Powered by Deep Web Technologies
Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Threat Analysis Framework | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof theRestorationAdvisoryManagement and on theofThreat Analysis

2

Threat Analysis Framework | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from theDepartment of EnergyThe Sun and Its EnergyMetalof Energy ThisThreat

3

A unified framework for trajectory planning, threat assessment, and semi-autonomous control of passenger vehicles  

E-Print Network [OSTI]

This thesis describes the design of an active safety framework that performs trajectory planning, threat assessment, and semi-autonomous control of passenger vehicles in hazard avoidance scenarios. The vehicle navigation ...

Anderson, Sterling J., Ph. D. Massachusetts Institute of Technology

2009-01-01T23:59:59.000Z

4

A margin-based approach to vehicle threat assessment in a homotopy framework for semi-autonomous highway navigation  

E-Print Network [OSTI]

This thesis describes the design of an unified framework for threat assessment and the shared control between a human driver and the onboard controller, based on the notion of fields of safe travel. It allows to perform ...

Constantin, Alexandre, S.M. Massachusetts Institute of Technology

2014-01-01T23:59:59.000Z

5

Sodium loop framework structural analysis  

SciTech Connect (OSTI)

This document provides the structural analysis of the Sodium Loop framework in a drop condition. The drop is similar to the US Department of Transportation non-bulk, performance-oriented packaging (Packaging Group I) drop test. The drop height evaluated for the Sodium Loop framework is 5.9 ft.

Nguyen, P.M.

1995-06-06T23:59:59.000Z

6

Detection and Analysis of Threats to the Energy Sector: DATES  

SciTech Connect (OSTI)

This report summarizes Detection and Analysis of Threats to the Energy Sector (DATES), a project sponsored by the United States Department of Energy and performed by a team led by SRI International, with collaboration from Sandia National Laboratories, ArcSight, Inc., and Invensys Process Systems. DATES sought to advance the state of the practice in intrusion detection and situational awareness with respect to cyber attacks in energy systems. This was achieved through adaptation of detection algorithms for process systems as well as development of novel anomaly detection techniques suited for such systems into a detection suite. These detection components, together with third-party commercial security systems, were interfaced with the commercial Security Information Event Management (SIEM) solution from ArcSight. The efficacy of the integrated solution was demonstrated on two testbeds, one based on a Distributed Control System (DCS) from Invensys, and the other based on the Virtual Control System Environment (VCSE) from Sandia. These achievements advance the DOE Cybersecurity Roadmap [DOE2006] goals in the area of security monitoring. The project ran from October 2007 until March 2010, with the final six months focused on experimentation. In the validation phase, team members from SRI and Sandia coupled the two test environments and carried out a number of distributed and cross-site attacks against various points in one or both testbeds. Alert messages from the distributed, heterogeneous detection components were correlated using the ArcSight SIEM platform, providing within-site and cross-site views of the attacks. In particular, the team demonstrated detection and visualization of network zone traversal and denial-of-service attacks. These capabilities were presented to the DistribuTech Conference and Exhibition in March 2010. The project was hampered by interruption of funding due to continuing resolution issues and agreement on cost share for four months in 2008. This resulted in delays in finalizing agreements with commercial partners, and in particular the Invensys testbed was not installed until December 2008 (as opposed to the March 2008 plan). The project resulted in a number of conference presentations and publications, and was well received when presented at industry forums. In spite of some interest on the part of the utility sector, we were unfortunately not able to engage a utility for a full-scale pilot deployment.

Alfonso Valdes

2010-03-31T23:59:59.000Z

7

Freight Analysis Framework version 3 (FAF3)  

E-Print Network [OSTI]

Freight Analysis Framework version 3 (FAF3) Oak Ridge National Laboratory managed by UT Technologies Research Brief T he Freight Analysis Framework version 3 (FAF3) database is a Federal Highway data to enable users to perform train analysis. FAF3 Geography Figure 1 shows the analysis regions

8

Project Programming and Commissioning as a Risk Mitigation and Threat Analysis Tool  

E-Print Network [OSTI]

procedures and 2 Jeff Schantz, AIA Director of Science and Technology Hellmuth, Obata and Kassabaum speaking on the benefits of Risk Threat Analysis in the commissioning process for Biological Defense and First Response Facilities. ICEBO2006, Shenzhen...?s lifecycle. Prior risk mitigation procedures typically focused on the physical aspects of a project and a process to protect function and cost. In today?s world, the risk to the project from naturally occurring environmental threats (weather...

Weiss, M. L.

2006-01-01T23:59:59.000Z

9

Risk Analysis of Phytophthora ramorum, a Newly Recognised Pathogen Threat to Europe  

E-Print Network [OSTI]

Risk Analysis of Phytophthora ramorum, a Newly Recognised Pathogen Threat to Europe and the Cause; 23rd January 2009) Deliverable Report D28 Report on the risk of entry, establishment, spread OF TABLES LIST OF FIGURES LIST OF PARTICIPANTS AND CONTRIBUTORS 3 5 6 SUMMARY: PEST RISK ANALYSIS

10

LAVA (Los Alamos Vulnerability and Risk Assessment Methodology): A conceptual framework for automated risk analysis  

SciTech Connect (OSTI)

At Los Alamos National Laboratory, we have developed an original methodology for performing risk analyses on subject systems characterized by a general set of asset categories, a general spectrum of threats, a definable system-specific set of safeguards protecting the assets from the threats, and a general set of outcomes resulting from threats exploiting weaknesses in the safeguards system. The Los Alamos Vulnerability and Risk Assessment Methodology (LAVA) models complex systems having large amounts of ''soft'' information about both the system itself and occurrences related to the system. Its structure lends itself well to automation on a portable computer, making it possible to analyze numerous similar but geographically separated installations consistently and in as much depth as the subject system warrants. LAVA is based on hierarchical systems theory, event trees, fuzzy sets, natural-language processing, decision theory, and utility theory. LAVA's framework is a hierarchical set of fuzzy event trees that relate the results of several embedded (or sub-) analyses: a vulnerability assessment providing information about the presence and efficacy of system safeguards, a threat analysis providing information about static (background) and dynamic (changing) threat components coupled with an analysis of asset ''attractiveness'' to the dynamic threat, and a consequence analysis providing information about the outcome spectrum's severity measures and impact values. By using LAVA, we have modeled our widely used computer security application as well as LAVA/CS systems for physical protection, transborder data flow, contract awards, and property management. It is presently being applied for modeling risk management in embedded systems, survivability systems, and weapons systems security. LAVA is especially effective in modeling subject systems that include a large human component.

Smith, S.T.; Lim, J.J.; Phillips, J.R.; Tisinger, R.M.; Brown, D.C.; FitzGerald, P.D.

1986-01-01T23:59:59.000Z

11

A threat-rigidity analysis of the Apache Software Foundation's response to reported server security issues  

E-Print Network [OSTI]

There exists a broad body of literature documenting organizational responses to competitive threats, including those responses which fit into the threat-rigidity hypothesis. The purpose of this thesis is to investigate how ...

Shapira, Yoav

2006-01-01T23:59:59.000Z

12

Novel Threat-risk Index Using Probabilistic Risk Assessment and Human Reliability Analysis - Final Report  

SciTech Connect (OSTI)

In support of a national need to improve the current state-of-the-art in alerting decision makers to the risk of terrorist attack, a quantitative approach employing scientific and engineering concepts to develop a threat-risk index was undertaken at the Idaho National Engineering and Environmental Laboratory (INEEL). As a result of this effort, a set of models has been successfully integrated into a single comprehensive model known as Quantitative Threat-Risk Index Model (QTRIM), with the capability of computing a quantitative threat-risk index on a system level, as well as for the major components of the system. Such a threat-risk index could provide a quantitative variant or basis for either prioritizing security upgrades or updating the current qualitative national color-coded terrorist threat alert.

George A. Beitel

2004-02-01T23:59:59.000Z

13

Initial Risk Analysis and Decision Making Framework  

SciTech Connect (OSTI)

Commercialization of new carbon capture simulation initiative (CCSI) technology will include two key elements of risk management, namely, technical risk (will process and plant performance be effective, safe, and reliable) and enterprise risk (can project losses and costs be controlled within the constraints of market demand to maintain profitability and investor confidence). Both of these elements of risk are incorporated into the risk analysis subtask of Task 7. Thus far, this subtask has developed a prototype demonstration tool that quantifies risk based on the expected profitability of expenditures when retrofitting carbon capture technology on a stylized 650 MW pulverized coal electric power generator. The prototype is based on the selection of specific technical and financial factors believed to be important determinants of the expected profitability of carbon capture, subject to uncertainty. The uncertainty surrounding the technical performance and financial variables selected thus far is propagated in a model that calculates the expected profitability of investments in carbon capture and measures risk in terms of variability in expected net returns from these investments. Given the preliminary nature of the results of this prototype, additional work is required to expand the scope of the model to include additional risk factors, additional information on extant and proposed risk factors, the results of a qualitative risk factor elicitation process, and feedback from utilities and other interested parties involved in the carbon capture project. Additional information on proposed distributions of these risk factors will be integrated into a commercial implementation framework for the purpose of a comparative technology investment analysis.

Engel, David W.

2012-02-01T23:59:59.000Z

14

Uintah -a scalable framework for hazard analysis Martin Berzins  

E-Print Network [OSTI]

Uintah - a scalable framework for hazard analysis Martin Berzins Scientific Computing and Imaging of Uintah to a petascale problem in hazard analysis arising from "sympathetic" explosions in which. Devices containing such materials undergo extensive testing for hazard classification prior

Utah, University of

15

Flexible Framework for Building Energy Analysis: Preprint  

SciTech Connect (OSTI)

In the building energy research and advanced practitioner communities, building models are perturbed across large parameter spaces to assess energy and cost performance in the face of programmatic and economic constraints. This paper describes the OpenStudio software framework for performing such analyses.

Hale, E.; Macumber, D.; Weaver, E.; Shekhar, D.

2012-09-01T23:59:59.000Z

16

Microsoft Word - Threat Analysis Framework Sept07_comments-final.doc  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Careerlumens_placard-green.eps MoreWSRC-STI-2007-00250 Rev. 05 Oak09 U . S . D e p a rSTATEMENT OF

17

The Omniscient Garbage Collector: a Resource Analysis Framework (extended abstract)  

E-Print Network [OSTI]

The Omniscient Garbage Collector: a Resource Analysis Framework (extended abstract) Aurélien point of view, we develop the omniscient garbage collector (OGC), which decides precisely when the resource index requires an omniscient garbage collector, a NP-complete problem tightly connected

Paris-Sud XI, Université de

18

Analysis framework for the J-PET scanner  

E-Print Network [OSTI]

J-PET analysis framework is a flexible, lightweight, ROOT-based software package which provides the tools to develop reconstruction and calibration procedures for PET tomography. In this article we present the implementation of the full data-processing chain in the J-PET framework which is used for the data analysis of the J-PET tomography scanner. The Framework incorporates automated handling of PET setup parameters' database as well as high level tools for building data reconstruction procedures. Each of these components is briefly discussed.

Krzemie?, W; Gruntowski, A; Stola, K; Trybek, D; Bednarski, T; Bia?as, P; Czerwi?ski, E; Kami?ska, D; Kap?on, L; Kochanowski, A; Korcyl, G; Kowal, J; Kowalski, P; Kozik, T; Kubicz, E; Moskal, P; Nied?wiecki, Sz; Pa?ka, M; Raczy?ski, L; Rudy, Z; Salabura, P; Sharma, N G; Silarski, M; S?omski, A; Smyrski, J; Strzelecki, A; Wieczorek, A; Wi?licki, W; Zieli?ski, M; Zo?, N

2015-01-01T23:59:59.000Z

19

Geologic Framework Model Analysis Model Report  

SciTech Connect (OSTI)

The purpose of this report is to document the Geologic Framework Model (GFM), Version 3.1 (GFM3.1) with regard to data input, modeling methods, assumptions, uncertainties, limitations, and validation of the model results, qualification status of the model, and the differences between Version 3.1 and previous versions. The GFM represents a three-dimensional interpretation of the stratigraphy and structural features of the location of the potential Yucca Mountain radioactive waste repository. The GFM encompasses an area of 65 square miles (170 square kilometers) and a volume of 185 cubic miles (771 cubic kilometers). The boundaries of the GFM were chosen to encompass the most widely distributed set of exploratory boreholes (the Water Table or WT series) and to provide a geologic framework over the area of interest for hydrologic flow and radionuclide transport modeling through the unsaturated zone (UZ). The depth of the model is constrained by the inferred depth of the Tertiary-Paleozoic unconformity. The GFM was constructed from geologic map and borehole data. Additional information from measured stratigraphy sections, gravity profiles, and seismic profiles was also considered. This interim change notice (ICN) was prepared in accordance with the Technical Work Plan for the Integrated Site Model Process Model Report Revision 01 (CRWMS M&O 2000). The constraints, caveats, and limitations associated with this model are discussed in the appropriate text sections that follow. The GFM is one component of the Integrated Site Model (ISM) (Figure l), which has been developed to provide a consistent volumetric portrayal of the rock layers, rock properties, and mineralogy of the Yucca Mountain site. The ISM consists of three components: (1) Geologic Framework Model (GFM); (2) Rock Properties Model (RPM); and (3) Mineralogic Model (MM). The ISM merges the detailed project stratigraphy into model stratigraphic units that are most useful for the primary downstream models and the repository design. These downstream models include the hydrologic flow models and the radionuclide transport models. All the models and the repository design, in turn, will be incorporated into the Total System Performance Assessment (TSPA) of the potential radioactive waste repository block and vicinity to determine the suitability of Yucca Mountain as a host for the repository. The interrelationship of the three components of the ISM and their interface with downstream uses are illustrated in Figure 2.

R. Clayton

2000-12-19T23:59:59.000Z

20

A Generic Framework for Interprocedural Analysis of Numerical Properties  

E-Print Network [OSTI]

A Generic Framework for Interprocedural Analysis of Numerical Properties Markus M¨uller-Olm1, Germany markus.mueller-olm@cs.uni-dortmund.de 2 TU M¨unchen, Institut f¨ur Informatik, I2 80333 M of the abstracted collecting semantics is also used by M¨uller-Olm and Seidl in [12] where (in absence of equality

Müller-Olm, Markus

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Breakthrough Technologies Leaf Extraction and Analysis Framework Graphical User  

E-Print Network [OSTI]

: Segmenting and Analyzing the Structure of Leaf Veins and Areoles1[W][OA] Charles A. Price*, Olga Symonova and Analysis Framework Graphical User Interface (LEAF GUI), a user-assisted software tool that facilitates software promises to facilitate improved understanding of the adaptive and ecological significance of leaf

Weitz, Joshua S.

22

A Framework for Radio Frequency Spectrum Measurement and Analysis  

E-Print Network [OSTI]

A Framework for Radio Frequency Spectrum Measurement and Analysis V. Rory Petty ITTC-FY2008-TR allocation and the burgeoning problem of spectrum scarcity have prompted an examination of how the radio frequency spectrum is utilized. The radio frequency spectrum is an important national resource that impacts

Kansas, University of

23

Framework for Interactive Parallel Dataset Analysis on the Grid  

SciTech Connect (OSTI)

We present a framework for use at a typical Grid site to facilitate custom interactive parallel dataset analysis targeting terabyte-scale datasets of the type typically produced by large multi-institutional science experiments. We summarize the needs for interactive analysis and show a prototype solution that satisfies those needs. The solution consists of desktop client tool and a set of Web Services that allow scientists to sign onto a Grid site, compose analysis script code to carry out physics analysis on datasets, distribute the code and datasets to worker nodes, collect the results back to the client, and to construct professional-quality visualizations of the results.

Alexander, David A.; Ananthan, Balamurali; /Tech-X Corp.; Johnson, Tony; Serbo, Victor; /SLAC

2007-01-10T23:59:59.000Z

24

Towards secure virtual directories : a risk analysis framework.  

SciTech Connect (OSTI)

Directory services are used by almost every enterprise computing environment to provide data concerning users, computers, contacts, and other objects. Virtual directories are components that provide directory services in a highly customized manner. Unfortunately, though the use of virtual directory services are widespread, an analysis of risks posed by their unique position and architecture has not been completed. We present a detailed analysis of six attacks to virtual directory services, including steps for detection and prevention. We also describe various categories of attack risks, and discuss what is necessary to launch an attack on virtual directories. Finally, we present a framework to use in analyzing risks to individual enterprise computing virtual directory instances. We show how to apply this framework to an example implementation, and discuss the benefits of doing so.

Claycomb, William R.

2010-07-01T23:59:59.000Z

25

A Complexity Science-Based Framework for Global Joint Operations Analysis to Support Force Projection: LDRD Final Report.  

SciTech Connect (OSTI)

The military is undergoing a significant transformation as it modernizes for the information age and adapts to address an emerging asymmetric threat beyond traditional cold war era adversaries. Techniques such as traditional large-scale, joint services war gaming analysis are no longer adequate to support program evaluation activities and mission planning analysis at the enterprise level because the operating environment is evolving too quickly. New analytical capabilities are necessary to address modernization of the Department of Defense (DoD) enterprise. This presents significant opportunity to Sandia in supporting the nation at this transformational enterprise scale. Although Sandia has significant experience with engineering system of systems (SoS) and Complex Adaptive System of Systems (CASoS), significant fundamental research is required to develop modeling, simulation and analysis capabilities at the enterprise scale. This report documents an enterprise modeling framework which will enable senior level decision makers to better understand their enterprise and required future investments.

Lawton, Craig R.

2015-01-01T23:59:59.000Z

26

A Generic Framework for Interprocedural Analysis of Numerical Properties  

E-Print Network [OSTI]

A Generic Framework for Interprocedural Analysis of Numerical Properties Markus MË?uller­Olm 1, Germany markus.mueller­olm@cs.uni­dortmund.de 2 TU MË?unchen, Institut fË?ur Informatik, I2 80333 M of the abstracted collecting semantics is also used by MË?uller­Olm and Seidl in [12] where (in absence of equality

Seidl, Helmut

27

HistFitter software framework for statistical data analysis  

E-Print Network [OSTI]

We present a software framework for statistical data analysis, called HistFitter, that has been used extensively by the ATLAS Collaboration to analyze big datasets originating from proton-proton collisions at the Large Hadron Collider at CERN. Since 2012 HistFitter has been the standard statistical tool in searches for supersymmetric particles performed by ATLAS. HistFitter is a programmable and flexible framework to build, book-keep, fit, interpret and present results of data models of nearly arbitrary complexity. Starting from an object-oriented configuration, defined by users, the framework builds probability density functions that are automatically fitted to data and interpreted with statistical tests. A key innovation of HistFitter is its design, which is rooted in core analysis strategies of particle physics. The concepts of control, signal and validation regions are woven into its very fabric. These are progressively treated with statistically rigorous built-in methods. Being capable of working with multiple data models at once, HistFitter introduces an additional level of abstraction that allows for easy bookkeeping, manipulation and testing of large collections of signal hypotheses. Finally, HistFitter provides a collection of tools to present results with publication-quality style through a simple command-line interface.

M. Baak; G. J. Besjes; D. Cote; A. Koutsman; J. Lorenz; D. Short

2014-10-06T23:59:59.000Z

28

Airborne Particulate Threat Assessment  

SciTech Connect (OSTI)

Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our findings and APICD Gen II subsystems for automated collection, deposition and detection of ambient particulate matter. Key findings from the APTA Program include: Ambient biological PM taxonomy; Demonstration of key subsystems needed for autonomous bioaerosol detection; System design; Efficient electrostatic collection; Automated bioagent recognition; Raman analysis performance validating Td<9 sec; Efficient collection surface regeneration; and Development of a quantitative bioaerosol defection model. The objective of the APTA program was to advance the state of our knowledge of ambient background PM composition. Operation of an automated aerosol detection system was enhanced by a more accurate assessment of background variability, especially for sensitive and specific sensing strategies like Raman detection that are background-limited in performance. Based on this improved knowledge of background, the overall threat detection performance of Raman sensors was improved.

Patrick Treado; Oksana Klueva; Jeffrey Beckstead

2008-12-31T23:59:59.000Z

29

Insider Threat Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish responsibilities and requirements for the Department of Energy (DOE) Insider Threat Program (ITP) to deter, detect, and mitigate insider threat actions by Federal and contractor employees in accordance with the requirements of Executive Order 13587, the National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs and other government-wide and DOE requirements. Does not cancel other directives.

2014-06-02T23:59:59.000Z

30

Cyber threat metrics.  

SciTech Connect (OSTI)

Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

2012-03-01T23:59:59.000Z

31

Nuclear threats from small states  

SciTech Connect (OSTI)

What are the policy implications regarding proliferation and counter proliferation of nuclear weapons among Third World states. How does deterrence operate outside the parameters of superpower confrontation as defined by the cold war elaborate system of constraints enforced by concepts like mutual assured destruction, and counter-value and counter-force targeting. How can US policymakers devise contingencies for dealing with nuclear threats posed by countries like North Korea, Libya, Iraq, Iran, and Syria. These are some of the unsettling but nevertheless important questions addressed by the author in this monograph. In his analysis, Mr. Jerome Kahan examines the likelihood that one or more of these countries will use nuclear weapons before the year 2000. He also offers a framework that policymakers and planners might use in assessing US interests in preempting the use of nuclear weapons or in retaliating for their use. Ironically, with the end of the cold war, it is imperative that defense strategists, policymakers, and military professionals think about the `unthinkable`. In the interest of fostering debate on this important subject, the Strategic Studies Institute commends this insightful monograph.

Kahan, J.H.

1994-06-13T23:59:59.000Z

32

Power transmission investment analysis: a new financial Evaluation framework for South Africa  

SciTech Connect (OSTI)

A proposed framework for power transmission expansion projects in South Africa incorporates the modeling of project options and uncertainties, Monte Carlo simulations, real option analysis, and decision analysis, based on a foundation of strategic analysis. (author)

Maboke, Silky Ntombifuthi; Kachienga, Michael Ogembo

2008-05-15T23:59:59.000Z

33

Analysis, Design and Development of a Generic Framework for Power Trading  

E-Print Network [OSTI]

in their producing plans (e.g. wind power plant). The bid model is the best model for clients with units havingAnalysis, Design and Development of a Generic Framework for Power Trading Rasmus Skovmark, s001509 analysis, design and development of a generic framework for automatic real- time trading of power among

34

A parallel and matrix free framework for global stability analysis of compressible flows  

E-Print Network [OSTI]

An numerical iterative framework for global modal stability analysis of compressible flows using a parallel environment is presented. The framework uses a matrix-free implementation to allow computations of large scale problems. Various methods are tested with regard to convergence acceleration of the framework. The methods consist of a spectral Cayley transformation used to select desired Eigenvalues from a large spectrum, an improved linear solver and a parallel block-Jacobi preconditioning scheme.

Henze, O; Sesterhenn, J

2015-01-01T23:59:59.000Z

35

A macro-micro system architecture analysis framework applied to Smart Grid meter data management systems by Sooraj Prasannan.  

E-Print Network [OSTI]

This thesis proposes a framework for architectural analysis of a system at the Macro and Micro levels. The framework consists of two phases -- Formulation and Analysis. Formulation is made up of three steps -- Identifying ...

Prasannan, Sooraj

2010-01-01T23:59:59.000Z

36

C-Meter: A Framework for Performance Analysis of Computing Clouds  

E-Print Network [OSTI]

C-Meter: A Framework for Performance Analysis of Computing Clouds Nezih Yigitbasi, Alexandru Iosup virtualization and network communications overheads. To address these issues, we have designed and implemented C-Meter of computing clouds. Then, we present the architecture of the C-Meter framework and discuss several resource

Iosup, Alexandru

37

Cybersecurity Framework Development Overview  

E-Print Network [OSTI]

Cybersecurity Framework Development Overview NIST's Role in Implementing Executive Order 13636 "Improving Critical Infrastructure Cybersecurity" #12;Executive Order 13636: Improving Critical Infrastructure Cybersecurity - February 12, 2013 "The cyber threat to critical infrastructure continues to grow

Bentz, Dale P.

38

Cybersecurity Framework Development Overview  

E-Print Network [OSTI]

Cybersecurity Framework Development Overview NIST's Role in Implementing Executive Order 13636 "Improving Critical Infrastructure Cybersecurity" #12;Executive Order 13636: Improving Critical Infrastructure Cybersecurity February 12, 2013 · "The cyber threat to critical infrastructure continues to grow

39

IEEE SIGNAL PROCESSING MAGAZINE 2013 1 Kernel Multivariate Analysis Framework for  

E-Print Network [OSTI]

IEEE SIGNAL PROCESSING MAGAZINE 2013 1 Kernel Multivariate Analysis Framework for Supervised in the literature collectively grouped under the field of Multivariate Analysis (MVA). This paper provides a uniform Correlation Analysis (CCA) and Orthonormalized PLS (OPLS), as well as their non- linear extensions derived

Camps-Valls, Gustavo

40

A network-based modeling framework for stakeholder analysis of China's energy conservation campaign  

E-Print Network [OSTI]

A network-based modeling framework for stakeholder analysis of China's energy conservation campaign Available online 13 July 2011 Keywords: Energy conservation Policy-making Stakeholder analysis Network, the stakeholder analysis of China's energy conservation campaign still has been under-developed. This paper

de Weck, Olivier L.

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid  

E-Print Network [OSTI]

Towards a Framework for Cyber Attack Impact Analysis of the Electric Smart Grid Deepa Kundur analysis of a smart grid. We focus on the model synthesis stage in which both cyber and physical grid-effect relationships can be conveniently expressed for both analysis and extension to large-scale smart grid systems. I

Kundur, Deepa

42

A Conceptual Framework for Semantic Case-based Safety Analysis Olawande Daramola, Tor Stlhane  

E-Print Network [OSTI]

.biffl}@tuwien.ac.at Abstract Hazard and Operability (HAZOP) Analysis and Fail- ure Mode and Effect Analysis (FMEA) are among-based framework for safety analy- sis, which facilitates the reuse of previous HAZOP and FMEA experiences in order application. Key words: Safety analysis, HAZOP, FMEA, ontology, requirements, case-based reasoning, natural

43

CIMS: A FRAMEWORK FOR INFRASTRUCTURE INTERDEPENDENCY MODELING AND ANALYSIS  

SciTech Connect (OSTI)

Today’s society relies greatly upon an array of complex national and international infrastructure networks such as transportation, utilities, telecommunication, and even financial networks. While modeling and simulation tools have provided insight into the behavior of individual infrastructure networks, a far less understood area is that of the interrelationships among multiple infrastructure networks including the potential cascading effects that may result due to these interdependencies. This paper first describes infrastructure interdependencies as well as presenting a formalization of interdependency types. Next the paper describes a modeling and simulation framework called CIMS© and the work that is being conducted at the Idaho National Laboratory (INL) to model and simulate infrastructure interdependencies and the complex behaviors that can result.

Donald D. Dudenhoeffer; May R. Permann; Milos Manic

2006-12-01T23:59:59.000Z

44

Energy and Greenhouse Impacts of Biofuels: A Framework for Analysis  

E-Print Network [OSTI]

Greenhouse Gas Impacts of Biofuels Wang, M. (2001) "Energy & Greenhouse Gas Impacts of Biofuels Fuels and MotorLifecycle Analysis of Biofuels." Report UCD-ITS-RR-06-08.

Kammen, Daniel M.; Farrell, Alexander E.; Plevin, Richard J.; Jones, Andrew D.; Nemet, Gregory F.; Delucchi, Mark A.

2008-01-01T23:59:59.000Z

45

Use of probabilistic methods for analysis of cost and duration uncertainties in a decision analysis framework  

SciTech Connect (OSTI)

Probabilistic forecasting techniques have been used in many risk assessment and performance assessment applications on radioactive waste disposal projects such as Yucca Mountain and the Waste Isolation Pilot Plant (WIPP). Probabilistic techniques such as Monte Carlo and Latin Hypercube sampling methods are routinely used to treat uncertainties in physical parameters important in simulating radionuclide transport in a coupled geohydrologic system and assessing the ability of that system to comply with regulatory release limits. However, the use of probabilistic techniques in the treatment of uncertainties in the cost and duration of programmatic alternatives on risk and performance assessment projects is less common. Where significant uncertainties exist and where programmatic decisions must be made despite existing uncertainties, probabilistic techniques may yield important insights into decision options, especially when used in a decision analysis framework and when properly balanced with deterministic analyses. For relatively simple evaluations, these types of probabilistic evaluations can be made using personal computer-based software.

Boak, D.M.; Painton, L.

1995-12-08T23:59:59.000Z

46

Global Threat Reduction Initiative  

E-Print Network [OSTI]

Global Threat Reduction Initiative ­ Conversion Program: Reduced Enrichment for Research and Test the dual application of splitting the atom, U.S. policy towards civilian use of highly enriched uranium and test reactors fueled first with low enriched uranium (LEU) and then later with HEU. By the early 1970s

Kemner, Ken

47

A Risk-Based System Analysis Framework for Geological Carbon Sequestration.  

SciTech Connect (OSTI)

The purpose of this project was to characterize existing carbon capture and sequestration technologies at a high level, develop an analytical framework to help assess the technologies, and implement the framework in a system dynamics model. The first year of this project succeeded in characterizing existing technologies to help focus the analysis on power plants. The assessment also helped determine which technologies are largely accepted by the carbon capture research community as relatively proven technologies, discuss the salient performance metrics, and assess the associated economics. With this information, an analytical framework was developed to assess the technologies from a systems view perspective. With this framework, the Carbon Sequestration and Risk Model (CSR) was developed to assess performance and economic risk issues as they relate to global atmospheric CO2 concentration goals and single plant scale projects to characterize the economics of these systems.

Kobos, Peter H.; Klotz, Richard

2006-10-01T23:59:59.000Z

48

Analysis of the Forest Products Cluster in Indiana: A Framework for Improving Productivity and  

E-Print Network [OSTI]

Analysis of the Forest Products Cluster in Indiana: A Framework for Improving Productivity Graduate Students: Silas Tora, FNR, M.S. Goals: · Suggest ways in which the forest products industry can Clustering of the Value - Added Forest Products Manufacturing industry in Indiana. (In Progress). Silas Tora

49

3D Human Motion Analysis Framework for Shape Similarity and Retrieval  

E-Print Network [OSTI]

3D Human Motion Analysis Framework for Shape Similarity and Retrieval Rim Slamaa,b , Hazem Wannousa, Villeneuve d'Ascq, France c Institut Mines-T´el´ecom / T´el´ecom Lille, Villeneuve d'Ascq, France Abstract 3D the problem of 3D shape representation and shape similarity in human video sequences. Our shape representation

Paris-Sud XI, Université de

50

Mauve: a Component-based Modeling Framework for Real-time Analysis of Robotic Applications  

E-Print Network [OSTI]

Mauve: a Component-based Modeling Framework for Real-time Analysis of Robotic Applications Charles paradigm for robotic software devel- opment [2], applied in many applications [3], [4], [5], [6]. Resulting validation of the robotic application, by directly analysing the architecture specification, and limiting

51

Temperature Control Framework Using Wireless Sensor Networks and Geostatistical Analysis for Total Spatial Awareness  

E-Print Network [OSTI]

cooling and heating mechanisms in buildings at every location for improved user comfort. Keywords ­ Smart presents a novel framework for intelligent temperature control in smart homes using Wireless Sensor Analysis; Classical Variography; Ordinary Point Kriging I. INTRODUCTION Research involving smart homes has

Fan, Jeffrey

52

TIME-FREQUENCY-PHASE COHERENCE GENERAL FRAMEWORK FOR SIGNAL ANALYSIS IN PASSIVE CONTEXT  

E-Print Network [OSTI]

behavior (underwater mammals vocalizations) and electronic warfare will prove the efficiency case, the passive behavior of the signal intelligence field is a well-known problem in the electronic warfare problem. In this paper we propose a general signal analysis framework in passive context. We show

Paris-Sud XI, Université de

53

A Framework for the Analysis of Process Mining Philip Weber, Behzad Bordbar, Peter Tino  

E-Print Network [OSTI]

1 A Framework for the Analysis of Process Mining Algorithms Philip Weber, Behzad Bordbar, Peter Tino Abstract--There are many process mining algorithms and representations, making it difficult to choose which algorithm to use or compare results. Process mining is essentially a machine learning task

Tino, Peter

54

Proliferation: Threat and response  

SciTech Connect (OSTI)

During the height of the Cold War, the Russian physicist Andre Sakharov said, `Reducing the risk of annihilating humanity in a nuclear war carries an absolute priority over all other considerations.` The end of the Cold War has reduced the threat of global nuclear war, but today a new threat is rising from the global spread of nuclear, biological, and chemical weapons. Hostile groups and nations have tried - or have been able - to obtain these weapons, the technology, and homegrown ability to make them or ballistic missiles that can deliver the massive annihilation, poison, and death of these weapons hundreds of miles away. For rogue nations, these weapons are a ticket to power, stature, and confidence in regional war.

NONE

1996-04-01T23:59:59.000Z

55

An Analysis Framework for Investigating the Trade-offs Between System Performance and Energy Consumption in a Heterogeneous Computing Environment  

E-Print Network [OSTI]

An Analysis Framework for Investigating the Trade-offs Between System Performance and Energy of energy and earn different amounts of utility. We demonstrate our analysis framework using real data.rambharos@gmail.com Abstract--Rising costs of energy consumption and an ongo- ing effort for increases in computing performance

Maciejewski, Anthony A.

56

Fuel Cycle Analysis Framework Base Cases for the IAEA/INPRO GAINS Collaborative Project  

SciTech Connect (OSTI)

Thirteen countries participated in the Collaborative Project GAINS “Global Architecture of Innovative Nuclear Energy Systems Based on Thermal and Fast Reactors Including a Closed Fuel Cycle”, which was the primary activity within the IAEA/INPRO Program Area B: “Global Vision on Sustainable Nuclear Energy” for the last three years. The overall objective of GAINS was to develop a standard framework for assessing future nuclear energy systems taking into account sustainable development, and to validate results through sample analyses. This paper details the eight scenarios that constitute the GAINS framework base cases for analysis of the transition to future innovative nuclear energy systems. The framework base cases provide a reference for users of the framework to start from in developing and assessing their own alternate systems. Each base case is described along with performance results against the GAINS sustainability evaluation metrics. The eight cases include four using a moderate growth projection and four using a high growth projection for global nuclear electricity generation through 2100. The cases are divided into two sets, addressing homogeneous and heterogeneous scenarios developed by GAINS to model global fuel cycle strategies. The heterogeneous world scenario considers three separate nuclear groups based on their fuel cycle strategies, with non-synergistic and synergistic cases. The framework base case analyses results show the impact of these different fuel cycle strategies while providing references for future users of the GAINS framework. A large number of scenario alterations are possible and can be used to assess different strategies, different technologies, and different assumptions about possible futures of nuclear power. Results can be compared to the framework base cases to assess where these alternate cases perform differently versus the sustainability indicators.

Brent Dixon

2012-09-01T23:59:59.000Z

57

PITTSBURGH REGIONAL ENVIRONMENTAL THREATS ANALYSIS  

E-Print Network [OSTI]

.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Coke Oven Emissions.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 Carbon Tetrachloride.. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Acetaldehyde

Jiang, Huiqiang

58

Aligning Technology Solutions to Address Over-the-Horizon Threats  

E-Print Network [OSTI]

Aligning Technology Solutions to Address Over-the-Horizon Threats As the world's geopolitical for the U.S. Government bridging the gap between policy development and technology implementation WHAT WE-the-horizon security threats and issues Analysis results to support U.S. policymakers and the science and technology

59

Addressing the insider threat  

SciTech Connect (OSTI)

Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

1993-05-01T23:59:59.000Z

60

Addressing the insider threat  

SciTech Connect (OSTI)

Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

1993-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Identification of threats using linguistics-based knowledge extraction.  

SciTech Connect (OSTI)

One of the challenges increasingly facing intelligence analysts, along with professionals in many other fields, is the vast amount of data which needs to be reviewed and converted into meaningful information, and ultimately into rational, wise decisions by policy makers. The advent of the world wide web (WWW) has magnified this challenge. A key hypothesis which has guided us is that threats come from ideas (or ideology), and ideas are almost always put into writing before the threats materialize. While in the past the 'writing' might have taken the form of pamphlets or books, today's medium of choice is the WWW, precisely because it is a decentralized, flexible, and low-cost method of reaching a wide audience. However, a factor which complicates matters for the analyst is that material published on the WWW may be in any of a large number of languages. In 'Identification of Threats Using Linguistics-Based Knowledge Extraction', we have sought to use Latent Semantic Analysis (LSA) and other similar text analysis techniques to map documents from the WWW, in whatever language they were originally written, to a common language-independent vector-based representation. This then opens up a number of possibilities. First, similar documents can be found across language boundaries. Secondly, a set of documents in multiple languages can be visualized in a graphical representation. These alone offer potentially useful tools and capabilities to the intelligence analyst whose knowledge of foreign languages may be limited. Finally, we can test the over-arching hypothesis--that ideology, and more specifically ideology which represents a threat, can be detected solely from the words which express the ideology--by using the vector-based representation of documents to predict additional features (such as the ideology) within a framework based on supervised learning. In this report, we present the results of a three-year project of the same name. We believe these results clearly demonstrate the general feasibility of an approach such as that outlined above. Nevertheless, there are obstacles which must still be overcome, relating primarily to how 'ideology' should be defined. We discuss these and point to possible solutions.

Chew, Peter A.

2008-09-01T23:59:59.000Z

62

J-PET analysis framework for the prototype TOF-PET detector  

E-Print Network [OSTI]

Novel TOF-PET scanner solutions demand, apart from the state of the art detectors, software for fast processing of the gathered data, monitoring of the whole scanner and reconstruction of the PET image. In this article we present an analysis framework for the novel STRIP-PET scanner developed by the J-PET collaboration in the Institute of Physics of the Jagiellonian University. This software is based on the ROOT package used in many particle physics experiments.

Krzemie?, W; Stola, K; Trybek, D; Bednarski, T; Bia?as, P; Czerwi?ski, E; Kap?on, ?; Kochanowski, A; Korcyl, G; Kowal, J; Kowalski, P; Kozik, T; Molenda, M; Moskal, P; Nied?wiecki, Sz; Pa?ka, M; Pawlik, M; Raczy?ski, L; Rudy, Z; Salabura, P; Sharma, N G; S?omski, A; Smyrski, J; Strzelecki, A; Wi?licki, W; Zieli?ski, M; Zo?, N

2013-01-01T23:59:59.000Z

63

Bio-threat microparticle simulants  

DOE Patents [OSTI]

A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

Farquar, George Roy; Leif, Roald

2014-09-16T23:59:59.000Z

64

Additive Manufacturing in China: Threats, Opportunities, and Developments (Part I)  

E-Print Network [OSTI]

application of additive manufacturing in China’s aviationAnalysis May 2013 Additive Manufacturing in China: Threats,an overview of China’s additive manufacturing industry is

ANDERSON, Eric

2013-01-01T23:59:59.000Z

65

Bridging Human Reliability Analysis and Psychology, Part 2: A Cognitive Framework to Support HRA  

SciTech Connect (OSTI)

This is the second of two papers that discuss the literature review conducted as part of the U.S. Nuclear Regulatory Commission (NRC) effort to develop a hybrid human reliability analysis (HRA) method in response to Staff Requirements Memorandum (SRM) SRM-M061020. This review was conducted with the goal of strengthening the technical basis within psychology, cognitive science and human factors for the hybrid HRA method being proposed. An overview of the literature review approach and high-level structure is provided in the first paper, whereas this paper presents the results of the review. The psychological literature review encompassed research spanning the entirety of human cognition and performance, and consequently produced an extensive list of psychological processes, mechanisms, and factors that contribute to human performance. To make sense of this large amount of information, the results of the literature review were organized into a cognitive framework that identifies causes of failure of macrocognition in humans, and connects those proximate causes to psychological mechanisms and performance influencing factors (PIFs) that can lead to the failure. This cognitive framework can serve as a tool to inform HRA. Beyond this, however, the cognitive framework has the potential to also support addressing human performance issues identified in Human Factors applications.

April M. Whaley; Stacey M. L. Hendrickson; Ronald L. Boring; Jing Xing

2012-06-01T23:59:59.000Z

66

Uncertainty Analysis Framework - Hanford Site-Wide Groundwater Flow and Transport Model  

SciTech Connect (OSTI)

Pacific Northwest National Laboratory (PNNL) embarked on a new initiative to strengthen the technical defensibility of the predictions being made with a site-wide groundwater flow and transport model at the U.S. Department of Energy Hanford Site in southeastern Washington State. In FY 2000, the focus of the initiative was on the characterization of major uncertainties in the current conceptual model that would affect model predictions. The long-term goals of the initiative are the development and implementation of an uncertainty estimation methodology in future assessments and analyses using the site-wide model. This report focuses on the development and implementation of an uncertainty analysis framework.

Cole, Charles R.; Bergeron, Marcel P.; Murray, Christopher J.; Thorne, Paul D.; Wurstner, Signe K.; Rogers, Phillip M.

2001-11-09T23:59:59.000Z

67

A FRAMEWORK FOR THE ANALYSIS OF LOCALIZED CORROSION AT THE PROPOSED YUCCA MOUNTAIN REPOSITORY  

SciTech Connect (OSTI)

Corrosion is a primary determinant of waste package performance at the proposed Yucca Mountain Repository: (1) the most likely degradation process; (2) controls the delay time for radionuclide transport from the waste package; and (3) determines when packages will be penetrated and the shape size and distribution of those penetrations. In this presentation a framework for the analysis of localized corrosion is presented and demonstrated for a scenario: (1) water chemistry of mixed salt solutions (sodium chloride-potassium nitrate); and (2) time-temperature-relative humidity profiles for a hot, mid and cool temperature waste package.

Dr. J.H. Payer

2006-04-18T23:59:59.000Z

68

A multi-tier framework for dynamic data collection, analysis, and visualization  

E-Print Network [OSTI]

This thesis describes a framework for collecting, analyzing, and visualizing dynamic data, particularly data gathered through Web questionnaires. The framework addresses challenges such as promoting user participation, ...

Ke, Xian, 1981-

2004-01-01T23:59:59.000Z

69

Offshore petroleum security: Analysis of offshore security threats, target attractiveness, and the international legal framework for the protection and security of offshore petroleum installations.  

E-Print Network [OSTI]

??The offshore petroleum industry is of critical importance to the global economy. Offshore petroleum installations are considered elements of critical national infrastructure in many nation-States… (more)

Kashubsky, Mikhail

2011-01-01T23:59:59.000Z

70

A framework for graph-based synthesis, analysis, and visualization of HPC cluster job data.  

SciTech Connect (OSTI)

The monitoring and system analysis of high performance computing (HPC) clusters is of increasing importance to the HPC community. Analysis of HPC job data can be used to characterize system usage and diagnose and examine failure modes and their effects. This analysis is not straightforward, however, due to the complex relationships that exist between jobs. These relationships are based on a number of factors, including shared compute nodes between jobs, proximity of jobs in time, etc. Graph-based techniques represent an approach that is particularly well suited to this problem, and provide an effective technique for discovering important relationships in job queuing and execution data. The efficacy of these techniques is rooted in the use of a semantic graph as a knowledge representation tool. In a semantic graph job data, represented in a combination of numerical and textual forms, can be flexibly processed into edges, with corresponding weights, expressing relationships between jobs, nodes, users, and other relevant entities. This graph-based representation permits formal manipulation by a number of analysis algorithms. This report presents a methodology and software implementation that leverages semantic graph-based techniques for the system-level monitoring and analysis of HPC clusters based on job queuing and execution data. Ontology development and graph synthesis is discussed with respect to the domain of HPC job data. The framework developed automates the synthesis of graphs from a database of job information. It also provides a front end, enabling visualization of the synthesized graphs. Additionally, an analysis engine is incorporated that provides performance analysis, graph-based clustering, and failure prediction capabilities for HPC systems.

Mayo, Jackson R.; Kegelmeyer, W. Philip, Jr.; Wong, Matthew H.; Pebay, Philippe Pierre; Gentile, Ann C.; Thompson, David C.; Roe, Diana C.; De Sapio, Vincent; Brandt, James M.

2010-08-01T23:59:59.000Z

71

Multiattribute utility analysis as a framework for public participation siting a hazardous waste facility  

SciTech Connect (OSTI)

How can the public play a role in decisions involving complicated scientific arguments? This paper describes a public participation exercise in which stakeholders used multiattribute utility analysis to select a site for a hazardous waste facility. Key to success was the ability to separate and address the two types of judgements inherent in environmental decisions: technical judgements on the likely consequences of alternative choices and value judgements on the importance or seriousness of those consequences. This enabled technical specialists to communicate the essential technical considerations and allowed stakeholders to establish the value judgements for the decision. Although rarely used in public participation, the multiattribute utility approach appears to provide a useful framework for the collaborative resolution of many complex environmental decision problems.

Merkhofer, M.W. [Applied Decision Analysis, Inc., Menlo Park, CA (United States); Conway, R. [Sandia National Labs., Albuquerque, NM (United States); Anderson, R.G. [Los Alamos National Lab., NM (United States)

1996-05-01T23:59:59.000Z

72

Tracking and Analysis Framework (TAF) model documentation and user`s guide  

SciTech Connect (OSTI)

With passage of the 1990 Clean Air Act Amendments, the United States embarked on a policy for controlling acid deposition that has been estimated to cost at least $2 billion. Title IV of the Act created a major innovation in environmental regulation by introducing market-based incentives - specifically, by allowing electric utility companies to trade allowances to emit sulfur dioxide (SO{sub 2}). The National Acid Precipitation Assessment Program (NAPAP) has been tasked by Congress to assess what Senator Moynihan has termed this {open_quotes}grand experiment.{close_quotes} Such a comprehensive assessment of the economic and environmental effects of this legislation has been a major challenge. To help NAPAP face this challenge, the U.S. Department of Energy (DOE) has sponsored development of an integrated assessment model, known as the Tracking and Analysis Framework (TAF). This section summarizes TAF`s objectives and its overall design.

Bloyd, C.; Camp, J.; Conzelmann, G. [and others

1996-12-01T23:59:59.000Z

73

An impulse framework for hydrodynamic force analysis : fish propulsion, water entry of spheres, and marine propellers  

E-Print Network [OSTI]

This thesis presents an impulse framework for analyzing the hydrodynamic forces on bodies in flow. This general theoretical framework is widely applicable, and it is used to address the hydrodynamics of fish propulsion, ...

Epps, Brenden P

2010-01-01T23:59:59.000Z

74

A life cycle cost analysis framework for geologic storage of hydrogen : a scenario analysis.  

SciTech Connect (OSTI)

The U.S. Department of Energy has an interest in large scale hydrogen geostorage, which would offer substantial buffer capacity to meet possible disruptions in supply. Geostorage options being considered are salt caverns, depleted oil/gas reservoirs, aquifers and potentially hard rock cavrns. DOE has an interest in assessing the geological, geomechanical and economic viability for these types of hydrogen storage options. This study has developed an ecocomic analysis methodology to address costs entailed in developing and operating an underground geologic storage facility. This year the tool was updated specifically to (1) a version that is fully arrayed such that all four types of geologic storage options can be assessed at the same time, (2) incorporate specific scenarios illustrating the model's capability, and (3) incorporate more accurate model input assumptions for the wells and storage site modules. Drawing from the knowledge gained in the underground large scale geostorage options for natural gas and petroleum in the U.S. and from the potential to store relatively large volumes of CO{sub 2} in geological formations, the hydrogen storage assessment modeling will continue to build on these strengths while maintaining modeling transparency such that other modeling efforts may draw from this project.

Kobos, Peter Holmes; Lord, Anna Snider; Borns, David James

2010-10-01T23:59:59.000Z

75

Proceedings of the Workshop on Open Infrastructures and Analysis Frameworks for HLT, pages 101109, Dublin, Ireland, August 23rd 2014.  

E-Print Network [OSTI]

Commons Attribution 4.0 International License. Page numbers and proceedings footer are addedProceedings of the Workshop on Open Infrastructures and Analysis Frameworks for HLT, pages 101`eve Universit´e du Maine Le Mans, France yannick.esteve@ lium.univ-lemans.fr Eelco Herder L3S Research Center

76

E-Print Network 3.0 - analysis framework addressing Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Office: 321 Davenport Hall... to build, analyze and map spatial patterns within the geo-database framework. This is an ... Source: Frank, Thomas D. - Department of Geography,...

77

Methodological Framework for Analysis of Buildings-Related Programs with BEAMS, 2008  

SciTech Connect (OSTI)

The U.S. Department of Energy’s (DOE’s) Office of Energy Efficiency and Renewable Energy (EERE) develops official “benefits estimates” for each of its major programs using its Planning, Analysis, and Evaluation (PAE) Team. PAE conducts an annual integrated modeling and analysis effort to produce estimates of the energy, environmental, and financial benefits expected from EERE’s budget request. These estimates are part of EERE’s budget request and are also used in the formulation of EERE’s performance measures. Two of EERE’s major programs are the Building Technologies Program (BT) and the Weatherization and Intergovernmental Program (WIP). Pacific Northwest National Laboratory (PNNL) supports PAE by developing the program characterizations and other market information necessary to provide input to the EERE integrated modeling analysis as part of PAE’s Portfolio Decision Support (PDS) effort. Additionally, PNNL also supports BT by providing line-item estimates for the Program’s internal use. PNNL uses three modeling approaches to perform these analyses. This report documents the approach and methodology used to estimate future energy, environmental, and financial benefits using one of those methods: the Building Energy Analysis and Modeling System (BEAMS). BEAMS is a PC-based accounting model that was built in Visual Basic by PNNL specifically for estimating the benefits of buildings-related projects. It allows various types of projects to be characterized including whole-building, envelope, lighting, and equipment projects. This document contains an overview section that describes the estimation process and the models used to estimate energy savings. The body of the document describes the algorithms used within the BEAMS software. This document serves both as stand-alone documentation for BEAMS, and also as a supplemental update of a previous document, Methodological Framework for Analysis of Buildings-Related Programs: The GPRA Metrics Effort, (Elliott et al. 2004b). The areas most changed since the publication of that previous document are those discussing the calculation of lighting and HVAC interactive effects (for both lighting and envelope/whole-building projects). This report does not attempt to convey inputs to BEAMS or the methodology of their derivation.

Elliott, Douglas B.; Dirks, James A.; Hostick, Donna J.

2008-09-30T23:59:59.000Z

78

A Mathematical Framework for the Analysis of Cyber-Resilient Control Systems  

SciTech Connect (OSTI)

The increasingly recognized vulnerability of industrial control systems to cyber-attacks has inspired a considerable amount of research into techniques for cyber-resilient control systems. The majority of this effort involves the application of well known information security (IT) techniques to control system networks. While these efforts are important to protect the control systems that operate critical infrastructure, they are never perfectly effective. Little research has focused on the design of closed-loop dynamics that are resilient to cyber-attack. The majority of control system protection measures are concerned with how to prevent unauthorized access and protect data integrity. We believe that the ability to analyze how an attacker can effect the closed loop dynamics of a control system configuration once they have access is just as important to the overall security of a control system. To begin to analyze this problem, consistent mathematical definitions of concepts within resilient control need to be established so that a mathematical analysis of the vulnerabilities and resiliencies of a particular control system design methodology and configuration can be made. In this paper, we propose rigorous definitions for state awareness, operational normalcy, and resiliency as they relate to control systems. We will also discuss some mathematical consequences that arise from the proposed definitions. The goal is to begin to develop a mathematical framework and testable conditions for resiliency that can be used to build a sound theoretical foundation for resilient control research.

Melin, Alexander M [ORNL; Ferragut, Erik M [ORNL; Laska, Jason A [ORNL; Fugate, David L [ORNL; Kisner, Roger [ORNL

2013-01-01T23:59:59.000Z

79

A life cycle cost analysis framework for geologic storage of hydrogen : a user's tool.  

SciTech Connect (OSTI)

The U.S. Department of Energy (DOE) has an interest in large scale hydrogen geostorage, which could offer substantial buffer capacity to meet possible disruptions in supply or changing seasonal demands. The geostorage site options being considered are salt caverns, depleted oil/gas reservoirs, aquifers and hard rock caverns. The DOE has an interest in assessing the geological, geomechanical and economic viability for these types of geologic hydrogen storage options. This study has developed an economic analysis methodology and subsequent spreadsheet analysis to address costs entailed in developing and operating an underground geologic storage facility. This year the tool was updated specifically to (1) incorporate more site-specific model input assumptions for the wells and storage site modules, (2) develop a version that matches the general format of the HDSAM model developed and maintained by Argonne National Laboratory, and (3) incorporate specific demand scenarios illustrating the model's capability. Four general types of underground storage were analyzed: salt caverns, depleted oil/gas reservoirs, aquifers, and hard rock caverns/other custom sites. Due to the substantial lessons learned from the geological storage of natural gas already employed, these options present a potentially sizable storage option. Understanding and including these various geologic storage types in the analysis physical and economic framework will help identify what geologic option would be best suited for the storage of hydrogen. It is important to note, however, that existing natural gas options may not translate to a hydrogen system where substantial engineering obstacles may be encountered. There are only three locations worldwide that currently store hydrogen underground and they are all in salt caverns. Two locations are in the U.S. (Texas), and are managed by ConocoPhillips and Praxair (Leighty, 2007). The third is in Teeside, U.K., managed by Sabic Petrochemicals (Crotogino et al., 2008; Panfilov et al., 2006). These existing H{sub 2} facilities are quite small by natural gas storage standards. The second stage of the analysis involved providing ANL with estimated geostorage costs of hydrogen within salt caverns for various market penetrations for four representative cities (Houston, Detroit, Pittsburgh and Los Angeles). Using these demand levels, the scale and cost of hydrogen storage necessary to meet 10%, 25% and 100% of vehicle summer demands was calculated.

Kobos, Peter Holmes; Lord, Anna Snider; Borns, David James; Klise, Geoffrey T.

2011-09-01T23:59:59.000Z

80

Android Keylogging Threat Fadi Mohsen, Mohammed Shehab  

E-Print Network [OSTI]

Android Keylogging Threat Fadi Mohsen, Mohammed Shehab Department of Software and Information of keylogging attacks on Android. Which is a security threat pertaining to Android openness on specific feature

Shehab, Mohamed

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Nuclear Radiological Threat Task Force Established | National...  

National Nuclear Security Administration (NNSA)

Radiological Threat Task Force Established | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

82

Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity  

E-Print Network [OSTI]

The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and ...

Cho, Yiseul

2012-01-01T23:59:59.000Z

83

A system-of-systems framework of Nuclear Power Plant Probabilistic Seismic Hazard Analysis by Fault Tree analysis and Monte Carlo simulation  

E-Print Network [OSTI]

A system-of-systems framework of Nuclear Power Plant Probabilistic Seismic Hazard Analysis by Fault and the Energetic Challenge, European Foundation for New Energy - Electricité de France, at �cole Centrale Paris - Supelec, France enrico.zio@ecp.fr, enrico.zio@supelec.fr b Department of Energy, Politecnico di Milano

Boyer, Edmond

84

An Integrated Geovisual Analytics Framework for Analysis of Energy Consumption Data and Renewable Energy Potentials  

SciTech Connect (OSTI)

We present an integrated geovisual analytics framework for utility consumers to interactively analyze and benchmark their energy consumption. The framework uses energy and property data already available with the utility companies and county governments respectively. The motivation for the developed framework is the need for citizens to go beyond the conventional utility bills in understanding the patterns in their energy consumption. There is also a need for citizens to go beyond one-time improvements that are often not monitored and measured over time. Some of the features of the framework include the ability for citizens to visualize their historical energy consumption data along with weather data in their location. The quantity of historical energy data available is significantly more than what is available from utility bills. An overlay of the weather data provides users with a visual correlation between weather patterns and their energy consumption patterns. Another feature of the framework is the ability for citizens to compare their consumption on an aggregated basis to that of their peers other citizens living in houses of similar size and age and within the same or different geographical boundaries, such as subdivision, zip code, or county. The users could also compare their consumption to others based on the size of their family and other attributes. This feature could help citizens determine if they are among the best in class . The framework can also be used by the utility companies to better understand their customers and to plan their services. To make the framework easily accessible, it is developed to be compatible with mobile consumer electronics devices.

Omitaomu, Olufemi A [ORNL; Maness, Christopher S [ORNL; Kramer, Ian S [ORNL; Kodysh, Jeffrey B [ORNL; Bhaduri, Budhendra L [ORNL; Steed, Chad A [ORNL; Karthik, Rajasekar [ORNL; Nugent, Philip J [ORNL; Myers, Aaron T [ORNL

2012-01-01T23:59:59.000Z

85

Systems analysis of past, present, and future chemical terrorism scenarios.  

SciTech Connect (OSTI)

Throughout history, as new chemical threats arose, strategies for the defense against chemical attacks have also evolved. As a part of an Early Career Laboratory Directed Research and Development project, a systems analysis of past, present, and future chemical terrorism scenarios was performed to understand how the chemical threats and attack strategies change over time. For the analysis, the difficulty in executing chemical attack was evaluated within a framework of three major scenario elements. First, historical examples of chemical terrorism were examined to determine how the use of chemical threats, versus other weapons, contributed to the successful execution of the attack. Using the same framework, the future of chemical terrorism was assessed with respect to the impact of globalization and new technologies. Finally, the efficacy of the current defenses against contemporary chemical terrorism was considered briefly. The results of this analysis justify the need for continued diligence in chemical defense.

Hoette, Trisha Marie

2012-03-01T23:59:59.000Z

86

A Finite Element Framework for Multiscale/Multiphysics Analysis of Structures with Complex Microstructures  

E-Print Network [OSTI]

. In addition to implementing an oxidation model, the framework was also used to implement strategies that expedited the simulation of oxidation in textile composites so that it would take only a few hours. The simulation showed that the tow architecture played...

Varghese, Julian

2010-10-12T23:59:59.000Z

87

Energy star product specification development framework: Using data and analysis to make program decisions  

SciTech Connect (OSTI)

The Product Development Team (PD) in the US Environmental Protection Agency's ENERGY STAR Labeling Program fuels the long-term market transformation process by delivering new specifications. PD's goal is to expand the reach and visibility of ENERGY STAR as well as the market for new energy-efficient products. Since 2000, PD has launched nine new ENERGY STAR specifications and continues to evaluate new program opportunities. To evaluate the ENERGY STAR carbon savings potential for a diverse group of products, PD prepared a framework for developing new and updating existing specifications that rationalizes new product opportunities and draws upon the expertise and resources of other stakeholders, including manufacturers, utilities, environmental groups and other government agencies. By systematically reviewing the potential of proposed product areas, PD makes informed decisions as to whether or not to proceed with developing a specification. In support of this strategy, PD ensures that new product specifications are consistent with the ENERGY STAR guidelines and that these guidelines are effectively communicated to stakeholders during the product development process. To date, the framework has been successful in providing consistent guidance on collecting the necessary information on which to base sound program decisions. Through the application of this framework, PD increasingly recognizes that each industry has unique market and product characteristics that can require reconciliation with the ENERGY STAR guidelines. The new framework allows PD to identify where reconciliation is needed to justify program decisions.

McWhinney, Marla; Fanara, Andrew; Clark, Robin; Hershberg, Craig; Schmeltz, Rachel; Roberson, Judy

2003-09-12T23:59:59.000Z

88

Zero-Emission Vehicle Scenario Cost Analysis Using A Fuzzy Set-Based Framework  

E-Print Network [OSTI]

Fuel Cell Vehicle Analysis of Energy Use, Emissions, and Cost,"Cost Analysis of Conventional and Fuel Cell/Battery Powered Urban Passenger Vehicles,cost analysis of several types of AFVs, but did not include fuel cell vehicles

Lipman, Timothy Edward

1999-01-01T23:59:59.000Z

89

Zero-Emission Vehicle Scenario Cost Analysis Using A Fuzzy Set-Based Framework  

E-Print Network [OSTI]

Fuel Cell Vehicle Analysis of Energy Use, Emissions, and Cost,&Cost Analysis of Conventional and Fuel Cell/Battery Powered Urban Passenger Vehicles,cost analysis of several types of AFV s, but did not include fuel cell vehicles

Lipman, Timothy E.

1999-01-01T23:59:59.000Z

90

ExMAn: A Generic and Customizable Framework for Experimental Mutation Analysis #  

E-Print Network [OSTI]

analysis using Path Inspector and to compare concurrent testing using ConTest with model checking [BCD05 approach using code inspection, static analysis (FindBugs, Jlint), dynamic analysis and testing [LDG + 04

Graham, Nick

91

Sensor-guided threat countermeasure system  

DOE Patents [OSTI]

A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

2012-12-25T23:59:59.000Z

92

Autonomous Realtime Threat-Hunting Robot (ARTHR  

ScienceCinema (OSTI)

Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

INL

2009-09-01T23:59:59.000Z

93

Addressing the cybersecurity Malicious Insider threat.  

E-Print Network [OSTI]

?? Malicious Insider threats consist of employees, contractors, or business partners who either have current authorized access, or have had authorized access to an organization's… (more)

Schluderberg, Larry E.

2015-01-01T23:59:59.000Z

94

Commercial Aircraft Corporation of China (Comac) attempts to break the Airbus-Boeing duopoly, will it succeed? : an industry analysis framework applied  

E-Print Network [OSTI]

Using an industry analysis framework, this thesis analyzes whether the recently established Commercial Aircraft Corporation of China (Comac) is likely to break the Boeing-Airbus duopoly in the industry of large commercial ...

Fuentes, Jose L., S.M. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

95

A Framework for Risk Analysis for Ecological Restoration Projects in the U.S. Army Corps of Engineers  

SciTech Connect (OSTI)

This report provides a framework for incorporating risk analysis into the six-step planning process for ecosystem restoration projects. This report is part of a larger research and development effort to develop procedures and guidelines for risk analysis in USACE ecosystem restoration planning. The focus is on risk analysis: identifying the range of possible outcomes from alternative ecosystem restoration actions, assessing the potential for achieving the desired outcome, characterizing the likelihood of adverse consequences, and communicating these findings to stakeholders and decision makers. This framework document makes simplifying assumptions to allow a focus on incorporating risk information in the planning and decision-making process. A conceptual model of the site and landscape is advocated as a central organizing structure within the six-step process for ecosystem restoration project planning. This is responsive to USACE directives that restoration projects be conceived in a systems context using an ecosystem and/or watershed approach. The conceptual model delineates the empirical quantities to be addressed in risk analysis and modeling. Although the planning process is described in six distinct steps, in practice these steps are iterative and often carried out simultaneously. Risk analysis within this context has the same character. The approach for incorporating risk analysis into the planning process provides direction intended to help the planner: • Identify the levels of uncertainty that are acceptable, at the start of the planning process. • Use conceptual and numerical models to communicate the planning team’s understanding of the ecosystem to others, and reduce the risk of mis-specifying the system. • Consider the uncertainty associated with the variables chosen to measure project effects. • Use alternative designs to manage identified uncertainty. • Use risk information to eliminate alternatives with unacceptable risk from consideration. • Incorporate risk analysis into the USACE four criteria of effectiveness, efficiency, completeness, and acceptability. • Use an alternative’s irreducible uncertainty as an attribute to be considered along with other attributes in the comparison of alternative plans. • Use risk information in the final plan selection process. There are three other efforts associated with this framework document, which offer information and guidance for incorporating risk analysis into cost-estimation, and biological and hydrologic modeling.

Diefenderfer, Heida L.; Thom, Ronald M.; Hofseth, Keith

2005-01-03T23:59:59.000Z

96

A Design-Oriented Framework to Determine the Parasitic Parameters of High Frequency Magnetics in Switching Power Supplies using Finite Element Analysis Techniques  

E-Print Network [OSTI]

A DESIGN-ORIENTED FRAMEWORK TO DETERMINE THE PARASITIC PARAMETERS OF HIGH FREQUENCY MAGNETICS IN SWITCING POWER SUPPLIES USING FINITE ELEMENT ANALYSIS TECHNIQUES A Thesis by MOHAMMAD BAGHER SHADMAND Submitted to the Office... to Determine the Parasitic Parameters of High Frequency Magnetics in Switching Power Supplies using Finite Element Analysis Techniques Copyright 2012 Mohammad Bagher Shadmand A DESIGN-ORIENTED FRAMEWORK TO DETERMINE THE PARASITIC PARAMETERS OF HIGH...

Shadmand, Mohammad

2012-07-16T23:59:59.000Z

97

Zero-Emission Vehicle Scenario Cost Analysis Using A Fuzzy Set-Based Framework  

E-Print Network [OSTI]

Cycle Cost Analysis of Conventional and Fuel Cell/BatteryEVs A few cost analyses for complete PEM fuel cell systemshigh-volume PEM fuel cell system cost analysis has been

Lipman, Timothy E.

1999-01-01T23:59:59.000Z

98

RIS-M-2519 A FRAMEWORK FOR COGNITIVE TASK ANALYSIS IN SYSTEMS DESIGN  

E-Print Network [OSTI]

of the current task by means of an analysis of the cognitive task. cont. INIS Descriptors. DECISION MAKING

99

EM threat analysis for wireless systems.  

SciTech Connect (OSTI)

Modern digital radio systems are complex and must be carefully designed, especially when expected to operate in harsh propagation environments. The ability to accurately predict the effects of propagation on wireless radio performance could lead to more efficient radio designs as well as the ability to perform vulnerability analyses before and after system deployment. In this report, the authors--experts in electromagnetic (EM) modeling and wireless communication theory--describe the construction of a simulation environment that is capable of quantifying the effects of wireless propagation on the performance of digital communication.

Burkholder, R. J. (Ohio State University Electroscience Laboratory); Mariano, Robert J.; Schniter, P. (Ohio State University Electroscience Laboratory); Gupta, I. J. (Ohio State University Electroscience Laboratory)

2006-06-01T23:59:59.000Z

100

A Framework for Visual Information Analysis Petra Neumann, Anthony Tang, Sheelagh Carpendale  

E-Print Network [OSTI]

accomplished by a team. However, there exist relatively few models that describe the visual analysis process visualization tool design. Teams in our study were given paper-based (static) visual- izations to solve tasks users engage with informa- tion visualizations in their analysis process. With the rapid growth in size

Isenberg, Petra

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

An Empirical Framework for Comparing Effectiveness of Testing and Property-Based Formal Analysis  

E-Print Network [OSTI]

and practise of formal analysis and on the other hand, by a need for improved quality assurance techniques. 1. INTRODUCTION Testing and formal analysis are two complementary qual- ity assurance techniques-condition, a loop invariant, a class representation invariant, an interface us- age rule, or a temporal property

Bradbury, Jeremy S.

102

An Empirical Framework for Comparing Effectiveness of Testing and Property-Based Formal Analysis  

E-Print Network [OSTI]

in the theory and practise of formal analysis and on the other hand, by a need for improved quality assurance. 1. INTRODUCTION Testing and formal analysis are two complementary qual- ity assurance techniques of a method pre-condition, a loop invariant, a class representation invariant, an interface us- age rule

Cordy, James R.

103

SEME FRAMEWORK  

Energy Science and Technology Software Center (OSTI)

003284MLTPL00 Sequentially Executed Model Evaluation Framework  https://software.sandia.gov/svn/teva/canary 

104

Framework for the Economic Analysis of Hybrid Systems Based on Exergy Consumption  

SciTech Connect (OSTI)

Starting from an overview of the dynamic behavior of the electricity market the need of the introduction of energy users that will provide a damping capability to the system is derived as also a qualitative analysis of the impact of uncertainty, both in the demand and supply side, is performed. Then it follows an introduction to the investment analysis methodologies based on the discounting of the cash flow, and then work concludes with the illustration and application of the exergonomic principles to provide a sound methodology for the cost accounting of the plant components to be used in the cash flow analysis.

Cristian Rabiti; Robert S. Cherry; Wesley R. Deason; Piyush Sabharwall; Shannon M. Bragg-Sitton; Richard D. Boardman

2014-08-01T23:59:59.000Z

105

A Smart Grid Vulnerability Analysis Framework for Coordinated Variable Structure Switching Attacks  

E-Print Network [OSTI]

the approach. Moreover the insights gained from the vulnerability analysis of the WECC system are consistent approach is detailed in Section III along with an illustration of the procedure on the WECC 3-machine, 9

Kundur, Deepa

106

Energy and Greenhouse Gas Impacts of Biofuels: A Framework for Analysis  

E-Print Network [OSTI]

Greenhouse Gas Impacts of Biofuels Wang, M. (2001) "Energy & Greenhouse Gas Impacts of Biofuels Fuels and MotorLifecycle Analysis of Biofuels." Report UCD-ITS-RR-06-08.

Kammen, Daniel M.; Farrell, Alexander E; Plevin, Richard J; Jones, Andrew; Nemet, Gregory F; Delucchi, Mark

2008-01-01T23:59:59.000Z

107

IBRD Operational Decision Framework  

SciTech Connect (OSTI)

The IBRD Operational Decision Framework in this document is an expansion of an emerging general risk management framework under development by an interagency working group. It provides the level of detail necessary to develop a general Consequence Management Guidance Document for biological contamination remediation and restoration. It is the intent of this document to support both wide area and individual site remediation and restoration activities. This product was initiated as a portion of the IBRD Task 1 Systems Analysis to aid in identification of wide area remediation and restoration shortcomings and gaps. The draft interagency general risk management framework was used as the basis for the analysis. The initial Task 1 analysis document expanded the draft interagency framework to a higher level of resolution, building on both the logic structure and the accompanying text explanations. It was then employed in a qualitative manner to identify responsible agencies, data requirements, tool requirements, and current capabilities for each decision and task. This resulted in identifying shortcomings and gaps needing resolution. Several meetings of a joint LLNL/SNL working group reviewed and approved the initial content of this analysis. At the conclusion of Task 1, work continued on the expanded framework to generate this Operational Decision Framework which is consistent with the existing interagency general risk management framework. A large LLNL task group met repeatedly over a three-month period to develop the expanded framework, coordinate the framework with the biological remediation checklist, and synchronize the logic with the Consequence Management Plan table of contents. The expanded framework was briefed at a large table top exercise reviewing the interagency risk management framework. This exercise had representation from major US metropolitan areas as well as national agencies. This product received positive comments from the participants. Upon completion of the Operational Decision Framework, another joint LLNL/SNL working group conducted a day-long review. Identified modifications were made to the document, resulting in the included product.

Greenwalt, R; Hibbard, W; Raber, E; Carlsen, T; Folks, K; MacQueen, D; Mancieri, S; Bunt, T; Richards, J; Hirabayashi-Dethier, J

2010-11-12T23:59:59.000Z

108

SciTech Connect: Sequential Threat Detection for Harbor Defense...  

Office of Scientific and Technical Information (OSTI)

Sequential Threat Detection for Harbor Defense: An X-ray Physics-Based Bayesian Approach Citation Details In-Document Search Title: Sequential Threat Detection for Harbor Defense:...

109

The rise of "china threat" arguments  

E-Print Network [OSTI]

The study seeks to explain the rise of "China threat" arguments in the United States and Japan in the 1990s by using three theories of states behavior- realism, organization theory, and democratic peace theory. The rise ...

Ueki, Chikako

2006-01-01T23:59:59.000Z

110

Autonomous Realtime Threat-Hunting Robot (ARTHR)  

ScienceCinema (OSTI)

Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

Idaho National Laboratory - David Bruemmer, Curtis Nielsen

2010-01-08T23:59:59.000Z

111

A decision analysis framework to support long-term planning for nuclear fuel cycle technology research, development, demonstration and deployment  

SciTech Connect (OSTI)

To address challenges and gaps in nuclear fuel cycle option assessment and to support research, develop and demonstration programs oriented toward commercial deployment, EPRI (Electric Power Research Institute) is seeking to develop and maintain an independent analysis and assessment capability by building a suite of assessment tools based on a platform of software, simplified relationships, and explicit decision-making and evaluation guidelines. As a demonstration of the decision-support framework, EPRI examines a relatively near-term fuel cycle option, i.e., use of reactor-grade mixed-oxide fuel (MOX) in U.S. light water reactors. The results appear as a list of significant concerns (like cooling of spent fuels, criticality risk...) that have to be taken into account for the final decision.

Sowder, A.G.; Machiels, A.J. [Electric Power Research Institute, 1300 West. W.T Harris Boulevard, Charlotte, NC 28262 (United States); Dykes, A.A.; Johnson, D.H. [ABSG Consulting Inc., 300 Commerce, Suite 200, Irvine, CA 92602 (United States)

2013-07-01T23:59:59.000Z

112

GridOPTICS(TM) A Novel Software Framework for Integrating Power Grid Data Storage, Management and Analysis  

SciTech Connect (OSTI)

This paper describes the architecture and design of GridOPTICSTM, a novel software framework to integrate a collection of software tools developed by PNNL’s Future Power Grid Initiative (FPGI) into a coherent, powerful operations and planning tool for the power grid of the future. GridOPTICSTM enables plug-and-play of various analysis, modeling and visualization software tools for fast and accurate control of the power grid. To bridge the data access for different control purposes, GridOPTICSTM provides a scalable and thin layer of event processing that hides the complexity of data storage and management. The initial prototype of GridOPTICSTM was demonstrated with several use cases from PNNL’s FPGI.

Gorton, Ian; Yin, Jian; Akyol, Bora A.; Ciraci, Selim; Critchlow, Terence; Liu, Yan; Gibson, Tara D.; Purohit, Sumit; Sharma, Poorva; Vlachopoulou, Maria

2013-01-09T23:59:59.000Z

113

Analysis Framework for Cooperating Mobile Cable Robots Xiaobo Zhou, Chin Pei Tang and Venkat Krovi  

E-Print Network [OSTI]

of Mechanical and Aerospace Engineering, State University of New York at Buffalo, Buffalo, NY 14260 USA xzhou9 energy consumption, ease of assembly/disassembly and reconfiguration. Cooperative payload manipulation design and analysis of cooperative mobile cable robots, building upon knowledge base of multi

Krovi, Venkat

114

Chinese Workers: Under Threat or a Threat to American Workers?  

E-Print Network [OSTI]

This paper provides a multi-dimensional analysis of the condition of workers in China in the wake of the adoption of new labor laws in China 2007 and 2008. From an economic perspective, wages have risen substantially during ...

Harper Ho, Virginia E.; Zhang, Lu

2010-07-01T23:59:59.000Z

115

Approach to proliferation risk assessment based on multiple objective analysis framework  

SciTech Connect (OSTI)

The approach to the assessment of proliferation risk using the methods of multi-criteria decision making and multi-objective optimization is presented. The approach allows the taking into account of the specifics features of the national nuclear infrastructure, and possible proliferation strategies (motivations, intentions, and capabilities). 3 examples of applying the approach are shown. First, the approach has been used to evaluate the attractiveness of HEU (high enriched uranium)production scenarios at a clandestine enrichment facility using centrifuge enrichment technology. Secondly, the approach has been applied to assess the attractiveness of scenarios for undeclared production of plutonium or HEU by theft of materials circulating in nuclear fuel cycle facilities and thermal reactors. Thirdly, the approach has been used to perform a comparative analysis of the structures of developing nuclear power systems based on different types of nuclear fuel cycles, the analysis being based on indicators of proliferation risk.

Andrianov, A.; Kuptsov, I. [Obninsk Institute for Nuclear Power Engineering of NNRU MEPhI (Russian Federation); Studgorodok 1, Obninsk, Kaluga region, 249030 (Russian Federation)

2013-07-01T23:59:59.000Z

116

MATHEMATICAL FRAMEWORK FOR THE ANALYSIS OF DYNAMC STOCHASTIC SYSTEMS WITH THE RAVEN CODE  

SciTech Connect (OSTI)

RAVEN (Reactor Analysis and Virtual control Environment) is a software code under development at Idaho National Laboratory aimed at performing probabilistic risk assessment and uncertainty quantification using RELAP-7, for which it acts also as a simulation controller. In this paper we will present the equations characterizing a dynamic stochastic system and we will then discuss the behavior of each stochastic term and how it is accounted for in the RAVEN software design. Moreover we will present preliminary results of the implementation.

C. Rabiti; D. Mandelli; J. Cogliati; R. Kinoshita

2013-05-01T23:59:59.000Z

117

Experimental spectra analysis in THM with the help of simulation based on Geant4 framework  

E-Print Network [OSTI]

The Coulomb barrier and electron screening cause difficulties in directly measuring nuclear reaction cross sections of charged particles in astrophysical energies. The Trojan-horse method has been introduced to solve the difficulties as a powerful indirect tool. In order to understand experimental spectra better, Geant4 is employed to simulate the method for the first time. Validity and reliability of the simulation are examined by comparing the experimental data with simulated results. The Geant4 simulation can give useful information to understand the experimental spectra better in data analysis and is beneficial to the design for future related experiments.

Chengbo Li; Qungang Wen; Shuhua Zhou; Yuanyong Fu; Jing Zhou; Qiuying Meng; Zongjun Jiang; Xiaolian Wang

2014-08-27T23:59:59.000Z

118

A framework of motion capture system based human behaviours simulation for ergonomic analysis  

E-Print Network [OSTI]

With the increasing of computer capabilities, Computer aided ergonomics (CAE) offers new possibilities to integrate conventional ergonomic knowledge and to develop new methods into the work design process. As mentioned in [1], different approaches have been developed to enhance the efficiency of the ergonomic evaluation. Ergonomic expert systems, ergonomic oriented information systems, numerical models of human, etc. have been implemented in numerical ergonomic software. Until now, there are ergonomic software tools available, such as Jack, Ergoman, Delmia Human, 3DSSPP, and Santos, etc. [2-4]. The main functions of these tools are posture analysis and posture prediction. In the visualization part, Jack and 3DSSPP produce results to visualize virtual human tasks in 3-dimensional, but without realistic physical properties. Nowadays, with the development of computer technology, the simulation of physical world is paid more attention. Physical engines [5] are used more and more in computer game (CG) field. The a...

Ma, Ruina; Bennis, Fouad; Ma, Liang

2011-01-01T23:59:59.000Z

119

Anomaly metrics to differentiate threat sources from benign sources in primary vehicle screening.  

SciTech Connect (OSTI)

Discrimination of benign sources from threat sources at Port of Entries (POE) is of a great importance in efficient screening of cargo and vehicles using Radiation Portal Monitors (RPM). Currently RPM's ability to distinguish these radiological sources is seriously hampered by the energy resolution of the deployed RPMs. As naturally occurring radioactive materials (NORM) are ubiquitous in commerce, false alarms are problematic as they require additional resources in secondary inspection in addition to impacts on commerce. To increase the sensitivity of such detection systems without increasing false alarm rates, alarm metrics need to incorporate the ability to distinguish benign and threat sources. Principal component analysis (PCA) and clustering technique were implemented in the present study. Such techniques were investigated for their potential to lower false alarm rates and/or increase sensitivity to weaker threat sources without loss of specificity. Results of the investigation demonstrated improved sensitivity and specificity in discriminating benign sources from threat sources.

Cohen, Israel Dov; Mengesha, Wondwosen

2011-09-01T23:59:59.000Z

120

Left-Wing Extremism: The Current Threat  

SciTech Connect (OSTI)

Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

Karl A. Seger

2001-04-30T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Unauthorized Collaboration on Facebook: Threats and Responses  

E-Print Network [OSTI]

Unauthorized Collaboration on Facebook: Threats and Responses Recent events at FSU have uncovered and collaboration. The Problem: When students, faculty, and staff join Facebook using a valid FSU email address this and believe it is affiliated with or endorsed by Florida State University. Facebook also allows students

McQuade, D. Tyler

122

Global Warming: The Threat to the Planet*  

E-Print Network [OSTI]

Global Warming: The Threat to the Planet* Jim Hansen 17 April 2007 2007 Leo Szilard Lecture. Graham Red Squirrel #12;Survival of Species 1. "Business-as-Usual" Scenario - Global Warming ~ 3ºC - Likely Extinctions ~ 50 percent 2. "Alternative" Scenario - Global Warming ~ 1ºC - Likely Extinctions

Hansen, James E.

123

Insider Threat - Material Control and Accountability Mitigation  

SciTech Connect (OSTI)

The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur by an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with compensating mitigation can decrease the risk of an insider performing a malicious act without detection.

Powell, Danny H [ORNL] [ORNL; Elwood Jr, Robert H [ORNL] [ORNL; Roche, Charles T [ORNL] [ORNL

2011-01-01T23:59:59.000Z

124

Discussion Draft1 Message to Senior Executives on the Cybersecurity Framework2  

E-Print Network [OSTI]

Discussion Draft1 Message to Senior Executives on the Cybersecurity Framework2 3 The national with an advancing6 cybersecurity threat now puts our critical infrastructure, our information, and our7 safety at risk.8 The cybersecurity threat to critical infrastructure continues to grow and represents9 one

Bentz, Dale P.

125

Introduction to Administrative Programs that Mitigate the Insider Threat  

SciTech Connect (OSTI)

This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

2012-09-01T23:59:59.000Z

126

A Risk Management Approach to the 'Insider Threat'  

E-Print Network [OSTI]

Insider Threat” [Gel05] Mike Gelles. Exploring the mind ofL. Krofcheck and Mike G. Gelles. Behavioral consultation in

2010-01-01T23:59:59.000Z

127

EPR Severe Accident Threats and Mitigation  

SciTech Connect (OSTI)

Despite the extremely low EPR core melt frequency, an improved defence-in-depth approach is applied in order to comply with the EPR safety target: no stringent countermeasures should be necessary outside the immediate plant vicinity like evacuation, relocation or food control other than the first harvest in case of a severe accident. Design provisions eliminate energetic events and maintain the containment integrity and leak-tightness during the entire course of the accident. Based on scenarios that cover a broad range of physical phenomena and which provide a sound envelope of boundary conditions associated with each containment challenge, a selection of representative loads has been done, for which mitigation measures have to cope with. This paper presents the main critical threats and the approach used to mitigate those threats. (authors)

Azarian, G. [Framatome ANP SAS, Tour Areva, Place de la Coupole 92084 Paris la Defense (France); Kursawe, H.M.; Nie, M.; Fischer, M.; Eyink, J. [Framatome ANP GmbH, Freyeslebenstrasse, 1, D-91058 Erlangen (Germany); Stoudt, R.H. [Framatome ANP Inc. - 3315 Old Forest Rd, Lynchburgh, VA 24501 (United States)

2004-07-01T23:59:59.000Z

128

Securing Infrastructure from High Explosive Threats  

SciTech Connect (OSTI)

Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

2009-03-20T23:59:59.000Z

129

Nonproliferation, Nuclear Security, and the Insider Threat  

SciTech Connect (OSTI)

Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

Balatsky, Galya I. [Los Alamos National Laboratory; Duggan, Ruth [SNL

2012-07-12T23:59:59.000Z

130

Confronting Ego Threats with Reappraisal versus Rumination  

E-Print Network [OSTI]

of the requirements for the degree of MASTER OF SCIENCE Approved by: Chair of Committee, Brandon Schmeichel Committee Members, Eddie Harmon-Jones Jeffrey Ackerman Head of Department, Les Morey May 2009 Major Subject: Psychology iii ABSTRACT... Confronting Ego Threats with Reappraisal versus Rumination. (May 2009) Ryan Caskey, B.A., University of Arizona Chair of Advisory Committee: Dr. Brandon Schmeichel Two experiments compared the effects of two cognitive responses (i.e., rumination...

Caskey, Ryan

2010-01-16T23:59:59.000Z

131

Modeling threat assessments of water supply systems using markov latent effects methodology.  

SciTech Connect (OSTI)

Recent amendments to the Safe Drinking Water Act emphasize efforts toward safeguarding our nation's water supplies against attack and contamination. Specifically, the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 established requirements for each community water system serving more than 3300 people to conduct an assessment of the vulnerability of its system to a terrorist attack or other intentional acts. Integral to evaluating system vulnerability is the threat assessment, which is the process by which the credibility of a threat is quantified. Unfortunately, full probabilistic assessment is generally not feasible, as there is insufficient experience and/or data to quantify the associated probabilities. For this reason, an alternative approach is proposed based on Markov Latent Effects (MLE) modeling, which provides a framework for quantifying imprecise subjective metrics through possibilistic or fuzzy mathematics. Here, an MLE model for water systems is developed and demonstrated to determine threat assessments for different scenarios identified by the assailant, asset, and means. Scenario assailants include terrorists, insiders, and vandals. Assets include a water treatment plant, water storage tank, node, pipeline, well, and a pump station. Means used in attacks include contamination (onsite chemicals, biological and chemical), explosives and vandalism. Results demonstrated highest threats are vandalism events and least likely events are those performed by a terrorist.

Silva, Consuelo Juanita

2006-12-01T23:59:59.000Z

132

Deterring regional threats from nuclear proliferation  

SciTech Connect (OSTI)

The most prominent shift in the National Military Strategy is from the global Soviet threat to a new focus on regional contingencies. No threat looms larger in these contingencies than the proliferation of nuclear weapons and ballistic missiles. This study examines proliferation trends and proposes a predominately diplomatic strategy for containing the problem. Dr. Spector identifies three waves of proliferation: the first is the five states with declared weapons and doctrine-the United States, Russia, Great Britain, France, and China; the second includes a less visible group that developed a covert capability, without testing weapons or declaring a doctrine of deterrence-for example, Israel, India, and probably Pakistan; and, a third wave of would-be proliferators includes radical states like Iraq, Iran, Libya, and North Korea. Spector's political approach is based on the common interest of wave one and two states to prevent further proliferation. Political-economic incentives have already worked in the cases of Brazil, Argentina, Taiwan, and South Africa-states which appear to have abandoned their nuclear weapons programs. Spector does not rule out the option of military force. Force, especially under international sanctions, can be a powerful tool to back diplomatic efforts. Use of force, however, remains a last resort.

Spector, L.S.

1992-03-12T23:59:59.000Z

133

The Umbra Simulation Framework  

SciTech Connect (OSTI)

Umbra is a new Sandia-developed modeling and simulation framework. The Umbra framework allows users to quickly build models and simulations for intelligent system development, analysis, experimentation, and control and supports tradeoff analyses of complex robotic systems, device, and component concepts. Umbra links together heterogeneous collections of modeling tools. The models in Umbra include 3D geometry and physics models of robots, devices and their environments. Model components can be built with varying levels of fidelity and readily switched to allow models built with low fidelity for conceptual analysis to be gradually converted to high fidelity models for later phase detailed analysis. Within control environments, the models can be readily replaced with actual control elements. This paper describes Umbra at a functional level and describes issues that Sandia uses Umbra to address.

GOTTLIEB,ERIC; HARRIGAN,RAYMOND W.; MCDONALD,MICHAEL J.; OPPEL III,FRED J.; XAVIER,PATRICK G.

2001-06-01T23:59:59.000Z

134

NNSA's Global Threat Reduction Initiative Removes More Than One...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Press Releases Video Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home NNSA Blog NNSA's Global Threat Reduction Initiative Removes More ......

135

Mitigating the Insider Threat Using Behavioral Science Workshop  

SciTech Connect (OSTI)

PowerPoint presentations are included on: the Insider Threat; Detecting the Malicious Insider through Behavioral Science; and Psychological Barriers to Effective Nuclear Security.

Landers, John; De Castro, Kara

2012-11-26T23:59:59.000Z

136

Sensor Data Processing for Tracking Underwater Threats Using Terascale Optical Core Devices  

SciTech Connect (OSTI)

A critical aspect of littoral surveillance (including port protection) involves the localization and tracking of underwater threats such as manned or unmanned autonomous underwater vehicles. In this article, we present a methodology for locating underwater threat sources from uncertain sensor network data, and illustrate the threat tracking aspects using active sonars in a matched filter framework. The novelty of the latter paradigm lies in its implementation on a tera-scale optical core processor, EnLight , recently introduced by Lenslet Laboratories. This processor is optimized for array operations, which it performs in a fixed point arithmetic architecture at tera-scale throughput. Using the EnLight 64 prototype processor, our results (i) illustrate the ability to reach a robust tracking accuracy, and (ii) demonstrate that a considerable speed-up (a factor of over 13,000) can be achieved when compared to an Intel XeonTM processor in the computation of sets of 80K-sample complex Fourier transforms that are associated with our matched filter techniques.

Barhen, Jacob [ORNL; Imam, Neena [ORNL

2009-01-01T23:59:59.000Z

137

A Pervasive Parallel Processing Framework For Data Visualization And Analysis At Extreme Scale Final Scientific and Technical Report  

SciTech Connect (OSTI)

The evolution of the computing world from teraflop to petaflop has been relatively effortless,with several of the existing programming models scaling effectively to the petascale. The migration to exascale, however, poses considerable challenges. All industry trends infer that the exascale machine will be built using processors containing hundreds to thousands of cores per chip. It can be inferred that efficient concurrency on exascale machines requires a massive amount of concurrent threads, each performing many operations on a localized piece of data. Currently, visualization libraries and applications are based off what is known as the visualization pipeline. In the pipeline model, algorithms are encapsulated as filters with inputs and outputs. These filters are connected by setting the output of one component to the input of another. Parallelism in the visualization pipeline is achieved by replicating the pipeline for each processing thread. This works well for today’s distributed memory parallel computers but cannot be sustained when operating on processors with thousands of cores. Our project investigates a new visualization framework designed to exhibit the pervasive parallelism necessary for extreme scale machines. Our framework achieves this by defining algorithms in terms of worklets, which are localized stateless operations. Worklets are atomic operations that execute when invoked unlike filters, which execute when a pipeline request occurs. The worklet design allows execution on a massive amount of lightweight threads with minimal overhead. Only with such fine-grained parallelism can we hope to fill the billions of threads we expect will be necessary for efficient computation on an exascale machine.

Geveci, Berk

2014-10-31T23:59:59.000Z

138

DAKOTA : a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis.  

SciTech Connect (OSTI)

The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic expansion methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a theoretical manual for selected algorithms implemented within the DAKOTA software. It is not intended as a comprehensive theoretical treatment, since a number of existing texts cover general optimization theory, statistical analysis, and other introductory topics. Rather, this manual is intended to summarize a set of DAKOTA-related research publications in the areas of surrogate-based optimization, uncertainty quantification, and optimization under uncertainty that provide the foundation for many of DAKOTA's iterative analysis capabilities.

Eldred, Michael Scott; Vigil, Dena M.; Dalbey, Keith R.; Bohnhoff, William J.; Adams, Brian M.; Swiler, Laura Painton; Lefantzi, Sophia (Sandia National Laboratories, Livermore, CA); Hough, Patricia Diane (Sandia National Laboratories, Livermore, CA); Eddy, John P.

2011-12-01T23:59:59.000Z

139

Dakota, a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis :  

SciTech Connect (OSTI)

The Dakota (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a exible and extensible interface between simulation codes and iterative analysis methods. Dakota contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quanti cation with sampling, reliability, and stochastic expansion methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the Dakota toolkit provides a exible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a user's manual for the Dakota software and provides capability overviews and procedures for software execution, as well as a variety of example studies.

Adams, Brian M.; Ebeida, Mohamed Salah; Eldred, Michael S.; Jakeman, John Davis; Swiler, Laura Painton; Stephens, John Adam; Vigil, Dena M.; Wildey, Timothy Michael; Bohnhoff, William J.; Eddy, John P.; Hu, Kenneth T.; Dalbey, Keith R.; Bauman, Lara E; Hough, Patricia Diane

2014-05-01T23:59:59.000Z

140

Threat assessment design for driver assistance system at intersections  

E-Print Network [OSTI]

This paper considers the decision-making problem for a human-driven vehicle crossing a road intersection in the presence of other, potentially errant, drivers. Our approach relies on a novel threat assessment module, which ...

Aoude, Georges

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Coping with stereotype threat: Denial as an impression management strategy  

E-Print Network [OSTI]

Four experiments tested the hypothesis that people who are concerned with impression management cope with stereotype threat through denial. Consistent with this hypothesis, temporary employees threatened by a stereotype ...

Von Hippel, W.; Von Hippel, C.; Conway, Leanne; Preacher, K. J.; Schooler, J. W.; Radvansky, G. A.

2005-01-01T23:59:59.000Z

142

Extinction by Miscalculation: The Threat to Sakinaw and Cultus Lake  

E-Print Network [OSTI]

Extinction by Miscalculation: The Threat to Sakinaw and Cultus Lake Sockeye MART R. GROSS of Economics, University of Toronto, 150 St. George Street, Toronto, Canada M5S 3G7. Email

Gross, Mart

143

Threat-aware Path Planning in Uncertain Urban Environments  

E-Print Network [OSTI]

This paper considers the path planning problem for an autonomous vehicle in an urban environment populated with static obstacles and moving vehicles with uncertain intents. We propose a novel threat assessment module, ...

Aoude, Georges

144

Protecting Networked Systems from Malware Threats  

E-Print Network [OSTI]

-axis for value) . . . . . . . . . . . . . . . . . . . . . . . . . 22 3.1 EFFORT design architecture, (M1 is for human-process-network cor- relation analysis module, M2 for system resource exposure analysis module, M3 for process reputation analysis module, M4.... By simply assigning values to each interface and connecting necessary modules, a FRESCO developer can replicate a range of essential security functions, such as rewalls, scan detectors, attack de ectors, or IDS detection logic. FRESCO modules can also...

Shin, Seung Won

2013-07-26T23:59:59.000Z

145

Economic Impact Reporting Framework  

E-Print Network [OSTI]

Economic Impact Reporting Framework 2007/08 November 2008 #12;#12;Economic Impact Reporting Framework 2007/08 #12;STFC Economic Impact Reporting Framework 2007/08 Contents: Introduction..............................................................................................................................................2 1: Overall Economic Impacts

146

Economic Impact Reporting Framework  

E-Print Network [OSTI]

Economic Impact Reporting Framework 2008/09 #12;#12;Economic Impact Reporting Framework 2008/09 #12;STFC Economic Impact Reporting Framework 2008/09 Contents: Introduction..............................................................................................................................................2 1: Overall Economic Impacts

147

Enterprise Risk Management Framework  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Framework The Enterprise Risk Management (ERM) framework includes four steps: identify the risks, determine the probability and impact of each one, identify controls that are...

148

Sustainability Framework 1 Queen's University  

E-Print Network [OSTI]

Sustainability Framework 1 Queen's University Sustainability Strategic Framework #12;Sustainability Framework 2 Contents Introduction .................................................................................................................................................. 2 Queen's Sustainability Mission

Abolmaesumi, Purang

149

IBM Internet Security Systems Threat Insight Monthly  

E-Print Network [OSTI]

the Report 01 Keylogging, by the numbers 02 Securing the Secure Shell ­ Advanced user authentication and key Page 1 #12;Keylogging, by the numbers Introduction During the course of malware analysis, especially

150

ANALYSIS OF ELECTRIC GRID SECURITY UNDER TERRORIST THREAT Javier Salmeron  

E-Print Network [OSTI]

with physical attacks on the power grid and neglect the issue of "cyber-attacks" on the controlling Supervisory to have limited offensive resources. We report results for standard reliability test networks to show report results for our techniques applied to reliability-benchmark networks. We search for optimal

Baldick, Ross

151

Comprehensive Vulnerability and Threat Analysis | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation Proposed New SubstationCleanCommunity InvolvementCompositional Variation WithinHardMotifs

152

Framework for Measuring Sustainable  

E-Print Network [OSTI]

Knight Foundation will use this sustainability framework for internal organizational purposes with the possibility

Levinson, David M.

153

Defined: There is some credible general threat information that may affect the University. Examples include an FBI alert of a threat directed at a college  

E-Print Network [OSTI]

include an FBI alert of a threat directed at a college campus in North Carolina, or a hurricane warning

Rose, Annkatrin

154

A decision making framework for cruise ship design  

E-Print Network [OSTI]

This thesis develops a new decision making framework for initial cruise ship design. Through review of effectiveness analysis and multi-criteria decision making, a uniform philosophy is created to articulate a framework ...

Katsoufis, George P. (George Paraskevas)

2006-01-01T23:59:59.000Z

155

Climate Threat to the Planet* Implications for Energy Policy  

E-Print Network [OSTI]

Climate Threat to the Planet* Implications for Energy Policy Jim Hansen 4 July 2008 United Nations's Paleoclimate History 2. On-Going Climate Changes 3. Climate Models #12;#12;Green Triangle = Volcano; Red Box;#12;Observations: Domingues, C.M. et al., Nature 453, 1090-1093, 2008. Model: Hansen, J. et al., Science 308, 1431

Hansen, James E.

156

PERSISTENT SURVEILLANCE FOR PIPELINE PROTECTION AND THREAT INTERDICTION  

E-Print Network [OSTI]

PERSISTENT SURVEILLANCE FOR PIPELINE PROTECTION AND THREAT INTERDICTION Fusion Power Associates on Fast Ignition in Fusion Science and Technology, April 2006 · Strong International Collaboration (Osaka investment in lab facilities (Omega-EP, Z/PW,NIF and smaller facilities (Titan, Trident Upgrade

157

WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President  

E-Print Network [OSTI]

WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President Dr. Peter H. Gleick1 October 9, 2008 Safe and adequate fresh water resources are central to the economy, foreign policy domestic and international challenges related to fresh water. These challenges will require unilateral

158

Secretarial Succession, Threat Level Notification, and Successor Tracking  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Order establishes the Secretarial Order of Succession pursuant to section 202(a) of the Department of Energy Organization Act and establishes a mechanism for tracking the locations of successors at various threat levels. Cancels DOE O 100.1C. Canceled by DOE O 100.1E

2007-04-20T23:59:59.000Z

159

Secretarial Succession, Threat Level Notification and Successor Tracking  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes the Secretarial Order of Succession pursuant to section 202(a) of the Department of Energy Organization Act, 42 U.S.C. 7132(a) and establishes a mechanism for tracking the locations of successors at various threat levels. Cancels DOE O 100.1D.

2013-01-28T23:59:59.000Z

160

Secretarial Succession, Threat Level Notification, and Successor Tracking  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This order establishes the Secretarial Order of Succession in the Department of Energy pursuant to section 202(a) of the Department of Energy Organization Act, 42 U.S.C. 7132(a) and establish a mechanism for tracking the locations of successors at the various threat levels. Admin Chg, dated 9-13-2013, cancels DOE O 100.1E.

2013-01-28T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Threats from Climate Change to Terrestrial Vertebrate Hotspots in Europe  

E-Print Network [OSTI]

Threats from Climate Change to Terrestrial Vertebrate Hotspots in Europe Luigi Maiorano1 to extreme climates. Our results outline that the Mediterranean basin represents both an important hotspot change projected to occur over the coming decades, especially in the Mediterranean bioregion, posing

Zimmermann, Niklaus E.

162

Ecological factors and human threats both drive wildfowl population declines  

E-Print Network [OSTI]

; human population density. Correspondence Peter R. Long, Department of Biology and Biochemistry, Africa and Asia. Second, we use phylogenetic comparative analyses to test whether population size, globalEcological factors and human threats both drive wildfowl population declines P. R. Long1 , T. Sz

163

Mitigating the Risk of Insider Threats When Sharing  

E-Print Network [OSTI]

Mitigating the Risk of Insider Threats When Sharing Credentials by Muntaha NourEddin Qasem Alawneh Thesis submitted to the University of London for the degree of Doctor of Philosophy Information Security Security Group as a candidate for the degree of Doctor of Philosophy. This work has not been submitted

Sheldon, Nathan D.

164

Notice of Intent to Develop DOE O 470.X, Insider Threat Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes top-level responsibilities and requirements for DOE's Insider Threat Program, which is intended to deter, detect, and mitigate insider threat actions by all Federal and contractor employees.

2013-10-17T23:59:59.000Z

165

MultiMulti--threat Containment withthreat Containment with Cooperative Autonomous AgentsCooperative Autonomous Agents  

E-Print Network [OSTI]

as Newtonian particles Quadratic APF (QAPF) · Simple yet does the job Three QAPFs · Moving toward the threats

Jay Yang, Shanchieh

166

Development, analysis, and evaluation of a commercial software framework for the study of Extremely Low Probability of Rupture (xLPR) events at nuclear power plants.  

SciTech Connect (OSTI)

Sandia National Laboratories (SNL) participated in a Pilot Study to examine the process and requirements to create a software system to assess the extremely low probability of pipe rupture (xLPR) in nuclear power plants. This project was tasked to develop a prototype xLPR model leveraging existing fracture mechanics models and codes coupled with a commercial software framework to determine the framework, model, and architecture requirements appropriate for building a modular-based code. The xLPR pilot study was conducted to demonstrate the feasibility of the proposed developmental process and framework for a probabilistic code to address degradation mechanisms in piping system safety assessments. The pilot study includes a demonstration problem to assess the probability of rupture of DM pressurizer surge nozzle welds degraded by primary water stress-corrosion cracking (PWSCC). The pilot study was designed to define and develop the framework and model; then construct a prototype software system based on the proposed model. The second phase of the project will be a longer term program and code development effort focusing on the generic, primary piping integrity issues (xLPR code). The results and recommendations presented in this report will be used to help the U.S. Nuclear Regulatory Commission (NRC) define the requirements for the longer term program.

Kalinich, Donald A.; Helton, Jon Craig; Sallaberry, Cedric M.; Mattie, Patrick D.

2010-12-01T23:59:59.000Z

167

Application of Machine Learning and Crowdsourcing to Detection of Cybersecurity Threats Application of Machine Learning and Crowdsourcing  

E-Print Network [OSTI]

Application of Machine Learning and Crowdsourcing to Detection of Cybersecurity Threats 1 Application of Machine Learning and Crowdsourcing to Detection of Cybersecurity Threats February 2011 Eugene of Cybersecurity Threats 2 Abstract We are applying machine learning and crowdsourcing to cybersecurity

Fink, Eugene

168

adaptive bin framework: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Lin, Lin; Ying, Lexing; E, Weinan 2011-01-01 163 Multifractal Diffusion Entropy Analysis: Optimal Bin Width of Probability Histograms CERN Preprints Summary: In the framework...

169

Application of SALSSA Framework to the Validation of Smoothed...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Hydrodynamics Simulations of Low Reynolds Number Flows. Abstract: The Support Architecture for Large-Scale Subsurface Analysis (SALSSA) provides an extensible framework,...

170

Global Threat Reduction Initiative | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsingFun with Big Sky LearningGet Assistance GetGiantOn The VergeGlobal Threat

171

Safeguards Evaluation Method for evaluating vulnerability to insider threats  

SciTech Connect (OSTI)

As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation.

Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

1986-01-01T23:59:59.000Z

172

A Risk Management Approach to the "Insider Threat"  

SciTech Connect (OSTI)

Abstract Recent surveys indicate that the financial impact and operating losses due to insider intrusions are increasing. But these studies often disagree on what constitutes an insider; indeed, many define it only implicitly. In theory, appropriate selection of, and enforcement of, properly specified security policies should prevent legitimate users from abusing their access to computer systems, information, and other resources. However, even if policies could be expressed precisely, the natural mapping between the natural language expression of a security policy, and the expression of that policy in a form that can be implemented on a computer system or network, creates gaps in enforcement. This paper defines insider precisely, in terms of these gaps, and explores an access-based model for analyzing threats that include those usually termed insider threats. This model enables an organization to order its resources based on the business value for that resource and of the information it contains. By identifying those users with access to high-value resources, we obtain an ordered list of users who can cause the greatest amount of damage. Concurrently with this, we examine psychological indicators in order to determine which users are at the greatest risk of acting inappropriately.We conclude by examining how to merge this model with one of forensic logging and auditing.

Bishop, Matt; Engle, Sophie J.; Frincke, Deborah A.; Gates, Carrie; Greitzer, Frank L.; Peisert, Sean; Whalen, Sean

2010-09-01T23:59:59.000Z

173

The Partnership Evaluation Framework  

Broader source: Energy.gov [DOE]

U.S. Department of Energy Better Buildings Neighborhood Program: The Partnership Evaluation Framework: How to evaluate a potential partner’s business model and identify areas for collaboration.

174

Spark Distributed Analytic Framework  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Analytic Framework Description and Overview Apache Spark(tm) is a fast and general engine for large-scale data processing. Availibility Spark is Available on Edison in CCM...

175

Global Threat Reduction Initiative Fuel Thermo-Physical Characterization Project: Sample Management Plan  

SciTech Connect (OSTI)

This sample management plan provides guidelines for sectioning, preparation, acceptance criteria, analytical path, and end-of-life disposal for the fuel element segments utilized in the Global Threat Reduction Initiative (GTRI), Fuel Thermo-Physical Characterization Project. The Fuel Thermo-Physical Characterization Project is tasked with analysis of irradiated Low Enriched Uranium (LEU) Molybdenum (U-Mo) fuel element samples to support the GTRI conversion program. Sample analysis may include optical microscopy (OM), scanning electron microscopy (SEM) fuel-surface interface analysis, gas pycnometry (density) measurements, laser flash analysis (LFA), differential scanning calorimetry (DSC), thermogravimetry and differential thermal analysis with mass spectroscopy (TG /DTA-MS), Inductively Coupled Plasma Spectrophotometry (ICP), alpha spectroscopy, and Thermal Ionization Mass Spectroscopy (TIMS). The project will utilize existing Radiochemical Processing Laboratory (RPL) operating, technical, and administrative procedures for sample receipt, processing, and analyses. Test instructions (TIs), which are documents used to provide specific details regarding the implementation of an existing RPL approved technical or operational procedure, will also be used to communicate to staff project specific parameters requested by the Principal Investigator (PI). TIs will be developed, reviewed, and issued in accordance with the latest revision of the RPL-PLN-700, RPL Operations Plan. Additionally, the PI must approve all project test instructions and red-line changes to test instructions.

Casella, Amanda J.; Pereira, Mario M.; Steen, Franciska H.

2013-01-01T23:59:59.000Z

176

How ORISE is Making a Difference: Preparing for the Threat of...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Amber Waves ORISE coordinates tabletop exercise to help agencies prepare for the threat of dirty bombs Radiological dispersion devices (RDDs), also known as dirty bombs, are...

177

Because It's Not There: Verbal Visuality and the Threat of Graphics in Interactive Fiction  

E-Print Network [OSTI]

of the power of computer graphics, text still has access tothat are unavailable in graphics – including visual effects.Visuality and the Threat of Graphics in Interactive Fiction

Kashtan, Aaron

2009-01-01T23:59:59.000Z

178

Conceptual Framework Presentation, 2006, Slide 1 The Conceptual Framework for  

E-Print Network [OSTI]

Conceptual Framework Presentation, 2006, Slide 1 The Conceptual Framework for Programs that Prepare Professionals Who Work in Schools What - Why - and Why You? #12;Conceptual Framework Presentation, 2006, Slide 2 on and develop your philosophy as a professional. . . WHY YOU? #12;Conceptual Framework Presentation, 2006, Slide

de Lijser, Peter

179

DAKOTA : a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis. Version 5.0, user's reference manual.  

SciTech Connect (OSTI)

The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a reference manual for the commands specification for the DAKOTA software, providing input overviews, option descriptions, and example specifications.

Eldred, Michael Scott; Dalbey, Keith R.; Bohnhoff, William J.; Adams, Brian M.; Swiler, Laura Painton; Hough, Patricia Diane (Sandia National Laboratories, Livermore, CA); Gay, David M.; Eddy, John P.; Haskell, Karen H.

2010-05-01T23:59:59.000Z

180

DAKOTA, a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis:version 4.0 reference manual  

SciTech Connect (OSTI)

The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a reference manual for the commands specification for the DAKOTA software, providing input overviews, option descriptions, and example specifications.

Griffin, Joshua D. (Sandai National Labs, Livermore, CA); Eldred, Michael Scott; Martinez-Canales, Monica L. (Sandai National Labs, Livermore, CA); Watson, Jean-Paul; Kolda, Tamara Gibson (Sandai National Labs, Livermore, CA); Adams, Brian M.; Swiler, Laura Painton; Williams, Pamela J. (Sandai National Labs, Livermore, CA); Hough, Patricia Diane (Sandai National Labs, Livermore, CA); Gay, David M.; Dunlavy, Daniel M.; Eddy, John P.; Hart, William Eugene; Guinta, Anthony A.; Brown, Shannon L.

2006-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Hybrid methods for cybersecurity analysis : LDRD final report.  

SciTech Connect (OSTI)

Early 2010 saw a signi cant change in adversarial techniques aimed at network intrusion: a shift from malware delivered via email attachments toward the use of hidden, embedded hyperlinks to initiate sequences of downloads and interactions with web sites and network servers containing malicious software. Enterprise security groups were well poised and experienced in defending the former attacks, but the new types of attacks were larger in number, more challenging to detect, dynamic in nature, and required the development of new technologies and analytic capabilities. The Hybrid LDRD project was aimed at delivering new capabilities in large-scale data modeling and analysis to enterprise security operators and analysts and understanding the challenges of detection and prevention of emerging cybersecurity threats. Leveraging previous LDRD research e orts and capabilities in large-scale relational data analysis, large-scale discrete data analysis and visualization, and streaming data analysis, new modeling and analysis capabilities were quickly brought to bear on the problems in email phishing and spear phishing attacks in the Sandia enterprise security operational groups at the onset of the Hybrid project. As part of this project, a software development and deployment framework was created within the security analyst work ow tool sets to facilitate the delivery and testing of new capabilities as they became available, and machine learning algorithms were developed to address the challenge of dynamic threats. Furthermore, researchers from the Hybrid project were embedded in the security analyst groups for almost a full year, engaged in daily operational activities and routines, creating an atmosphere of trust and collaboration between the researchers and security personnel. The Hybrid project has altered the way that research ideas can be incorporated into the production environments of Sandias enterprise security groups, reducing time to deployment from months and years to hours and days for the application of new modeling and analysis capabilities to emerging threats. The development and deployment framework has been generalized into the Hybrid Framework and incor- porated into several LDRD, WFO, and DOE/CSL projects and proposals. And most importantly, the Hybrid project has provided Sandia security analysts with new, scalable, extensible analytic capabilities that have resulted in alerts not detectable using their previous work ow tool sets.

Davis, Warren Leon,; Dunlavy, Daniel M.

2014-01-01T23:59:59.000Z

182

STEP Utility Bill Analysis Report  

Broader source: Energy.gov [DOE]

STEP Utility Bill Analysis Report, from the Tool Kit Framework: Small Town University Energy Program (STEP).

183

Framework for Physics Computation  

SciTech Connect (OSTI)

The Georgia Tech team has been working in collaboration with ORNL and Rutgers on improved I/O for petascale fusion codes, specifically, to integrate staging methods into the ADIOS framework. As part of this on-going work, we have released the DataTap server as part of the ADIOS release, and we have been working on improving the ‘in situ’ processing capabilities of the ADIOS framework. In particular, we have been moving forward with a design that adds additional metadata to describe the data layout and structure of data that is being moved for I/O purposes, building on the FFS type system developed in our past research

Schwan, Karsten [Georgia Institute of Technology

2012-01-13T23:59:59.000Z

184

DAKOTA : a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis. Version 5.0, developers manual.  

SciTech Connect (OSTI)

The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a developers manual for the DAKOTA software and describes the DAKOTA class hierarchies and their interrelationships. It derives directly from annotation of the actual source code and provides detailed class documentation, including all member functions and attributes.

Eldred, Michael Scott; Dalbey, Keith R.; Bohnhoff, William J.; Adams, Brian M.; Swiler, Laura Painton; Hough, Patricia Diane (Sandia National Laboratories, Livermore, CA); Gay, David M.; Eddy, John P.; Haskell, Karen H.

2010-05-01T23:59:59.000Z

185

DAKOTA : a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis. Version 5.0, user's manual.  

SciTech Connect (OSTI)

The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a user's manual for the DAKOTA software and provides capability overviews and procedures for software execution, as well as a variety of example studies.

Eldred, Michael Scott; Dalbey, Keith R.; Bohnhoff, William J.; Adams, Brian M.; Swiler, Laura Painton; Hough, Patricia Diane (Sandia National Laboratories, Livermore, CA); Gay, David M.; Eddy, John P.; Haskell, Karen H.

2010-05-01T23:59:59.000Z

186

DAKOTA, a multilevel parellel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis:version 4.0 uers's manual.  

SciTech Connect (OSTI)

The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a user's manual for the DAKOTA software and provides capability overviews and procedures for software execution, as well as a variety of example studies.

Griffin, Joshua D. (Sandai National Labs, Livermore, CA); Eldred, Michael Scott; Martinez-Canales, Monica L. (Sandai National Labs, Livermore, CA); Watson, Jean-Paul; Kolda, Tamara Gibson (Sandai National Labs, Livermore, CA); Giunta, Anthony Andrew; Adams, Brian M.; Swiler, Laura Painton; Williams, Pamela J. (Sandai National Labs, Livermore, CA); Hough, Patricia Diane (Sandai National Labs, Livermore, CA); Gay, David M.; Dunlavy, Daniel M.; Eddy, John P.; Hart, William Eugene; Brown, Shannon L.

2006-10-01T23:59:59.000Z

187

Dakota, a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis:version 4.0 developers manual.  

SciTech Connect (OSTI)

The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a developers manual for the DAKOTA software and describes the DAKOTA class hierarchies and their interrelationships. It derives directly from annotation of the actual source code and provides detailed class documentation, including all member functions and attributes.

Griffin, Joshua D. (Sandia National lababoratory, Livermore, CA); Eldred, Michael Scott; Martinez-Canales, Monica L. (Sandia National lababoratory, Livermore, CA); Watson, Jean-Paul; Kolda, Tamara Gibson (Sandia National lababoratory, Livermore, CA); Giunta, Anthony Andrew; Adams, Brian M.; Swiler, Laura Painton; Williams, Pamela J. (Sandia National lababoratory, Livermore, CA); Hough, Patricia Diane (Sandia National lababoratory, Livermore, CA); Gay, David M.; Dunlavy, Daniel M.; Eddy, John P.; Hart, William Eugene; Brown, Shannon L.

2006-10-01T23:59:59.000Z

188

Climate change is one of the greatest threats facing us today. CICERO's mission  

E-Print Network [OSTI]

Climate change is one of the greatest threats facing us today. CICERO's mission is to provide reliable and comprehensive knowledge about all aspects of the climate change problem. Foto: Scanpix #12;Climate change is one of the greatest threats facing us today. CICERO's mission is to provide reliable

Johansen, Tom Henning

189

Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid  

E-Print Network [OSTI]

Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid Zhuo Lu Park, NC 27709 Email: cliff.wang@us.army.mil Abstract--The smart grid, generally referred in the smart grid. In this paper, we aim at classifying and evaluating the security threats

Wang, Wenye

190

Damage Threats and Response of Final Optics for Laser-Fusion Power Plants  

E-Print Network [OSTI]

Damage Threats and Response of Final Optics for Laser-Fusion Power Plants M. S. Tillack1 , S. A the various damage threats and also provides nominal goals for a power plant. These goals are driven-1597 The final optics for laser-IFE (inertial fusion energy) power plants will be exposed to a variety of damage

Tillack, Mark

191

Global threat reduction initiative Russian nuclear material removal progress  

SciTech Connect (OSTI)

In December 1999 representatives from the United States, the Russian Federation, and the International Atomic Energy Agency (IAEA) started discussing a program to return to Russia Soviet- or Russian-supplied highly enriched uranium (HEU) fuel stored at the Russian-designed research reactors outside Russia. Trilateral discussions among the United States, Russian Federation, and the International Atomic Energy Agency (IAEA) have identified more than 20 research reactors in 17 countries that have Soviet- or Russian-supplied HEU fuel. The Global Threat Reduction Initiative's Russian Research Reactor Fuel Return Program is an important aspect of the U.S. Government's commitment to cooperate with the other nations to prevent the proliferation of nuclear weapons and weapons-usable proliferation-attractive nuclear materials. To date, 496 kilograms of Russian-origin HEU have been shipped to Russia from Serbia, Latvia, Libya, Uzbekistan, Romania, Bulgaria, Poland, Germany, and the Czech Republic. The pilot spent fuel shipment from Uzbekistan to Russia was completed in April 2006. (author)

Cummins, Kelly [DOE/NNSA (United States); Bolshinsky, Igor [INL/NNSA (United States)

2008-07-15T23:59:59.000Z

192

Insider Threat - Material Control and Accountability Mitigation (Presentation)  

SciTech Connect (OSTI)

Why is the insider a concern? There are many documented cases of nuclear material available for sale - there are more insider diversions than outsider attacks and more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. Insider attributes are: have access, has authority, possesses knowledge, works with absence of timeline, can test system, and may act alone or support a team. Material control and accountability (MC&A) is an essential part of an integrated safeguards system. Objectives of MC&A are: (1) Ongoing confirmation of the presence of special nuclear material (SNM) in assigned locations; (2) Prompt investigation of anomalies that may indicate a loss of SNM; (3) Timely and localized detection of loss, diversion, or theft of a goal quantity; (4) Rapid assessment and response to detection alarms; and (5) Timely generation of information to aid in the recovery of SNM in the event of an actual loss, diversion, or theft from the purview of the MC&A system. Control and accountability of material, equipment, and data are essential to minimizing insider threats.

Powell, Danny H [ORNL] [ORNL; Elwood Jr, Robert H [ORNL] [ORNL

2011-01-01T23:59:59.000Z

193

Global Threat Reduction Initiative Fuel-Thermo-Physical Characterization Project Quality Assurance Plan  

SciTech Connect (OSTI)

The charter of the Fuel Thermo-Physical Characterization Project is to ready Pacific Northwest National Laboratory (PNNL) facilities and processes for the receipt of unirradiated and irradiated low enriched uranium (LEU) molybdenum (U-Mo) fuel element samples, and to perform analysis to support the Global Threat Reduction Initiative conversion program. PNNL’s support for the program will include the establishment of post-irradiation examination processes, including thermo-physical properties, unique to the U.S. Department of Energy laboratories. These processes will ultimately support the submission of the base fuel qualification (BFQ) to the U.S. Nuclear Regulatory Commission (NRC) and revisions to High Performance Research Reactor Safety Analysis Reports to enable conversion from highly enriched uranium to LEU fuel. This quality assurance plan (QAP) provides the quality assurance requirements and processes that support the NRC BFQ. This QAP is designed to be used by project staff, and prescribes the required management control elements that are to be met and how they are implemented. Additional controls are captured in Fuel Thermo-Physical Characterization Project plans, existing procedures, and procedures to be developed that provide supplemental information on how work is conducted on the project.

Pereira, Mario M.; Slonecker, Bruce D.

2012-06-01T23:59:59.000Z

194

A Bayesian Framework for Combining Valuation Estimates  

E-Print Network [OSTI]

Obtaining more accurate equity value estimates is the starting point for stock selection, value-based indexing in a noisy market, and beating benchmark indices through tactical style rotation. Unfortunately, discounted cash flow, method of comparables, and fundamental analysis typically yield discrepant valuation estimates. Moreover, the valuation estimates typically disagree with market price. Can one form a superior valuation estimate by averaging over the individual estimates, including market price? This article suggests a Bayesian framework for combining two or more estimates into a superior valuation estimate. The framework justifies the common practice of averaging over several estimates to arrive at a final point estimate.

Kenton K. Yee

2007-07-24T23:59:59.000Z

195

A Bayesian Framework for Combining Valuation Estimates  

E-Print Network [OSTI]

Obtaining more accurate equity value estimates is the starting point for stock selection, value-based indexing in a noisy market, and beating benchmark indices through tactical style rotation. Unfortunately, discounted cash flow, method of comparables, and fundamental analysis typically yield discrepant valuation estimates. Moreover, the valuation estimates typically disagree with market price. Can one form a superior valuation estimate by averaging over the individual estimates, including market price? This article suggests a Bayesian framework for combining two or more estimates into a superior valuation estimate. The framework justifies the common practice of averaging over several estimates to arrive at a final point estimate.

Yee, Kenton K

2007-01-01T23:59:59.000Z

196

Feedback Control RealTime Scheduling: Framework, Modeling, and Algorithms *  

E-Print Network [OSTI]

1 Feedback Control Real­Time Scheduling: Framework, Modeling, and Algorithms * Chenyang Lu John A}@virginia.edu Abstract This paper presents a feedback control real­time scheduling (FCS) framework for adaptive real. In particular, we establish a dynamic model and performance analysis of several feedback control scheduling

Son, Sang H.

197

Feedback Control Real-Time Scheduling: Framework, Modeling, and Algorithms*  

E-Print Network [OSTI]

1 Feedback Control Real-Time Scheduling: Framework, Modeling, and Algorithms* Chenyang Lu John A}@virginia.edu Abstract This paper presents a feedback control real-time scheduling (FCS) framework for adaptive real. In particular, we establish a dynamic model and performance analysis of several feedback control scheduling

Son, Sang H.

198

Modeling and analysis framework for core damage propagation during flow-blockage-initiated accidents in the Advanced Neutron Source reactor at Oak Ridge National Laboratory  

SciTech Connect (OSTI)

This paper describes modeling and analysis to evaluate the extent of core damage during flow blockage events in the Advanced Neutron Source (ANS) reactor planned to be built at ORNL. Damage propagation is postulated to occur from thermal conduction between dmaged and undamaged plates due to direct thermal contact. Such direct thermal contact may occur beause of fuel plate swelling during fission product vapor release or plate buckling. Complex phenomena of damage propagation were modeled using a one-dimensional heat transfer model. A parametric study was done for several uncertain variables. The study included investigating effects of plate contact area, convective heat transfer coefficient, thermal conductivity on fuel swelling, and initial temperature of the plate being contacted by the damaged plate. Also, the side support plates were modeled to account for their effects of damage propagation. Results provide useful insights into how variouss uncertain parameters affect damage propagation.

Kim, S.H.; Taleyarkhan, R.P.; Navarro-Valenti, S.; Georgevich, V.

1995-12-31T23:59:59.000Z

199

Preparation of functionalized zeolitic frameworks  

DOE Patents [OSTI]

The disclosure provides zeolitic frameworks for gas separation, gas storage, catalysis and sensors. More particularly the disclosure provides zeolitic frameworks (ZIFs). The ZIF of the disclosure comprises any number of transition metals or a homogenous transition metal composition.

Yaghi, Omar M; Furukawa, Hiroyasu; Wang, Bo

2013-07-09T23:59:59.000Z

200

An urban intervention : enabling frameworks  

E-Print Network [OSTI]

The relationship between design and the idea of a framework is essentially an attitude about ordering. A framework is an Intellectual proposition which can support a variety ideas, and in doing so, it provides a resolution ...

Harrigan, Neil Patrick

1993-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Preparation of functionalized zeolitic frameworks  

DOE Patents [OSTI]

The disclosure provides zeolitic frameworks for gas separation, gas storage, catalysis and sensors. More particularly the disclosure provides zeolitic frameworks (ZIFs). The ZIF of the disclosure comprises any number of transition metals or a homogenous transition metal composition.

Yaghi, Omar M; Hayashi, Hideki; Banerjee, Rahul; Park, Kyo Sung; Wang, Bo; Cote, Adrien P

2012-11-20T23:59:59.000Z

202

A framework for digital watercolor  

E-Print Network [OSTI]

This research develops an extendible framework for reproducing watercolor in a digital environment, with a focus on interactivity using the GPU. The framework uses the lattice Boltzmann method, a relatively new approach to fluid dynamics...

O'Brien, Patrick Michael

2008-10-10T23:59:59.000Z

203

Preparation of functionalized zeolitic frameworks  

DOE Patents [OSTI]

The disclosure provides zeolitic frameworks for gas separation, gas storage, catalysis and sensors. More particularly the disclosure provides zeolitic frameworks (ZIFs). The ZIF of the disclosure comprises any number of transition metals or a homogenous transition metal composition.

Yaghi, Omar M.; Hayashi, Hideki; Banerjee, Rahul; Park, Kyo Sung; Wang, Bo; Cote, Adrien P.

2014-08-19T23:59:59.000Z

204

Robust diffusion imaging framework for clinical studies  

E-Print Network [OSTI]

Clinical diffusion imaging requires short acquisition times and good image quality to permit its use in various medical applications. In turn, these demands require the development of a robust and efficient post-processing framework in order to guarantee useful and reliable results. However, multiple artefacts abound in in vivo measurements; from either subject such as cardiac pulsation, bulk head motion, respiratory motion and involuntary tics and tremor, or imaging hardware related problems, such as table vibrations, etc. These artefacts can severely degrade the resulting images and render diffusion analysis difficult or impossible. In order to overcome these problems, we developed a robust and efficient framework enabling the use of initially corrupted images from a clinical study. At the heart of this framework is an improved least trimmed squares diffusion tensor estimation algorithm that works well with severely degraded datasets with low signal-to-noise ratio. This approach has been compared with other...

Maximov, Ivan I; Neuner, Irene; Shah, N Jon

2015-01-01T23:59:59.000Z

205

The National Transport Data Framework  

E-Print Network [OSTI]

................................................................................................................ 14 NTDF PROTOTYPE ............................................................................................................................... 14 NTDF ARCHITECTURE... ................................................................................................................................. 27 RESOURCING .......................................................................................................................................... 27 ? The National Transport Data Framework March 2008 ? Page 2 SUSTAINABILITY...

Landshoff, Peter Vincent; Polak, John

2008-08-18T23:59:59.000Z

206

34.07.99.M0.02 Bomb Threat Procedures Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE  

E-Print Network [OSTI]

34.07.99.M0.02 Bomb Threat Procedures Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 34.07.99.M0 4, 2016 Standard Administrative Procedure Statement Any and all bomb threats are regarded seriously. 2. ADDITIONAL NOTIFICATION AND EVALUATION 2.1 Upon receipt of a bomb threat to a particular building

207

Modeling and analysis framework for core damage propagation during flow-blockage-initiated accidents in the Advanced Neutron Source Reactor at Oak Ridge National Laboratory  

SciTech Connect (OSTI)

This paper describes modeling and analysis to evaluate the extent of core damage during flow blockage events in the Advanced Neutron Source (ANS) reactor planned to be built at the Oak Ridge National Laboratory (ORNL). Damage propagation is postulated to occur from thermal conduction between damaged and undamaged plates due to direct thermal contact. Such direct thermal contact may occur because of fuel plate swelling during fission product vapor release or plate buckling. Complex phenomena of damage propagation were modeled using a one-dimensional heat transfer model. A scoping study was conducted to learn what parameters are important for core damage propagation, and to obtain initial estimates of core melt mass for addressing recriticality and steam explosion events. The study included investigating the effects of the plate contact area, the convective heat transfer coefficient, thermal conductivity upon fuel swelling, and the initial temperature of the plate being contacted by the damaged plate. Also, the side support plates were modeled to account for their effects on damage propagation. The results provide useful insights into how various uncertain parameters affect damage propagation.

Kim, S.H.; Taleyarkhan, R.P.; Navarro-Valenti, S.; Georgevich, V.

1995-09-01T23:59:59.000Z

208

Agriculture, Ecosystems and Environment 84 (2001) 120 Economic and environmental threats of alien plant,  

E-Print Network [OSTI]

Agriculture, Ecosystems and Environment 84 (2001) 1­20 Economic and environmental threats of alien. Precise economic costs associated with some of the most ecologically damaging alien species; Animals; Alien; Economic; Ecology; Environment; Agriculture; Non-indigenous 1. Introduction Quantifying

California at Berkeley, University of

209

Effects of Threats to Self-Esteem and Goal Orientation on Asking for Help.  

E-Print Network [OSTI]

??This paper studied whether threats to self-esteem and goal orientation affected an individual?s propensity to ask for help. Eighty-two undergraduate students from the University of… (more)

Chung, Andrew

2006-01-01T23:59:59.000Z

210

Tackling the Triple-Threat Genome of Miscanthus x giganteus (2010 JGI User Meeting)  

ScienceCinema (OSTI)

Steve Moose from the University of Illinois at Urbana-Champaign and the Energy Biosciences Institute on "Tackling the Triple-Threat Genome of Miscanthus x giganteus" on March 25, 2010 at the 5th Annual DOE JGI User Meeting

Moose, Steve

2011-04-25T23:59:59.000Z

211

CERNA WORKING PAPER SERIES Spatial price homogeneity as a mechanism to reduce the threat of  

E-Print Network [OSTI]

district heating sector in 2007, confirms the theoretical predictions. Keywords: regulatory threat, district heating, Sweden JEL Classification: L12, L21, L51, L97 hal-00659458,version1-12Jan2012 #12;2 1

Paris-Sud XI, Université de

212

Preparation of metal-triazolate frameworks  

DOE Patents [OSTI]

The disclosure provides for novel metal-triazolate frameworks, methods of use thereof, and devices comprising the frameworks thereof.

Yaghi, Omar M; Uribe-Romo, Fernando J; Gandara-Barragan, Felipe; Britt, David K

2014-10-07T23:59:59.000Z

213

Energy Sector Cybersecurity Framework Implementation Guidance  

Broader source: Energy.gov (indexed) [DOE]

DRAFT FOR PUBLIC COMMENT SEPTEMBER, 2014 ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE Energy Sector Cybersecurity Framework Implementation Guidance Table of...

214

Threat of Hydride Re-orientation to Spent Fuel Integrity During Transportation Accidents: Myth or Reality?  

SciTech Connect (OSTI)

The source-term study conducted by Sandia National Laboratories nearly two decades ago for the spent fuel inventory known at the time, which was in the low-to-medium burnup range ({approx}35 GWd/MTU), showed that the effects of transportation accidents on spent fuel failures, and consequential radioactivity release to the environment, were relatively benign. However, with today's discharged fuel burnups routinely greater than 45 GWd/MTU, potential hydride reorientation during interim dry storage, and its effects on cladding properties, has become one of the primary concerns for spent fuel transportation. Laboratory tests of un-irradiated cladding specimens subjected to heat treatments promoting hydride dissolution followed by re-precipitation in the radial direction have shown that relatively moderate concentrations ({approx}70 ppm) of radial hydrides can significantly degrade cladding ductility, at least at room temperature. The absence of specific data that are relevant to high-burnup spent fuel under dry storage conditions have led to the conjecture, deduced from those tests, that massive cladding failures, possibly resulting in fuel reconfiguration, can be expected during cask drop events. Such conclusions are not borne out by the findings in this paper. The analysis results indicate that cladding failure is bi-modal: a state of failure initiation at the cladding ID remaining as part-wall damage with less than 2% probability of occurrence, and a through-wall failure at a probability of 1 E-5. These results indicate that spent fuel conditions that could promote the formation of radial hydrides during dry storage are not sufficient to produce radial hydrides concentrations of significant levels to cause major threat to spent fuel integrity. It is important to note in this regard that the through-wall cladding failure probability of 1 E-5 is of the same order of magnitude as calculated in the cited Sandia study for low burnup fuel. (authors)

Rashid, Joe [ANATECH, 5435 Oberlin Drive, San Diego, CA 92121 (United States); Machiels, Albert [EPRI, 3420 Hillview Avenue, Palo Alto, CA 94304 (United States)

2007-07-01T23:59:59.000Z

215

Assessing the integrity of local area network materials accountability systems against insider threats  

SciTech Connect (OSTI)

DOE facilities rely increasingly on computerized systems to manage nuclear materials accountability data and to protect against diversion of nuclear materials or other malevolent acts (e.g., hoax due to falsified data) by insider threats. Aspects of modern computerized material accountability (MA) systems including powerful personal computers and applications on networks, mixed security environments, and more users with increased knowledge, skills and abilities help heighten the concern about insider threats to the integrity of the system. In this paper, we describe a methodology for assessing MA applications to help decision makers identify ways of and compare options for preventing or mitigating possible additional risks from the insider threat. We illustrate insights from applying the methodology to local area network materials accountability systems.

Jones, E.; Sicherman, A.

1996-07-01T23:59:59.000Z

216

Comprehensive test ban treaty international monitoring system security threats and proposed security attributes  

SciTech Connect (OSTI)

To monitor compliance with a Comprehensive Test Ban Treaty (CTBT), a sensing network, referred to as the International Monitoring System (IMS), is being deployed. Success of the IMS depends on both its ability to preform its function and the international community`s confidence in the system. To ensure these goals, steps must be taken to secure the system against attacks that would undermine it; however, it is not clear that consensus exists with respect to the security requirements that should be levied on the IMS design. In addition, CTBT has not clearly articulated what threats it wishes to address. This paper proposes four system-level threats that should drive IMS design considerations, identifies potential threat agents, and collects into one place the security requirements that have been suggested by various elements of the IMS community. For each such requirement, issues associated with the requirement are identified and rationale for the requirement is discussed.

Draelos, T.J.; Craft, R.L.

1996-03-01T23:59:59.000Z

217

A Framework for Defining Logics   

E-Print Network [OSTI]

The Edinburgh Logical Framework (LF) provides a means to define (or present) logics. It is based on a general treatment of syntax, rules, and proofs by means of a typed ?-calculus with dependent types. Syntax is treated ...

Plotkin, Gordon; Honsell, Furio; Harper, Robert

1993-01-01T23:59:59.000Z

218

Sample Business Plan Framework 3  

Broader source: Energy.gov [DOE]

U.S. Department of Energy Better Buildings Neighborhood Program: Sample Business Plan Framework 1: A program seeking to continue operations in the post-grant period as a not-for-profit (NGO) entity.

219

Sample Business Plan Framework 2  

Broader source: Energy.gov [DOE]

U.S. Department of Energy Better Buildings Neighborhood Program: Sample Business Plan Framework 1: A program seeking to continue operations in the post-grant period as a not-for-profit (NGO) entity.

220

Sample Business Plan Framework 4  

Broader source: Energy.gov [DOE]

U.S. Department of Energy Better Buildings Neighborhood Program: Sample Business Plan Framework 1: A program seeking to continue operations in the post-grant period as a not-for-profit (NGO) entity.

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Sample Business Plan Framework 1  

Broader source: Energy.gov [DOE]

U.S. Department of Energy Better Buildings Neighborhood Program: Sample Business Plan Framework 1: A program seeking to continue operations in the post-grant period as a not-for-profit (NGO) entity.

222

Geologic Framework Model (GFM2000)  

SciTech Connect (OSTI)

The purpose of this report is to document the geologic framework model, version GFM2000 with regard to input data, modeling methods, assumptions, uncertainties, limitations, and validation of the model results, and the differences between GFM2000 and previous versions. The version number of this model reflects the year during which the model was constructed. This model supersedes the previous model version, documented in Geologic Framework Model (GFM 3.1) (CRWMS M&O 2000 [DIRS 138860]). The geologic framework model represents a three-dimensional interpretation of the geology surrounding the location of the monitored geologic repository for spent nuclear fuel and high-level radioactive waste at Yucca Mountain. The geologic framework model encompasses and is limited to an area of 65 square miles (168 square kilometers) and a volume of 185 cubic miles (771 cubic kilometers). The boundaries of the geologic framework model (shown in Figure 1-1) were chosen to encompass the exploratory boreholes and to provide a geologic framework over the area of interest for hydrologic flow and radionuclide transport modeling through the unsaturated zone (UZ). The upper surface of the model is made up of the surface topography and the depth of the model is constrained by the inferred depth of the Tertiary-Paleozoic unconformity. The geologic framework model was constructed from geologic map and borehole data. Additional information from measured stratigraphic sections, gravity profiles, and seismic profiles was also considered. The intended use of the geologic framework model is to provide a geologic framework over the area of interest consistent with the level of detailed needed for hydrologic flow and radionuclide transport modeling through the UZ and for repository design. The model is limited by the availability of data and relative amount of geologic complexity found in an area. The geologic framework model is inherently limited by scale and content. The grid spacing used in the geologic framework model (200 feet [61 meters]), discussed in Section 6.4.2, limits the size of features that can be resolved by the model but is appropriate for the distribution of data available and its intended use. Uncertainty and limitations are discussed in Section 6.6 and model validation is discussed in Section 7.

T. Vogt

2004-08-26T23:59:59.000Z

223

iVIBRATE: Interactive Visualization Based Framework for Clustering Large Datasets  

E-Print Network [OSTI]

iVIBRATE: Interactive Visualization Based Framework for Clustering Large Datasets Keke Chen Ling of large datasets continues to be one of the most important problems in large- scale data analysis. A commonly used methodology for cluster analysis on large datasets is the three-phase framework of "sampling

224

Title: Campus Violence and Threat Management Effective Date: September 1, 2012 Page: Page 1 of 4  

E-Print Network [OSTI]

Title: Campus Violence and Threat Management Effective Date: September 1, 2012 Page: Page 1 of 4 or intentional damage to property and has the effect of intimidating, frightening, coercing, or provoking others; brandishing or using a weapon in a manner not required by the individual's position (see also the university

Swaddle, John

225

Entry Number: 1 GL A NEW HONEY BEE THREAT-THE PARASITIZING PHORID FLY APOCEPHALUS BOREALIS  

E-Print Network [OSTI]

Entry Number: 1 GL A NEW HONEY BEE THREAT- THE PARASITIZING PHORID FLY APOCEPHALUS BOREALIS By be easily susceptible to attack. Entry Number: 2 GL BALANCING ACT: HOW DOES THE MALE MARITIME EARWIG between multiple selection factors drives evolution in the earwig, Anisolabis maritima. Entry Number: 3 GL

226

Entry Number: 1 GL A NEW HONEY BEE THREAT-THE PARASITIZING PHORID FLY  

E-Print Network [OSTI]

Entry Number: 1 GL A NEW HONEY BEE THREAT- THE PARASITIZING PHORID FLY APOCEPHALUS BOREALIS By be easily susceptible to attack. Entry Number: 3 GL INVESTIGATING THE EXPERIENCES OF GRADUATE WOMEN OF COLOR Number: 4 GL #12;IS A DEADLY DISEASE CAUSING THE DECLINE OF ANOTHER AMPHIBIAN IN THE SIERRA NEVADA? By

227

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang  

E-Print Network [OSTI]

attacks has become a critical issue, yet different from that of traditional physical attacks. Current behavior, hacking methods, and network vulnerabilities. This is different from traditional physical attacks by traditional physical attacks. The question then is how good a cyber threat assessment algorithm one should

Jay Yang, Shanchieh

228

ARTICLE doi:10.1038/nature09440 Global threats to human water security  

E-Print Network [OSTI]

,20 . The success of integrated water management strategies depends on striking a balance between human resource use policy and management responses to this crisis, and underscores the necessity of limiting threats change, urb- anization, industrialization and engineering schemes like reservoirs, irrigation

McIntyre, Peter

229

Factoring species, non-species values and threats into biodiversity prioritisation across the ecoregions  

E-Print Network [OSTI]

population density, and the extinction risk of species. This threat index is positively correlated with all the ecoregions of Africa and its islands Neil D. Burgessa,b, *, Jennifer D'Amico Halesa , Taylor H. Rickettsa I N F O Article history: Received 3 September 2004 Available online 11 October 2005 Keywords: Africa

Vermont, University of

230

DO GLOBAL WARMING AND CLIMATE CHANGE REPRESENT A SERIOUS THREAT TO OUR WELFARE  

E-Print Network [OSTI]

DO GLOBAL WARMING AND CLIMATE CHANGE REPRESENT A SERIOUS THREAT TO OUR WELFARE AND ENVIRONMENT? By Michael E. Mann I. Introduction The subjects of "global warming" and "climate change" have become parts of both the popular lexicon and the public discourse. Discussions of global warming often evoke passionate

231

The Threat to the Planet* Dark & Bright Sides of Global Warming  

E-Print Network [OSTI]

The Threat to the Planet* Dark & Bright Sides of Global Warming Jim Hansen 3 October 2007 presented provides most important information on global warming. Recorded human history occurs within the Holocene for these large climate change is perturbations of Earth's orbit. #12;Continental Drift Fig. 1 "Global Warming

Hansen, James E.

232

CYBER SECURITY THREATS TO SAFETY-CRITICAL, SPACE-BASED INFRASTRUCTURES  

E-Print Network [OSTI]

role in national critical infrastructures. The certification of Global Navigation Satellite SystemsCYBER SECURITY THREATS TO SAFETY-CRITICAL, SPACE-BASED INFRASTRUCTURES C.W. Johnson (1) , A-based systems play an important role within national critical infrastructures. They are being integrated

Johnson, Chris

233

International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions  

E-Print Network [OSTI]

International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid, controlling and managing the demands of customers. A smart grid is a huge complex network composed of millions

Aloul, Fadi

234

NOM's National Marine Fisheries Service (NMFS) is working to reduce these threats to  

E-Print Network [OSTI]

human act¡v¡t¡es, such as dredging in the mar¡ne env¡ronment 0r the ¡ntakes of power plants, may ¡nc power plants often take in sea water to cool the reactors. Sea turtles may be trapped against intakeNOM's National Marine Fisheries Service (NMFS) is working to reduce these threats to help conserve

235

The threat of terrorism and other attacks raises profound dilemmas for the electric power industry.  

E-Print Network [OSTI]

The threat of terrorism and other attacks raises profound dilemmas for the electric power industry power plant in Oak Harbor, Ohio, and disabled a safety monitoring system for nearly five hours. For&D) on infrastructure security at the Electric Power Research Institute (EPRI). At first, I was faced with many reports

Amin, S. Massoud

236

Thermoelectric Activities of European Community within Framework...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

of European Community within Framework Programme 7 and additional activities in Germany Thermoelectric Activities of European Community within Framework Programme 7 and...

237

International Framework for Nuclear Energy Cooperation (IFNEC...  

Broader source: Energy.gov (indexed) [DOE]

International Framework for Nuclear Energy Cooperation (IFNEC) Expert meetings in Romania International Framework for Nuclear Energy Cooperation (IFNEC) Expert meetings in Romania...

238

Energy Sector Cybersecurity Framework Implementation Guidance...  

Broader source: Energy.gov (indexed) [DOE]

Cybersecurity Framework Implementation Guidance - Notice of Public Comment: Federal Register Notice, Volume 79, No. 177, September 12, 2014 Energy Sector Cybersecurity Framework...

239

Cosmic bombardment V: Threat object-dispersing approaches to active planetary defense  

SciTech Connect (OSTI)

Earth-impacting comets and asteroids with diameters {approx}0.03 - 10 km pose the greatest threats to the terrestrial biosphere in terms of impact frequency-weighted impact consequences, and thus are of most concern to designers of active planetary defenses. Specific gravitational binding energies of such objects range from 10{sup -7} to 10{sup -2} J/gm, and are small compared with the specific energies of 1x10{sup 3} to 3x10{sup 3} J/gm required to vaporize objects of typical composition or the specific energies required to pulverize them, which are 10{sup -1} to 10 J/gm. All of these are small compared to the specific kinetic energy of these objects in the Earth- centered frame, which is 2x10{sup 5} to 2x10{sup 6} J/gm. The prospect naturally arises of negating all such threats by deflecting, pulverizing or vaporizing the objects. Pulverization-with-dispersal is an attractive option of reasonable defensive robustness. Examples of such equipments - which employ no explosives of any type - are given. Vaporization is the maximally robust defensive option, and may be invoked to negate threat objects not observed until little time is left until Earth-strike, and pulverization-with-dispersal has proven inadequate. Physically larger threats may be vaporized with nuclear explosives. No contemporary technical means of any kind appear capable of directly dispersing the -100 km diameter scale Charon- class cometary objects recently observed in the outer solar system, although such objects may be deflected to defensively useful extents. Means of implementing defenses of each of these types are proposed for specificity, and areas for optimization noted. Biospheric impacts of threat object debris are briefly considered, for bounding purposes. Experiments are suggested on cometary and asteroidal objects.

Teller, E.; Wood, L. [Stanford Univ., CA (United States). Hoover Institution on War, Revolution and Peace]|[Lawrence Livermore National Lab., CA (United States); Ishikawa, M. [Stanford Univ., CA (United States). Dept. of Aeronautics and Astronautics]|[Lawrence Livermore National Lab., CA (United States); Hyde, R. [Lawrence Livermore National Lab., CA (United States)

1995-05-24T23:59:59.000Z

240

A Simulation and Modeling Framework for Space Situational Awareness  

SciTech Connect (OSTI)

This paper describes the development and initial demonstration of a new, integrated modeling and simulation framework, encompassing the space situational awareness enterprise, for quantitatively assessing the benefit of specific sensor systems, technologies and data analysis techniques. The framework is based on a flexible, scalable architecture to enable efficient, physics-based simulation of the current SSA enterprise, and to accommodate future advancements in SSA systems. In particular, the code is designed to take advantage of massively parallel computer systems available, for example, at Lawrence Livermore National Laboratory. The details of the modeling and simulation framework are described, including hydrodynamic models of satellite intercept and debris generation, orbital propagation algorithms, radar cross section calculations, optical brightness calculations, generic radar system models, generic optical system models, specific Space Surveillance Network models, object detection algorithms, orbit determination algorithms, and visualization tools. The use of this integrated simulation and modeling framework on a specific scenario involving space debris is demonstrated.

Olivier, S S

2008-09-15T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

analysis network sevan: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Francesco Keywords: Knowledge Base, Social Network Analysis, Variety, Coherence, Industry lifecycles; exploration network analysis (SNA) within an evolutionary framework, to...

242

Analysis of the multigroup model for muon tomography based threat detection  

SciTech Connect (OSTI)

We compare different algorithms for detecting a 5?cm tungsten cube using cosmic ray muon technology. In each case, a simple tomographic technique was used for position reconstruction, but the scattering angles were used differently to obtain a density signal. Receiver operating characteristic curves were used to compare images made using average angle squared, median angle squared, average of the squared angle, and a multi-energy group fit of the angular distributions for scenes with and without a 5?cm tungsten cube. The receiver operating characteristic curves show that the multi-energy group treatment of the scattering angle distributions is the superior method for image reconstruction.

Perry, J. O.; Bacon, J. D.; Borozdin, K. N.; Fabritius, J. M.; Morris, C. L. [Los Alamos National Laboratory, Los Alamos, New Mexico 87545 (United States)

2014-02-14T23:59:59.000Z

243

EXTERNAL TERRORIST THREATS TO CIVILIAN AIRLINERS: A SUMMARY RISK ANALYSIS OF  

E-Print Network [OSTI]

and the Department of Homeland Security have invested time and resources in exploring the protection of airliners of international ground-to-air missile attacks on airliners within the last 20 years ­ some civilian and some

Wang, Hai

244

Fact Sheet: Detection and Analysis of Threats to the Energy Sector (DATES)  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeat PumpRecord ofESPCofConstructionofFYOxideof Energy Clean Coal

245

Risk assessment as a framework for decisions.  

SciTech Connect (OSTI)

The risk assessment approach has been applied to support numerous radioactive waste management activities over the last 30 years. A risk assessment methodology provides a solid and readily adaptable framework for evaluating the risks of CO2 sequestration in geologic formations to prioritize research, data collection, and monitoring schemes. This paper reviews the tasks of a risk assessment, and provides a few examples related to each task. This paper then describes an application of sensitivity analysis to identify important parameters to reduce the uncertainty in the performance of a geologic repository for radioactive waste repository, which because of importance of the geologic barrier, is similar to CO2 sequestration. The paper ends with a simple stochastic analysis of idealized CO2 sequestration site with a leaking abandoned well and a set of monitoring wells in an aquifer above the CO2 sequestration unit in order to evaluate the efficacy of monitoring wells to detect adverse leakage.

Rechard, Robert Paul; McKenna, Sean Andrew; Borns, David James

2010-12-01T23:59:59.000Z

246

UC DAVIS PHYSICAL DESIGN FRAMEWORK PHYSICAL DESIGN FRAMEWORK  

E-Print Network [OSTI]

Campus Framework Strengthen the civic core 3.1 Amplify the bus/bike boulevard 3.2 Connect to the arboretum 3.3 Create identity for district centers 3.4 Connect campus entries to the greater community 3.5 4.2 Appendices 1 West Village Neighborhood Master Plan www.ormp.ucdavis.edu/environreview/lrdp.html#NMP 2 Bike

California at Davis, University of

247

Review of July 2013 Nuclear Security Insider Threat Exercise November 2013  

SciTech Connect (OSTI)

This document is a review of the Nuclear Security Insider Threat Exercise which was hosted at ORNL in July 2013. Nuclear security culture and the insider threat are best learned through experience. Culture is inherently difficult to teach, and as such is best learned through modeled behaviors and learning exercise. This TTX, NSITE, is a tool that strives to aid students in learning what an effective (and ineffective) nuclear security culture might look like by simulating dynamic events that strengthen or weaken the nuclear security regime. The goals of NSITE are to stimulate complex thought and discussion and assist decision makers and management in determining the most effective policies and procedures for their country or facility.

Pederson, Ann C. [ORNL] [ORNL; Snow, Catherine L. [ORNL] [ORNL; Townsend, Jeremy [ORNL] [ORNL; Shannon, Michael [ORNL] [ORNL

2013-11-01T23:59:59.000Z

248

Development of a Monitoring Framework for the Detection of Diversion of Intermediate Products in a Generic Natural Uranium Conversion Plant.  

E-Print Network [OSTI]

??The objective of this work is the development of an on-line monitoring and data analysis framework that could detect the diversion of intermediate products such… (more)

Ladd-Lively, Jennifer L.

2013-01-01T23:59:59.000Z

249

Developing a Regional Recovery Framework  

SciTech Connect (OSTI)

Abstract A biological attack would present an unprecedented challenge for local, state, and federal agencies; the military; the private sector; and individuals on many fronts ranging from vaccination and treatment to prioritization of cleanup actions to waste disposal. To prepare the Seattle region to recover from a biological attack, the Seattle Urban Area Security Initiative (UASI) partners collaborated with military and federal agencies to develop a Regional Recovery Framework for a Biological Attack in the Seattle Urban Area. The goal was to reduce the time and resources required to recover and restore wide urban areas, military installations, and other critical infrastructure following a biological incident by providing a coordinated systems approach. Based on discussions in small workshops, tabletop exercises, and interviews with emergency response agency staff, the partners identified concepts of operation for various areas to address critical issues the region will face as recovery progresses. Key to this recovery is the recovery of the economy. Although the Framework is specific to a catastrophic, wide-area biological attack using anthrax, it was designed to be flexible and scalable so it could also serve as the recovery framework for an all-hazards approach. The Framework also served to coalesce policy questions that must be addressed for long-term recovery. These questions cover such areas as safety and health, security, financial management, waste management, legal issues, and economic development.

Lesperance, Ann M.; Olson, Jarrod; Stein, Steven L.; Clark, Rebecca; Kelly, Heather; Sheline, Jim; Tietje, Grant; Williamson, Mark; Woodcock, Jody

2011-09-01T23:59:59.000Z

250

UTS Policy Framework: Introduction 11.  

E-Print Network [OSTI]

UTS Policy Framework: user guide Contents Introduction 11. TheroleofpolicywithintheUniversity 12 Policytemplate 64kbWord Directivetemplate 64kbWord Coversheets Coversheet--policies 48kbWord Coversheet--academicpolicies 48kbWord Coversheet--directives 48kbWord Policy Tools PolicyTool1:IssuesLog 60kbWord PolicyTool2

University of Technology, Sydney

251

Anti-Chinese Sentiment in Russia: Threats of "Chinese Invasion" or Fears of Russian Xenophobia  

E-Print Network [OSTI]

Ruoxi Du Laird Essay Competition 2012 Anti-Chinese Sentiment in Russia: Threats of “Chinese Invasion” or Fears of Russian Xenophobia Try googling the keywords “Russian Far East” and “China” (“Dal’nii vostok” and “Kitai”), and you... East” (Express Gazeta). Results from English sources are similar, where typical titles include “China Looms over the Russian Far East” (The Diplomat) and “Russia’s Far East Turning Chinese” (ABC News). Indeed, Russia has all kinds of reasons...

Du, Ruoxi

2014-08-25T23:59:59.000Z

252

Worldwide threat assessment brief to the Senate Select Committee on intelligence statement for the record  

SciTech Connect (OSTI)

This report outlines the threats to the United States and its interests now and into the next century. We still call this the post-Cold War world. Among the opportunities and challenges of our time, there is not yet one dominant enough to define the era on its own terms and give it a name. Looking beyond our borders, we see much that is uncertain: The stability of many regions of the world is threatened by ethnic turmoil and humanitarian crises. Two great powers, Russia and China, are in the process of metamorphosis and their final shape is still very much in question.-Free nations of the world are threatened by rogue nations - - Iran, Iraq, North Korea, and Libya, that have built up significant military forces and seek to acquire weapons of mass destruction. The world community is under assault from those who deal in proliferation of weapons of mass destruction, terrorism, drugs and crime. And the interdependence of the world economy has made us more vulnerable to economic shocks beyond our borders. The strategic threat to our continent is reduced, but the potential for surprise is greater than it was in the days when we could focus our energies on the well-recognized instruments of Soviet power. No one challenge today is yet as formidable as the threat from the former Soviet Union. If nurtured by neglect on our part, these new challenges could expand to threaten the growth of democracy and free markets. All the tools of national security -- diplomacy, the military, and intelligence -- must remain sharp. It is the task of the Intelligence Community to provide policymakers and military commanders with early warning of emerging problems -- warning that can allow us to avoid crisis or military conflict. We must continuously monitor and assess the threats so that our leaders can manage these wisely.

Deutch, J.

1996-02-22T23:59:59.000Z

253

A Statistical Model for Generating a Population of Unclassified Objects and Radiation Signatures Spanning Nuclear Threats  

SciTech Connect (OSTI)

This report describes an approach for generating a simulated population of plausible nuclear threat radiation signatures spanning a range of variability that could be encountered by radiation detection systems. In this approach, we develop a statistical model for generating random instances of smuggled nuclear material. The model is based on physics principles and bounding cases rather than on intelligence information or actual threat device designs. For this initial stage of work, we focus on random models using fissile material and do not address scenarios using non-fissile materials. The model has several uses. It may be used as a component in a radiation detection system performance simulation to generate threat samples for injection studies. It may also be used to generate a threat population to be used for training classification algorithms. In addition, we intend to use this model to generate an unclassified 'benchmark' threat population that can be openly shared with other organizations, including vendors, for use in radiation detection systems performance studies and algorithm development and evaluation activities. We assume that a quantity of fissile material is being smuggled into the country for final assembly and that shielding may have been placed around the fissile material. In terms of radiation signature, a nuclear weapon is basically a quantity of fissile material surrounded by various layers of shielding. Thus, our model of smuggled material is expected to span the space of potential nuclear weapon signatures as well. For computational efficiency, we use a generic 1-dimensional spherical model consisting of a fissile material core surrounded by various layers of shielding. The shielding layers and their configuration are defined such that the model can represent the potential range of attenuation and scattering that might occur. The materials in each layer and the associated parameters are selected from probability distributions that span the range of possibilities. Once an object is generated, its radiation signature is calculated using a 1-dimensional deterministic transport code. Objects that do not make sense based on physics principles or other constraints are rejected. Thus, the model can be used to generate a population of spectral signatures that spans a large space, including smuggled nuclear material and nuclear weapons.

Nelson, K; Sokkappa, P

2008-10-29T23:59:59.000Z

254

Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs  

E-Print Network [OSTI]

Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

Noel, Steven

255

SDS: A Framework for Scientific Data Services  

SciTech Connect (OSTI)

Large-scale scientific applications typically write their data to parallel file systems with organizations designed to achieve fast write speeds. Analysis tasks frequently read the data in a pattern that is different from the write pattern, and therefore experience poor I/O performance. In this paper, we introduce a prototype framework for bridging the performance gap between write and read stages of data access from parallel file systems. We call this framework Scientific Data Services, or SDS for short. This initial implementation of SDS focuses on reorganizing previously written files into data layouts that benefit read patterns, and transparently directs read calls to the reorganized data. SDS follows a client-server architecture. The SDS Server manages partial or full replicas of reorganized datasets and serves SDS Clients' requests for data. The current version of the SDS client library supports HDF5 programming interface for reading data. The client library intercepts HDF5 calls and transparently redirects them to the reorganized data. The SDS client library also provides a querying interface for reading part of the data based on user-specified selective criteria. We describe the design and implementation of the SDS client-server architecture, and evaluate the response time of the SDS Server and the performance benefits of SDS.

Dong, Bin; Byna, Surendra; Wu, Kesheng

2013-10-31T23:59:59.000Z

256

Framework for SCADA Security Policy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-UpHeatMulti-Dimensional Electrical Resistivity Structure | Department ofFramework for

257

A game theory framework for cooperative management of refillable and disposable bottle lifecycles  

E-Print Network [OSTI]

A game theory framework for cooperative management of refillable and disposable bottle lifecycles applies game theory to the lifecycle of bottle packaging, and presents a framework for analysis. Keywords: Lifecycle management; Reuse; Packaging; Industrial ecology 1. Introduction One of the fundamental

Illinois at Chicago, University of

258

A Topological Framework for the Interactive Exploration of Large Scale Turbulent Combustion  

E-Print Network [OSTI]

A Topological Framework for the Interactive Exploration of Large Scale Turbulent Combustion Peer a new topological framework for the analysis of large scale, time-varying, turbulent combustion consumption thresh- olds for an entire time-dependent combustion simulation. By computing augmented merge

Knowles, David William

259

Feature identification framework and applications (FIFA)  

E-Print Network [OSTI]

collections that provides a general framework for applications while allowing decisions about the details of document representation and features identification to be deferred to domain specific implementations of that framework. These deferred decisions...

Audenaert, Michael Neal

2006-04-12T23:59:59.000Z

260

Gas adsorption on metal-organic frameworks  

DOE Patents [OSTI]

The present invention involves the use of certain metal organic frameworks that have been treated with water or another metal titrant in the storage of carbon dioxide. The capacity of these frameworks is significantly increased through this treatment.

Willis, Richard R. (Cary, IL); Low, John J. (Schaumburg, IL), Faheem, Syed A. (Huntley, IL); Benin, Annabelle I. (Oak Forest, IL); Snurr, Randall Q. (Evanston, IL); Yazaydin, Ahmet Ozgur (Evanston, IL)

2012-07-24T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Technology Enhanced Interaction Framework Kewalin Angkananon  

E-Print Network [OSTI]

Technology Enhanced Interaction Framework Kewalin Angkananon ECS University of Southampton interaction framework to help design technology to support communication between people and improve interactions between people, technology and objects, particularly in complex situations. A review of existing

262

Student attitudes toward the threat of nuclear war: Friends as influential reference persons  

SciTech Connect (OSTI)

A renewed interest in research into the psychology of the threat of nuclear war occurred in the past decade as national attention focused increasingly on the arms race between the US and the USSR. Some of this research began the task of exploring the social influences upon attitudes and responses to the nuclear threat. Research on friends as potential influences upon nuclear attitudes was minimal. The present study investigated the role of college friends as potential reference persons in the formation of nuclear attitudes. A battery of questionnaires addressing various nuclear war and non-nuclear war attitudes was completed by 200 student-friend dyads from introductory psychology and sociology courses at the University of North Dakota. Three hypotheses were presented in this study. One hypothesis was that students would perceive their friends as having similar attitudes toward the threat of nuclear war. A second hypothesis was that the actual attitudes between pairs of students and friends would be similar. The third hypothesis was that the attitudes would have become more similar over the course of the development of the friendship (as measured retrospectively). The first hypothesis was borne out by the data. The second and third hypotheses were not supported. There are several implications of the findings. One implication is that the nuclear issue may not be as salient to college students as other, more immediate, issues. Another implication is that a relative lack of communication between college students on political issues precludes more effective mutual influence upon the development and change of such attitudes. A false consensus bias appeared to be operative when the students perceived that their attitudes were similar. Further discussion is presented in regard to past and future psychological research upon nuclear war attitudes.

Marasch, M.J.

1992-01-01T23:59:59.000Z

263

The Global Threat Reduction Initiative's Orphan Source Recovery Project in the Russian Federation  

SciTech Connect (OSTI)

After 9/11, officials at the United States Department of Energy (DOE), National Nuclear Security Administration (NNSA) grew more concerned about radiological materials that were vulnerable to theft and illicit use around the world. The concern was that terrorists could combine stolen radiological materials with explosives to build and detonate a radiological dispersal device (RDD), more commonly known as a “dirty bomb.” In response to this and other terrorist threats, the DOE/NNSA formed what is now known as the Global Threat Reduction Initiative (GTRI) to consolidate and accelerate efforts to reduce and protect vulnerable nuclear and radiological materials located at civilian sites worldwide. Although a cooperative program was already underway in the Russian Federation to secure nuclear materials at a range of different facilities, thousands of sealed radioactive sources remained vulnerable at medical, research, and industrial sites. In response, GTRI began to focus efforts on addressing these materials. GTRI’s Russia Orphan Source Recovery Project, managed at the Nevada National Security Site’s North Las Vegas facility, was initiated in 2002. Throughout the life of the project, Joint Stock Company “Isotope” has served as the primary Russian subcontractor, and the organization has proven to be a successful partner. Since the first orphan source recovery of an industrial cobalt-60 irradiator with 647 curies (Ci) at an abandoned facility in Moscow in 2003, the GTRI Orphan Source Recovery Project in the Russian Federation has accomplished substantial levels of threat reduction. To date, GTRI has recovered and securely disposed of more than 5,100 sources totaling more that 628,000 Ci. This project serves as an extraordinary example of how international cooperation can be implemented by partners with mutual interests to achieve significant goals.

Russell, J. W. [NSTec; Ahumada, A. D. [NSTec; Blanchard, T. A. [NNSA

2012-06-04T23:59:59.000Z

264

Framework for Improving Critical Infrastructure Cybersecurity  

E-Print Network [OSTI]

Framework for Improving Critical Infrastructure Cybersecurity Version 1.0 National Institute of Standards and Technology February 12, 2014 #12;February 12, 2014 Cybersecurity Framework Version 1.0 Table............................................................................................................. 20 ii #12;February 12, 2014 Cybersecurity Framework Version 1.0 Executive Summary The national

265

Radioactive Threat Detection with Scattering Physics: A Model-Based Application  

SciTech Connect (OSTI)

The detection of radioactive contraband is a critical problem in maintaining national security for any country. Emissions from threat materials challenge both detection and measurement technologies especially when concealed by various types of shielding complicating the transport physics significantly. The development of a model-based sequential Bayesian processor that captures both the underlying transport physics including scattering offers a physics-based approach to attack this challenging problem. It is shown that this processor can be used to develop an effective detection technique.

Candy, J V; Chambers, D H; Breitfeller, E F; Guidry, B L; Verbeke, J M; Axelrod, M A; Sale, K E; Meyer, A M

2010-01-21T23:59:59.000Z

266

GLOBAL THREAT REDUCTION INITIATIVE REACTOR CONVERSION PROGRAM: STATUS AND CURRENT PLANS  

SciTech Connect (OSTI)

The U.S. Department of Energy’s National Nuclear Security Administration (NNSA) Reactor Conversion Program supports the minimization, and to the extent possible, elimination of the use of high enriched uranium (HEU) in civilian nuclear applications by working to convert research and test reactors and radioisotope production processes to the use of low enriched uranium (LEU). The Reactor Conversion Program is a technical pillar of the NNSA Global Threat Reduction Initiative (GTRI) which is a key organization for implementing U.S. HEU minimization policy and works to reduce and protect vulnerable nuclear and radiological material domestically and abroad.

Staples, Parrish A.; Leach, Wayne; Lacey, Jennifer M.

2009-10-07T23:59:59.000Z

267

Failure Impact Analysis of Key Management in AMI Using Cybernomic Situational Assessment (CSA)  

SciTech Connect (OSTI)

In earlier work, we presented a computational framework for quantifying the security of a system in terms of the average loss a stakeholder stands to sustain as a result of threats to the system. We named this system, the Cyberspace Security Econometrics System (CSES). In this paper, we refine the framework and apply it to cryptographic key management within the Advanced Metering Infrastructure (AMI) as an example. The stakeholders, requirements, components, and threats are determined. We then populate the matrices with justified values by addressing the AMI at a higher level, rather than trying to consider every piece of hardware and software involved. We accomplish this task by leveraging the recently established NISTR 7628 guideline for smart grid security. This allowed us to choose the stakeholders, requirements, components, and threats realistically. We reviewed the literature and selected an industry technical working group to select three representative threats from a collection of 29 threats. From this subset, we populate the stakes, dependency, and impact matrices, and the threat vector with realistic numbers. Each Stakeholder s Mean Failure Cost is then computed.

Abercrombie, Robert K [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Hauser, Katie R [ORNL] [ORNL; Lantz, Margaret W [ORNL] [ORNL; Mili, Ali [New Jersey Insitute of Technology] [New Jersey Insitute of Technology

2013-01-01T23:59:59.000Z

268

A framework for the architecting of aerospace systems portfolios with commonality  

E-Print Network [OSTI]

(cont.) The framework was applied to three case studies: commonality analysis for a portfolio of future and legacy exploration life support systems, for the historical Saturn launch vehicle portfolio, and for a portfolio ...

Hofstetter, Wilfried Konstantin

2009-01-01T23:59:59.000Z

269

Synthesis and Properties of Nano Zeolitic Imidazolate Frameworks...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Properties of Nano Zeolitic Imidazolate Frameworks. Synthesis and Properties of Nano Zeolitic Imidazolate Frameworks. Abstract: Nano sized zeolitic imidazolate frameworks nZIF-8...

270

A framework for benchmarking land models  

SciTech Connect (OSTI)

Land models, which have been developed by the modeling community in the past few decades to predict future states of ecosystems and climate, have to be critically evaluated for their performance skills of simulating ecosystem responses and feedback to climate change. Benchmarking is an emerging procedure to measure performance of models against a set of defined standards. This paper proposes a benchmarking framework for evaluation of land model performances and, meanwhile, highlights major challenges at this infant stage of benchmark analysis. The framework includes (1) targeted aspects of model performance to be evaluated, (2) a set of benchmarks as defined references to test model performance, (3) metrics to measure and compare performance skills among models so as to identify model strengths and deficiencies, and (4) model improvement. Land models are required to simulate exchange of water, energy, carbon and sometimes other trace gases between the atmosphere and land surface, and should be evaluated for their simulations of biophysical processes, biogeochemical cycles, and vegetation dynamics in response to climate change across broad temporal and spatial scales. Thus, one major challenge is to select and define a limited number of benchmarks to effectively evaluate land model performance. The second challenge is to develop metrics of measuring mismatches between models and benchmarks. The metrics may include (1) a priori thresholds of acceptable model performance and (2) a scoring system to combine data–model mismatches for various processes at different temporal and spatial scales. The benchmark analyses should identify clues of weak model performance to guide future development, thus enabling improved predictions of future states of ecosystems and climate. The near-future research effort should be on development of a set of widely acceptable benchmarks that can be used to objectively, effectively, and reliably evaluate fundamental properties of land models to improve their prediction performance skills.

Luo, Yiqi; Randerson, J.; Abramowitz, G.; Bacour, C.; Blyth, E.; Carvalhais, N.; Ciais, Philippe; Dalmonech, D.; Fisher, J.B.; Fisher, R.; Friedlingstein, P.; Hibbard, Kathleen A.; Hoffman, F. M.; Huntzinger, Deborah; Jones, C.; Koven, C.; Lawrence, David M.; Li, D.J.; Mahecha, M.; Niu, S.L.; Norby, Richard J.; Piao, S.L.; Qi, X.; Peylin, P.; Prentice, I.C.; Riley, William; Reichstein, M.; Schwalm, C.; Wang, Y.; Xia, J. Y.; Zaehle, S.; Zhou, X. H.

2012-10-09T23:59:59.000Z

271

Demand Response Valuation Frameworks Paper  

E-Print Network [OSTI]

24 3.5. Avoided Costeconomic analysis of DR. Avoided cost approaches are simplecase include not only avoided costs of supply but also the

Heffner, Grayson

2010-01-01T23:59:59.000Z

272

A Framework for Comparative Assessments of Energy Efficiency Policy Measures  

SciTech Connect (OSTI)

When policy makers propose new policies, there is a need to assess the costs and benefits of the proposed policy measures, to compare them to existing and alternative policies, and to rank them according to their effectiveness. In the case of equipment energy efficiency regulations, comparing the effects of a range of alternative policy measures requires evaluating their effects on consumers’ budgets, on national energy consumption and economics, and on the environment. Such an approach should be able to represent in a single framework the particularities of each policy measure and provide comparable results. This report presents an integrated methodological framework to assess prospectively the energy, economic, and environmental impacts of energy efficiency policy measures. The framework builds on the premise that the comparative assessment of energy efficiency policy measures should (a) rely on a common set of primary data and parameters, (b) follow a single functional approach to estimate the energy, economic, and emissions savings resulting from each assessed measure, and (c) present results through a set of comparable indicators. This framework elaborates on models that the U.S. Department of Energy (DOE) has used in support of its rulemakings on mandatory energy efficiency standards. In addition to a rigorous analysis of the impacts of mandatory standards, DOE compares the projected results of alternative policy measures to those projected to be achieved by the standards. The framework extends such an approach to provide a broad, generic methodology, with no geographic or sectoral limitations, that is useful for evaluating any type of equipment energy efficiency market intervention. The report concludes with a demonstration of how to use the framework to compare the impacts estimated for twelve policy measures focusing on increasing the energy efficiency of gas furnaces in the United States.

Blum, Helcio; Atkinson, Barbara; Lekov, Alex

2011-05-24T23:59:59.000Z

273

ITL BULLETIN FOR NOVEMBER 2013 ITL RELEASES PRELIMINARY CYBERSECURITY FRAMEWORK  

E-Print Network [OSTI]

ITL BULLETIN FOR NOVEMBER 2013 ITL RELEASES PRELIMINARY CYBERSECURITY FRAMEWORK The Information a Preliminary Cybersecurity Framework for public review and comment. ITL developed the framework based is developing the framework under Executive Order 13636, Improving Critical Infrastructure Cybersecurity, which

274

Developpement WebFrameworks AJAX Developpement Web  

E-Print Network [OSTI]

D´eveloppement WebFrameworks AJAX D´eveloppement Web Frameworks AJAX Jean-Michel Richer jean-michel.richer@univ-angers.fr http://www.info.univ-angers.fr/pub/richer 2009 1 / 27 #12;D´eveloppement WebFrameworks AJAX Objectif d´eveloppement Web et augmenter l'interactivit´e avec l'utilisateur 2 / 27 #12;D´eveloppement Web

Richer, Jean-Michel

275

Workers of the World, Unite! Franchise Extensions and the Threat of Revolution in Europe, 1820-1938  

E-Print Network [OSTI]

of the threat level is therefore unlikely to be correlated with other (observed and unobserved) determinants of su¤rage reform ?such as political rivalry between factions within the national elites or general enlightenment trends ?originating within that country... are also unrelated to the threat of revolution. However, we are able to control for each of these in the estimations and so, they are less likely to show up in the error term. 22Although it is possible that some domestic political factions would have...

Aidt, Toke S.

2011-01-26T23:59:59.000Z

276

A Conceptual Framework for Progressing Towards Sustainability...  

Open Energy Info (EERE)

Progressing Towards Sustainability in the Agriculture and Food Sector Jump to: navigation, search Tool Summary LAUNCH TOOL Name: A Conceptual Framework for Progressing Towards...

277

Appropriate use of Green Manufacturing Frameworks  

E-Print Network [OSTI]

for Implementing Green Manufacturing,” Trans. North AmericanAppropriate use of Green Manufacturing Frameworks C. Reich-for sustainable or green manufacturing systems and products,

Reich-Weiser, Corinne; Vijayaraghavan, Athulan; Dornfeld, David

2010-01-01T23:59:59.000Z

278

Draft Energy Sector Cybersecurity Framework Implementation Guidance...  

Broader source: Energy.gov (indexed) [DOE]

and Technology (NIST) released a Cybersecurity Framework. DOE has collaborated with private sector stakeholders through the Electricity Subsector Coordinating Council (ESCC)...

279

A Surrogate Management Framework Using Rigorous Trust ...  

E-Print Network [OSTI]

Mar 24, 2011 ... gate management frameworks, both in algorithmic design and in the ... Part of this work was developed while this author was visiting.

2011-03-24T23:59:59.000Z

280

Gas sensor incorporating a porous framework  

DOE Patents [OSTI]

The disclosure provides sensor for gas sensing including CO.sub.2 gas sensors comprising a porous framework sensing area for binding an analyte gas.

Yaghi, Omar M; Czaja, Alexander U; Wang, Bo; Galatsis, Kosmas; Wang, Kang L; Furukawa, Hiroyasu

2014-05-27T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Preparation of metal-catecholate frameworks  

SciTech Connect (OSTI)

The disclosure provides for metal catecholate frameworks, and methods of use thereof, including gas separation, gas storage, catalysis, tunable conductors, supercapacitors, and sensors.

Yaghi, Omar M.; Gandara-Barragan, Felipe; Lu, Zheng; Wan, Shun

2014-06-03T23:59:59.000Z

282

Gas sensor incorporating a porous framework  

SciTech Connect (OSTI)

The disclosure provides sensor for gas sensing including CO.sub.2 gas sensors comprising a porous framework sensing area for binding an analyte gas.

Yaghi, Omar M.; Czaja, Alexander U.; Wang, Bo; Furukawa, Hiroyasu; Galatsis, Kosmas; Wang, Kang L.

2013-07-09T23:59:59.000Z

283

Bioenergy Knowledge Discovery Framework Recognized at National...  

Energy Savers [EERE]

Knowledge Discovery Framework (KDF) is bringing together the bioenergy community through Web-based tools, and was presented by Bioenergy KDF team members from Oak Ridge National...

284

Energy Sector Cybersecurity Framework Implementation Guidance  

Broader source: Energy.gov (indexed) [DOE]

JANUARY 2015 ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE U.S. DEPARTMENT OF ENERGY OFFICE OF ELECTRICITY DELIVERY AND ENERGY RELIABILITY Energy Sector...

285

Energy Sector Cybersecurity Framework Implementation Guidance...  

Broader source: Energy.gov (indexed) [DOE]

Technology (NIST) released a Cybersecurity Framework. DOE has collaborated with private sector stakeholders through the Electricity Subsector Coordinating Council (ESCC) and the...

286

The Offline Software Framework of the Pierre Auger Observatory  

E-Print Network [OSTI]

The Pierre Auger Observatory is designed to unveil the nature and the origins of the highest energy cosmic rays. The large and geographically dispersed collaboration of physicists and the wide-ranging collection of simulation and reconstruction tasks pose some special challenges for the offline analysis software. We have designed and implemented a general purpose framework which allows collaborators to contribute algorithms and sequencing instructions to build up the variety of applications they require. The framework includes machinery to manage these user codes, to organize the abundance of user-contributed configuration files, to facilitate multi-format file handling, and to provide access to event and time-dependent detector information which can reside in various data sources. A number of utilities are also provided, including a novel geometry package which allows manipulation of abstract geometrical objects independent of coordinate system choice. The framework is implemented in C++, and takes advantage of object oriented design and common open source tools, while keeping the user side simple enough for C++ novices to learn in a reasonable time. The distribution system incorporates unit and acceptance testing in order to support rapid development of both the core framework and contributed user code.

S. Argiro; S. L. C. Barroso; J. Gonzalez; L. Nellen; T. Paul; T. A. Porter; L. Prado Jr.; M. Roth; R. Ulrich; D. Veberic

2007-07-11T23:59:59.000Z

287

The Offline Software Framework of the Pierre Auger Observatory  

E-Print Network [OSTI]

The Pierre Auger Observatory is designed to unveil the nature and the origins of the highest energy cosmic rays. The large and geographically dispersed collaboration of physicists and the wide-ranging collection of simulation and reconstruction tasks pose some special challenges for the offline analysis software. We have designed and implemented a general purpose framework which allows collaborators to contribute algorithms and sequencing instructions to build up the variety of applications they require. The framework includes machinery to manage these user codes, to organize the abundance of user-contributed configuration files, to facilitate multi-format file handling, and to provide access to event and time-dependent detector information which can reside in various data sources. A number of utilities are also provided, including a novel geometry package which allows manipulation of abstract geometrical objects independent of coordinate system choice. The framework is implemented in C++, and takes advantage of object oriented design and common open source tools, while keeping the user side simple enough for C++ novices to learn in a reasonable time. The distribution system incorporates unit and acceptance testing in order to support rapid development of both the core framework and contributed user code.

S. Argiro; S. L. C Barroso; J. Gonzalez; L. Nellen; T. Paul; T. A. Porter; L. Prado Jr.; M. Roth; R. Ulrich; D. Veberic

2006-01-01T23:59:59.000Z

288

Low-Altitude Airbursts and the Impact Threat - Final LDRD Report.  

SciTech Connect (OSTI)

The purpose of this nine-week project was to advance the understanding of low-altitude airbursts by developing the means to model them at extremely high resolution in order to span the scales of entry physics as well as blast wave and plume formation. Small asteroid impacts on Earth are a recognized hazard, but the full nature of the threat is still not well understood. We used shock physics codes to discover emergent phenomena associated with low-altitude airbursts such as the Siberian Tunguska event of 1908 and the Egyptian glass-forming event 29 million years ago. The planetary defense community is beginning to recognize the significant threat from such airbursts. Low-altitude airbursts are the only class of impacts that have a significant probability of occurring within a planning time horizon. There is roughly a 10% chance of a megaton-scale low-altitude airburst event in the next decade.The first part of this LDRD final project report is a preprint of our proceedings paper associated with the plenary presentation at the Hypervelocity Impact Society 2007 Symposium in Williamsburg, Virginia (International Journal of Impact Engineering, in press). The paper summarizes discoveries associated with a series of 2D axially-symmetric CTH simulations. The second part of the report contains slides from an invited presentation at the American Geophysical Union Fall 2007 meeting in San Francisco. The presentation summarizes the results of a series of 3D oblique impact simulations of the 1908 Tunguska explosion. Because of the brevity of this late-start project, the 3D results have not yet been written up for a peer-reviewed publication. We anticipate the opportunity to eventually run simulations that include the actual topography at Tunguska, at which time these results will be published.3

Boslough, Mark B.; Crawford, David A.

2007-12-01T23:59:59.000Z

289

Demand Response Valuation Frameworks Paper  

SciTech Connect (OSTI)

While there is general agreement that demand response (DR) is a valued component in a utility resource plan, there is a lack of consensus regarding how to value DR. Establishing the value of DR is a prerequisite to determining how much and what types of DR should be implemented, to which customers DR should be targeted, and a key determinant that drives the development of economically viable DR consumer technology. Most approaches for quantifying the value of DR focus on changes in utility system revenue requirements based on resource plans with and without DR. This ''utility centric'' approach does not assign any value to DR impacts that lower energy and capacity prices, improve reliability, lower system and network operating costs, produce better air quality, and provide improved customer choice and control. Proper valuation of these benefits requires a different basis for monetization. The review concludes that no single methodology today adequately captures the wide range of benefits and value potentially attributed to DR. To provide a more comprehensive valuation approach, current methods such as the Standard Practice Method (SPM) will most likely have to be supplemented with one or more alternative benefit-valuation approaches. This report provides an updated perspective on the DR valuation framework. It includes an introduction and four chapters that address the key elements of demand response valuation, a comprehensive literature review, and specific research recommendations.

Heffner, Grayson

2009-02-01T23:59:59.000Z

290

Mining Survey Data for SWOT analysis Boonyarat Phadermrod  

E-Print Network [OSTI]

. IPA-based SWOT analysis Steps for conducting IPA AUTHOR INTRODUCTION Strengths, Weaknesses of information hence an efficient way to conduct SWOT analysis is required. REFERENCES The IPA-based analysis company's IPA matrix, whereas opportunities and threats are defined through the competitor's IPA matrix

Southampton, University of

291

Cellular Energy Efficiency Evaluation Framework (Invited Paper)  

E-Print Network [OSTI]

Cellular Energy Efficiency Evaluation Framework (Invited Paper) Gunther Auer, Vito Giannini, Istv, the power consumption of the entire system needs to be captured and an appropriate energy efficiency evaluation frameworks are discussed, such that the energy efficiency of the entire network comprising

Stevenson, Paul

292

A FRAMEWORK FOR MEASURING SUPERCOMPUTER PRODUCTIVITY1  

E-Print Network [OSTI]

A FRAMEWORK FOR MEASURING SUPERCOMPUTER PRODUCTIVITY1 10/30/2003 Marc Snir2 and David A. Bader3 Abstract We propose a framework for measuring the productivity of High Performance Computing (HPC) systems, based on common economic definitions of productivity and on Utility Theory. We discuss how

Bader, David A.

293

UNITED NATIONS FRAMEWORK CONVENTION ON CLIMATE CHANGE  

E-Print Network [OSTI]

UNITED NATIONS FRAMEWORK CONVENTION ON CLIMATE CHANGE UNITED NATIONS 1992 FCCC/INFORMAL/84 GE.05-62220 (E) 200705 #12;UNITED NATIONS FRAMEWORK CONVENTION ON CLIMATE CHANGE The Parties to this Convention in predictions of climate change, particularly with regard to the timing, magnitude and regional patterns thereof

Laughlin, Robert B.

294

Bibliography on Logical Frameworks Frank Pfenning  

E-Print Network [OSTI]

is a formal meta-language for deductive systems. The pri* *mary tasks sup- ported in logical frameworks, New Jersey, Jul* *y 1996. IEEE Computer Society Press. [7]Penny Anderson. Program Derivation as Technical Report CMU-CS-93-206. [8]Penny Anderson. Program extraction in a logical framework setting

Pfenning, Frank

295

Search: Search Home Top News Science Business Entertainment Sports Health Quirks Newspictures Emerging Threats Energy Resources Security Industry  

E-Print Network [OSTI]

engineers at Northrop Grumman Electronics Systems in Linthicum, Md. The research, funded by the National Newspictures Emerging Threats Energy Resources Security Industry Stories Search: » Search Sponsored Links: Auto of the National Academy of Sciences and is to appear in that journal's early online edition next week. Print story

Rogers, John A.

296

RLJ/STAT/UPDATE 1-18-11 1 Situation Threat Assessment Policy and Protocol (Update 1/18/11)  

E-Print Network [OSTI]

third parties, or expressed in private writings. Possession of any item used as a weapon, will be considered a statement of intent. The Situation Threat Assessment Team will recommend actions to the Vice authorities. #12;RLJ/STAT/UPDATE 1-18-11 2 · Investigate the incident(s) and recommend appropriate actions

Rusu, Adrian

297

Modest carbon price could save Borneo forests: study Reuters, 4 June 2009 -Tropical forests in Borneo under threat of conversion to palm oil  

E-Print Network [OSTI]

in Borneo under threat of conversion to palm oil plantations could be more profitable left standing threat of being converted to oil palm plantations. "They are not meant to be clearing forest for palm oil development. It's pretty clear that forests are being felled for oil palm," said Venter, a conservation

298

A Fresh Perspective for Managing Water in California: Insights from Applying the European Water Framework Directive to the Russian River  

E-Print Network [OSTI]

during a period of water shortage, prior right holders wouldreservoirs, the threat of water shortage remains a centralreservoirs, the threat of water shortage remains a central

Grantham, Ted; Christian-Smith, Juliet; Kondolf, G. Mathias; Scheuer, Stefan

2008-01-01T23:59:59.000Z

299

An expert system framework for nondestructive waste assay  

SciTech Connect (OSTI)

Management and disposition of transuranic (RU) waste forms necessitates determining entrained RU and associated radioactive material quantities as per National RU Waste Characterization Program requirements. Technical justification and demonstration of a given NDA method used to determine RU mass and uncertainty in accordance with program quality assurance is difficult for many waste forms. Difficulties are typically founded in waste NDA methods that employ standards compensation and/or employment of simplifying assumptions on waste form configurations. Capability to determine and justify RU mass and mass uncertainty can be enhanced through integration of waste container data/information using expert system and empirical data-driven techniques with conventional data acquisition and analysis. Presented is a preliminary expert system framework that integrates the waste form data base, alogrithmic techniques, statistical analyses, expert domain knowledge bases, and empirical artificial intelligence modules into a cohesive system. The framework design and bases in addition to module development activities are discussed.

Becker, G.K.

1996-10-01T23:59:59.000Z

300

International Experiences and Frameworks to Support Country-Driven Low-Emissions Development  

SciTech Connect (OSTI)

Countries can use low-emission development strategies (LEDS) to advance sustainable development, promote private-sector growth, and reduce greenhouse gas emissions. This paper proposes a framework -- or support infrastructure -- to enable the efficient exchange of LEDS-related knowledge and technical assistance. Under the proposed framework, countries share LEDS-related resources via coordinating forums, 'knowledge platforms,' and networks of experts and investors. The virtual 'knowledge platforms' foster learning by allowing countries to communicate with each other and share technical reports, data, and analysis tools in support of LEDS development. Investing in all elements of the framework in an integrated fashion increases the efficacy of support for country-driven LEDS.

Benioff, R.; Cochran, J.; Cox, S.

2012-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Reliability Modeling of Cyber-Physical Electric Power Systems: A System-Theoretic Framework  

E-Print Network [OSTI]

1 Reliability Modeling of Cyber-Physical Electric Power Systems: A System-Theoretic Framework systematic reliability analysis tools to address planning and operation challenges of future electric power and the introduction of new sources of uncertainty in systems already inherently complex. Current reliability analysis

Liberzon, Daniel

302

iVIBRATE: Interactive Visualization Based Framework for Clustering Large Datasets (Version 3)  

E-Print Network [OSTI]

iVIBRATE: Interactive Visualization Based Framework for Clustering Large Datasets (Version 3) Keke and high-quality clustering of large datasets continues to be one of the most important problems in large- scale data analysis. A commonly used methodology for cluster analysis on large datasets is the three

Liu, Ling

303

STFC Economic Impact Reporting Framework 2009/10 Economic Impact  

E-Print Network [OSTI]

STFC Economic Impact Reporting Framework 2009/10 Economic Impact Reporting Framework 2009/10 #12;STFC Economic Impact Reporting Framework 2009/10 Economic Impact Reporting Framework 2009/10 #12;STFC Economic Impact Reporting Framework 2009/10 1 Contents: Introduction

304

Identifying at-risk employees: A behavioral model for predicting potential insider threats  

SciTech Connect (OSTI)

A psychosocial model was developed to assess an employee’s behavior associated with an increased risk of insider abuse. The model is based on case studies and research literature on factors/correlates associated with precursor behavioral manifestations of individuals committing insider crimes. In many of these crimes, managers and other coworkers observed that the offenders had exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers to using such psychosocial indicators include the inability to recognize the signs and the failure to record the behaviors so that they could be assessed by a person experienced in psychosocial evaluations. We have developed a model using a Bayesian belief network with the help of human resources staff, experienced in evaluating behaviors in staff. We conducted an experiment to assess its agreement with human resources and management professionals, with positive results. If implemented in an operational setting, the model would be part of a set of management tools for employee assessment that can raise an alarm about employees who pose higher insider threat risks. In separate work, we combine this psychosocial model’s assessment with computer workstation behavior to raise the efficacy of recognizing an insider crime in the making.

Greitzer, Frank L.; Kangas, Lars J.; Noonan, Christine F.; Dalton, Angela C.

2010-09-01T23:59:59.000Z

305

Achieving competitive excellence in nuclear energy: The threat of proliferation; the challenge of inertial confinement fusion  

SciTech Connect (OSTI)

Nuclear energy will have an expanding role in meeting the twenty-first-century challenges of population and economic growth, energy demand, and global warming. These great challenges are non-linearly coupled and incompletely understood. In the complex global system, achieving competitive excellence for nuclear energy is a multi-dimensional challenge. The growth of nuclear energy will be driven by its margin of economic advantage, as well as by threats to energy security and by growing evidence of global warming. At the same time, the deployment of nuclear energy will be inhibited by concerns about nuclear weapons proliferation, nuclear waste and nuclear reactor safety. These drivers and inhibitors are coupled: for example, in the foreseeable future, proliferation in the Middle East may undermine energy security and increase demand for nuclear energy. The Department of Energy`s nuclear weapons laboratories are addressing many of these challenges, including nuclear weapons builddown and nonproliferation, nuclear waste storage and burnup, reactor safety and fuel enrichment, global warming, and the long-range development of fusion energy. Today I will focus on two major program areas at the Lawrence Livermore National Laboratory (LLNL): the proliferation of nuclear weapons and the development of inertial confinement fusion (ICF) energy.

Nuckolls, J.H.

1994-06-01T23:59:59.000Z

306

Threat of a sinkhole: A reevaluation of Cavern 4, Bayou Choctaw salt dome, Louisiana  

SciTech Connect (OSTI)

Cavern Lake at Bayou Choctaw salt dome resulted from the failure of Cavern 7 in 1954. Uncontrolled solutioning of this cavern through the thin caprock had set the stage for overburden to collapse into the cavern below. A similar situation developed with nearby Cavern 4, but with less dissolutioning of the caprock. Because pressure loss was already a problem and because another 800 ft diameter lake would have endangered surface operations, solutioning of Cavern 4 was stopped and the cavern abandoned in 1957 in order to protect the already-small site. In 1978 the Strategic Petroleum Reserve (SPR) acquired a number of caverns at Bayou Choctaw, including Cavern 4, and the possible repeat of the Cavern 7 failure and formation of another lake thus became an issue. The cavern dimensions were re-sonared in 1980 for comparison with 1963 and 1977 surveys. Annual surface leveling between 1982--1992 showed less subsidence occurring than the site average, and a cavern monitoring system, installed in 1984, has revealed no anomalous motion. Repeat sonar surveys in 1992 showed very little, if any, change occurred since 1980 although a small amount of uncertainty exists as a result of changing sonar techniques. We conclude that significant additional solutioning or erosion of the caprock has not occurred and that there is no increased threat to SPR operations.

Neal, J.T.; Todd, J.L.; Linn, J.K. [Sandia National Labs., Albuquerque, NM (United States); Magorian, T.R. [Magorian (Thomas R.), Amherst, NY (United States)

1993-09-01T23:59:59.000Z

307

Constructibility review process framework for transportation facilities  

E-Print Network [OSTI]

Constructibility is the optimum use of construction knowledge and experience in planning, design, procurement, and field operations in order to achieve overall project objectives ("Constructibility: a primer" 1986). This Thesis presents a framework...

Liman, Majed

1995-01-01T23:59:59.000Z

308

Thiophene-based covalent organic frameworks  

E-Print Network [OSTI]

We report the synthesis and characterization of covalent organic frameworks (COFs) incorporating thiophene-based building blocks. We show that these are amenable to reticular synthesis, and that bent ditopic monomers, such ...

Bertrand, Guillaume

309

A modelling framework for Synthetic Biology  

E-Print Network [OSTI]

A modelling framework for Synthetic Biology Jakob Jakobsen Boysen Sune Mølgaard Laursen Kongens, 14-03-2014 Jakob Jakobsen Boysen & Sune Mølgaard Laursen #12;vi #12;Contents Summary (English) i

310

A flexible design framework for autonomous mowing  

E-Print Network [OSTI]

This work outlines the creation of a flexible design framework for autonomous mowing to meet changing customer needs and functionality across a spectrum of applications from residential areas to sport complexes. The thesis ...

Kraft, Justin (Justin A.)

2011-01-01T23:59:59.000Z

311

A global framework for scene gist  

E-Print Network [OSTI]

Human observers are able to rapidly and accurately categorize natural scenes, but the representation mediating this feat is still unknown. Here we propose a framework of rapid scene categorization that does not segment a ...

Greene, Michelle R

2009-01-01T23:59:59.000Z

312

STEP Utility Bill Analysis Report | Department of Energy  

Energy Savers [EERE]

STEP Utility Bill Analysis Report, from the Tool Kit Framework: Small Town University Energy Program (STEP). G5d STEP Utility Bill Analysis Report.pdf More Documents &...

313

Framework Application for Core Edge Transport Simulation (FACETS)  

SciTech Connect (OSTI)

The goal of the FACETS project (Framework Application for Core-Edge Transport Simulations) was to provide a multiphysics, parallel framework application (FACETS) that will enable whole-device modeling for the U.S. fusion program, to provide the modeling infrastructure needed for ITER, the next step fusion confinement device. Through use of modern computational methods, including component technology and object oriented design, FACETS is able to switch from one model to another for a given aspect of the physics in a flexible manner. This enables use of simplified models for rapid turnaround or high-fidelity models that can take advantage of the largest supercomputer hardware. FACETS does so in a heterogeneous parallel context, where different parts of the application execute in parallel by utilizing task farming, domain decomposition, and/or pipelining as needed and applicable. ParaTools, Inc. was tasked with supporting the performance analysis and tuning of the FACETS components and framework in order to achieve the parallel scaling goals of the project. The TAU Performance System�������������������������������® was used for instrumentation, measurement, archiving, and profile / tracing analysis. ParaTools, Inc. also assisted in FACETS performance engineering efforts. Through the use of the TAU Performance System, ParaTools provided instrumentation, measurement, analysis and archival support for the FACETS project. Performance optimization of key components has yielded significant performance speedups. TAU was integrated into the FACETS build for both the full coupled application and the UEDGE component. The performance database provided archival storage of the performance regression testing data generated by the project, and helped to track improvements in the software development.

Dr. Allen D. Malony; Dr. Sameer S. Shende; Dr. Kevin A. Huck; Mr. Alan Morris, and Mr. Wyatt Spear

2012-03-14T23:59:59.000Z

314

An Economic Evaluation Framework for Assessing Renewable Energy Projects  

SciTech Connect (OSTI)

It is becoming increasingly imperative to integrate renewable energy, such as solar and wind, into electricity generation due to increased regulations on air and water pollution and a sociopolitical desire to develop more clean energy sources. This increased spotlight on renewable energy requires evaluating competing projects using either conventional economic analysis techniques or other economics-based models and approaches in order to select a subset of the projects to be funded. Even then, there are reasons to suspect that techniques applied to renewable energy projects may result in decisions that will reject viable projects due to the use of a limited number of quantifiable and tangible attributes about the projects. This paper presents a framework for economic evaluation of renewable energy projects. The framework is based on a systems approach in which the processes within the entire network of the system, from generation to consumption, are accounted for. Furthermore, the framework uses the concept of fuzzy system to calculate the value of information under conditions of uncertainty.

Omitaomu, Olufemi A [ORNL; Badiru, Adedeji B [ORNL

2012-01-01T23:59:59.000Z

315

New framework hydrous silicate K{sub 3}Sc[Si{sub 3}O{sub 9}] {center_dot} H{sub 2}O related to the high-temperature anhydrous silicate K{sub 3}Ho[Si{sub 3}O{sub 9}] and symmetry analysis of a phase transition with prediction of structures  

SciTech Connect (OSTI)

Crystals of a new framework silicate K{sub 3}Sc[Si{sub 3}O{sub 9}] {center_dot} H{sub 2}O, space group Pm2{sub 1}n (nonstandard setting of space group Pmn2{sub 1} = C{sub 2v}{sup 7}), are obtained under hydrothermal conditions. The structure is determined without preliminary knowledge of the chemical formula. The absolute configuration is determined. The structure is close to that of the high-temperature K{sub 3}Ho[Si{sub 3}O{sub 9}] phase, which was obtained upon the heating of K{sub 3}HoSi{sub 3}O{sub 8}(OH){sub 2}. This structural similarity is due to the specific conditions of synthesis and an analogous formula, where holmium is replaced by scandium. A symmetry analysis shows that the high local symmetry of a block (rod) is responsible for the first-order phase transition of both the order-disorder (OD) and displacement type. The number of structures in which the simplest and high-symmetry layers are multiplied by different symmetry elements are predicted.

Belokoneva, E. L., E-mail: elbel@geol.msu.ru; Zorina, A. P.; Dimitrova, O. V. [Moscow State University, Faculty of Geology (Russian Federation)

2013-07-15T23:59:59.000Z

316

Conceptual Framework for Developing Resilience Metrics for the...  

Office of Environmental Management (EM)

Conceptual Framework for Developing Resilience Metrics for the Electricity, Oil, and Gas Sectors in the United States (September 2014) Conceptual Framework for Developing...

317

assessment framework: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2 Approach & Implementation Basically, the NAVTAG framework consist of three Hammerton, James 17 COMMENT Addressing a critique of the TEASI framework for invasive species risk...

318

Deputy Secretary Poneman to Attend International Framework for...  

Energy Savers [EERE]

to Attend International Framework for Nuclear Energy Cooperation Meeting in Jordan Deputy Secretary Poneman to Attend International Framework for Nuclear Energy Cooperation Meeting...

319

International Framework for Nuclear Energy Cooperation to Hold...  

Energy Savers [EERE]

Framework for Nuclear Energy Cooperation to Hold Ministerial-Level Meeting Sept. 29 in Warsaw, Poland International Framework for Nuclear Energy Cooperation to Hold...

320

SciTech Connect: Metal-Organic Framework Templated Inorganic...  

Office of Scientific and Technical Information (OSTI)

Metal-Organic Framework Templated Inorganic Sorbents for Rapid and Efficient Extraction of Heavy Metals Citation Details In-Document Search Title: Metal-Organic Framework Templated...

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Recovery Act: Smart Grid Interoperability Standards and Framework...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Act: Smart Grid Interoperability Standards and Framework Recovery Act: Smart Grid Interoperability Standards and Framework May 18, 2009 Locke, Chu Announce Significant Steps in...

322

GRiP - A flexible approach for calculating risk as a function of consequence, vulnerability, and threat.  

SciTech Connect (OSTI)

Get a GRiP (Gravitational Risk Procedure) on risk by using an approach inspired by the physics of gravitational forces between body masses! In April 2010, U.S. Department of Homeland Security Special Events staff (Protective Security Advisors [PSAs]) expressed concern about how to calculate risk given measures of consequence, vulnerability, and threat. The PSAs believed that it is not 'right' to assign zero risk, as a multiplicative formula would imply, to cases in which the threat is reported to be extremely small, and perhaps could even be assigned a value of zero, but for which consequences and vulnerability are potentially high. They needed a different way to aggregate the components into an overall measure of risk. To address these concerns, GRiP was proposed and developed. The inspiration for GRiP is Sir Isaac Newton's Universal Law of Gravitation: the attractive force between two bodies is directly proportional to the product of their masses and inversely proportional to the squares of the distance between them. The total force on one body is the sum of the forces from 'other bodies' that influence that body. In the case of risk, the 'other bodies' are the components of risk (R): consequence, vulnerability, and threat (which we denote as C, V, and T, respectively). GRiP treats risk as if it were a body within a cube. Each vertex (corner) of the cube represents one of the eight combinations of minimum and maximum 'values' for consequence, vulnerability, and threat. The risk at each of the vertices is a variable that can be set. Naturally, maximum risk occurs when consequence, vulnerability, and threat are at their maximum values; minimum risk occurs when they are at their minimum values. Analogous to gravitational forces among body masses, the GRiP formula for risk states that the risk at any interior point of the box depends on the squares of the distances from that point to each of the eight vertices. The risk value at an interior (movable) point will be dominated by the value of one vertex as that point moves closer and closer to that one vertex. GRiP is a visualization tool that helps analysts better understand risk and its relationship to consequence, vulnerability, and threat. Estimates of consequence, vulnerability, and threat are external to GRiP; however, the GRiP approach can be linked to models or data that provide estimates of consequence, vulnerability, and threat. For example, the Enhanced Critical Infrastructure Program/Infrastructure Survey Tool produces a vulnerability index (scaled from 0 to 100) that can be used for the vulnerability component of GRiP. We recognize that the values used for risk components can be point estimates and that, in fact, there is uncertainty regarding the exact values of C, V, and T. When we use T = t{sub o} (where t{sub o} is a value of threat in its range), we mean that threat is believed to be in an interval around t{sub o}. Hence, a value of t{sub o} = 0 indicates a 'best estimate' that the threat level is equal to zero, but still allows that it is not impossible for the threat to occur. When t{sub o} = 0 but is potentially small and not exactly zero, there will be little impact on the overall risk value as long as the C and V components are not large. However, when C and/or V have large values, there can be large differences in risk given t{sub o} = 0, and t{sub o} = epsilon (where epsilon is small but greater than a value of zero). We believe this scenario explains the PSA's intuition that risk is not equal to zero when t{sub o} = 0 and C and/or V have large values. (They may also be thinking that if C has an extremely large value, it is unlikely that T is equal to 0; in the terrorist context, T would likely be dependent on C when C is extremely large.) The PSAs are implicitly recognizing the potential that t{sub o} = epsilon. One way to take this possible scenario into account is to replace point estimates for risk with interval values that reflect the uncertainty in the risk components. In fact, one could argue that T never equals zero for a man-made hazard. This

Whitfield, R. G.; Buehring, W. A.; Bassett, G. W. (Decision and Information Sciences)

2011-04-08T23:59:59.000Z

323

A BAYESIAN NONPARAMETRIC MODELING FRAMEWORK FOR EXTREME VALUE ANALYSIS  

E-Print Network [OSTI]

and the bursting of the dot-com bubble on March 10, 2000,the bursting of the dot-com bubble (03/10/2000), the 09/11and the bursting of the dot-com bubble on March 10, 2000. We

Wang, Ziwei

2012-01-01T23:59:59.000Z

324

Design theoretic analysis of three system modeling frameworks.  

SciTech Connect (OSTI)

This paper analyzes three simulation architectures from the context of modeling scalability to address System of System (SoS) and Complex System problems. The paper first provides an overview of the SoS problem domain and reviews past work in analyzing model and general system complexity issues. It then identifies and explores the issues of vertical and horizontal integration as well as coupling and hierarchical decomposition as the system characteristics and metrics against which the tools are evaluated. In addition, it applies Nam Suh's Axiomatic Design theory as a construct for understanding coupling and its relationship to system feasibility. Next it describes the application of MATLAB, Swarm, and Umbra (three modeling and simulation approaches) to modeling swarms of Unmanned Flying Vehicle (UAV) agents in relation to the chosen characteristics and metrics. Finally, it draws general conclusions for analyzing model architectures that go beyond those analyzed. In particular, it identifies decomposition along phenomena of interaction and modular system composition as enabling features for modeling large heterogeneous complex systems.

McDonald, Michael James

2007-05-01T23:59:59.000Z

325

Using a Cognitive Theoretical Framework to Support Accident Analysis  

E-Print Network [OSTI]

Busse,D.K Johnson,C.W. The Second Workshop on Human Error, Safety and Systems Development pp 36-44 Safeware Engineering Corp

Busse, D.K Johnson, C.W.

326

A Framework for Analysis of Energy-Water Interdependency Problems  

SciTech Connect (OSTI)

The overall objective of this work is to improve the holistic value of energy development strategies by integrating management criteria for water availability, water quality, and ecosystem health into the energy system planning process. The Snake River Basin (SRB) in southern Idaho is used as a case study to show options for improving full economic utilization of aquatic resources given multiple scenarios such as changing climate, additional regulations, and increasing population. Through the incorporation of multiple management criteria, potential crosscutting solutions to energy and water issues in the SRB can be developed. The final result of this work will be a multi-criteria decision support tool - usable by policy makers and researchers alike - that will give insight into the behavior of the management criteria over time and will allow the user to experiment with a range of potential solutions. Because several basins in the arid west are dealing with similar water, energy, and ecosystem issues, the tool and conclusions will be transferable to a wide range of locations and applications. This is a very large, multi-year project to be completed in phases. This paper deals with interactions between the hydrologic system and water use at a basin level. Future work will include the interdependency between energy use and water use in these systems.

Robert F. Jeffers; Jacob J. Jacobson

2011-08-01T23:59:59.000Z

327

Energy and Greenhouse Impacts of Biofuels: A Framework for Analysis  

E-Print Network [OSTI]

extraction (e.g. crude oil production and shipment),production arises in petroleum refineries. A refinery turns crude oil

Kammen, Daniel M.; Farrell, Alexander E.; Plevin, Richard J.; Jones, Andrew D.; Nemet, Gregory F.; Delucchi, Mark A.

2008-01-01T23:59:59.000Z

328

Energy and Greenhouse Impacts of Biofuels: A Framework for Analysis  

E-Print Network [OSTI]

et al. (2005). "Ethanol as fuels: Energy, carbon dioxidebeen above $25 per barrel. Fuel Ethanol Production PetroleumFigure 1: Worldwide fuel ethanol production and petroleum

Kammen, Daniel M.; Farrell, Alexander E.; Plevin, Richard J.; Jones, Andrew D.; Nemet, Gregory F.; Delucchi, Mark A.

2008-01-01T23:59:59.000Z

329

A FRAMEWORK FOR TRANSMISSION CONGESTION MANAGEMENT ANALYSIS MINGHAI LIU  

E-Print Network [OSTI]

congestion, the market-based mechanisms using the locational marginal prices (LMPs) have become the most transmission services and compute the pricing for those services. The inherent volatility of electricity markets introduces uncertainty in the LMPs and consequently, in transmission pricing. In order to protect

Gross, George

330

Preliminary Analysis Framework for State Sustainable Transportation system  

E-Print Network [OSTI]

the research work. 1 Chapter 1- Introduction Sustainability is defined as “A system of policies, beliefs, and best practices that will protect the diversity and richness of the planet’s ecosystems, foster economic vitality...

Naganathan, Hariharan

2013-12-31T23:59:59.000Z

331

Security Requirements Engineering: A Framework for Representation and Analysis  

E-Print Network [OSTI]

of their security planning. The resulting loss has not been disclosed, but is in excess of several million dollars

Nuseibeh, Bashar

332

Online Monitoring Technical Basis and Analysis Framework for Emergency  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion | Department ofT ib l L d F SSales LLCDiesel Engines | DepartmentLaboratory | DepartmentDiesel

333

Online Monitoring Technical Basis and Analysis Framework for Large Power  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion | Department ofT ib l L d F SSales LLCDiesel Engines | DepartmentLaboratory |

334

Screening Metal-Organic Frameworks by Analysis of Transient Breakthrough  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduled System OutagesNews PressThemesLinks for Scientistsof

335

The Chameleon framework : practical solutions for memory behavior analysis  

E-Print Network [OSTI]

cache surface. The trace generator uses linear interpolationis the linear interpolation used by the trace generator. The

Weinberg, Jonathan

2008-01-01T23:59:59.000Z

336

A Qualitative Examination of the History of E-Extension (eXtension), Implementation of Moodle (A Course Management System) and Associated Strengths, Weaknesses, Opportunities and Threats  

E-Print Network [OSTI]

) in Extension. The second part sought to identify the strengths, weaknesses, opportunities and threats (SWOT) related to the use of Moodle as a Course Management System within eXtension. Interviews were conducted with five individuals knowledgeable...

Hightower, Tayla Elise

2011-08-08T23:59:59.000Z

337

Multichannel framework for singular quantum mechanics  

SciTech Connect (OSTI)

A multichannel S-matrix framework for singular quantum mechanics (SQM) subsumes the renormalization and self-adjoint extension methods and resolves its boundary-condition ambiguities. In addition to the standard channel accessible to a distant (“asymptotic”) observer, one supplementary channel opens up at each coordinate singularity, where local outgoing and ingoing singularity waves coexist. The channels are linked by a fully unitary S-matrix, which governs all possible scenarios, including cases with an apparent nonunitary behavior as viewed from asymptotic distances. -- Highlights: •A multichannel framework is proposed for singular quantum mechanics and analogues. •The framework unifies several established approaches for singular potentials. •Singular points are treated as new scattering channels. •Nonunitary asymptotic behavior is subsumed in a unitary multichannel S-matrix. •Conformal quantum mechanics and the inverse quartic potential are highlighted.

Camblong, Horacio E., E-mail: camblong@usfca.edu [Department of Physics and Astronomy, University of San Francisco, San Francisco, CA 94117-1080 (United States); Epele, Luis N., E-mail: epele@fisica.unlp.edu.ar [Laboratorio de Física Teórica, Departamento de Física, IFLP, CONICET, Facultad de Ciencias Exactas, Universidad Nacional de La Plata, C.C. 67–1900 La Plata (Argentina); Fanchiotti, Huner, E-mail: huner@fisica.unlp.edu.ar [Laboratorio de Física Teórica, Departamento de Física, IFLP, CONICET, Facultad de Ciencias Exactas, Universidad Nacional de La Plata, C.C. 67–1900 La Plata (Argentina)] [Laboratorio de Física Teórica, Departamento de Física, IFLP, CONICET, Facultad de Ciencias Exactas, Universidad Nacional de La Plata, C.C. 67–1900 La Plata (Argentina); García Canal, Carlos A., E-mail: garcia@fisica.unlp.edu.ar [Laboratorio de Física Teórica, Departamento de Física, IFLP, CONICET, Facultad de Ciencias Exactas, Universidad Nacional de La Plata, C.C. 67–1900 La Plata (Argentina); Ordóñez, Carlos R., E-mail: ordonez@uh.edu [Department of Physics, University of Houston, Houston, TX 77204-5506 (United States)

2014-01-15T23:59:59.000Z

338

ANTS: a new Collaborative Learning Framework  

E-Print Network [OSTI]

CSCW and MOO environments have played an important role in CSCL research. These multi-user community-ware frameworks enhance social interactions and shared experience and thus enabling new CSCL research. We however find some limitations in existing platforms: technology limitations and a lack of solid collaborative services. We present ANTS: a collaborative framework that aims to provide a solid foundation for CSCL applications. In one side, the framework is constructed on top of cutting-edge technologies like J2EE (EJB, JSP, Servlets), Notification services (Elvin, JMS) and XML. In the other side, ANTS provides solid CSCW services that make the system robust and extensible. We also present a concrete ANTS extension: JLE, a collaborative learning environment including services like course management, assessment management, collaboration, progress tracking and tutorware.

Pedro García Lopez; Robert Rallo Moya; Merce Gisbert; Antonio Gómez Skarmeta

339

Towards a framework of nuclear competencies  

SciTech Connect (OSTI)

For the countries considering the introduction of a nuclear energy program, the management of human resources should be a part of the wider integrated management system in order to ensure long term safe and reliable operation. Nuclear energy strategy and approaches to human resources development should take into consideration such fundamental aspects as: development and implementation of a workforce plan, required competencies and qualifications, prerequisites for staffing a nuclear energy program, needed training programs and training facilities, qualification and training requirements. Development of common instruments that respond to the above needs and vision has lead to a new concept of European Credit System for Vocational Education and Training. The European Credit System for Vocational Education and Training (ECVET) is based on definition of 'learning outcomes ' in terms of knowledge, skills and competence, and on identification of portfolios of learning outcomes that allow an individual to prove competencies in a coherent manner. ECVET proposes a common understanding of basic definitions of education and training as well as of the new proposed concepts and it should be recognized by all employers in the EU. In this context, a number of 'Euratom Fission Training Schemes' (EFTS) have been launched in specific areas where a shortage of skilled professionals has been identified. In these schemes the competence building is the result of traditional education plus life-long learning, non-traditional learning, and other forms of educational experiences, relying, in particular, on border-less mobility to get acquainted with various sectors. Each particular Training Scheme should follow a similar path for the achievement of the designed learning outcomes (knowledge, skills, and attitudes). This path to the Training Scheme consists of different activities regarding: definition of training scheme learning outcomes and modules, assessment of prerequisites and student selection, student interview for development of individual training plan, start of the training activities under a specific training scheme. The introduction and recognition of ECVET will lead to a common taxonomy of competencies, and will provide also information about qualifications and units in numerical form, enabling mutual recognition of a training scheme. The description of the learning outcomes to be achieved for qualifying to a specific job profile may follow the analysis phase of the systematic approach to training (SAT). This would ensure a common tool, already used by all trainers. All these steps contribute to establishing of a framework of nuclear competencies recognized and accepted throughout member states. (authors)

Ghitescu, P. [Univ. Politehnica Bucharest, Spl. Independentei 313, 060042 (Romania)

2012-07-01T23:59:59.000Z

340

A distributed requirements management framework for legal compliance and accountability  

E-Print Network [OSTI]

lifecycle. We illustrate the framework within the context of a concrete healthcare scenario in which

Breaux, Travis D.

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Integrated Compliance Framework for Data Processing Applications  

E-Print Network [OSTI]

Framework for Data Processing Applications? that leverages industry best practices like the Control Objectives for Information and related Technology (COBIT), the Information Technology Infrastructure Library (ITIL), the International Organization.... Information Technology Infrastructure Library (ITIL) ITIL provides a systematic approach to the management of information technology service provision. It is the only consistent and comprehensive documentation of best practice for information technology...

Vil, Jé an

2009-12-18T23:59:59.000Z

342

A Statistical Framework for Spatial Comparative Genomics  

E-Print Network [OSTI]

A Statistical Framework for Spatial Comparative Genomics Rose Hoberman May 2007 CMU-CS-07, or the U.S. Government. #12;Keywords: spatial comparative genomics, comparative genomics, gene clusters, max-gap clusters, gene teams, whole genome duplication, paralogons, synteny, ortholog detection #12

343

The Reactor An ObjectOriented Framework  

E-Print Network [OSTI]

The Reactor An Object­Oriented Framework for Event Demultiplexing and Event Handler Dispatching Douglas C. Schmidt 1 Overview ffl The Reactor is an object­oriented frame­ work that encapsulates OS event demul­ tiplexing mechanisms -- e.g., the Reactor API runs transparently atop both Wait

Schmidt, Douglas C.

344

CSE394: Security Policy Frameworks Scott Stoller  

E-Print Network [OSTI]

, and it can provide good practice in public speaking. Printouts of final versions of all documents (i.eCSE394: Security Policy Frameworks Scott Stoller Project. Version: 18oct2005a. An initial proposal project. I will provide feedback on the proposals (on the topic and the size of the project) within a week

Stoller, Scott

345

A Theoretical Framework for Chimera Domain Decomposition  

E-Print Network [OSTI]

A Theoretical Framework for Chimera Domain Decomposition S. L. Keeling Sverdrup Technology, Inc. Steger, UC Davis, May 2-4, 1997. 1 Introduction. The Chimera scheme is a domain decomposition method- ometry is divided into simply shaped regions. Unlike other approaches [5], the Chimera method simplifies

Keeling, Stephen L.

346

Free Parameters and Frameworks in Minimal Supersymmetry  

E-Print Network [OSTI]

405 Appendix A Free Parameters and Frameworks in Minimal Supersymmetry It is useful to discuss what the various schemes that exist for reducing the set of free parameters to a manageable number. The information, and so is fixed by experiment. The free parameters consist mainly of the coe#cients of the ``soft

California at Berkeley, University of

347

Free Parameters and Frameworks in Minimal Supersymmetry  

E-Print Network [OSTI]

405 Appendix A Free Parameters and Frameworks in Minimal Supersymmetry It is useful to discuss what the various schemes that exist for reducing the set of free parameters to a manageable number. The information, and so is fixed by experiment. The free parameters consist mainly of the coefficients of the "soft

California at Berkeley, University of

348

A Homogenized Energy Framework for Ferromagnetic Hysteresis  

E-Print Network [OSTI]

energy relations at the mesoscopic or lattice level based on the assumption that magnetic momentsA Homogenized Energy Framework for Ferromagnetic Hysteresis Ralph C. Smith Marcelo J. Dapino Center or spins are restricted to two orientations. Direct minimization of the Gibbs energy yields local average

349

Alignment vs N framework for active matter  

E-Print Network [OSTI]

/Coffee at 11:15 AM) Seminar Hall, TCIS trivial Commission for Atomic Energy and Alternative propelled particlesAlignment vs N framework for active matter and collective motion Commission for Atomic Energy and Alternative Energies (CEA), Franc The collective properties of self interacting solely via some kind

Shyamasundar, R.K.

350

TIUPAM: A Framework for Trustworthiness-centric  

E-Print Network [OSTI]

at San Antonio Joint work with Qun Ni and Elisa Bertino (Purdue Univ.) Ravi Sandhu (Univ. Texas at San, Usage, Provenance, and Attack Management (TIUPAM) Four supporting components: Identity management Usage management Provenance management Attack management The framework is centered at the need

Sandhu, Ravi

351

RESEARCH Open Access Probabilistic framework for opportunistic  

E-Print Network [OSTI]

approaches. Keywords: Cognitive radio networks, Opportunistic spectrum management, Medium access control 1 that the licensed spectrum is underutilized for 15 to 85% of the time depending on the spatial location [1]. ThusRESEARCH Open Access Probabilistic framework for opportunistic spectrum management in cognitive ad

Perkins, Dmitri

352

Policy and institutional frameworks for the promotion of sustainable biofuels in Mali  

E-Print Network [OSTI]

..................................................................................................10 3.1 Institutional framework and stakeholders in the Jatropha activities............... 10 3.1.1 National level analysis: institutional stakeholders and implementation of Jatropha activities Malian politics with Jatropha: national policy goals and drivers........ 23 3.2.1 Key policy goals

Mound, Jon

353

2013 Faculty Publications A Cloud-Based Framework for Automating MODFLOW Simulations for Aquifer Management  

E-Print Network [OSTI]

2013 Faculty Publications A Cloud-Based Framework for Automating MODFLOW Simulations for Aquifer Performance-Based Liquefaction Triggering Models for the SPT. Seismological Society of America 2013 Annual. A Simplified Uniform Hazard Liquefaction Analysis Procedure for Bridges. Transportation Research Record. Kevin

Olsen Jr., Dan R.

354

Physical protection: threat response and performance goals as applied at the nuclear material inspection and storage (NMIS) building  

SciTech Connect (OSTI)

Only one aspect of nuclear security has been discussed here, a disciplined approach to physical protection systems (PPS) design. The best security against a multitude of threats to the nuclear industry is a dynamic and multifaceted safeguards program. It is one that combines PPS design with employee screening, reliability or behavioral observation programs, procedural control, assessment techniques, response capabilities, and security hardware. To be effective, such a program must be supported by management and applied uniformly to all personnel, including the safeguards and security staff.

Sanford, T.H.

1982-01-01T23:59:59.000Z

355

& MetalOrganic Frameworks Enhancing CO2 Separation Ability of a MetalOrganic Framework  

E-Print Network [OSTI]

that it is a promising material for sequestering CO2 from landfill gas. Introduction Metal­organic frameworks have been considered as promising materials for separating CO2 from landfill gas and industrial flue gas due

Paik Suh, Myunghyun

356

Postsynthetic modification of metal-organic frameworks  

E-Print Network [OSTI]

Cubic Ångstrøm AA Atomic Absorption acac Acetylacetonate AM157 Table 5- 4. Atomic Absorption (AA) analysis of UMCM-1-NHby TGA, PXRD, atomic absorption (AA) analysis, diffuse

Tanabe, Kristine Kimie

2011-01-01T23:59:59.000Z

357

A planning framework for transferring building energy technologies: Executive Summary  

SciTech Connect (OSTI)

Accelerating the adoption of new and existing cost-effective technologies has significant potential to reduce the energy consumed in US buildings. This report summarizes some of the key results of an interlaboratory technology transfer planning effort in support of the US Department of Energy's Office of Building Technologies (the full report is published under SERI number TP-260-3729). A guiding assumption for planning was that OBT's R D program should forge linkages with existing programs whose goals involved enhancing energy efficiency in buildings. An ad hoc Technology Transfer Advisory Group reviewed the existing analysis and technology transfer program, brainstormed technology transfer approaches, interviewed DOE program managers, identified applicable research results, and developed a framework that management could use in deciding on the best investments of technology transfer resources. Representatives of 22 organizations were interviewed on their views of the potential for transferring energy efficiency technologies through active linking with OBT. The report describes in summary these programs and interview results; outlines OBT tools, technologies, and practices to be transferred; defines OBT audiences; identifies technology transfer functions and presents a framework devised using functions and audiences; presents some example technology transfer activities; and summarizes the Advisory Group's recommendations.

Farhar, B C; Brown, M A; Mohler, B L; Wilde, M; Abel, F H

1990-08-01T23:59:59.000Z

358

A planning framework for transferring building energy technologies  

SciTech Connect (OSTI)

Accelerating the adoption of new and existing cost-effective technologies has significant potential to reduce the energy consumed in US buildings. This report presents key results of an interlaboratory technology transfer planning effort in support of the US Department of Energy's Office of Building Technologies (OBT). A guiding assumption for planning was that OBT's R D program should forge linkages with existing programs whose goals involved enhancing energy efficiency in buildings. An ad hoc Technology Transfer Advisory Group reviewed the existing analysis and technology transfer program, brainstormed technology transfer approaches, interviewed DOE program managers, identified applicable research results, and developed a framework that management could use in deciding on the best investments of technology transfer resources. Representatives of 22 organizations were interviewed on their views of the potential for transferring energy efficiency technologies through active linking with OBT. The report describes these programs and interview results; outlines OBT tools, technologies, and practices to be transferred; defines OBT audiences; identifies technology transfer functions and presents a framework devised using functions and audiences; presents some 60 example technology transfer activities; and documents the Advisory Group's recommendations. 37 refs., 3 figs., 12 tabs.

Farhar, B C; Brown, M A; Mohler, B L; Wilde, M; Abel, F H

1990-07-01T23:59:59.000Z

359

Metal?organic frameworks for the storage and delivery of biologically active hydrogen sulfide  

SciTech Connect (OSTI)

Hydrogen sulfide is an extremely toxic gas that is also of great interest for biological applications when delivered in the correct amount and at the desired rate. Here we show that the highly porous metal-organic frameworks with the CPO-27 structure can bind the hydrogen sulfide relatively strongly, allowing the storage of the gas for at least several months. Delivered gas is biologically active in preliminary vasodilation studies of porcine arteries, and the structure of the hydrogen sulfide molecules inside the framework has been elucidated using a combination of powder X-ray diffraction and pair distribution function analysis.

Allan, Phoebe K.; Wheatley, Paul S.; Aldous, David; Mohideen, M. Infas; Tang, Chiu; Hriljac, Joseph A.; Megson, Ian L.; Chapman, Karena W.; De Weireld, Guy; Vaesen, Sebastian; Morris, Russell E. (St Andrews)

2012-04-02T23:59:59.000Z

360

A methodology for the evaluation of the turbine jet engine fragment threat to generic air transportable containers  

SciTech Connect (OSTI)

Uncontained, high-energy gas turbine engine fragments are a potential threat to air-transportable containers carried aboard jet aircraft. The threat to a generic example container is evaluated by probability analyses and penetration testing to demonstrate the methodology to be used in the evaluation of a specific container/aircraft/engine combination. Fragment/container impact probability is the product of the uncontained fragment release rate and the geometric probability that a container is in the path of this fragment. The probability of a high-energy rotor burst fragment from four generic aircraft engines striking one of the containment vessels aboard a transport aircraft is approximately 1.2 {times} 10{sup {minus}9} strikes/hour. Finite element penetration analyses and tests can be performed to identify specific fragments which have the potential to penetrate a generic or specific containment vessel. The relatively low probability of engine fragment/container impacts is primarily due to the low release rate of uncontained, hazardous jet engine fragments.

Harding, D.C.; Pierce, J.D.

1993-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

A software framework for image processing  

SciTech Connect (OSTI)

There exists a great potential for the development of customizable image processing software that accommodates a wide variety of customers and applications. Such software would be able to read and process the many common image file formats, in addition to allowing the incorporation of those that have been custom made. Furthermore, the software would have the ability to handle the infinite variety of accompanying support files, which can contain quite different information for various applications and customers. A software framework designed to read and process this wide variety of input image files and support files would be extremely valuable. This paper develops the foundation of this proposed software architecture by using a composite of several common design patterns. Any similar software framework required to process input information and corresponding algorithms can benefit from the exposition of these composite design structures.

Garren, D.A. [Raytheon E-Systems, Garland Operations, TX (United States)

1996-12-31T23:59:59.000Z

362

Site Transition Framework | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof the Americas |DOE FormerEnergy Data Access|DepartmentFramework

363

Knowledge Framework Implementation with Multiple Architectures - 13090  

SciTech Connect (OSTI)

Multiple kinds of knowledge management systems are operational in public and private enterprises, large and small organizations with a variety of business models that make the design, implementation and operation of integrated knowledge systems very difficult. In recent days, there has been a sweeping advancement in the information technology area, leading to the development of sophisticated frameworks and architectures. These platforms need to be used for the development of integrated knowledge management systems which provides a common platform for sharing knowledge across the enterprise, thereby reducing the operational inefficiencies and delivering cost savings. This paper discusses the knowledge framework and architecture that can be used for the system development and its application to real life need of nuclear industry. A case study of deactivation and decommissioning (D and D) is discussed with the Knowledge Management Information Tool platform and framework. D and D work is a high priority activity across the Department of Energy (DOE) complex. Subject matter specialists (SMS) associated with DOE sites, the Energy Facility Contractors Group (EFCOG) and the D and D community have gained extensive knowledge and experience over the years in the cleanup of the legacy waste from the Manhattan Project. To prevent the D and D knowledge and expertise from being lost over time from the evolving and aging workforce, DOE and the Applied Research Center (ARC) at Florida International University (FIU) proposed to capture and maintain this valuable information in a universally available and easily usable system. (authors)

Upadhyay, H.; Lagos, L.; Quintero, W.; Shoffner, P. [Applied Research Center, Florida International University, Miami, FL 33174 (United States)] [Applied Research Center, Florida International University, Miami, FL 33174 (United States); DeGregory, J. [Office of D and D and Facility Engineering, Environmental Management, Department of Energy (United States)] [Office of D and D and Facility Engineering, Environmental Management, Department of Energy (United States)

2013-07-01T23:59:59.000Z

364

System architecture analysis and selection under uncertainty  

E-Print Network [OSTI]

A system architecture analysis and selection methodology is presented that builds on the Multidisciplinary Analysis and Optimization framework. It addresses a need and opportunity to extend the MAO techniques to include a ...

Smaling, Rudolf M

2005-01-01T23:59:59.000Z

365

MONTANE RIPARIAN HABITAT AND WILLOW FLYCATCHERS: THREATS TO A SENSITIVE ENVIRONMENT AND SPECIESl  

E-Print Network [OSTI]

of montane mead ows from livestock grazing and Brown-headed Cowbird (Molothrus ater) parasitism. We make. In addition to these studies, we surveyed mead ows throughout the Sierra Nevada in June and July of 1986 of these surveys, discussed in detail by Harris and others (1987), also contribute to our analysis of Willow Fly

366

E-Print Network 3.0 - analysis tool incorporating Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and visualization tools into a single framework suitable for decision making... Analysis Data, Statistical Analysis Geo-Spatial Information Tools Defense Transportation Energy...

367

An Interactive Visual Analytics Framework for Multi-Field Data...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Interactive Visual Analytics Framework for Multi-Field Data in a Geo-Spatial Context. An Interactive Visual Analytics Framework for Multi-Field Data in a Geo-Spatial Context....

368

A framework for sustainable buildings : an application to China  

E-Print Network [OSTI]

A framework has been established to discuss the different topics of Sustainability in the context of buildings. The framework includes the dimensions of time and space and the dimensions of ecology, society, and economy. ...

Ospelt, Christoph, 1970-

1999-01-01T23:59:59.000Z

369

A Framework for Dynamizing Succinct Data Structures (Extended Abstract)  

E-Print Network [OSTI]

We present a framework to dynamize succinct data structures, to encourage their use over non-succinct versions in a wide variety of important application areas. Our framework can dynamize most stateof- the-art succinct ...

Gupta, Ankur; Hon, Wing-Kai; Shah, Rahul; Vitter, Jeffrey Scott

2007-01-01T23:59:59.000Z

370

SC COLLABORATOR: A SERVICE ORIENTED FRAMEWORK FOR CONSTRUCTION SUPPLY CHAIN  

E-Print Network [OSTI]

, service oriented architecture (SOA) with open source technologies is a desirable computing modelSC COLLABORATOR: A SERVICE ORIENTED FRAMEWORK FOR CONSTRUCTION SUPPLY CHAIN COLLABORATION for construction supply chain collaboration and management, through a prototype service oriented system framework

Stanford University

371

Development of Conceptual Framework Renewable Energy Certificate Mechanism for India  

E-Print Network [OSTI]

Advisory Private Limited June 2009 (Final Report for circulation) #12;Report on `Conceptual Framework of ABPS Infrastructure Advisory Private Limited. #12;Report on `Conceptual Framework for REC Mechanism Electricity Authority CERC Central Electricity Regulatory Commission CUF Capacity Utilisation Factor DERC

Columbia University

372

Enterprise Security Planning using Zachman Framework: Designer's Perspective  

E-Print Network [OSTI]

Enterprise Security Planning using Zachman Framework: Designer's Perspective Abstract planning point of view. Index Terms - Enterprise Architecture, Zachman Framework, Enterprise Security security planning. This paper has been organized as follows. Section 2, describes the enterprise

Ertaull, Levent

373

Enterprise Security Planning with Department of Defense Architecture Framework (DODAF)  

E-Print Network [OSTI]

Enterprise Security Planning with Department of Defense Architecture Framework (DODAF) L. Ertaul1 as its application in dealing with enterprise security planning related issues. Keywords: Enterprise Architecture Frameworks, DoDAF, Enterprise Security Planning 1 . Introduction The Department of Defense

Ertaull, Levent

374

A framework for delay emulation of large-scale internetworks  

E-Print Network [OSTI]

. The framework models and dynamically adapts the test traffic according to the network delay characteristics observed on the Internet in real-time. The proposed framework consists of three main modules: Virtual Host Configuration Module, Delay Estimator...

Venkata, Shravan Rangaraju

2001-01-01T23:59:59.000Z

375

Drive-access transit : a regional analytical framework  

E-Print Network [OSTI]

A framework for analyzing drive-access transit at a regional level is developed in this research. This framework is intended primarily for in-house use by regional transit agencies, yet has implications for the regional ...

Sorensen, James B

2005-01-01T23:59:59.000Z

376

Evaluation Framework and Analyses for Thermal Energy Storage Integrated with Packaged Air Conditioning  

SciTech Connect (OSTI)

Few third-party guidance documents or tools are available for evaluating thermal energy storage (TES) integrated with packaged air conditioning (AC), as this type of TES is relatively new compared to TES integrated with chillers or hot water systems. To address this gap, researchers at the National Renewable Energy Laboratory conducted a project to improve the ability of potential technology adopters to evaluate TES technologies. Major project outcomes included: development of an evaluation framework to describe key metrics, methodologies, and issues to consider when assessing the performance of TES systems integrated with packaged AC; application of multiple concepts from the evaluation framework to analyze performance data from four demonstration sites; and production of a new simulation capability that enables modeling of TES integrated with packaged AC in EnergyPlus. This report includes the evaluation framework and analysis results from the project.

Kung, F.; Deru, M.; Bonnema, E.

2013-10-01T23:59:59.000Z

377

A Systems Framework for Assessing Plumbing Products-Related Water Conservation  

SciTech Connect (OSTI)

Reducing the water use of plumbing products—toilets, urinals, faucets, and showerheads —has been a popular conservation measure. Improved technologies have created opportunities for additional conservation in this area. However, plumbing products do not operate in a vacuum. This paper reviews the literature related to plumbing products to determine a systems framework for evaluating future conservation measures using these products. The main framework comprises the following categories: water use efficiency, product components, product performance, source water, energy, and plumbing/sewer infrastructure. This framework for analysis provides a starting point for professionals considering future water conservation measures to evaluate the need for additional research, collaboration with other standards or codes committees, and attachment of additional metrics to water use efficiency (such as performance).

Williams, Alison; Dunham Whitehead, Camilla; Lutz, James

2011-12-02T23:59:59.000Z

378

The CLEANLE project within HOMOFABER framework The CLEANLE project  

E-Print Network [OSTI]

The CLEANLE project within HOMOFABER framework The CLEANLE project within HOMOFABER framework Presentation for students involvement during spring semester 2011 #12;The CLEANLE project within HOMOFABER framework The Interdisciplinary Aerodynamics Group (IAG) · Cost group within EPFL-STI ­ Administrated

379

Component-based Situational Methods A framework for understanding SME  

E-Print Network [OSTI]

Draft copy Component-based Situational Methods A framework for understanding SME Yves-Roger Nehan Engineering (SME) which focuses on project-specific method construction. We propose a faceted framework to understand and classify issues in system development SME. The framework identifies four different

Paris-Sud XI, Université de

380

Enterprise Security Planning using the Zachman Framework Builder's Perspective  

E-Print Network [OSTI]

Enterprise Security Planning using the Zachman Framework ­ Builder's Perspective L. Ertaul1 , S that can be used for enterprise security planning .This paper gives an overview of how Zachman's Framework's perspective of the Zachman Framework Keywords: Enterprise Architecture, Enterprise Security Planning, Zachman

Ertaull, Levent

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Policy Framework Policy Commencement Date: 14 March 2012  

E-Print Network [OSTI]

Policy Framework Policy Commencement Date: 14 March 2012 Category: Strategic Management 1. PURPOSE To manage the development and maintenance of a robust and responsive policy framework that aligns the University's practices with its strategic objectives. 2. POLICY STATEMENT The Policy Framework consists

382

A QUALITY CONTROL FRAMEWORK FOR BUS SCHEDULE RELIABILITY  

E-Print Network [OSTI]

A QUALITY CONTROL FRAMEWORK FOR BUS SCHEDULE RELIABILITY JIE LIN*, University of Illinois Institute A QUALITY CONTROL FRAMEWORK FOR BUS SCHEDULE RELIABILITY Abstract This paper develops and demonstrates a quality control framework for bus schedule reliability. Automatic Vehicle Location (AVL) devices

Illinois at Chicago, University of

383

SUSTAINABLE HERITAGE TOURISM PLANNING IN ETHIOPIA: AN ASSESSMENT FRAMEWORK  

E-Print Network [OSTI]

SUSTAINABLE HERITAGE TOURISM PLANNING IN ETHIOPIA: AN ASSESSMENT FRAMEWORK by Stefanie Jones B Management Project No.: 532 Title: Sustainable Heritage Tourism Planning in Ethiopia: An Assessment Framework, and tested the utility of that framework in determining the potential for sustainable heritage tourism

384

Porting the .NET Micro Framework A Microsoft Technical White Paper  

E-Print Network [OSTI]

Porting the .NET Micro Framework A Microsoft Technical White Paper December 10, 2007 AbstractShow-capable devices to port the .NET Micro Framework to new hardware platforms. This white paper introduces the .NET Micro Framework architecture with a view toward porting it to a new hardware platform. It then discusses

Hunt, Galen

385

Records Management Framework Policy Version 1.0  

E-Print Network [OSTI]

and guidance materials provided to them by the Records Manager and for acting as the first point of contactRecords Management Framework Policy Version 1.0 Last amended: 01 September 2014 1. Introduction The Records Management Framework, or `RM Framework', is a network of Records Officers who will support

Aickelin, Uwe

386

Engineering evaluation/cost analysis for the 233-S Plutonium Concentration Facility  

SciTech Connect (OSTI)

The deactivated 233-S Plutonium Concentration Facility (233-S Facility) is located in the 200 Area. The facility has undergone severe degradation due to exposure to extreme weather conditions. A rapid freeze and thaw cycle occurred at the Hanford Site during February 1996, which caused cracking to occur on portions of the building`s roof. This has resulted in significantly infiltration of water into the facility, which provides a pathway for potential release of radioactive material into the environment (air and/or ground). The weather caused several existing cracks in the concrete portions of the structure to lengthen, increasing the potential for failed confinement of the radioactive material in the building. Differential settlement has also occurred, causing portions of the facility to separate from the main building structure thus creating a potential for release of radioactive material t the environment. An expedited removal action is proposed to ensure that a release from the 233-S Facility does not occur. The US Department of Energy (DOE), Richland Operations Office (RL), in cooperation with the EPA, has prepared this Engineering Evaluation/Cost Analysis (EE/CA) pursuant to CERCLA. Based on the evaluation, RL has determined that hazardous substances in the 233-S Facility may present a potential threat to human health and/or the environment, and that an expedited removal action is warranted. The purpose of the EE/CA is to provide the framework for the evaluation and selection of a technology from a viable set of alternatives for a removal action.

NONE

1997-01-01T23:59:59.000Z

387

Impact of Not Fully Addressing Cross-Classified Multilevel Structure in Testing Measurement Invariance and Conducting Multilevel Mixture Modeling within Structural Equation Modeling Framework  

E-Print Network [OSTI]

data as hierarchical structure data in two different analytical settings under the structural equation modeling (SEM) framework. Study 1 evaluated the performance of conventional multilevel confirmatory factor analysis (MCFA) which assumes hierarchical...

Im, Myung

2014-07-25T23:59:59.000Z

388

A Strategic Framework for SMR Deployment  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up from theDepartment(October-DecemberBasedToward a MoreA RisingA1 A Strategic Framework

389

Introduction to Framework | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 No revision hasInformation Earth's Heat JumpInc Place: EdenOverview Of TheIntevac Jump to:Framework (Redirected

390

Working to keep us safe: Sara Brambilla, Postdoc creates threat reduction  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLasDelivered energy consumption byAbout PrintableBlenderWhatFellowsWoodAnalysis

391

Towards a public analysis database for LHC new physics searches using MadAnalysis 5  

E-Print Network [OSTI]

We present the implementation, in the MadAnalysis 5 framework, of several ATLAS and CMS searches for supersymmetry in data recorded during the first run of the LHC. We provide extensive details on the validation of our implementations and propose to create a public analysis database within this framework.

B. Dumont; B. Fuks; S. Kraml; S. Bein; G. Chalons; E. Conte; S. Kulkarni; D. Sengupta; C. Wymant

2015-01-27T23:59:59.000Z

392

Analysis of Hydrogen and Competing Technologies for Utility-Scale Energy Storage (Presentation)  

SciTech Connect (OSTI)

Presentation about the National Renewable Energy Laboratory's analysis of hydrogen energy storage scenarios, including analysis framework, levelized cost comparison of hydrogen and competing technologies, analysis results, and conclusions drawn from the analysis.

Steward, D.

2010-02-11T23:59:59.000Z

393

Abstract --Distributed Denial of Service (DDoS) attack is a critical threat to the Internet. Currently, most ISPs merely rely  

E-Print Network [OSTI]

Abstract -- Distributed Denial of Service (DDoS) attack is a critical threat to the Internet. Currently, most ISPs merely rely on manual detection of DDoS attacks after which offline fine- grain traffic-evolving characteristics of the attacking packets. Recently, we have proposed a DDoS defense architecture that supports

Lee, Ruby B.

394

An Overview of the New USGS Environmental Health Mission Area The health of aquatic and terrestrial organisms and people is under continuing threats from  

E-Print Network [OSTI]

and resurging infectious diseases and environmental contamination. Changes in chemical use and the ways in whichAn Overview of the New USGS Environmental Health Mission Area Background The health of aquatic and terrestrial organisms and people is under continuing threats from pathogenic diseases and exposure

Fleskes, Joe

395

Situation Threat Assessment Policy and Protocol (Updated 9/1/11) Rowan University is committed to promoting a safe and secure learning environment. It is  

E-Print Network [OSTI]

appropriate actions, which may include suspension, expulsion, involuntary leave of absence, filing of criminal parties, or expressed in private writings. Possession of any item used as a weapon such as a firearm Threat Assessment Team will recommend actions to the Vice President for Student Life & Dean of Students

Rusu, Adrian

396

Mapping the Impact of Security Threats on Safety-Critical Global Navigation Satellite Systems Chris W. Johnson (1), A. Atencia Yepez (2)  

E-Print Network [OSTI]

Mapping the Impact of Security Threats on Safety-Critical Global Navigation Satellite Systems Chris of attack scenarios can be used to assess the resilience of safety cases to the impact of external security accident advocated the development of safety argumentation across the oil and gas industry (US Presidential

Johnson, Chris

397

MITIGATING THE THREAT TO SOLAR SYSTEM SCIENCE IMPOSED BY MCT PROGRAMS. Michael H. Wong, Astronomy Department, University of California, Berkeley CA 94720-3411  

E-Print Network [OSTI]

MITIGATING THE THREAT TO SOLAR SYSTEM SCIENCE IMPOSED BY MCT PROGRAMS. Michael H. Wong, Astronomy Department, University of California, Berkeley CA 94720-3411 mikewong@astro.berkeley.edu A White Paper on HST's highly-productive solar system science program, which is characterized by projects with relatively small

398

Abstract--Grazing incidence metal mirrors in laser-driven IFE power plants are subject to a variety of threats that result  

E-Print Network [OSTI]

Abstract--Grazing incidence metal mirrors in laser-driven IFE power plants are subject to a variety [4] at UCSD, and help define design windows for the GIMM in a laser-driven IFE power plant of threats that result in damages leading to increased laser absorption, beam quality degradation and reduced

Tillack, Mark

399

Attitudes and perceptions of urban households in sub-Saharan Africa on water sources, threats and sustainability: A study in Bondo, Kenya  

E-Print Network [OSTI]

, threats and sustainability: A study in Bondo, Kenya Daniel M Nzengya School of Sustainability, Arizona growth is already happening in most of Kenya's cities and towns. In the Lake Victoria region, increasing the danger of water- and sanitation-related diseases. A survey was conducted in Bondo town, Kenya

Hall, Sharon J.

400

Comparative analysis of twelve Dothideomycete plant pathogens  

SciTech Connect (OSTI)

The Dothideomycetes are one of the largest and most diverse groups of fungi. Many are plant pathogens and pose a serious threat to agricultural crops grown for biofuel, food or feed. Most Dothideomycetes have only a single host and related Dothideomycete species can have very diverse host plants. Twelve Dothideomycete genomes have currently been sequenced by the Joint Genome Institute and other sequencing centers. They can be accessed via Mycocosm which has tools for comparative analysis

Ohm, Robin; Aerts, Andrea; Salamov, Asaf; Goodwin, Stephen B.; Grigoriev, Igor

2011-03-11T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Integrating Empirical Measures of Energy Efficiency into an Energy Modeling Framework  

E-Print Network [OSTI]

Integrating Empirical Measures of Energy Efficiency Into An Energy Modeling Framework Gale Boyd, Argonne National Laboratory Tools such as Data Envelopment Analysis and Stochastic Frontier Regressions provide a basis for empirical measures... of efficiency. The definition of efficiency these tools encompass can be as broadly defined as total factor productivity, or narrowly defined in terms of single inputs like energy. Given the ability to generate empirical measures of energy efficiency...

Boyd, G.

2006-01-01T23:59:59.000Z

402

Lagrangian Variational Framework for Boundary Value Problems  

E-Print Network [OSTI]

A boundary value problem is commonly associated with constraints imposed on a system at its boundary. We advance here an alternative point of view treating the system as interacting "boundary" and "interior" subsystems. This view is implemented through a Lagrangian framework that allows to account for (i) a variety of forces including dissipative acting at the boundary; (ii) a multitude of features of interactions between the boundary and the interior fields when the boundary fields may differ from the boundary limit of the interior fields; (iii) detailed pictures of the energy distribution and its flow; (iv) linear and nonlinear effects. We provide a number of elucidating examples of the structured boundary and its interactions with the system interior. We also show that the proposed approach covers the well known boundary value problems.

Alexander Figotin; Guillermo Reyes

2014-07-29T23:59:59.000Z

403

Scientific American: Threats of War, Chances for Peace http://www.sciam.com/print_version.cfm?articleID=C7412A92-E7F2-... 1 of 2 4/24/2007 11:34 AM  

E-Print Network [OSTI]

Scientific American: Threats of War, Chances for Peace http://www.sciam.com/print_version.cfm?articleID=C7412A92-E7F2-... 1 of 2 4/24/2007 11:34 AM February 18, 2007 Threats of War, Chances for Peace Preventing the spread of war will depend on strategies that recognize the shared interests of adversaries

404

Data Analysis  

SciTech Connect (OSTI)

Analysis of the material protection, control, and accountability (MPC&A) system is necessary to understand the limits and vulnerabilities of the system to internal threats. A self-appraisal helps the facility be prepared to respond to internal threats and reduce the risk of theft or diversion of nuclear material. The material control and accountability (MC&A) system effectiveness tool (MSET) fault tree was developed to depict the failure of the MPC&A system as a result of poor practices and random failures in the MC&A system. It can also be employed as a basis for assessing deliberate threats against a facility. MSET uses fault tree analysis, which is a top-down approach to examining system failure. The analysis starts with identifying a potential undesirable event called a 'top event' and then determining the ways it can occur (e.g., 'Fail To Maintain Nuclear Materials Under The Purview Of The MC&A System'). The analysis proceeds by determining how the top event can be caused by individual or combined lower level faults or failures. These faults, which are the causes of the top event, are 'connected' through logic gates. The MSET model uses AND-gates and OR-gates and propagates the effect of event failure using Boolean algebra. To enable the fault tree analysis calculations, the basic events in the fault tree are populated with probability risk values derived by conversion of questionnaire data to numeric values. The basic events are treated as independent variables. This assumption affects the Boolean algebraic calculations used to calculate results. All the necessary calculations are built into the fault tree codes, but it is often useful to estimate the probabilities manually as a check on code functioning. The probability of failure of a given basic event is the probability that the basic event primary question fails to meet the performance metric for that question. The failure probability is related to how well the facility performs the task identified in that basic event over time (not just one performance or exercise). Fault tree calculations provide a failure probability for the top event in the fault tree. The basic fault tree calculations establish a baseline relative risk value for the system. This probability depicts relative risk, not absolute risk. Subsequent calculations are made to evaluate the change in relative risk that would occur if system performance is improved or degraded. During the development effort of MSET, the fault tree analysis program used was SAPHIRE. SAPHIRE is an acronym for 'Systems Analysis Programs for Hands-on Integrated Reliability Evaluations.' Version 1 of the SAPHIRE code was sponsored by the Nuclear Regulatory Commission in 1987 as an innovative way to draw, edit, and analyze graphical fault trees primarily for safe operation of nuclear power reactors. When the fault tree calculations are performed, the fault tree analysis program will produce several reports that can be used to analyze the MPC&A system. SAPHIRE produces reports showing risk importance factors for all basic events in the operational MC&A system. The risk importance information is used to examine the potential impacts when performance of certain basic events increases or decreases. The initial results produced by the SAPHIRE program are considered relative risk values. None of the results can be interpreted as absolute risk values since the basic event probability values represent estimates of risk associated with the performance of MPC&A tasks throughout the material balance area (MBA). The RRR for a basic event represents the decrease in total system risk that would result from improvement of that one event to a perfect performance level. Improvement of the basic event with the greatest RRR value produces a greater decrease in total system risk than improvement of any other basic event. Basic events with the greatest potential for system risk reduction are assigned performance improvement values, and new fault tree calculations show the improvement in total system risk. The ope

Powell, Danny H [ORNL] [ORNL; Elwood Jr, Robert H [ORNL] [ORNL

2011-01-01T23:59:59.000Z

405

Transaction-Based Building Controls Framework, Volume 1: Reference Guide  

SciTech Connect (OSTI)

This document proposes a framework concept to achieve the objectives of raising buildings’ efficiency and energy savings potential benefitting building owners and operators. We call it a transaction-based framework, wherein mutually-beneficial and cost-effective market-based transactions can be enabled between multiple players across different domains. Transaction-based building controls are one part of the transactional energy framework. While these controls realize benefits by enabling automatic, market-based intra-building efficiency optimizations, the transactional energy framework provides similar benefits using the same market -based structure, yet on a larger scale and beyond just buildings, to the society at large.

Somasundaram, Sriram; Pratt, Robert G.; Akyol, Bora A.; Fernandez, Nicholas; Foster, Nikolas AF; Katipamula, Srinivas; Mayhorn, Ebony T.; Somani, Abhishek; Steckley, Andrew C.; Taylor, Zachary T.

2014-04-28T23:59:59.000Z

406

A Synthetic Biology Framework for Programming Eukaryotic Transcription Functions  

E-Print Network [OSTI]

Eukaryotic transcription factors (TFs) perform complex and combinatorial functions within transcriptional networks. Here, we present a synthetic framework for systematically constructing eukaryotic transcription functions ...

Khalil, Ahmad S.

407

A Valuation-Based Framework for Considering Distributed Generation...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Valuation-Based Framework for Considering Distributed Generation Photovoltaic Tariff Design Preprint Owen R. Zinaman National Renewable Energy Laboratory Nam R. Darghouth...

408

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Germany Coordinates...

409

COMMUNICATION TO THE EDITOR A Restructured Framework for Modeling  

E-Print Network [OSTI]

COMMUNICATION TO THE EDITOR A Restructured Framework for Modeling Oxygen Transfer in Two: This communication proposes a mechanistic modification to a recently published method for analyzing oxygen mass

Daugulis, Andrew J.

410

Tool Kit Framework: Small Town University Energy Program (STEP)  

Broader source: Energy.gov [DOE]

Tool Kit Framework: Small Town University Energy Program (STEP), as posted on the U.S. Department of Energy's Better Buildings Neighborhood Program website.

411

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Norway) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Norway Coordinates...

412

A Scalable Framework for Cyber Attack Discovery and Situational...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Scalable Framework for Cyber Attack Discovery and Situational Understanding (SITU) May 15, 2013 Problem Statement: Cyber attacks cost commercial and governmental organizations vast...

413

A Framework for the Optimization of Integrated Energy Systems...  

Open Energy Info (EERE)

Framework for the Optimization of Integrated Energy Systems(Jain and Alleyne 2012) Home > Groups > Energy Systems Integration Qinsun's picture Submitted by Qinsun(35) Member 15...

414

Risk assessment framework for geologic carbon sequestration sites  

E-Print Network [OSTI]

Framework for geologic carbon sequestration risk assessment,for geologic carbon sequestration risk assessment, Energyfor Geologic Carbon Sequestration, Int. J. of Greenhouse Gas

Oldenburg, C.

2010-01-01T23:59:59.000Z

415

Sandia National Laboratories: metal-organic framework materials  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

metal-organic framework materials Combining 'Tinkertoy' Materials with Solar Cells for Increased Photovoltaic Efficiency On December 4, 2014, in Energy, Materials Science, News,...

416

A Run-Time Verification Framework for Smart Grid Applications Implemented on Simulation Frameworks  

SciTech Connect (OSTI)

Smart grid applications are implemented and tested with simulation frameworks as the developers usually do not have access to large sensor networks to be used as a test bed. The developers are forced to map the implementation onto these frameworks which results in a deviation between the architecture and the code. On its turn this deviation makes it hard to verify behavioral constraints that are de- scribed at the architectural level. We have developed the ConArch toolset to support the automated verification of architecture-level behavioral constraints. A key feature of ConArch is programmable mapping for architecture to the implementation. Here, developers implement queries to identify the points in the target program that correspond to architectural interactions. ConArch generates run- time observers that monitor the flow of execution between these points and verifies whether this flow conforms to the behavioral constraints. We illustrate how the programmable mappings can be exploited for verifying behavioral constraints of a smart grid appli- cation that is implemented with two simulation frameworks.

Ciraci, Selim; Sozer, Hasan; Tekinerdogan, Bedir

2013-05-18T23:59:59.000Z

417

An integrative framework for architecting supply chains  

E-Print Network [OSTI]

This thesis explores the limitations of classic models of supply chain management, and proposes a new view based on the concept of value-driven supply chains, and a method of analysis and design based on the concepts of ...

Cela Díaz, Fernando

2006-01-01T23:59:59.000Z

418

Toward a Framework for Process Evaluation  

E-Print Network [OSTI]

A potentially powerful design for the evaluation of public programs is one which combines an assessment of program processes with an experimentally oriented analysis of program outcomes. Relatively little has been written, ...

Eckels, Timothy J.

419

Radioactive and other environmental threats to the United States and the Arctic resulting from past Soviet activities  

SciTech Connect (OSTI)

Earlier this year the Senate Intelligence Committee began to receive reports from environmental and nuclear scientists in Russia detailing the reckless nuclear waste disposal practices, nuclear accidents and the use of nuclear detonations. We found that information disturbing to say the least. Also troubling is the fact that 15 Chernobyl style RBMK nuclear power reactors continue to operate in the former Soviet Union today. These reactors lack a containment structure and they`re designed in such a way that nuclear reaction can actually increase when the reactor overheats. As scientists here at the University of Alaska have documented, polar air masses and prevailing weather patterns provide a pathway for radioactive contaminants from Eastern Europe and Western Russia, where many of these reactors are located. The threats presented by those potential radioactive risks are just a part of a larger Arctic pollution problem. Every day, industrial activities of the former Soviet Union continue to create pollutants. I think we should face up to the reality that in a country struggling for economic survival, environment protection isn`t necessarily the high priority. And that could be very troubling news for the Arctic in the future.

NONE

1993-12-31T23:59:59.000Z

420

Governance Documentation Management Framework Version 2.00 Contact Officer: Director, Strategic Services and Governance Page 1 of 11  

E-Print Network [OSTI]

; · Supports quality assurance and continuous improvement; and · Assists in the gap analysis of the University's overall policy portfolio. The Governance Document Management Framework provides the rules and tools documents. Policy Levels University-wide Governance Documents -- these include by-laws, rules, policies

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Acceptance Criteria Framework for Autonomous Biological Detectors  

SciTech Connect (OSTI)

The purpose of this study was to examine a set of user acceptance criteria for autonomous biological detection systems for application in high-traffic, public facilities. The test case for the acceptance criteria was the Autonomous Pathogen Detection System (APDS) operating in high-traffic facilities in New York City (NYC). However, the acceptance criteria were designed to be generally applicable to other biological detection systems in other locations. For such detection systems, ''users'' will include local authorities (e.g., facility operators, public health officials, and law enforcement personnel) and national authorities [including personnel from the Department of Homeland Security (DHS), the BioWatch Program, the Centers for Disease Control and Prevention (CDC), and the Federal Bureau of Investigation (FBI)]. The panel members brought expertise from a broad range of backgrounds to complete this picture. The goals of this document are: (1) To serve as informal guidance for users in considering the benefits and costs of these systems. (2) To serve as informal guidance for developers in understanding the needs of users. In follow-up work, this framework will be used to systematically document the APDS for appropriateness and readiness for use in NYC.

Dzenitis, J M

2006-12-12T23:59:59.000Z

422

Simulation framework for intelligent transportation systems  

SciTech Connect (OSTI)

A simulation framework has been developed for a large-scale, comprehensive, scaleable simulation of an Intelligent Transportation System (ITS). The simulator is designed for running on parallel computers and distributed (networked) computer systems, but can run on standalone workstations for smaller simulations. The simulator currently models instrumented smart vehicles with in-vehicle navigation units capable of optimal route planning and Traffic Management Centers (TMC). The TMC has probe vehicle tracking capabilities (display position and attributes of instrumented vehicles), and can provide two-way interaction with traffic to provide advisories and link times. Both the in-vehicle navigation module and the TMC feature detailed graphical user interfaces to support human-factors studies. Realistic modeling of variations of the posted driving speed are based on human factors studies that take into consideration weather, road conditions, driver personality and behavior, and vehicle type. The prototype has been developed on a distributed system of networked UNIX computers but is designed to run on parallel computers, such as ANL`s IBM SP-2, for large-scale problems. A novel feature of the approach is that vehicles are represented by autonomous computer processes which exchange messages with other processes. The vehicles have a behavior model which governs route selection and driving behavior, and can react to external traffic events much like real vehicles. With this approach, the simulation is scaleable to take advantage of emerging massively parallel processor (MPP) systems.

Ewing, T.; Doss, E.; Hanebutte, U.; Tentner, A.

1996-10-01T23:59:59.000Z

423

A structural framework for anomalous change detection and characterization  

SciTech Connect (OSTI)

We present a spatially adaptive scheme for automatically searching a pair of images of a scene for unusual and interesting changes. Our motivation is to bring into play structural aspects of image features alongside the spectral attributes used for anomalous change detection (ACD). We leverage a small but informative subset of pixels, namely edge pixels of the images, as anchor points of a Delaunay triangulation to jointly decompose the images into a set of triangular regions, called trixels, which are spectrally uniform. Such decomposition helps in image regularization by simple-function approximation on a feature-adaptive grid. Applying ACD to this trixel grid instead of pixels offers several advantages. It allows: (1) edge-preserving smoothing of images, (2) speed-up of spatial computations by significantly reducing the representation of the images, and (3) the easy recovery of structure of the detected anomalous changes by associating anomalous trixels with polygonal image features. The latter facility further enables the application of shape-theoretic criteria and algorithms to characterize the changes and recognize them as interesting or not. This incorporation of spatial information has the potential to filter out some spurious changes, such as due to parallax, shadows, and misregistration, by identifying and filtering out those that are structurally similar and spatially pervasive. Our framework supports the joint spatial and spectral analysis of images, potentially enabling the design of more robust ACD algorithms.

Prasad, Lakshman [Los Alamos National Laboratory; Theiler, James P [Los Alamos National Laboratory

2009-01-01T23:59:59.000Z

424

EMC studies using the simulation framework of PANDA  

E-Print Network [OSTI]

The Anti-Proton ANnihilation at DArmstadt (PANDA) experiment proposed at the Facility for Antiproton and Ion Research (FAIR) in Darmstadt (Germany) will perform a high precision spectroscopy of charmonium and exotic hadrons, such as hybrids, glueballs and hypernuclei. A highly intense beam of anti-protons provided by High Energy Storage Ring (HESR) with an unprecedented resolution will scan a mass range of 2 to 5.5 GeV/c2. In preparation for experiments with PANDA, careful and large-scale simulation studies need to be performed in the coming years to determine analysis strategies, to provide feedback for the design, construction and performance optimization of individual detector components and to design methods for the calibration and interpretation of the experimental results. Results of a simulation for the ElectroMagnetic Calorimeter (EMC), built from lead tungstate (PWO) crystals and placed inside the Target Spectrometer (TS), are presented. The simulations were carried out using the PandaRoot framework, which is based on ROOT and being developed by the PANDA collaboration.

Aleksandra Biegun; for the PANDA collaboration

2010-01-26T23:59:59.000Z

425

An Innovative Framework Supporting SME Networks for Complex Product Manufacturing  

E-Print Network [OSTI]

An Innovative Framework Supporting SME Networks for Complex Product Manufacturing Luis Maia.kankaanpaa@uwasa.fi, ahsh@uwasa.fi Abstract. Current market dynamics require European SME's to focus on complex products collaboration processes and supporting ICT tools. This paper presents a framework to support SME

Boyer, Edmond

426

School/College Priorities Aligned with Campus Strategic Framework  

E-Print Network [OSTI]

School/College Priorities Aligned with Campus Strategic Framework April 2009 Every school, guiding framework. This document highlights priorities/efforts in each school/college that are specifically aligned to advance the campus priorities. · College of Agricultural & Life Sciences · School

Sheridan, Jennifer

427

A Web Usage Mining Framework for Web Directories Personalization  

E-Print Network [OSTI]

A Web Usage Mining Framework for Web Directories Personalization Dimitrios Pierrakos Department framework that combines Web personalization and Web directories, which results in the concept of Community Web Directories. Community Web directories is a novel form of personalization performed on Web

Kouroupetroglou, Georgios

428

An MRI Segmentation Framework for Brains with Anatomical Marcelinus Prastawa  

E-Print Network [OSTI]

An MRI Segmentation Framework for Brains with Anatomical Deviations Marcelinus Prastawa;ABSTRACT MARCELINUS PRASTAWA: An MRI Segmentation Framework for Brains with Anatomical Deviations (Under the direction of Guido Gerig, Ph.D.) The segmentation of brain Magnetic Resonance (MR) images, where the brain

Whitton, Mary C.

429

A Document Model Management Framework based on Core Components  

E-Print Network [OSTI]

A Document Model Management Framework based on Core Components Michael Strommer, Christian Pichler for a consistent framework for the management of electronic business documents, together with tool support rises. Tools, that foster the management of document models in a way to overcome interoperability issues

430

Attack Containment Framework for Large-Scale Critical Infrastructures  

E-Print Network [OSTI]

Attack Containment Framework for Large-Scale Critical Infrastructures Hoang Nguyen Department-- We present an attack containment framework against value-changing attacks in large-scale critical structure, called attack container, which captures the trust behavior of a group of nodes and assists

Nahrstedt, Klara

431

A Catenated Strut in a Catenated Metal–Organic Framework  

SciTech Connect (OSTI)

Mechanically interlocked molecules (MIMs), in the form of donor–acceptor [2]catenane-containing struts of exceptional length, have been incorporated into a three-dimensional catenated metal–organic framework (MOF) at precise locations and with uniform relative orientations. Catenation is expressed simultaneously within the struts and the framework.

Li, Qiaowei [Fudan Univ., Shanghai (China); Sue, Chi-Hau [Univ. of California, Los Angeles, CA (United States); Basu, Subhadeep [Northwestern Univ., Evanston, IL (United States); Shveyd, Alexander K. [Northwestern Univ., Evanston, IL (United States); Zhang, Wenyu [Univ. of California, Los Angeles, CA (United States); Barin, Gokhan [Northwestern Univ., Evanston, IL (United States); Fang, Lei [Northwestern Univ., Evanston, IL (United States); Sarjeant, Amy A. [Northwestern Univ., Evanston, IL (United States); Stoddart, J. Fraser [Northwestern Univ., Evanston, IL (United States); Yaghi, Omar M [Univ. of California, Los Angeles, CA (United States)

2010-01-01T23:59:59.000Z

432

The IBM Health Integration Framework: Accelerating solutions for smarter healthcare  

E-Print Network [OSTI]

in improving health- care access, cost, quality of care and patient satisfaction. But progress can take many Integration Framework is a unified software platform for implementing comprehensive solutions for health- careThe IBM Health Integration Framework: Accelerating solutions for smarter healthcare Healthcare

433

A NONLINEAR MODELING FRAMEWORK FOR AUTONOMOUS CRUISE CONTROL Gabor Orosz  

E-Print Network [OSTI]

.) and allows optimization in the entire torque and engine speed range (e.g., for energy consumption). NONLINEARA NONLINEAR MODELING FRAMEWORK FOR AUTONOMOUS CRUISE CONTROL G´abor Orosz Department of Mechanical A nonlinear modeling framework is presented for au- tonomous cruise control (ACC) equipped vehicles which

Daly, Samantha

434

Update on the Development of the Cybersecurity Framework  

E-Print Network [OSTI]

Update on the Development of the Cybersecurity Framework June 18, 2013 Under Executive Order 13636, Improving Critical Infrastructure Cybersecurity, the National Institute of Standards and Technology (NIST of the Cybersecurity Framework by issuing a Request for Information (RFI) in February to gather relevant input from

Bentz, Dale P.

435

Update on the Development of the Cybersecurity Framework  

E-Print Network [OSTI]

Update on the Development of the Cybersecurity Framework July 24, 2013 Under Executive Order 13636, Improving Critical Infrastructure Cybersecurity, the National Institute of Standards and Technology (NIST, and practices ­ for reducing cybersecurity risks to critical infrastructure. NIST is developing the Framework

Bentz, Dale P.

436

Nanoporus Silicate Frameworks Nanoporous Copper Silicates with One-Dimen-  

E-Print Network [OSTI]

Nanoporus Silicate Frameworks Nanoporous Copper Silicates with One-Dimen- sional 12-Ring Channel, and their potential use as components in advanced nanocomposites.[1­4] Nanoporous transition-metal silicates for the synthesis of transition-metal-silicate open-framework and microporous compounds that uses a common building

Wang, Xiqu

437

Optimized Uncertainty Quantification Algorithm Within a Dynamic Event Tree Framework  

SciTech Connect (OSTI)

Methods for developing Phenomenological Identification and Ranking Tables (PIRT) for nuclear power plants have been a useful tool in providing insight into modelling aspects that are important to safety. These methods have involved expert knowledge with regards to reactor plant transients and thermal-hydraulic codes to identify are of highest importance. Quantified PIRT provides for rigorous method for quantifying the phenomena that can have the greatest impact. The transients that are evaluated and the timing of those events are typically developed in collaboration with the Probabilistic Risk Analysis. Though quite effective in evaluating risk, traditional PRA methods lack the capability to evaluate complex dynamic systems where end states may vary as a function of transition time from physical state to physical state . Dynamic PRA (DPRA) methods provide a more rigorous analysis of complex dynamic systems. A limitation of DPRA is its potential for state or combinatorial explosion that grows as a function of the number of components; as well as, the sampling of transition times from state-to-state of the entire system. This paper presents a method for performing QPIRT within a dynamic event tree framework such that timing events which result in the highest probabilities of failure are captured and a QPIRT is performed simultaneously while performing a discrete dynamic event tree evaluation. The resulting simulation results in a formal QPIRT for each end state. The use of dynamic event trees results in state explosion as the number of possible component states increases. This paper utilizes a branch and bound algorithm to optimize the solution of the dynamic event trees. The paper summarizes the methods used to implement the branch-and-bound algorithm in solving the discrete dynamic event trees.

J. W. Nielsen; Akira Tokuhiro; Robert Hiromoto

2014-06-01T23:59:59.000Z

438

An analytical framework for capacity development in EIA - The case of Yemen  

SciTech Connect (OSTI)

Most countries worldwide nowadays apply Environmental Assessment (EA) as an ex ante tool to evaluate environmental impacts of policies, plans, programmes, and projects. However, the application and performance of EA differ significantly. Scientific analysis of how EA performs mainly focuses on two levels: the micro (or project) level and the macro (or system) level. Macro level analysis usually focuses on institutions for EA and the organisation of stakeholder interaction in EA. This article proposes a more comprehensive framework for analysing EA systems that combines other approaches with a capacity approach and an explicit consideration of the context in which EA systems are developed and performed. In order to illustrate the value of our framework, we apply it to the Republic of Yemen, where over the last decades many EA capacity development programmes have been executed; however, EA performance has not substantially improved. The Yemen case study illustrates that the capacity development approach allows an understanding of the historical process, the stakeholders, the knowledge component, and the material and technical aspects of EA, but perhaps more important is a systemic understanding of the outcomes: problems are not isolated, but influence and even maintain each other. In addition, by taking into account the context characteristics, our framework allows for the assessment of the feasibility of capacity development programmes that aim at improving EA system performance.

Loon, Louise van, E-mail: louise.van.loon@gmail.co [Copernicus Institute for Sustainable Development and Innovation, Utrecht University, P.O. Box 80115, 3508 TC (Netherlands); Driessen, Peter P.J., E-mail: p.driessen@geo.uu.n [Copernicus Institute for Sustainable Development and Innovation, Utrecht University, P.O. Box 80115, 3508 TC (Netherlands); Kolhoff, Arend, E-mail: akolhoff@eia.n [Netherlands Commission for Environmental Assessment, P.O. Box 2345, 3500 GH Utrecht (Netherlands); Runhaar, Hens A.C., E-mail: h.runhaar@geo.uu.n [Copernicus Institute for Sustainable Development and Innovation, Utrecht University, P.O. Box 80115, 3508 TC (Netherlands)

2010-02-15T23:59:59.000Z

439

Pillared and open-framework uranyl diphosphonates  

SciTech Connect (OSTI)

The hydrothermal reactions of uranium trioxide, uranyl acetate, or uranyl nitrate with 1,4-benzenebisphosphonic acid in the presence of very small amount of HF at 200 deg. C results in the formation of three different uranyl diphosphonate compounds, [H{sub 3}O]{sub 2}{l_brace}(UO{sub 2}){sub 6}[C{sub 6}H{sub 4}(PO{sub 3})(PO{sub 2}OH)]{sub 2}[C{sub 6}H{sub 4}(PO{sub 2}OH){sub 2}]{sub 2}[C{sub 6}H{sub 4}(PO{sub 3}){sub 2}]{r_brace}(H{sub 2}O){sub 2} (Ubbp-1), [H{sub 3}O]{sub 4}{l_brace}(UO{sub 2}){sub 4}[C{sub 6}H{sub 4}(PO{sub 3}){sub 2}]{sub 2}F{sub 4}{r_brace}.H{sub 2}O (Ubbp-2), and {l_brace}(UO{sub 2})[C{sub 6}H{sub 2}F{sub 2}(PO{sub 2}OH){sub 2}(H{sub 2}O){r_brace}{sub 2}.H{sub 2}O (Ubbp-3). The crystal structures of these compounds were determined by single crystal X-ray diffraction experiments. Ubbp-1 consists of UO{sub 7} pentagonal bipyramids that are bridged by the phosphonate moieties to form a three-dimensional pillared structure. Ubbp-2 is composed of UO{sub 5}F{sub 2} pentagonal bipyramids that are bridged through the phosphonate oxygen atoms into one-dimensional chains that are cross-linked by the phenyl spacers into a pillared structure. The structure of Ubbp-3 is a three-dimensional open-framework with large channels containing water molecules with internal dimensions of approximately 10.9x10.9 A. Ubbp-1 and Ubbp-2 fluoresce at room temperature. - Graphical Abstract: Illustration of the three-dimensional open-framework structure of {l_brace}(UO{sub 2})[C{sub 6}H{sub 2}F{sub 2}(PO{sub 2}OH){sub 2}(H{sub 2}O){r_brace}{sub 2}.H{sub 2}O viewed along the c-axis. The structure is constructed from UO{sub 7} units, pentagonal bipyramids=green, oxygen=red, phosphorus=magenta, carbon=black, hydrogen=white. Highlights: > The influence of the uranyl salt anions and pH were critically examined in relation to structural variation. > The acetate and nitrate counter ions of uranyl may be acting as structure directing agents. > The use of rigid phenyl spacer yield a three-dimensional network of pillared structures of uranyl diphosphonates that fluoresce. > The fluorination of the phenyl ring under hydrothermal condition. > The large voids in this structure are suggestive of potential applications in sorption, separation of gases and in catalytic processes.

Adelani, Pius O. [Department of Civil Engineering and Geological Sciences, 156 Fitzpatrick Hall, University of Notre Dame, Notre Dame, IN 46556 (United States); Department of Chemistry and Biochemistry, 156 Fitzpatrick Hall, University of Notre Dame, Notre Dame, IN 46556 (United States); Albrecht-Schmitt, Thomas E., E-mail: talbrec1@nd.edu [Department of Civil Engineering and Geological Sciences, 156 Fitzpatrick Hall, University of Notre Dame, Notre Dame, IN 46556 (United States); Department of Chemistry and Biochemistry, 156 Fitzpatrick Hall, University of Notre Dame, Notre Dame, IN 46556 (United States)

2011-09-15T23:59:59.000Z

440

Argonne simulation framework for intelligent transportation systems  

SciTech Connect (OSTI)

A simulation framework has been developed which defines a high-level architecture for a large-scale, comprehensive, scalable simulation of an Intelligent Transportation System (ITS). The simulator is designed to run on parallel computers and distributed (networked) computer systems; however, a version for a stand alone workstation is also available. The ITS simulator includes an Expert Driver Model (EDM) of instrumented ``smart`` vehicles with in-vehicle navigation units. The EDM is capable of performing optimal route planning and communicating with Traffic Management Centers (TMC). A dynamic road map data base is sued for optimum route planning, where the data is updated periodically to reflect any changes in road or weather conditions. The TMC has probe vehicle tracking capabilities (display position and attributes of instrumented vehicles), and can provide 2-way interaction with traffic to provide advisories and link times. Both the in-vehicle navigation module and the TMC feature detailed graphical user interfaces that includes human-factors studies to support safety and operational research. Realistic modeling of variations of the posted driving speed are based on human factor studies that take into consideration weather, road conditions, driver`s personality and behavior and vehicle type. The simulator has been developed on a distributed system of networked UNIX computers, but is designed to run on ANL`s IBM SP-X parallel computer system for large scale problems. A novel feature of the developed simulator is that vehicles will be represented by autonomous computer processes, each with a behavior model which performs independent route selection and reacts to external traffic events much like real vehicles. Vehicle processes interact with each other and with ITS components by exchanging messages. With this approach, one will be able to take advantage of emerging massively parallel processor (MPP) systems.

Ewing, T.; Doss, E.; Hanebutte, U.; Canfield, T.; Brown-VanHoozer, A.; Tentner, A.

1996-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

IBM Healthcare Industry Framework Provider Version  

E-Print Network [OSTI]

also called an internist to admit John overnight for observation. A Nuclear stress test was performed they care for patients and manage their performance. First, MRTAS helps providers automate the collection and analysis of structured and unstructured data, a manual process typically performed by a team of nurses

442

A framework for optimization and quantification of uncertainty and sensitivity for developing carbon capture systems  

SciTech Connect (OSTI)

Under the auspices of the U.S. Department of Energy’s Carbon Capture Simulation Initiative (CCSI), a Framework for Optimization and Quantification of Uncertainty and Sensitivity (FOQUS) has been developed. This tool enables carbon capture systems to be rapidly synthesized and rigorously optimized, in an environment that accounts for and propagates uncertainties in parameters and models. FOQUS currently enables (1) the development of surrogate algebraic models utilizing the ALAMO algorithm, which can be used for superstructure optimization to identify optimal process configurations, (2) simulation-based optimization utilizing derivative free optimization (DFO) algorithms with detailed black-box process models, and (3) rigorous uncertainty quantification through PSUADE. FOQUS utilizes another CCSI technology, the Turbine Science Gateway, to manage the thousands of simulated runs necessary for optimization and UQ. This computational framework has been demonstrated for the design and analysis of a solid sorbent based carbon capture system.

John C Eslick, John C; Ng, Brenda Ng; Gao, Qianwen; Tong, Charles H.; Sahinidis, Nikolaos V.; Miller, David C.

2014-01-01T23:59:59.000Z

443

A new scenario framework for Climate Change Research: Scenario matrix architecture  

SciTech Connect (OSTI)

In this paper, we present the scenario matrix architecture as part of the new scenario framework for climate change research. The matrix architecture focuses on a key question of current climate research, namely the identification of trade-offs and synergies (in terms of risks, costs and other consequences) of different adaptation and mitigation strategies. The framework has two main axes: 1) the level of forcing (as represented by the RCPs) and 2) different socio-economic reference pathways. The matrix can be used as a tool to guide new scenario development and analytical analysis. It can also be used as a heuristic tool for classifying new and existing scenarios for assessment. Key elements of the architecture, in particular the shared socio-economic reference pathways and the shared policy assumptions, are elaborated in other papers in this special issue.

Van Vuuren, Detlef; Kriegler, Elmar; O'Neill, Brian; Ebi, Kristie L.; Riahi, Keywan; Carter, Tim; Edmonds, James A.; Hallegatte, Stephane; Kram, Tom; Mathur, Ritu; Winkler, Harald

2014-02-01T23:59:59.000Z

444

BI (XML) Publisher Conversion from Third Party Software in E-Business Suite: An ERP (Enterprise Resource Planning) Reporting Framework Conversion Model  

E-Print Network [OSTI]

by internal users for data analysis purposes such as monthly sales reports and ledger consolidation reports. These reports, such as the packing list report and purchase order report, which are sent to the external customers for communication purposes, need.... 2012) Some companies have decided to implement their own ERP framework because they want to have full control of the ERP system and make sure that the ERP framework is 100 percent tailored to the business process. Other companies prefer to purchase...

Wang, Shuai

2012-05-11T23:59:59.000Z

445

global threat reduction initiative  

National Nuclear Security Administration (NNSA)

HEU fresh and spent fuel from Russian-designed research reactors worldwide to Russia.

  • Repatriating U.S.-origin HEU and LEU spent nuclear fuel from Training,...

  • 446

    Global Threat Reduction Initiative  

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel Cell VehicleEnergy (5Temperatures |Our GridDepartment The

    447

    Global Threat Reduction Initiative  

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGY TAX POLICIES7.pdfFuel Cell VehicleEnergy (5Temperatures |Our GridDepartment The

    448

    Protecting Against Nuclear Threats  

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearch Welcome to theNews

    449

    design basis threat  

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Review of theOFFICE OF CIVILAMENDMENT20/%2A en Design Basis

    450

    nuclear threat science  

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Review of theOFFICE OF8/%2A ennike | National7/%2A en8/%2A en

    451

    Emerging Threats and Opportunities  

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest Region service area. TheEPSCI Home It is the|Resources »EmergingEmerging

    452

    Adaptive Reliability Analysis of Excavation Problems  

    E-Print Network [OSTI]

    . This analysis couples the adaptive design capabilities of the observational method with updated reliability indices, to be used in risk-based design decisions. A probabilistic framework is developed to predict three-dimensional deformation profiles due...

    Park, Jun Kyung

    2012-10-19T23:59:59.000Z

    453

    Hydrogen Storage in Metal-Organic Frameworks  

    SciTech Connect (OSTI)

    Conventional storage of large amounts of hydrogen in its molecular form is difficult and expensive because it requires employing either extremely high pressure gas or very low temperature liquid. Because of the importance of hydrogen as a fuel, the DOE has set system targets for hydrogen storage of gravimetric (5.5 wt%) and volumetric (40 g L-1) densities to be achieved by 2015. Given that these are system goals, a practical material will need to have higher capacity when the weight of the tank and associated cooling or regeneration system is considered. The size and weight of these components will vary substantially depending on whether the material operates by a chemisorption or physisorption mechanism. In the latter case, metal-organic frameworks (MOFs) have recently been identified as promising adsorbents for hydrogen storage, although little data is available for their sorption behavior. This grant was focused on the study of MOFs with these specific objectives. (1) To examine the effects of functionalization, catenation, and variation of the metal oxide and organic linkers on the low-pressure hydrogen adsorption properties of MOFs. (2) To develop a strategy for producing MOFs with high surface area and porosity to reduce the dead space and increase the hydrogen storage capacity per unit volume. (3) To functionalize MOFs by post synthetic functionalization with metals to improve the adsorption enthalpy of hydrogen for the room temperature hydrogen storage. This effort demonstrated the importance of open metal sites to improve the adsorption enthalpy by the systematic study, and this is also the origin of the new strategy, which termed isoreticular functionalization and metalation. However, a large pore volume is still a prerequisite feature. Based on our principle to design highly porous MOFs, guest-free MOFs with ultrahigh porosity have been experimentally synthesized. MOF-210, whose BET surface area is 6240 m2 g-1 (the highest among porous solids), takes up 15 wt% of total H2 uptake at 80 bar and 77 K. More importantly, the total H2 uptake by MOF-210 was 2.7 wt% at 80 bar and 298 K, which is the highest number reported for physisorptive materials.

    Omar M. Yaghi

    2012-04-26T23:59:59.000Z

    454

    DeepView: A collaborative framework for distributed microscopy  

    SciTech Connect (OSTI)

    This paper outlines the motivation, requirements, and architecture of a collaborative framework for distributed virtual microscopy. In this context, the requirements are specified in terms of (1) functionality, (2) scalability, (3) interactivity, and (4) safety and security. Functionality refers to what and how an instrument does something. Scalability refers to the number of instruments, vendor-specific desktop workstations, analysis programs, and collaborators that can be accessed. Interactivity refers to how well the system can be steered either for static or dynamic experiments. Safety and security refers to safe operation of an instrument coupled with user authentication, privacy, and integrity of data communication. To meet these requirements, we introduce three types of services in the architecture: Instrument Services (IS), Exchange Services (ES), and Computational Services (CS). These services may reside on any host in the distributed system. The IS provide an abstraction for manipulating different types of microscopes; the ES provide common services that are required between different resources; and the CS provide analytical capabilities for data analysis and simulation. These services are brought together through CORBA and its enabling services, e.g., Event Services, Time Services, Naming Services, and Security Services. Two unique applications have been introduced into the CS for analyzing scientific images either for instrument control or recovery of a model for objects of interest. These include: in-situ electron microscopy and recovery of 3D shape from holographic microscopy. The first application provides a near real-time processing of the video-stream for on-line quantitative analysis and the use of that information for closed-loop servo control. The second application reconstructs a 3D representation of an inclusion (a crystal structure in a matrix) from multiple views through holographic electron microscopy. These application require steering external stimuli or computational parameters for a particular result. In a sense, ''computational instruments'' (symmetric multiprocessors) interact closely with data generated from ''experimental instruments'' (unique microscopes) to conduct new experiments and bring new functionalities to these instruments. Both of these features exploit high-performance computing and low-latency networks to bring novel functionalities to unique scientific imaging instruments.

    Parvin, B.; Taylor, J.; Cong, G.

    1998-08-10T23:59:59.000Z

    455

    Characterizing a tropical deforestation wave: a dynamic spatial analysis of a deforestation hotspot in the  

    E-Print Network [OSTI]

    Characterizing a tropical deforestation wave: a dynamic spatial analysis of a deforestation hotspot deforestation is the major contemporary threat to global biodiversity, because a diminishing extent of tropical of deforestation. How- ever, it is not a random process, but often moves in waves originating from settled areas

    Queensland, University of

    456

    NEUTRONICS ANALYSIS OF A SELF-COOLED BLANKET FOR A LASER FUSION PLANT WITH MAGNETIC DIVERSION  

    E-Print Network [OSTI]

    NEUTRONICS ANALYSIS OF A SELF-COOLED BLANKET FOR A LASER FUSION PLANT WITH MAGNETIC DIVERSION M. INTRODUCTION The High Average Power Laser (HAPL) program is carrying out a coordinated effort to develop laser accommodate the ion and photon threat spectra from the fusion micro-explosion over its required lifetime

    Raffray, A. René

    457

    Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices  

    E-Print Network [OSTI]

    Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices Marko threats to a nuclear power plant in the year 1991 and after the 9/11 events in 2001. The methodology which strength and injuries of human beings with nuclear power plant models used in probabilistic safety

    Cizelj, Leon

    458

    Fuzzy risk analysis for nuclear safeguards  

    SciTech Connect (OSTI)

    Analysis of a safeguards system, based on the notion of fuzzy sets and linguistic variables, concerns such as complexity and inherent imprecision in estimating the possibility of loss or compromise. The automated risk analysis allows the risk to be determined for an entire system based on estimates for lowest level components and the component proportion. In addition, for each component (asset) the most effective combination of protection mechanisms against a given set of threats is determined. A distinction between bar and featured risk is made.

    Zardecki, A.

    1993-01-01T23:59:59.000Z

    459

    Fuzzy risk analysis for nuclear safeguards  

    SciTech Connect (OSTI)

    Analysis of a safeguards system, based on the notion of fuzzy sets and linguistic variables, concerns such as complexity and inherent imprecision in estimating the possibility of loss or compromise. The automated risk analysis allows the risk to be determined for an entire system based on estimates for lowest level components and the component proportion. In addition, for each component (asset) the most effective combination of protection mechanisms against a given set of threats is determined. A distinction between bar and featured risk is made.

    Zardecki, A.

    1993-05-01T23:59:59.000Z

    460

    Primer Control System Cyber Security Framework and Technical Metrics  

    SciTech Connect (OSTI)

    The Department of Homeland Security National Cyber Security Division supported development of a control system cyber security framework and a set of technical metrics to aid owner-operators in tracking control systems security. The framework defines seven relevant cyber security dimensions and provides the foundation for thinking about control system security. Based on the developed security framework, a set of ten technical metrics are recommended that allow control systems owner-operators to track improvements or degradations in their individual control systems security posture.

    Wayne F. Boyer; Miles A. McQueen

    2008-05-01T23:59:59.000Z

    Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
    While these samples are representative of the content of NLEBeta,
    they are not comprehensive nor are they the most current set.
    We encourage you to perform a real-time search of NLEBeta
    to obtain the most current and comprehensive results.


    461

    Universal Framework for Quantum Error-Correcting Codes  

    E-Print Network [OSTI]

    We present a universal framework for quantum error-correcting codes, i.e., the one that applies for the most general quantum error-correcting codes. This framework is established on the group algebra, an algebraic notation for the nice error bases of quantum systems. The nicest thing about this framework is that we can characterize the properties of quantum codes by the properties of the group algebra. We show how it characterizes the properties of quantum codes as well as generates some new results about quantum codes.

    Zhuo Li; Li-Juan Xing

    2009-01-04T23:59:59.000Z

    462

    Demonstration of the Federation of OMF Control Framework with PlanetLab Peer-to-peer resolution of an obstacle problem using the P2Pdc framework  

    E-Print Network [OSTI]

    of an obstacle problem using the P2Pdc framework Scenario: - Distributed Application for Problem Solving

    Ingrand, François

    463

    NIST Smart Grid Framework Status Report This summary report provides a status update on the NIST smart grid interoperability framework. The  

    E-Print Network [OSTI]

    NIST Smart Grid Framework Status Report This summary report provides a status update on the NIST smart grid interoperability framework. The NIST smart grid framework is a NIST special publication document (NIST SP1108, NIST Framework and Roadmap for Smart Grid Interoperability Standards, Releases 1, 2

    464

    Liebhold, A.M., W.L. Macdonald, D.Bergdahl, and V.C. Mastro. 1995. Invasion by Exotic Forest Pests: A Threat to Forest Ecosystems. Forest Science Monographs 30. 49 p.  

    E-Print Network [OSTI]

    Liebhold, A.M., W.L. Macdonald, D.Bergdahl, and V.C. Mastro. 1995. Invasion by Exotic Forest Pests: A Threat to Forest Ecosystems ANDREW M. LIEBHOLD WILLIAM L. MACDONALD DALE BERGDAHL VICTOR C. MASTRO FOREST

    Liebhold, Andrew

    465

    Regulatory Framework at LANL.pdf  

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared at 278, 298,NIST3 AÇORIANONewsRegulatory Analysis onEnvironmental

    466

    Power to the people : a framework for enhancing environmental stewardship through community design  

    E-Print Network [OSTI]

    The actions and activities of average Americans contribute greatly to global warming, fossil fuel consumption, natural resource depletion, and other environmentally-related threats to humankind. Currently, the negative ...

    Rosenfeld, Mathias

    2007-01-01T23:59:59.000Z

    467

    Crowdsourcing Multimedia QoE Evaluation: A Trusted Framework  

    E-Print Network [OSTI]

    demonstrate the effectiveness and efficiency of the proposed framework by a comparison with MOS. Moreover, National Taiwan University, Taipei 106, Taiwan (e-mail: bipa@fractal.ee.ntu.edu.tw; congo@fractal.ee.ntu.

    Chen, Sheng-Wei

    468

    Lithium-based inorganic-organic framework materials  

    E-Print Network [OSTI]

    This dissertation describes research into lithium-based inorganic-organic frameworks, which has led to an increased understanding of the structural diversity and properties of these materials. The crystal structures of 11 new forms of lithium...

    Yeung, Hamish Hei-Man

    2013-01-01T23:59:59.000Z

    469

    New Modularization Framework Transforms FAST Wind Turbine Modeling...  

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    framework. In November 2013, NREL presented a full-day workshop on FAST in Frankfurt, Germany, hosted by the University of Stuttgart. The workshop was attended by 50 participants,...

    470

    Framework for policy aware reuse of content on the WWW  

    E-Print Network [OSTI]

    This thesis focuses on methods for detecting and preventing license violations, in a step towards policy aware content reuse on the Web. This framework builds upon the Creative Commons (CC) Rights Expression Language, which ...

    Seneviratne, Oshani Wasana

    2009-01-01T23:59:59.000Z

    471

    FEMINIZM4ALL : a framework for feminist technology intervention  

    E-Print Network [OSTI]

    This thesis describes a feminist framework for technological interventions. I first define the problem by contrasting studies from psychology with research from other social sciences to determine that the primary reason ...

    Rüst, Annina Julia

    2008-01-01T23:59:59.000Z

    472

    A Framework for Modeling Uncertainty in Regional Climate Change  

    E-Print Network [OSTI]

    In this study, we present a new modeling framework and a large ensemble of climate projections to investigate the uncertainty in regional climate change over the US associated with four dimensions of uncertainty. The sources ...

    Monier, Erwan

    473

    Design of novel lithium storage materials with a polyanionic framework  

    E-Print Network [OSTI]

    Lithium ion batteries for large-scale applications demand a strict safety standard from a cathode material during operating cycles. Lithium manganese borate (LiMnBO?) that crystallizes into a hexagonal or monoclinic framework ...

    Kim, Jae Chul, Ph. D. Massachusetts Institute of Technology

    2014-01-01T23:59:59.000Z

    474

    A unifying framework for watershed thermodynamics: balance equations for mass,  

    E-Print Network [OSTI]

    A unifying framework for watershed thermodynamics: balance equations for mass, momentum, energy Hassanizadehb a Centre for Water Research, Department of Environmental Engineering, The University of Western Australia, 6907 Nedlands, Australia b Department of Water Management, Environmental and Sanitary Engineering

    Hassanizadeh, S. Majid

    475

    A Design Framework for Metaheuristics Colin G. Johnson  

    E-Print Network [OSTI]

    A Design Framework for Metaheuristics Colin G. Johnson School of Computing University of Kent Canterbury, Kent, CT2 7NF C.G.Johnson@kent.ac.uk Published in Artificial Intelligence Review, 29(2), April

    Kent, University of

    476

    A Bayesian framework for fracture characterization from surface seismic data  

    E-Print Network [OSTI]

    We describe a methodology for quantitatively characterizing the fractured nature of a hydrocarbon or geothermal reservoir from surface seismic data under a Bayesian inference framework. Fractures provide pathways for fluid ...

    Zamanian, S. Ahmad

    2012-01-01T23:59:59.000Z

    477

    A poset framework to model decentralized control problems  

    E-Print Network [OSTI]

    In a previous paper, these authors showed that posets provide a useful modeling framework for a reasonably large class of decentralized control problems. In this paper we show more connections between posets and decentralized ...

    Shah, Parikshit

    478

    Robtic Lab Demonstrators and Educational Framework Mentor Alexander Frster  

    E-Print Network [OSTI]

    , humanoid robots. All these platforms have different application pro- gramming interfaces, control software, application frameworks, and algorithmic libraries, based on the robot's capabilities, application scenarios on the robots, · demo applications to demonstrate the characteristics of the programming interface

    Krause, Rolf

    479

    A Framework for Connecting Natural Language and Symbol Sense ...  

    E-Print Network [OSTI]

    Discussion And Reflection Enhancement (DARE) Pre-Reading Questions. 1. ... selected from 6th grade sample items provided by the Indiana Statewide Testing for ..... framework was designed and applied to word problems in middle school ...

    Rachael Kenney

    2013-08-09T23:59:59.000Z

    480

    Actors, coalitions and the framework convention on climate change  

    E-Print Network [OSTI]

    This study examines the political processes through which the Framework Convention on Climate Change was negotiated and the initial efforts of the United States, the Netherlands, and Japan to adopt national policies and ...

    Sewell, Granville C

    2005-01-01T23:59:59.000Z

    Note: This page contains sample records for the topic "threat analysis framework" from the National Library of EnergyBeta (NLEBeta).
    While these samples are representative of the content of NLEBeta,
    they are not comprehensive nor are they the most current set.
    We encourage you to perform a real-time search of NLEBeta
    to obtain the most current and comprehensive results.


    481

    Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks  

    E-Print Network [OSTI]

    1 Spectrum Auction Framework for Access Allocation in Cognitive Radio Networks Gaurav S. Kasbekar does not exist. Index Terms Cognitive Radio Networks, Spectrum Auctions, Algorithms I. INTRODUCTION, Wireless Meteropolitan Area networks etc., demand for radio spectrum is increasing. Currently, spectrum

    Sarkar, Saswati

    482

    General Framework using Affine Transformations to Formation Control  

    E-Print Network [OSTI]

    [2001] and autonomous systems as underwater and unmanned air vehicles (AUVs and UAVs) Fiorelli et al-linear systems representing AUVs (autonomous underwater vehicles). This paper proposes a novel framework which

    Paris-Sud XI, Université de

    483

    An Optimization-Based Framework for Automated Market-Making  

    E-Print Network [OSTI]

    An Optimization-Based Framework for Automated Market-Making Jacob Abernethy EECS Department UC that copies are not made or distributed for profit or commercial advantage and that copies bear this notice

    Chen, Yiling

    484

    INCOHERENCE AND THE PARAMETRIC TEST FRAMEWORK: MISCONCEIVED RELATIONSHIPS AMONG SAMPLE, SAMPLING DISTRIBUTION, AND POPULATION  

    E-Print Network [OSTI]

    INCOHERENCE AND THE PARAMETRIC TEST FRAMEWORK: MISCONCEIVED RELATIONSHIPS AMONG SAMPLE, SAMPLING Keywords: Parametric test, sample, population, sampling distributions Parametric tests are frequently parametric tests, nor hold beliefs that are consistent with that framework. The parametric test framework

    Yu, Alex

    485

    ITL BULLETIN FOR MARCH 2013 NIST TO DEVELOP A CYBERSECURITY FRAMEWORK TO PROTECT CRITICAL INFRASTRUCTURE  

    E-Print Network [OSTI]

    ITL BULLETIN FOR MARCH 2013 NIST TO DEVELOP A CYBERSECURITY FRAMEWORK TO PROTECT CRITICAL, "Improving Critical Infrastructure Cybersecurity," the President has directed NIST to develop a voluntary framework for reducing cyber risks to our nation's critical infrastructure. The Cybersecurity Framework

    486

    Simulated, Emulated, and Physical Investigative Analysis (SEPIA) of networked systems.  

    SciTech Connect (OSTI)

    This report describes recent progress made in developing and utilizing hybrid Simulated, Emulated, and Physical Investigative Analysis (SEPIA) environments. Many organizations require advanced tools to analyze their information system's security, reliability, and resilience against cyber attack. Today's security analysis utilize real systems such as computers, network routers and other network equipment, computer emulations (e.g., virtual machines) and simulation models separately to analyze interplay between threats and safeguards. In contrast, this work developed new methods to combine these three approaches to provide integrated hybrid SEPIA environments. Our SEPIA environments enable an analyst to rapidly configure hybrid environments to pass network traffic and perform, from the outside, like real networks. This provides higher fidelity representations of key network nodes while still leveraging the scalability and cost advantages of simulation tools. The result is to rapidly produce large yet relatively low-cost multi-fidelity SEPIA networks of computers and routers that let analysts quickly investigate threats and test protection approaches.

    Burton, David P.; Van Leeuwen, Brian P.; McDonald, Michael James; Onunkwo, Uzoma A.; Tarman, Thomas David; Urias, Vincent E.

    2009-09-01T23:59:59.000Z

    487

    Instantiating a Global Network Measurement Framework  

    SciTech Connect (OSTI)

    perfSONAR is a web services-based infrastructure for collecting and publishing network performance monitoring. A primary goal of perfSONAR is making it easier to solve end-to-end performance problems on paths crossing several networks. It contains a set of services delivering performance measurements in a federated environment. These services act as an intermediate layer, between the performance measurement tools and the diagnostic or visualization applications. This layer is aimed at making and exchanging performance measurements across multiple networks and multiple user communities, using well-defined protocols. This paper summarizes the key perfSONAR components, and describes how they are deployed by the US-LHC community to monitor the networks distributing LHC data from CERN. All monitoring data described herein is publicly available, and we hope the availability of this data via a standard schema will inspire others to contribute to the effort by building network data analysis applications that use perfSONAR.

    Tierney, Brian L.; Boote, Jeff; Boyd, Eric; Brown, Aaron; Grigoriev, Maxim; Metzger, Joe; Swany, Martin; Zekauskas, Matt; Zurawski, Jason

    2008-12-15T23:59:59.000Z

    488

    Electrodynamics of a generalized charged particle in doubly special relativity framework  

    SciTech Connect (OSTI)

    In the present paper, dynamics of generalized charged particles are studied in the presence of external electromagnetic interactions. This particular extension of the free relativistic particle model lives in Non-Commutative ?-Minkowski space–time, compatible with Doubly Special Relativity, that is motivated to describe Quantum Gravity effects. Furthermore we have also considered the electromagnetic field to be dynamical and have derived the modified forms of Lienard–Wiechert like potentials for these extended charged particle models. In all the above cases we exploit the new and extended form of ?-Minkowski algebra where electromagnetic effects are incorporated in the lowest order, in the Dirac framework of Hamiltonian constraint analysis.

    Pramanik, Souvik, E-mail: souvick.in@gmail.com [Physics and Applied Mathematics Unit, Indian Statistical Institute, 203 B. T. Road, Kolkata 700 108 (India); Ghosh, Subir, E-mail: subir_ghosh2@rediffmail.com [Physics and Applied Mathematics Unit, Indian Statistical Institute, 203 B. T. Road, Kolkata 700 108 (India); Pal, Probir, E-mail: probirkumarpal@rediffmail.com [S. N. Bose National Centre for Basic Sciences, Block-JD, Sector-III, Salt Lake, Kolkata 700 098 (India)

    2014-07-15T23:59:59.000Z

    489

    The dynamic information architecture system : an advanced simulation framework for military and civilian applications.  

    SciTech Connect (OSTI)

    DIAS, the Dynamic Information Architecture System, is an object-oriented simulation system that was designed to provide an integrating framework in which new or legacy software applications can operate in a context-driven frame of reference. DIAS provides a flexible and extensible mechanism to allow disparate, and mixed language, software applications to interoperate. DIAS captures the dynamic interplay between different processes or phenomena in the same frame of reference. Finally, DIAS accommodates a broad range of analysis contexts, with widely varying spatial and temporal resolutions and fidelity.

    Campbell, A. P.; Hummel, J. R.

    1998-01-08T23:59:59.000Z

    490

    Analyzing Tradeoffs Between the Threat of Invasion by Brook Trout and Effects of Intentional Isolation for Native Westslope Cutthroat Trout  

    E-Print Network [OSTI]

    who fund these projects. A consistent decision process would include an analysis of the relative risks or exacerbate the other. A consistent decision process would include a systematic analysis of when and where) as a tool for such analyses. We focused on native westslope cutthroat trout (Oncorhynchus clarkii lewisi

    491

    Dynamic Controls for Energy Efficiency and Demand Response: Framework Concepts and a New Construction Study Case in New York  

    E-Print Network [OSTI]

    introduction of a demand-side management (DSM) framework forof building controls. Demand-Side Management Framework forDOE 2006). The demand-side management (DSM) framework

    Kiliccote, Sila; Piette, Mary Ann; Watson, David S.; Hughes, Glenn

    2006-01-01T23:59:59.000Z

    492

    Framework for Identifying Key Environmental Concerns in Marine Renewable Energy Projects- Appendices  

    SciTech Connect (OSTI)

    Marine wave and tidal energy technology could interact with marine resources in ways that are not well understood. As wave and tidal energy conversion projects are planned, tested, and deployed, a wide range of stakeholders will be engaged; these include developers, state and federal regulatory agencies, environmental groups, tribal governments, recreational and commercial fishermen, and local communities. Identifying stakeholders’ environmental concerns in the early stages of the industry’s development will help developers address and minimize potential environmental effects. Identifying important concerns will also assist with streamlining siting and associated permitting processes, which are considered key hurdles by the industry in the U.S. today. In September 2008, RE Vision consulting, LLC was selected by the Department of Energy (DoE) to conduct a scenario-based evaluation of emerging hydrokinetic technologies. The purpose of this evaluation is to identify and characterize environmental impacts that are likely to occur, demonstrate a process for analyzing these impacts, identify the “key” environmental concerns for each scenario, identify areas of uncertainty, and describe studies that could address that uncertainty. This process is intended to provide an objective and transparent tool to assist in decision-making for siting and selection of technology for wave and tidal energy development. RE Vision worked with H. T. Harvey & Associates, to develop a framework for identifying key environmental concerns with marine renewable technology. This report describes the results of this study. This framework was applied to varying wave and tidal power conversion technologies, scales, and locations. The following wave and tidal energy scenarios were considered: ? 4 wave energy generation technologies ? 3 tidal energy generation technologies ? 3 sites: Humboldt coast, California (wave); Makapu’u Point, Oahu, Hawaii (wave); and the Tacoma Narrows, Washington (tidal) ? 3 project sizes: pilot, small commercial, and large commercial The possible combinations total 24 wave technology scenarios and 9 tidal technology scenarios. We evaluated 3 of the 33 scenarios in detail: 1. A small commercial OPT Power Buoy project off the Humboldt County, California coast 2. A small commercial Pelamis Wave Power P-2 project off Makapu’u Point, Oahu, Hawaii 3. A pilot MCT SeaGen tidal project, sited in the Tacoma Narrows, Washington This framework document used information available from permitting documents that were written to support actual wave or tidal energy projects, but the results obtained here should not be confused with those of the permitting documents1. The main difference between this framework document and permitting documents of currently proposed pilot projects is that this framework identifies key environmental concerns and describes the next steps in addressing those concerns; permitting documents must identify effects, find or declare thresholds of significance, evaluate the effects against the thresholds, and find mitigation measures that will minimize or avoid the effects so they can be considered less-than-significant. Two methodologies, 1) an environmental effects analysis and 2) Raptools, were developed and tested to identify potential environmental effects associated with wave or tidal energy conversion projects. For the environmental effects analysis, we developed a framework based on standard risk assessment techniques. The framework was applied to the three scenarios listed above. The environmental effects analysis addressed questions such as: ? What is the temporal and spatial exposure of a species at a site? ? What are the specific potential project effects on that species? ? What measures could minimize, mitigate, or eliminate negative effects? ? Are there potential effects of the project, or species’ response to the effect, that are highly uncertain and warrant additional study? The second methodology, Raptools, is a collaborative approach useful for evaluating multiple characteristi

    Sharon Kramer; Mirko Previsic; Peter Nelson; Sheri Woo

    2010-06-17T23:59:59.000Z

    493

    The geography of strategy : an exploration of alternative frameworks for transportation infrastructure strategy development  

    E-Print Network [OSTI]

    This thesis introduces the notion of a strategy development framework for transportation infrastructure systems. A strategy development framework has several dimensions: the organizations that own.infrastructure, the ...

    Dunn, Travis P

    2010-01-01T23:59:59.000Z

    494

    Non-participation in digital media. Toward a framework of mediated political action  

    E-Print Network [OSTI]

    Non-participation in digital media. Toward a framework ofparticipation through digital media. The evolution of theNon-participation in digital media. Toward a framework of

    Casemajor, Nathalie; Couture, Stéphane; Delfin, Mauricio; Goerzen, Matt; Delfanti, Alessandro

    2015-01-01T23:59:59.000Z

    495

    The ATLAS DDM Tracer monitoring framework  

    E-Print Network [OSTI]

    The DDM Tracer Service is aimed to trace and monitor the atlas file operations on the Worldwide LHC Computing Grid. The volume of traces has increased significantly since the service started in 2009. Now there are about ~5 million trace messages every day and peaks of greater than 250Hz, with peak rates continuing to climb, which gives the current service structure a big challenge. Analysis of large datasets based on on-demand queries to the relational database management system (RDBMS), i.e. Oracle, can be problematic, and have a significant effect on the database's performance. Consequently, We have investigated some new high availability technologies like messaging infrastructure, specifically ActiveMQ, and key-value stores. The advantages of key value store technology are that they are distributed and have high scalability; also their write performances are usually much better than RDBMS, all of which are very useful for the Tracer service. Indexes and distributed counters have been also tested to improve...

    ZANG, D; The ATLAS collaboration; BARISITS, M; LASSNIG, M; Andrew STEWART, G; MOLFETAS, A; BEERMANN, T

    2012-01-01T23:59:59.000Z

    496

    Report on the costs of domestic and international emergencies and on the threats posed by the Kuwaiti oil fires as required by P. L. 102-55  

    SciTech Connect (OSTI)

    The report fulfills the requirements of Public Law 12-55, the FY 1992 dire emergency supplemental appropriations bill, signed by the President on June 13, 1991. This law required the Director of the Office of Management and Budget to prepare and submit to the appropriate committees of Congress a report on: unfunded costs of dire emergencies because of floods, droughts, tornadoes, unemployment, and other disasters in the United States; unfunded costs, including food assistance, of international disaster emergencies existing because of floods, droughts, tornadoes, and other disasters; and the threats to oil supply, human health, and the environment that the Kuwaiti oil fires might pose.

    Not Available

    1991-06-01T23:59:59.000Z

    497

    Summary report on transportation of nuclear fuel materials in Japan : transportation infrastructure, threats identified in open literature, and physical protection regulations.  

    SciTech Connect (OSTI)

    This report summarizes the results of three detailed studies of the physical protection systems for the protection of nuclear materials transport in Japan, with an emphasis on the transportation of mixed oxide fuel materials1. The Japanese infrastructure for transporting nuclear fuel materials is addressed in the first section. The second section of this report presents a summary of baseline data from the open literature on the threats of sabotage and theft during the transport of nuclear fuel materials in Japan. The third section summarizes a review of current International Atomic Energy Agency, Japanese and United States guidelines and regulations concerning the physical protection for the transportation of nuclear fuel materials.

    Cochran, John Russell; Ouchi, Yuichiro (Japan Atomic Energy Agency, Japan); Furaus, James Phillip; Marincel, Michelle K.

    2008-03-01T23:59:59.000Z

    498

    9. Statistical Energy Analysis (SEA) 80 9. Statistical Energy Analysis (SEA)  

    E-Print Network [OSTI]

    9. Statistical Energy Analysis (SEA) 80 _____________________________________________________________________________ 9. Statistical Energy Analysis (SEA) 9.1 Introduction In this chapter an introduction to a framework denoted Statistical Energy Analysis was developed in the 1960's, to a great extent to clarify and handle

    Berlin,Technische Universität

    499

    (Intrusion Path Analysis)  

    SciTech Connect (OSTI)

    The design and implementation of an Intrusion Path Analysis (IPA) function came about as a result of the upgrades to the security systems at the Savannah River Site (SRS), near Aiken, South Carolina. The stated requirements for IPA were broad, leaving opportunity for creative freedom during design and development. The essential elements were that it: be based on alarm and sensor state data; consider insider as well as outsider threats; be flexible and easily enabled or disabled; not be processor intensive; and provide information to the operator in the event the analysis reveals possible path openings. The final design resulted from many and varied conceptual inputs, and will be implemented in selected test areas at SRS. It fulfils the requirements and: allows selective inclusion of sensors in the analysis; permits the formation of concentric rings of protection around assets; permits the defining of the number of rings which must be breached before issuing an alert; evaluates current sensor states as well as a recent, configurable history of sensor states; considers the sensors' physical location, with respect to the concentric rings; and enables changes for maintenance without software recompilation. 3 figs.

    Hardwick, R D

    1989-01-01T23:59:59.000Z

    500

    Bringing Water into an Integrated Assessment Framework  

    SciTech Connect (OSTI)

    We developed a modeling capability to understand how water is allocated within a river basin and examined present and future water allocations among agriculture, energy production, other human requirements, and ecological needs. Water is an essential natural resource needed for food and fiber production, household and industrial uses, energy production, transportation, tourism and recreation, and the functioning of natural ecosystems. Anthropogenic climate change and population growth are anticipated to impose unprecedented pressure on water resources during this century. Pacific Northwest National Laboratory (PNNL) researchers have pioneered the development of integrated assessment (IA) models for the analysis of energy and economic systems under conditions of climate change. This Laboratory Directed Research and Development (LDRD) effort led to the development of a modeling capability to evaluate current and future water allocations between human requirements and ecosystem services. The Water Prototype Model (WPM) was built in STELLA®, a computer modeling package with a powerful interface that enables users to construct dynamic models to simulate and integrate many processes (biological, hydrological, economics, sociological). A 150,404-km2 basin in the United States (U.S.) Pacific Northwest region served as the platform for the development of the WPM. About 60% of the study basin is in the state of Washington with the rest in Oregon. The Columbia River runs through the basin for 874 km, starting at the international border with Canada and ending (for the purpose of the simulation) at The Dalles dam. Water enters the basin through precipitation and from streamflows originating from the Columbia River at the international border with Canada, the Spokane River, and the Snake River. Water leaves the basin through evapotranspiration, consumptive uses (irrigation, livestock, domestic, commercial, mining, industrial, and off-stream power generation), and streamflow through The Dalles dam. Water also enters the Columbia River via runoff from land. The model runs on a monthly timescale to account for the impact of seasonal variations of climate, streamflows, and water uses. Data for the model prototype were obtained from national databases and ecosystem model results. The WPM can be run from three sources: 1) directly from STELLA, 2) with the isee Player®, or 3) the web version of WPM constructed with NetSim® software. When running any of these three versions, the user is presented a screen with a series of buttons, graphs, and a table. Two of the buttons provide the user with background and instructions on how to run the model. Currently, there are five types of scenarios that can be manipulated alone or in combination using the Sliding Input Devices: 1) interannual variability (e.g., El Niño), 2) climate change, 3) salmon policy, 4) future population, and 5) biodiesel production. Overall, the WPM captured the effects of streamflow conditions on hydropower production. Under La Niña conditions, more hydropower is available during all months of the year, with a substantially higher availability during spring and summer. Under El Niño conditions, hydropower would be reduced, with a total decline of 15% from normal weather conditions over the year. A policy of flow augmentation to facilitate the spring migration of smolts to the ocean would also reduce hydropower supply. Modeled hydropower generation was 23% greater than the 81 TWh reported in the 1995 U.S. Geological Survey (USGS) database. The modeling capability presented here contains the essential features to conduct basin-scale analyses of water allocation under current and future climates. Due to its underlying data structure iv and conceptual foundation, the WPM should be appropriate to conduct IA modeling at national and global scales.

    Izaurralde, Roberto C.; Thomson, Allison M.; Sands, Ronald; Pitcher, Hugh M.

    2010-11-30T23:59:59.000Z