization, LDAP services, clustering, merging criteria, query and retrieval engine

Vassiliki Koutsonikola; Athena Vakali

2011-07-01T23:59:59.000Z

398

Free Parameters and Frameworks in Minimal Supersymmetry  

E-Print Network (OSTI)

405 Appendix A Free Parameters and Frameworks in Minimal Supersymmetry It is useful to discuss what the various schemes that exist for reducing the set of free parameters to a manageable number. The information, and so is fixed by experiment. The free parameters consist mainly of the coefficients of the "soft

399

Free Parameters and Frameworks in Minimal Supersymmetry  

E-Print Network (OSTI)

405 Appendix A Free Parameters and Frameworks in Minimal Supersymmetry It is useful to discuss what the various schemes that exist for reducing the set of free parameters to a manageable number. The information, and so is fixed by experiment. The free parameters consist mainly of the coe#cients of the ``soft

400

A Framework for Historic Bridge Preservation  

E-Print Network (OSTI)

In an inevitably occurring process, bridges possessing historic, artistic, and engineering significance deteriorate and must be maintained and rehabilitated in order to be kept in service. Ideally, all potentially significant bridges would be properly preserved and continue to beautify and bring character to their surroundings for years to come. However, funding is currently limited for transportation projects in general, and even more so for historic bridge preservation, which some may consider less critical in comparison to other transportation needs. Because of this limitation on resources, it is important that bridge-owning agencies use proper planning and management strategies in order to make the best use of available funding. This thesis presents a framework designed to assist agencies in this process. The framework is devised specifically for TxDOT for use in Tarrant County, Texas, but can be used as a model for agencies anywhere with some modifications to fit the inventory under evaluation. Included in the framework are a methodology for prioritization of bridges within an inventory, guidance on financial and legal procedures, identification of potential funding sources, summary and review of condition assessment practices and bridge mitigation strategies, a template for individual bridge preservation plans, and a framework for resource allocation within a bridge inventory. It can be concluded from this research that early detection of defects, preventive maintenance, condition assessment beyond routine inspection, adjustment of evaluation methodology, and use of engineering judgment when using numerical evaluation methods are critical components of proper management of historic bridges.

Puls, Eric Mark

2013-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Compiler implementation in a formal logical framework  

Science Conference Proceedings (OSTI)

The task of designing and implementing a compiler can be a difficult and error-prone process. In this paper, we present a new approach based on the use of higher-order abstract syntax and term rewriting in a logical framework. All program transformations, ... Keywords: formal compiler, higher-order abstract syntax, logical programming environment

Jason Hickey; Aleksey Nogin; Adam Granicz

2003-08-01T23:59:59.000Z

402

CZT: a framework for Z tools  

Science Conference Proceedings (OSTI)

The Community Z Tools (CZT) project is an open-source Java framework for building formal methods tools for Z and Z dialects. It also includes a set of tools for parsing, typechecking, transforming and printing standard Z specifications in LATEX, Unicode ...

Petra Malik; Mark Utting

2005-04-01T23:59:59.000Z

403

Privacy, Technology, and Aging: A Proposed Framework  

E-Print Network (OSTI)

the development, adoption, and use of home-based ubiquitous technologies for older adults. We began with a five, adoption, and use of home-based ubiquitous technologies are highly contextual, individualized and aging can inform the development of a privacy framework for home-based technologies that can contribute

Camp, L. Jean

404

A general implementation framework for tabled CLP  

Science Conference Proceedings (OSTI)

This paper describes a framework to combine tabling evaluation and constraint logic programming (TCLP). While this combination has been studied previously from a theoretical point of view and some implementations exist, they either suffer from a lack ... Keywords: constraint logic programming, implementation, performance, tabling

Pablo Chico de Guzmán; Manuel Carro; Manuel V. Hermenegildo; Peter Stuckey

2012-05-01T23:59:59.000Z

405

A national public healthcare framework using grid  

Science Conference Proceedings (OSTI)

This paper presents a framework for public healthcare by making a grid over public infrastructure such as Internet. It clearly illustrates the need and viability of such grids. The paper gives in details the technology required behind building such global ... Keywords: DICOM, HL7, SAN, component, grid, healthcare, national, security, state, taluka

Rekha Singhal

2010-09-01T23:59:59.000Z

406

Semantic Sensor Net: an extensible framework  

Science Conference Proceedings (OSTI)

Existing approaches for sensor networks suffer from a number of serious drawbacks, including assumption of homogeneous sensor nodes, application-dependency, engineering-orientation, and lack of interoperability. To overcome these drawbacks, we ... Keywords: architecture, data processing, dynamic tagging, framework, semantic information, semantic sensor net, semantics, sensor networks

Lionel M. Ni; Yanmin Zhu; Jian Ma; Qiong Luo; Yunhao Liu; S. C. Cheung; Qiang Yang; Minglu Li; Min-you Wu

2009-04-01T23:59:59.000Z

407

European legislation in the United Kingdom: a threat to coal-fired power station product utilization?  

SciTech Connect

The author considers that the European Union has not taken the approach adopted in the USA where environmental regulators are keen to promote the use of coal-fired power station ash by-product and recycled materials. The United Kingdom has seen, with some dismay, the effects EU legislation is having on the ash industry. This article outlines only some of the problems being tackled. The Waste Framework Directive is difficult to interpret and fails to define critical aspects of the problem. This directive is discussed at some length in the article. A total of nine directives effect the operation of coal-fired power plant. Many are imprecise and open to interpretation and cause a deal of frustration, delays and confusion to the ash supplier and contractor. This is causing markets to suffer.

Sear, K.A. [Quality Ash Association (United Kingdom)

2006-07-01T23:59:59.000Z

408

A Strategic Framework for SMR Deployment  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

A Strategic Framework for SMR Deployment February 24, 2012 Introduction A strategy for the successful deployment of small modular reactors (SMRs) must consider what the goals of deployment would entail, the challenges to achieving these goals and the approach to overcome those challenges. This paper will attempt to offer a framework for addressing these important issues at the outset of the program. The deployment of SMRs will be realized by private power companies making the decision to purchase and operate SMRs from private vendors. The government role is to set national priorities for clean energy and national security and create incentives to achieve them. The policy tools the government may choose to use to advance this technology in support of these national objectives will evolve as SMRs advance

409

CIM-EARTH : Framework and case study.  

SciTech Connect

General equilibrium models have been used for decades to obtain insights into the economic implications of policies and decisions. Despite successes, however, these economic models have substantive limitations. Many of these limitations are due to computational and methodological constraints that can be overcome by leveraging recent advances in computer architecture, numerical methods, and economics research. Motivated by these considerations, we are developing a new modeling framework: the Community Integrated Model of Economic and Resource Trajectories for Humankind (CIM-EARTH). In this paper, we describe the key features of the CIM-EARTH framework and initial implementation, detail the model instance we use for studying the impacts of a carbon tax on international trade and the sensitivity of these impacts to assumptions on the rate of change in energy efficiency and labor productivity, and present results on the extent to which carbon leakage limits global reductions in emissions for some policy scenarios.

Elliott, J.; Foster, I.; Judd, K.; Moyer, E.; Munson, T.; Univ. of Chicago

2010-01-01T23:59:59.000Z

410

FRAMEWORK FOR AGENT-BASED ROLE DELEGATION  

E-Print Network (OSTI)

This paper describes a framework for addressing the administration of role delegation introduced in the wellknown role-based access control model (RBAC). More specifically, this paper describes how a third party, called an agent, can administer the delegation of roles on behalf of a user who is a member of a certain role and wishes to delegate his role to another user who belongs to another role. Furthermore, this paper describes a framework of reference to systematically address the diverse manifestations of the agent-based delegation, such as Role participant agent, Non-role participant agent, Static, and Dynamic types of delegation and introduces an agent-based delegation model that illustrates delegation based on non-role participant delegation.

Ezedin Barka; Ravi Sandhu

2007-01-01T23:59:59.000Z

411

A framework for modeling rail transport vulnerability  

Science Conference Proceedings (OSTI)

Railroads represent one of the most efficient methods of long-haul transport for bulk commodities, from coal to agricultural products. Over the past fifty years, the rail network has contracted while tonnage has increased. Service, geographically, has been abandoned along short haul routes and increased along major long haul routes, resulting in a network that is more streamlined. The current rail network may be very vulnerable to disruptions, like the failure of a trestle. This paper proposes a framework to model rail network vulnerability and gives an application of this modeling framework in analyzing rail network vulnerability for the State of Washington. It concludes with a number of policy related issues that need to be addressed in order to identify, plan, and mitigate the risks associated with the sudden loss of a bridge or trestle.

Peterson, Steven K [ORNL; Church, Richard L. [University of California, Santa Barbara

2008-01-01T23:59:59.000Z

412

A goal question metric based approach for efficient measurement framework definition  

Science Conference Proceedings (OSTI)

In software engineering, measurements can be used to monitor, understand and improve software processes as well as products and resource utilization. Commonly, measurement frameworks are ambitious undertakings that require large data collection and analysis ... Keywords: GQM, change management, goal question metric, measurements, requirements management

Patrik Berander; Per Jönsson

2006-09-01T23:59:59.000Z

413

The Design and Implementation of a Framework for Automatic Modularization of Software Systems  

Science Conference Proceedings (OSTI)

It is a difficult task to manually cluster a large software system into loosely coupled modules with a large number of highly cohesive classes. On the other hand clustering is a NP-Hard problem. In this paper the design and implementation of a flexible ... Keywords: algorithm, clustering, confidence analysis, framework, genetic, modularization

S. Parsa; O. Bushehrian

2005-04-01T23:59:59.000Z

414

Tri-State Demand Response Framework  

Science Conference Proceedings (OSTI)

This report provides the results of a demand response framework development project of Tri-State Generation and Transmission, a wholesale provider to a number of rural electric associations in the Rocky Mountain west. Tri-State has developed an assortment of planned demand response and energy shaping products and services designed to both shave peak and shift consumption to off-peak hours. The applications, networks, and devices that will be needed to support these needs will involve many ...

2013-03-28T23:59:59.000Z

415

An Optimization Framework for Driver Feedback Systems  

SciTech Connect

Modern vehicles have sophisticated electronic control units that can control engine operation with discretion to balance fuel economy, emissions, and power. These control units are designed for specific driving conditions (e.g., different speed profiles for highway and city driving). However, individual driving styles are different and rarely match the specific driving conditions for which the units were designed. In the research reported here, we investigate driving-style factors that have a major impact on fuel economy and construct an optimization framework to optimize individual driving styles with respect to these driving factors. In this context, we construct a set of polynomial metamodels to reflect the responses produced in fuel economy by changing the driving factors. Then, we compare the optimized driving styles to the original driving styles and evaluate the effectiveness of the optimization framework. Finally, we use this proposed framework to develop a real-time feedback system, including visual instructions, to enable drivers to alter their driving styles in response to actual driving conditions to improve fuel efficiency.

Malikopoulos, Andreas [ORNL; Aguilar, Juan P. [Georgia Institute of Technology

2013-01-01T23:59:59.000Z

416

Constructibility review process framework for transportation facilities  

E-Print Network (OSTI)

Constructibility is the optimum use of construction knowledge and experience in planning, design, procurement, and field operations in order to achieve overall project objectives ("Constructibility: a primer" 1986). This Thesis presents a framework for implementing constructibility to the transportation industry. The challenge of applying such a process to the transportation industry is the contracting strategy predominantly used: the design/bid/build strategy. In such a contracting environment construction is performed as a completely separate phase. Changes in key players occur once the project is awarded to the contractor. Contractors have little or no opportunity to provide input to planners and designers. The framework developed in this research consists of performing a series of constructibility functions during specific project development phases. Constructibility functions such as forming project teams, storing and retrieving constructibility lessons learned, and providing construction feedback to designers make the project development process more efficient. The computer technique used to build the Constructibility Review Process Framework is the IDEFO modeling technique. The technique is used for modeling functions in a process (decisions, actions, and activities) and the relationship between the functions (Mayer). The model was developed after a thorough investigation of the critical issues facing the state transportation agencies, and an understanding of the current environment these agencies operate in.

Liman, Majed

1995-01-01T23:59:59.000Z

417

A planning framework for transferring building energy technologies: Executive Summary  

Science Conference Proceedings (OSTI)

Accelerating the adoption of new and existing cost-effective technologies has significant potential to reduce the energy consumed in US buildings. This report summarizes some of the key results of an interlaboratory technology transfer planning effort in support of the US Department of Energy's Office of Building Technologies (the full report is published under SERI number TP-260-3729). A guiding assumption for planning was that OBT's R D program should forge linkages with existing programs whose goals involved enhancing energy efficiency in buildings. An ad hoc Technology Transfer Advisory Group reviewed the existing analysis and technology transfer program, brainstormed technology transfer approaches, interviewed DOE program managers, identified applicable research results, and developed a framework that management could use in deciding on the best investments of technology transfer resources. Representatives of 22 organizations were interviewed on their views of the potential for transferring energy efficiency technologies through active linking with OBT. The report describes in summary these programs and interview results; outlines OBT tools, technologies, and practices to be transferred; defines OBT audiences; identifies technology transfer functions and presents a framework devised using functions and audiences; presents some example technology transfer activities; and summarizes the Advisory Group's recommendations.

Farhar, B C; Brown, M A; Mohler, B L; Wilde, M; Abel, F H

1990-08-01T23:59:59.000Z

418

Real-Time System Log Monitoring/Analytics Framework  

SciTech Connect

Analyzing system logs provides useful insights for identifying system/application anomalies and helps in better usage of system resources. Nevertheless, it is simply not practical to scan through the raw log messages on a regular basis for large-scale systems. First, the sheer volume of unstructured log messages affects the readability, and secondly correlating the log messages to system events is a daunting task. These factors limit large-scale system logs primarily for generating alerts on known system events, and post-mortem diagnosis for identifying previously unknown system events that impacted the systems performance. In this paper, we describe a log monitoring framework that enables prompt analysis of system events in real-time. Our web-based framework provides a summarized view of console, netwatch, consumer, and apsched logs in real- time. The logs are parsed and processed to generate views of applications, message types, individual/group of compute nodes, and in sections of the compute platform. Also from past application runs we build a statistical profile of user/application characteristics with respect to known system events, recoverable/non-recoverable error messages and resources utilized. The web-based tool is being developed for Jaguar XT5 at the Oak Ridge Leadership Computing facility.

Oral, H Sarp [ORNL; Dillow, David A [ORNL; Park, Byung H [ORNL; Shipman, Galen M [ORNL; Geist, Al [ORNL; Gunasekaran, Raghul [ORNL

2011-01-01T23:59:59.000Z

419

A planning framework for transferring building energy technologies  

SciTech Connect

Accelerating the adoption of new and existing cost-effective technologies has significant potential to reduce the energy consumed in US buildings. This report presents key results of an interlaboratory technology transfer planning effort in support of the US Department of Energy's Office of Building Technologies (OBT). A guiding assumption for planning was that OBT's R D program should forge linkages with existing programs whose goals involved enhancing energy efficiency in buildings. An ad hoc Technology Transfer Advisory Group reviewed the existing analysis and technology transfer program, brainstormed technology transfer approaches, interviewed DOE program managers, identified applicable research results, and developed a framework that management could use in deciding on the best investments of technology transfer resources. Representatives of 22 organizations were interviewed on their views of the potential for transferring energy efficiency technologies through active linking with OBT. The report describes these programs and interview results; outlines OBT tools, technologies, and practices to be transferred; defines OBT audiences; identifies technology transfer functions and presents a framework devised using functions and audiences; presents some 60 example technology transfer activities; and documents the Advisory Group's recommendations. 37 refs., 3 figs., 12 tabs.

Farhar, B C; Brown, M A; Mohler, B L; Wilde, M; Abel, F H

1990-07-01T23:59:59.000Z

420

Defining resilience within a risk-informed assessment framework  

Science Conference Proceedings (OSTI)

The concept of resilience is the subject of considerable discussion in academic, business, and governmental circles. The United States Department of Homeland Security for one has emphasised the need to consider resilience in safeguarding critical infrastructure and key resources. The concept of resilience is complex, multidimensional, and defined differently by different stakeholders. The authors contend that there is a benefit in moving from discussing resilience as an abstraction to defining resilience as a measurable characteristic of a system. This paper proposes defining resilience measures using elements of a traditional risk assessment framework to help clarify the concept of resilience and as a way to provide non-traditional risk information. The authors show various, diverse dimensions of resilience can be quantitatively defined in a common risk assessment framework based on the concept of loss of service. This allows the comparison of options for improving the resilience of infrastructure and presents a means to perform cost-benefit analysis. This paper discusses definitions and key aspects of resilience, presents equations for the risk of loss of infrastructure function that incorporate four key aspects of resilience that could prevent or mitigate that loss, describes proposed resilience factor definitions based on those risk impacts, and provides an example that illustrates how resilience factors would be calculated using a hypothetical scenario.

Coles, Garill A.; Unwin, Stephen D.; Holter, Gregory M.; Bass, Robert B.; Dagle, Jeffery E.

2011-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Design Feasibility Analysis and Optimization under Uncertainty...  

NLE Websites -- All DOE Office Websites (Extended Search)

Feasibility Analysis and Optimization under Uncertainty - A Bayesian Optimal Decision Framework Speaker(s): Jose M. Ortega Date: October 7, 2003 - 12:00pm Location: Bldg. 90...

422

Fact Sheets - Center for Transportation Analysis  

NLE Websites -- All DOE Office Websites (Extended Search)

Resiliency Assessment Framework Truck Technology Efficiency Assessment (TTEA) Project Energy and Environmental Policy Analysis The Biomass Energy Data Book(Fact Sheet) The Biomass...

423

Towards security testing with taint analysis and genetic algorithms  

Science Conference Proceedings (OSTI)

Cross site scripting is considered the major threat to the security of web applications. Removing vulnerabilities from existing web applications is a manual expensive task that would benefit from some level of automatic assistance. Static analysis represents ... Keywords: cross site scripting, genetic algorithms, security testing, taint analysis

Andrea Avancini; Mariano Ceccato

2010-05-01T23:59:59.000Z

424

A UI-Driven lightweight framework for developing web applications  

Science Conference Proceedings (OSTI)

Due to the increasing complexity of Web applications, systematic processes and supporting tools are required for the development of Web applications. In this paper, we propose a UI-driven lightweight framework for building Web applications. This framework ...

Keeyoull Lee; Sanghyun Park; Chunwoo Lee; Woosung Jung; Wookjin Lee; Byungjeong Lee; Heechern Kim; Chisu Wu

2005-07-01T23:59:59.000Z

425

The cactus framework and toolkit: design and applications  

Science Conference Proceedings (OSTI)

We describe Cactus, a framework for building a variety of computing applications in science and engineering, including astrophysics, relativity and chemical engineering.We first motivate by example the need for such frameworks to support multi-platform, ...

Tom Goodale; Gabrielle Allen; Gerd Lanfermann; Joan Massó; Thomas Radke; Edward Seidel; John Shalf

2002-06-01T23:59:59.000Z

426

An Information Systems Design Framework for Facilitating TQM Implementation  

Science Conference Proceedings (OSTI)

This paper provides a framework for information systems IS design for TQM implementation. The framework consists of three main phases. In the first, TQM implementation tasks are established. These tasks include identifying customer satisfaction variables ...

Nazim U. Ahmed; Ramarathnam Ravichandran

1999-10-01T23:59:59.000Z

427

A linux kernel cryptographic framework: decoupling cryptographic keys from applications  

Science Conference Proceedings (OSTI)

This paper describes a cryptographic service framework for the Linux kernel. The framework enables user-space applications to perform operations with cryptographic keys, while at the same time ensuring that applications cannot directly access or extract ...

Nikos Mavrogiannopoulos; Miloslav Trma?; Bart Preneel

2012-03-01T23:59:59.000Z

428

Improving Building Performance at Urban Scale with a Framework...  

NLE Websites -- All DOE Office Websites (Extended Search)

Improving Building Performance at Urban Scale with a Framework for Real-time Data Sharing Title Improving Building Performance at Urban Scale with a Framework for Real-time Data...

429

Site Transition Framework for Long-Term Surveillance and Maintenance  

Energy.gov (U.S. Department of Energy (DOE))

The Site Transition Framework (STF) provides a framework for all U.S. Department of Energy (DOE) facilities and sites where DOE may have anticipated long-term surveillance and maintenance (LTS&...

430

Drive-access transit : a regional analytical framework  

E-Print Network (OSTI)

A framework for analyzing drive-access transit at a regional level is developed in this research. This framework is intended primarily for in-house use by regional transit agencies, yet has implications for the regional ...

Sorensen, James B

2005-01-01T23:59:59.000Z

431

A framework for sustainable buildings : an application to China  

E-Print Network (OSTI)

A framework has been established to discuss the different topics of Sustainability in the context of buildings. The framework includes the dimensions of time and space and the dimensions of ecology, society, and economy. ...

Ospelt, Christoph, 1970-

1999-01-01T23:59:59.000Z

432

Renewable Energy Project Development and Finance Framework: The...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Development and Finance Framework: The Five-Step Process Webinar Renewable Energy Project Development and Finance Framework: The Five-Step Process Webinar March 26, 2014 5:45PM MDT...

433

Agricultural pathogen decontamination technology-reducing the threat of infectious agent spread.  

Science Conference Proceedings (OSTI)

Outbreaks of infectious agricultural diseases, whether natural occurring or introduced intentionally, could have catastrophic impacts on the U.S. economy. Examples of such agricultural pathogens include foot and mouth disease (FMD), avian influenza (AI), citrus canker, wheat and soy rust, etc. Current approaches to mitigate the spread of agricultural pathogens include quarantine, development of vaccines for animal diseases, and development of pathogen resistant crop strains in the case of plant diseases. None of these approaches is rapid, and none address the potential persistence of the pathogen in the environment, which could lead to further spread of the agent and damage after quarantine is lifted. Pathogen spread in agricultural environments commonly occurs via transfer on agricultural equipment (transportation trailers, tractors, trucks, combines, etc.), having components made from a broad range of materials (galvanized and painted steel, rubber tires, glass and Plexiglas shields, etc), and under conditions of heavy organic load (mud, soil, feces, litter, etc). A key element of stemming the spread of an outbreak is to ensure complete inactivation of the pathogens in the agricultural environment and on the equipment used in those environments. Through the combination of enhanced agricultural pathogen decontamination chemistry and a validated inactivation verification methodology, important technologies for incorporation as components of a robust response capability will be enabled. Because of the potentially devastating economic impact that could result from the spread of infectious agricultural diseases, the proposed capability components will promote critical infrastructure protection and greater border and food supply security. We investigated and developed agricultural pathogen decontamination technologies to reduce the threat of infectious-agent spread, and thus enhance agricultural biosecurity. Specifically, enhanced detergency versions of the patented Sandia decontamination chemistry were developed and tested against a few surrogate pathogens under conditions of relatively heavy organic load. Tests were conducted on surfaces commonly found in agricultural environments. Wide spectrum decontamination efficacy, low corrosivity, and biodegradability issues were addressed in developing an enhanced detergency formulation. A method for rapid assessment of loss of pathogenic activity (inactivation) was also assessed. This enhanced technology will enable rapid assessment of contamination following an intentional event, and will also be extremely useful in routine assessment of agricultural environments. The primary effort during the second year was progress towards a demonstration of both decontamination and viral inactivation technologies of Foot and Mouth virus (FMDv) using the modified SNL chemistry developed through this project. Lab studies using a surrogate virus (bovine enterovirus) were conducted using DF200, modified DF200 chemistry, and decontaminants currently recommended for use in heavily loaded organic, agricultural environments (VirkonS, 10% bleach, sodium hydroxide and citric acid). Tests using actual FMD virus will be performed at the Department of Homeland Security's Plum Island facilities in the fall of 2005. Success and the insight gained from this project will lead to enhanced response capability, which will benefit agencies such as USDA, DHS, DOD, and the agricultural industry.

Betty, Rita G.; Bieker, Jill Marie; Tucker, Mark David

2005-10-01T23:59:59.000Z

434

REVIEW ARTICLE Ozone depletion and increased UV-B radiation: is there a real threat to photosynthesis?  

E-Print Network (OSTI)

on photosynthetic competence or light-interception. It is concluded that O depletion and the concurrent rise This critical review of recent literature questions earl-3 in UV-B irradiance is not a direct threat to photosynier predictions that photosynthetic productivity of thetic productivity of crops and natural vegetation. higher plants is vulnerable to increased ultraviolet-B (UV-B) radiation as a result of stratospheric ozone (O) 3 Key words: Biomass, development, ozone depletion, depletion. Direct UV-B-induced inhibition of photosyn- photosynthesis, ultraviolet-B. thetic competence is observed only at high UV-B irradiances and primarily involves the loss of soluble Calvin

Damian J. Allen; Salvador Nogués; Neil R. Baker

1998-01-01T23:59:59.000Z

435

Metal?organic frameworks for the storage and delivery of biologically active hydrogen sulfide  

SciTech Connect

Hydrogen sulfide is an extremely toxic gas that is also of great interest for biological applications when delivered in the correct amount and at the desired rate. Here we show that the highly porous metal-organic frameworks with the CPO-27 structure can bind the hydrogen sulfide relatively strongly, allowing the storage of the gas for at least several months. Delivered gas is biologically active in preliminary vasodilation studies of porcine arteries, and the structure of the hydrogen sulfide molecules inside the framework has been elucidated using a combination of powder X-ray diffraction and pair distribution function analysis.

Allan, Phoebe K.; Wheatley, Paul S.; Aldous, David; Mohideen, M. Infas; Tang, Chiu; Hriljac, Joseph A.; Megson, Ian L.; Chapman, Karena W.; De Weireld, Guy; Vaesen, Sebastian; Morris, Russell E. (St Andrews)

2012-04-02T23:59:59.000Z

436

Introduction to NICE Cybersecurity Workforce Framework  

Science Conference Proceedings (OSTI)

... Conducting Internet searches and collecting documents ... Specialty Area: Systems Security Analysis ... Example Job Titles: Information Assurance ...

2011-10-24T23:59:59.000Z

437

Asset Locator - A Framework for Enterprise Software Asset Management  

E-Print Network (OSTI)

This paper introduces the Enterprise Software Asset Management (ESAM) paradigm, which defines an approach to doing automated software asset management. ESAM is a comprehensive integrated solution supporting search and reuse, collaboration, knowledge sharing, impact analysis, and other enterprise-centric services. We describe Asset Locator, a low-cost, scalable and extensible solution that realizes ESAM. Asset Locator uses a set of autonomous scheduled crawlers that scan enterprise repositories to discover development resources. A set of domain-specific analyzers process the discovered resources by identifying and extracting semantic features. Powerful search and navigation engines enable clients to explore the analyzed information. The design of Asset Locator as an extensible framework has enabled its easy integration into several IBM product offerings. 1

Avi Yaeli; Alex Akilov; Sara Porat; Iftach Ragoler; Shlomit Shachor-ifergan; Gabi Zodik

2002-01-01T23:59:59.000Z

438

MALEF: Framework for distributed machine learning and data mining  

Science Conference Proceedings (OSTI)

Growing importance of distributed data mining techniques has recently attracted attention of researchers in multiagent domain. In this paper we present a novel framework MultiAgent Learning Framework (MALEF) designed for both the agent-based ... Keywords: MAS, agent-based systems, architectures, data mining, distributed machine learning, market-based approaches, multi-agent systems, multiagent learning frameworks, unsupervised clustering

Jan Tozicka; Michael Rovatsos; Michal Pechoucek; Stepan Urban

2008-02-01T23:59:59.000Z

439

Making Sustainable Decisions Using The KONVERGENCE Framework  

Science Conference Proceedings (OSTI)

Hundreds of contaminated facilities and sites must be cleaned up. ''Cleanup'' includes decommissioning, environmental restoration, and waste management. Cleanup can be complex, expensive, risky, and time-consuming. Decisions are often controversial, can stall or be blocked, and are sometimes re-done--some before implementation, some decades later. Making and keeping decisions with long time horizons involves special difficulties and requires new approaches. Our project goal is to make cleanup decisions easier to make, implement, keep, and sustain. By sustainability, we mean decisions that work better over the entire time-period-from when a decision is made, through implementation, to its end point. That is, alternatives that can be kept ''as is'' or adapted as circumstances change. Increased attention to sustainability and adaptability may decrease resistance to making and implementing decisions. Our KONVERGENCE framework addresses these challenges. The framework is based on a mental model that states: where Knowledge, Values, and Resources converge (the K, V, R in KONVERGENCE), you will find a sustainable decision. We define these areas or universes as follows: (1) Knowledge: what is known about the problem and possible solutions? (2) Values: what is important to those affected by the decision? (3) Resources: what is available to implement possible solutions or improve knowledge? This mental model helps analyze and visualize what is happening as decisions are made and kept. Why is there disagreement? Is there movement toward konvergence? Is a past decision drifting out of konvergence? The framework includes strategic improvements, i.e., expand the spectrum of alternatives to include adaptable alternatives and decision networks. It includes tactical process improvements derived from experience, values, and relevant literature. This paper includes diagnosis and medication (suggested path forward) for intractable cases.

Piet, S. J.; Gibson, P. L.; Joe, J. C.; Kerr, T. A.; Nitschke, R. L.; Dakins, M. E.

2003-02-25T23:59:59.000Z

440

A Framework for Evaluating Deployed Security Systems: Is There a Chink in your ARMOR?  

E-Print Network (OSTI)

A growing number of security applications are being developed and deployed to explicitly reduce risk from adversaries ’ actions. However, there are many challenges when attempting to evaluate such systems, both in the lab and in the real world. Traditional evaluations used by computer scientists, such as runtime analysis and optimality proofs, may be largely irrelevant. The primary contribution of this paper is to provide a preliminary framework which can guide the evaluation of such systems and to apply the framework to the evaluation of ARMOR (a system deployed at LAX since August 2007). This framework helps to determine what evaluations could, and should, be run in order to measure a system’s overall utility. A secondary contribution of this paper is to help familiarize our community with some of the difficulties inherent in evaluating deployed applications, focusing on those in security domains. Povzetek: Kako ovrednotiti varnostne aplikacije, kot recimo sistem ARMOR, ki je od 2007 dalje v uporabi na LAX?

Matthew E. Taylor; Christopher Kiekintveld; Craig Western; Milind Tambe

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

A decision process framework: selecting strategies for rehabilitation of rigid pavements subjected to high traffic volumes  

E-Print Network (OSTI)

Concrete pavements, underdesigned for today's levels of traffic, are deteriorating rapidly. Maintenance, rehabilitation, and reconstruction activities (MRR) have become more widespread and costly. State highway agencies are often being asked to do more MRR work with fewer funds. An improved and comprehensive decision process for selecting the preferred strategy for MRR that considers not only pavement but also traffic and construction issues is needed. Research was conducted to develop a framework for selecting strategies for MRR. The factors, steps, and information involved in the MRR decision process were identified. A decision analysis tool, IDEF0, was used to model the decision process framework. The IDEF0 model is hierarchical in nature (each function is divided into subfunctions) and includes the information flow between the different functions. Data was collected through project case studies and interviews to evaluate and refine the framework. Further research will be necessary to expand the model to a higher level of detail.

Valls, Marc Edouard Josep

2000-01-01T23:59:59.000Z

442

A Systems Framework for Assessing Plumbing Products-Related Water Conservation  

Science Conference Proceedings (OSTI)

Reducing the water use of plumbing products—toilets, urinals, faucets, and showerheads —has been a popular conservation measure. Improved technologies have created opportunities for additional conservation in this area. However, plumbing products do not operate in a vacuum. This paper reviews the literature related to plumbing products to determine a systems framework for evaluating future conservation measures using these products. The main framework comprises the following categories: water use efficiency, product components, product performance, source water, energy, and plumbing/sewer infrastructure. This framework for analysis provides a starting point for professionals considering future water conservation measures to evaluate the need for additional research, collaboration with other standards or codes committees, and attachment of additional metrics to water use efficiency (such as performance).

Williams, Alison; Dunham Whitehead, Camilla; Lutz, James

2011-12-02T23:59:59.000Z

443

Evaluation Framework and Analyses for Thermal Energy Storage Integrated with Packaged Air Conditioning  

SciTech Connect

Few third-party guidance documents or tools are available for evaluating thermal energy storage (TES) integrated with packaged air conditioning (AC), as this type of TES is relatively new compared to TES integrated with chillers or hot water systems. To address this gap, researchers at the National Renewable Energy Laboratory conducted a project to improve the ability of potential technology adopters to evaluate TES technologies. Major project outcomes included: development of an evaluation framework to describe key metrics, methodologies, and issues to consider when assessing the performance of TES systems integrated with packaged AC; application of multiple concepts from the evaluation framework to analyze performance data from four demonstration sites; and production of a new simulation capability that enables modeling of TES integrated with packaged AC in EnergyPlus. This report includes the evaluation framework and analysis results from the project.

Kung, F.; Deru, M.; Bonnema, E.

2013-10-01T23:59:59.000Z

444

A Validation Framework for the Long Term Preservation of High Energy Physics Data  

E-Print Network (OSTI)

The study group on data preservation in high energy physics, DPHEP, is moving to a new collaboration structure, which will focus on the implementation of preservation projects, such as those described in the group's large scale report published in 2012. One such project is the development of a validation framework, which checks the compatibility of evolving computing environments and technologies with the experiments software for as long as possible, with the aim of substantially extending the lifetime of the analysis software, and hence of the usability of the data. The framework is designed to automatically test and validate the software and data of an experiment against changes and upgrades to the computing environment, as well as changes to the experiment software itself. Technically, this is realised using a framework capable of hosting a number of virtual machine images, built with different configurations of operating systems and the relevant software, including any necessary external dependencies.

Dmitri Ozerov; David M. South

2013-10-29T23:59:59.000Z

445

A general framework for three-dimensional surface reconstruction by self-consistent fusion of shading and shadow features  

Science Conference Proceedings (OSTI)

In this paper a novel framework for three-dimensional surface reconstruction by self-consistent fusion of shading and shadow features is presented. Based on the analysis of at least two pixel-synchronous images of the scene under different illumination ... Keywords: Lunar surface, Photoclinometry, Quality inspection, Shadow analysis, Shape from shading, Surface reconstruction

Christian Wöhler; Kia Hafezi

2005-07-01T23:59:59.000Z

446

ATLAS Tags Web Service calls Athena via Athenaeum Framework  

E-Print Network (OSTI)

High Energy Physics experiments start using a Web Service style application to access functionality of their main frameworks. Those frameworks, however, are not ready to be executed in a standard Web Service environment as frameworks are too complex, monolithic and use non-standard and non-portable technologies. ATLAS Tag Browser is one of those Web Service. To provide the possibility to extract full ATLAS events from the standard Web Service, we need to access to full ATLAS offline framework - Athena. As Athena cannot run directly within any Web Service, the client server approach has been chosen. Web Service calls Athena remotely over XML-RPC connection using Athenaeum framework.

Hrivnac, J; The ATLAS collaboration

2011-01-01T23:59:59.000Z

447

NICE Issues Cybersecurity Workforce Framework for Public ...  

Science Conference Proceedings (OSTI)

... maintenance of cybersecurity systems to incident response, information gathering and analysis. The structure is based on job analyses and groups ...

2011-11-08T23:59:59.000Z

448

Integrated Knowledge Framework (IKF) for Coal-Fired Power Plants: An Analysis of the Data, Information, and Knowledge Requirements for the Economic Operation and Maintenance of Coal-Fired Power Plants Volumes 1-3; Volume 1, Summary; Volume 2, IKF Mode...  

Science Conference Proceedings (OSTI)

This project produced an integrated knowledge framework (IKF) that describes the management and operational functions at a generic, coal-fired power plant. This IKF identifies and controls the flow of data, information, and knowledge required for important fossil power plant functions. In addition, the IKF provides a benchmark for comparing existing plant practices and implementing improvements to those practices.

1996-05-29T23:59:59.000Z

449

Perspectives on Dam Removal: York Creek Dam and the Water Framework Directive  

E-Print Network (OSTI)

Figure 4. Water Framework Directive decision-making processand the Water Framework Directive LA 222 UC Berkeley May 16Dam and the Water Framework Directive Justin Lawrence, Josh

Lawrence, Justin E; Pollak, Josh D; Richmond, Sarah F

2008-01-01T23:59:59.000Z

450

Reservoir Management in Mediterranean Climates through the European Water Framework Directive  

E-Print Network (OSTI)

the EuropeanWater Framework Directive? ” Elsevier Cabecinha,Under the Water Framework Directive. Conacher, A.J. , Sala,The EU Water Framework Directive: measures and implications.

O'Reilly, Clare; Silberblatt, Rafael

2009-01-01T23:59:59.000Z

451

Wild-Inspired Intrusion Detection System Framework for High Speed Networks f|p IDS Framework  

Science Conference Proceedings (OSTI)

While the rise of the Internet and the high speed networks made information easier to acquire, faster to exchange and more flexible to share, it also made the cybernetic attacks and crimes easier to perform, more accurate to hit the target victim and ... Keywords: Cybernetic Attacks, Framework, High Speed Network, Intrusion Detection, Monitoring

Hassen Sallay; Mohsen Rouached; Adel Ammar; Ouissem Ben Fredj; Khalid Al-Shalfan; Majdi Ben Saad

2011-10-01T23:59:59.000Z

452

Metal Organic Framework Research: High Throughput Discovery of Robust Metal Organic Framework for CO2 Capture  

Science Conference Proceedings (OSTI)

IMPACCT Project: LBNL is developing a method for identifying the best metal organic frameworks for use in capturing CO2 from the flue gas of coal-fired power plants. Metal organic frameworks are porous, crystalline compounds that, based on their chemical structure, vary considerably in terms of their capacity to grab hold of passing CO2 molecules and their ability to withstand the harsh conditions found in the gas exhaust of coal-fired power plants. Owing primarily to their high tunability, metal organic frameworks can have an incredibly wide range of different chemical and physical properties, so identifying the best to use for CO2 capture and storage can be a difficult task. LBNL uses high-throughput instrumentation to analyze nearly 100 materials at a time, screening them for the characteristics that optimize their ability to selectively adsorb CO2 from coal exhaust. Their work will identify the most promising frameworks and accelerate their large-scale commercial development to benefit further research into reducing the cost of CO2 capture and storage.

None

2010-08-01T23:59:59.000Z

453

The use of mutation in testing experiments and its sensitivity to external threats  

Science Conference Proceedings (OSTI)

Mutation analysts has emerged as a standard approach for empirical assessment of testing techniques. The test practitioners decide about cost-effectiveness of testing strategies based on the number of mutants the testing techniques detect. Though fundamental ... Keywords: experimental design, hand-seeded faults, mutants, mutation testing, real faults, statistical analysis

Akbar Siami Namin; Sahitya Kakarla

2011-07-01T23:59:59.000Z

454

Fuzzy control for nuclear reactor operation -- strengths, weaknesses, opportunities and threats  

Science Conference Proceedings (OSTI)

Assessment of four real fuzzy control applications at the MIT research reactor in the US, the FUGEN heavy water reactor in Japan, the BR1 research reactor in Belgium, and a TRIGA Mark III reactor in Mexico will be analyzed through an analysis of strengths, ... Keywords: Artificial Intelligence, Br1 Reactor, Fuzzy Control, Reactor Operation, Triga Mark Iii Reactor

Da Ruan; Jorge S. Benítez-Read

2005-10-01T23:59:59.000Z

455

Making Sustainable Decisions Using the KONVERGENCE Framework  

SciTech Connect

Hundreds of contaminated facilities and sites must be cleaned up. “Cleanup” includes decommissioning, environmental restoration, and waste management. Cleanup can be complex, expensive, risky, and time-consuming. Decisions are often controversial, can stall or be blocked, and are sometimes re-done - some before implementation, some decades later. Making and keeping decisions with long time horizons involves special difficulties and requires new approaches, including: • New ways (mental model) to analyze and visualize the problem, • Awareness of the option to shift strategy or reframe from a single decision to an adaptable network of decisions, and • Improved tactical processes that account for several challenges. These include the following: • Stakeholder values are a more fundamental basis for decision making and keeping than “meeting regulations.” • Late-entry players and future generations will question decisions. • People may resist making “irreversible” decisions. • People need “compelling reasons” to take action in the face of uncertainties. Our project goal is to make cleanup decisions easier to make, implement, keep, and sustain. By sustainability, we mean decisions that work better over the entire time-period—from when a decision is made, through implementation, to its end point. That is, alternatives that can be kept “as is” or adapted as circumstances change. Increased attention to sustainability and adaptability may decrease resistance to making and implementing decisions. Our KONVERGENCE framework addresses these challenges. The framework is based on a mental model that states: where Knowledge, Values, and Resources converge (the K, V, R in KONVERGENCE), you will find a sustainable decision. We define these areas or universes as follows: • Knowledge: what is known about the problem and possible solutions? • Values: what is important to those affected by the decision? • Resources: what is available to implement possible solutions or improve knowledge? This mental model helps analyze and visualize what is happening as decisions are made and kept. Why is there disagreement? Is there movement toward konvergence? Is a past decision drifting out of konvergence? The framework includes strategic improvements, i.e., expand the spectrum of alternatives to include adaptable alternatives and decision networks. It includes tactical process improvements derived from experience, values, and relevant literature. This paper includes diagnosis and medication (suggested path forward) for intractable cases.

Piet, Steven James; Gibson, Patrick Lavern; Joe, Jeffrey Clark; Kerr, Thomas A; Nitschke, Robert Leon; Dakins, Maxine Ellen

2003-02-01T23:59:59.000Z

456

An economic decision framework using modeling for improving aquifer remediation design  

Science Conference Proceedings (OSTI)

Reducing cost is a critical challenge facing environmental remediation today. One of the most effective ways of reducing costs is to improve decision-making. This can range from choosing more cost- effective remediation alternatives (for example, determining whether a groundwater contamination plume should be remediated or not) to improving data collection (for example, determining when data collection should stoop). Uncertainty in site conditions presents a major challenge for effective decision-making. We present a framework for increasing the effectiveness of remedial design decision-making at groundwater contamination sites where there is uncertainty in many parameters that affect remediation design. The objective is to provide an easy-to-use economic framework for making remediation decisions. The presented framework is used to 1) select the best remedial design from a suite of possible ones, 2) estimate if additional data collection is cost-effective, and 3) determine the most important parameters to be sampled. The framework is developed by combining elements from Latin-Hypercube simulation of contaminant transport, economic risk-cost-benefit analysis, and Regional Sensitivity Analysis (RSA).

James, B.R.; Gwo, J.P.; Toran, L.E.

1995-11-01T23:59:59.000Z

457

Vision for 2025: A Framework for Change  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Action Plan for Energy Effi Action Plan for Energy Effi ciency Vision for 2025: A Framework for Change A RESOURCE OF THE NATIONAL ACTION PLAN FOR ENERGY EFFICIENCY NOVEMBER 2008 Letter from the Co-Chairs of the National Action Plan for Energy Effi ciency November 2008 To all, As you know, the National Action Plan for Energy Effi ciency is playing a vital role in advancing the dialogue and the pursuit of energy effi ciency in our homes, buildings, and industries -an important energy resource for the country. With the commitment and leadership from more than 60 diverse organizations nationwide we have made great progress in a short time. We have: * Developed fi ve broad and meaningful recommendations for pursuing cost-effective energy effi ciency. * Brought together more than 100 organizations from 50 states around this common goal to take energy effi

458

An Interactive Simulation Framework for Burning Objects  

E-Print Network (OSTI)

We present a simulation framework to integrate several aspects of the combustion and burning process in a unified and modular manner. A simple three gas flame model is used to simulate a combustion process, while air motion is simulated as a single moving fluid. Solid objects inside the simulation domain can catch fire and start burning. Heat information is transferred from the fluid simulator to a solid simulator, while the solid simulator injects fuel into the fluid simulation. We also present a simple yet effective method for modeling of object decomposition under combustion using level set methods. The interaction between modules is presented as well as a discussion of fluid-solid coupling. All simulation modules run together at interactive rates, enabling the user to tweak the simulation parameters and setup for desired behavior 1. 1

Zeki Melek; John Keyser

2005-01-01T23:59:59.000Z

459

A modeling and control framework for operating large-scale electric power systems under present and newly evolving competitive industry structures  

E-Print Network (OSTI)

This paper introduces a systematic, structure-based modeling framework for analysis and control of electric power systems for processes evolving over the mid-term and long-term time horizons. Much simpler models than the ...

Ilic, Marija

1995-01-01T23:59:59.000Z

460

A Framework for Improving Building Operating Decisions  

NLE Websites -- All DOE Office Websites (Extended Search)

to develop a decision analysis tool to help facility managers make proactive energy and maintenance management decisions. The presentation will conclude with an overview of the...

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Tentative Framework for Development of Advanced Seismic ...  

Science Conference Proceedings (OSTI)

... E-4 E.1.6 Performance Evaluation Tool ..... E-4 E.2 Information Needed to Perform FEMA P-695 Analysis ..... E-5 ...

2013-06-17T23:59:59.000Z

462

Discussion Draft of the Preliminary Cybersecurity Framework  

Science Conference Proceedings (OSTI)

... cost of non- 413 conformity in the market. ... that address the confidence and information needs of ... Additionally, 423 the analysis of complex behaviors ...

2013-08-28T23:59:59.000Z

463

IC and Manufacturing Framework-red  

Science Conference Proceedings (OSTI)

... The US Office of Management and Budget (OMB) should build on the current federal budgeting process to engage in a cross-cutting analysis of ...

2013-07-31T23:59:59.000Z

464

ATLAS Tags Web Service calls Athena via Athenaeum Framework  

E-Print Network (OSTI)

High Energy Physics experiments start using a Web Service style application to access functionality of their main frameworks. Those frameworks, however, are not ready to be executed in a standard Web Service environment as frameworks are too complex, monolithic and use non-standard and non-portable technologies. ATLAS Tag Browser is one of those Web Service. To provide the possibility to extract full ATLAS events from the standard Web Service, we need to access to full ATLAS offline framework - Athena. As Athena cannot run directly within any Web Service, the client server approach has been chosen. Web Service calls Athena remotely over XML-RPC connection using Athenaeum framework. The paper will discuss integration of Athenaeum framework with ATLAS Tag database service, its distributed deployment, monitoring and performance.

Hrivnac, J; The ATLAS collaboration

2010-01-01T23:59:59.000Z

465

System architecture analysis and selection under uncertainty  

E-Print Network (OSTI)

A system architecture analysis and selection methodology is presented that builds on the Multidisciplinary Analysis and Optimization framework. It addresses a need and opportunity to extend the MAO techniques to include a ...

Smaling, Rudolf M

2005-01-01T23:59:59.000Z

466

Efficient dataflow analysis of logic programs  

Science Conference Proceedings (OSTI)

A framework for efficient dataflow analyses of logic programs is investigated. A number of problems arise in this context: aliasing effects can make analysis computationally expensive for sequential logic programming languages; synchronization issues ... Keywords: PROLOG, program analysis

Saumya K. Debray

1992-10-01T23:59:59.000Z

467

Decision Framework for Evaluating Advanced Nuclear Fuel Cycle Options  

Science Conference Proceedings (OSTI)

EPRI is working to develop tools to support long-term strategic planning for research, development, and demonstration (RD&D) of advanced nuclear fuel cycle technologies for electricity generation. The development of a decision framework to help guide the eventual deployment of advanced nuclear technologies represents a key component of this effort. This interim report describes the structure of a prototypical EPRI decision framework and illustrates how that framework can be applied to assess nuclear fuel...

2011-12-13T23:59:59.000Z

468

Risk assessment framework for geologic carbon sequestration sites  

E-Print Network (OSTI)

Framework for geologic carbon sequestration risk assessment,for geologic carbon sequestration risk assessment, Energyfor Geologic Carbon Sequestration, Int. J. of Greenhouse Gas

Oldenburg, C.

2010-01-01T23:59:59.000Z

469

A Scalable Framework for Cyber Attack Discovery and Situational...  

NLE Websites -- All DOE Office Websites (Extended Search)

Scalable Framework for Cyber Attack Discovery and Situational Understanding (SITU) May 15, 2013 Problem Statement: Cyber attacks cost commercial and governmental organizations vast...

470

The CO2 Adsorption in Zeolitic Imidazolate Framework 7  

Science Conference Proceedings (OSTI)

Author(s), Pu Zhao, Giulio Lampronti, Gareth Lloyd, Simon Redfern. On-Site Speaker (Planned), Pu Zhao. Abstract Scope, Zeolitic Imidazolate Framework 7 ...

471

Enterprise performance measurement system : metric design framework and tools  

E-Print Network (OSTI)

Existing metric selection methodologies and performance measurement frameworks provide practicing managers with good checklists and tools to evaluate and design their enterprise performance measurement systems (EPMS) and ...

Teo, Kai Siang

2013-01-01T23:59:59.000Z

472

Step 3. Identify the Appropriate Adoption Process and Framework...  

NLE Websites -- All DOE Office Websites (Extended Search)

3. Identify the Appropriate Adoption Process and Framework Description Once the code support infrastructure has established clear, measurable goals for a new energy code or update,...

473

A software framework for simulation-based scientific investigations .  

E-Print Network (OSTI)

??This thesis provides a design and development of a software architecture and programming framework that enables domain-oriented scientific investigations to be more easily developed and… (more)

Salman, Adnan M., 1965-

2010-01-01T23:59:59.000Z

474

Modeling Framework and Associated Simulation Tools for the ...  

Science Conference Proceedings (OSTI)

A modeling framework and the associated simulation tools are presented. It allows the ... Thermochemical Degradation Mechanisms of SiC/BN/SiC Composites.

475

Multi-scale, Multi-physics Optimization Framework for Additively ...  

Science Conference Proceedings (OSTI)

On-Site Speaker (Planned), Tahany El-Wardany. Abstract Scope, This paper proposes an optimization framework that enables the integration of multi-scale ...

476

Framework for Reducing Cyber Risks to Critical Infrastructure  

Science Conference Proceedings (OSTI)

... Policies and standards are published on an ... Law enforcement and the Federal Bureau of ... Duke Energy comments for Developing a Framework to ...

2013-04-08T23:59:59.000Z

477

A Neo-Rumsfeldian Framework for the Thermodynamics of Organic...  

NLE Websites -- All DOE Office Websites (Extended Search)

Neo-Rumsfeldian Framework for the Thermodynamics of Organic Particulate Matter Formation in the Atmosphere: Successes and Challenges Speaker(s): James F. Pankow Date: March 6, 2008...

478

Hydrogen-Defect Interactions in the Framework of the Defactant ...  

Science Conference Proceedings (OSTI)

Symposium, Multiscale Approaches to Hydrogen-assisted Degradation of Metals. Presentation Title, Hydrogen-Defect Interactions in the Framework of the ...

479

Using the Victorian Curriculum and Standards Framework in music education.  

E-Print Network (OSTI)

??This research examined the usefulness of the Victorian Curriculum and Standards Framework as the basis for school music education in Victoria. Interviews with experienced primary… (more)

Blyth, Andrew

2004-01-01T23:59:59.000Z

480

Microstructure Sensitive Design Framework for Elastic-Plastic Multi ...  

Science Conference Proceedings (OSTI)

Abstract Scope, In this study, a microstructure sensitive design (MSD) framework for elastic-plastic ... Elastic Deformation Mechanics of Cellulose Nanocrystals.

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

A Framework for the Optimization of Integrated Energy Systems...  

Open Energy Info (EERE)

A Framework for the Optimization of Integrated Energy Systems(Jain and Alleyne 2012) Home > Groups > Energy Systems Integration Qinsun's picture Submitted by Qinsun(35) Member 15...

482

An Analytical Framework for Long Term Policy for Commercial Deployment...  

Open Energy Info (EERE)

An Analytical Framework for Long Term Policy for Commercial Deployment and Innovation in Carbon Capture and Sequestration Technology in the United States Jump to: navigation,...

483

Recency Of Faulting And Neotechtonic Framework In The Dixie Valley...  

Open Energy Info (EERE)

Recency Of Faulting And Neotechtonic Framework In The Dixie Valley Geothermal Field And Other Geothermal Fields Of The Basin And Range Jump to: navigation, search GEOTHERMAL...

484

Addressing college readiness through a positive deviance framework.  

E-Print Network (OSTI)

??This exploratory study utilized a positive deviance theoretical framework to unveil the challenges faced by students preparing for college, as well as the strategies used… (more)

Rainey, Christie A.

2012-01-01T23:59:59.000Z

485

Cybersecurity Framework Workshop - May 29-31 2013  

Science Conference Proceedings (OSTI)

... Online: https://www.starwoodmeeting.com/Book/sei13. Phone: 412-261-2000 Ask for the Cybersecurity Framework Workshop rate. ...

2013-06-10T23:59:59.000Z

486

A Bayesian Network Framework for Relational Shape Matching  

E-Print Network (OSTI)

entropy maximization for Bayesian belief propagation. In T.problem. Essentially, the Bayesian network searches for theof the relational shape matching Bayesian network framework.

Anand Rangarajan; James Coughlan; Alan L. Yuille

2011-01-01T23:59:59.000Z

487

Optimization Online - A New Framework for Combining Global and ...  

E-Print Network (OSTI)

Jul 29, 2013 ... exxonmobil.com). Abstract: We propose a new framework for the optimization of computationally expensive black box problems, where neither ...

488

Stochastic Optimal Control Framework for Natural Gas Network...  

NLE Websites -- All DOE Office Websites (Extended Search)

Stochastic Optimal Control Framework for Natural Gas Network Operations Event Sponsor: Mathematics and Computing Science - LANS Seminar Start Date: Nov 20 2013 - 3:00pm Building...

489

A Framework for Studying the Environmental Impact of Biofuel Policies.  

E-Print Network (OSTI)

??In this thesis I present a new framework for investigating the environmental im- pact of and optimal policies for biofuel production. The model captures the… (more)

Størkersen, Thea Charlotte

2012-01-01T23:59:59.000Z

490

LEDS Toolkit and Framework | Open Energy Information  

Open Energy Info (EERE)

LEDS Toolkit and Framework LEDS Toolkit and Framework Jump to: navigation, search Tool Summary LAUNCH TOOL Name: LEDS Toolkit and Methodology Agency/Company /Organization: National Renewable Energy Laboratory Sector: Energy, Land, Water, Climate Topics: Low emission development planning Resource Type: Dataset User Interface: Website, Desktop Application Website: en.openei.org/apps/LEDS/ Cost: Free UN Region: Central Asia, Eastern Asia, South-Eastern Asia, "Pacific" is not in the list of possible values (Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia, Latin America and the Caribbean) for this property., "Latin America and Caribbean" is not in the list of possible values (Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia, Latin America and the Caribbean) for this property., "Western Asia & North Africa" is not in the list of possible values (Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia, Latin America and the Caribbean) for this property., Northern America, "South Asia" is not in the list of possible values (Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia, Latin America and the Caribbean) for this property., "Sub-Saharan Africa" is not in the list of possible values (Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia, Latin America and the Caribbean) for this property., "Western & Eastern Europe" is not in the list of possible values (Eastern Africa, Middle Africa, Northern Africa, Southern Africa, Western Africa, Caribbean, Central America, South America, Northern America, Central Asia, Eastern Asia, Southern Asia, South-Eastern Asia, Western Asia, Eastern Europe, Northern Europe, Southern Europe, Western Europe, Australia and New Zealand, Melanesia, Micronesia, Polynesia, Latin America and the Caribbean) for this property.

491

Engineering evaluation/cost analysis for the 233-S Plutonium Concentration Facility  

SciTech Connect

The deactivated 233-S Plutonium Concentration Facility (233-S Facility) is located in the 200 Area. The facility has undergone severe degradation due to exposure to extreme weather conditions. A rapid freeze and thaw cycle occurred at the Hanford Site during February 1996, which caused cracking to occur on portions of the building`s roof. This has resulted in significantly infiltration of water into the facility, which provides a pathway for potential release of radioactive material into the environment (air and/or ground). The weather caused several existing cracks in the concrete portions of the structure to lengthen, increasing the potential for failed confinement of the radioactive material in the building. Differential settlement has also occurred, causing portions of the facility to separate from the main building structure thus creating a potential for release of radioactive material t the environment. An expedited removal action is proposed to ensure that a release from the 233-S Facility does not occur. The US Department of Energy (DOE), Richland Operations Office (RL), in cooperation with the EPA, has prepared this Engineering Evaluation/Cost Analysis (EE/CA) pursuant to CERCLA. Based on the evaluation, RL has determined that hazardous substances in the 233-S Facility may present a potential threat to human health and/or the environment, and that an expedited removal action is w