National Library of Energy BETA

Sample records for threat analysis framework

  1. Threat Analysis Framework | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Threat Analysis Framework Threat Analysis Framework The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be used to identify the elements required to quantify threats against critical infrastructure assets and provide a means of distributing actionable threat information to critical infrastructure entities for the protection of infrastructure assets. This document identifies and describes five key

  2. Threat Analysis Framework | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Threat Analysis Framework Threat Analysis Framework The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be used to identify the elements required to quantify threats against critical infrastructure assets and provide a means of distributing actionable threat information to critical infrastructure entities for the protection of infrastructure assets. This document identifies and describes five key

  3. Microsoft Word - Threat Analysis Framework Sept07_comments-final.doc

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5792 Unlimited Release September 2007 Threat Analysis Framework David P. Duggan and John T. Michalski Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. Threat Analysis

  4. Fact Sheet: Detection and Analysis of Threats to the Energy Sector...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    event management, and sector-wide threat analysis Detecting cyber attacks against digital control systems quickly ... DATES will create an anonymous global threat database, ...

  5. Detection and Analysis of Threats to the Energy Sector: DATES

    SciTech Connect (OSTI)

    Alfonso Valdes

    2010-03-31

    This report summarizes Detection and Analysis of Threats to the Energy Sector (DATES), a project sponsored by the United States Department of Energy and performed by a team led by SRI International, with collaboration from Sandia National Laboratories, ArcSight, Inc., and Invensys Process Systems. DATES sought to advance the state of the practice in intrusion detection and situational awareness with respect to cyber attacks in energy systems. This was achieved through adaptation of detection algorithms for process systems as well as development of novel anomaly detection techniques suited for such systems into a detection suite. These detection components, together with third-party commercial security systems, were interfaced with the commercial Security Information Event Management (SIEM) solution from ArcSight. The efficacy of the integrated solution was demonstrated on two testbeds, one based on a Distributed Control System (DCS) from Invensys, and the other based on the Virtual Control System Environment (VCSE) from Sandia. These achievements advance the DOE Cybersecurity Roadmap [DOE2006] goals in the area of security monitoring. The project ran from October 2007 until March 2010, with the final six months focused on experimentation. In the validation phase, team members from SRI and Sandia coupled the two test environments and carried out a number of distributed and cross-site attacks against various points in one or both testbeds. Alert messages from the distributed, heterogeneous detection components were correlated using the ArcSight SIEM platform, providing within-site and cross-site views of the attacks. In particular, the team demonstrated detection and visualization of network zone traversal and denial-of-service attacks. These capabilities were presented to the DistribuTech Conference and Exhibition in March 2010. The project was hampered by interruption of funding due to continuing resolution issues and agreement on cost share for four months in 2008

  6. An Integrated Framework for CO2 Accounting and Risk Analysis...

    Office of Scientific and Technical Information (OSTI)

    An Integrated Framework for CO2 Accounting and Risk Analysis in CO2-EOR Sites Citation Details In-Document Search Title: An Integrated Framework for CO2 Accounting and Risk ...

  7. Initial Risk Analysis and Decision Making Framework

    SciTech Connect (OSTI)

    Engel, David W.

    2012-02-01

    Commercialization of new carbon capture simulation initiative (CCSI) technology will include two key elements of risk management, namely, technical risk (will process and plant performance be effective, safe, and reliable) and enterprise risk (can project losses and costs be controlled within the constraints of market demand to maintain profitability and investor confidence). Both of these elements of risk are incorporated into the risk analysis subtask of Task 7. Thus far, this subtask has developed a prototype demonstration tool that quantifies risk based on the expected profitability of expenditures when retrofitting carbon capture technology on a stylized 650 MW pulverized coal electric power generator. The prototype is based on the selection of specific technical and financial factors believed to be important determinants of the expected profitability of carbon capture, subject to uncertainty. The uncertainty surrounding the technical performance and financial variables selected thus far is propagated in a model that calculates the expected profitability of investments in carbon capture and measures risk in terms of variability in expected net returns from these investments. Given the preliminary nature of the results of this prototype, additional work is required to expand the scope of the model to include additional risk factors, additional information on extant and proposed risk factors, the results of a qualitative risk factor elicitation process, and feedback from utilities and other interested parties involved in the carbon capture project. Additional information on proposed distributions of these risk factors will be integrated into a commercial implementation framework for the purpose of a comparative technology investment analysis.

  8. The SDAV Software Frameworks for Visualization and Analysis on...

    Office of Scientific and Technical Information (OSTI)

    Software Frameworks for Visualization and Analysis on Next-Generation Multi-Core and Many-Core Architectures. Citation Details In-Document Search Title: The SDAV Software ...

  9. Novel Threat-risk Index Using Probabilistic Risk Assessment and Human Reliability Analysis - Final Report

    SciTech Connect (OSTI)

    George A. Beitel

    2004-02-01

    In support of a national need to improve the current state-of-the-art in alerting decision makers to the risk of terrorist attack, a quantitative approach employing scientific and engineering concepts to develop a threat-risk index was undertaken at the Idaho National Engineering and Environmental Laboratory (INEEL). As a result of this effort, a set of models has been successfully integrated into a single comprehensive model known as Quantitative Threat-Risk Index Model (QTRIM), with the capability of computing a quantitative threat-risk index on a system level, as well as for the major components of the system. Such a threat-risk index could provide a quantitative variant or basis for either prioritizing security upgrades or updating the current qualitative national color-coded terrorist threat alert.

  10. Psychosocial Modeling of Insider Threat Risk Based on Behavioral and Word Use Analysis

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Kangas, Lars J.; Noonan, Christine F.; Brown, Christopher R.; Ferryman, Thomas A.

    2013-10-01

    In many insider crimes, managers and other coworkers observed that the offenders had exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers to using such psychosocial indicators include the inability to recognize the signs and the failure to record the behaviors so that they can be assessed. A psychosocial model was developed to assess an employee’s behavior associated with an increased risk of insider abuse. The model is based on case studies and research literature on factors/correlates associated with precursor behavioral manifestations of individuals committing insider crimes. A complementary Personality Factor modeling approach was developed based on analysis to derive relevant personality characteristics from word use. Several implementations of the psychosocial model were evaluated by comparing their agreement with judgments of human resources and management professionals; the personality factor modeling approach was examined using email samples. If implemented in an operational setting, these models should be part of a set of management tools for employee assessment to identify employees who pose a greater insider threat.

  11. Flexible Framework for Building Energy Analysis: Preprint

    SciTech Connect (OSTI)

    Hale, E.; Macumber, D.; Weaver, E.; Shekhar, D.

    2012-09-01

    In the building energy research and advanced practitioner communities, building models are perturbed across large parameter spaces to assess energy and cost performance in the face of programmatic and economic constraints. This paper describes the OpenStudio software framework for performing such analyses.

  12. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.

    SciTech Connect (OSTI)

    Merkle, Peter Benedict

    2006-03-01

    Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

  13. Screening Metal-Organic Frameworks by Analysis of Transient Breakthrou...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Screening Metal-Organic Frameworks by Analysis of Transient Breakthrough of Gas Mixtures in a Fixed Bed Adsorber Previous Next List Rajamani Krishna and Jeffrey R. Long, J. Phys....

  14. An Integrated Framework for CO2 Accounting and Risk Analysis...

    Office of Scientific and Technical Information (OSTI)

    An integrated framework for CO2 accounting and risk analysis of CO2-EOR Authors: Dai, Zhenxue 1 ; Viswanathan, Hari S. 1 ; Middleton, Richard Stephen 1 ; Fessenden-Rahn, ...

  15. Protecting Against Nuclear Threats

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Protecting Against Nuclear Threats Protecting Against Nuclear Threats Los Alamos' mission is to solve national security challenges through scientific excellence. April 12, 2012 Los Alamos researchers use a magnetic field detector to screen carry-on liquids at airports Los Alamos researchers use a magnetic field detector to screen carry-on liquids at airports: MagViz project leader Michelle Espy demonstrates the MagViz liquid detection and analysis system in the Albuquerque International Sunport.

  16. Decerns: A framework for multi-criteria decision analysis

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Yatsalo, Boris; Didenko, Vladimir; Gritsyuk, Sergey; Sullivan, Terry

    2015-02-27

    A new framework, Decerns, for multicriteria decision analysis (MCDA) of a wide range of practical problems on risk management is introduced. Decerns framework contains a library of modules that are the basis for two scalable systems: DecernsMCDA for analysis of multicriteria problems, and DecernsSDSS for multicriteria analysis of spatial options. DecernsMCDA includes well known MCDA methods and original methods for uncertainty treatment based on probabilistic approaches and fuzzy numbers. As a result, these MCDA methods are described along with a case study on analysis of multicriteria location problem.

  17. Towards secure virtual directories : a risk analysis framework.

    SciTech Connect (OSTI)

    Claycomb, William R.

    2010-07-01

    Directory services are used by almost every enterprise computing environment to provide data concerning users, computers, contacts, and other objects. Virtual directories are components that provide directory services in a highly customized manner. Unfortunately, though the use of virtual directory services are widespread, an analysis of risks posed by their unique position and architecture has not been completed. We present a detailed analysis of six attacks to virtual directory services, including steps for detection and prevention. We also describe various categories of attack risks, and discuss what is necessary to launch an attack on virtual directories. Finally, we present a framework to use in analyzing risks to individual enterprise computing virtual directory instances. We show how to apply this framework to an example implementation, and discuss the benefits of doing so.

  18. Online Monitoring Technical Basis and Analysis Framework for Large Power

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transformers; Interim Report for FY 2012 | Department of Energy for Large Power Transformers; Interim Report for FY 2012 Online Monitoring Technical Basis and Analysis Framework for Large Power Transformers; Interim Report for FY 2012 The Light Water Reactor Sustainability Program is a research, development, and deployment program sponsored by the U.S. Department of Energy Office of Nuclear Energy. The program is operated in collaboration with the Electric Power Research Institute's (EPRI's)

  19. A Complexity Science-Based Framework for Global Joint Operations Analysis to Support Force Projection: LDRD Final Report.

    SciTech Connect (OSTI)

    Lawton, Craig R.

    2015-01-01

    The military is undergoing a significant transformation as it modernizes for the information age and adapts to address an emerging asymmetric threat beyond traditional cold war era adversaries. Techniques such as traditional large-scale, joint services war gaming analysis are no longer adequate to support program evaluation activities and mission planning analysis at the enterprise level because the operating environment is evolving too quickly. New analytical capabilities are necessary to address modernization of the Department of Defense (DoD) enterprise. This presents significant opportunity to Sandia in supporting the nation at this transformational enterprise scale. Although Sandia has significant experience with engineering system of systems (SoS) and Complex Adaptive System of Systems (CASoS), significant fundamental research is required to develop modeling, simulation and analysis capabilities at the enterprise scale. This report documents an enterprise modeling framework which will enable senior level decision makers to better understand their enterprise and required future investments.

  20. Rapid Detection of Biological and Chemical Threat Agents Using Physical Chemistry, Active Detection, and Computational Analysis

    SciTech Connect (OSTI)

    Chung, Myung; Dong, Li; Fu, Rong; Liotta, Lance; Narayanan, Aarthi; Petricoin, Emanuel; Ross, Mark; Russo, Paul; Zhou, Weidong; Luchini, Alessandra; Manes, Nathan; Chertow, Jessica; Han, Suhua; Kidd, Jessica; Senina, Svetlana; Groves, Stephanie

    2007-01-01

    Basic technologies have been successfully developed within this project: rapid collection of aerosols and a rapid ultra-sensitive immunoassay technique. Water-soluble, humidity-resistant polyacrylamide nano-filters were shown to (1) capture aerosol particles as small as 20 nm, (2) work in humid air and (3) completely liberate their captured particles in an aqueous solution compatible with the immunoassay technique. The immunoassay technology developed within this project combines electrophoretic capture with magnetic bead detection. It allows detection of as few as 150-600 analyte molecules or viruses in only three minutes, something no other known method can duplicate. The technology can be used in a variety of applications where speed of analysis and/or extremely low detection limits are of great importance: in rapid analysis of donor blood for hepatitis, HIV and other blood-borne infections in emergency blood transfusions, in trace analysis of pollutants, or in search of biomarkers in biological fluids. Combined in a single device, the water-soluble filter and ultra-sensitive immunoassay technique may solve the problem of early “warning type” detection of aerosolized pathogens. These two technologies are protected with five patent applications and are ready for commercialization.

  1. Cyber threat metrics.

    SciTech Connect (OSTI)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  2. Insider Threat Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-06-02

    To establish responsibilities and requirements for the Department of Energy (DOE) Insider Threat Program (ITP) to deter, detect, and mitigate insider threat actions by Federal and contractor employees in accordance with the requirements of Executive Order 13587, the National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs and other government-wide and DOE requirements. Does not cancel/supersede other directives.

  3. nuclear threat science

    National Nuclear Security Administration (NNSA)

    2011 National Strategy for Counterterrorism states that the danger of nuclear terrorism is the greatest threat to global security, and affirms preventing terrorist...

  4. The Nature of the Bioterrorism Threat

    SciTech Connect (OSTI)

    Regens, J. L.

    2003-02-25

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  5. Categorizing Threat Building and Using a Generic Threat Matrix | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy Categorizing Threat Building and Using a Generic Threat Matrix Categorizing Threat Building and Using a Generic Threat Matrix The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build

  6. CIMS: A FRAMEWORK FOR INFRASTRUCTURE INTERDEPENDENCY MODELING AND ANALYSIS

    SciTech Connect (OSTI)

    Donald D. Dudenhoeffer; May R. Permann; Milos Manic

    2006-12-01

    Today’s society relies greatly upon an array of complex national and international infrastructure networks such as transportation, utilities, telecommunication, and even financial networks. While modeling and simulation tools have provided insight into the behavior of individual infrastructure networks, a far less understood area is that of the interrelationships among multiple infrastructure networks including the potential cascading effects that may result due to these interdependencies. This paper first describes infrastructure interdependencies as well as presenting a formalization of interdependency types. Next the paper describes a modeling and simulation framework called CIMS© and the work that is being conducted at the Idaho National Laboratory (INL) to model and simulate infrastructure interdependencies and the complex behaviors that can result.

  7. THREAT OF MALICIOUS CODE

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    THREAT OF MALICIOUS CODE The Department of Energy (DOE) is strongly committed to the protection of all DOE assets from cyber attack and malicious exploitation. This includes information, networks, hardware, software, and mobile devices. DOE's continued diligence in this arena is critical in today's constantly-evolving cyber threat landscape. A recently cited incident involved senior officials receiving unsolicited free phone chargers. Luckily, the source was legitimate and did not result in a

  8. Decerns: A framework for multi-criteria decision analysis

    SciTech Connect (OSTI)

    Yatsalo, Boris; Didenko, Vladimir; Gritsyuk, Sergey; Sullivan, Terry

    2015-02-27

    A new framework, Decerns, for multicriteria decision analysis (MCDA) of a wide range of practical problems on risk management is introduced. Decerns framework contains a library of modules that are the basis for two scalable systems: DecernsMCDA for analysis of multicriteria problems, and DecernsSDSS for multicriteria analysis of spatial options. DecernsMCDA includes well known MCDA methods and original methods for uncertainty treatment based on probabilistic approaches and fuzzy numbers. As a result, these MCDA methods are described along with a case study on analysis of multicriteria location problem.

  9. ThreatView

    Energy Science and Technology Software Center (OSTI)

    2007-09-25

    The ThreatView project is based on our prior work with the existing ParaView open-source scientific visualization application. Where ParaView provides a grapical client optimized scientific visualization over the VTK parallel client server architecture, ThreatView provides a client optimized for more generic visual analytics over the same architecture. Because ThreatView is based on the VTK parallel client-server architecture, data sources can reside on remote hosts, and processing and rendering can be performed in parallel. As seenmore » in Fig. 1, ThreatView provides four main methods for visualizing data: Landscape View, which displays a graph using a landscape metaphor where clusters of graph nodes produce "hills" in the landscape; Graph View, which displays a graph using a traditional "ball-and-stick" style; Table View, which displays tabular data in a standard spreadsheet; and Attribute View, which displays a tabular "histogram" of input data - for a selected table column, the Attribute View displays each unique value within the column, and the number of times that value appears in the data. There are two supplemental view types: Text View, which displays tabular data one-record-at-a-time; and the Statistics View, which displays input metadata, such as the number of vertices and edges in a graph, the number of rows in a table, etc.« less

  10. Sustainability principles in strategic environmental assessment: A framework for analysis and examples from Italian urban planning

    SciTech Connect (OSTI)

    Lamorgese, Lydia Geneletti, Davide

    2013-09-15

    This paper presents a framework for analysing the degree of consideration of sustainability principles in Strategic environmental assessment (SEA), and demonstrates its application to a sample of SEA of Italian urban plans. The framework is based on Gibson's (2006) sustainability principles, which are linked to a number of guidance criteria and eventually to review questions, resulting from an extensive literature review. A total of 71 questions are included in the framework, which gives particular emphasis to key concepts, such as intragenerational and intergenerational equity. The framework was applied to review the Environmental Report of the urban plans of 15 major Italian cities. The results of this review show that, even if sustainability is commonly considered as a pivotal concept, there is still work to be done in order to effectively integrate sustainability principles into SEA. In particular, most of the attention is given to mitigation and compensation measures, rather than to actual attempts to propose more sustainable planning decisions in the first place. Concerning the proposed framework of analysis, further research is required to clarify equity concerns and particularly to identify suitable indicators for operationalizing the concepts of intra/inter-generational equity in decision-making. -- Highlights: ► A framework was developed in order to evaluate planning against sustainability criteria. ► The framework was applied to analyse how sustainable principles are addressed in 15 Italian SEA reports. ► Over 85% of the reports addressed, to some extent, at least 40% of the framework questions. ► Criteria explicitly linked to intra and inter-generational equity are rarely addressed.

  11. Proliferation: Threat and response

    SciTech Connect (OSTI)

    1996-04-01

    During the height of the Cold War, the Russian physicist Andre Sakharov said, `Reducing the risk of annihilating humanity in a nuclear war carries an absolute priority over all other considerations.` The end of the Cold War has reduced the threat of global nuclear war, but today a new threat is rising from the global spread of nuclear, biological, and chemical weapons. Hostile groups and nations have tried - or have been able - to obtain these weapons, the technology, and homegrown ability to make them or ballistic missiles that can deliver the massive annihilation, poison, and death of these weapons hundreds of miles away. For rogue nations, these weapons are a ticket to power, stature, and confidence in regional war.

  12. Emerging Threats and Opportunities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Emergency Response NNSA's Office of Emergency Operations is the United States government's primary capability for radiological and nuclear emergency response and for providing security to the nation from the threat of nuclear terrorism. The Office of Emergency Operations maintains a high level of readiness for protecting and serving the U.S. and its allies through the development, implementation and coordination of programs and systems designed to serve as a last line of defense in the event of

  13. Idealization, uncertainty and heterogeneity : game frameworks defined with formal concept analysis.

    SciTech Connect (OSTI)

    Racovitan, M. T.; Sallach, D. L.; Decision and Information Sciences; Northern Illinois Univ.

    2006-01-01

    The present study begins with Formal Concept Analysis, and undertakes to demonstrate how a succession of game frameworks may, by design, address increasingly complex and interesting social phenomena. We develop a series of multi-agent exchange games, each of which incorporates an additional dimension of complexity. All games are based on coalition patterns in exchanges where diverse cultural markers provide a basis for trust and reciprocity. The first game is characterized by an idealized concept of trust. A second game framework introduces uncertainty regarding the reciprocity of prospective transactions. A third game framework retains idealized trust and uncertainty, and adds additional agent heterogeneity. Cultural markers are not equally salient in conferring or withholding trust, and the result is a richer transactional process.

  14. Fuel Cycle Analysis Framework Base Cases for the IAEA/INPRO GAINS Collaborative Project

    SciTech Connect (OSTI)

    Brent Dixon

    2012-09-01

    Thirteen countries participated in the Collaborative Project GAINS Global Architecture of Innovative Nuclear Energy Systems Based on Thermal and Fast Reactors Including a Closed Fuel Cycle, which was the primary activity within the IAEA/INPRO Program Area B: Global Vision on Sustainable Nuclear Energy for the last three years. The overall objective of GAINS was to develop a standard framework for assessing future nuclear energy systems taking into account sustainable development, and to validate results through sample analyses. This paper details the eight scenarios that constitute the GAINS framework base cases for analysis of the transition to future innovative nuclear energy systems. The framework base cases provide a reference for users of the framework to start from in developing and assessing their own alternate systems. Each base case is described along with performance results against the GAINS sustainability evaluation metrics. The eight cases include four using a moderate growth projection and four using a high growth projection for global nuclear electricity generation through 2100. The cases are divided into two sets, addressing homogeneous and heterogeneous scenarios developed by GAINS to model global fuel cycle strategies. The heterogeneous world scenario considers three separate nuclear groups based on their fuel cycle strategies, with non-synergistic and synergistic cases. The framework base case analyses results show the impact of these different fuel cycle strategies while providing references for future users of the GAINS framework. A large number of scenario alterations are possible and can be used to assess different strategies, different technologies, and different assumptions about possible futures of nuclear power. Results can be compared to the framework base cases to assess where these alternate cases perform differently versus the sustainability indicators.

  15. iGlobe: An Interactive Visualization and Analysis Framework for Geospatial Data

    SciTech Connect (OSTI)

    2011-07-22

    The iGlobe system is a desktop-based visualization and analysis environment which allows seamless integration of multiple geospatial data sets from varied sources and provides an interface to interactively analyze the different data sets and apply sophisticated data analysis and mining algorithms in a near real time fashion. The framework is highly desirable in domains such as earth and climate sciences where great emphasis is placed on simultaneous analysis of different data sets such as remote sensing images, climate model simulation outputs, and other environmental and demographic databases, to understand weather and climate systems and the impact of climate change in nature and people.

  16. iGlobe: an interactive visualization and analysis framework for geospatial data

    SciTech Connect (OSTI)

    Chandola, Varun; Vatsavai, Raju; Bhaduri, Budhendra L

    2011-01-01

    We demonstrate an interactive visualization and analysis system for integrating climate data with other geospatial data sets, such as environmental and demographic data. The \\eviz system is a desktop-based visualization and analysis environment which allows seamless integration of multiple geospatial data sets from varied sources and provides an interface to interactively analyze the different data sets and apply sophisticated data analysis and mining algorithms in a near real time fashion. The framework is highly desirable in domains such as earth and climate sciences where great emphasis is placed on simultaneous analysis of different data sets such as remote sensing images, climate model simulation outputs, and other environmental and demographic databases, to understand weather and climate systems and the impact of climate change on nature and people.

  17. Bridging Human Reliability Analysis and Psychology, Part 2: A Cognitive Framework to Support HRA

    SciTech Connect (OSTI)

    April M. Whaley; Stacey M. L. Hendrickson; Ronald L. Boring; Jing Xing

    2012-06-01

    This is the second of two papers that discuss the literature review conducted as part of the U.S. Nuclear Regulatory Commission (NRC) effort to develop a hybrid human reliability analysis (HRA) method in response to Staff Requirements Memorandum (SRM) SRM-M061020. This review was conducted with the goal of strengthening the technical basis within psychology, cognitive science and human factors for the hybrid HRA method being proposed. An overview of the literature review approach and high-level structure is provided in the first paper, whereas this paper presents the results of the review. The psychological literature review encompassed research spanning the entirety of human cognition and performance, and consequently produced an extensive list of psychological processes, mechanisms, and factors that contribute to human performance. To make sense of this large amount of information, the results of the literature review were organized into a cognitive framework that identifies causes of failure of macrocognition in humans, and connects those proximate causes to psychological mechanisms and performance influencing factors (PIFs) that can lead to the failure. This cognitive framework can serve as a tool to inform HRA. Beyond this, however, the cognitive framework has the potential to also support addressing human performance issues identified in Human Factors applications.

  18. Integrated Information Technology Framework for Analysis of Data from Enrichment Plants to Support the Safeguards Mission

    SciTech Connect (OSTI)

    Marr, Clifton T.; Thurman, David A.; Jorgensen, Bruce V.

    2008-07-15

    ABSTRACT Many examples of software architectures exist that support process monitoring and analysis applications which could be applied to enrichment plants in a fashion that supports the Safeguards Mission. Pacific Northwest National Laboratory (PNNL) has developed mature solutions that will provide the framework to support online statistical analysis of enrichment plans and the entire nuclear fuel cycle. Most recently, PNNL has developed a refined architecture and supporting tools that address many of the common problems analysis and modeling environments experience: pipelining, handling large data volumes, and real-time performance. We propose the architecture and tools may be successfully used in furthering the goals of nuclear material control and accountability as both an aid to processing plant owners and as comprehensive monitoring for oversight teams.

  19. iGlobe: An Interactive Visualization and Analysis Framework for Geospatial Data

    Energy Science and Technology Software Center (OSTI)

    2011-07-22

    The iGlobe system is a desktop-based visualization and analysis environment which allows seamless integration of multiple geospatial data sets from varied sources and provides an interface to interactively analyze the different data sets and apply sophisticated data analysis and mining algorithms in a near real time fashion. The framework is highly desirable in domains such as earth and climate sciences where great emphasis is placed on simultaneous analysis of different data sets such as remotemore » sensing images, climate model simulation outputs, and other environmental and demographic databases, to understand weather and climate systems and the impact of climate change in nature and people.« less

  20. Bio-threat microparticle simulants

    DOE Patents [OSTI]

    Farquar, George Roy; Leif, Roald N

    2012-10-23

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  1. Bio-threat microparticle simulants

    DOE Patents [OSTI]

    Farquar, George Roy; Leif, Roald

    2014-09-16

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  2. Uncertainty Analysis Framework - Hanford Site-Wide Groundwater Flow and Transport Model

    SciTech Connect (OSTI)

    Cole, Charles R.; Bergeron, Marcel P.; Murray, Christopher J.; Thorne, Paul D.; Wurstner, Signe K.; Rogers, Phillip M.

    2001-11-09

    Pacific Northwest National Laboratory (PNNL) embarked on a new initiative to strengthen the technical defensibility of the predictions being made with a site-wide groundwater flow and transport model at the U.S. Department of Energy Hanford Site in southeastern Washington State. In FY 2000, the focus of the initiative was on the characterization of major uncertainties in the current conceptual model that would affect model predictions. The long-term goals of the initiative are the development and implementation of an uncertainty estimation methodology in future assessments and analyses using the site-wide model. This report focuses on the development and implementation of an uncertainty analysis framework.

  3. A FRAMEWORK FOR THE ANALYSIS OF LOCALIZED CORROSION AT THE PROPOSED YUCCA MOUNTAIN REPOSITORY

    SciTech Connect (OSTI)

    Dr. J.H. Payer

    2006-04-18

    Corrosion is a primary determinant of waste package performance at the proposed Yucca Mountain Repository: (1) the most likely degradation process; (2) controls the delay time for radionuclide transport from the waste package; and (3) determines when packages will be penetrated and the shape size and distribution of those penetrations. In this presentation a framework for the analysis of localized corrosion is presented and demonstrated for a scenario: (1) water chemistry of mixed salt solutions (sodium chloride-potassium nitrate); and (2) time-temperature-relative humidity profiles for a hot, mid and cool temperature waste package.

  4. A critical analysis of hazard resilience measures within sustainability assessment frameworks

    SciTech Connect (OSTI)

    Matthews, Elizabeth C.; Sattler, Meredith; Friedland, Carol J.

    2014-11-15

    Today, numerous sustainability assessment frameworks (SAFs) exist to guide designers in achieving sustainable performance in the design of structures and communities. SAFs are beneficial in educating users and are useful tools for incorporating sustainability strategies into planning, design, and construction; however, there is currently a substantial gap in the ability of existing SAFs to incorporate hazard resistance and hazard mitigation in the broader context of sustainable design. This paper analyzes the incorporation of hazard resistant design and hazard mitigation strategies within SAFs via a multi-level analysis of eleven SAFs. The SAFs analyzed range in scale of application (i.e. building, site, community). Three levels of analysis are presented: (1) macro-level analysis comparing the number of measures strictly addressing resilience versus sustainability, (2) meso-level analysis of the coverage of types of hazards within SAFs (e.g. flood, fire), and (3) micro-level analysis of SAF measures connected to flood-related hazard resilience. The results demonstrate that hazard resistance and hazard mitigation do not figure prominently in the intent of SAFs and that weaknesses in resilience coverage exist that have the potential to lead to the design of structures and communities that are still highly vulnerable to the impacts of extreme events. - Highlights: • Sustainability assessment frameworks (SAFs) were analyzed for resilience coverage • Hazard resistance and mitigation do not figure prominently in the intent of SAFs • Approximately 75% of SAFs analyzed address three or fewer hazards • Lack of economic measures within SAFs could impact resilience and sustainability • Resilience measures for flood hazards are not consistently included in SAFs.

  5. GRDC. A Collaborative Framework for Radiological Background and Contextual Data Analysis

    SciTech Connect (OSTI)

    Brian J. Quiter; Ramakrishnan, Lavanya; Mark S. Bandstra

    2015-12-01

    The Radiation Mobile Analysis Platform (RadMAP) is unique in its capability to collect both high quality radiological data from both gamma-ray detectors and fast neutron detectors and a broad array of contextual data that includes positioning and stance data, high-resolution 3D radiological data from weather sensors, LiDAR, and visual and hyperspectral cameras. The datasets obtained from RadMAP are both voluminous and complex and require analyses from highly diverse communities within both the national laboratory and academic communities. Maintaining a high level of transparency will enable analysis products to further enrich the RadMAP dataset. It is in this spirit of open and collaborative data that the RadMAP team proposed to collect, calibrate, and make available online data from the RadMAP system. The Berkeley Data Cloud (BDC) is a cloud-based data management framework that enables web-based data browsing visualization, and connects curated datasets to custom workflows such that analysis products can be managed and disseminated while maintaining user access rights. BDC enables cloud-based analyses of large datasets in a manner that simulates real-time data collection, such that BDC can be used to test algorithm performance on real and source-injected datasets. Using the BDC framework, a subset of the RadMAP datasets have been disseminated via the Gamma Ray Data Cloud (GRDC) that is hosted through the National Energy Research Science Computing (NERSC) Center, enabling data access to over 40 users at 10 institutions.

  6. Characterizing Provenance in Visualization and Data Analysis: An Organizational Framework of Provenance Types and Purposes

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Ragan, Eric; Alex, Endert; Sanyal, Jibonananda; Chen, Jian

    2016-01-01

    While the primary goal of visual analytics research is to improve the quality of insights and findings, a substantial amount of research in provenance has focused on the history of changes and advances throughout the analysis process. The term, provenance, has been used in a variety of ways to describe different types of records and histories related to visualization. The existing body of provenance research has grown to a point where the consolidation of design knowledge requires cross-referencing a variety of projects and studies spanning multiple domain areas. We present an organizational framework of the different types of provenance informationmore » and purposes for why they are desired in the field of visual analytics. Our organization is intended to serve as a framework to help researchers specify types of provenance and coordinate design knowledge across projects. We also discuss the relationships between these factors and the methods used to capture provenance information. In addition, our organization can be used to guide the selection of evaluation methodology and the comparison of study outcomes in provenance research« less

  7. Framework for Risk Analysis in Multimedia Environmental Systems: Modeling Individual Steps of a Risk Assessment Process

    SciTech Connect (OSTI)

    Shah, Anuj; Castleton, Karl J.; Hoopes, Bonnie L.

    2004-06-01

    The study of the release and effects of chemicals in the environment and their associated risks to humans is central to public and private decision making. FRAMES 1.X, Framework for Risk Analysis in Multimedia Environmental Systems, is a systems modeling software platform, developed by PNNL, Pacific Northwest National Laboratory, that helps scientists study the release and effects of chemicals on a source to outcome basis, create environmental models for similar risk assessment and management problems. The unique aspect of FRAMES is to dynamically introduce software modules representing individual components of a risk assessment (e.g., source release of contaminants, fate and transport in various environmental media, exposure, etc.) within a software framework, manipulate their attributes and run simulations to obtain results. This paper outlines the fundamental constituents of FRAMES 2.X, an enhanced version of FRAMES 1.X, that greatly improve the ability of the module developers to “plug” their self-developed software modules into the system. The basic design, the underlying principles and a discussion of the guidelines for module developers are presented.

  8. A framework for graph-based synthesis, analysis, and visualization of HPC cluster job data.

    SciTech Connect (OSTI)

    Mayo, Jackson R.; Kegelmeyer, W. Philip, Jr.; Wong, Matthew H.; Pebay, Philippe Pierre; Gentile, Ann C.; Thompson, David C.; Roe, Diana C.; De Sapio, Vincent; Brandt, James M.

    2010-08-01

    The monitoring and system analysis of high performance computing (HPC) clusters is of increasing importance to the HPC community. Analysis of HPC job data can be used to characterize system usage and diagnose and examine failure modes and their effects. This analysis is not straightforward, however, due to the complex relationships that exist between jobs. These relationships are based on a number of factors, including shared compute nodes between jobs, proximity of jobs in time, etc. Graph-based techniques represent an approach that is particularly well suited to this problem, and provide an effective technique for discovering important relationships in job queuing and execution data. The efficacy of these techniques is rooted in the use of a semantic graph as a knowledge representation tool. In a semantic graph job data, represented in a combination of numerical and textual forms, can be flexibly processed into edges, with corresponding weights, expressing relationships between jobs, nodes, users, and other relevant entities. This graph-based representation permits formal manipulation by a number of analysis algorithms. This report presents a methodology and software implementation that leverages semantic graph-based techniques for the system-level monitoring and analysis of HPC clusters based on job queuing and execution data. Ontology development and graph synthesis is discussed with respect to the domain of HPC job data. The framework developed automates the synthesis of graphs from a database of job information. It also provides a front end, enabling visualization of the synthesized graphs. Additionally, an analysis engine is incorporated that provides performance analysis, graph-based clustering, and failure prediction capabilities for HPC systems.

  9. Nuclear Radiological Threat Task Force Established | National...

    National Nuclear Security Administration (NNSA)

    Nuclear Radiological Threat Task Force Established Washington, DC NNSA's Administrator Linton Brooks announces the establishment of the Nuclear Radiological Threat Reduction Task ...

  10. Global Threat Reduction Initiative | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    An overview of the Global Threat Reduction Initiative, U.S.-Origin Nuclear Fuel Removals. Global Threat Reduction Initiative (1.45

  11. design basis threat | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    design basis threat Design Basis Threat NNSA has taken aggressive action to improve the security of its nuclear weapons material (often referred to as special nuclear material, or ...

  12. Insider Threat Awareness | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Threat Program https:www.directives.doe.govdirectives-documents400-series0470.5-BOrder Insider Threat Program Powerpedia Webpage https:powerpedia.energy.govwiki...

  13. Tracking and Analysis Framework (TAF) model documentation and user`s guide

    SciTech Connect (OSTI)

    Bloyd, C.; Camp, J.; Conzelmann, G.

    1996-12-01

    With passage of the 1990 Clean Air Act Amendments, the United States embarked on a policy for controlling acid deposition that has been estimated to cost at least $2 billion. Title IV of the Act created a major innovation in environmental regulation by introducing market-based incentives - specifically, by allowing electric utility companies to trade allowances to emit sulfur dioxide (SO{sub 2}). The National Acid Precipitation Assessment Program (NAPAP) has been tasked by Congress to assess what Senator Moynihan has termed this {open_quotes}grand experiment.{close_quotes} Such a comprehensive assessment of the economic and environmental effects of this legislation has been a major challenge. To help NAPAP face this challenge, the U.S. Department of Energy (DOE) has sponsored development of an integrated assessment model, known as the Tracking and Analysis Framework (TAF). This section summarizes TAF`s objectives and its overall design.

  14. Passive Tomography for Spent Fuel Verification: Analysis Framework and Instrument Design Study

    SciTech Connect (OSTI)

    White, Timothy A.; Svard, Staffan J.; Smith, Leon E.; Mozin, Vladimir V.; Jansson, Peter; Davour, Anna; Grape, Sophie; Trellue, H.; Deshmukh, Nikhil S.; Wittman, Richard S.; Honkamaa, Tapani; Vaccaro, Stefano; Ely, James

    2015-05-18

    The potential for gamma emission tomography (GET) to detect partial defects within a spent nuclear fuel assembly is being assessed through a collaboration of Support Programs to the International Atomic Energy Agency (IAEA). In the first phase of this study, two safeguards verification objectives have been identified. The first is the independent determination of the number of active pins that are present in the assembly, in the absence of a priori information. The second objective is to provide quantitative measures of pin-by-pin properties, e.g. activity of key isotopes or pin attributes such as cooling time and relative burnup, for the detection of anomalies and/or verification of operator-declared data. The efficacy of GET to meet these two verification objectives will be evaluated across a range of fuel types, burnups, and cooling times, and with a target interrogation time of less than 60 minutes. The evaluation of GET viability for safeguards applications is founded on a modelling and analysis framework applied to existing and emerging GET instrument designs. Monte Carlo models of different fuel types are used to produce simulated tomographer responses to large populations of “virtual” fuel assemblies. Instrument response data are processed by a variety of tomographic-reconstruction and image-processing methods, and scoring metrics specific to each of the verification objectives are defined and used to evaluate the performance of the methods. This paper will provide a description of the analysis framework and evaluation metrics, example performance-prediction results, and describe the design of a “universal” GET instrument intended to support the full range of verification scenarios envisioned by the IAEA.

  15. A life cycle cost analysis framework for geologic storage of hydrogen : a scenario analysis.

    SciTech Connect (OSTI)

    Kobos, Peter Holmes; Lord, Anna Snider; Borns, David James

    2010-10-01

    The U.S. Department of Energy has an interest in large scale hydrogen geostorage, which would offer substantial buffer capacity to meet possible disruptions in supply. Geostorage options being considered are salt caverns, depleted oil/gas reservoirs, aquifers and potentially hard rock cavrns. DOE has an interest in assessing the geological, geomechanical and economic viability for these types of hydrogen storage options. This study has developed an ecocomic analysis methodology to address costs entailed in developing and operating an underground geologic storage facility. This year the tool was updated specifically to (1) a version that is fully arrayed such that all four types of geologic storage options can be assessed at the same time, (2) incorporate specific scenarios illustrating the model's capability, and (3) incorporate more accurate model input assumptions for the wells and storage site modules. Drawing from the knowledge gained in the underground large scale geostorage options for natural gas and petroleum in the U.S. and from the potential to store relatively large volumes of CO{sub 2} in geological formations, the hydrogen storage assessment modeling will continue to build on these strengths while maintaining modeling transparency such that other modeling efforts may draw from this project.

  16. Methodological Framework for Analysis of Buildings-Related Programs with BEAMS, 2008

    SciTech Connect (OSTI)

    Elliott, Douglas B.; Dirks, James A.; Hostick, Donna J.

    2008-09-30

    The U.S. Department of Energy’s (DOE’s) Office of Energy Efficiency and Renewable Energy (EERE) develops official “benefits estimates” for each of its major programs using its Planning, Analysis, and Evaluation (PAE) Team. PAE conducts an annual integrated modeling and analysis effort to produce estimates of the energy, environmental, and financial benefits expected from EERE’s budget request. These estimates are part of EERE’s budget request and are also used in the formulation of EERE’s performance measures. Two of EERE’s major programs are the Building Technologies Program (BT) and the Weatherization and Intergovernmental Program (WIP). Pacific Northwest National Laboratory (PNNL) supports PAE by developing the program characterizations and other market information necessary to provide input to the EERE integrated modeling analysis as part of PAE’s Portfolio Decision Support (PDS) effort. Additionally, PNNL also supports BT by providing line-item estimates for the Program’s internal use. PNNL uses three modeling approaches to perform these analyses. This report documents the approach and methodology used to estimate future energy, environmental, and financial benefits using one of those methods: the Building Energy Analysis and Modeling System (BEAMS). BEAMS is a PC-based accounting model that was built in Visual Basic by PNNL specifically for estimating the benefits of buildings-related projects. It allows various types of projects to be characterized including whole-building, envelope, lighting, and equipment projects. This document contains an overview section that describes the estimation process and the models used to estimate energy savings. The body of the document describes the algorithms used within the BEAMS software. This document serves both as stand-alone documentation for BEAMS, and also as a supplemental update of a previous document, Methodological Framework for Analysis of Buildings-Related Programs: The GPRA Metrics Effort

  17. Cyber Threats to Nuclear Infrastructures

    SciTech Connect (OSTI)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  18. A Mathematical Framework for the Analysis of Cyber-Resilient Control Systems

    SciTech Connect (OSTI)

    Melin, Alexander M; Ferragut, Erik M; Laska, Jason A; Fugate, David L; Kisner, Roger

    2013-01-01

    The increasingly recognized vulnerability of industrial control systems to cyber-attacks has inspired a considerable amount of research into techniques for cyber-resilient control systems. The majority of this effort involves the application of well known information security (IT) techniques to control system networks. While these efforts are important to protect the control systems that operate critical infrastructure, they are never perfectly effective. Little research has focused on the design of closed-loop dynamics that are resilient to cyber-attack. The majority of control system protection measures are concerned with how to prevent unauthorized access and protect data integrity. We believe that the ability to analyze how an attacker can effect the closed loop dynamics of a control system configuration once they have access is just as important to the overall security of a control system. To begin to analyze this problem, consistent mathematical definitions of concepts within resilient control need to be established so that a mathematical analysis of the vulnerabilities and resiliencies of a particular control system design methodology and configuration can be made. In this paper, we propose rigorous definitions for state awareness, operational normalcy, and resiliency as they relate to control systems. We will also discuss some mathematical consequences that arise from the proposed definitions. The goal is to begin to develop a mathematical framework and testable conditions for resiliency that can be used to build a sound theoretical foundation for resilient control research.

  19. Multidisciplinary framework for human reliability analysis with an application to errors of commission and dependencies

    SciTech Connect (OSTI)

    Barriere, M.T.; Luckas, W.J.; Wreathall, J.; Cooper, S.E.; Bley, D.C.; Ramey-Smith, A.

    1995-08-01

    Since the early 1970s, human reliability analysis (HRA) has been considered to be an integral part of probabilistic risk assessments (PRAs). Nuclear power plant (NPP) events, from Three Mile Island through the mid-1980s, showed the importance of human performance to NPP risk. Recent events demonstrate that human performance continues to be a dominant source of risk. In light of these observations, the current limitations of existing HRA approaches become apparent when the role of humans is examined explicitly in the context of real NPP events. The development of new or improved HRA methodologies to more realistically represent human performance is recognized by the Nuclear Regulatory Commission (NRC) as a necessary means to increase the utility of PRAS. To accomplish this objective, an Improved HRA Project, sponsored by the NRC`s Office of Nuclear Regulatory Research (RES), was initiated in late February, 1992, at Brookhaven National Laboratory (BNL) to develop an improved method for HRA that more realistically assesses the human contribution to plant risk and can be fully integrated with PRA. This report describes the research efforts including the development of a multidisciplinary HRA framework, the characterization and representation of errors of commission, and an approach for addressing human dependencies. The implications of the research and necessary requirements for further development also are discussed.

  20. Gradient Analysis and Classification of Carolina Bay Vegetation: A Framework for Bay Wetlands Conservation and Restoration

    SciTech Connect (OSTI)

    Diane De Steven,Ph.D.; Maureen Tone,PhD.

    1997-10-01

    This report address four project objectives: (1) Gradient model of Carolina bay vegetation on the SRS--The authors use ordination analyses to identify environmental and landscape factors that are correlated with vegetation composition. Significant factors can provide a framework for site-based conservation of existing diversity, and they may also be useful site predictors for potential vegetation in bay restorations. (2) Regional analysis of Carolina bay vegetation diversity--They expand the ordination analyses to assess the degree to which SRS bays encompass the range of vegetation diversity found in the regional landscape of South Carolina's western Upper Coastal Plain. Such comparisons can indicate floristic status relative to regional potentials and identify missing species or community elements that might be re-introduced or restored. (3) Classification of vegetation communities in Upper Coastal Plain bays--They use cluster analysis to identify plant community-types at the regional scale, and explore how this classification may be functional with respect to significant environmental and landscape factors. An environmentally-based classification at the whole-bay level can provide a system of templates for managing bays as individual units and for restoring bays to desired plant communities. (4) Qualitative model for bay vegetation dynamics--They analyze present-day vegetation in relation to historic land uses and disturbances. The distinctive history of SRS bays provides the possibility of assessing pathways of post-disturbance succession. They attempt to develop a coarse-scale model of vegetation shifts in response to changing site factors; such qualitative models can provide a basis for suggesting management interventions that may be needed to maintain desired vegetation in protected or restored bays.

  1. A life cycle cost analysis framework for geologic storage of hydrogen : a user's tool.

    SciTech Connect (OSTI)

    Kobos, Peter Holmes; Lord, Anna Snider; Borns, David James; Klise, Geoffrey T.

    2011-09-01

    The U.S. Department of Energy (DOE) has an interest in large scale hydrogen geostorage, which could offer substantial buffer capacity to meet possible disruptions in supply or changing seasonal demands. The geostorage site options being considered are salt caverns, depleted oil/gas reservoirs, aquifers and hard rock caverns. The DOE has an interest in assessing the geological, geomechanical and economic viability for these types of geologic hydrogen storage options. This study has developed an economic analysis methodology and subsequent spreadsheet analysis to address costs entailed in developing and operating an underground geologic storage facility. This year the tool was updated specifically to (1) incorporate more site-specific model input assumptions for the wells and storage site modules, (2) develop a version that matches the general format of the HDSAM model developed and maintained by Argonne National Laboratory, and (3) incorporate specific demand scenarios illustrating the model's capability. Four general types of underground storage were analyzed: salt caverns, depleted oil/gas reservoirs, aquifers, and hard rock caverns/other custom sites. Due to the substantial lessons learned from the geological storage of natural gas already employed, these options present a potentially sizable storage option. Understanding and including these various geologic storage types in the analysis physical and economic framework will help identify what geologic option would be best suited for the storage of hydrogen. It is important to note, however, that existing natural gas options may not translate to a hydrogen system where substantial engineering obstacles may be encountered. There are only three locations worldwide that currently store hydrogen underground and they are all in salt caverns. Two locations are in the U.S. (Texas), and are managed by ConocoPhillips and Praxair (Leighty, 2007). The third is in Teeside, U.K., managed by Sabic Petrochemicals (Crotogino et

  2. ROOT: A C++ framework for petabyte data storage, statistical analysis and visualization

    SciTech Connect (OSTI)

    Antcheva, I.; Ballintijn, M.; Bellenot, B.; Biskup, M.; Brun, R.; Buncic, N.; Canal, Ph.; Casadei, D.; Couet, O.; Fine, V.; Franco, L.; ,

    2009-01-01

    ROOT is an object-oriented C++ framework conceived in the high-energy physics (HEP) community, designed for storing and analyzing petabytes of data in an efficient way. Any instance of a C++ class can be stored into a ROOT file in a machine-independent compressed binary format. In ROOT the TTree object container is optimized for statistical data analysis over very large data sets by using vertical data storage techniques. These containers can span a large number of files on local disks, the web or a number of different shared file systems. In order to analyze this data, the user can chose out of a wide set of mathematical and statistical functions, including linear algebra classes, numerical algorithms such as integration and minimization, and various methods for performing regression analysis (fitting). In particular, the RooFit package allows the user to perform complex data modeling and fitting while the RooStats library provides abstractions and implementations for advanced statistical tools. Multivariate classification methods based on machine learning techniques are available via the TMVA package. A central piece in these analysis tools are the histogram classes which provide binning of one- and multi-dimensional data. Results can be saved in high-quality graphical formats like Postscript and PDF or in bitmap formats like JPG or GIF. The result can also be stored into ROOT macros that allow a full recreation and rework of the graphics. Users typically create their analysis macros step by step, making use of the interactive C++ interpreter CINT, while running over small data samples. Once the development is finished, they can run these macros at full compiled speed over large data sets, using on-the-fly compilation, or by creating a stand-alone batch program. Finally, if processing farms are available, the user can reduce the execution time of intrinsically parallel tasks - e.g. data mining in HEP - by using PROOF, which will take care of optimally

  3. Stepwise adsorption in a mesoporous metal-organic framework: experimental and computational analysis

    SciTech Connect (OSTI)

    Yuan, Daqiang; Getman, Rachel B; Wei, Zhangwen; Snurr, Randall Q; Zhou, Hong-Cai

    2012-04-02

    Stepwise adsorption in a metal-organic framework with both micro- and meso-pores is caused by adsorbates first filling the micropores, then adsorbing along the mesopore walls, and finally filling the mesopores.

  4. Development of a Geological and GeomechanicalFramework for the Analysis of MEQ in EGS Experiments

    Broader source: Energy.gov [DOE]

    Project objective: to develop a framework for investigating processes that contribute to the occurrence of seismicity in enhanced geothermal systems with particular reference to the Newberry demonstration experiment and the potential Geysers EGS demonstration experiment.

  5. Rapidly assessing the activation conditions and porosity of metal-organic frameworks using thermogravimetric analysis

    SciTech Connect (OSTI)

    McDonald, TM; Bloch, ED; Long, JR

    2015-01-01

    A methodology utilizing a thermogravimetric analyzer to monitor propane uptake following incremental increases of the temperature is demonstrated as a means of rapidly identifying porous materials and determining the optimum activation conditions of metal-organic frameworks.

  6. Technology choice in a least-cost expansion analysis framework: Implications for state regulators

    SciTech Connect (OSTI)

    Guziel, K.A.; South, D.W.

    1990-01-01

    It is inevitable that new power plants will need to be constructed in the near future; however, it is unclear which technologies will be selected for these new plants. In a study for the US Department of Energy, the impacts of fuel prices, length of the planning period, and the characteristics of the generating system were examined for their influence on technology choice in 10 representative power pools. It was determined that natural gas combined-cycle technology was generally preferred for base-load and intermediate/cycling capacity when gas prices are low and the planning period is short (10 years). Integrated coal gasification combined-cycle plants were selected to serve most base-load requirements under other conditions. One aspect often overlooked in making a least-cost technology choice is system reliability: nonoptimal technology choices call be made if alternative expansion plans do not have the same level of reliability when discounted system costs are compared. Utilities have become capital averse due to a multitude of regulatory, market, and supply issues. Utilities are looking at natural gas technologies, since they offer rapid construction/deployment, low capital investment, and higher availability than coal-fired technologies. Of concern to state regulators is how to evaluate a least-cost plan. Key parameters studied were based on the following: (1) What is the impact of alternative gas projections on technology choice (2) What influence does the planning horizon (10 versus 30 years) have on technology choice (3) How important are existing system characteristics (e.g., mix of technologies, operating costs, load shape) on technology choice This paper summarizes the analysis framework and presents results for two power pools: Power Pool 1, the American Electric Power (AEP) service territory, and Power Pool 16, with all the utilities in Florida. 7 refs., 17 figs., 2 tabs. (JF)

  7. Combining Traditional Cyber Security Audit Data with Psychosocial Data: Towards Predictive Modeling for Insider Threat Mitigation

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Frincke, Deborah A.

    2010-09-01

    The purpose of this chapter is to motivate the combination of traditional cyber security audit data with psychosocial data, so as to move from an insider threat detection stance to one that enables prediction of potential insider presence. Two distinctive aspects of the approach are the objective of predicting or anticipating potential risks and the use of organizational data in addition to cyber data to support the analysis. The chapter describes the challenges of this endeavor and progress in defining a usable set of predictive indicators, developing a framework for integrating the analysis of organizational and cyber security data to yield predictions about possible insider exploits, and developing the knowledge base and reasoning capability of the system. We also outline the types of errors that one expects in a predictive system versus a detection system and discuss how those errors can affect the usefulness of the results.

  8. An Integrated Geovisual Analytics Framework for Analysis of Energy Consumption Data and Renewable Energy Potentials

    SciTech Connect (OSTI)

    Omitaomu, Olufemi A; Maness, Christopher S; Kramer, Ian S; Kodysh, Jeffrey B; Bhaduri, Budhendra L; Steed, Chad A; Karthik, Rajasekar; Nugent, Philip J; Myers, Aaron T

    2012-01-01

    We present an integrated geovisual analytics framework for utility consumers to interactively analyze and benchmark their energy consumption. The framework uses energy and property data already available with the utility companies and county governments respectively. The motivation for the developed framework is the need for citizens to go beyond the conventional utility bills in understanding the patterns in their energy consumption. There is also a need for citizens to go beyond one-time improvements that are often not monitored and measured over time. Some of the features of the framework include the ability for citizens to visualize their historical energy consumption data along with weather data in their location. The quantity of historical energy data available is significantly more than what is available from utility bills. An overlay of the weather data provides users with a visual correlation between weather patterns and their energy consumption patterns. Another feature of the framework is the ability for citizens to compare their consumption on an aggregated basis to that of their peers other citizens living in houses of similar size and age and within the same or different geographical boundaries, such as subdivision, zip code, or county. The users could also compare their consumption to others based on the size of their family and other attributes. This feature could help citizens determine if they are among the best in class . The framework can also be used by the utility companies to better understand their customers and to plan their services. To make the framework easily accessible, it is developed to be compatible with mobile consumer electronics devices.

  9. Flashback: Rapid scanning for radiological threats

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Flashback: Rapid scanning for radiological threats Flashback: Rapid scanning for radiological threats The ability to identify distinct material density enables the Multi-Mode Passive Detection System (MMPDS)to quickly detect unshielded to heavily shielded nuclear threats, as well as gamma rays, with near-zero false alarms. November 1, 2015 Decision Science Decision Science Decision Sciences' Multi-Mode Passive Detection System: Rapid scanning forradiological threats Click on headline to go to

  10. nuclear threat science | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    threat science Counterterrorism Counterterrorism Policy and Cooperation Nuclear Threat Science Office of Nuclear Threat Science The Office of Nuclear Threat Science is responsible for overseeing the Nuclear Counterterrorism Program, an NNSA program that sustains specialized expertise and integrates and executes key activities to advise and enable technical aspects of U.S. Government nuclear counterterrorism and... Office of Counterterrorism Policy and Cooperation The 2011 National Strategy for

  11. An Analysis Framework for Investigating the Trade-offs Between System Performance and Energy Consumption in a Heterogeneous Computing Environment

    SciTech Connect (OSTI)

    Friese, Ryan; Khemka, Bhavesh; Maciejewski, Anthony A; Siegel, Howard Jay; Koenig, Gregory A; Powers, Sarah S; Hilton, Marcia M; Rambharos, Rajendra; Okonski, Gene D; Poole, Stephen W

    2013-01-01

    Rising costs of energy consumption and an ongoing effort for increases in computing performance are leading to a significant need for energy-efficient computing. Before systems such as supercomputers, servers, and datacenters can begin operating in an energy-efficient manner, the energy consumption and performance characteristics of the system must be analyzed. In this paper, we provide an analysis framework that will allow a system administrator to investigate the tradeoffs between system energy consumption and utility earned by a system (as a measure of system performance). We model these trade-offs as a bi-objective resource allocation problem. We use a popular multi-objective genetic algorithm to construct Pareto fronts to illustrate how different resource allocations can cause a system to consume significantly different amounts of energy and earn different amounts of utility. We demonstrate our analysis framework using real data collected from online benchmarks, and further provide a method to create larger data sets that exhibit similar heterogeneity characteristics to real data sets. This analysis framework can provide system administrators with insight to make intelligent scheduling decisions based on the energy and utility needs of their systems.

  12. A nanotubular metal-organic framework with permanent porosity : structure analysis and gas sorption studies.

    SciTech Connect (OSTI)

    Ma, S.; Simmons, J. M.; Li, J. R.; Yuan, D.; Weng, W.; Liu, D. J.; Zhou, H. C.; Chemical Sciences and Engineering Division; Texas A&M Univ.; NIST

    2009-01-01

    A nanotubular metal-organic framework, PCN-19, was constructed based on a micro3-oxo-trinickel basic carboxylate secondary building unit (SBU) and the 9,10-anthracenedicarboxylate ligand; its permanent porosity was confirmed by N2 adsorption isotherms, and its H2 storage performances were evaluated under both low and high pressures at 77 K.

  13. A Framework for Risk Analysis for Ecological Restoration Projects in the U.S. Army Corps of Engineers

    SciTech Connect (OSTI)

    Diefenderfer, Heida L.; Thom, Ronald M.; Hofseth, Keith

    2005-01-03

    This report provides a framework for incorporating risk analysis into the six-step planning process for ecosystem restoration projects. This report is part of a larger research and development effort to develop procedures and guidelines for risk analysis in USACE ecosystem restoration planning. The focus is on risk analysis: identifying the range of possible outcomes from alternative ecosystem restoration actions, assessing the potential for achieving the desired outcome, characterizing the likelihood of adverse consequences, and communicating these findings to stakeholders and decision makers. This framework document makes simplifying assumptions to allow a focus on incorporating risk information in the planning and decision-making process. A conceptual model of the site and landscape is advocated as a central organizing structure within the six-step process for ecosystem restoration project planning. This is responsive to USACE directives that restoration projects be conceived in a systems context using an ecosystem and/or watershed approach. The conceptual model delineates the empirical quantities to be addressed in risk analysis and modeling. Although the planning process is described in six distinct steps, in practice these steps are iterative and often carried out simultaneously. Risk analysis within this context has the same character. The approach for incorporating risk analysis into the planning process provides direction intended to help the planner: Identify the levels of uncertainty that are acceptable, at the start of the planning process. Use conceptual and numerical models to communicate the planning teams understanding of the ecosystem to others, and reduce the risk of mis-specifying the system. Consider the uncertainty associated with the variables chosen to measure project effects. Use alternative designs to manage identified uncertainty. Use risk information to eliminate alternatives with unacceptable risk from consideration

  14. Sensor-guided threat countermeasure system

    DOE Patents [OSTI]

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  15. Global Threat Reduction Initiative | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The Current Status of Gap and U.S.-Origin Nuclear Fuel Removals 2011. Global Threat Reduction Initiative (2.96

  16. Autonomous Realtime Threat-Hunting Robot (ARTHR

    ScienceCinema (OSTI)

    INL

    2009-09-01

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  17. SEME FRAMEWORK

    Energy Science and Technology Software Center (OSTI)

    003284MLTPL00 Sequentially Executed Model Evaluation Framework https://software.sandia.gov/svn/teva/canary

  18. EM threat analysis for wireless systems.

    SciTech Connect (OSTI)

    Burkholder, R. J. (Ohio State University Electroscience Laboratory); Mariano, Robert J.; Schniter, P. (Ohio State University Electroscience Laboratory); Gupta, I. J. (Ohio State University Electroscience Laboratory)

    2006-06-01

    Modern digital radio systems are complex and must be carefully designed, especially when expected to operate in harsh propagation environments. The ability to accurately predict the effects of propagation on wireless radio performance could lead to more efficient radio designs as well as the ability to perform vulnerability analyses before and after system deployment. In this report, the authors--experts in electromagnetic (EM) modeling and wireless communication theory--describe the construction of a simulation environment that is capable of quantifying the effects of wireless propagation on the performance of digital communication.

  19. Framework for the Economic Analysis of Hybrid Systems Based on Exergy Consumption

    SciTech Connect (OSTI)

    Cristian Rabiti; Robert S. Cherry; Wesley R. Deason; Piyush Sabharwall; Shannon M. Bragg-Sitton; Richard D. Boardman

    2014-08-01

    Starting from an overview of the dynamic behavior of the electricity market the need of the introduction of energy users that will provide a damping capability to the system is derived as also a qualitative analysis of the impact of uncertainty, both in the demand and supply side, is performed. Then it follows an introduction to the investment analysis methodologies based on the discounting of the cash flow, and then work concludes with the illustration and application of the exergonomic principles to provide a sound methodology for the cost accounting of the plant components to be used in the cash flow analysis.

  20. Systems analysis of past, present, and future chemical terrorism scenarios.

    SciTech Connect (OSTI)

    Hoette, Trisha Marie

    2012-03-01

    Throughout history, as new chemical threats arose, strategies for the defense against chemical attacks have also evolved. As a part of an Early Career Laboratory Directed Research and Development project, a systems analysis of past, present, and future chemical terrorism scenarios was performed to understand how the chemical threats and attack strategies change over time. For the analysis, the difficulty in executing chemical attack was evaluated within a framework of three major scenario elements. First, historical examples of chemical terrorism were examined to determine how the use of chemical threats, versus other weapons, contributed to the successful execution of the attack. Using the same framework, the future of chemical terrorism was assessed with respect to the impact of globalization and new technologies. Finally, the efficacy of the current defenses against contemporary chemical terrorism was considered briefly. The results of this analysis justify the need for continued diligence in chemical defense.

  1. GridOPTICS(TM) A Novel Software Framework for Integrating Power Grid Data Storage, Management and Analysis

    SciTech Connect (OSTI)

    Gorton, Ian; Yin, Jian; Akyol, Bora A.; Ciraci, Selim; Critchlow, Terence; Liu, Yan; Gibson, Tara D.; Purohit, Sumit; Sharma, Poorva; Vlachopoulou, Maria

    2013-01-09

    This paper describes the architecture and design of GridOPTICSTM, a novel software framework to integrate a collection of software tools developed by PNNLs Future Power Grid Initiative (FPGI) into a coherent, powerful operations and planning tool for the power grid of the future. GridOPTICSTM enables plug-and-play of various analysis, modeling and visualization software tools for fast and accurate control of the power grid. To bridge the data access for different control purposes, GridOPTICSTM provides a scalable and thin layer of event processing that hides the complexity of data storage and management. The initial prototype of GridOPTICSTM was demonstrated with several use cases from PNNLs FPGI.

  2. Approach to proliferation risk assessment based on multiple objective analysis framework

    SciTech Connect (OSTI)

    Andrianov, A.; Kuptsov, I.

    2013-07-01

    The approach to the assessment of proliferation risk using the methods of multi-criteria decision making and multi-objective optimization is presented. The approach allows the taking into account of the specifics features of the national nuclear infrastructure, and possible proliferation strategies (motivations, intentions, and capabilities). 3 examples of applying the approach are shown. First, the approach has been used to evaluate the attractiveness of HEU (high enriched uranium)production scenarios at a clandestine enrichment facility using centrifuge enrichment technology. Secondly, the approach has been applied to assess the attractiveness of scenarios for undeclared production of plutonium or HEU by theft of materials circulating in nuclear fuel cycle facilities and thermal reactors. Thirdly, the approach has been used to perform a comparative analysis of the structures of developing nuclear power systems based on different types of nuclear fuel cycles, the analysis being based on indicators of proliferation risk.

  3. Mathematical framework for the analysis of dynamic stochastic systems with the RAVEN code

    SciTech Connect (OSTI)

    Rabiti, C.; Mandelli, D.; Alfonsi, A.; Cogliati, J.; Kinoshita, R.

    2013-07-01

    RAVEN (Reactor Analysis and Virtual control Environment) is a software code under development at Idaho National Laboratory aimed at performing probabilistic risk assessment and uncertainty quantification using RELAP-7, for which it acts also as a simulation controller. In this paper we will present the equations characterizing a dynamic stochastic system and we will then discuss the behavior of each stochastic term and how it is accounted for in the RAVEN software design. Moreover we will present preliminary results of the implementation. (authors)

  4. MATHEMATICAL FRAMEWORK FOR THE ANALYSIS OF DYNAMC STOCHASTIC SYSTEMS WITH THE RAVEN CODE

    SciTech Connect (OSTI)

    C. Rabiti; D. Mandelli; J. Cogliati; R. Kinoshita

    2013-05-01

    RAVEN (Reactor Analysis and Virtual control Environment) is a software code under development at Idaho National Laboratory aimed at performing probabilistic risk assessment and uncertainty quantification using RELAP-7, for which it acts also as a simulation controller. In this paper we will present the equations characterizing a dynamic stochastic system and we will then discuss the behavior of each stochastic term and how it is accounted for in the RAVEN software design. Moreover we will present preliminary results of the implementation.

  5. Rapid Threat Organism Recognition Pipeline

    Energy Science and Technology Software Center (OSTI)

    2013-05-07

    The RAPTOR computational pipeline identifies microbial nucleic acid sequences present in sequence data from clinical samples. It takes as input raw short-read genomic sequence data (in particular, the type generated by the Illumina sequencing platforms) and outputs taxonomic evaluation of detected microbes in various human-readable formats. This software was designed to assist in the diagnosis or characterization of infectious disease, by detecting pathogen sequences in nucleic acid sequence data from clinical samples. It has alsomore » been applied in the detection of algal pathogens, when algal biofuel ponds became unproductive. RAPTOR first trims and filters genomic sequence reads based on quality and related considerations, then performs a quick alignment to the human (or other host) genome to filter out host sequences, then performs a deeper search against microbial genomes. Alignment to a protein sequence database is optional. Alignment results are summarized and placed in a taxonomic framework using the Lowest Common Ancestor algorithm.« less

  6. Methodological Framework for Analysis of Buildings-Related Programs: The GPRA Metrics Effort

    SciTech Connect (OSTI)

    Elliott, Douglas B.; Anderson, Dave M.; Belzer, David B.; Cort, Katherine A.; Dirks, James A.; Hostick, Donna J.

    2004-06-18

    The requirements of the Government Performance and Results Act (GPRA) of 1993 mandate the reporting of outcomes expected to result from programs of the Federal government. The U.S. Department of Energy’s (DOE’s) Office of Energy Efficiency and Renewable Energy (EERE) develops official metrics for its 11 major programs using its Office of Planning, Budget Formulation, and Analysis (OPBFA). OPBFA conducts an annual integrated modeling analysis to produce estimates of the energy, environmental, and financial benefits expected from EERE’s budget request. Two of EERE’s major programs include the Building Technologies Program (BT) and Office of Weatherization and Intergovernmental Program (WIP). Pacific Northwest National Laboratory (PNNL) supports the OPBFA effort by developing the program characterizations and other market information affecting these programs that is necessary to provide input to the EERE integrated modeling analysis. Throughout the report we refer to these programs as “buildings-related” programs, because the approach is not limited in application to BT or WIP. To adequately support OPBFA in the development of official GPRA metrics, PNNL communicates with the various activities and projects in BT and WIP to determine how best to characterize their activities planned for the upcoming budget request. PNNL then analyzes these projects to determine what the results of the characterizations would imply for energy markets, technology markets, and consumer behavior. This is accomplished by developing nonintegrated estimates of energy, environmental, and financial benefits (i.e., outcomes) of the technologies and practices expected to result from the budget request. These characterizations and nonintegrated modeling results are provided to OPBFA as inputs to the official benefits estimates developed for the Federal Budget. This report documents the approach and methodology used to estimate future energy, environmental, and financial benefits

  7. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    ScienceCinema (OSTI)

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2010-01-08

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  8. Manager, International Chemical Threat Reduction Department, Sandia

    National Nuclear Security Administration (NNSA)

    National Laboratories | National Nuclear Security Administration | (NNSA) Manager, International Chemical Threat Reduction Department, Sandia National Laboratories Nancy B. Jackson Nancy Jackson Nancy B. Jackson, manager of the International Chemical Threat Reduction Department at Sandia National Laboratories, will be the American Chemical Society president in 2011 and will serve on the ACS Board of Directors during her presidential succession, which will run from 2010 to 2012. Jackson holds

  9. Why is Zika now a threat?

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    is Zika now a threat? Why is Zika now a threat? Population growth, rising temperatures, embryonic immune systems says Lab scientist February 25, 2016 Human-gorilla divergence may have occurred two million years earlier than thought (Photo : Flickr: Rod Waddington) Human-gorilla divergence may have occurred two million years earlier than thought (Photo : Flickr: Rod Waddington) "The distribution, transmission, and abundance of vectors that bear and transmit diseases are being enhanced by

  10. Bio-Terrorism Threat and Casualty Prevention

    SciTech Connect (OSTI)

    NOEL,WILLIAM P.

    2000-01-01

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  11. Structural analysis of three global land models on carbon cycle simulations using a traceability framework

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Rafique, R.; Xia, J.; Hararuk, O.; Luo, Y.

    2014-06-27

    Modeled carbon (C) storage capacity is largely determined by the C residence time and net primary productivity (NPP). Extensive research has been done on NPP dynamics but the residence time and their relationships with C storage are much less studied. In this study, we implemented a traceability analysis to understand the modeled C storage and residence time in three land surface models: CSIRO's Atmosphere Biosphere Land Exchange (CABLE) with 9 C pools, Community Land Model (version 3.5) combined with Carnegie-Ames-Stanford Approach (CLM3.5-CASA) with 12 C pools and Community Land Model (version 4) (CLM4) with 26 C pools. The globally averagedmoreC storage and residence time was computed at both individual pool and total ecosystem levels. The spatial distribution of total ecosystem C storage and residence time differ greatly among the three models. The CABLE model showed a closer agreement with measured C storage and residence time in plant and soil pools than CLM3.5-CASA and CLM4. However, CLM3.5-CASA and CLM4 were close to each other in modeled C storage but not with measured data. CABLE stores more C in root whereas CLM3.5-CASA and CLM4 store more C in woody pools, partly due to differential NPP allocation in respective pools. The C residence time in individual C pools is greatly different among models, largely because of different transfer coefficient values among pools. CABLE had higher bulk residence time for soil C pools than the other two models. Overall, the traceability analysis used in this study can help fully characterizes the behavior of complex land models.less

  12. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute...

  13. The space weather threat... and how we protect ourselves

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    space weather threat... and how we protect ourselves The space weather threat... and how we protect ourselves The Sun continually ejects high-energy electrons, protons, and other ...

  14. Before the House Subcommittee on Emerging Threats, Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and ...

  15. The space weather threat... and how we protect ourselves

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The space weather threat... and how we protect ourselves The space weather threat... and how we protect ourselves The Sun continually ejects high-energy electrons, protons, and ...

  16. Secure Policy-Based Configuration Framework (PBCONF)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Policy-Based Configuration Framework (PBCONF) Interoperable, open-source framework for secure remote configuration of modern and legacy devices Background Energy delivery devices are dispersed throughout the electric grid and are an integral part of real-time power transmission and distribution. As today's cyber threats continue to advance, ensuring the security and resiliency of these digital devices is critical to ensuring the continuous delivery of power to consumers. Incorrect or

  17. GTT Framework

    Broader source: Energy.gov [DOE]

    The GTT proposes a strategic framework that organizes these activities into three interrelated dimensions (informational, analytical, and physical), representative of the systems nature of the grid.

  18. Technology choice in a least-cost expansion analysis framework: The impact of gas prices, planning horizon, and system characteristics

    SciTech Connect (OSTI)

    Guziel, K.A.; South, D.W.

    1990-01-01

    The current outlook for new capacity addition by electric utilities is uncertain and tenuous. Regardless of the amount, it is inevitable that new capacity will be needed in the 1990s and beyond. The fundamental question about the addition capacity requirements centers on technology choice and the factors influencing the decision process. We examined technology choices in 10 representative power pools with a dynamic optimization expansion model, the Wien Automatic System Planning (WASP) Package. These 10 power pools were determined to be representative on the basis of a cluster analysis conducted on all 26 power pools in the United States. A least-cost expansion plan was determined for each power pool with three candidate technologies--natural gas combustion turbine (CT), natural gas combined cycle (NGCC), and integrated gasification combined cycle (IGCC)--three alternative gas price tracks, and two planning horizons between the years 1995 and 2020. This paper summarizes the analysis framework and presents results for Power Pool 1, the American Electric Power (AEP) service territory. 7 refs., 9 figs., 1 tab.

  19. Nuclear Radiological Threat Task Force Established | National Nuclear

    National Nuclear Security Administration (NNSA)

    Security Administration | (NNSA) Radiological Threat Task Force Established Nuclear Radiological Threat Task Force Established Washington, DC NNSA's Administrator Linton Brooks announces the establishment of the Nuclear Radiological Threat Reduction Task Force (NRTRTF) to combat the threats posed by radiological dispersion devices or "dirty bombs."

  20. Left-Wing Extremism: The Current Threat

    SciTech Connect (OSTI)

    Karl A. Seger

    2001-04-30

    Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

  1. A resilience assessment framework for infrastructure and economic systems : quantitative and qualitative resilience analysis of petrochemical supply chains to a hurricane.

    SciTech Connect (OSTI)

    Ehlen, Mark Andrew; Vugrin, Eric D.; Warren, Drake E.

    2010-03-01

    In recent years, the nation has recognized that critical infrastructure protection should consider not only the prevention of disruptive events, but also the processes that infrastructure systems undergo to maintain functionality following disruptions. This more comprehensive approach has been termed critical infrastructure resilience (CIR). Given the occurrence of a particular disruptive event, the resilience of a system to that event is the system's ability to efficiently reduce both the magnitude and duration of the deviation from targeted system performance levels. Sandia National Laboratories (Sandia) has developed a comprehensive resilience assessment framework for evaluating the resilience of infrastructure and economic systems. The framework includes a quantitative methodology that measures resilience costs that result from a disruption to infrastructure function. The framework also includes a qualitative analysis methodology that assesses system characteristics that affect resilience in order to provide insight and direction for potential improvements to resilience. This paper describes the resilience assessment framework. This paper further demonstrates the utility of the assessment framework through application to a hypothetical scenario involving the disruption of a petrochemical supply chain by a hurricane.

  2. Insider Threat - Material Control and Accountability Mitigation

    SciTech Connect (OSTI)

    Powell, Danny H; Elwood Jr, Robert H; Roche, Charles T

    2011-01-01

    The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur by an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with

  3. Anomaly metrics to differentiate threat sources from benign sources in primary vehicle screening.

    SciTech Connect (OSTI)

    Cohen, Israel Dov; Mengesha, Wondwosen

    2011-09-01

    Discrimination of benign sources from threat sources at Port of Entries (POE) is of a great importance in efficient screening of cargo and vehicles using Radiation Portal Monitors (RPM). Currently RPM's ability to distinguish these radiological sources is seriously hampered by the energy resolution of the deployed RPMs. As naturally occurring radioactive materials (NORM) are ubiquitous in commerce, false alarms are problematic as they require additional resources in secondary inspection in addition to impacts on commerce. To increase the sensitivity of such detection systems without increasing false alarm rates, alarm metrics need to incorporate the ability to distinguish benign and threat sources. Principal component analysis (PCA) and clustering technique were implemented in the present study. Such techniques were investigated for their potential to lower false alarm rates and/or increase sensitivity to weaker threat sources without loss of specificity. Results of the investigation demonstrated improved sensitivity and specificity in discriminating benign sources from threat sources.

  4. MVC Framework

    Energy Science and Technology Software Center (OSTI)

    2008-06-03

    Provides a reusable model-view-controller application programming interface (API) for use in the rapid development of graphical user interface applications in the .NET 2.0 framework. This includes a mechanism for adding new data stores, data sources, data analyses, and visualizations in the form of plugins.] The MVC Framework is implemented in C# as a .NET 2.0 framework that can then be built against when developing applications. The infrasturcture allows for presenting application specific views (visualizations) tomore » the user to interact with. Based on the interactions the suer makes with a view, requests are generated which in turn are handled by the central controller facility. The controller handles the request in an application specific manner by routing the request to appropriate data stores, data accessors or data analyzers. Retrieved or processed data is published to subscribed components for further processing or for presentation to the user.« less

  5. Review and analysis of the adequacy of the legal and institutional framework for geothermal development in Washington State

    SciTech Connect (OSTI)

    Bloomquist, R.G.

    1985-12-01

    The legal and institutional framework within which geothermal energy must develop has its origin in the early 1970s. In 1970, the Federal Geothermal Steam Act was passed into law and in 1974 the Washington State Geothermal Act was passed. The legal and institutional framework thus established by the state and federal governments differed substantially in format, content, and direction. In many instances, the legal and institutional framework established left as many questions unanswered as answered, and in some cases, the framework has proven to be more of an obstacle to development than an aid. From an examination of how the state and federal governments have addressed the varying needs of geothermal development and how the courts have interpreted some of their decisions, it is clear that in order to ensure that the legal and institutional framework is adequate to serve the needs of geothermal development, it must address, at a minimum, the following topics: (1) providing developers with access and a priority right to carry out exploration and development activities; (2) characterization of the resource so as to minimize conflicts with other natural resources; (3) establishing ownership; and (4) giving careful consideration to such lease terms as rentals and royalties, lease renewals, and diligence requirements. In addition, the framework must address groundwater law and its implications for geothermal development and how geothermal development will be considered in terms of establishing utility law. At the local level, it is imperative that geothermal be given careful consideration when decisions on resource management, zoning, and regulation are made. Local governments also have the power to establish programs which can provide substantial incentives for geothermal development and, by so doing, ensure that geothermal energy contributes to economic stability and growth.

  6. Securing Infrastructure from High Explosive Threats

    SciTech Connect (OSTI)

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  7. Nonproliferation, Nuclear Security, and the Insider Threat

    SciTech Connect (OSTI)

    Balatsky, Galya I.; Duggan, Ruth

    2012-07-12

    Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

  8. Matrix Characterization in Threat Material Detection Processes

    SciTech Connect (OSTI)

    Obhodas, J.; Sudac, D.; Valkovic, V.

    2009-03-10

    Matrix characterization in the threat material detection is of utmost importance, it generates the background against which the threat material signal has to be identified. Threat materials (explosive, chemical warfare, ...) are usually contained within small volume inside large volumes of variable matrices. We have studied the influence of matrix materials on the capability of neutron systems to identify hidden threat material. Three specific scenarios are considered in some details: case 1--contraband material in the sea containers, case 2 - explosives in soil (landmines), case 3 - explosives and chemical warfare on the sea bottom. Effects of container cargo material on tagged neutron system are seen in the increase of gamma background and the decrease of neutron beam intensity. Detection of landmines is more complex because of variable soil properties. We have studied in detail space and time variations of soil elemental compositions and in particular hydrogen content (humidity). Of special interest are ammunitions and chemical warfare on the sea bottom, damping sites and leftovers from previous conflicts (WW-I, WW-II and local). In this case sea sediment is background source and its role is similar to the role of the soil in the landmine detection. In addition to geochemical cycling of chemical elements in semi-enclosed sea, like the Adriatic Sea, one has to consider also anthropogenic influence, especially when studying small scale variations in concentration levels. Some preliminary experimental results obtained with tagged neutron sensor inside an underwater vehicle are presented as well as data on sediment characterization by X-Ray Fluorescence.

  9. Introduction to Administrative Programs that Mitigate the Insider Threat

    SciTech Connect (OSTI)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  10. Modeling threat assessments of water supply systems using markov latent effects methodology.

    SciTech Connect (OSTI)

    Silva, Consuelo Juanita

    2006-12-01

    Recent amendments to the Safe Drinking Water Act emphasize efforts toward safeguarding our nation's water supplies against attack and contamination. Specifically, the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 established requirements for each community water system serving more than 3300 people to conduct an assessment of the vulnerability of its system to a terrorist attack or other intentional acts. Integral to evaluating system vulnerability is the threat assessment, which is the process by which the credibility of a threat is quantified. Unfortunately, full probabilistic assessment is generally not feasible, as there is insufficient experience and/or data to quantify the associated probabilities. For this reason, an alternative approach is proposed based on Markov Latent Effects (MLE) modeling, which provides a framework for quantifying imprecise subjective metrics through possibilistic or fuzzy mathematics. Here, an MLE model for water systems is developed and demonstrated to determine threat assessments for different scenarios identified by the assailant, asset, and means. Scenario assailants include terrorists, insiders, and vandals. Assets include a water treatment plant, water storage tank, node, pipeline, well, and a pump station. Means used in attacks include contamination (onsite chemicals, biological and chemical), explosives and vandalism. Results demonstrated highest threats are vandalism events and least likely events are those performed by a terrorist.

  11. Deterring regional threats from nuclear proliferation

    SciTech Connect (OSTI)

    Spector, L.S.

    1992-03-12

    The most prominent shift in the National Military Strategy is from the global Soviet threat to a new focus on regional contingencies. No threat looms larger in these contingencies than the proliferation of nuclear weapons and ballistic missiles. This study examines proliferation trends and proposes a predominately diplomatic strategy for containing the problem. Dr. Spector identifies three waves of proliferation: the first is the five states with declared weapons and doctrine-the United States, Russia, Great Britain, France, and China; the second includes a less visible group that developed a covert capability, without testing weapons or declaring a doctrine of deterrence-for example, Israel, India, and probably Pakistan; and, a third wave of would-be proliferators includes radical states like Iraq, Iran, Libya, and North Korea. Spector's political approach is based on the common interest of wave one and two states to prevent further proliferation. Political-economic incentives have already worked in the cases of Brazil, Argentina, Taiwan, and South Africa-states which appear to have abandoned their nuclear weapons programs. Spector does not rule out the option of military force. Force, especially under international sanctions, can be a powerful tool to back diplomatic efforts. Use of force, however, remains a last resort.

  12. An analysis framework for characterizing and explaining development of EIA legislation in developing countries-Illustrated for Georgia, Ghana and Yemen

    SciTech Connect (OSTI)

    Kolhoff, Arend J.; Driessen, Peter P.J.; Runhaar, Hens A.C.

    2013-01-15

    Actors in the field of international development co-operation supporting the development of EIA legislation in developing countries often do not achieve the results envisaged. The performance of EIA in these countries often remains weak. One reason, we assume, is that often those actors support the establishment of overly ambitious EIA legislation that cannot achieve its objectives in the light of constraining contexts. To provide more effective support we need to better understand the enabling and constraining contextual factors that influence the development of EIA legislation and to which support actors should align itself. In this article a new analysis framework for classifying, characterizing and explaining the development of EIA legislation is described, measured in terms of ambition levels. Ambitions are defined as intentions the EIA authorities aim to fulfill, expressed in formal EIA legislation. Three country cases, Yemen, Georgia and Ghana are used to illustrate the usefulness of our framework and as a first test to refine the framework. We have formulated the following five hypotheses that complement and refine our analysis framework. One, EIA legislation may develop multilinearly in terms of ambition levels. Two, ambitions in EIA legislation seem to be influenced to a great extent by the power and capacity of, on the one hand, the environmental authorities supporting EIA and, on the other hand, the sector authorities hindering the development of EIA. Three, the political system is the most important context factor influencing the rules of policy-making and the power of the different actors involved. Four, the importance of context factors on the development of ambitions is dependent on the phase of EIA system development. Five, some ambitions seem to be influenced by particular factors; for instance the ambitions for the object of study seem to be influenced by the level of environmental awareness of the sector ministries and parliament. The analysis

  13. A Pervasive Parallel Processing Framework For Data Visualization And Analysis At Extreme Scale Final Scientific and Technical Report

    SciTech Connect (OSTI)

    Geveci, Berk

    2014-10-31

    The evolution of the computing world from teraflop to petaflop has been relatively effortless,with several of the existing programming models scaling effectively to the petascale. The migration to exascale, however, poses considerable challenges. All industry trends infer that the exascale machine will be built using processors containing hundreds to thousands of cores per chip. It can be inferred that efficient concurrency on exascale machines requires a massive amount of concurrent threads, each performing many operations on a localized piece of data. Currently, visualization libraries and applications are based off what is known as the visualization pipeline. In the pipeline model, algorithms are encapsulated as filters with inputs and outputs. These filters are connected by setting the output of one component to the input of another. Parallelism in the visualization pipeline is achieved by replicating the pipeline for each processing thread. This works well for today’s distributed memory parallel computers but cannot be sustained when operating on processors with thousands of cores. Our project investigates a new visualization framework designed to exhibit the pervasive parallelism necessary for extreme scale machines. Our framework achieves this by defining algorithms in terms of worklets, which are localized stateless operations. Worklets are atomic operations that execute when invoked unlike filters, which execute when a pipeline request occurs. The worklet design allows execution on a massive amount of lightweight threads with minimal overhead. Only with such fine-grained parallelism can we hope to fill the billions of threads we expect will be necessary for efficient computation on an exascale machine.

  14. An Overview of Non-traditional Nuclear Threats

    SciTech Connect (OSTI)

    Geelhood, Bruce D.; Wogman, Ned A.

    2005-01-01

    In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or ''dirty'' bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials entering our borders is considered. The radiation and other signatures or potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.

  15. GTRI: Reducing Nuclear Threats | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) GTRI: Reducing Nuclear Threats May 29, 2014 Mission In 2004 NNSA established the Global Threat Reduction Initiative (GTRI) in the Office of Defense Nuclear Nonproliferation to, as quickly as possible, identify, secure, remove and/or facilitate the disposition of high risk vulnerable nuclear and radiological materials around the world that pose a threat to the United States and the international community. GTRI's mission is to reduce and protect vulnerable nuclear and radiological

  16. Insider Threat to Nuclear and Radiological Materials: Fact Sheet | National

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration | (NNSA) Insider Threat to Nuclear and Radiological Materials: Fact Sheet March 23, 2012 Almost all known cases of theft of nuclear material involved an insider. The threat of a nuclear facility insider, either individually or in collusion with an outsider, stealing fissile material or committing sabotage at a nuclear facility is a difficult one to accept and prevent. The skills, knowledge, access, and authority held by some insiders make the threat difficult

  17. Nuclear Safety Regulatory Framework

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Nuclear Safety Regulatory Framework DOE's Nuclear Safety Enabling Legislation Regulatory Enforcement & Oversight Regulatory Governance Atomic Energy Act 1946 Atomic Energy Act 1954 Energy Reorganization Act 1974 DOE Act 1977 Authority and responsibility to regulate nuclear safety at DOE facilities 10 CFR 830 10 CFR 835 10 CFR 820 Regulatory Implementation Nuclear Safety Radiological Safety Procedural Rules ISMS-QA; Operating Experience; Metrics and Analysis Cross Cutting

  18. NNSA's Global Threat Reduction Initiative Removes More Than One...

    National Nuclear Security Administration (NNSA)

    Global Threat Reduction Initiative Removes More Than One Ton of Food | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  19. Mitigating the Insider Threat Using Behavioral Science Workshop

    SciTech Connect (OSTI)

    Landers, John; De Castro, Kara

    2012-11-26

    PowerPoint presentations are included on: the Insider Threat; Detecting the Malicious Insider through Behavioral Science; and Psychological Barriers to Effective Nuclear Security.

  20. ORISE: Securing the Golden State from threats foreign and domestic

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ORISE helps California emergency planners with innovative training on state and local levels To protect the state of California from both foreign and domestic threats, ORISE ...

  1. NNSA Launches Global Threat Reduction Initiative | National Nuclear...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Launches Global Threat Reduction Initiative Vienna, Austria Secretary Abraham, in a speech to delegates at the International Energy Agency in Vienna, Austria, launches the...

  2. Technology choice in a least-cost expansion analysis framework: Effects of gas price, planning period, and system characteristics

    SciTech Connect (OSTI)

    Guziel, K.A.; South, D.W.; Bhatarakamol, S.; Poch, L.A.

    1990-04-01

    The current outlook for new capacity additions by electric utilities is uncertain and tenuous. The fundamental question about the additional capacity requirements center on technology choice and the factors influencing the decision process. Instead of building capital-intensive power plants, utilities have begun relying on natural gas technologies, which permit rapid construction and deployment and low capital investment. Of concern to policymakers and utility planners are the following questions: (1) What is the impact of alternative gas price projections on technology choice (2) What influence does the planning horizon have on technology choice (3) How important are existing system characteristics on technology choice (4) What effect does capital cost, when combined with other technology characteristics in a capacity expansion framework, have on technology choice In this study Argonne National Laboratory examined the impact of these concerns on technology choices in 10 representative power pools with a dynamic optimization expansion model, the Wien Automatic System Planning Package (WASP). At least-cost expansion plan was determined for each power pool with three candidate technologies--natural gas combustion turbine technology (GT), natural gas combined-cycle technology (NGCC), and integrated gasification combined-cycle technology (IGCC)--three alternative fuel price tracks, and two planning periods (10-yr versus 30-yr optimization) between the years 1995 and 2025. The three fuel price tracks represented scenarios for low, medium, and high gas prices. Sensitivity analyses were conducted on IGCC capital cost and unserved energy costs. 21 refs., 79 figs., 21 tabs.

  3. DAKOTA : a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis.

    SciTech Connect (OSTI)

    Eldred, Michael Scott; Vigil, Dena M.; Dalbey, Keith R.; Bohnhoff, William J.; Adams, Brian M.; Swiler, Laura Painton; Lefantzi, Sophia; Hough, Patricia Diane; Eddy, John P.

    2011-12-01

    The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic expansion methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a theoretical manual for selected algorithms implemented within the DAKOTA software. It is not intended as a comprehensive theoretical treatment, since a number of existing texts cover general optimization theory, statistical analysis, and other introductory topics. Rather, this manual is intended to summarize a set of DAKOTA-related research publications in the areas of surrogate-based optimization, uncertainty quantification, and optimization under uncertainty that provide the foundation for many of DAKOTA's iterative analysis capabilities.

  4. Sensor Data Processing for Tracking Underwater Threats Using Terascale Optical Core Devices

    SciTech Connect (OSTI)

    Barhen, Jacob; Imam, Neena

    2009-01-01

    A critical aspect of littoral surveillance (including port protection) involves the localization and tracking of underwater threats such as manned or unmanned autonomous underwater vehicles. In this article, we present a methodology for locating underwater threat sources from uncertain sensor network data, and illustrate the threat tracking aspects using active sonars in a matched filter framework. The novelty of the latter paradigm lies in its implementation on a tera-scale optical core processor, EnLight , recently introduced by Lenslet Laboratories. This processor is optimized for array operations, which it performs in a fixed point arithmetic architecture at tera-scale throughput. Using the EnLight 64 prototype processor, our results (i) illustrate the ability to reach a robust tracking accuracy, and (ii) demonstrate that a considerable speed-up (a factor of over 13,000) can be achieved when compared to an Intel XeonTM processor in the computation of sets of 80K-sample complex Fourier transforms that are associated with our matched filter techniques.

  5. Beyond Adapting to Climate Change: Embedding Adaptation in Responses to Multiple Threats and Stresses

    SciTech Connect (OSTI)

    Wilbanks, Thomas J; Kates, Dr. Robert W.

    2010-01-01

    Climate change impacts are already being experienced in every region of the United States and every part of the world most severely in Arctic regions and adaptation is needed now. Although climate change adaptation research is still in its infancy, significant adaptation planning in the United States has already begun in a number of localities. This article seeks to broaden the adaptation effort by integrating it with broader frameworks of hazards research, sustainability science, and community and regional resilience. To extend the range of experience, we draw from ongoing case studies in the Southeastern United States and the environmental history of New Orleans to consider the multiple threats and stresses that all communities and regions experience. Embedding climate adaptation in responses to multiple threats and stresses helps us to understand climate change impacts, themselves often products of multiple stresses, to achieve community acceptance of needed adaptations as co-benefits of addressing multiple threats, and to mainstream the process of climate adaptation through the larger envelope of social relationships, communication channels, and broad-based awareness of needs for risk management that accompany community resilience.

  6. Dakota, a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis :

    SciTech Connect (OSTI)

    Adams, Brian M.; Ebeida, Mohamed Salah; Eldred, Michael S.; Jakeman, John Davis; Swiler, Laura Painton; Stephens, John Adam; Vigil, Dena M.; Wildey, Timothy Michael; Bohnhoff, William J.; Eddy, John P.; Hu, Kenneth T.; Dalbey, Keith R.; Bauman, Lara E; Hough, Patricia Diane

    2014-05-01

    The Dakota (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a exible and extensible interface between simulation codes and iterative analysis methods. Dakota contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quanti cation with sampling, reliability, and stochastic expansion methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the Dakota toolkit provides a exible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a user's manual for the Dakota software and provides capability overviews and procedures for software execution, as well as a variety of example studies.

  7. Hanford Site Cleanup Completion Framework - Hanford Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Plan Single-Shell Tank Evaluations Deep Vadose Zone 100-F RIFS Sitewide Probabilistic Seismic Hazard Analysis Environmental Hanford Site Cleanup Completion Framework Email Email...

  8. A Conceptual Architecture for National Biosurveillance: Moving Beyond Situational Awareness to Enable Digital Detection of Emerging Threats

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Velsko, Stephan; Bates, Thomas

    2016-06-17

    Despite numerous calls for improvement, the U.S. biosurveillance enterprise remains a patchwork of uncoordinated systems that fail to take advantage of the rapid progress in information processing, communication, and analytics made in the past decade. By synthesizing components from the extensive biosurveillance literature, we propose a conceptual framework for a national biosurveillance architecture and provide suggestions for implementation. The framework differs from the current federal biosurveillance development pathway in that it is not focused on systems useful for “situational awareness,” but is instead focused on the long-term goal of having true warning capabilities. Therefore, a guiding design objective is themore » ability to digitally detect emerging threats that span jurisdictional boundaries, because attempting to solve the most challenging biosurveillance problem first provides the strongest foundation to meet simpler surveillance objectives. Core components of the vision are: (1) a whole-of-government approach to support currently disparate federal surveillance efforts that have a common data need, including those for food safety, vaccine and medical product safety, and infectious disease surveillance; (2) an information architecture that enables secure, national access to electronic health records, yet does not require that data be sent to a centralized location for surveillance analysis; (3) an inference architecture that leverages advances in ‘big data’ analytics and learning inference engines—a significant departure from the statistical process control paradigm that underpins nearly all current syndromic surveillance systems; and, (4) an organizational architecture with a governance model aimed at establishing national biosurveillance as a critical part of the U.S. national infrastructure. Although it will take many years to implement, and a national campaign of education and debate to acquire public buy-in for such a comprehensive

  9. A New Framework for Adaptive Sampling and Analysis During Long-Term Monitoring and Remedial Action Management

    SciTech Connect (OSTI)

    Minsker, Barbara; Albert Valocchi; Barbara Bailey

    2008-01-27

    DOE and other Federal agencies are making a significant investment in the development of field analytical techniques, nonintrusive technologies, and sensor technologies that will have a profound impact on the way environmental monitoring is conducted. Monitoring and performance evaluation networks will likely be base on suites of in situ sensors, with physical sampling playing a much more limited role. Designing and using these types of networks effectively will require development of a new paradigm for sampling and analysis of remedial actions, which is the overall goal of this project.

  10. Enterprise Risk Management Framework

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Framework The Enterprise Risk Management (ERM) framework includes four steps: identify the risks, determine the probability and impact of each one, identify controls that are...

  11. Robust Systems Test Framework

    Energy Science and Technology Software Center (OSTI)

    2003-01-01

    The Robust Systems Test Framework (RSTF) provides a means of specifying and running test programs on various computation platforms. RSTF provides a level of specification above standard scripting languages. During a set of runs, standard timing information is collected. The RSTF specification can also gather job-specific information, and can include ways to classify test outcomes. All results and scripts can be stored into and retrieved from an SQL database for later data analysis. RSTF alsomore » provides operations for managing the script and result files, and for compiling applications and gathering compilation information such as optimization flags.« less

  12. A framework and review of customer outage costs: Integration and analysis of electric utility outage cost surveys

    SciTech Connect (OSTI)

    Lawton, Leora; Sullivan, Michael; Van Liere, Kent; Katz, Aaron; Eto, Joseph

    2003-11-01

    A clear understanding of the monetary value that customers place on reliability and the factors that give rise to higher and lower values is an essential tool in determining investment in the grid. The recent National Transmission Grid Study recognizes the need for this information as one of growing importance for both public and private decision makers. In response, the U.S. Department of Energy has undertaken this study, as a first step toward addressing the current absence of consistent data needed to support better estimates of the economic value of electricity reliability. Twenty-four studies, conducted by eight electric utilities between 1989 and 2002 representing residential and commercial/industrial (small, medium and large) customer groups, were chosen for analysis. The studies cover virtually all of the Southeast, most of the western United States, including California, rural Washington and Oregon, and the Midwest south and east of Chicago. All variables were standardized to a consistent metric and dollar amounts were adjusted to the 2002 CPI. The data were then incorporated into a meta-database in which each outage scenario (e.g., the lost of electric service for one hour on a weekday summer afternoon) is treated as an independent case or record both to permit comparisons between outage characteristics and to increase the statistical power of analysis results. Unadjusted average outage costs and Tobit models that estimate customer damage functions are presented. The customer damage functions express customer outage costs for a given outage scenario and customer class as a function of location, time of day, consumption, and business type. One can use the damage functions to calculate outage costs for specific customer types. For example, using the customer damage functions, the cost experienced by an ''average'' customer resulting from a 1 hour summer afternoon outage is estimated to be approximately $3 for a residential customer, $1,200 for small

  13. Office of Nuclear Threat Science | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | (NNSA) Nuclear Threat Science The Office of Nuclear Threat Science is responsible for overseeing the Nuclear Counterterrorism Program, an NNSA program that sustains specialized expertise and integrates and executes key activities to advise and enable technical aspects of U.S. Government nuclear counterterrorism and counterproliferation missions. Nuclear Counterterrorism The Nuclear Counterterrorism Program operates in partnership with weapons design-, stockpile science-, weapons surety-,

  14. NNSA deputy visits PNNL to see radiochemistry and threat detection

    National Nuclear Security Administration (NNSA)

    capabilities | National Nuclear Security Administration | (NNSA) visits PNNL to see radiochemistry and threat detection capabilities Friday, June 24, 2016 - 8:54am NNSA Principal Deputy Administrator Madelyn Creedon visited the Pacific Northwest National Laboratory (PNNL) in Washington this month to see the work it does for the agency, focusing on radiochemistry and threat detection. Creedon heard from Bob Runkle, PNNL's Chief Science and Technology Officer for National Security about the

  15. Protecting the Nation's Electric Grid from Cyber Threats | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats January 11, 2012 - 11:28am Addthis A smarter, modernized, and more secure grid will be pivotal to the United States’ world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. A smarter, modernized, and more secure grid will be pivotal to the United States' world leadership in a clean energy future. | Photo courtesy of National Renewable

  16. Detecting Nuclear Threats | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Detecting Nuclear Threats Stories of Discovery & Innovation Detecting Nuclear Threats Enlarge Photo Photo: Denise Applewhite The MINDS device was invented by a team of engineers at ...

  17. Receiver Operating Characteristic Analysis for Detecting Explosives-related Threats

    SciTech Connect (OSTI)

    Oxley, Mark E; Venzin, Alexander M

    2012-11-14

    The Department of Homeland Security (DHS) and the Transportation Security Administration (TSA) are interested in developing a standardized testing procedure for determining the performance of candidate detection systems. This document outlines a potential method for judging detection system performance as well as determining if combining the information from a legacy system with a new system can signicantly improve performance. In this document, performance corresponds to the Neyman-Pearson criterion applied to the Receiver Operating Characteristic (ROC) curves of the detection systems in question. A simulation was developed to investigate how the amount of data provided by the vendor in the form of the ROC curve eects the performance of the combined detection system. Furthermore, the simulation also takes into account the potential eects of correlation and how this information can also impact the performance of the combined system.

  18. Understanding the Adsorption Mechanism of Xe and Kr in a Metal-Organic Framework from X-ray Structural Analysis and First- Principles Calculations

    SciTech Connect (OSTI)

    Ghose, Sanjit K.; Li, Yan; Yakovenko, Andrey; Dooryhee, Eric; Ehm, Lars; Ecker, Lynne E.; Dippel, Ann-Christin; Halder, Gregory J.; Strachan, Denis M.; Thallapally, Praveen K.

    2015-04-16

    Enhancement of adsorption capacity and separation of radioactive Xe/Kr at room temperature and above is a challenging problem. Here, we report a detailed structural refinement and analysis of the synchrotron X-ray powder diffraction data of Ni-DODBC metal organic framework with in situ Xe and Kr adsorption at room temperature and above. Our results reveal that Xe and Kr adsorb at the open metal sites, with adsorption geometries well reproduced by DFT calculations. The measured temperature-dependent adsorption capacity of Xe is substantially larger than that for Kr, indicating the selectivity of Xe over Kr and is consistent with the more negative adsorption energy (dominated by van der Waals dispersion interactions) predicted from DFT. Our results reveal critical structural and energetic information about host–guest interactions that dictate the selective adsorption mechanism of these two inert gases, providing guidance for the design and synthesis of new MOF materials for the separation of environmentally hazardous gases from nuclear reprocessing applications.

  19. Development of an Extensible Computational Framework for Centralized Storage and Distributed Curation and Analysis of Genomic Data Genome-scale Metabolic Models

    SciTech Connect (OSTI)

    Stevens, Rick

    2010-08-01

    The DOE funded KBase project of the Stevens group at the University of Chicago was focused on four high-level goals: (i) improve extensibility, accessibility, and scalability of the SEED framework for genome annotation, curation, and analysis; (ii) extend the SEED infrastructure to support transcription regulatory network reconstructions (2.1), metabolic model reconstruction and analysis (2.2), assertions linked to data (2.3), eukaryotic annotation (2.4), and growth phenotype prediction (2.5); (iii) develop a web-API for programmatic remote access to SEED data and services; and (iv) application of all tools to bioenergy-related genomes and organisms. In response to these goals, we enhanced and improved the ModelSEED resource within the SEED to enable new modeling analyses, including improved model reconstruction and phenotype simulation. We also constructed a new website and web-API for the ModelSEED. Further, we constructed a comprehensive web-API for the SEED as a whole. We also made significant strides in building infrastructure in the SEED to support the reconstruction of transcriptional regulatory networks by developing a pipeline to identify sets of consistently expressed genes based on gene expression data. We applied this pipeline to 29 organisms, computing regulons which were subsequently stored in the SEED database and made available on the SEED website (http://pubseed.theseed.org). We developed a new pipeline and database for the use of kmers, or short 8-residue oligomer sequences, to annotate genomes at high speed. Finally, we developed the PlantSEED, or a new pipeline for annotating primary metabolism in plant genomes. All of the work performed within this project formed the early building blocks for the current DOE Knowledgebase system, and the kmer annotation pipeline, plant annotation pipeline, and modeling tools are all still in use in KBase today.

  20. COLLOQUIUM: The Evolving Terrorist Threat | Princeton Plasma Physics Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    April 6, 2016, 4:15pm to 5:30pm Colloquia MBG Auditorium, 284 cap. COLLOQUIUM: The Evolving Terrorist Threat Mitchell Silber FTI Consulting Evolution of the Terrorist Threat What is behind the genesis of terrorist sanctuaries, foreign fighters and crowdsourced jihad? How and why did they move to the fore in the latter part of 2015 with such events like Paris, Sharm el Sheikh, and San Bernardino? What do we know about the factors underpinning each of these important trends? What is the

  1. Secretarial Succession, Threat Level Notification and Successor Tracking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-01-28

    The Order establishes the Secretarial Order of Succession pursuant to section 202(a) of the Department of Energy Organization Act, 42 U.S.C. 7132(a) and establishes a mechanism for tracking the locations of successors at various threat levels. Cancels DOE O 100.1D.

  2. Secretarial Succession, Threat Level Notification, and Successor Tracking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-04-20

    This Order establishes the Secretarial Order of Succession pursuant to section 202(a) of the Department of Energy Organization Act and establishes a mechanism for tracking the locations of successors at various threat levels. Supersedes DOE O 100.1C. Superseded by DOE O 100.1E

  3. Defense Threat Reduction Agency | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Defense Threat Reduction Agency NNSA Administrator honors nonproliferation research leader Last week DOE Under Secretary for Nuclear Security and NNSA Administrator Lt. Gen. Frank G. Klotz (Ret.) presented the agency's Assistant Deputy Administrator for Nonproliferation Research and Development (R&D) Dr. Rhys Williams with the Distinguished Service Gold Medal Award at a

  4. Secretarial Succession, Threat Level Notification, and Successor Tracking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-01-28

    This order establishes the Secretarial Order of Succession in the Department of Energy pursuant to section 202(a) of the Department of Energy Organization Act, 42 U.S.C. 7132(a) and establish a mechanism for tracking the locations of successors at the various threat levels. Admin Chg 1, dated 9-13-2013, supersedes DOE O 100.1E.

  5. Enterprise Risk Management Framework

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Framework The Enterprise Risk Management (ERM) framework includes four steps: identify the risks, determine the probability and impact of each one, identify controls that are already in place that mitigate that risk, and propose additional controls if needed. Step 1: Identify Risks - What can go wrong? This step should identify the negative outcomes that could result from an action or decision . It is important to consider a wide range of risks, and so the Department's ERM framework includes

  6. CBI Technology Impact Framework

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CBI Technology Impact Framework 2014 Building Technologies Office Peer Review Images courtesy CREE, True Manufacturing, A.O. Smith, Bernstein Associates, Cambridge Engineering, ...

  7. Development, analysis, and evaluation of a commercial software framework for the study of Extremely Low Probability of Rupture (xLPR) events at nuclear power plants.

    SciTech Connect (OSTI)

    Kalinich, Donald A.; Helton, Jon Craig; Sallaberry, Cedric M.; Mattie, Patrick D.

    2010-12-01

    Sandia National Laboratories (SNL) participated in a Pilot Study to examine the process and requirements to create a software system to assess the extremely low probability of pipe rupture (xLPR) in nuclear power plants. This project was tasked to develop a prototype xLPR model leveraging existing fracture mechanics models and codes coupled with a commercial software framework to determine the framework, model, and architecture requirements appropriate for building a modular-based code. The xLPR pilot study was conducted to demonstrate the feasibility of the proposed developmental process and framework for a probabilistic code to address degradation mechanisms in piping system safety assessments. The pilot study includes a demonstration problem to assess the probability of rupture of DM pressurizer surge nozzle welds degraded by primary water stress-corrosion cracking (PWSCC). The pilot study was designed to define and develop the framework and model; then construct a prototype software system based on the proposed model. The second phase of the project will be a longer term program and code development effort focusing on the generic, primary piping integrity issues (xLPR code). The results and recommendations presented in this report will be used to help the U.S. Nuclear Regulatory Commission (NRC) define the requirements for the longer term program.

  8. Standard Agent Framework 1

    Energy Science and Technology Software Center (OSTI)

    1999-04-06

    The Standard Agent framework provides an extensible object-oriented development environment suitable for use in both research and applications projects. The SAF provides a means for constructing and customizing multi-agent systems through specialization of standard base classes (architecture-driven framework) and by composition of component classes (data driven framework). The standard agent system is implemented as an extensible object-centerd framework. Four concrete base classes are developed: (1) Standard Agency; (2) Standard Agent; (3) Human Factor, and (4)more » Resources. The object-centered framework developed and utilized provides the best comprimise between generality and flexibility available in agent development systems today.« less

  9. Design Basis Threat | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Design Basis Threat NNSA has taken aggressive action to improve the security of its nuclear weapons material (often referred to as special nuclear material, or SNM) and nuclear weapons in its custody. NNSA has taken aggressive action to improve the security of its nuclear weapons material (often referred to as special nuclear material, or SNM) and nuclear weapons in its custody. NNSA has taken aggressive action to improve the security of its nuclear weapons material (often referred to as special

  10. Raising consciousness about the nuclear threat through music

    SciTech Connect (OSTI)

    Ungerleider, J.H.

    1987-01-01

    This dissertation examines the use of music, in particular topical collaborative group song writing, as a tool for raising consciousness about the threat of nuclear war. Consciousness raising is one way to overcome the phenomenon of denial and to increase discussion and social action in response to the nuclear threat. This dissertation measures the impact of a group song writing workshop on developing critical problem-solving in adult groups; it reviews how music is applied in psychological research and clinical work, has been used historically as a tool in social-change movements in America, and is used in the contemporary field of peace education. The perspectives of several theorists who discuss the potential of music to contribute to social change are presented. It is concluded that consciousness about the nuclear threat - in terms of naming and analyzing - can be raised by working with music's potential for developing affective, expressive, and collaborative capabilities in individuals and groups. Potential applications of the group song writing workshop are in schools, with peace organizations, music groups, and in relation to other social issues.

  11. Future land use threats to range-restricted fish species in the...

    Office of Scientific and Technical Information (OSTI)

    Future land use threats to range-restricted fish species in the United States Citation ... Title: Future land use threats to range-restricted fish species in the United States Land ...

  12. Notice of Intent to Develop DOE O 470.X, Insider Threat Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-10-17

    The Order establishes top-level responsibilities and requirements for DOE's Insider Threat Program, which is intended to deter, detect, and mitigate insider threat actions by all Federal and contractor employees.

  13. Jefferson Lab to Conduct Active Threat Response Exercise on June 11 |

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Jefferson Lab Active Threat Response Exercise on June 11 Jefferson Lab to Conduct Active Threat Response Exercise on June 11 NEWPORT NEWS, VA, June 10, 2014 - On the afternoon of June 11, staff at the Thomas Jefferson National Accelerator Facility will participate in an active threat in the workplace response exercise. The objective of the exercise is to gauge the Jefferson Lab community's response to an active threat incident. The exercise is intended to provide a training opportunity for

  14. Conductive open frameworks

    DOE Patents [OSTI]

    Yaghi, Omar M.; Wan, Shun; Doonan, Christian J.; Wang, Bo; Deng, Hexiang

    2016-02-23

    The disclosure relates generally to materials that comprise conductive covalent organic frameworks. The disclosure also relates to materials that are useful to store and separate gas molecules and sensors.

  15. The Partnership Evaluation Framework

    Broader source: Energy.gov [DOE]

    U.S. Department of Energy Better Buildings Neighborhood Program: The Partnership Evaluation Framework: How to evaluate a potential partner’s business model and identify areas for collaboration.

  16. Generic Overlay Framework

    Energy Science and Technology Software Center (OSTI)

    2005-09-01

    This software provides a framework for building application layter overlay networks. It includes example overlays that can be used without modification. Also provided are example multicast and routing protocols that can be used with the overlays.

  17. Vision-based threat detection in dynamic environments.

    SciTech Connect (OSTI)

    Carlson, Jeffrey J.

    2007-08-01

    This report addresses the development of automated video-screening technology to assist security forces in protecting our homeland against terrorist threats. A prevailing threat is the covert placement of bombs inside crowded public facilities. Although video-surveillance systems are increasingly common, current systems cannot detect the placement of bombs. It is also unlikely that security personnel could detect a bomb or its placement by observing video from surveillance cameras. The problems lie in the large number of cameras required to monitor large areas, the limited number of security personnel employed to protect these areas, and the intense diligence required to effectively screen live video from even a single camera. Different from existing video-detection systems designed to operate in nearly static environments, we are developing technology to detect changes in the background of dynamic environments: environments where motion and human activities are persistent over long periods. Our goal is to quickly detect background changes, even if the background is visible to the camera less than 5 percent of the time and possibly never free from foreground activity. Our approach employs statistical scene models based on mixture densities. We hypothesized that the background component of the mixture has a small variance compared to foreground components. Experiments demonstrate this hypothesis is true under a wide variety of operating conditions. A major focus involved the development of robust background estimation techniques that exploit this property. We desire estimation algorithms that can rapidly produce accurate background estimates and detection algorithms that can reliably detect background changes with minimal nuisance alarms. Another goal is to recognize unusual activities or foreground conditions that could signal an attack (e.g., large numbers of running people, people falling to the floor, etc.). Detection of background changes and/or unusual

  18. Bioenergy Knowledge Discovery Framework (KDF) Fact Sheet

    SciTech Connect (OSTI)

    2013-07-29

    The Bioenergy Knowledge Discovery Framework (KDF) is an online collaboration and geospatial analysis tool that allows researchers, policymakers, and investors to explore and engage the latest bioenergy research. This publication describes how the KDF harnesses Web 2.0 and social networking technologies to build a collective knowledge system that facilitates collaborative production, integration, and analysis of bioenergy-related information.

  19. Taking Steps to Protect Against the Insider Threat

    SciTech Connect (OSTI)

    Pope, Noah Gale; Williams, Martha; Lewis, Joel; Pham, Thomas

    2015-10-16

    Research reactors are required (in accordance with the Safeguards Agreement between the State and the IAEA) to maintain a system of nuclear material accounting and control for reporting quantities of nuclear material received, shipped, and held on inventory. Enhancements to the existing accounting and control system can be made at little additional cost to the facility, and these enhancements can make nuclear material accounting and control useful for nuclear security. In particular, nuclear material accounting and control measures can be useful in protecting against an insider who is intent on unauthorized removal or misuse of nuclear material or misuse of equipment. An enhanced nuclear material accounting and control system that responds to nuclear security is described in NSS-25G, Use of Nuclear Material Accounting and Control for Nuclear Security Purposes at Facilities, which is scheduled for distribution by the IAEA Department of Nuclear Security later this year. Accounting and control measures that respond to the insider threat are also described in NSS-33, Establishing a System for Control of Nuclear Material for Nuclear Security Purposes at a Facility During Storage, Use and Movement, and in NSS-41, Preventive and Protective Measures against Insider Threats (originally issued as NSS-08), which are available in draft form. This paper describes enhancements to existing material control and accounting systems that are specific to research reactors, and shows how they are important to nuclear security and protecting against an insider.

  20. Social/Ethical Issues in Predictive Insider Threat Monitoring

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Frincke, Deborah A.; Zabriskie, Mariah

    2011-01-01

    Combining traditionally monitored cybersecurity data with other kinds of organizational data is one option for inferring the motivations of individuals, which may in turn allow early prediction and mitigation of insider threats. While unproven, some researchers believe that this combination of data may yield better results than either cybersecurity or organizational data would in isolation. However, this nontraditional approach creates a potential conflict between goals, such as conflicts between organizational security improvements and individual privacy considerations. There are many facets to debate. Should warning signs of a potential malicious insider be addressed before a malicious event has occurred to prevent harm to the organization and discourage the insider from violating the organization’s rules? Would intervention violate employee trust or legal guidelines? What about the possibilities of misuse? Predictive approaches cannot be validated a priori; false accusations can affect the career of the accused; and collection/monitoring of certain types of data may affect employee morale. In this chapter, we explore some of the social and ethical issues stemming from predictive insider threat monitoring and discuss ways that a predictive modeling approach brings to the forefront social and ethical issues that should be considered and resolved by stakeholders and communities of interest.

  1. A Risk Management Approach to the "Insider Threat"

    SciTech Connect (OSTI)

    Bishop, Matt; Engle, Sophie J.; Frincke, Deborah A.; Gates, Carrie; Greitzer, Frank L.; Peisert, Sean; Whalen, Sean

    2010-09-01

    Abstract Recent surveys indicate that the financial impact and operating losses due to insider intrusions are increasing. But these studies often disagree on what constitutes an insider; indeed, many define it only implicitly. In theory, appropriate selection of, and enforcement of, properly specified security policies should prevent legitimate users from abusing their access to computer systems, information, and other resources. However, even if policies could be expressed precisely, the natural mapping between the natural language expression of a security policy, and the expression of that policy in a form that can be implemented on a computer system or network, creates gaps in enforcement. This paper defines insider precisely, in terms of these gaps, and explores an access-based model for analyzing threats that include those usually termed insider threats. This model enables an organization to order its resources based on the business value for that resource and of the information it contains. By identifying those users with access to high-value resources, we obtain an ordered list of users who can cause the greatest amount of damage. Concurrently with this, we examine psychological indicators in order to determine which users are at the greatest risk of acting inappropriately.We conclude by examining how to merge this model with one of forensic logging and auditing.

  2. Neutron Interrogation System For Underwater Threat Detection And Identification

    SciTech Connect (OSTI)

    Barzilov, Alexander P.; Novikov, Ivan S.; Womble, Phil C.

    2009-03-10

    Wartime and terrorist activities, training and munitions testing, dumping and accidents have generated significant munitions contamination in the coastal and inland waters in the United States and abroad. Although current methods provide information about the existence of the anomaly (for instance, metal objects) in the sea bottom, they fail to identify the nature of the found objects. Field experience indicates that often in excess of 90% of objects excavated during the course of munitions clean up are found to be non-hazardous items (false alarm). The technology to detect and identify waterborne or underwater threats is also vital for protection of critical infrastructures (ports, dams, locks, refineries, and LNG/LPG). We are proposing a compact neutron interrogation system, which will be used to confirm possible threats by determining the chemical composition of the suspicious underwater object. The system consists of an electronic d-T 14-MeV neutron generator, a gamma detector to detect the gamma signal from the irradiated object and a data acquisition system. The detected signal then is analyzed to quantify the chemical elements of interest and to identify explosives or chemical warfare agents.

  3. Development of an objective questionnaire to assess perception, concern, and knowledge of, and attention and response to, the threat of nuclear war

    SciTech Connect (OSTI)

    Kulman, I.R.

    1985-01-01

    In addition to the subject objective, the relationship of specified personality variables (i.e., trait anxiety, locus of control, response tendency towards threat, and denial) to behavioral and psychological responses to the threat of nuclear war were assessed. The quantitative questionnaire, titled the Nuclear Reaction Scale, was composed of items selected from issues discussed in the psychological literature on the threat of nuclear war. These issues included: psychic numbing, cognitive reality, perceptions of likelihood and survival, nuclear illusions, and attention to the threat of nuclear war. A standardization sample of 360 college students was administered the Nuclear Reaction Scale, Trait Anxiety Scale, Internal-External Locus of Control Scale, Facilitation-Inhibition Scale, and Haan Denial Scale. Three additional subsamples, identified as Military, Nuclear Freeze, and Church, were given the Nuclear Reaction Scale to assess the validity of the scale. A factor analysis of the Nuclear Reaction Scale indicated a nine-factor solution that described issues such as concern perceptions, likelihood, survivability, and control over the threat of nuclear war. A number of strong relationships existed between computed factors on the Nuclear Reaction Scale. Demographic comparisons found significant differences related to sex and political affiliation.

  4. DAKOTA, a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis:version 4.0 reference manual

    SciTech Connect (OSTI)

    Griffin, Joshua D. (Sandai National Labs, Livermore, CA); Eldred, Michael Scott; Martinez-Canales, Monica L.; Watson, Jean-Paul; Kolda, Tamara Gibson; Adams, Brian M.; Swiler, Laura Painton; Williams, Pamela J.; Hough, Patricia Diane; Gay, David M.; Dunlavy, Daniel M.; Eddy, John P.; Hart, William Eugene; Guinta, Anthony A.; Brown, Shannon L.

    2006-10-01

    The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a reference manual for the commands specification for the DAKOTA software, providing input overviews, option descriptions, and example specifications.

  5. Sci-Vis Framework

    Energy Science and Technology Software Center (OSTI)

    2015-03-11

    SVF is a full featured OpenGL 3d framework that allows for rapid creation of complex visualizations. The SVF framework handles much of the lifecycle and complex tasks required for a 3d visualization. Unlike a game framework SVF was designed to use fewer resources, work well in a windowed environment, and only render when necessary. The scene also takes advantage of multiple threads to free up the UI thread as much as possible. Shapes (actors) inmore » the scene are created by adding or removing functionality (through support objects) during runtime. This allows a highly flexible and dynamic means of creating highly complex actors without the code complexity (it also helps overcome the lack of multiple inheritance in Java.) All classes are highly customizable and there are abstract classes which are intended to be subclassed to allow a developer to create more complex and highly performant actors. There are multiple demos included in the framework to help the developer get started and shows off nearly all of the functionality. Some simple shapes (actors) are already created for you such as text, bordered text, radial text, text area, complex paths, NURBS paths, cube, disk, grid, plane, geometric shapes, and volumetric area. It also comes with various camera types for viewing that can be dragged, zoomed, and rotated. Picking or selecting items in the scene can be accomplished in various ways depending on your needs (raycasting or color picking.) The framework currently has functionality for tooltips, animation, actor pools, color gradients, 2d physics, text, 1d/2d/3d textures, children, blending, clipping planes, view frustum culling, custom shaders, and custom actor states« less

  6. GTT Framework | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    DOE Grid Tech Team » GTT Framework GTT Framework GTT Framework Strategic Framework The GTT proposes a strategic framework that organizes these activities into three interrelated dimensions (informational, analytical, and physical), representative of the systems nature of the grid. Each of these dimensions have a corresponding strategic focus: The informational dimension aims to improve the visibility of grid conditions. The analytical dimension increases our understanding of the implications of

  7. INTERNATIONAL COOPERATION ON RADIOLOGICAL THREAT REDUCTION PROGRAMS IN RUSSIA

    SciTech Connect (OSTI)

    Landers, Christopher C.; Tatyrek, Aaron P.

    2009-10-07

    Since its inception in 2004, the United States Department of Energy’s Global Threat Reduction Initiative (GTRI) has provided the Russian Federation with significant financial and technical assistance to secure its highly vulnerable and dangerous radiological material. The three program areas of this assistance are the removal of radioisotope thermoelectric generators (RTG), the physical protection of vulnerable in-use radiological material of concern, and the recovery of disused or abandoned radiological material of concern. Despite the many successes of the GTRI program in Russia, however, there is still a need for increased international cooperation in these efforts. Furthermore, concerns exist over how the Russian government will ensure that the security of its radiological materials provided through GTRI will be sustained. This paper addresses these issues and highlights the successes of GTRI efforts and ongoing activities.

  8. Global Threat Reduction Initiative Fuel Thermo-Physical Characterization Project: Sample Management Plan

    SciTech Connect (OSTI)

    Casella, Amanda J.; Pereira, Mario M.; Steen, Franciska H.

    2013-01-01

    This sample management plan provides guidelines for sectioning, preparation, acceptance criteria, analytical path, and end-of-life disposal for the fuel element segments utilized in the Global Threat Reduction Initiative (GTRI), Fuel Thermo-Physical Characterization Project. The Fuel Thermo-Physical Characterization Project is tasked with analysis of irradiated Low Enriched Uranium (LEU) Molybdenum (U-Mo) fuel element samples to support the GTRI conversion program. Sample analysis may include optical microscopy (OM), scanning electron microscopy (SEM) fuel-surface interface analysis, gas pycnometry (density) measurements, laser flash analysis (LFA), differential scanning calorimetry (DSC), thermogravimetry and differential thermal analysis with mass spectroscopy (TG /DTA-MS), Inductively Coupled Plasma Spectrophotometry (ICP), alpha spectroscopy, and Thermal Ionization Mass Spectroscopy (TIMS). The project will utilize existing Radiochemical Processing Laboratory (RPL) operating, technical, and administrative procedures for sample receipt, processing, and analyses. Test instructions (TIs), which are documents used to provide specific details regarding the implementation of an existing RPL approved technical or operational procedure, will also be used to communicate to staff project specific parameters requested by the Principal Investigator (PI). TIs will be developed, reviewed, and issued in accordance with the latest revision of the RPL-PLN-700, RPL Operations Plan. Additionally, the PI must approve all project test instructions and red-line changes to test instructions.

  9. A review of event processing frameworks used in HEP

    SciTech Connect (OSTI)

    Sexton-Kennedy, E.

    2015-12-23

    Today there are many different experimental event processing frameworks in use by running or about to be running experiments. This talk will discuss the different components of these frameworks. In the past there have been attempts at shared framework projects for example the collaborations on the BaBar framework (between BaBar, CDF, and CLEO), on the Gaudi framework (between LHCb and ATLAS), on AliROOT/FairROOT (between Alice and GSI/Fair), and in some ways on art (Fermilab based experiments) and CMS’ framework. However, for reasons that will be discussed, these collaborations did not result in common frameworks shared among the intended experiments. Though importantly, two of the resulting projects have succeeded in providing frameworks that are shared among many customer experiments: Fermilab's art framework and GSI/Fair's FairROOT. Interestingly, several projects are considering remerging their frameworks after many years apart. I'll report on an investigation and analysis of these realities. In addition, with the advent of the need for multi-threaded frameworks and the scarce available manpower, it is important to collaborate in the future, however it is also important to understand why previous attempts at multi-experiment frameworks either worked or didn't work.

  10. A review of event processing frameworks used in HEP

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Sexton-Kennedy, E.

    2015-12-23

    Today there are many different experimental event processing frameworks in use by running or about to be running experiments. This talk will discuss the different components of these frameworks. In the past there have been attempts at shared framework projects for example the collaborations on the BaBar framework (between BaBar, CDF, and CLEO), on the Gaudi framework (between LHCb and ATLAS), on AliROOT/FairROOT (between Alice and GSI/Fair), and in some ways on art (Fermilab based experiments) and CMS’ framework. However, for reasons that will be discussed, these collaborations did not result in common frameworks shared among the intended experiments. Thoughmore » importantly, two of the resulting projects have succeeded in providing frameworks that are shared among many customer experiments: Fermilab's art framework and GSI/Fair's FairROOT. Interestingly, several projects are considering remerging their frameworks after many years apart. I'll report on an investigation and analysis of these realities. In addition, with the advent of the need for multi-threaded frameworks and the scarce available manpower, it is important to collaborate in the future, however it is also important to understand why previous attempts at multi-experiment frameworks either worked or didn't work.« less

  11. The Global Threat Reduction Initiative's Molybdenum-99 Program, OAS-L-12-07

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Audit Report The Global Threat Reduction Initiative's Molybdenum-99 Program OAS-L-12-07 July 2012 Department of Energy Washington, DC 20585 July 20, 2012 MEMORANDUM FOR THE ASSISTANT DEPUTY ADMINISTRATOR FOR GLOBAL THREAT REDUCTION, NATIONAL NUCLEAR SECURITY ADMINISTRATION FROM: David Sedillo, Director Western Audits Division Office of Inspector General SUBJECT: INFORMATION: Audit Report on "The Global Threat Reduction Initiative's Molybdenum-99 Program" BACKGROUND Molybdenum-99

  12. Future land use threats to range-restricted fish species in the United States

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Januchowski-Hartley, Stephanie R.; Holtz, Lauren A.; Martinuzzi, Sebastian; McIntyre, Peter B.; Radeloff, Volker C.; Pracheil, Brenda M.

    2016-03-04

    Land use change is one major threat to freshwater biodiversity, and land use change scenarios can help to assess threats from future land use change, thereby guiding proactive conservation decisions. Furthermore, our goal was to identify which range-restricted freshwater fish species are most likely to be affected by land use change and to determine where threats to these species from future land use change in the conterminous United States are most pronounced.

  13. Working to keep us safe: Sara Brambilla, Postdoc creates threat reduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    tools Inspire » Working to keep us safe: Postdoc creates threat reduction tools Working to keep us safe: Sara Brambilla, Postdoc creates threat reduction tools Chemical engineer postdoc experiences a foreign culture while working on resources that respond to weapons of mass destruction and natural threats. July 18, 2012 image description Brambilla first came to Los Alamos as a visiting student during her PhD program at the Politecnico di Milano, Italy, which required an internship abroad.

  14. Cybersecurity and Emerging Threats Research and Development (CET R&D) |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Mission » Cybersecurity and Emerging Threats Research and Development (CET R&D) Cybersecurity and Emerging Threats Research and Development (CET R&D) cybersecurity r&d resize.jpg The Cybersecurity and Emerging Threats Research and Development (CET R&D) Division advances the research and development of innovative technologies, tools, and techniques to reduce risks to the Nation's critical energy infrastructure posed by cyber and other emerging

  15. DAKOTA, a multilevel parellel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis:version 4.0 uers's manual.

    SciTech Connect (OSTI)

    Griffin, Joshua D.; Eldred, Michael Scott; Martinez-Canales, Monica L.; Watson, Jean-Paul; Kolda, Tamara Gibson; Giunta, Anthony Andrew; Adams, Brian M.; Swiler, Laura Painton; Williams, Pamela J.; Hough, Patricia Diane; Gay, David M.; Dunlavy, Daniel M.; Eddy, John P.; Hart, William Eugene; Brown, Shannon L.

    2006-10-01

    The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a user's manual for the DAKOTA software and provides capability overviews and procedures for software execution, as well as a variety of example studies.

  16. DAKOTA : a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis. Version 5.0, user's manual.

    SciTech Connect (OSTI)

    Eldred, Michael Scott; Dalbey, Keith R.; Bohnhoff, William J.; Adams, Brian M.; Swiler, Laura Painton; Hough, Patricia Diane; Gay, David M.; Eddy, John P.; Haskell, Karen H.

    2010-05-01

    The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a user's manual for the DAKOTA software and provides capability overviews and procedures for software execution, as well as a variety of example studies.

  17. DAKOTA : a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis. Version 5.0, developers manual.

    SciTech Connect (OSTI)

    Eldred, Michael Scott; Dalbey, Keith R.; Bohnhoff, William J.; Adams, Brian M.; Swiler, Laura Painton; Hough, Patricia Diane; Gay, David M.; Eddy, John P.; Haskell, Karen H.

    2010-05-01

    The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a developers manual for the DAKOTA software and describes the DAKOTA class hierarchies and their interrelationships. It derives directly from annotation of the actual source code and provides detailed class documentation, including all member functions and attributes.

  18. Dakota, a multilevel parallel object-oriented framework for design optimization, parameter estimation, uncertainty quantification, and sensitivity analysis:version 4.0 developers manual.

    SciTech Connect (OSTI)

    Griffin, Joshua D. (Sandia National lababoratory, Livermore, CA); Eldred, Michael Scott; Martinez-Canales, Monica L.; Watson, Jean-Paul; Kolda, Tamara Gibson (Sandia National lababoratory, Livermore, CA); Giunta, Anthony Andrew; Adams, Brian M.; Swiler, Laura Painton; Williams, Pamela J.; Hough, Patricia Diane (Sandia National lababoratory, Livermore, CA); Gay, David M.; Dunlavy, Daniel M.; Eddy, John P.; Hart, William Eugene; Brown, Shannon L.

    2006-10-01

    The DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) toolkit provides a flexible and extensible interface between simulation codes and iterative analysis methods. DAKOTA contains algorithms for optimization with gradient and nongradient-based methods; uncertainty quantification with sampling, reliability, and stochastic finite element methods; parameter estimation with nonlinear least squares methods; and sensitivity/variance analysis with design of experiments and parameter study methods. These capabilities may be used on their own or as components within advanced strategies such as surrogate-based optimization, mixed integer nonlinear programming, or optimization under uncertainty. By employing object-oriented design to implement abstractions of the key components required for iterative systems analyses, the DAKOTA toolkit provides a flexible and extensible problem-solving environment for design and performance analysis of computational models on high performance computers. This report serves as a developers manual for the DAKOTA software and describes the DAKOTA class hierarchies and their interrelationships. It derives directly from annotation of the actual source code and provides detailed class documentation, including all member functions and attributes.

  19. How ORISE is Making a Difference: Preparing for the Threat of...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    exercise to help agencies prepare for the threat of dirty bombs Radiological dispersion devices (RDDs), also known as dirty bombs, are conventional explosives packed with...

  20. 2014 Annual Planning Summary for the NNSA Global Threat Reduction Initiative Office

    Broader source: Energy.gov [DOE]

    The ongoing and projected Environmental Assessments and Environmental Impact Statements for 2014 and 2015 within the NNSA Global Threat Reduction Initiative Office.

  1. Prevent, Counter, and Respond - A Strategic Plan to Reduce Global Nuclear Threats (FY 2016-FY2020)

    SciTech Connect (OSTI)

    2015-03-01

    NNSA’s second core mission is reducing global nuclear dangers by preventing the acquisition of nuclear weapons or weapons-usable materials, countering efforts to acquire such weapons or materials, and responding to nuclear or radiological incidents. In 2015, NNSA reorganized its nonproliferation activities based on core competencies and realigned its counterterrorism and counterproliferation functions to more efficiently address both current and emerging threats and challenges. The reorganization accompanied the March 2015 release of the first ever Prevent, Counter, and Respond – A Strategic Plan to Reduce Global Nuclear Threats. This report, which NNSA will update annually, highlights key nuclear threat trends and describes NNSA’s integrated threat reduction strategy.

  2. Status report on SHARP coupling framework.

    SciTech Connect (OSTI)

    Caceres, A.; Tautges, T. J.; Lottes, J.; Fischer, P.; Rabiti, C.; Smith, M. A.; Siegel, A.; Yang, W. S.; Palmiotti, G.

    2008-05-30

    This report presents the software engineering effort under way at ANL towards a comprehensive integrated computational framework (SHARP) for high fidelity simulations of sodium cooled fast reactors. The primary objective of this framework is to provide accurate and flexible analysis tools to nuclear reactor designers by simulating multiphysics phenomena happening in complex reactor geometries. Ideally, the coupling among different physics modules (such as neutronics, thermal-hydraulics, and structural mechanics) needs to be tight to preserve the accuracy achieved in each module. However, fast reactor cores in steady state mode represent a special case where weak coupling between neutronics and thermal-hydraulics is usually adequate. Our framework design allows for both options. Another requirement for SHARP framework has been to implement various coupling algorithms that are parallel and scalable to large scale since nuclear reactor core simulations are among the most memory and computationally intensive, requiring the use of leadership-class petascale platforms. This report details our progress toward achieving these goals. Specifically, we demonstrate coupling independently developed parallel codes in a manner that does not compromise performance or portability, while minimizing the impact on individual developers. This year, our focus has been on developing a lightweight and loosely coupled framework targeted at UNIC (our neutronics code) and Nek (our thermal hydraulics code). However, the framework design is not limited to just using these two codes.

  3. V&V framework

    SciTech Connect (OSTI)

    Hills, Richard G.; Maniaci, David Charles; Naughton, Jonathan W.

    2015-09-01

    A Verification and Validation (V&V) framework is presented for the development and execution of coordinated modeling and experimental program s to assess the predictive capability of computational models of complex systems through focused, well structured, and formal processes.The elements of the framework are based on established V&V methodology developed by various organizations including the Department of Energy, National Aeronautics and Space Administration, the American Institute of Aeronautics and Astronautics, and the American Society of Mechanical Engineers. Four main topics are addressed: 1) Program planning based on expert elicitation of the modeling physics requirements, 2) experimental design for model assessment, 3) uncertainty quantification for experimental observations and computational model simulations, and 4) assessment of the model predictive capability. The audience for this document includes program planners, modelers, experimentalist, V &V specialist, and customers of the modeling results.

  4. EMN Framework Examples

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    EMN Framework Examples Palo Alto, CA April 15, 2016 Neha Rustagi Technology Manager Fuel Cell Technologies Office | 2 New Material Innovations for Clean Energy 2X Faster and 2X Cheaper Predictive Simulation Across Scales Synthesis & Characterization Rapid Screening End Use Performance Process Scalability Process Control Real-time Characterization Reliability Validation Data Management & Informatics Coordinated resource network with a suite of capabilities for advanced materials R&D

  5. Isomerism in Metal-Organic Frameworks: "Framework Isomers" |...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Isomerism in Metal-Organic Frameworks: "Framework Isomers" Previous Next List Trevor A. Makal, Andrey A. Yakovenko, and Hong-Cai Zhou, J. Phys. Chem. Lett., 2011, 2 (14), pp ...

  6. A Route to Metal-Organic Frameworks through Framework Templating...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A Route to Metal-Organic Frameworks through Framework Templating Previous Next List Zhangwen Wei, Weigang Lu, Hai-Long Jiang, and Hong-Cai Zhou, Inorg. Chem., 2013, 52 (3), pp ...

  7. Preparation of functionalized zeolitic frameworks

    DOE Patents [OSTI]

    Yaghi, Omar M.; Hayashi, Hideki; Banerjee, Rahul; Park, Kyo Sung; Wang, Bo; Cote, Adrien P.

    2014-08-19

    The disclosure provides zeolitic frameworks for gas separation, gas storage, catalysis and sensors. More particularly the disclosure provides zeolitic frameworks (ZIFs). The ZIF of the disclosure comprises any number of transition metals or a homogenous transition metal composition.

  8. Preparation of functionalized zeolitic frameworks

    DOE Patents [OSTI]

    Yaghi, Omar M; Hayashi, Hideki; Banerjee, Rahul; Park, Kyo Sung; Wang, Bo; Cote, Adrien P

    2012-11-20

    The disclosure provides zeolitic frameworks for gas separation, gas storage, catalysis and sensors. More particularly the disclosure provides zeolitic frameworks (ZIFs). The ZIF of the disclosure comprises any number of transition metals or a homogenous transition metal composition.

  9. Preparation of functionalized zeolitic frameworks

    DOE Patents [OSTI]

    Yaghi, Omar M; Furukawa, Hiroyasu; Wang, Bo

    2013-07-09

    The disclosure provides zeolitic frameworks for gas separation, gas storage, catalysis and sensors. More particularly the disclosure provides zeolitic frameworks (ZIFs). The ZIF of the disclosure comprises any number of transition metals or a homogenous transition metal composition.

  10. Insider Threat - Material Control and Accountability Mitigation (Presentation)

    SciTech Connect (OSTI)

    Powell, Danny H; Elwood Jr, Robert H

    2011-01-01

    Why is the insider a concern? There are many documented cases of nuclear material available for sale - there are more insider diversions than outsider attacks and more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. Insider attributes are: have access, has authority, possesses knowledge, works with absence of timeline, can test system, and may act alone or support a team. Material control and accountability (MC&A) is an essential part of an integrated safeguards system. Objectives of MC&A are: (1) Ongoing confirmation of the presence of special nuclear material (SNM) in assigned locations; (2) Prompt investigation of anomalies that may indicate a loss of SNM; (3) Timely and localized detection of loss, diversion, or theft of a goal quantity; (4) Rapid assessment and response to detection alarms; and (5) Timely generation of information to aid in the recovery of SNM in the event of an actual loss, diversion, or theft from the purview of the MC&A system. Control and accountability of material, equipment, and data are essential to minimizing insider threats.

  11. Psychological responses to the threat of nuclear war

    SciTech Connect (OSTI)

    McClenney, J.E.

    1987-01-01

    A series of three studies explored psychological responses to the threat of nuclear war, and the relationship between attitudes and behavior on this issue. The first was a quasi-experimental study of the influence of exposure to a media depiction of nuclear war, The Day After, on attitudes and behavior, and the influence of such attitudinal variables as denial, perception of control, perception of responsibility, survivability, and spiritual orientation, on the decision to view this film. No effects were found for exposure, but those who experienced a greater sense of control over political events were more likely to view the film. The second study was an experiment on the effects of efficacy enhancing, fear arousing or informational communications, in combination with the previously mentioned attitudinal variables, on retention of relevant information, intentions to act, and political activism on the nuclear arms issue. Fear arousal was found to increase activism for women, but to decrease activism for men. The third study employed structural modeling to examine the relationship between attitudes and behavior on the issue of nuclear war, using data from the experiment. The model supported in this study showed that intentions were directly affected by denial and a sense of power over political events.

  12. Spark Distributed Analytic Framework

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Apache Spark Spark Distributed Analytic Framework Description and Overview Apache Spark(tm) is a fast and general engine for large-scale data processing. How to Use Spark Because of its high memory and I/O bandwidth requirements, we recommend you run your spark jobs on Cori. Follow the steps below to use spark, note that the order of the commands matters. DO NOT load the spark module until you are inside a batch job. Interactive mode Submit an interactive batch job with at least 2 nodes: salloc

  13. STEP Utility Bill Analysis Report

    Broader source: Energy.gov [DOE]

    STEP Utility Bill Analysis Report, from the Tool Kit Framework: Small Town University Energy Program (STEP).

  14. Global Threat Reduction Initiative Fuel-Thermo-Physical Characterization Project Quality Assurance Plan

    SciTech Connect (OSTI)

    Pereira, Mario M.; Slonecker, Bruce D.

    2012-06-01

    The charter of the Fuel Thermo-Physical Characterization Project is to ready Pacific Northwest National Laboratory (PNNL) facilities and processes for the receipt of unirradiated and irradiated low enriched uranium (LEU) molybdenum (U-Mo) fuel element samples, and to perform analysis to support the Global Threat Reduction Initiative conversion program. PNNL’s support for the program will include the establishment of post-irradiation examination processes, including thermo-physical properties, unique to the U.S. Department of Energy laboratories. These processes will ultimately support the submission of the base fuel qualification (BFQ) to the U.S. Nuclear Regulatory Commission (NRC) and revisions to High Performance Research Reactor Safety Analysis Reports to enable conversion from highly enriched uranium to LEU fuel. This quality assurance plan (QAP) provides the quality assurance requirements and processes that support the NRC BFQ. This QAP is designed to be used by project staff, and prescribes the required management control elements that are to be met and how they are implemented. Additional controls are captured in Fuel Thermo-Physical Characterization Project plans, existing procedures, and procedures to be developed that provide supplemental information on how work is conducted on the project.

  15. Open literature review of threats including sabotage and theft of fissile material transport in Japan.

    SciTech Connect (OSTI)

    Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

    2005-06-01

    This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically and religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty.

  16. Hybrid methods for cybersecurity analysis : LDRD final report.

    SciTech Connect (OSTI)

    Davis, Warren Leon,; Dunlavy, Daniel M.

    2014-01-01

    Early 2010 saw a signi cant change in adversarial techniques aimed at network intrusion: a shift from malware delivered via email attachments toward the use of hidden, embedded hyperlinks to initiate sequences of downloads and interactions with web sites and network servers containing malicious software. Enterprise security groups were well poised and experienced in defending the former attacks, but the new types of attacks were larger in number, more challenging to detect, dynamic in nature, and required the development of new technologies and analytic capabilities. The Hybrid LDRD project was aimed at delivering new capabilities in large-scale data modeling and analysis to enterprise security operators and analysts and understanding the challenges of detection and prevention of emerging cybersecurity threats. Leveraging previous LDRD research e orts and capabilities in large-scale relational data analysis, large-scale discrete data analysis and visualization, and streaming data analysis, new modeling and analysis capabilities were quickly brought to bear on the problems in email phishing and spear phishing attacks in the Sandia enterprise security operational groups at the onset of the Hybrid project. As part of this project, a software development and deployment framework was created within the security analyst work ow tool sets to facilitate the delivery and testing of new capabilities as they became available, and machine learning algorithms were developed to address the challenge of dynamic threats. Furthermore, researchers from the Hybrid project were embedded in the security analyst groups for almost a full year, engaged in daily operational activities and routines, creating an atmosphere of trust and collaboration between the researchers and security personnel. The Hybrid project has altered the way that research ideas can be incorporated into the production environments of Sandias enterprise security groups, reducing time to deployment from months and

  17. Preparation of metal-triazolate frameworks

    DOE Patents [OSTI]

    Yaghi, Omar M; Uribe-Romo, Fernando J; Gandara-Barragan, Felipe; Britt, David K

    2014-10-07

    The disclosure provides for novel metal-triazolate frameworks, methods of use thereof, and devices comprising the frameworks thereof.

  18. Energy Sector Cybersecurity Framework Implementation Guidance

    Broader source: Energy.gov (indexed) [DOE]

    FOR PUBLIC COMMENT SEPTEMBER, 2014 ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE Energy Sector Cybersecurity Framework Implementation Guidance Table of Contents...

  19. Cluster Analysis-Based Approaches for Geospatiotemporal Data...

    Office of Scientific and Technical Information (OSTI)

    Cluster Analysis-Based Approaches for Geospatiotemporal Data Mining of Massive Data Sets for Identification of Forest Threats Mills, Richard T ORNL ORNL; Hoffman, Forrest M...

  20. LIGHTEnUp Tool & Analysis Framework

    Broader source: Energy.gov (indexed) [DOE]

    Industrial Commercial Residential Transportation 20 EO Tables covering 17 Modes x 13 Energy Sources 2 EO Tables covering 3 Building Types, 6 Energy Sources x 14 End-Use ...

  1. Sequential Threat Detection for Harbor Defense: An X-ray Physics...

    Office of Scientific and Technical Information (OSTI)

    Sequential Threat Detection for Harbor Defense: An X-ray Physics-Based Bayesian Approach Candy, J V 42 ENGINEERING; 73 NUCLEAR PHYSICS AND RADIATION PHYSICS Abstract not provided...

  2. Sequential Threat Detection for Harbor Defense: An X-ray Physics...

    Office of Scientific and Technical Information (OSTI)

    Defense: An X-ray Physics-Based Bayesian Approach Citation Details In-Document Search Title: Sequential Threat Detection for Harbor Defense: An X-ray Physics-Based Bayesian ...

  3. Tackling the Triple-Threat Genome of Miscanthus x giganteus (2010 JGI User Meeting)

    ScienceCinema (OSTI)

    Moose, Steve

    2011-04-25

    Steve Moose from the University of Illinois at Urbana-Champaign and the Energy Biosciences Institute on "Tackling the Triple-Threat Genome of Miscanthus x giganteus" on March 25, 2010 at the 5th Annual DOE JGI User Meeting

  4. Prototype integration of the joint munitions assessment and planning model with the OSD threat methodology

    SciTech Connect (OSTI)

    Lynn, R.Y.S.; Bolmarcich, J.J.

    1994-06-01

    The purpose of this Memorandum is to propose a prototype procedure which the Office of Munitions might employ to exercise, in a supportive joint fashion, two of its High Level Conventional Munitions Models, namely, the OSD Threat Methodology and the Joint Munitions Assessment and Planning (JMAP) model. The joint application of JMAP and the OSD Threat Methodology provides a tool to optimize munitions stockpiles. The remainder of this Memorandum comprises five parts. The first is a description of the structure and use of the OSD Threat Methodology. The second is a description of JMAP and its use. The third discusses the concept of the joint application of JMAP and OSD Threat Methodology. The fourth displays sample output of the joint application. The fifth is a summary and epilogue. Finally, three appendices contain details of the formulation, data, and computer code.

  5. Historical precedence and technical requirements of biological weapons use : a threat assessment.

    SciTech Connect (OSTI)

    Estes, Daniel P.; Vogel, Kathleen Margaret; Gaudioso, Jennifer Marie; Hickok, Lauren T.; Jung, Danielle F.; Barnett, Natalie Beth; Frerichs, Rebecca L.; Salerno, Reynolds Mathewson

    2004-05-01

    The threat from biological weapons is assessed through both a comparative historical analysis of the patterns of biological weapons use and an assessment of the technological hurdles to proliferation and use that must be overcome. The history of biological weapons is studied to learn how agents have been acquired and what types of states and substate actors have used agents. Substate actors have generally been more willing than states to use pathogens and toxins and they have focused on those agents that are more readily available. There has been an increasing trend of bioterrorism incidents over the past century, but states and substate actors have struggled with one or more of the necessary technological steps. These steps include acquisition of a suitable agent, production of an appropriate quantity and form, and effective deployment. The technological hurdles associated with the steps present a real barrier to producing a high consequence event. However, the ever increasing technological sophistication of society continually lowers the barriers, resulting in a low but increasing probability of a high consequence bioterrorism event.

  6. Emerging threats to global security focus of March 12 talk at Bradbury

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science Museum Emerging threats to global security talk March 12 Emerging threats to global security focus of March 12 talk at Bradbury Science Museum Terry Wallace will focus on how the Lab will address these issues and help the government respond. March 6, 2014 Terry Wallace, principal associate director for Global Security Terry Wallace, principal associate director for Global Security Contact Steve Sandoval Communications Office (505) 665-9206 Email During the next 20 years, as the

  7. Behavior Models to Express and Share Threat Information

    SciTech Connect (OSTI)

    Oehmen, Christopher S.; Peterson, Elena S.; Cox, Ann

    2015-09-01

    This short article describes the usage of behavior models through LINEBACkER, a DHS-funded project that applies bio-inspired and other modeling concepts to analysis of network traffic.

  8. Evaluation in a competitive utility environment: the threat of confidentiality

    SciTech Connect (OSTI)

    Vine, Edward

    1997-06-01

    information needs and sources and revise existing policies. 2. Review process for handling confidentiality claims and revise existing policies. 3. Monitor restructuring activities. 4. Develop framework and specific guidelines. 5. Develop standards of conduct. 6. Hold workshops on confidentiality. 7. Design and implement a pilot project. 8. Establish and support consumer advocates. 9. Support more research on confidentiality. Utilities will be reluctant to support these activities and develop the new rules of the game. Regulators need to be more proactive and conduct the above activities promptly in order to avoid paralysis and inertia and to maintain the regulatory balance. The lack of a regulatory framework and specific policies for information access may only make existing problems more severe. The issue of confidentiality has broad sociopolitical dimensions. In the next few years, commissions will be asked to create information policies that will demonstrate the degree of their support for public access to utility- held information. These policies will be important since they can "profoundly affect the manner in which an individual in a society, indeed a society itself, makes political, economic and social choices." Finally, in all likelihood, evaluators will need to adapt to an environment where utility data will be more difficult to obtain and disseminate. It is premature to see how increased confidentiality will affect the objectivity, usefulness, validity, and reliability of evaluations. If the evaluation community wishes to maintain the high its work, creative solutions will most needed.

  9. The Gremlin Framework

    Energy Science and Technology Software Center (OSTI)

    2013-09-26

    The Gremlin sofrware package is a performance analysis approach targeted to support the Co-Design process for future systems. It consists of a series of modules that can be used to alter a machine's behavior with the goal of emulating future machine properties. The modules can be divided into several classes; the most significant ones are detailed below. PowGre is a series of modules that help explore the power consumption properties of applications and to determinemore » the impact of power constraints on applications. Most of them use low-level processor interfaces to directly control voltage and frequency settings as well as per nodes, socket, or memory power bounds. MemGre are memory Gremlins and implement a new performance analysis technique that captures the application's effective use of the storage capacity of different levels of the memory hierarchy as well as the bandwidth between adjacent levels. The approach models various memory components as resources and measures how much of each resource the application uses from the application's own perspective. To the application a given amount of a resource is "used" if not having this amount will degrade the application's performance. This is in contrast to the hardware-centric perspective that considers "use" as any hardware action that utilizes the resource, even if it has no effect on performance. ResGre are Gremlins that use fault injection techniques to emulate higher fault rates than currently present in today's systems. Faults can be injected through various means, including network interposition, static analysis, and code modification, or direct application notification. ResGre also includes patches to previously released LLNL codes that can counteract and react to injected failures.« less

  10. Sequentially Executed Model Evaluation Framework

    SciTech Connect (OSTI)

    2014-02-14

    Provides a message passing framework between generic input, model and output drivers, and specifies an API for developing such drivers. Also provides batch and real-time controllers which step the model and 1/0 through the time domain (or other discrete domain), and sample 1/0 drivers. This is a Framework library framework, and does not, itself, solve any problems or execute any modelling. The SeMe framework aids in development of models which operate on sequential information, such as time-series, where evaluation is based on prior results combined with new data for this iteration. Ha) applications in quality monitoring, and was developed as part of the CANARY-EDS software, where real-time water quality data is being analyzed

  11. Sample Business Plan Framework 5

    Broader source: Energy.gov [DOE]

    U.S. Department of Energy Better Buildings Neighborhood Program: Sample Business Plan Framework 5: A program that establishes itself as a government entity, then operates using a fee-based structure.

  12. Sample Business Plan Framework 2

    Broader source: Energy.gov [DOE]

    U.S. Department of Energy Better Buildings Neighborhood Program: Sample Business Plan Framework 1: A program seeking to continue operations in the post-grant period as a not-for-profit (NGO) entity.

  13. Sample Business Plan Framework 4

    Broader source: Energy.gov [DOE]

    U.S. Department of Energy Better Buildings Neighborhood Program: Sample Business Plan Framework 4: A program seeking to continue in the post-grant period as a marketing contractor to a utility.

  14. Sample Business Plan Framework 3

    Broader source: Energy.gov [DOE]

    U.S. Department of Energy Better Buildings Neighborhood Program: Sample Business Plan Framework 3: A government entity running a Commercial PACE program in the post-grant period.

  15. Sample Business Plan Framework 1

    Broader source: Energy.gov [DOE]

    U.S. Department of Energy Better Buildings Neighborhood Program: Sample Business Plan Framework 1: A program seeking to continue operations in the post-grant period as a not-for-profit (NGO) entity.

  16. Sequentially Executed Model Evaluation Framework

    Energy Science and Technology Software Center (OSTI)

    2014-02-14

    Provides a message passing framework between generic input, model and output drivers, and specifies an API for developing such drivers. Also provides batch and real-time controllers which step the model and 1/0 through the time domain (or other discrete domain), and sample 1/0 drivers. This is a Framework library framework, and does not, itself, solve any problems or execute any modelling. The SeMe framework aids in development of models which operate on sequential information, suchmore » as time-series, where evaluation is based on prior results combined with new data for this iteration. Ha) applications in quality monitoring, and was developed as part of the CANARY-EDS software, where real-time water quality data is being analyzed« less

  17. Framework for Adaptable Operating and Runtime Systems: Final Project Report

    SciTech Connect (OSTI)

    Patrick G. Bridges

    2012-02-01

    In this grant, we examined a wide range of techniques for constructing high-performance con#12;gurable system software for HPC systems and its application to DOE-relevant problems. Overall, research and development on this project focused in three specifc areas: (1) software frameworks for constructing and deploying con#12;gurable system software, (2) applcation of these frameworks to HPC-oriented adaptable networking software, (3) performance analysis of HPC system software to understand opportunities for performance optimization.

  18. Proliferation profile assessment of emerging biological weapons threats. Research paper

    SciTech Connect (OSTI)

    Archuleta, M.G.; Bland, M.S.; Duann, T.P.; Tucker, A.B.

    1996-04-01

    This project develops a first generation biological warfare (BW) program system model for use in the DOD`s counterproliferation workstation, identifies key issues the U.S. military must address to assure its forces are prepared to fight in a BW environment, and develops a concise BW primer for use by any DOD activity requiring such information. The greatest lesson to be learned from this study is that only through the collective analysis of all the sub-systems of a suspected BW program will conclusive evidence of the program be found. Still, with current counterproliferation capabilities the U.S. may only be able to slow, not stop a motivated proliferant.

  19. A threat-based definition of IA- and IA-enabled products.

    SciTech Connect (OSTI)

    Shakamuri, Mayuri; Schaefer, Mark A.; Campbell, Philip LaRoche

    2010-07-01

    This paper proposes a definition of 'IA and IA-enabled products' based on threat, as opposed to 'security services' (i.e., 'confidentiality, authentication, integrity, access control or non-repudiation of data'), as provided by Department of Defense (DoD) Instruction 8500.2, 'Information Assurance (IA) Implementation.' The DoDI 8500.2 definition is too broad, making it difficult to distinguish products that need higher protection from those that do not. As a consequence the products that need higher protection do not receive it, increasing risk. The threat-based definition proposed in this paper solves those problems by focusing attention on threats, thereby moving beyond compliance to risk management. (DoDI 8500.2 provides the definitions and controls that form the basis for IA across the DoD.) Familiarity with 8500.2 is assumed.

  20. A threat-based definition of IA and IA-enabled products.

    SciTech Connect (OSTI)

    Shakamuri, Mayuri; Schaefer, Mark A.; Campbell, Philip LaRoche

    2010-09-01

    This paper proposes a definition of 'IA and IA-enabled products' based on threat, as opposed to 'security services' (i.e., 'confidentiality, authentication, integrity, access control or non-repudiation of data'), as provided by Department of Defense (DoD) Instruction 8500.2, 'Information Assurance (IA) Implementation.' The DoDI 8500.2 definition is too broad, making it difficult to distinguish products that need higher protection from those that do not. As a consequence the products that need higher protection do not receive it, increasing risk. The threat-based definition proposed in this paper solves those problems by focusing attention on threats, thereby moving beyond compliance to risk management. (DoDI 8500.2 provides the definitions and controls that form the basis for IA across the DoD.) Familiarity with 8500.2 is assumed.

  1. Object-oriented Geographic Information System Framework

    Energy Science and Technology Software Center (OSTI)

    2003-03-01

    JeoViewer is an intelligent object-oriented geographic information system (GIS) framework written in Java that provides transparent linkage to any object’s data, behaviors, and optimized spatial geometry representation. Tools are provided for typical GIS functionality, data ingestion, data export, and integration with other frameworks. The primary difference between Jeo Viewer and traditional GIS systems is that traditional GIS systems offer static views of geo-spatial data while JeoViewer can be dynamically coupled to models and live datamore » streams which dynamically change the state of the object which can be immediately represented in JeoViewer. Additionally, JeoViewer’s object-oriented paradigm provides a more natural representation of spatial data. A rich layer hierarchy allows arbitrary grouping of objects based on any relationship as well as the traditional GIS vertical ordering of objects. JeoViewer can run as a standalone product, extended with additional analysis functionality, or embedded in another framework.« less

  2. International Framework for Nuclear Energy Cooperation (IFNEC...

    Office of Environmental Management (EM)

    International Framework for Nuclear Energy Cooperation (IFNEC) Expert meetings in Romania May 28, 2014 - 12:37pm Addthis International Framework for Nuclear Energy Cooperation ...

  3. Introduction to Framework | Open Energy Information

    Open Energy Info (EERE)

    Introduction to Framework (Redirected from Introduction to Methodology) Jump to: navigation, search Stage 1 LEDS Home Introduction to Framework Assess current country plans,...

  4. ICF Program Framework | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    Evaluation Inertial Confinement Fusion ICF Program Framework 2016 Inertial Confinement Fusion Program Framework, U.S. Department of Energy, National Nuclear Security ...

  5. A Conceptual Framework for Progressing Towards Sustainability...

    Open Energy Info (EERE)

    Framework for Progressing Towards Sustainability in the Agriculture and Food Sector Jump to: navigation, search Tool Summary LAUNCH TOOL Name: A Conceptual Framework for...

  6. Site Transition Framework | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Site Transition Framework (April 2004) PDF icon Site Transition Framework More Documents & Publications Process for Transition of Uranium Mill Tailings Radiation Control Act Title ...

  7. Smaller RFID Sensors Use Less Power to Detect Threats | GE Global Research

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    New RFID Sensors are Smaller, Use Less Power to Detect Chemical Threats Click to email this to a friend (Opens in new window) Share on Facebook (Opens in new window) Click to share (Opens in new window) Click to share on LinkedIn (Opens in new window) Click to share on Tumblr (Opens in new window) New RFID Sensors are Smaller, Use Less Power to Detect Chemical Threats Radislav Potyrailo 2015.02.17 Hello Earth! We have reached a significant milestone with GE's radio-frequency identification

  8. Microsoft Word - DOE Framework Final.docx

    Broader source: Energy.gov (indexed) [DOE]

    5791 Unlimited Release Printed September 2007 Categorizing Threat Building and Using a Generic Threat Matrix David P. Duggan, Sherry R. Thomas, Cynthia K. K. Veitch, and Laura Woodard Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract

  9. Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security

    Broader source: Energy.gov [DOE]

    Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland SecurityBy: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery...

  10. Sequentially Executed Model Evaluation Framework

    Energy Science and Technology Software Center (OSTI)

    2015-10-20

    Provides a message passing framework between generic input, model and output drivers, and specifies an API for developing such drivers. Also provides batch and real-time controllers which step the model and I/O through the time domain (or other discrete domain), and sample I/O drivers. This is a library framework, and does not, itself, solve any problems or execute any modeling. The SeMe framework aids in development of models which operate on sequential information, such asmore » time-series, where evaluation is based on prior results combined with new data for this iteration. Has applications in quality monitoring, and was developed as part of the CANARY-EDS software, where real-time water quality data is being analyzed for anomalies.« less

  11. A framework for selecting indicators of bioenergy sustainability

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Dale, Virginia H; Efroymson, Rebecca Ann; Kline, Keith L; Davitt, Marcia S

    2015-01-01

    Abstract: A framework for selecting and evaluating indicators of bioenergy sustainability is presented. This framework is designed to facilitate decision-making about which indicators are useful for assessing sustainability of bioenergy systems and supporting their deployment. Efforts to develop sustainability indicators in the United States and Europe are reviewed. The fi rst steps of the framework for indicator selection are defi ning the sustainability goals and other goals for a bioenergy project or program, gaining an understanding of the context, and identifying the values of stakeholders. From the goals, context, and stakeholders, the objectives for analysis and criteria for indicator selectionmore » can be developed. The user of the framework identifi es and ranks indicators, applies them in an assessment, and then evaluates their effectiveness, while identifying gaps that prevent goals from being met, assessing lessons learned, and moving toward best practices. The framework approach emphasizes that the selection of appropriate criteria and indicators is driven by the specifi c purpose of an analysis. Realistic goals and measures of bioenergy sustainability can be developed systematically with the help of the framework presented here.« less

  12. Site Transition Framework for Long-Term Surveillance and Maintenance...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Framework for Long-Term Surveillance and Maintenance Site Transition Framework for Long-Term Surveillance and Maintenance The Site Transition Framework (STF) provides a framework ...

  13. Nuclear Safety Regulatory Framework | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Nuclear Safety Regulatory Framework Nuclear Safety Regulatory Framework February 2012 Presentation that outlines the rules, policies and orders that comprise the Department of Energy Nuclear Safety Regulatory Framework. Nuclear Safety Regulatory Framework (438.96 KB) More Documents & Publications Summary Pamphlet, Nuclear Safety at the Department of Energy CX-014643: Categorical Exclusion Determination Notice of Violation, UChicago Argonne, LLC - WEA-2009-04

  14. Developing a Regional Recovery Framework

    SciTech Connect (OSTI)

    Lesperance, Ann M.; Olson, Jarrod; Stein, Steven L.; Clark, Rebecca; Kelly, Heather; Sheline, Jim; Tietje, Grant; Williamson, Mark; Woodcock, Jody

    2011-09-01

    Abstract A biological attack would present an unprecedented challenge for local, state, and federal agencies; the military; the private sector; and individuals on many fronts ranging from vaccination and treatment to prioritization of cleanup actions to waste disposal. To prepare the Seattle region to recover from a biological attack, the Seattle Urban Area Security Initiative (UASI) partners collaborated with military and federal agencies to develop a Regional Recovery Framework for a Biological Attack in the Seattle Urban Area. The goal was to reduce the time and resources required to recover and restore wide urban areas, military installations, and other critical infrastructure following a biological incident by providing a coordinated systems approach. Based on discussions in small workshops, tabletop exercises, and interviews with emergency response agency staff, the partners identified concepts of operation for various areas to address critical issues the region will face as recovery progresses. Key to this recovery is the recovery of the economy. Although the Framework is specific to a catastrophic, wide-area biological attack using anthrax, it was designed to be flexible and scalable so it could also serve as the recovery framework for an all-hazards approach. The Framework also served to coalesce policy questions that must be addressed for long-term recovery. These questions cover such areas as safety and health, security, financial management, waste management, legal issues, and economic development.

  15. Risk assessment as a framework for decisions.

    SciTech Connect (OSTI)

    Rechard, Robert Paul; McKenna, Sean Andrew; Borns, David James

    2010-12-01

    The risk assessment approach has been applied to support numerous radioactive waste management activities over the last 30 years. A risk assessment methodology provides a solid and readily adaptable framework for evaluating the risks of CO2 sequestration in geologic formations to prioritize research, data collection, and monitoring schemes. This paper reviews the tasks of a risk assessment, and provides a few examples related to each task. This paper then describes an application of sensitivity analysis to identify important parameters to reduce the uncertainty in the performance of a geologic repository for radioactive waste repository, which because of importance of the geologic barrier, is similar to CO2 sequestration. The paper ends with a simple stochastic analysis of idealized CO2 sequestration site with a leaking abandoned well and a set of monitoring wells in an aquifer above the CO2 sequestration unit in order to evaluate the efficacy of monitoring wells to detect adverse leakage.

  16. Sandia National Laboratories: Laboratories' Strategic Framework

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Strategic Framework Vision, Mission, and Values Strategic Framework Mission Areas Laboratories Foundation Strategic Objectives and Crosscuts About Strategic Framework strategic framework Sandia continues to be engaged in the significant demands of the nation's nuclear weapons modernization program while conducting a whole range of activities in broader national security. The Laboratories' strategic framework drives strategic decisions about the totality of our work and has positioned our

  17. Analysis of the multigroup model for muon tomography based threat detection

    SciTech Connect (OSTI)

    Perry, J. O.; Bacon, J. D.; Borozdin, K. N.; Fabritius, J. M.; Morris, C. L.

    2014-02-14

    We compare different algorithms for detecting a 5?cm tungsten cube using cosmic ray muon technology. In each case, a simple tomographic technique was used for position reconstruction, but the scattering angles were used differently to obtain a density signal. Receiver operating characteristic curves were used to compare images made using average angle squared, median angle squared, average of the squared angle, and a multi-energy group fit of the angular distributions for scenes with and without a 5?cm tungsten cube. The receiver operating characteristic curves show that the multi-energy group treatment of the scattering angle distributions is the superior method for image reconstruction.

  18. Content Analysis for Proactive Protective Intelligence

    SciTech Connect (OSTI)

    Sanfilippo, Antonio P.

    2010-12-15

    The aim of this paper is to outline a plan for developing and validating a Proactive Protective Intelligence approach that prevents targeted violence through the analysis and assessment of threats overtly or covertly expressed in abnormal communications to USSS protectees.

  19. Exposure Levels for Chemical Threat Compounds; Information to Facilitate Chemical Incident Response

    SciTech Connect (OSTI)

    Hauschild, Veronique; Watson, Annetta Paule

    2013-01-01

    Exposure Standards, Limits and Guidelines for Chemical Threat Compunds ABSTRACT Exposure criteria for chemical warfare (CW) agents and certain toxic industrial chemicals (TICs) used as CW agents (such as chlorine fill in an improvised explosive device) have been developed for protection of the civilian general public, civilian employees in chemical agent processing facilities and deployed military populations. In addition, compound-specific concentrations have been developed to serve as how clean is clean enough clearance criteria guiding facility recovery following chemical terrorist or other hazardous release events. Such criteria are also useful to verify compound absence, identify containment boundaries and expedite facility recovery following chemical threat release. There is no single right value or concentration appropriate for all chemical hazard control applications. It is acknowledged that locating and comparing the many sources of CW agent and TIC exposure criteria has not been previously well-defined. This paper summarizes many of these estimates and assembles critical documentation regarding their derivation and use.

  20. Review of July 2013 Nuclear Security Insider Threat Exercise November 2013

    SciTech Connect (OSTI)

    Pederson, Ann C.; Snow, Catherine L.; Townsend, Jeremy; Shannon, Michael

    2013-11-01

    This document is a review of the Nuclear Security Insider Threat Exercise which was hosted at ORNL in July 2013. Nuclear security culture and the insider threat are best learned through experience. Culture is inherently difficult to teach, and as such is best learned through modeled behaviors and learning exercise. This TTX, NSITE, is a tool that strives to aid students in learning what an effective (and ineffective) nuclear security culture might look like by simulating dynamic events that strengthen or weaken the nuclear security regime. The goals of NSITE are to stimulate complex thought and discussion and assist decision makers and management in determining the most effective policies and procedures for their country or facility.

  1. Living in the Nuclear Age: Families and the threat of nuclear war

    SciTech Connect (OSTI)

    Demorest, D.M.

    1991-01-01

    The main interest of this research was to add to the body of knowledge about the possible psychological impact of the nuclear threat on the family unit. Data were utilized from the Family Interaction, Stress and Nuclear War study conducted by Jules Riskin, M.D. and Victoria Dickerson, Ph.D. at the Mental Research Institute in Palo Alto, California. The sample consisted of ten families who were recruited for this study. In order to examine family-interaction variables and the impact of the threat of nuclear war, a standardized semi-structured family interview was conducted. Topics ranged from ordinary activities to external, non-nuclear stresses such as landslides or hurricanes, to the topic of nuclear war. A distinction is drawn between a family's level of nuclear concern while they discuss nuclear issues and a family's level of nuclear concern when viewed in the context of their overall pattern of family communication. In terms of family coping, family nuclear concern was found to be significantly related to two family-coping strategies. Families who utilized the coping strategies of seeking spiritual support and mobilizing the family to acquire and accept help were significantly less concerned about the threat of nuclear war.

  2. Final Project Report: A Polyhedral Transformation Framework for Compiler Optimization

    SciTech Connect (OSTI)

    Sadayappan, Ponnuswamy; Rountev, Atanas

    2015-06-15

    The project developed the polyhedral compiler transformation module PolyOpt/Fortran in the ROSE compiler framework. PolyOpt/Fortran performs automated transformation of affine loop nests within FORTRAN programs for enhanced data locality and parallel execution. A FORTAN version of the Polybench library was also developed by the project. A third development was a dynamic analysis approach to gauge vectorization potential within loops of programs; software (DDVec) for automated instrumentation and dynamic analysis of programs was developed.

  3. Gas adsorption on metal-organic frameworks

    DOE Patents [OSTI]

    Willis, Richard R.; Low, John J. , Faheem, Syed A.; Benin, Annabelle I.; Snurr, Randall Q.; Yazaydin, Ahmet Ozgur

    2012-07-24

    The present invention involves the use of certain metal organic frameworks that have been treated with water or another metal titrant in the storage of carbon dioxide. The capacity of these frameworks is significantly increased through this treatment.

  4. Framework Topic Briefing: Direct Feed LAW

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    February 13, 2014 Framework Topic Briefing: Direct Feed LAW Next steps: Put Dick's handouts on SharePoint * Continue Framework topic briefing series Page 1 System Plan 7 Next ...

  5. Energy Sector Cybersecurity Framework Implementation Guidance | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy Cybersecurity Framework Implementation Guidance Energy Sector Cybersecurity Framework Implementation Guidance On January 8, 2015, the Energy Department released guidance to help the energy sector establish or align existing cybersecurity risk management programs to meet the objectives of the Cybersecurity Framework released by the National Institutes of Standards and Technology (NIST) in February 2014. The voluntary Cybersecurity Framework consists of standards, guidelines, and

  6. Energy Sector Cybersecurity Framework Implementation Guidance

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    JANUARY 2015 ENERGY SECTOR CYBERSECURITY FRAMEWORK IMPLEMENTATION GUIDANCE U.S. DEPARTMENT OF ENERGY OFFICE OF ELECTRICITY DELIVERY AND ENERGY RELIABILITY Energy Sector Cybersecurity Framework Implementation Guidance │ Table of Contents TABLE OF CONTENTS 1. Introduction .............................................................................................................................................. 1 2. Preparing for Framework Implementation

  7. BOA: Framework for automated builds

    SciTech Connect (OSTI)

    N. Ratnikova et al.

    2003-09-30

    Managing large-scale software products is a complex software engineering task. The automation of the software development, release and distribution process is most beneficial in the large collaborations, where the big number of developers, multiple platforms and distributed environment are typical factors. This paper describes Build and Output Analyzer framework and its components that have been developed in CMS to facilitate software maintenance and improve software quality. The system allows to generate, control and analyze various types of automated software builds and tests, such as regular rebuilds of the development code, software integration for releases and installation of the existing versions.

  8. A Multiscale Bidirectional Coupling Framework

    SciTech Connect (OSTI)

    Kabilan, Senthil; Kuprat, Andrew P.; Hlastala, Michael P.; Corley, Richard A.; Einstein, Daniel R.

    2011-12-01

    The lung is geometrically articulated across multiple scales from the trachea to the alveoli. A major computational challenge is to tightly link ODEs that describe lower scales to 3D finite element or finite volume models of airway mechanics using iterative communication between scales. In this study, we developed a novel multiscale computational framework for bidirectionally coupling 3D CFD models and systems of lower order ODEs. To validate the coupling framework, a four and eight generation Weibel lung model was constructed. For the coupled CFD-ODE simulations, the lung models were truncated at different generations and a RL circuit represented the truncated portion. The flow characteristics from the coupled models were compared to untruncated full 3D CFD models at peak inhalation and peak exhalation. Results showed that at no time or simulation was the difference in mass flux and/or pressure at a given location between uncoupled and coupled models was greater than 2.43%. The flow characteristics at prime locations for the coupled models showed good agreement to uncoupled models. Remarkably, due to reuse of the Krylov subspace, the cost of the ODE coupling is not much greater than uncoupled full 3D-CFD computations with simple prescribed pressure values at the outlets.

  9. The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration, OAS-L-12-01

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Audit and Inspections Audit Report The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration OAS-L-12-01 October 2011 Department of Energy Washington, DC 20585 October 25, 2011 MEMORANDUM FOR THE DEPUTY ADMINISTRATOR FOR DEFENSE NUCLEAR NONPROLIFERATION FROM: David Sedillo Director Western Audits Division SUBJECT: INFORMATION: Audit Report on "The National Nuclear Security Administration Global Threat Reduction Initiative's Contract

  10. In silico screening of metal-organic frameworks in separation...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    frameworks in separation applications Abstract: Porous materials such as metal-organic frameworks (MOFs) and zeolitic imidazolate frameworks (ZIFs) offer considerable...