Powered by Deep Web Technologies
Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Global Threat Reduction Initiative  

Broader source: Energy.gov (indexed) [DOE]

comprehensive comprehensive strategy to prevent nuclear terrorism; and  The key organization responsible for implementing the U.S. HEU minimization policy. GTRI MISSION Reduce and protect vulnerable nuclear and radiological material located at civilian sites worldwide. DOE STRATEGIC GOAL 2.2 Prevent the acquisition of nuclear and radiological materials for use in weapons of mass destruction and other acts of terrorism Protect high priority nuclear and radiological materials from theft and sabotage These efforts result in threat reduction by improving security on the bomb material remaining at civilian sites - each vulnerable building that is protected reduces the risk until a permanent threat reduction solution can be implemented.

2

Global Threat Reduction Initiative  

Broader source: Energy.gov (indexed) [DOE]

Nonproliferation Nonproliferation U.S. DEPARTMENT OF ENERGY 1 The Current Status of Gap and U.S.-Origin Nuclear Fuel Removals 2011 Jeff Galan, Deputy Project Manager U.S.-Origin Nuclear Remove Program National Nuclear Security Administration Global Threat Reduction Initiative Defense Nuclear Nonproliferation U.S. DEPARTMENT OF ENERGY 2 GTRI Mission and Goals GTRI is: A part of President Obama's comprehensive strategy to prevent nuclear terrorism; and The key organization responsible for implementing the U.S. HEU minimization policy. GTRI MISSION Reduce and protect vulnerable nuclear and radiological material located at civilian sites worldwide. DOE STRATEGIC GOAL 2.2 Prevent the acquisition of nuclear and radiological materials for use in weapons of mass destruction and other

3

Global Threat Reduction Initiative | Department of Energy  

Office of Environmental Management (EM)

Reduction Initiative An overview of the Global Threat Reduction Initiative, U.S.-Origin Nuclear Fuel Removals. Global Threat Reduction Initiative More Documents &...

4

Global Threat Reduction Initiative | Department of Energy  

Office of Environmental Management (EM)

Initiative Global Threat Reduction Initiative The Current Status of Gap and U.S.-Origin Nuclear Fuel Removals 2011. Global Threat Reduction Initiative More Documents &...

5

Global Threat Reduction Initiative | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Threat Reduction Initiative | National Nuclear Security Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Global Threat Reduction Initiative Home > About Us > Our Programs > Nonproliferation > Global Threat Reduction Initiative Global Threat Reduction Initiative The mission of the Global Threat Reduction Initiative (GTRI) is to reduce

6

Global Threat Reduction Initiative | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Threat Reduction Initiative | National Nuclear Security Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Global Threat Reduction Initiative Home > About Us > Our Programs > Nonproliferation > Global Threat Reduction Initiative Global Threat Reduction Initiative The mission of the Global Threat Reduction Initiative (GTRI) is to reduce

7

Manager, International Chemical Threat Reduction Department, Sandia  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

International Chemical Threat Reduction Department, Sandia International Chemical Threat Reduction Department, Sandia National Laboratories | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Nancy Jackson Manager, International Chemical Threat Reduction Department, Sandia National Laboratories

8

Manager, International Chemical Threat Reduction Department, Sandia  

National Nuclear Security Administration (NNSA)

International Chemical Threat Reduction Department, Sandia International Chemical Threat Reduction Department, Sandia National Laboratories | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Nancy Jackson Manager, International Chemical Threat Reduction Department, Sandia National Laboratories

9

NNSA Launches Global Threat Reduction Initiative | National Nuclear  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Threat Reduction Initiative | National Nuclear Global Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > NNSA Launches Global Threat Reduction Initiative NNSA Launches Global Threat Reduction Initiative May 26, 2004 Vienna, Austria NNSA Launches Global Threat Reduction Initiative

10

NNSA Launches Global Threat Reduction Initiative | National Nuclear  

National Nuclear Security Administration (NNSA)

Global Threat Reduction Initiative | National Nuclear Global Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > NNSA Launches Global Threat Reduction Initiative NNSA Launches Global Threat Reduction Initiative May 26, 2004 Vienna, Austria NNSA Launches Global Threat Reduction Initiative

11

Metamaterials for threat reduction applications: imaging, signal processing, and cloaking  

E-Print Network [OSTI]

Metamaterials for threat reduction applications: imaging, signal processing, and cloaking R. D effort is underway to fill this "THz gap" in view of potential threat reduction applications) and Theoretical Divisions, are exploring metamaterials-based de- vices operating at THz frequencies for threat

12

NNSA Supports Permanent Threat Reduction in Ukraine through Alternativ...  

National Nuclear Security Administration (NNSA)

terrorism around the world. Converting or replacing isotopic devices with non-isotopic alternative technology achieves permanent threat reduction by decreasing the availability...

13

Global Threat Reduction Initiative | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Threat Reduction Global Threat Reduction ... Global Threat Reduction Initiative The Global Threat Reduction Initiative's Alarm Response Training provides training in the area of response for radiological events and provides an opportunity for the security forces, health and safety personnel, and other responsible parties such as the supporting local law enforcement to develop, discuss, and exercise their own tactics, techniques, procedures, and protocols when responding to a theft and/or sabotage event involving radioactive materials of significance. This voluntary program is free, and all expenses (travel, meals, etc.), other than the trainee's training time, will be paid by the GTRI Domestic Threat Reduction Program. Facilities participating in the Domestic Security Program are scheduled for

14

NNSA's Global Threat Reduction Initiative launches mobile app | National  

National Nuclear Security Administration (NNSA)

launches mobile app | National launches mobile app | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative launches mobile app NNSA's Global Threat Reduction Initiative launches mobile app Posted By Office of Public Affairs NNSA's Global Threat Reduction Initiative (GTRI) recently launched a

15

NNSA's Global Threat Reduction Initiative food face-off | National  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

food face-off | National food face-off | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative food face-off NNSA's Global Threat Reduction Initiative food face-off Posted By Office of Public Affairs NNSA's Global Threat Reduction Initiative holds a Feds Feeds Family face-off

16

NNSA's Global Threat Reduction Initiative Receives 2010 Distinguished  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Receives 2010 Distinguished Receives 2010 Distinguished Project Award from PMI | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Press Releases > NNSA's Global Threat Reduction Initiative Receives 2010 ... Press Release NNSA's Global Threat Reduction Initiative Receives 2010 Distinguished

17

NNSA's Global Threat Reduction Initiative Completes First Plutonium  

National Nuclear Security Administration (NNSA)

Completes First Plutonium Completes First Plutonium Shipment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative Completes First ... NNSA's Global Threat Reduction Initiative Completes First Plutonium Shipment Posted By NNSA Public Affairs NNSA Blog The United States and Sweden announced today at the 2012 Nuclear Security

18

NNSA's Global Threat Reduction Initiative Completes First Plutonium  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Completes First Plutonium Completes First Plutonium Shipment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative Completes First ... NNSA's Global Threat Reduction Initiative Completes First Plutonium Shipment Posted By NNSA Public Affairs NNSA Blog The United States and Sweden announced today at the 2012 Nuclear Security

19

Alternative Fuels Data Center: State Agency Petroleum Reduction Plan  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

State Agency Petroleum State Agency Petroleum Reduction Plan to someone by E-mail Share Alternative Fuels Data Center: State Agency Petroleum Reduction Plan on Facebook Tweet about Alternative Fuels Data Center: State Agency Petroleum Reduction Plan on Twitter Bookmark Alternative Fuels Data Center: State Agency Petroleum Reduction Plan on Google Bookmark Alternative Fuels Data Center: State Agency Petroleum Reduction Plan on Delicious Rank Alternative Fuels Data Center: State Agency Petroleum Reduction Plan on Digg Find More places to share Alternative Fuels Data Center: State Agency Petroleum Reduction Plan on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type State Agency Petroleum Reduction Plan All state agencies must reduce their fleets' petroleum consumption by

20

2014 Annual Planning Summary for the NNSA Global Threat Reduction Initiative Office  

Broader source: Energy.gov [DOE]

The ongoing and projected Environmental Assessments and Environmental Impact Statements for 2014 and 2015 within the NNSA Global Threat Reduction Initiative Office.

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Federal Agency Progress Toward Greenhouse Gas Reduction Targets  

Broader source: Energy.gov [DOE]

Excel spreadsheet shows overall government and federal agency reductions in scope 1 and 2 greenhouse gas (GHG) emissions and in indirect scope 3 GHG emissions categories.

22

The Global Threat Reduction Initiative's Molybdenum-99 Program, OAS-L-12-07  

Broader source: Energy.gov (indexed) [DOE]

Global Threat Reduction Global Threat Reduction Initiative's Molybdenum-99 Program OAS-L-12-07 July 2012 Department of Energy Washington, DC 20585 July 20, 2012 MEMORANDUM FOR THE ASSISTANT DEPUTY ADMINISTRATOR FOR GLOBAL THREAT REDUCTION, NATIONAL NUCLEAR SECURITY ADMINISTRATION FROM: David Sedillo, Director Western Audits Division Office of Inspector General SUBJECT: INFORMATION: Audit Report on "The Global Threat Reduction Initiative's Molybdenum-99 Program" BACKGROUND Molybdenum-99 (Mo-99) is used in the production of technetium-99m (Tc-99m), the most commonly used medical radioisotope in the world. The United States accounts for approximately half of the global demand for Mo-99 at approximately 6,000 units per week. Because Mo-99's short half-life of 66 hours prevents it from being stockpiled, consistent

23

Green Building and Energy Reduction Standards for State Agencies |  

Broader source: Energy.gov (indexed) [DOE]

You are here You are here Home » Green Building and Energy Reduction Standards for State Agencies Green Building and Energy Reduction Standards for State Agencies < Back Eligibility State Government Savings Category Heating & Cooling Home Weatherization Construction Commercial Weatherization Commercial Heating & Cooling Design & Remodeling Bioenergy Manufacturing Buying & Making Electricity Solar Lighting Windows, Doors, & Skylights Heating Water Water Heating Wind Program Info State District of Columbia Program Type Energy Standards for Public Buildings Provider Washington Department of General Administration On January 5, 2005, Washington's governor signed Executive Order 05-01, directing state agencies to adopt green building practices in the construction of all new buildings and in major (over 60%) renovation of

24

Development of Agency Reduction Targets | Open Energy Information  

Open Energy Info (EERE)

Development of Agency Reduction Targets Development of Agency Reduction Targets Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Development of Agency Reduction Targets Phase: "Evaluate Options and Determine Feasibility" is not in the list of possible values (Bring the Right People Together, Create a Vision, Determine Baseline, Evaluate Options, Develop Goals, Prepare a Plan, Get Feedback, Develop Finance and Implement Projects, Create Early Successes, Evaluate Effectiveness and Revise as Needed) for this property. User Interface: Spreadsheet Website: www.fedcenter.gov/Bookmarks/index.cfm?id=14129&pge_prg_id=27752&pge_id The DARTs tool is a template Excel workbook that provides the format for the calculation and submission of Federal agency scope 1 and 2 GHG emission

25

NNSA's Global Threat Reduction Initiative Removes More Than One Ton of  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Removes More Than One Ton of Removes More Than One Ton of Food | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative Removes More ... NNSA's Global Threat Reduction Initiative Removes More Than One Ton of Food Posted By Office of Public Affairs Contributing to DOE/NNSA's efforts to support the Office of Personnel

26

The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration, OAS-L-12-01  

Broader source: Energy.gov (indexed) [DOE]

Audit and Inspections Audit and Inspections Audit Report The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration OAS-L-12-01 October 2011 Department of Energy Washington, DC 20585 October 25, 2011 MEMORANDUM FOR THE DEPUTY ADMINISTRATOR FOR DEFENSE NUCLEAR NONPROLIFERATION FROM: David Sedillo Director Western Audits Division SUBJECT: INFORMATION: Audit Report on "The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration" BACKGROUND The National Nuclear Security Administration's (NNSA) Office of Defense Nuclear Nonproliferation established the Global Threat Reduction Initiative (GTRI) in May 2004, as a vital part of the efforts to combat nuclear and radiological terrorism. GTRI's mission is to reduce

27

GLOBAL THREAT REDUCTION INITIATIVE REACTOR CONVERSION PROGRAM: STATUS AND CURRENT PLANS  

SciTech Connect (OSTI)

The U.S. Department of Energys National Nuclear Security Administration (NNSA) Reactor Conversion Program supports the minimization, and to the extent possible, elimination of the use of high enriched uranium (HEU) in civilian nuclear applications by working to convert research and test reactors and radioisotope production processes to the use of low enriched uranium (LEU). The Reactor Conversion Program is a technical pillar of the NNSA Global Threat Reduction Initiative (GTRI) which is a key organization for implementing U.S. HEU minimization policy and works to reduce and protect vulnerable nuclear and radiological material domestically and abroad.

Staples, Parrish A.; Leach, Wayne; Lacey, Jennifer M.

2009-10-07T23:59:59.000Z

28

The Global Threat Reduction Initiative's Orphan Source Recovery Project in the Russian Federation  

SciTech Connect (OSTI)

After 9/11, officials at the United States Department of Energy (DOE), National Nuclear Security Administration (NNSA) grew more concerned about radiological materials that were vulnerable to theft and illicit use around the world. The concern was that terrorists could combine stolen radiological materials with explosives to build and detonate a radiological dispersal device (RDD), more commonly known as a dirty bomb. In response to this and other terrorist threats, the DOE/NNSA formed what is now known as the Global Threat Reduction Initiative (GTRI) to consolidate and accelerate efforts to reduce and protect vulnerable nuclear and radiological materials located at civilian sites worldwide. Although a cooperative program was already underway in the Russian Federation to secure nuclear materials at a range of different facilities, thousands of sealed radioactive sources remained vulnerable at medical, research, and industrial sites. In response, GTRI began to focus efforts on addressing these materials. GTRIs Russia Orphan Source Recovery Project, managed at the Nevada National Security Sites North Las Vegas facility, was initiated in 2002. Throughout the life of the project, Joint Stock Company Isotope has served as the primary Russian subcontractor, and the organization has proven to be a successful partner. Since the first orphan source recovery of an industrial cobalt-60 irradiator with 647 curies (Ci) at an abandoned facility in Moscow in 2003, the GTRI Orphan Source Recovery Project in the Russian Federation has accomplished substantial levels of threat reduction. To date, GTRI has recovered and securely disposed of more than 5,100 sources totaling more that 628,000 Ci. This project serves as an extraordinary example of how international cooperation can be implemented by partners with mutual interests to achieve significant goals.

Russell, J. W. [NSTec; Ahumada, A. D. [NSTec; Blanchard, T. A. [NNSA

2012-06-04T23:59:59.000Z

29

Global Threat Reduction Initiative Fuel-Thermo-Physical Characterization Project Quality Assurance Plan  

SciTech Connect (OSTI)

The charter of the Fuel Thermo-Physical Characterization Project is to ready Pacific Northwest National Laboratory (PNNL) facilities and processes for the receipt of unirradiated and irradiated low enriched uranium (LEU) molybdenum (U-Mo) fuel element samples, and to perform analysis to support the Global Threat Reduction Initiative conversion program. PNNLs support for the program will include the establishment of post-irradiation examination processes, including thermo-physical properties, unique to the U.S. Department of Energy laboratories. These processes will ultimately support the submission of the base fuel qualification (BFQ) to the U.S. Nuclear Regulatory Commission (NRC) and revisions to High Performance Research Reactor Safety Analysis Reports to enable conversion from highly enriched uranium to LEU fuel. This quality assurance plan (QAP) provides the quality assurance requirements and processes that support the NRC BFQ. This QAP is designed to be used by project staff, and prescribes the required management control elements that are to be met and how they are implemented. Additional controls are captured in Fuel Thermo-Physical Characterization Project plans, existing procedures, and procedures to be developed that provide supplemental information on how work is conducted on the project.

Pereira, Mario M.; Slonecker, Bruce D.

2012-06-01T23:59:59.000Z

30

E-Print Network 3.0 - agency dtra location Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Defense (DOD) Research Funding Summary: Administration) defensewide techno innovation oriented (6.1 - 6.3) DTRA (Defense Threat Reduction Agency... . Funding for basic...

31

Agency code: 576 ITEM REDUCTIONS BY METHOD OF FINANCING  

E-Print Network [OSTI]

Wildfire Protection Plan (TWPP) to provide greater protection from wildland fires to the citizens of Texas of Volunteer Fire Departments able to purchase needed firefighting equipment to protect the citizens of Texas in revenue. The Volunteer Fire Department Assistance Fund is statutorily restricted; reductions

32

Energy Cost Reduction Measures Identified for Texas State Agencies  

E-Print Network [OSTI]

audit programs examined a total of 35.3 million square feet of state-owned space. Energy cost reduction measures with paybacks of four years or less were identified. The purpose of this paper is to present the projects identified in 1986. Most relate...

Grigg, T. J.; Verdict, M. E.

1987-01-01T23:59:59.000Z

33

Homicidal Threats  

Science Journals Connector (OSTI)

Every day in the media we hear about death threats. Death threats are often made against individuals, i.e ... e. Death to America. Often these threats are accompanied by shouts, specific gestures,...

Stephen J. Morewitz

2008-01-01T23:59:59.000Z

34

Vetting Threats To Safe Drug Supplies  

Science Journals Connector (OSTI)

Vetting Threats To Safe Drug Supplies ... Representatives from government, drug companies, and national and international law enforcement agencies struggled to characterize what all agree is a large, growing, and frustratingly nebulous threat to public health and safety. ...

RICK MULLIN

2012-04-01T23:59:59.000Z

35

2014 Threats  

Science Journals Connector (OSTI)

......Society Winter 2013 research-article Information Security 2014 Threats Gareth Niblett Gareth Niblett, Chairman of the BCS Information...www.bcs.org/securitycommunity FURTHERINFORMATION 2014 THREATS doi:10.1093/itnow/bwt073 2013 The British Computer......

Gareth Niblett

2013-01-01T23:59:59.000Z

36

Threat Characterization  

Broader source: Energy.gov (indexed) [DOE]

Michalski Michalski SNL Department 5621 Threat Characterization Summary Slide: Threat Characterization Outcomes: Develop a network analysis toolset to allow an analyst to efficiently "crawl" large data sets to discover relevant threat information. Road Map Challenges:"The ability to discover & understand emerging threats and vulnerabilities is a prerequisite to developing effective countermeasures" Major Successes: * Implemented prototype front end crawler and semantic analysis engine (Sandia National Labs). * Transition Development work to the Institute for Complex Additive System Analysis (ICASA) Center (NMTech) * Quarterly threat reports being produced  Schedule: Improvements to both the analyst process and GUI Interface, 4Q 2009; Transition maintenance and development to

37

Insider Threat.pptx  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mitigating the Insider Threat Mitigating the Insider Threat (and Other Security Issues) Roger G. Johnston, Ph.D., CPP Vulnerability Assessment Team Argonne National Laboratory http://www.ne.anl.gov/capabilities/vat Argonne National Laboratory ~$738 million annual budget 1500 acres, 3400 employees, 4400 facility users, 1500 students R&D and technical assistance for government & industry Sponsors * DHS * DoD * DOS * IAEA * Euratom * DOE/NNSA * private companies * intelligence agencies * public interest organizations The VAT has done detailed vulnerability assessments on hundreds of different security devices, systems, & programs. Vulnerability Assessment Team (VAT) The greatest of faults, I should say, is to be conscious of none.

38

Intergrated Nox Emissions Reductions from Energy Efficiency and Renewable Energy (EE/RE) Programs across State Agencies in Texas  

E-Print Network [OSTI]

1 Calculation of Integrated NOx Emissions Reductions from Energy Efficiency and Renewable Energy (EE/RE) Programs across State Agencies in Texas Juan-Carlos Baltazar, Ph.D., P.E.,Jeff S. Haberl, Ph.D., P.E., and Bahman Yazdani, P... on Environmental Quality (TCEQ) from the state-wide energy efficiency and renewable energy programs. These programs include: the impact of code-complaint construction, the Texas Public Utility Commission (PUC), the energy efficiency programs managed by the Texas...

Baltazar, J.C.; Haberl, J.; Yazdani, B.

2014-01-01T23:59:59.000Z

39

Analysis of Emissions Calculators for the National Center of Excellence on Displaced Emission Reductions (CEDER)- 2008 Annual Report to the United States Environmental Protection Agency  

E-Print Network [OSTI]

and database that satisfies the EPA guidelines. The value of this unique tool was demonstrated in 2005 when the Energy Systems Laboratory (ESL), at the request of the TCEQ, used it to develop integrated emissions estimates for all state agencies... was demonstrated in 2005 when the ESL, at the request of the TCEQ, used it to develop integrated emissions estimates for all state agencies participating in the Texas Emissions Reduction Plan (TERP). Building on this expertise, the EPA has established a National...

Yazdani, B.; Culp, C.; Haberl, J.; Baltazar, J. C.; Do, S. L.

40

BOMB THREAT CALL PROCEDURES  

E-Print Network [OSTI]

THREAT CALL PROCEDURES BOMB THREAT CHECKLIST Date: Time: Time Caller Phone Number Where Hung Up: Call Received:Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act threat is received by phone: 1. Remain calm. Keep the caller on the line for as long as possible. DO

Guo, Ting

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Research Article Signaling Threat  

E-Print Network [OSTI]

Research Article Signaling Threat How Situational Cues Affect Women in Math, Science and organization,canmake potentialtargetsvulnerabletosocial identity threat.Objective and subjective measuresofidentity threat were collected from male and female math, science, and engineering (MSE) majors who watched

Gross, James J.

42

Threats and Countermeasures  

Science Journals Connector (OSTI)

......research-article Information Security Threats and Countermeasures Gareth Niblett Gareth...Specialist Group, takes a look at upcoming threats and countermeasures. Follow @bcsbooks...for the user's email account. This threat is not going to recede, so everyone should......

Gareth Niblett

2012-01-01T23:59:59.000Z

43

Vacuoles: a hollow threat?  

E-Print Network [OSTI]

2 EDITORIALS Vacuoles: a hollow threat? Tony L. Yaksh, PhDthat Vacuoles: a hollow threat? provided by procaine anda lesprit : Vacuoles: a hollow threat? Ces vacuoles acides

Yaksh, Tony L.

2010-01-01T23:59:59.000Z

44

Insider Threat Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish responsibilities and requirements for the Department of Energy (DOE) Insider Threat Program (ITP) to deter, detect, and mitigate insider threat actions by Federal and contractor employees in accordance with the requirements of Executive Order 13587, the National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs and other government-wide and DOE requirements. Does not cancel other directives.

2014-06-02T23:59:59.000Z

45

Working to keep us safe: Sara Brambilla, Postdoc creates threat...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

to keep us safe: Sara Brambilla, Postdoc creates threat reduction tools Chemical engineer postdoc experiences a foreign culture while working on resources that respond to...

46

Military Expenditure, Threats, and Growth  

E-Print Network [OSTI]

a country's external military threat; lgdp is the log ofMilitary Expenditure, Threats, and Growth * September 2003expenditure, external threats, corruption, and other

Aizenman, Joshua; Glick, Reuven

2003-01-01T23:59:59.000Z

47

BOMB THREAT CALL PROCEDURES  

E-Print Network [OSTI]

BOMB THREAT CALL PROCEDURES WHO TO CONTACT (select one) · Follow your local guidelines · Federal Protective Service (FPS) Police 1-877-4-FPS-411 (1-877-437-7411) · 911 Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act quickly, but remain calm and obtain

Boyce, Richard L.

48

Threats and Countermeasures  

Science Journals Connector (OSTI)

......research-article Information Security Threats and Countermeasures Gareth Niblett *Risk...into the future* to see what emerging threats we might have to contend with. doi...into the future* to see what emerging threats we might have to contend with. *Risk......

Gareth Niblett

2012-01-01T23:59:59.000Z

49

Five of the Threats  

Science Journals Connector (OSTI)

......research-article Information Security Five of the Threats Graeme Nash Today, social networking...Here are the top five social networking threats to which organisations may be exposed...probably infected themselves). Whilst the threat from this particular malware has now FIVE......

Graeme Nash

2013-01-01T23:59:59.000Z

50

Combating Future Threats  

Science Journals Connector (OSTI)

......research-article Future Combating Future Threats Andy Clark On 21 September BCS, The Chartered...leadership debate about future security threats. Andy Clark, Head of Forensics at Detica...and where are they? These are different threats. Smartphones are powerful, connected......

Andy Clark

2011-01-01T23:59:59.000Z

51

How ORISE is Making a Difference: Preparing for the Threat of...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Amber Waves ORISE coordinates tabletop exercise to help agencies prepare for the threat of dirty bombs Radiological dispersion devices (RDDs), also known as dirty bombs, are...

52

The Environmental Protection Agency (EPA) has inventoried over 30000 major hazardous waste sites in the US of which about 80 percent present some threat to groundwater supplies. The remediation of each of these  

E-Print Network [OSTI]

in the US of which about 80 percent present some threat to groundwater supplies. The remediation of each new and innovative strategies are developed. Much of the problem and initial cost of subsurface remediation concerns site characterization. A three-dimensional picture of the heterogeneous subsurface

Rubin, Yoram

53

BOMB THREATS What should I know about bomb threats?  

E-Print Network [OSTI]

BOMB THREATS What should I know about bomb threats? Goals of a Bomb Threat: Motivation and goals for making a bomb threat usually comes from one of two goals: The Hoax Caller: The most frequent goal to warn of the threat to minimize personal injuries or property damage. The caller may be the person

Fernandez, Eduardo

54

WHAT DO THREAT LEVELS AND RESPONSE LEVELS MEAN? THREAT LEVELS  

E-Print Network [OSTI]

WHAT DO THREAT LEVELS AND RESPONSE LEVELS MEAN? THREAT LEVELS: The UK Threat Level is decided by the Government's Joint Terrorism Analysis Centre (JTAC). It is the system to assess the threat to the UK from Threat Levels: Low - an attack is unlikely Moderate - an attack is possible, but not likely Substantial

Edinburgh, University of

55

Bomb threat There are two types of Bomb Threats  

E-Print Network [OSTI]

v Bomb threat There are two types of Bomb Threats: 1. Specific Information/location will be given about the device, or a suspicious item and/or location. Specific Threat - On a landline Dial 6111, state you have received a "SPecific BOmB threat". If possible recall exact wording of threat. 2. Non

Hickman, Mark

56

BOMB THREATS What should I know about bomb threats?  

E-Print Network [OSTI]

BOMB THREATS What should I know about bomb threats? Goals of a Bomb Threat: Motivation and goals for making a bomb threat usually comes from one of two goals: The Hoax Caller: The most frequent goal of the threat to minimize personal injuries or property damage. The caller may be the person placing the bomb

Fernandez, Eduardo

57

BOMB THREATS What should I know about bomb threats?  

E-Print Network [OSTI]

BOMB THREATS What should I know about bomb threats? Goals of a Bomb Threat · The Hoax Caller and goals for making a bomb threat usually comes from one of two goals: · The Credible Caller: The caller or she wants to warn of the threat to minimize personal injuries or property damage. The caller may

Fernandez, Eduardo

58

Categorizing Threat Building and Using a Generic Threat Matrix | Department  

Broader source: Energy.gov (indexed) [DOE]

Categorizing Threat Building and Using a Generic Threat Matrix Categorizing Threat Building and Using a Generic Threat Matrix Categorizing Threat Building and Using a Generic Threat Matrix The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general

59

COUNTERING MICROBIAL THREATS  

Science Journals Connector (OSTI)

COUNTERING MICROBIAL THREATS ... The highly contagious disease dubbed severe acute respiratory syndrome, first seen in Asia but now diagnosed in several other countries, underscores the report's key point: More must be done to improve the public health and medical communities' ability to prevent, detect, and control emerging and resurging health threats posed by wily microbes. ... Because we all live on the same global microbial real estate, "one nation's problem soon can become every nation's problem," warns Margaret A. Hamburg, cochair of the panel that produced the report, "Microbial Threats to Health: Emergence, Detection & Response." ...

LOIS EMBER

2003-03-24T23:59:59.000Z

60

Cyber Threat Trees for Large System Threat Cataloging and Analysis*  

E-Print Network [OSTI]

Cyber Threat Trees for Large System Threat Cataloging and Analysis* P. Ongsakorn, K. Turney, M, kturney, mitch, nair, szygenda, manikas}@lyle.smu.edu Abstract--The implementation of cyber threat. Because large systems have many possible threats that may be interdependent, it is crucial

Thornton, Mitchell

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Threat Insight Quarterly Wireless Technology  

E-Print Network [OSTI]

X-Force ® Threat Insight Quarterly Wireless Technology April 2006 #12;X - F O R C E T H R E A T I N the Wireless Threat ..................................................3 Wireless Threats-Force Catastrophic Risk Index...................................... 13 Future X-Force Threat Insight Quarterly Topics

62

BIODIVERSITY Geographical linkages between threats  

E-Print Network [OSTI]

BIODIVERSITY RESEARCH Geographical linkages between threats and imperilment in freshwater fish and species declines can be the result of different threats or combinations of threats, such as habitat, deter- mining whether the effects of any specific threat is related to the level of imperilment

Kark, Salit

63

BomB ThreaT Assume threat is real  

E-Print Network [OSTI]

Call 911 BomB ThreaT · Assume threat is real · Evacuate area explosion/ Fire · Activate fire alarm or office, do not let the person in · Do not block person's access to an exit · Move away from the threat

Alpay, S. Pamir

64

Threat Analysis Framework | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Threat Analysis Framework The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be...

65

Threat Insight Quarterly Vulnerability Management  

E-Print Network [OSTI]

X-Force ® Threat Insight Quarterly Vulnerability Management July 2006 #12;X - F O R C E T H R E.................. 7 X-Force Catastrophic Risk Index.............................. 10 Future X-Force Threat Insight Introduction There is a wide range of threats that can exist in any network. The presence of unpatched

66

Threat Insight Quarterly Regulatory Compliance  

E-Print Network [OSTI]

X-Force ® Threat Insight Quarterly Regulatory Compliance www.iss.netwww.iss.net October 2006 #12 Risk Index ..............................................11 Future X-Force Threat Insight Quarterly Internet Security Systems X-Force® Threat Insight Quarterly > October 2006 ©2006 Internet Security Systems

67

Threat Insight Quarterly Browser Exploitation  

E-Print Network [OSTI]

X-Force ® Threat Insight Quarterly Browser Exploitation www.iss.netwww.iss.net January 2007 #12 . . . . . . . . . . . . . . . . . . . . . . . . 11 Previous X-Force Threat Insight Quarterly Topics . . . . . . . . . . 15 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Contents IBM Internet Security Systems X-Force® Threat Insight Quarterly > January 2007

68

GTRI: Reducing Nuclear Threats | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Reducing Nuclear Threats | National Nuclear Security Administration Reducing Nuclear Threats | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > GTRI: Reducing Nuclear Threats Fact Sheet GTRI: Reducing Nuclear Threats Apr 12, 2013 Mission In 2004, NNSA established the Global Threat Reduction Initiative (GTRI) in the Office of Defense Nuclear Nonproliferation to, as quickly as possible,

69

Major Insect Threats; Cotton Insects, Grasshoppers, Corn Borer, And Army Worm Still Maior Threats  

Science Journals Connector (OSTI)

Major Insect Threats; Cotton Insects, Grasshoppers, Corn Borer, And Army Worm Still Maior Threats ...

. U S D A

1954-01-01T23:59:59.000Z

70

Threat Characterization: Trajectory Dynamics  

E-Print Network [OSTI]

Given a primary interest in "mitigation of the potential hazard" of near-Earth objects impacting the Earth, the subject of characterization takes on an aspect not normally present when considering asteroids as abstract bodies. Many deflection concepts are interested in the classic geophysical characteristics of asteroids when considering the physical challenge of modifying their orbits in order to cause them to subsequently miss an impact with Earth. Yet for all deflection concepts there are characteristics of the threat which overwhelm these traditional factors. For example, a close gravitational encounter with Earth some years or decades prior to impact can reduce the velocity change necessary for deflection by several orders of magnitude if the deflection precedes the close encounter (or encounters). Conversely this "benefit" comes at a "price"; a corresponding increase in the accuracy of tracking required to determine the probability of impact. Societal issues, both national and international, also characterize the NEO deflection process and these may strongly contend with the purely technical issues normally considered. Therefore critical factors not normally considered must be brought into play as one characterizes the threat of NEO impacts.

Russell Schweickart; Clark Chapman; Dan Durda; Bill Bottke; David Nesvorny; Piet Hut

2006-08-15T23:59:59.000Z

71

Categorizing threat : building and using a generic threat matrix.  

SciTech Connect (OSTI)

The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

2007-09-01T23:59:59.000Z

72

Water Use Reduction | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Reduction Water Use Reduction Water Use Reduction The Federal Energy Management Program (FEMP) provides agencies with guidance and direction on how to reduce water use and increase...

73

Risk Management for Trrorist Threats  

Science Journals Connector (OSTI)

Risk management for Homeland and National Security involves the calculus of funding preventative systems andd procedures based upon potential threat likelihood and consequences. ...

Zimet, Elihu

74

Bio-threat microparticle simulants  

SciTech Connect (OSTI)

A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

Farquar, George Roy; Leif, Roald

2014-09-16T23:59:59.000Z

75

Reducing the Wildland Fire Threat to Homes: Where and How Much?1  

E-Print Network [OSTI]

Reducing the Wildland Fire Threat to Homes: Where and How Much?1 Jack D. Cohen2 Abstract Understanding how ignitions occur is critical for effectively mitigating home fire losses during wildland fires, and local agencies that have responsibilities involving homes within and adjacent to wildlands. Agencies

Standiford, Richard B.

76

[Agency Name  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

They receive content guidelines and training on using Plain Language and following web best practices for making content accessible. In addition, agency- wide training...

77

IBM Software Data Sheet IBM adaptive threat  

E-Print Network [OSTI]

IBM Software Data Sheet IBM adaptive threat protection Stay ahead of security threats with a state-of-the-art network protection engine Highlights Identify high-risk threats and zero-day attacks with protocol-based, behavioral anomaly detection Protect end users against the latest web-based threats, such as SQL injection

78

Promises and Threats with Conditionals and Disjunctions  

E-Print Network [OSTI]

Promises and Threats with Conditionals and Disjunctions Robert van Rooij and Michael Franke Version promises and threats. But with a disjunction "You do . . . , or I'll do . . . " we can only make threats is trying to influence the behavior of the hearer by conditional promises and threats: whereas

van Rooij, Robert

79

Identifying Chemicals That Are Planetary Boundary Threats  

Science Journals Connector (OSTI)

Identifying Chemicals That Are Planetary Boundary Threats ... Our point of departure to develop profiles for chemicals that are potential planetary boundary threats is to identify scenarios in which a chemical could fulfill each of the three conditions for being a planetary boundary threat. ... Note that chemicals named as examples do not necessarily represent planetary boundary threats since at least one scenario from each of the three conditions must be fulfilled for a chemical to pose a planetary boundary threat. ...

Matthew MacLeod; Magnus Breitholtz; Ian T. Cousins; Cynthia A. de Wit; Linn M. Persson; Christina Rudn; Michael S. McLachlan

2014-09-02T23:59:59.000Z

80

Chinese Workers: Under Threat or a Threat to American Workers?  

E-Print Network [OSTI]

. At the same time, some employers have found ways to avoid following the spirit, if not the letter of the laws. The consequences for American workers are unclear, since their challenges are less about a direct threat from Chinese workers and more about...

Harper Ho, Virginia E.; Zhang, Lu

2010-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Water Use Reduction and Efficiency | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Water Use Reduction and Efficiency Water Use Reduction and Efficiency Water Use Reduction and Efficiency The Federal Energy Management Program (FEMP) provides agencies with...

82

Electronic publishing: strengths, weaknesses and threats  

Science Journals Connector (OSTI)

...April 1998 news News Electronic publishing: strengths, weaknesses and threats Derek McNally Treasurer of the RAS 2.7 April 1998 Vol 39 NEWS Both Monthly...Treasurer of the RAS. Electronic publishing: strengths, weaknesses and threats...

Derek McNally

1998-04-01T23:59:59.000Z

83

Nuclear Radiological Threat Task Force Established | National...  

National Nuclear Security Administration (NNSA)

Radiological Threat Task Force Established | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

84

Physical Degradation of Soils, Risks and Threats  

Science Journals Connector (OSTI)

Physical soil degradation...is one of the eight main risks and threats defined by the European Thematic Strategy for...

Winfried E. H. Blum

2014-08-01T23:59:59.000Z

85

nuclear threat science | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

threat science | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing...

86

Responding to WMD Terrorism Threats: The Role of Insurance Markets  

E-Print Network [OSTI]

the Biological Weapons and Bioterrorism Threat SSI http://Responding to WMD Terrorism Threats: The Role of InsuranceNeed for Comprehensive Threat and Risk Assessments of

Jaffee, Dwight M.; Russell, Thomas

2007-01-01T23:59:59.000Z

87

A Risk Management Approach to the 'Insider Threat'  

E-Print Network [OSTI]

Stochastic, and Insider Threat. Management Science, 48(6):modelling for insider threat mitigation. Paci?c Northwestbased model for analyzing threats that include those usually

2010-01-01T23:59:59.000Z

88

BOMB THREAT CHECKLIST QUESTIONS TO ASK  

E-Print Network [OSTI]

BOMB THREAT CHECKLIST QUESTIONS TO ASK: 1. When is the bomb going to explode? 2. Where is it right ___Clearing Throat ___Laughter ___Deep Breathing __Crying ___Cracking voice __Normal ___Disguised THREAT __Foul ___Taped __Message read by threat maker __Irrational If voice is familiar, who did it sound like

Cui, Yan

89

REVIEW/SYNTHSE Threat display in birds  

E-Print Network [OSTI]

REVIEW/SYNTH?SE Threat display in birds Peter L. Hurd and Magnus Enquist Abstract: The study of threat displays has long been an area in which theory and empirical work have each spurred the other. A great deal that classical ethologists have accurately described about threat displays still lacks

Hurd, Peter L.

90

Unauthorized Collaboration on Facebook: Threats and Responses  

E-Print Network [OSTI]

Unauthorized Collaboration on Facebook: Threats and Responses Recent events at FSU have uncovered a threat to academic integrity that might be flying under the radar of most instructors. This resource can help you understand and respond to this threat, while providing positive forums for student interaction

McQuade, D. Tyler

91

Survey on Security Threats and Protection Mechanisms  

E-Print Network [OSTI]

Survey on Security Threats and Protection Mechanisms in Embedded Automotive Networks Ivan Studnia1 and can be seen as entry points for cyber attacks. In this paper, we present a survey on security threats in the embedded networks of current vehicles, we then analyze the potential threats targeting these networks

Paris-Sud XI, Université de

92

Developmental Changes in Responsivity to Threat are  

E-Print Network [OSTI]

Developmental Changes in Responsivity to Threat are Stimulus-Specific in Rats Christoph P 2000 ABSTRACT: During early ontogeny, stimuli that pose a threat to an animal change. Unrelated adult a threat only during a limited period of development, when the animal's particular developmental stage

Barr, Gordon A.

93

Neural Mechanisms Underlying Selective Attention to Threat  

E-Print Network [OSTI]

Neural Mechanisms Underlying Selective Attention to Threat SONIA J. BISHOP Behavioural and Clinical. This provides a framework for inves- tigating the neural mechanisms underlying selective attention to threat. Both subcortical regions implicated in threat detection--specifically the amygdala--and prefrontal

Bishop, Sonia

94

Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults' memory errors  

E-Print Network [OSTI]

Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults, 90089-0191. Phone: 213-740-6772. Email: barbersa@usc.edu #12;STEREOTYPE THREAT REDUCES MEMORY ERRORS 2 Abstract (144 words) Stereotype threat often incurs the cost of reducing the amount of information

Mather, Mara

95

Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act  

E-Print Network [OSTI]

Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act quickly, but remain calm and obtain information with the checklist on this card. BOMB THREAT CALL PROCEDURE If a bomb threat is received by phone: Remain calm. Keep the caller on the line for as long

Slatton, Clint

96

Recognizing Threat: A Simple Geometric Shape Activates Neural Circuitry for Threat Detection  

E-Print Network [OSTI]

Recognizing Threat: A Simple Geometric Shape Activates Neural Circuitry for Threat Detection the perception of threat. We here re- port that the neural circuitry known to be mobilized by many realistic instantiating detection of threat and negative affect, suggesting that recognition of potential danger may

Sarinopoulos, Issidoros

97

Ionosphere Spatial Gradient Threat for LAAS: Mitigation and Tolerable Threat Space  

E-Print Network [OSTI]

1 Ionosphere Spatial Gradient Threat for LAAS: Mitigation and Tolerable Threat Space Ming Luo, Sam and a threat space was extrapolated based on the 6 April 2000 ionospheric storm. It was showed that the impact of the ionospheric anomalies depends on the threat parameters, namely, the ionospheric gradient, the slope width

Stanford University

98

Stereotype threat in sports 1 Running head: STEREOTYPE THREAT AND ACHIEVEMENT GOALS IN SPORTS  

E-Print Network [OSTI]

Stereotype threat in sports 1 Running head: STEREOTYPE THREAT AND ACHIEVEMENT GOALS IN SPORTS Do Achievement Goals Mediate Stereotype Threat? An Investigation on Females' Soccer Performance Aïna Chalabaev Psycholoy 30 (2008) 143-158" #12;Stereotype threat in sports 2 Abstract This research investigated

Paris-Sud XI, Université de

99

What You Need to Know about the Threat to Forests in Colorado  

E-Print Network [OSTI]

locations throughout the western U.S., including Colorado. Detecting GM GM traps in a tree9 (leftGypsy Moth What You Need to Know about the Threat to Forests in Colorado Controlling GM Quarantines to become established in Colorado a response plan would be executed by state and federal agencies

100

[Agency Name]  

Broader source: Energy.gov (indexed) [DOE]

Plain Writing Compliance Report | page 1 Plain Writing Compliance Report | page 1 I. SENIOR AGENCY OFFICIAL FOR PLAIN WRITING Senior Official for Plain Writing: Ingrid Kolb Director, Office of Management Plain Writing Implementation Contact: Michael Coogan Office of the Executive Secretariat II. TO DATE, DEPARTMENT OF ENERGY (DOE) COMMUNICATIONS RELEASED IN PLAIN LANGUAGE * DOE website overhaul includes a focus on Plain Writing, geared toward the public and DOE employees. * DOE Powerpedia Page (DOE's internal Wikipedia site) shares information - in plain language - with employees and contractors. * All correspondence for Congress, stakeholders, and others that is reviewed by the Office of Executive Secretariat is reviewed for Plain Language. III. INFORM AGENCY STAFF OF PLAIN WRITING ACT'S REQUIREMENTS

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

[Agency Name]  

Broader source: Energy.gov (indexed) [DOE]

2 2 1. Introduction The Department of Energy sees the implementation of the Plain Writing Act as an important initiative that helps the Department share relevant information in a way that is clear, concise, and informative. The areas referenced in this report are only a few of the successes we have encountered as we continue to implement the Act. 1. Departmental Plain Writing Officials 2. Ingrid Kolb, Director of the Office of Management, Senior Agency Official Responsible for Plain Writing 3. Michael Coogan, Office of the Executive Secretariat, Plain Language Point-of-Contact 1. Examples of Agency Website Communications Available in a Format Consistent with the Plain Language Guidelines 2. Department of Energy. This redesigned website went live on August 4, 2011. The new energy.gov represents a commitment to principles

102

[Agency Name]  

Broader source: Energy.gov (indexed) [DOE]

3 3 1. Introduction The Department of Energy sees the implementation of the Plain Writing Act as an important initiative that helps the Department share relevant information in a way that is clear, concise, and informative. The areas referenced in this report summarize some of our successes - particularly in providing Plain Language Training to employees and contractors (Part VI) - as we continue to implement the Act. 1. Departmental Plain Writing Officials 2. Ingrid Kolb, Director of the Office of Management, Senior Agency Official Responsible for Plain Writing 3. Michael Coogan, Office of the Executive Secretariat, Plain Language Point-of-Contact 1. Examples of Agency Website Communications Available in a Format Consistent with the Plain Language Guidelines

103

Agency-Wide Screening | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Agency-Wide Screening Agency-Wide Screening Agency-Wide Screening October 16, 2013 - 4:36pm Addthis Federal agencies face energy-related requirements on new construction projects and major renovations. These Federal requirements range from reductions in fossil-fuel use to specifying the use of certain renewable energy technologies. As some agencies have already found out, not all sites or construction projects are created equal. Because many of the requirements are agency-wide, an effective and efficient way to meet these requirements is to consider and identify appropriate locations for these technologies across all agency land and building assets. FEMP can help Federal agencies conduct a renewable energy screening at all of its sites, or just at all of its upcoming construction project

104

Threats and human influence on coastal ecosystem of Southern India  

Science Journals Connector (OSTI)

Populations of the majority of fish species showed drastic reduction over the past five decades in west coast of India. We conducted an intensive study of Aghanashini estuary for water quality and fish diversity in west coast of India. Coastal ecosystems are impacted by many stressors and are continually subjected to threats from multiple stresses imposed mostly by human activities predominantly as a result of increased population growth in India. The most significant categories of threats derive from water pollution from numerous sources including thermal effluents, heavy metals, oil, sewage, pesticides, pulp mills, habitat loss and degradation, overexploitation, eutrophication and misguided human perceptions. Wide array of prohibited fishing methods are rampant by using of insecticides as poisons, destruction and modification of habitats, dynamiting, using chemical and herbal poisons. Due to deteriorated water, quality from anthropogenic activities fish diversity has drastically reduced. In complex coastal ecosystems, strategies for restoration can become equally complicated.

D. Sannadurgappa

2010-01-01T23:59:59.000Z

105

Sensor-guided threat countermeasure system  

DOE Patents [OSTI]

A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

2012-12-25T23:59:59.000Z

106

Countering the Nuclear Terrorist Threat  

SciTech Connect (OSTI)

The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant psychological consequences. The greatest impact of a small release would probably be economic, associated with cleanup and restoration of the contaminated area. Another category of threat is the attack on a facility, either a power reactor or sabotage of a large radiation source. In general these facilities are hard targets (structurally), and damage and contamination are localized. The final category of threat is the use of radioactive materials to deliver a radiation dose to individuals. This type of attack is again localized and does not readily fall into the category of a weapon of mass destruction.

Vantine, H C

2002-10-04T23:59:59.000Z

107

Autonomous Realtime Threat-Hunting Robot (ARTHR  

SciTech Connect (OSTI)

Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

INL

2008-05-29T23:59:59.000Z

108

Autonomous Realtime Threat-Hunting Robot (ARTHR  

ScienceCinema (OSTI)

Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

INL

2009-09-01T23:59:59.000Z

109

design basis threat | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

design basis threat | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the...

110

CHEMICAL TERRORISM: THREATS TO WATER SUPPLIES  

Science Journals Connector (OSTI)

Although for practical reasons, terrorist attacks on water systems are considered less likely than on other targets, threats to drinking water cannot be ignored. A...

ALFRED BERNARD; CLAIRE DE BURBURE

2006-01-01T23:59:59.000Z

111

Addressing the cybersecurity Malicious Insider threat.  

E-Print Network [OSTI]

?? Malicious Insider threats consist of employees, contractors, or business partners who either have current authorized access, or have had authorized access to an organization's (more)

Schluderberg, Larry E.

2015-01-01T23:59:59.000Z

112

Botnets: To what extent are they a threat to information security?  

Science Journals Connector (OSTI)

Russian advertisement offering botnet services The purpose of this article is to examine to what extent botnets pose a threat to information security. In Chapter 1 the terms in the title are defined, and a comprehensive overview of botnets is provided in order to equip the reader with an understanding of the context for the remaining chapters. The motives for using botnets and the methods in which they are used are outlined. The methods of botnet attack are then analysed in terms of their potential impact on information security and a conclusion is drawn that botnets are indeed a threat to information security in general terms. Chapter 2 then goes on to examine the extent of the threat from the three different perspectives of governments, corporate and the general public. The threats from each perspective and their impacts are identified, and each threat type for each perspective is then categorised in terms of probability and potential impact. The extent of the threat of each botnet-related attack from each perspective is then assessed using a model recommended by ISO/IEC 27005:2008, and the conclusion is drawn that the extent of the threat that botnets pose to governments, corporates and the general public is High. In Chapter 3, we look at how law enforcement agencies investigate botnets and the criminals behind them, and establish the challenges they face in doing so. It is clear that law enforcement face an uphill struggle due to technical tricks employed by the botherders to remain untraceable, lack of resources with the necessary skillset, the legal complexity of working with multiple jurisdictions, and procedural delays working with foreign law enforcement agencies. The conclusion is drawn that botnets are here to stay and that for the time being the botherders will have the upper hand.

Claire Elliott

2010-01-01T23:59:59.000Z

113

The Nature of the Bioterrorism Threat  

SciTech Connect (OSTI)

This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

Regens, J. L.

2003-02-25T23:59:59.000Z

114

Design Basis Threat | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Design Basis Threat | National Nuclear Security Administration Design Basis Threat | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Design Basis Threat Home > About Us > Our Programs > Nuclear Security > Design Basis Threat Design Basis Threat NNSA has taken aggressive action to improve the security of its nuclear weapons material (often referred to as special nuclear material, or SNM)

115

December 2014 National Idling Reduction Network News  

Broader source: Energy.gov [DOE]

The National Idling Reduction Network brings together trucking and transit companies; railroads; ports; equipment manufacturers; Federal, state, and local government agencies (including regulators)...

116

ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling for Mobile Ad Hoc and  

E-Print Network [OSTI]

ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling. Chivers, Olwen Worthington and Pankaj Rohatgi Abstract-- This paper introduces a threat model for ad hoc and mobile ad hoc networks (MANETS). It identifies threat categories, modes of use, and a variety of threats

Sen, Sevil

117

The Law of Duress and the Economics of Credible Threats  

E-Print Network [OSTI]

seller has a credible threat, it is in the buyers interestand the more credible is the threat to breach it. C.existence of a credible threat, may be difficult to verify.

Bar-Gill, Oren; Ben-Shahar, Omri

2003-01-01T23:59:59.000Z

118

An Intelligent Threat Prevention Framework with Heterogeneous Information  

E-Print Network [OSTI]

An Intelligent Threat Prevention Framework with Heterogeneous Information Wenjun Ma 1 and Weiru Liu 1 Abstract. Three issues usually are associated with threat prevention intelligent surveillance, the de- mand of effectively predicting suspects' intention and ranking the potential threats posed

Liu, Weiru

119

Now or Later?--Endogenous Timing of Threats  

Science Journals Connector (OSTI)

Whereas early threats are chosen before bargaining, late threats are determined after bargaining ended in conflict. Instead of exogenously imposing the timing of threats, these are derived endogenously as in indi...

Siegfried K. Berninghaus; Werner Guth

2003-11-01T23:59:59.000Z

120

PROHIBITED USE OF ELECTRONIC RESOURCES FOR THREATS, HARASSMENT, AND PORNOGRAPHY  

E-Print Network [OSTI]

Page 1 PROHIBITED USE OF ELECTRONIC RESOURCES FOR THREATS, HARASSMENT, AND PORNOGRAPHY Policy, and prohibits the use of University Electronic Resources for threats, harassment, and pornography. Reason threats, engaging in harassing behavior, and viewing, downloading, or communicating pornography. Table

Shahriar, Selim

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Insider threat to secure facilities: data analysis  

SciTech Connect (OSTI)

Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs.

Not Available

1980-05-09T23:59:59.000Z

122

Death Threats and Violence at Schools and Colleges  

Science Journals Connector (OSTI)

This chapter examines the nature of death threats and other violence against schools and universities. Death threats and violence against schools and universities reflect...

Stephen J. Morewitz

2008-01-01T23:59:59.000Z

123

Comprehensive Vulnerability and Threat Analysis | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Vulnerability and Threat Analysis Our world is characterized by ever-changing threats to critical facilities, national assets and international interests. Understanding...

124

Seeking out silent threats to simulation integrity | EMSL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Seeking out silent threats to simulation integrity Seeking out silent threats to simulation integrity Controlling the impact of soft errors on optimization algorithm results NULL A...

125

Before the House Subcommittee on Emerging Threats, Cyber Security...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and...

126

SciTech Connect: Sequential Threat Detection for Harbor Defense...  

Office of Scientific and Technical Information (OSTI)

Sequential Threat Detection for Harbor Defense: An X-ray Physics-Based Bayesian Approach Citation Details In-Document Search Title: Sequential Threat Detection for Harbor Defense:...

127

Microsoft Word - Threat Analysis Framework Sept07_comments-final.doc  

Broader source: Energy.gov (indexed) [DOE]

5792 5792 Unlimited Release September 2007 Threat Analysis Framework David P. Duggan and John T. Michalski Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy's National Nuclear Security Administration under Contract DE-AC04-94AL85000. Approved for public release; further dissemination unlimited. Threat Analysis Framework 2 Issued by Sandia National Laboratories, operated for the United States Department of Energy by Sandia Corporation. NOTICE: This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government, nor any agency

128

Autonomous Realtime Threat-Hunting Robot (ARTHR)  

ScienceCinema (OSTI)

Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

Idaho National Laboratory - David Bruemmer, Curtis Nielsen

2010-01-08T23:59:59.000Z

129

Autonomous Realtime Threat-Hunting Robot (ARTHR)  

SciTech Connect (OSTI)

Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

Idaho National Laboratory - David Bruemmer, Curtis Nielsen

2008-05-29T23:59:59.000Z

130

Source prestige and target reactions to threats  

Science Journals Connector (OSTI)

A 3 by 2 design was employed to study the effects of source capability and of punishment magnitude on the compliance of target individuals to contingent threats intermittently sent by a simulated source in...

Thomas V. Bonoma; Barry R. Schlenker; R. Bob Smith

1970-08-01T23:59:59.000Z

131

Non-Military Threats to the Alliance  

Science Journals Connector (OSTI)

I have been given the opportunity to say a few words on what could become a dialogue between the EU and the U.S. concerning the rather difficult questions of non-military threats, also called global or transnatio...

Eric Danon

2000-01-01T23:59:59.000Z

132

The Fragmented Securitization of Cyber Threats  

Science Journals Connector (OSTI)

Cybersecurity is one of the most pressing national security issues nowadays. Cyber threats reached truly global scales, cyber attacks that potentially or actually cause physical damage are on the rise, and sec...

Agnes Kasper

2014-01-01T23:59:59.000Z

133

CDC 24/7: Saving Lives. Protecting People from Health Threats. Saving Money through Prevention. Environmental Health  

E-Print Network [OSTI]

in Fukushima, Japan underscored the need to maintain CDC's expertise in radiation. · · · Pl CDC's RadiationCS238593 Radiation CDC 24/7: Saving Lives. Protecting People from Health Threats. Saving Money of every dollar entrusted to the agency. Radiation exists all around us. People are exposed to varying

134

CDC 24/7: Saving Lives. Protecting People from Health Threats. Saving Money through Prevention. National Center for Environmental Health  

E-Print Network [OSTI]

. But when your environment exposes you to hazardous substances or dangerous events, your health canCS239266-A CDC 24/7: Saving Lives. Protecting People from Health Threats. Saving Money through Prevention. National Center for Environmental Health Agency for Toxic Substances and Disease Registry CDC

135

Survey of Threats and Assaults by Patients on Psychiatry Residents  

Science Journals Connector (OSTI)

The authors sought to determine the prevalence of threats and assaults by patients on psychiatry residents,...

Yael Dvir M.D.; Emiko Moniwa M.D.; Holly Crisp-Han M.D.

2012-01-01T23:59:59.000Z

136

Invited Paper New Frontiers of Network Security: The Threat Within  

E-Print Network [OSTI]

Invited Paper New Frontiers of Network Security: The Threat Within Sugata Sanyal1 , Ajit Shelat2% of information security threats originate from inside the organization. The instances of insider threats have. The Insider threats are generally caused by current or ex-employees, contractors or partners, who have

Sanyal, Sugata

137

FUTURE THREATS AYCOCK & MAURUSHAT 275VIRUS BULLETIN CONFERENCE SEPTEMBER 2007  

E-Print Network [OSTI]

FUTURE THREATS AYCOCK & MAURUSHAT 275VIRUS BULLETIN CONFERENCE SEPTEMBER 2007 FUTURE THREATS John.maurushat@unsw.edu.au ABSTRACT `Aren't you just giving the virus writers ideas?' Research into future security threats begin to examine how far security research can go in terms of looking at future threats, particularly

Aycock, John

138

An Approach to Security Policy Configuration Using Semantic Threat Graphs  

E-Print Network [OSTI]

An Approach to Security Policy Configuration Using Semantic Threat Graphs Simon N. Foley, in turn, unnecessarily expose the enterprise to known threats. This paper pro- poses a threat management- nomic configuration of security mechanisms. This knowledge is mod- eled in terms of Semantic Threat

Foley, Simon

139

Running head: STEREOTYPE THREAT IN OLDER ADULTS 1 Stereotype threat can enhance, as well as impair, older adults' memory  

E-Print Network [OSTI]

Running head: STEREOTYPE THREAT IN OLDER ADULTS 1 Stereotype threat can enhance, as well as impair, and Rico Velasco for research assistance and to Dr. Tom Hess for providing us with the stereotype threat for publication. #12;STEREOTYPE THREAT IN OLDER ADULTS 2 Abstract (150) Negative stereotypes about aging can

Mather, Mara

140

Left-Wing Extremism: The Current Threat  

SciTech Connect (OSTI)

Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

Karl A. Seger

2001-04-30T23:59:59.000Z

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Notices ELECTION ASSISTANCE COMMISSION Agency Information Collection  

Broader source: Energy.gov (indexed) [DOE]

23 Federal Register 23 Federal Register / Vol. 76, No. 180 / Friday, September 16, 2011 / Notices ELECTION ASSISTANCE COMMISSION Agency Information Collection Activities: Proposed Collection; Comment Request; Election Assistance Commission's Voting System Test Laboratory Program Manual, Version 1.0 AGENCY: U.S. Election Assistance Commission (EAC). ACTION: Notice; comment request. SUMMARY: As part of its continuing effort to reduce paperwork and respondent burden in accordance with the Paperwork Reduction Act of 1995, the U.S. Election Assistance Commission (EAC) invites the general public and other Federal agencies to take this opportunity to comment on EAC's request to renew an existing information collection, EAC's Voting System Test Laboratory Program Manual, Version

142

Hardware Trojan Attacks: Threat Analysis and  

E-Print Network [OSTI]

of malicious modifications of electronic hardware at different stages of its life cycle, pose major securityINVITED P A P E R Hardware Trojan Attacks: Threat Analysis and Countermeasures This paper or the information being processed. The underlying hardware used for information processing has been considered

Bhunia, Swarup

143

Bomb threats hit Texas petrochemical plants  

Science Journals Connector (OSTI)

A recent rash of bomb threats has plagued petrochemical plants and refineries in the Houston area.No real bombs have been found. But plant managers are concerned that if law enforcement officials do not soon find those involved and discourage others, ...

ANN THAYER

1996-04-29T23:59:59.000Z

144

Federal Agency NEPA Procedures  

Broader source: Energy.gov [DOE]

Each Federal agency is required to develop NEPA procedures that supplement the CEQ Regulations. Developed in consultation with CEQ, Federal agency NEPA procedures must meet the standards in the CEQ...

145

Accommodation Letting agencies  

E-Print Network [OSTI]

's responsibility to understand each accommodation agency's terms and conditions of business. Some agencies throughout the term of the tenancy. Agencies may only charge you when they find you a suitable property you 35% of the first month's rent. Please ensure that you check on any charges before entering

Bristol, University of

146

Pollution Prevention - Environmental Impact Reduction Checklists for  

Broader source: Energy.gov (indexed) [DOE]

Pollution Prevention - Environmental Impact Reduction Checklists Pollution Prevention - Environmental Impact Reduction Checklists for NEPA/309 Reviewers Pollution Prevention - Environmental Impact Reduction Checklists for NEPA/309 Reviewers The environmental review process under the National Environmental Policy Act (NEPA) provides a valuable opportunity for Federal agency NEPA/309 reviewers to incorporate pollution prevention and environmental impact reduction into actions (or projects). This Environmental Protection Agency guidance was prepared to assist NEPA/309 reviewers in incorporating pollution prevention into each step of the environmental review process, including scoping, mitigation, monitoring, and enforcement. POLLUTION PREVENTION - ENVIRONMENTAL IMPACT REDUCTION CHECKLISTS FOR NEPA/309 REVIEWERS JANUARY 1995

147

Pollution Prevention - Environmental Impact Reduction Checklists for  

Broader source: Energy.gov (indexed) [DOE]

Pollution Prevention - Environmental Impact Reduction Checklists Pollution Prevention - Environmental Impact Reduction Checklists for NEPA/309 Reviewers Pollution Prevention - Environmental Impact Reduction Checklists for NEPA/309 Reviewers The environmental review process under the National Environmental Policy Act (NEPA) provides a valuable opportunity for Federal agency NEPA/309 reviewers to incorporate pollution prevention and environmental impact reduction into actions (or projects). This Environmental Protection Agency guidance was prepared to assist NEPA/309 reviewers in incorporating pollution prevention into each step of the environmental review process, including scoping, mitigation, monitoring, and enforcement. POLLUTION PREVENTION - ENVIRONMENTAL IMPACT REDUCTION CHECKLISTS FOR NEPA/309 REVIEWERS JANUARY 1995

148

Introduction to Administrative Programs that Mitigate the Insider Threat  

SciTech Connect (OSTI)

This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

2012-09-01T23:59:59.000Z

149

Policing Cyber Hate, Cyber Threats and Cyber Terrorism  

Science Journals Connector (OSTI)

What are cyber threats? This book brings together a diverse range of multidisciplinary ideas to explore the extent of cyber threats, cyber hate and cyber terrorism. This ground-breaking text provides a comprehensive understanding of the range of activities ...

Imran Awan; Brian Blakemore

2012-07-01T23:59:59.000Z

150

Environment-Driven Threats Elicitation for Web Applications  

Science Journals Connector (OSTI)

The popularity and complexity of web application present challenges to the security implementation for web engineering. Threat elicitation is an indispensable step for developers to identify the possible threats ...

Hui Guan; Weiru Chen; Lin Liu; Hongji Yang

2011-01-01T23:59:59.000Z

151

Classification of Threats Via a Multi-sensor Security Portal  

Science Journals Connector (OSTI)

Classification of threats has always been a major security decision ... walks through a security portal. To classify threat by combining data from multiple sensors like ... metal detectors. We wish to identify th...

Amar Singh; Lawrence Holder

2006-01-01T23:59:59.000Z

152

Environmental Metabolomics:? A SWOT Analysis (Strengths, Weaknesses, Opportunities, and Threats)  

Science Journals Connector (OSTI)

Environmental Metabolomics:? A SWOT Analysis (Strengths, Weaknesses, Opportunities, and Threats) ... An overall goal of environmental metabolomics is to understand what is metabolomically normal or adaptive and what constitutes a threat to human health and the environment. ...

Marion G. Miller

2007-01-04T23:59:59.000Z

153

Managing Threats to Web Databases and Cyber Systems  

Science Journals Connector (OSTI)

This chapter provides an overview of some of the cyber threats information systems as well as data management ... then discusses potential solutions and challenges. The threats include access control violations, ...

Bhavani Thuraisingham

2005-01-01T23:59:59.000Z

154

Securing Infrastructure from High Explosive Threats  

SciTech Connect (OSTI)

Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

2009-03-20T23:59:59.000Z

155

The same, only different: Threat management systems as homologues in the tree of life  

E-Print Network [OSTI]

T. , & ,Quirin, M. (2014). Threat and defense: From anxietyto manage uncertainty and threat associated with politicalD.M.T. (2013). Sizing up the threat: The envisioned physical

Holbrook, Colin; Fessler, Daniel M.T.

2015-01-01T23:59:59.000Z

156

Stereotype Threat in Organizations: An Examination of its Scope, Triggers, and Possible Interventions  

E-Print Network [OSTI]

and social identity threat. Advances in Experimental Socialmen triggers social identity threat among female engineers.C. (2007). Stereotype threat at work. Academy of Management

Kray, Laura J.; Shirako, Aiwa

2009-01-01T23:59:59.000Z

157

Rethinking the Threats to Scientific Balance in Contexts of Litigation and Regulation  

E-Print Network [OSTI]

Monograph Rethinking the Threats to Scienti?c Balance inc factors such as threats or dollars. Environmental Healthwatched for/resisted Threats; overt pressure to slant ?

Freudenburg, William R.

2008-01-01T23:59:59.000Z

158

Mobility changes anonymity: new passive threats in mobile ad hoc networks  

E-Print Network [OSTI]

Anonymity: New Passive Threats in Mobile Ad Hoc Networkson new anonymity threats and classify the correspondingagainst the new anonymity threats in mobile networks. The

Hong, Xiaoyan; Kong, Jiejun; Gerla, Mario

2006-01-01T23:59:59.000Z

159

Confronting Ego Threats with Reappraisal versus Rumination  

E-Print Network [OSTI]

of the requirements for the degree of MASTER OF SCIENCE Approved by: Chair of Committee, Brandon Schmeichel Committee Members, Eddie Harmon-Jones Jeffrey Ackerman Head of Department, Les Morey May 2009 Major Subject: Psychology iii ABSTRACT... Confronting Ego Threats with Reappraisal versus Rumination. (May 2009) Ryan Caskey, B.A., University of Arizona Chair of Advisory Committee: Dr. Brandon Schmeichel Two experiments compared the effects of two cognitive responses (i.e., rumination...

Caskey, Ryan

2010-01-16T23:59:59.000Z

160

Nonproliferation, Nuclear Security, and the Insider Threat  

SciTech Connect (OSTI)

Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

Balatsky, Galya I. [Los Alamos National Laboratory; Duggan, Ruth [SNL

2012-07-12T23:59:59.000Z

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Handsets Malware Threats and Facing Techniques  

E-Print Network [OSTI]

Nowadays, mobile handsets combine the functionality of mobile phones and PDAs. Unfortunately, mobile handsets development process has been driven by market demand, focusing on new features and neglecting security. So, it is imperative to study the existing challenges that facing the mobile handsets threat containment process, and the different techniques and methodologies that used to face those challenges and contain the mobile handsets malwares. This paper also presents a new approach to group the different malware containment systems according to their typologies.

Elfattah, Marwa M A; Sarhan, Ebada

2012-01-01T23:59:59.000Z

162

The multi-sensor nuclear threat detection Dorit S. Hochbaum  

E-Print Network [OSTI]

an efficient graph algorithm that solves the problem in polynomial time. Detecting nuclear threatsThe multi-sensor nuclear threat detection problem Dorit S. Hochbaum Abstract One way of reducing sources. We address here the problem of detecting nuclear threats by using multiple detectors mounted

Hochbaum, Dorit S.

163

Maritime Threat Detection Using Probabilistic Graphical Models Bryan Auslander1  

E-Print Network [OSTI]

Maritime Threat Detection Using Probabilistic Graphical Models Bryan Auslander1 , Kalyan Moy Gupta1.lastname@knexusresearch.com | david.aha@nrl.navy.mil Abstract Maritime threat detection is a challenging problem because maritime them on a threat recognition task using track data obtained from force protection naval exercises

Gupta, Kalyan Moy

164

Insider Threat Detection using Stream Mining and Graph Mining  

E-Print Network [OSTI]

Insider Threat Detection using Stream Mining and Graph Mining Pallabi Parveen, Jonathan Evans threats who attempt to conceal their activities by varying their behaviors over time. This paper applies of insider threat detection, demonstrating that the ensemble-based approach is significantly more effective

Hamlen, Kevin W.

165

Mitigating the Risk of Insider Threats When Sharing  

E-Print Network [OSTI]

Mitigating the Risk of Insider Threats When Sharing Credentials by Muntaha NourEddin Qasem Alawneh requirement. Achieving secure content sharing requires a deep analy- sis and understanding of security threats affecting such a fundamental requirement. We study and analyze one of the major threats which affect secure

Sheldon, Nathan D.

166

European Commission DG ENV Soil biodiversity: functions, threats and  

E-Print Network [OSTI]

European Commission DG ENV Soil biodiversity: functions, threats and tools for policy makers.turbe@biois.com In association with #12;2 European Commission - DG ENV Soil biodiversity: functions, threats and tools for policy Putten, Eric Labouze, and Shailendra Mudgal. Soil biodiversity: functions, threats and tools for policy

Paris-Sud XI, Université de

167

THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS  

E-Print Network [OSTI]

THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS Joshua Pauli College of Business.xu@ndsu.nodak.edu Keywords: Software architecture, Security, Threat model, Use case, Misuse case, UML Abstract: To deal with software security issues in the early stages of system development, this paper presents a threat- driven

168

Rapid evolutionary dynamics and disease threats to biodiversity  

E-Print Network [OSTI]

Rapid evolutionary dynamics and disease threats to biodiversity Sonia Altizer1 , Drew Harvell2 should enable hosts to respond better to future disease threats. Infectious diseases are recognized populations, or have been implicated as threats to already declining species [4­6]. Although infectious

169

Decentralized Semantic Threat Graphs Simon N. Foley1  

E-Print Network [OSTI]

Decentralized Semantic Threat Graphs Simon N. Foley1 William M. Fitzgerald1 Cork Constraint.foley@cs.ucc.ie wfitzgerald@4c.ucc.ie Abstract. Threat knowledge-bases such as those maintained by MITRE and NIST provide a basis with which to mitigate known threats to an enterprise. These centralised knowledge-bases assume

Foley, Simon

170

Maritime Threat Detection using Plan Recognition Bryan Auslander1  

E-Print Network [OSTI]

Maritime Threat Detection using Plan Recognition Bryan Auslander1 , Kalyan Moy Gupta1 , & David W algorithms for maritime threat detection employ a variety of normalcy models that are probabilistic and for threat detection. We compare their performance with a behavior recognition algorithm on simulated

Gupta, Kalyan Moy

171

BOMB THREAT PLACE THIS CARD UNDER YOUR TELEPHONE  

E-Print Network [OSTI]

BOMB THREAT PLACE THIS CARD UNDER YOUR TELEPHONE QUESTIONS TO ASK: 1. When is the bomb going? EXACT WORDING OF THE THREAT: Sex of caller: Race: Age: Number at which call received: Length of call: Check Caller ID - *69: Record caller's number: Time: Date: IMMEDIATELY REPORT BOMB THREATS TO

Slatton, Clint

172

FACTS about threat Possible INTERVENTIONS Strong domain identification  

E-Print Network [OSTI]

FACTS about threat Possible INTERVENTIONS Strong domain identification heightens the effect are able to self affirm in difficult situations can lessen the effects of threat. Encourage students to use to students not under threat. Educate students on self talk! Teach them to pay close attention

Chisholm, Rex L.

173

Ionosphere Threat to LAAS: Updated Model, User Impact, and Mitigations  

E-Print Network [OSTI]

1 Ionosphere Threat to LAAS: Updated Model, User Impact, and Mitigations Ming Luo, Sam Pullen-4], a "linear spatial gradient front" model was established and a threat space was extrapolated based on data from the 6 April 2000 ionospheric storm. User vertical error was estimated based on this threat model

Stanford University

174

Predictors of Threat and Error Management: Identification of Core  

E-Print Network [OSTI]

Predictors of Threat and Error Management: Identification of Core Nontechnical Skills In normal flight operations, crews are faced with a variety of external threats and commit a range of errors of these threats and errors therefore forms an essential element of enhancing performance and minimizing risk

175

Not All Threats are Created Equal: How Implicitness and Timing Affect the Effectiveness of Threats in Negotiations  

Science Journals Connector (OSTI)

The effectiveness of threats in negotiations was examined by exploring two ... implicitness, or the extent to which the threat mentions what action the perpetrator would take ... and timing, or the time when the

Marwan Sinaceur; Margaret A. Neale

2005-01-01T23:59:59.000Z

176

South Africa - Greenhouse Gas Emission Baselines and Reduction...  

Open Energy Info (EERE)

Potentials from Buildings Jump to: navigation, search Name South Africa - Greenhouse Gas Emission Baselines and Reduction Potentials from Buildings AgencyCompany Organization...

177

Guidance for Federal Agencies on E.O. 13514 Section 12, Federal...  

Office of Environmental Management (EM)

step in a recommended process for Federal agency fleet managers to select optimal petroleum reduction strategies as required under Executive Order (E.O.) 13514....

178

Office of Nuclear Threat Science | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nuclear Threat Science | National Nuclear Security Administration Nuclear Threat Science | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Office of Nuclear Threat Science Home > About Us > Our Programs > Counterterrorism and Counterproliferation > Office of Nuclear Threat Science Office of Nuclear Threat Science

179

Office of Nuclear Threat Science | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Threat Science | National Nuclear Security Administration Threat Science | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Office of Nuclear Threat Science Home > About Us > Our Programs > Counterterrorism and Counterproliferation > Office of Nuclear Threat Science Office of Nuclear Threat Science

180

National Center for Environmental Health Agency for Toxic Substances and Disease Registry  

E-Print Network [OSTI]

National Center for Environmental Health Agency for Toxic Substances and Disease Registry CS229334 from Health Threats. Saving Money Through Prevention. Environmental Health Your environment and healthy, you are more likely to stay healthy. But when your environment exposes you to dangerous events

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

An Overview of Non-traditional Nuclear Threats  

SciTech Connect (OSTI)

In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or ''dirty'' bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials entering our borders is considered. The radiation and other signatures or potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.

Geelhood, Bruce D.; Wogman, Ned A.

2005-01-01T23:59:59.000Z

182

An Overview of Non-Traditional Nuclear Threats  

SciTech Connect (OSTI)

In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear war-heads to include radiation dispersal devices (RDD) or dirty bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials enter-ing our borders is considered. The radiation and other signatures of potential nuclear and radio-logical threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.

Geelhood, Bruce D.; Wogman, Ned A.

2005-01-01T23:59:59.000Z

183

Chlorine Gas: An Evolving Hazardous Material Threat and Unconventional Weapon  

E-Print Network [OSTI]

biological, and chemical weapons of warfare and terrorism.Threat and Unconventional Weapon Robert Jones, MD Brandonand as a terrorist weapon. This review will summarize recent

Jones, Robert; Wills, Brandon; Kang, Christopher

2010-01-01T23:59:59.000Z

184

COLLOQUIUM: Nuclear Famine: The Threat to Humanity from Nuclear...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

MBG Auditorium COLLOQUIUM: Nuclear Famine: The Threat to Humanity from Nuclear Weapons Dr. Alan Robock Rutgers University A nuclear war between India and Pakistan, with...

185

Mitigating the Insider Threat Using Behavioral Science Workshop  

SciTech Connect (OSTI)

PowerPoint presentations are included on: the Insider Threat; Detecting the Malicious Insider through Behavioral Science; and Psychological Barriers to Effective Nuclear Security.

Landers, John; De Castro, Kara

2012-11-26T23:59:59.000Z

186

ORISE: Securing the Golden State from threats foreign and domestic  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Securing the Golden State from threats foreign and domestic ORISE helps California emergency planners with innovative training on state and local levels To protect the state of...

187

Notices ENVIRONMENTAL PROTECTION AGENCY  

Broader source: Energy.gov (indexed) [DOE]

25 Federal Register 25 Federal Register / Vol. 76, No. 209 / Friday, October 28, 2011 / Notices ENVIRONMENTAL PROTECTION AGENCY [FRL-9484-2] Children's Health Protection Advisory Committee (CHPAC); Notice of Charter Renewal AGENCY: Environmental Protection Agency (EPA). ACTION: Notice of Charter Renewal. Notice is hereby given that the Environmental Protection Agency (EPA) has determined that, in accordance with the provisions of the Federal Advisory Committee Act (FACA), 5 U.S.C. App.2. The Children's Health Protection Advisory Committee (CHPAC) is a necessary committee which is in the public interest. Accordingly, CHPAC will be renewed for an additional two- year period. The purpose of CHPAC is to provide advice and recommendations to the Administrator of EPA on issues

188

Notices ENVIRONMENTAL PROTECTION AGENCY  

Broader source: Energy.gov (indexed) [DOE]

22 Federal Register 22 Federal Register / Vol. 75, No. 103 / Friday, May 28, 2010 / Notices ENVIRONMENTAL PROTECTION AGENCY [FRL-9156-1] Office of Research and Development; Ambient Air Monitoring Reference and Equivalent Methods: Designation of One New Equivalent Method AGENCY: Environmental Protection Agency. ACTION: Notice of the designation of one new equivalent method for monitoring ambient air quality. SUMMARY: Notice is hereby given that the Environmental Protection Agency (EPA) has designated, in accordance with 40 CFR Part 53, one new equivalent method for measuring concentrations of lead (Pb) in total suspended particulate matter (TSP) in the ambient air. FOR FURTHER INFORMATION CONTACT: Surender Kaushik, Human Exposure and Atmospheric Sciences Division (MD-D205-03), National Exposure

189

International Energy Agency  

Broader source: Energy.gov [DOE]

The International Energy Agency (IEA) provides a mechanism for member countries to task- and cost-share research activities through two agreementsone supporting hydrogen activities and another...

190

Threats from space: 20 years of progress  

E-Print Network [OSTI]

It has been 20 years since planning began for the 1995 United Nations International Conference on Near-Earth Objects. The conference proceedings established the scientific basis for an international organizational framework to support research and collective actions to mitigate a potential near-Earth object (NEO) threat to the planet. Since that time, researchers have conducted telescope surveys that should, within the coming decade, answer many questions about the size, number, and Earth impact probability of these objects. Space explorations to asteroids and comets have been successfully carried out, including sample recovery. Laboratory experiments and computer simulations at Sandia National Laboratories have analyzed the effects of soft X-ray radiation on meteorites - which might help researchers develop a way to redirect an incoming asteroid by vaporizing a thin layer of its surface. An Action Team on NEOs, established in 2001 in response to recommendations of the Third United Nations Conference on the E...

Remo, J L

2014-01-01T23:59:59.000Z

191

Establish Internal Greenhouse Gas Emission Reduction Targets | Department  

Broader source: Energy.gov (indexed) [DOE]

Establish Internal Greenhouse Gas Emission Reduction Targets Establish Internal Greenhouse Gas Emission Reduction Targets Establish Internal Greenhouse Gas Emission Reduction Targets October 7, 2013 - 10:24am Addthis Question to Answer What are appropriate GHG emission reduction targets for specific agency programs and sites? Not all administrative units within the agency have the same potential to contribute to agency-level targets. This step aims to help agencies establish what each major administrative unit (e.g. program site) should contribute to the agency goal based on its planned growth trajectory and estimates of its cost and potential to reduce GHG emissions. As illustrated in the figure below, two sites may have equal potential to reduce GHG emissions. But a site expecting significant mission-related growth prior to the 2020 target year may have a lower reduction target

192

Demand Reduction  

Broader source: Energy.gov [DOE]

Grantees may use funds to coordinate with electricity supply companies and utilities to reduce energy demands on their power systems. These demand reduction programs are usually coordinated through...

193

Before the House Subcommittee on Emerging Threats, Cyber Security and  

Broader source: Energy.gov (indexed) [DOE]

Emerging Threats, Cyber Security Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability 7-21-09_Final_Testimony_Hoffman.pdf More Documents & Publications Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Before the House Science and Technology Subcommittee on Energy and

194

Nuclear Radiological Threat Task Force Established | National Nuclear  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Radiological Threat Task Force Established | National Nuclear Radiological Threat Task Force Established | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > Nuclear Radiological Threat Task Force Established Nuclear Radiological Threat Task Force Established November 03, 2003 Washington, DC Nuclear Radiological Threat Task Force Established

195

Notices ENVIRONMENTAL PROTECTION AGENCY  

Broader source: Energy.gov (indexed) [DOE]

076 Federal Register 076 Federal Register / Vol. 77, No. 250 / Monday, December 31, 2012 / Notices ENVIRONMENTAL PROTECTION AGENCY [ER-FRL-9006-8] Notice of Intent: Designation of an Expanded Ocean Dredged Material Disposal Site (ODMDS) off Charleston, South Carolina AGENCY: U.S. Environmental Protection Agency (EPA) Region 4. ACTION: Notice of Intent to prepare an Environmental Assessment (EA) for the designation of an expanded ODMDS off Charleston, South Carolina. Purpose: EPA has the authority to designate ODMDSs under Section 102 of the Marine Protection, Research and Sanctuaries Act of 1972 (33 U.S.C. 1401 et seq.). It is EPA's policy to prepare a National Environmental Policy Document for all ODMDS designations (63 FR 58045, October 1998). FOR FURTHER INFORMATION, TO

196

POLICY RELATED TO THREATS OF CAMPUS DISRUPTION Bomb threats and similar situations are disruptive to the academic, research and operational functions of  

E-Print Network [OSTI]

POLICY RELATED TO THREATS OF CAMPUS DISRUPTION Bomb threats and similar situations are disruptive. Policy Any bomb threat or incident of a suspected explosive device shall be considered as valid by all advised that the situation is no longer considered a threat. Every effort must be made to protect

Collins, Gary S.

197

Assess Potential Agency Size Changes that Impact Greenhouse Gas Emissions |  

Broader source: Energy.gov (indexed) [DOE]

Emissions Emissions Assess Potential Agency Size Changes that Impact Greenhouse Gas Emissions October 7, 2013 - 10:12am Addthis Federal agencies should establish planned changes in operations that could have a substantial impact on emissions for each greenhouse gas (GHG) emission source: Buildings Vehicles and mobile equipment Business travel Employee commuting. Such changes could represent either an additional significant hurdle to overcome or a significant reduction in the effort required to drive emissions down-in the absence of any direct GHG mitigation reduction strategies. This will help each organization establish its "business as usual" emission profile in 2020, the year agencies are expected to meet their Scope 1 and 2 and Scope 3 GHG emission-reduction goals.

198

Technosocial Modeling of IED Threat Scenarios and Attacks  

SciTech Connect (OSTI)

This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.; Young, Jonathan; Wolf, Katherine E.; Thompson, Sandra E.; Niesen, David A.; Madsen, John M.; Henderson, Cynthia L.

2009-03-23T23:59:59.000Z

199

Response to Bomb Threats Page 1 of 3 Virginia Polytechnic Institute and State University No. 5600 Rev.: 4  

E-Print Network [OSTI]

Response to Bomb Threats Page 1 of 3 Virginia Polytechnic Institute and State University No. 5600 __________________________________________________________________________________ Subject: Response to Bomb Threats ............................................................................................................................................................1 3.1 Telephoned Threat

Virginia Tech

200

Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security  

E-Print Network [OSTI]

Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security Marwan Abi Science Carnegie Mellon University Pittsburgh, PA 15213 Center for Software Excellence Abstract Threat Foundation. #12;Keywords: Threat modeling, data flow diagrams, reflexion models, architecture-level security

Abi-Antoun, Marwan

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

THE VISUAL CUES USED BY THE LEMON PEEL ANGELFISH (CENTROPYGE FLAVISSIMA) TO DETERMINE THREAT  

E-Print Network [OSTI]

FLAVISSIMA)TODETERMINETHREAT JESSICA POST Integrativebeusedbyfishtoassessthreat,andindicatewhenitiswere importantinassessingthreat. Multiplecueswere

Post, Jessica

2012-01-01T23:59:59.000Z

202

Threat Facilitates Subsequent Executive Control During Anxious Mood Jeffrey L. Birk  

E-Print Network [OSTI]

Threat Facilitates Subsequent Executive Control During Anxious Mood Jeffrey L. Birk Tufts) posits that low-level threat may facilitate behavioral performance by influencing executive control functions. Anxiety is thought to strengthen this effect by enhancing threat's affective significance

Patel, Aniruddh D.

203

Cooperating Agencies | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Cooperating Agencies Cooperating Agencies Cooperating Agencies Selected documents on the topic of Cooperating Agencies under NEPA. December 23, 2004 Reporting Cooperating Agencies in Implementing the Procedural Requirements of the National Environmental Policy Act The purpose of this Council on Environmental Quality Memorandum is to establish a revised report to ensure that all Federal agencies are consistently reporting designation of Federal and non-federal cooperating agencies in the preparation of analyses and documentation required by the National Environmental Policy Act (NEPA). January 30, 2002 Cooperating Agencies in Implementing the Procedural Requirements of the National Environmental Policy Act The purpose of this Council on Environmental Quality Memorandum is to ensure that all Federal agencies are actively considering the designation

204

Data Reduction  

Science Journals Connector (OSTI)

Data reduction has two meanings. Firstly, in analysis, it is the process of reducing large masses of data to produce afew summary statistics. This process involves grouping data into tables, visualizing the...

2008-01-01T23:59:59.000Z

205

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Broader source: Energy.gov (indexed) [DOE]

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

206

Coping with stereotype threat: Denial as an impression management strategy  

E-Print Network [OSTI]

Four experiments tested the hypothesis that people who are concerned with impression management cope with stereotype threat through denial. Consistent with this hypothesis, temporary employees threatened by a stereotype ...

Von Hippel, W.; Von Hippel, C.; Conway, Leanne; Preacher, K. J.; Schooler, J. W.; Radvansky, G. A.

2005-01-01T23:59:59.000Z

207

Nuclear power's threat to health, safety, and freedom  

Science Journals Connector (OSTI)

Nuclear power's threat to health, safety, and freedom ... In particular, they may differ on whether the nuclear power plants that are the result of the 1953 Atoms for Peace movement help or hinder the control of nuclear weapons. ...

1980-10-13T23:59:59.000Z

208

A European vision for addressing global security threats  

Science Journals Connector (OSTI)

There is a robust consensus among EU Member States about the need to identify the complex links between the threats and challenges to the EUs security. ... and instruments required to effectively respond to secu...

Gerhard Sabathil

2010-06-01T23:59:59.000Z

209

Chapter 2 - Threats and Hazards at Educational Institutions  

Science Journals Connector (OSTI)

Abstract This chapter describes the threats and hazards currently facing school administrators. It separately covers school districts (K-12) and higher education (colleges and universities), and includes information about legislation and protection measures.

Philip Purpura

2014-01-01T23:59:59.000Z

210

Threat assessment design for driver assistance system at intersections  

E-Print Network [OSTI]

This paper considers the decision-making problem for a human-driven vehicle crossing a road intersection in the presence of other, potentially errant, drivers. Our approach relies on a novel threat assessment module, which ...

Aoude, Georges

211

EWAS: Modeling Application for Early Detection of Terrorist Threats  

Science Journals Connector (OSTI)

This paper presents a model and system architecture for an early warning system to detect terrorist threats. The paper discusses the shortcomings of state ... of generation of early warnings to predict terrorist

Pir Abdul Rasool Qureshi; Nasrullah Memon

2010-01-01T23:59:59.000Z

212

Threat-aware Path Planning in Uncertain Urban Environments  

E-Print Network [OSTI]

This paper considers the path planning problem for an autonomous vehicle in an urban environment populated with static obstacles and moving vehicles with uncertain intents. We propose a novel threat assessment module, ...

Aoude, Georges

213

Extinction by Miscalculation: The Threat to Sakinaw and Cultus Lake  

E-Print Network [OSTI]

Extinction by Miscalculation: The Threat to Sakinaw and Cultus Lake Sockeye MART R. GROSS of Economics, University of Toronto, 150 St. George Street, Toronto, Canada M5S 3G7. Email

Gross, Mart

214

Insider Threat to Nuclear and Radiological Materials: Fact Sheet | National  

National Nuclear Security Administration (NNSA)

Insider Threat to Nuclear and Radiological Materials: Fact Sheet | National Insider Threat to Nuclear and Radiological Materials: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Insider Threat to Nuclear and Radiological Materials: ... Fact Sheet Insider Threat to Nuclear and Radiological Materials: Fact Sheet

215

Agency Financial Report  

Broader source: Energy.gov (indexed) [DOE]

Financial Report Financial Report Fiscal Year 2010 D E/ -00 O CF 56 Foreword Agency Financial Report (AFR) The AFR is organized by the following three major sections: „ Management's Discussion and Analysis section provides executive-level information on the Department's history, mission, organization, Secretarial priorities, analysis of financial statements, systems, controls and legal compliance and other management priorities facing the Department. „ Financial Results section provides a Message from the Chief Financial Officer,

216

International Energy Agency  

Broader source: Energy.gov [DOE]

DOE's market transformation efforts have reached to European and other countries who are part of the international distributed and decentralized energy community. Through its partnership with DOE, the combined heat and power (CHP) program of the International Energy Agency (IEA) conducts research and analysis of CHP markets and deployment efforts around the world and has used lessons learned from U.S. research, development, and deployment efforts to recommend market transformation activities and policies that will lead to new CHP installations worldwide.

217

International Energy Agency  

SciTech Connect (OSTI)

The growing need for international cooperation in energy led to the establishment of the International Energy Agency (IEA) in 1974 as a forum for the 21 participating countries to coordinate their energy planning. The IEA provides a framework within the cooperating efforts of its participating countries which reinforce one another and improve the overall energy situation. This brief report reviews the objectives of the IEA and the activities of the Advisory Council.

Taylor, N.R.

1983-01-01T23:59:59.000Z

218

A Bayesian Belief Network of Threat Anticipation and Terrorist Motivations  

SciTech Connect (OSTI)

Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) as well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.

Olama, Mohammed M [ORNL; Allgood, Glenn O [ORNL; Davenport, Kristen M [ORNL; Schryver, Jack C [ORNL

2010-01-01T23:59:59.000Z

219

Preliminary thoughts concerning potential US Army threats/roles  

SciTech Connect (OSTI)

The rate at which the current world military/political perspective is changing demands consideration of a broader spectrum of potential threats then has been the case for the past few decades--during which the Soviet Union was the preeminent threat. Seemingly overnight, the cold war ceased, the requirement for massive U.S. military counters to the Soviet Union forces faded, and an era of constant (obvious) military threat disappeared. This situation has in turn been revolutionized by the Iraq invasion of Kuwait and the U.S. response. The paper addresses part of the problem facing military planners by defining a spectrum of threats that typify those the U.S. Army might face over the next decade or two. The purpose of the threat set is to support the evaluation of the effectiveness and usefulness, to the U.S. Army, of advanced technologies. The set of threats is intended to provide a complete set of characteristics rather then to be a complete list of the possibilities; it is illustrative rather than exhaustive. Although largely completed before the war with Iraq started, its content is still valid in that its purpose is to provide a framework for thinking about future U.S. Army technology needs.

Greene, R.A.; Solomon, K.A.; Miles, J.T.

1991-06-01T23:59:59.000Z

220

Tribal Request for Proposals for EPA Diesel Emissions Reduction Act Funding  

Broader source: Energy.gov [DOE]

The United States Environmental Protection Agency (EPA) is accepting proposals for the Diesel Emissions Reduction Act (DERA) Tribal Competition Request for a total of up to $1 million.

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Federal Agency NEPA Procedures | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Federal Agency NEPA Procedures Federal Agency NEPA Procedures Each Federal agency is required to develop NEPA procedures that supplement the CEQ Regulations. Developed in...

222

Petroleum Reduction Planning Tool | Open Energy Information  

Open Energy Info (EERE)

Petroleum Reduction Planning Tool Petroleum Reduction Planning Tool Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Petroleum Reduction Planning Tool Agency/Company /Organization: National Renewable Energy Laboratory, United States Department of Energy Sector: Energy Focus Area: Biomass, Energy Efficiency, Fuels & Efficiency, Hydrogen, Transportation Phase: Prepare a Plan Topics: Analysis Tools, Pathways analysis Resource Type: Software/modeling tools User Interface: Website Complexity/Ease of Use: Not Available Website: www.afdc.energy.gov/afdc/prep/index.php OpenEI Keyword(s): Energy Efficiency and Renewable Energy (EERE) Tools Equivalent URI: cleanenergysolutions.org/content/petroleum-reduction-planning-tool Language: English Policies: Deployment Programs DeploymentPrograms: Demonstration & Implementation

223

Identify Petroleum Reduction Strategies for Vehicles and Mobile Equipment |  

Broader source: Energy.gov (indexed) [DOE]

Petroleum Reduction Strategies for Vehicles and Mobile Petroleum Reduction Strategies for Vehicles and Mobile Equipment Identify Petroleum Reduction Strategies for Vehicles and Mobile Equipment October 7, 2013 - 11:50am Addthis YOU ARE HERE: Step 3 As defined by the Federal Energy Management Program (FEMP), greenhouse gas (GHG) emission reduction strategies for Federal vehicles and equipment are based on the three driving principles of petroleum reduction: Reduce vehicle miles traveled Improve fuel efficiency Use alternative fuels. These strategies provide a framework for an agency to use when developing a strategic plan that can be specifically tailored to match the agency's fleet profile and meet its mission. Agency fleet managers should evaluate petroleum reduction strategies and tactics for each fleet location, based on an evaluation of site-specific

224

Multi-Agent Patrolling under Uncertainty and Threats Shaofei Chen1,2  

E-Print Network [OSTI]

Multi-Agent Patrolling under Uncertainty and Threats Shaofei Chen1,2 , Feng Wu2 , Lincheng Shen1 information is distributed alongside threats. The informa- tion and threat at each location are respectively by an agent. While agents obtain information at a location, they may suffer attacks from the threat

Yeoh, William

225

Threat Assessment Using Evidential Networks A. Benavoli, B. Ristic, A. Farina, M. Oxenham, L. Chisci  

E-Print Network [OSTI]

Threat Assessment Using Evidential Networks A. Benavoli, B. Ristic, A. Farina§, M. Oxenham, L by providing a threat assessment, that is an estimate of the extent to which an enemy platform poses a threat based on evidence about its intent and capability. Threat is modelled by a network of entities

Chisci, Luigi

226

Ionospheric Threat Model Methodology for Juan Blanch, Todd Walter, Per Enge. Stanford University  

E-Print Network [OSTI]

Ionospheric Threat Model Methodology for WAAS Juan Blanch, Todd Walter, Per Enge. Stanford of a threat model. The threat model is used to restrict the expected ionospheric behavior. It must not be too driving the ionosphere are not entirely known, a decision has been made to base the threat model

Stanford University

227

Old Threats Never Die By: Gunter Ollmann, Director of Security Strategy  

E-Print Network [OSTI]

Old Threats Never Die By: Gunter Ollmann, Director of Security Strategy IBM Internet Security Systems #12;Table of Contents Threat Lifecycle 1 Malware Threat Lifecycle 2 Vulnerability Lifecycle 2 Conclusions 12 #12;Old Threats Never Die Page 1 With year-on-year increases in vulnerabilities, malware

228

Estimate Greenhouse Gas Reduction Potential and Cost-Effectiveness of Strategies for Vehicles and Mobile Equipment  

Broader source: Energy.gov [DOE]

After identifying petroleum reduction strategies, a Federal agency should estimate the greenhouse gas (GHG) reduction potential and cost effectiveness of these strategies for vehicles and mobile equipment. The table below provides steps for identifying optimal vehicle acquisition strategies.

229

U.S. Global Threat Reduction Initiative/U.S.-Origin Nuclear Fuel Removals  

Broader source: Energy.gov [DOE]

Presentation made by Chuck Messick for the NTSF annual meeting held from May 14-16, 2013 in Buffalo, NY.

230

On threats analysis approach applied to a Mediterranean remnant wetland: Is the assessment of human-induced threats related to different level of expertise of respondents?  

Science Journals Connector (OSTI)

Naming, listing and measuring human-induced threats in protected areas are crucial in conservation. ... , we defined a check-list of direct threats in a Mediterranean remnant wetland (central Italy ... students a...

Corrado Battisti; Luca Luiselli; Daniele Pantano

2008-06-01T23:59:59.000Z

231

CHP Emissions Reduction Estimator | Open Energy Information  

Open Energy Info (EERE)

CHP Emissions Reduction Estimator CHP Emissions Reduction Estimator Jump to: navigation, search Tool Summary LAUNCH TOOL Name: CHP Emissions Reduction Estimator Agency/Company /Organization: United States Environmental Protection Agency Sector: Energy Focus Area: Buildings, Transportation, Industry Topics: GHG inventory, Co-benefits assessment Resource Type: Software/modeling tools User Interface: Spreadsheet Website: www.epa.gov/chp/basic/calculator.html Country: United States UN Region: Northern America CHP Emissions Reduction Estimator Screenshot References: http://www.epa.gov/chp/basic/calculator.html "This Emissions Estimator provides the amount of reduced emissions in terms of pounds of CO2, SO2, and NOX based on input from the User regarding the CHP technology being used. In turn the User will be provided with

232

Assess Potential Agency Size Changes that Impact Greenhouse Gases from  

Broader source: Energy.gov (indexed) [DOE]

Vehicles and Mobile Equipment Vehicles and Mobile Equipment Assess Potential Agency Size Changes that Impact Greenhouse Gases from Vehicles and Mobile Equipment October 7, 2013 - 11:31am Addthis YOU ARE HERE Step 1 Planned changes in a Federal agency's size, missions, transportation needs, and vehicle inventory all impact the strategic portfolio planning efforts that target greenhouse gas (GHG) emissions mitigation for vehicles and mobile equipment. Under Section 142 of the Energy Independence and Security Act (EISA) and Section 8 of Executive Order (E.O.) 13514, agencies are required to develop a plan that will reduce fleet GHG emissions to meet Federally mandated petroleum reduction and alternative fuel increase targets. Agencies can use these plans as a basis for determining potential changes in fleet size and

233

Department of Energy Proposed Agency Information Collection: Federal  

Broader source: Energy.gov (indexed) [DOE]

00 - May 25, 2010 00 - May 25, 2010 Department of Energy Proposed Agency Information Collection: Federal Register Notice Volume 75, No. 100 - May 25, 2010 Department of Energy Proposed Agency Information Collection. The Department of Energy (DOE) invites public comments on DOE's intent to request the Office of Management and Budget (OMB) to extend for three years the emergency Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910-5149 that DOE is developing for submission to OMB pursuant to the Paperwork Reduction Act of 1995. Federal Register Volume 75 No 100. Federal Register notice for the Department of Energy Proposed Agency Information Collection, May 25, 2010. More Documents & Publications Department of Energy Proposed Agency Information Collection: Federal

234

Guidance for Federal Agencies on E.O. 13514 Section 12, Federal Fleet Management  

Broader source: Energy.gov [DOE]

Document provides guidance on planningthe first step in a recommended process for Federal agency fleet managers to select optimal petroleum reduction strategies as required under Executive Order (E.O.) 13514.

235

Assess Potential Agency Size Changes that Impact Greenhouse Gases from Employee Commuting  

Broader source: Energy.gov [DOE]

For employee commuting, it is important to account for any planned or expected changes in a Federal agency's size when estimating the greenhouse gas (GHG) reduction potential for different operating units or worksites.

236

Colorado/Transmission/Agencies | Open Energy Information  

Open Energy Info (EERE)

Agencies < Colorado | Transmission Jump to: navigation, search Colorado Transmission Roadmap Agency Links Local Regulations State Regulations Summary General Transmission...

237

Allocation Reductions  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Allocation Allocation Reductions Quarterly Allocation Reductions MPP (or computational) repositories that haven't used significant amounts of time are adjusted at certain times by transferring a part of the unused balance to the corresponding DOE Office reserve. The following schedule will be used for allocation year 2014 (which runs 14 January 2014 through 132January 2015). On April 9: if usage is less than 10% remove 25% of the unused balance On July 9: if usage is less than 25% remove 25% of the unused balance if usage is less than 10% remove 50% of the unused balance On October 8: if usage is less than 50% remove 25% of the unused balance if usage is less than 25% remove 75% of the unused balance if usage is less than 10% remove 90% of the unused balance On November 5:

238

Nitrate reduction  

DOE Patents [OSTI]

Nitrates are reduced to nitrogen gas by contacting the nitrates with a metal to reduce the nitrates to nitrites which are then contacted with an amide to produce nitrogen and carbon dioxide or acid anions which can be released to the atmosphere. Minor amounts of metal catalysts can be useful in the reduction of the nitrates to nitrites. Metal salts which are formed can be treated electrochemically to recover the metals.

Dziewinski, Jacek J. (Los Alamos, NM); Marczak, Stanislaw (Los Alamos, NM)

2000-01-01T23:59:59.000Z

239

Protecting the Nation's Electric Grid from Cyber Threats | Department of  

Broader source: Energy.gov (indexed) [DOE]

Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats January 11, 2012 - 11:28am Addthis A smarter, modernized, and more secure grid will be pivotal to the United States’ world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. A smarter, modernized, and more secure grid will be pivotal to the United States' world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. Howard A. Schmidt White House Cybersecurity Coordinator Secretary Steven Chu: "Establishing a comprehensive cybersecurity approach will give utility companies and grid operators another important tool to improve the grid's ability to respond to cybersecurity risks."

240

Effects of intentional threats to power substation control systems  

Science Journals Connector (OSTI)

Power station control and management systems represent key elements for guaranteeing the security of the power grid infrastructure. Intrinsically conceived to support the continuous provision of power in secure conditions, those systems today make intensive use of information and communication systems and are therefore exposed to related accidental and intentional cyber threats. This paper describes a simulation of cyber attacks conducted in the CESI RICERCA laboratory testbed on a prototypical substation control infrastructure with the purpose of testing their feasibility and illustrating their impact on the control system services. A set of attack scenarios targeting several subsystems has been experimented, with different simulated threat motivations and different degrees of impact on the global substation service. The paper reports some considerations about the consequences of the implemented attacks, focusing on different facets of the problem, in an effort to elucidate the full significance of the potential cyber threats.

Giovanna Dondossola; Judit Szanto; Marcelo Masera; Igor Nai Fovino

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Notices ENVIRONMENTAL PROTECTION AGENCY  

Broader source: Energy.gov (indexed) [DOE]

94 Federal Register 94 Federal Register / Vol. 74, No. 209 / Friday, October 30, 2009 / Notices ENVIRONMENTAL PROTECTION AGENCY [ER-FRL-8798-8] Environmental Impact Statements and Regulations; Availability of EPA Comments Availability of EPA comments prepared pursuant to the Environmental Review Process (ERP), under section 309 of the Clean Air Act and Section 102(2)(c) of the National Environmental Policy Act as amended. Requests for copies of EPA comments can be directed to the Office of Federal Activities at 202-564-7146 or http://www.epa.gov/ compliance/nepa/. An explanation of the ratings assigned to draft environmental impact statements (EISs) was published in FR dated July 17, 2009 (74 FR 34754). Draft EISs EIS No. 20090290, ERP No. D-FTA- F54014-WI, Kenosha-Racine-Milwaukee

242

Environmental Protection Agency  

Office of Legacy Management (LM)

Protection Agency Protection Agency . . Book, 4 Project Rulison Off-Site Surveillance Operation for the Flaring Period - October 26 - November 3, 1970 DISCLAIMER Portions of this document may be illegible in electronic image products. Images are produced from the best available original document. P r e l i m i n a r y Report March 1 0 , 1 9 7 1 PROJECT RULISON OFF-SITE ' SURVEILLANCE FOR THE E'LARING OPERATION OF OCTOBER 26 - November 3, 1970 S o u t h w e s t e r n R a d i o l o g i c a l H e a l t h Laboratqry ~ u g i n g . . . t h e p e r i o d of O c t o b e r 26' through November 3 , ,1970, n a t u r a l g a s f r o m -.._. -- . . t h e P r o j e c t R u l i s o n t e s t w e l l was f l a r e d f o r t h e h i g h - r a t e p r o d u c t i o n f l a r i n g t e s t . . The' f l a r i n g o p e r a t i o n was s t a r t e d , a t 1430 M!5T on October 2 6 , 1970. The g a s flow r a t e w a s i n c r e a s e d o v e r a six-hour p

243

A Municipal Official's Guide to Diesel Idling Reduction | Open Energy  

Open Energy Info (EERE)

A Municipal Official's Guide to Diesel Idling Reduction A Municipal Official's Guide to Diesel Idling Reduction Jump to: navigation, search Tool Summary LAUNCH TOOL Name: A Municipal Official's Guide to Diesel Idling Reduction Agency/Company /Organization: United States Environmental Protection Agency Partner: New York Planning Federation Sector: Climate, Energy Focus Area: Transportation Resource Type: Lessons learned/best practices Website: www.nyserda.org/publications/09-06GuidetoDieselIdlingReduction.pdf Language: English References: A Municipal Official's Guide to Diesel Idling Reduction[1] References ↑ "A Municipal Official's Guide to Diesel Idling Reduction" Retrieved from "http://en.openei.org/w/index.php?title=A_Municipal_Official%27s_Guide_to_Diesel_Idling_Reduction&oldid=390471"

244

CDM Emission Reductions Calculation Sheet Series | Open Energy Information  

Open Energy Info (EERE)

CDM Emission Reductions Calculation Sheet Series CDM Emission Reductions Calculation Sheet Series Jump to: navigation, search Tool Summary LAUNCH TOOL Name: CDM Emission Reductions Calculation Sheet Series Agency/Company /Organization: Institute for Global Environmental Strategies Sector: Energy, Water Focus Area: Agriculture, Greenhouse Gas Topics: Baseline projection, GHG inventory Resource Type: Online calculator User Interface: Spreadsheet Website: www.iges.or.jp/en/cdm/report_ers.html Cost: Free CDM Emission Reductions Calculation Sheet Series Screenshot References: CDM Emission Reductions Calculation Sheet Series[1] "IGES ERs Calculation Sheet aims at providing a simplified spreadsheet for demonstrating emission reductions based on the approved methodologies corresponding to eligible project activities. The sheet will provide you

245

Threats and Challenges in Reconfigurable Hardware Security Ryan Kastner  

E-Print Network [OSTI]

Reconfigurable Hardware Life Cycle Before we discuss specific security problems, attacks and solutions, we: The life cycle of reconfigurable hardware, from manufacturing to application development to deploymentThreats and Challenges in Reconfigurable Hardware Security Ryan Kastner Dept. of Computer Science

246

ANALYSIS OF ELECTRIC GRID SECURITY UNDER TERRORIST THREAT Javier Salmeron  

E-Print Network [OSTI]

ANALYSIS OF ELECTRIC GRID SECURITY UNDER TERRORIST THREAT Javier Salmeron Kevin Wood Operations techniques for analyzing the security and resilience of electrical power grids against disruptions caused analytical techniques to help mitigate the disruptions to electric power grids caused by terrorist attacks

Baldick, Ross

247

How to determine threat probabilities using ontologies and Bayesian networks  

E-Print Network [OSTI]

are capable to reduce the risk to an acceptable level at the lowest possible costs. Risk is defined. The elaborated concepts enable risk managers to comprehensibly quantify the current security status Terms Security Keywords threat probability determination, risk management, infor- mation security 1

248

Constructing Ionospheric Irregularity Threat Model for Korean SBAS  

E-Print Network [OSTI]

GNSS augmentation system and space weather forecasting for GNSS application. Jiyun Lee is an Assistant metrics which measure the density and uniformity of IPP distribution in a region. Thus, the threat model metrics, which characterize threatening undersampled geometries including the density of IPP distribution

Stanford University

249

WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President  

E-Print Network [OSTI]

WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President Dr. Peter H. Gleick1 October 9, 2008 Safe and adequate fresh water resources are central to the economy, foreign policy domestic and international challenges related to fresh water. These challenges will require unilateral

250

The cyber threat landscape: Challenges and future research directions  

Science Journals Connector (OSTI)

Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain ... Keywords: Culture of security, Cyber crime, Cyber exploitation, Policing and preventative strategy, Public private partnership, Routine Activity Theory

Kim-Kwang Raymond Choo

2011-11-01T23:59:59.000Z

251

Ecological factors and human threats both drive wildfowl population declines  

E-Print Network [OSTI]

; human population density. Correspondence Peter R. Long, Department of Biology and Biochemistry, Africa and Asia. Second, we use phylogenetic comparative analyses to test whether population size, globalEcological factors and human threats both drive wildfowl population declines P. R. Long1 , T. Sz

252

PERSISTENT SURVEILLANCE FOR PIPELINE PROTECTION AND THREAT INTERDICTION  

E-Print Network [OSTI]

-rated and IFE target supply processes and target related systems Electrically steer targets Making foam or fastPERSISTENT SURVEILLANCE FOR PIPELINE PROTECTION AND THREAT INTERDICTION Overview of the Fusion) for the Pedestal Developed and Tested · Formation of an edge barrier or "pedestal" allows high performance

253

The need for carbon dioxide disposal: A threat and an opportunity  

SciTech Connect (OSTI)

Ready energy is a cornerstone of modern society. The policies outlined at the recent Kyoto conference have put in question the largest, most readily available and most cost-effective energy resource available. Even if a doubling of atmospheric CO{sub 2} is deemed acceptable, emission reductions worldwide would have to be drastic. For 10 billion people to share equally into the 1990 emission level would allow a per capita emission of 10% of the current US level. Substantial reductions in CO{sub 2} emissions to the atmosphere are unavoidable. Uncertain is the time available to accomplish this reduction. There are also reasons to be optimistic about the future of coal and other fossil fuels. Barring a surprise technological breakthrough in alternative energies, fossil energy consumption is bound to grow. Political and economic drivers even stronger than the threat of climate change favor economic growth and therefore increased energy consumption. To resolve this apparent contradiction requires new technologies that prevent CO{sub 2} generated by combustion from entering the atmosphere. The authors will outline available technologies and show how the coal industry can adapt to them.

Lackner, K.S.; Butt, D.P.; Wendt, C.H.

1998-08-01T23:59:59.000Z

254

Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial  

E-Print Network [OSTI]

Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial of the Threat and Consequences of Weapon Attacks on Commercial Aircraft CREATE Report 29 November 2005 John P FLIGHT PATH . . . . . . . . . . . . . . . . . . . . . . . . . . 20 WEAPON LETHALITY MODEL

Wang, Hai

255

Study of Internet Threats and Attack Methods Using Honeypots and Honeynets  

Science Journals Connector (OSTI)

The number of threats from the Internet has been growing in ... the most suitable protection the detailed information about threats are required. Honeypots and honeynets are effective ... tools for obtaining deta...

Tomas Sochor; Matej Zuzcak

2014-01-01T23:59:59.000Z

256

A threat-rigidity analysis of the Apache Software Foundation's response to reported server security issues  

E-Print Network [OSTI]

There exists a broad body of literature documenting organizational responses to competitive threats, including those responses which fit into the threat-rigidity hypothesis. The purpose of this thesis is to investigate how ...

Shapira, Yoav

2006-01-01T23:59:59.000Z

257

Prioritize Strategies and Set Internal Reduction Targets for Scope 3  

Broader source: Energy.gov (indexed) [DOE]

Strategies and Set Internal Reduction Targets for Scope Strategies and Set Internal Reduction Targets for Scope 3 Greenhouse Gas Emissions Prioritize Strategies and Set Internal Reduction Targets for Scope 3 Greenhouse Gas Emissions October 7, 2013 - 10:22am Addthis The final steps in the greenhouse gas (GHG) mitigation planning process for Scope 3 emissions include: Prioritizing strategies across all Scope 3 emission sources Setting internal Scope 3 reduction targets. Prioritizing All Scope 3 Strategies Once the Federal agency understands what Scope 3 reductions are feasible and at what costs, it should prioritize proposed GHG reduction activities across all Scope 3 emission sources. This prioritization will help agencies determine how to get the most out of limited resources for Scope 3 mitigation. It will also assist in developing more informed targets at the

258

Chapter 3 - Building Skills with Basics: Learning to Identify Threats  

Science Journals Connector (OSTI)

Abstract The karate student builds skills in a variety of ways, but one of the fundamental ways to practice is through repetition of the basics: blocks, punches, and kicks. A student learns to respond to real attacks from any direction, through continual training on the right way to defend and to eliminate an opponent. This is the starting point where a student develops proper techniques to attack and counterattack against a variety of violent threats. Organizations must recognize harmful hazards. Hazards may be obvious, such as risks from hurricanes, or may be less evident, such as the risks from a chemical spill on a nearby roadway. Threats to your organization can come in many formats, from natural to accidental to deliberate. To successfully prepare for problems, the next step in the assessment process calls for identifying potential risks and using available sources to identify what things you really should worry about.

Eric N. Smith

2014-01-01T23:59:59.000Z

259

Proposed Agency Information Collection: Federal Register Notice Volume 76,  

Broader source: Energy.gov (indexed) [DOE]

54 - Aug. 10, 2011 54 - Aug. 10, 2011 Proposed Agency Information Collection: Federal Register Notice Volume 76, No. 154 - Aug. 10, 2011 The Department of Energy (DOE) invites public comment on DOE's intent to request OMB to renew Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910-5149 for an additional four years that DOE is developing for submission to the Office of Management and Budget (OMB) pursuant to the Paperwork Reduction Act of 1995. Comments regarding this proposed information collection must be received on or before October 11, 2011. ICR, OMB1910.5149.pdf More Documents & Publications Proposed Agency Information Collection: Federal Register Notice Volume 76, No. 195 - Oct. 7, 2011 Department of Energy Proposed Agency Information Collection: Federal

260

Assess Potential Agency Size Changes that Impact Greenhouse Gases from  

Broader source: Energy.gov (indexed) [DOE]

Employee Commuting Employee Commuting Assess Potential Agency Size Changes that Impact Greenhouse Gases from Employee Commuting October 7, 2013 - 1:42pm Addthis YOU ARE HERE Step 1 For employee commuting, it is important to account for any planned or expected changes in a Federal agency's size when estimating the greenhouse gas (GHG) reduction potential for different operating units or worksites. Considerations include: Are employment levels expected to change in the next decade at specific facilities or agency-wide? Are there any planned facility moves at major worksites? Employee commute coordinators may want to engage human resources and strategic planners in this effort to establish likely changes in employment numbers. Facility planners may be engaged to understand changes in commutes

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Proposed Agency Information Collection: Federal Register Notice Volume 76,  

Broader source: Energy.gov (indexed) [DOE]

95 - Oct. 7, 2011 95 - Oct. 7, 2011 Proposed Agency Information Collection: Federal Register Notice Volume 76, No. 195 - Oct. 7, 2011 The Department of Energy (DOE) invites public comment on DOE's request the Office of Management and Budget (OMB) to extend for three years the emergency Information Collection Request Title: OE Recovery Act Financial Assistance Grants, OMB Control No. 1910-5149 that DOE is submitting to OMB pursuant to the Paperwork Reduction Act of 1995. Comments regarding this proposed information collection must be received on or before November 7, 2011 2011-26061 OE FRN ARRA ICR 30.pdf More Documents & Publications Proposed Agency Information Collection: Federal Register Notice Volume 76, No. 154 - Aug. 10, 2011 Department of Energy Proposed Agency Information Collection: Federal

262

Q&A with Steven Spencer: Speaker in the Women and STEM Series Talks About How He Became Interested in Studying Psychology, Dissonance, and Stereotype Threat  

E-Print Network [OSTI]

dissonance, and stereotype threat A Spencers talk, Athe field of stereotype threat, I was impressed by his kindthink about contents stereotype threat. Therefore, I had the

Hooker, Courtney

2011-01-01T23:59:59.000Z

263

Assets at Risk: Menstrual Cycle Variation in the Envisioned Formidability of a Potential Sexual Assailant Reveals a Component of Threat Assessment  

E-Print Network [OSTI]

M. T. (2013). Sizing up the threat: The envisioned physicalconceptual links between threat, social status, and physicalReveals a Component of Threat Assessment Daniel M.T.

Fessler, Daniel M.T.; Holbrook, Colin; Fleischman, Diana S.

2014-01-01T23:59:59.000Z

264

A Study on Biological Threats to Texas Freshwater Resources  

E-Print Network [OSTI]

A STUDY ON BIOLOGICAL THREATS TO TEXAS FRESHWATER RESOURCES A Thesis by MICHAEL TYLER NEISCH Submitted to the Office of Graduate and Professional Studies of Texas A&M University in partial fulfillment of the requirements.... Roelke and Dr. Masser, and my committee member, Dr. Rogers, for their guidance and support throughout the course of this research. Special thanks also to Dr. Gatlin, Brian Ray and all the Texas A&M Aquaculture and Research Facility staff, John Johnson...

Neisch, Michael

2014-01-15T23:59:59.000Z

265

Application of Machine Learning and Crowdsourcing to Detection of Cybersecurity Threats Application of Machine Learning and Crowdsourcing  

E-Print Network [OSTI]

Application of Machine Learning and Crowdsourcing to Detection of Cybersecurity Threats 1 Application of Machine Learning and Crowdsourcing to Detection of Cybersecurity Threats February 2011 Eugene of Cybersecurity Threats 2 Abstract We are applying machine learning and crowdsourcing to cybersecurity

Fink, Eugene

266

Quantifying threats in a Mediterranean wetland: are there any changes in their evaluation during a training course?  

Science Journals Connector (OSTI)

Threats analysis is a conservation discipline directed to ... , quantify, rank, map the human-induced threats occurring in a specific study area, assessing ... of central Italy, where 15 human-induced threats w...

Corrado Battisti; Luca Luiselli; Corrado Teofili

2009-10-01T23:59:59.000Z

267

Countering Hybrid Eco-threats to Global Security Under International Law: The Need for an Comprehensive Legal Approach  

Science Journals Connector (OSTI)

Threats to environmental security (eco-threats) face not only shortcomings of environmental ... of Armed Conflict. Considering the new Hybrid Threat concept, which had recently been discussed ... for adopting...

Joachim Sanden; Sascha-Dominik Bachmann

2013-11-01T23:59:59.000Z

268

Alternative Fuels Data Center: Idle Reduction Technology Loan Program  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

Idle Reduction Idle Reduction Technology Loan Program to someone by E-mail Share Alternative Fuels Data Center: Idle Reduction Technology Loan Program on Facebook Tweet about Alternative Fuels Data Center: Idle Reduction Technology Loan Program on Twitter Bookmark Alternative Fuels Data Center: Idle Reduction Technology Loan Program on Google Bookmark Alternative Fuels Data Center: Idle Reduction Technology Loan Program on Delicious Rank Alternative Fuels Data Center: Idle Reduction Technology Loan Program on Digg Find More places to share Alternative Fuels Data Center: Idle Reduction Technology Loan Program on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type Idle Reduction Technology Loan Program The Minnesota Pollution Control Agency's Small Business Environmental

269

IONOSPHERIC THREATS TO THE INTEGRITY OF AIRBORNE GPS USERS A DISSERTATION  

E-Print Network [OSTI]

IONOSPHERIC THREATS TO THE INTEGRITY OF AIRBORNE GPS USERS A DISSERTATION SUBMITTED threats to user safety if left unmitigated. This work identifies when such disturbances may occur using indicates the need for a non-trivial threat model for the Federal Aviation Administration's Local Area

Stanford University

270

Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability  

E-Print Network [OSTI]

Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability by Georges;Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability by Georges Salim fulfillment of the requirements for the degree of Doctor of Philosophy Abstract This thesis develops threat

How, Jonathan P.

271

Modeling Medical System Threats with Conditional Probabilities using Multiple-Valued Logic Decision  

E-Print Network [OSTI]

Modeling Medical System Threats with Conditional Probabilities using Multiple-Valued Logic Decision system reliability has become an area of increasing importance. Medical system threats, which include system operation. To address these problems, we build upon our previous threat cataloging methodology

Thornton, Mitchell

272

Threat to the point: improving the value of comparative extinction risk analysis for conservation action  

E-Print Network [OSTI]

Threat to the point: improving the value of comparative extinction risk analysis for conservation of such analyses for conservation practice has been questioned. One reason for underperformance may be that threats this problem by (i) reviewing the use of threats in this field and (ii) quanti- tatively investigating

Davidson, Ana

273

Moderate threat causes longer lasting disruption to processing in anxious individuals  

E-Print Network [OSTI]

Moderate threat causes longer lasting disruption to processing in anxious individuals Sophie: Forster S, Castle E, Nunez-elizalde AO and Bishop SJ(2014) Moderate threat causes longer lasting in anxiety1 Moderate threat causes longer lasting disruption to processing2 in anxious individuals.3 Sophie

Bishop, Sonia

274

umankind faces a wide range of threats to its security and safety, from ter-  

E-Print Network [OSTI]

H umankind faces a wide range of threats to its security and safety, from ter- rorist groups and cybercriminals to disease pandemics and climate change. All these threats share one characteristic threats. Two years ago we suggested in our book Natural Security: A Darwinian Approach to a Dangerous

Grether, Gregory

275

Responses to Ecological and Human Threats to a California Water Basin Governance System  

E-Print Network [OSTI]

W06-41 Responses to Ecological and Human Threats to a California Water Basin Governance System to the management regime as well. This paper describes the threats to water management arrangements in the San increasingly robust to certain disturbances (or threats), the complex social ecological system has remained

Janssen, Marco

276

Passive Threats among Agents in State Oriented Domains Yair B. Weinberger and Jeffrey S. Rosenschein  

E-Print Network [OSTI]

Passive Threats among Agents in State Oriented Domains Yair B. Weinberger and Jeffrey S systems work considered the notion of threats during negotiation, but in order to do so introduced additional assumptions on the domain. This paper presents a new model of threats among negotiating agents

Rosenschein, Jeff

277

Learning about social threats in RS Learning biases underlying individual differences in sensitivity to social rejection  

E-Print Network [OSTI]

Learning about social threats in RS 1 Learning biases underlying individual differences. Ochsner, Department of Psychology, Columbia University Running Head: Learning about social threats in RS University, Northwest Science Bldg 290, Cambridge, MA 0213. #12;Learning about social threats in RS 2

Ochsner, Kevin

278

Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security  

E-Print Network [OSTI]

Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security Marwan Abi Science Carnegie Mellon University Pittsburgh, PA 15213 # Center for Software Excellence Abstract Threat Foundation. #12; Keywords: Threat modeling, data flow diagrams, reflexion models, architecture­level security

279

Ionospheric Threat Mitigation by Geometry Screening in Ground-Based Augmentation Systems  

E-Print Network [OSTI]

Ionospheric Threat Mitigation by Geometry Screening in Ground-Based Augmentation Systems Jiyun Lee observed during severe ionospheric storms pose potential threats to the integrity of the Ground threats, because ionospheric gradients are not observable to the ground monitor if they impact

Stanford University

280

CERNA WORKING PAPER SERIES Spatial price homogeneity as a mechanism to reduce the threat of  

E-Print Network [OSTI]

CERNA WORKING PAPER SERIES Spatial price homogeneity as a mechanism to reduce the threat price homogeneity as a mechanism to reduce the threat of regulatory intervention in locally monopolistic to retaliations from local elected officials. When investor-owned monopolies are exposed to this threat

Paris-Sud XI, Université de

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Protecting Against Unsampled Ionospheric Threats Todd Walter, Sriram Rajagopal, Seebany Datta-Barua, and Juan Blanch  

E-Print Network [OSTI]

Protecting Against Unsampled Ionospheric Threats Todd Walter, Sriram Rajagopal, Seebany Datta features. Therefore, it is essential to understand the magnitude of such threats given the gaps in our observations. The methodology used to study these features is to start with well-observed threats from previous

Stanford University

282

MTRG/Ascension Management Plan 2002 SECTION 5: THREATS AND RECOMMENDED MANAGEMENT  

E-Print Network [OSTI]

MTRG/Ascension Management Plan 2002 14 SECTION 5: THREATS AND RECOMMENDED MANAGEMENT and control of pet cats 8) Continuation of ban on harvest of turtle products We give an account of all threats.1 General Habitat Degradation 5.1.1. Mining of Beach Sand 5.1.2. Light Pollution 5.1.3 Threat of Fuel Spill

Exeter, University of

283

EXTERNAL TERRORIST THREATS TO CIVILIAN AIRLINERS: A SUMMARY RISK ANALYSIS OF  

E-Print Network [OSTI]

EXTERNAL TERRORIST THREATS TO CIVILIAN AIRLINERS: A SUMMARY RISK ANALYSIS OF MANPADS, OTHER BALLISTIC WEAPONS RISKS, FUTURE THREATS, AND POSSIBLE COUNTERMEASURES POLICIES O'Sullivan, T. CREATE REPORT Threats to Civilian Airliners: A Summary Risk Analysis of MANPADS, Other Ballistic Weapons Risks, Future

Wang, Hai

284

Ionospheric Threat Parameterization for Local Area Global-Positioning-System-Based Aircraft Landing Systems  

E-Print Network [OSTI]

Ionospheric Threat Parameterization for Local Area Global-Positioning-System-Based Aircraft Landing of user separation. The method of data analysis that produced these results is described, and a threat space that parameterizes these possible threats to user integrity is defined. Certain configurations

Stanford University

285

Validity Threats in Empirical Software Engineering Research -An Initial Survey Robert Feldt, Ana Magazinius  

E-Print Network [OSTI]

Validity Threats in Empirical Software Engineering Research - An Initial Survey Robert Feldt, Ana important to consider threats to the validity of the study and the results. This is particularly important for empirical research where there is often a multitude of possible threats. With a growing focus on empirical

Feldt, Robert

286

Fast Threat Detection and Localization Using Super-Regenerative Transceiver in  

E-Print Network [OSTI]

Fast Threat Detection and Localization Using Super-Regenerative Transceiver in Random Noise Radar-Regenerative (SRG) transceiver as a type of ultra-fast electronics platform for threat detection and localization the Angle-of-Arrival (AOA) information of the inbound threats. Simulations and detailed laboratory

Zhang, Yan

287

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang  

E-Print Network [OSTI]

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang Rochester Institute on how to evaluate a threat assessment algorithm, especially for cyber security. Because of the variety and the constantly changing nature of hacker behavior and network vulnerabilities, a cyber threat assessment

Jay Yang, Shanchieh

288

THE GLOBALIzATION OF CHINESE SCIENCE: A THREAT OR AN  

E-Print Network [OSTI]

THE GLOBALIzATION OF CHINESE SCIENCE: A THREAT OR AN OPPORTuNITy? recently, I attended the 50th?" and "Is China a threat to the power of the United states?" We have known the host and his family for years). are they a welcome expansion or a threat to the quality of programs? In some years, conferencegoers have expressed

Zhu, Chen

289

Threat Modeling as a Basis for Security Requirements Suvda Myagmar Adam J. Lee William Yurcik  

E-Print Network [OSTI]

Threat Modeling as a Basis for Security Requirements Suvda Myagmar Adam J. Lee William Yurcik. Prior to claiming the security of a system, it is important to iden- tify the threats to the system in question. Enumerating the threats to a system helps system architects develop realis- tic and meaningful

290

High-Level Information Fusion and Mission Planning in Highly Anisotropic Threat Spaces  

E-Print Network [OSTI]

High-Level Information Fusion and Mission Planning in Highly Anisotropic Threat Spaces Mark sharing and high-level information fusion to allow for the visualisation of highly anisotropic threat options. Keywords: Information Fusion, Threat Map, Tactical Planning. 1 Introduction We present a first

Witkowski, Mark

291

Behavioral/Systems/Cognitive Neural Correlates of the Automatic Processing of Threat  

E-Print Network [OSTI]

Behavioral/Systems/Cognitive Neural Correlates of the Automatic Processing of Threat Facial Signals threat. Attention was focused on either scenes or faces presented in a single overlapping display. Facial. These results suggest that automaticity is not funda- mental to the processing of all facial signals of threat

Toronto, University of

292

Workplace Violence Prevention Policy Threats at imminent violence, violent incidents, or dangerous or emergency  

E-Print Network [OSTI]

Workplace Violence Prevention Policy Threats at imminent violence, violent incidents, or dangerous and staff, employees, students and visitors. Violent behavior, threats of violence, or physical intimidation of threatening or violent conduct in the workplace, or who observes such behavior or believes a credible threat

Goldberg, Bennett

293

The Effects of Age and Experience on Drivers Ability to Identify Threats  

E-Print Network [OSTI]

The Effects of Age and Experience on Drivers Ability to Identify Threats Ethan Fisher Professor The purpose of this study was to determine how long it takes for a driver to identify if a threat exists and where the threat is located in a static image. It is known that both older experienced and younger

Mountziaris, T. J.

294

Threats, design limits and design windows for laser IFE dry wall chambers  

E-Print Network [OSTI]

Threats, design limits and design windows for laser IFE dry wall chambers A. Rene´ Raffray-drive targets and a dry wall chamber. The dry wall must accommodate the ion and photon threat spectra from. The neutron energy is deposited deeper in the first wall and blanket and does not represent a major threat

Raffray, A. René

295

Preempting Uncertain Regulatory Threats Thomas P. Lyon and John W. Maxwelly  

E-Print Network [OSTI]

Preempting Uncertain Regulatory Threats Thomas P. Lyon and John W. Maxwelly September 15, 2004 assume certainty regarding the likelihood of the regulatory threat. We examine industry voluntary self and credible regulatory threat is needed to induce industry to take voluntary self-regulatory actions. 1

Lyon, Thomas P.

296

Stopping the Insider Threat: the case for implementing integrated autonomic defense mechanisms in computing systems  

E-Print Network [OSTI]

Stopping the Insider Threat: the case for implementing integrated autonomic defense mechanisms that are inseparable from the systems that are being defended. 1. Introduction Threats to the security of an information system may be initiated from either outside or from within an organization. Detecting such threats

Menascé, Daniel A.

297

Security threats on EPC based RFID systems J. G. Alfaro ,, M. Barbeau, and E. Kranakis  

E-Print Network [OSTI]

Security threats on EPC based RFID systems J. G. Alfaro ,, M. Barbeau, and E. Kranakis Abstract: We present an evaluation of threats on the Radio Frequency IDentification (RFID) system of the Electronic components due to the use of an insecure wireless channel. We analyze the threats according

Garcia-Alfaro, Joaquin

298

Threats to Security in DSRC/WAVE Christine Laurendeau and Michel Barbeau  

E-Print Network [OSTI]

Threats to Security in DSRC/WAVE Christine Laurendeau and Michel Barbeau School of Computer Science be reliable, accurate and confidential. To this end, we propose to identify the security threats inherent in the emerging DSRC Wireless Access in Vehicular Environments (WAVE) architecture. We rank the identified threats

Barbeau, Michel

299

Federal Agency NEPA Implementing Procedures  

Broader source: Energy.gov (indexed) [DOE]

Agency NEPA Implementing Procedures Agency NEPA Implementing Procedures Note: Some Departments' agencies have their own NEPA implementing procedures. To access Department-wide NEPA implementing procedures, click on the name of the Federal Department. To access NEPA implementing procedures for Department's agencies, click on the provided links. Department/ Agency: Division: Link: Department of Agriculture Agricultural Research Service http://www.ecfr.gov/cgi- in/text- idx?c=ecfr&SID=47c103e07fd64e933c7f74c 4b3c4ac9a&rgn=div5&view=text&node=7:6. 1 2 1 8&id 7 Animal and Plant Health Inspection Service http://www.ecfr.gov/cgi-bin/text- idx?c=ecfr&SID=47c103e07fd64e933c7f74c 4b3c4ac9a&rgn=div5&view=text&node=7:5. 1.1.1.21&idno=7 Farm Service Agency http://www.ecfr.gov/cgi-bin/text-

300

Federal Energy Management: Helping Agencies Achieve Savings  

Office of Energy Efficiency and Renewable Energy (EERE)

The Federal Energy Management Program guides and advises agencies on how to use funding more effectively in meeting federal and agency-specific energy goals.

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Property:FundingAgencies | Open Energy Information  

Open Energy Info (EERE)

search Property Name FundingAgencies Property Type Page Retrieved from "http:en.openei.orgwindex.php?titleProperty:FundingAgencies&oldid611377" Categories: Properties NEPA...

302

Energy Agency Coordinators for Energy Action Month  

Broader source: Energy.gov [DOE]

Agency coordinators serve as primary Federal agency points of contact for Energy Action Month. Contact them if you have questions about implementing an Energy Action Month campaign.

303

Mexico - Greenhouse Gas Emissions Baselines and Reduction Potentials from  

Open Energy Info (EERE)

Greenhouse Gas Emissions Baselines and Reduction Potentials from Greenhouse Gas Emissions Baselines and Reduction Potentials from Buildings Jump to: navigation, search Name Mexico - Greenhouse Gas Emissions Baselines and Reduction Potentials from Buildings Agency/Company /Organization United Nations Environment Programme Sector Energy Focus Area Buildings Topics Baseline projection, GHG inventory, Pathways analysis, Background analysis Resource Type Publications Website http://www.unep.org/sbci/pdfs/ Country Mexico Central America References Greenhouse Emissions Baselines and Reduction Potentials for Buildings[1] Mexico - Greenhouse Gas Emissions Baselines and Reduction Potentials from Buildings Screenshot "This report represents the first comprehensive description of the factors that determine the present and future impacts of residential and commercial

304

Presentation 3.1: Report on energy efficient technologies and CO2 reduction potentials in the pulp and paper industry  

E-Print Network [OSTI]

, at the International Energy Agency in Paris. The goal of the workshop is to better quantify the global potentialPresentation 3.1: Report on energy efficient technologies and CO2 reduction potentials in the pulp, and it will imply a fundamental rethinking of the sector's strategy. 251 #12;#12;INTERNATIONAL ENERGY AGENCY AGENCE

305

Federal Energy Management Program: Environmental Protection Agency -  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Environmental Environmental Protection Agency - Edison, New Jersey to someone by E-mail Share Federal Energy Management Program: Environmental Protection Agency - Edison, New Jersey on Facebook Tweet about Federal Energy Management Program: Environmental Protection Agency - Edison, New Jersey on Twitter Bookmark Federal Energy Management Program: Environmental Protection Agency - Edison, New Jersey on Google Bookmark Federal Energy Management Program: Environmental Protection Agency - Edison, New Jersey on Delicious Rank Federal Energy Management Program: Environmental Protection Agency - Edison, New Jersey on Digg Find More places to share Federal Energy Management Program: Environmental Protection Agency - Edison, New Jersey on AddThis.com... Energy-Efficient Products

306

Risks and threats to civilization, humankind, and the earth  

Science Journals Connector (OSTI)

This paper is a brief look at a wide range of risks that are said to present great threats to humankind. It was stimulated by several interacting factors. First, too many books and articles about astrophysical catastrophes, in the scientific and semi-scientific press, give relatively little attention to their timeframe or the measures to anticipate and prepare for them. Second, and most important, is that the overblown effects of 9/11 have distorted the United States of America's perspective and agenda on catastrophes. The result is that billions of dollars have been wasted and attention turned away from threats that could be truly catastrophic for the United States and, in many cases, for the rest of the world. Third, are books that have become popular by raising the threat that what will happen to us will be similar to what happened to earlier societies such as the Maya and the Easter Islanders. Most notably among these is Jared Diamond's Collapse [Jared Diamond, Collapse: How Societies Choose to Fail or Succeed, Penguin Group, 2005]. The failure in these doomsday arguments is to overlook the greater sophistication, knowledge, awareness, monitoring and preparation currently in the United States and in other parts of the globe. The institutional structure and scientific knowledge today would either prevent or deal with the kind of socio-economic decline anticipated by the collapse arguments. In contrast several geophysical and celestial risks do imply global catastrophe. The value of this paper is as broad background to the specific scenario papers that follow. While it leans heavily on the work of others, it offers three new features for the analysis of any extreme risk. First is a scale of devastation, based on deaths. Second is a comprehensive time framenow to the end of the Earth. Third is an outline of general questions that must be addressed for any risk, however large or small, if it is to provide insight into policy choices and promote systemic thinking.

Joseph F. Coates

2009-01-01T23:59:59.000Z

307

Identification of threats using linguistics-based knowledge extraction.  

SciTech Connect (OSTI)

One of the challenges increasingly facing intelligence analysts, along with professionals in many other fields, is the vast amount of data which needs to be reviewed and converted into meaningful information, and ultimately into rational, wise decisions by policy makers. The advent of the world wide web (WWW) has magnified this challenge. A key hypothesis which has guided us is that threats come from ideas (or ideology), and ideas are almost always put into writing before the threats materialize. While in the past the 'writing' might have taken the form of pamphlets or books, today's medium of choice is the WWW, precisely because it is a decentralized, flexible, and low-cost method of reaching a wide audience. However, a factor which complicates matters for the analyst is that material published on the WWW may be in any of a large number of languages. In 'Identification of Threats Using Linguistics-Based Knowledge Extraction', we have sought to use Latent Semantic Analysis (LSA) and other similar text analysis techniques to map documents from the WWW, in whatever language they were originally written, to a common language-independent vector-based representation. This then opens up a number of possibilities. First, similar documents can be found across language boundaries. Secondly, a set of documents in multiple languages can be visualized in a graphical representation. These alone offer potentially useful tools and capabilities to the intelligence analyst whose knowledge of foreign languages may be limited. Finally, we can test the over-arching hypothesis--that ideology, and more specifically ideology which represents a threat, can be detected solely from the words which express the ideology--by using the vector-based representation of documents to predict additional features (such as the ideology) within a framework based on supervised learning. In this report, we present the results of a three-year project of the same name. We believe these results clearly demonstrate the general feasibility of an approach such as that outlined above. Nevertheless, there are obstacles which must still be overcome, relating primarily to how 'ideology' should be defined. We discuss these and point to possible solutions.

Chew, Peter A.

2008-09-01T23:59:59.000Z

308

The cyber threat landscape: Challenges and future research directions  

Science Journals Connector (OSTI)

Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain personal and confidential information, as highlighted in this paper. We describe how the Routine Activity Theory can be applied to mitigate these risks by reducing the opportunities for cyber crime to occur, making cyber crime more difficult to commit and by increasing the risks of detection and punishment associated with committing cyber crime. Potential research questions are also identified.

Kim-Kwang Raymond Choo

2011-01-01T23:59:59.000Z

309

FY 2011 Agency Financial Report  

Broader source: Energy.gov (indexed) [DOE]

Foreword Foreword he Reports Consolidation Act of 2000 authorizes Federal agencies, with the Office of Management and Budget's (OMB) concurrence, to consolidate various reports in order to provide performance, financial and related information in a more meaningful and useful format. The Department of Energy (Department or DOE) has chosen an alternative reporting to the consolidated Performance and Accountability Report and instead, produces an Agency Financial Report, an Annual Performance Report and a Summary of Performance and Financial Information, pursuant to the OMB Circular A-136. This reporting approach simplifies and streamlines the performance presentations while utilizing the Internet for providing and leveraging additional performance

310

Designation of Non-Federal Agencies as Cooperating Agencies | Department of  

Broader source: Energy.gov (indexed) [DOE]

Designation of Non-Federal Agencies as Cooperating Agencies Designation of Non-Federal Agencies as Cooperating Agencies Designation of Non-Federal Agencies as Cooperating Agencies This Council on Environmental Quality (CEQ) Memorandum urges agencies to more actively solicit the participation of state, tribal and local governments as cooperating agencies in implementing the environmental impact statement process. The Memorandum refers agencies to existing CEQ guidance on the types of actions and expertise that are relevant in determining appropriate cooperating agencies, and encourages agencies to document their expectations, roles, and responsibilities (including funding). G-CEQ-DesigNonfedCoopAgencies.pdf More Documents & Publications Identifying Non-Federal Cooperating Agencies in Implementing the Procedural

311

Analysis of Threats to the Security of CPC Networks J. G. Alfaro,, M. Barbeau, and E. Kranakis  

E-Print Network [OSTI]

Analysis of Threats to the Security of CPC Networks J. G. Alfaro,, M. Barbeau, and E. Kranakis@scs.carleton.ca, kranakis@scs.carleton.ca Abstract Detecting and responding to security and privacy threats to Electronic of the threats in terms of importance must be done. We present such an evaluation. Our analysis of the threats

Kranakis, Evangelos

312

Analysis of Threats to the Security of EPC Networks J. G. Alfaro,, M. Barbeau, and E. Kranakis  

E-Print Network [OSTI]

Analysis of Threats to the Security of EPC Networks J. G. Alfaro,, M. Barbeau, and E. Kranakis@scs.carleton.ca, kranakis@scs.carleton.ca Abstract Detecting and responding to security and privacy threats to Electronic of the threats in terms of importance must be done. We present such an evaluation. Our analysis of the threats

Garcia-Alfaro, Joaquin

313

Environmental threats to children's health a global problem  

Science Journals Connector (OSTI)

Today's children are exposed to a wide range of environmental threats, whose consequences on health and development may appear early in life, throughout their youth and even later, in adulthood. Health problems linked to environmental hazards are multiplying and becoming more visible due to a rapidly changing environment, rapid population growth, overcrowding, fast industrialisation and uncontrolled pollution from many anthropogenic and also natural sources, and as a result of the effects of climate change. A World Health Organization report on the global burden of disease estimated that nearly a quarter of the global disease burden is related to environmental causes. These environmental-mediated diseases cause more than three million deaths in children under five every year. Such a large burden is unacceptable. Both industrialised and developing countries should reinforce their capacities to assess the environmental burden of paediatric diseases and characterise their impact on children's health. This will enable all responsible sectors to distinguish the main environmental threats affecting children's health and identify their specific roles in improving children's environments. Implementing these activities and turning efforts into prevention, education, policy-making and other actions will reduce the burden of disease affecting children globally, therefore contributing towards achieving the Millennium Development Goals (MDGs).

Maria Neira; Fiona Gore; Marie-Noel Brune; Tom Hudson; Jenny Pronczuk de Garbino

2008-01-01T23:59:59.000Z

314

A Risk Management Approach to the "Insider Threat"  

SciTech Connect (OSTI)

Abstract Recent surveys indicate that the financial impact and operating losses due to insider intrusions are increasing. But these studies often disagree on what constitutes an insider; indeed, many define it only implicitly. In theory, appropriate selection of, and enforcement of, properly specified security policies should prevent legitimate users from abusing their access to computer systems, information, and other resources. However, even if policies could be expressed precisely, the natural mapping between the natural language expression of a security policy, and the expression of that policy in a form that can be implemented on a computer system or network, creates gaps in enforcement. This paper defines insider precisely, in terms of these gaps, and explores an access-based model for analyzing threats that include those usually termed insider threats. This model enables an organization to order its resources based on the business value for that resource and of the information it contains. By identifying those users with access to high-value resources, we obtain an ordered list of users who can cause the greatest amount of damage. Concurrently with this, we examine psychological indicators in order to determine which users are at the greatest risk of acting inappropriately.We conclude by examining how to merge this model with one of forensic logging and auditing.

Bishop, Matt; Engle, Sophie J.; Frincke, Deborah A.; Gates, Carrie; Greitzer, Frank L.; Peisert, Sean; Whalen, Sean

2010-09-01T23:59:59.000Z

315

SunLine Transit Agency  

Broader source: Energy.gov [DOE]

SunLine Transit Agency provides public transit and community services to California's Coachella Valley. The service area is more than 1,100 square miles and includes nine member cities, as well as Riverside County. Over the years, SunLine has pursued an aggressive strategy for implementing clean technologies into its fleet.

316

Evaluate Greenhouse Gas Reduction Strategies for Employee Commuting |  

Broader source: Energy.gov (indexed) [DOE]

Employee Commuting Employee Commuting Evaluate Greenhouse Gas Reduction Strategies for Employee Commuting October 7, 2013 - 2:25pm Addthis YOU ARE HERE Step 3 This section will help agencies to determine the most visible alternatives to single occupancy vehicle (SOV) commuting at the agencies major worksites establish the number of employees that may reasonably switch to non-SOV methods and estimate the resulting impact greenhouse gas (GHG) emissions at their worksites. Learn how to: Identify relevant alternatives and supporting strategies Evaluate potential adoption of alternatives Estimate the GHG emission impact Identify Employee Commuting Alternatives Alternative employee commuting approaches for Federal agency consideration include both alternative travel methods and alternative work arrangements.

317

Chapter 1 - Social engineering: The ultimate low tech hacking threat  

Science Journals Connector (OSTI)

Publisher Summary This chapter presents various social engineering topics, from understanding the minds of hackers and victims to methods for protecting personal, household and business information from theft and destruction. Social engineering has become the low tech hacker's most valuable and effective tool. The bad guys have continued to use the art of the con to gain access to intellectual property and if necessary the buildings that house that property. In this chapter, several examples illustrate how social engineering attacks happen in homes and businesses, and possible measures to prevent them. Today, every area of concern with security involves managing the risks associated with staying safe and secure. Most of the social engineering tools come from yard sales, thrift stores, flea markets, pawn shops, and Internet. This ranges from hats, jackets with corporate logos, tool belts, tools, listening devices, briefcases, spyware, and locks that can be used quite effectively for social engineering. The overall sneakiness of the threats associated with social engineering make it very easy for social engineers to catch anyone off guard. Several useful risk management countermeasures against social engineering are also described in the chapter. Social engineering is not a new phenomenon. Yet, it is still one of the most effective outsider-insider threats to any security plan. Despite valiant attempts by corporations to manage risk by not becoming victims of social engineering attacks, it is often far too easy for hackers to use the art of the con to gain access to intellectual property and to the buildings housing that property. This chapter explores the phenomenon of social engineering and explains why it is the ultimate low tech hacking threat. The chapter begins by explaining what social engineering is and how easy it is to pull off. Next, it digs into the minds of a social engineering attacker and a victim of an attack, and covers some of the more popular tools of the trade. The chapter also includes interviews with specialists in technical security issues, and closes with a few countermeasures associated with social engineering.

Jack Wiles; Terry Gudaitis; Jennifer Jabbusch; Russ Rogers; Sean Lowther

2012-01-01T23:59:59.000Z

318

E-Print Network 3.0 - agency agence spatiale Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Amigoni* Summary: 1 AN ALGEBRAIC DESCRIPTION OF AGENCY DESIGN Francesco Amigoni* , Mauro Villa** Politecnico di... system, also called agency. In particular, we formally...

319

AGENCY:  

Broader source: Energy.gov (indexed) [DOE]

Western Area Power Administration Western Area Power Administration Desert Southwest Customer Service Region P.O. Box 6457 Phoenix, AZ 85005-6457 FINDING OF NO SIGNIFICANT IMPACT Townsite Solar Project Transmission Line Clark County, Nevada DOE/EA-1960 AND ADOPTION OF U.S. BUREAU OF LAND MANAGEMENT ENVIRONMENT AL ASSESSMENT (DOI-BLM-NV-SOl0-2013-0052-EA) U.S. Department of Energy, Western Area Power Administration ACTION: Adoption of an Environmental Assessment and Issuance of a Finding of No Significant Impact BACKGROUND: U.S. Department of Energy (DOE), Western Area Power Administration (Western) is responding to an interconnection and land grant request by KOWEPO America (KOAM) for the Townsite Solar Power facility and a 2.75-mile-long, 230-kV generation tie line from the facility to Western's Mead

320

AGENCY:  

Broader source: Energy.gov (indexed) [DOE]

Oak Ridge Office Oak Ridge Office P.O. Box 2001 Oak Ridge, Tennessee 37831 FINDING OF NO SIGNIFICANT IMPACT AND NOTICE OF INTENT TO ADOPT THE NATIONAL SCIENCE FOUNDATION ENVIRONMENTAL ASSESSMENT FOR THE NATIONAL ECOLOGICAL OBSERVATION NETWORK United States (U.S.) Department of Energy (DOE) ACTION: Finding of No Significant Impact (FONSI) and Notice of Intent to Adopt the National Science Foundation (NSF) Environmental Assessment (EA) for the National Ecological Observation Network (NEON) SUMMARY: In accordance with the National Environmental Policy Act of 1969 (NEPA) (42 U.S. Code 4321 et seq), the U.S. Council on Environmental Quality (CEQ) regulations (40 Code of Federal Regulations [CFR] Parts 1500-1508), and 45 CFR Part 640 for NSF's compliance with NEPA, the NSF completed an EA, dated November 16, 2009, for the National Ecological

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Game Theoretic Evaluation of Threat Detection Problems-The Central Role of the Adversary  

SciTech Connect (OSTI)

A wide variety of security problems hinge on the detection of threats and discrimination of threats from innocuous objects. The theory that frames these problems is common among medical diagnostics, radar and sonar imaging, and detection of radiological, chemical, and biological agents. In many of these problems, the nature of the threat is subject to control by a malicious adversary, and the choice of a reference (or "design basis") threat is a very diffcult, and often intractable, aspect of the problem. It is this class of problems that this report considers.

Heasler, Patrick G.; Wood, Thomas W.; Reichmuth, Barbara A.

2007-01-01T23:59:59.000Z

322

Agency Datasets | Data.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Networx Business Volume_FY2011_1st Qtr Networx Business Volume_FY2011_1st Qtr The dataset represents the Networx Universal and Enterprise business volume by contractor, agency, contract vehicle and month for the centralized billing account. This represents the business volume of each government agency that has ordered telecommunications services from the Networx contract. GSA Information and Communications Combined Federal Campaign, CFC, 2009 Information on donor contributions through the 2010 Combined Federal Campaign by local campaign. Data includes information on the number of donors, campaign costs, payroll deduction contributions, and recipient organizations. GSA Population Combined Federal Campaign, CFC, 2010 Information on donor contributions through the 2010 Combined Federal Campaign by local campaign. Data includes information on the number of donors, campaign costs, payroll deduction contributions, and recipient organizations.

323

State Agency Recovery Act Funding  

Broader source: Energy.gov (indexed) [DOE]

Agency Agency Recovery Act Funding .Alabama Alabama Public Service Commission $868,824 .Alaska Regulatory Commission of Alaska $767,493 .Arizona Arizona Corporation Commission $915,679 .Arkansas Arkansas Public Service Commission $822,779 .California California Public Utilities Commission $1,686,869 .Colorado The Public Utilities Commission of the State of Colorado $875,899 .Connecticut Connecticut Department of Public Utility Control $839,241 .Delaware Delaware Public Service Commission $772,254 .District of Columbia Public Service Commission of the District of Columbia $765,085 .Florida Florida Public Service Commission $1,217,160 .Georgia Georgia Public Service Commission $996,874 .Hawaii Hawaii Public Utilities Commission $782,834 .Idaho Idaho Public Utilities Commission $788,840 .Illinois

324

Chapter Five - Hazards and Threats to a Pipeline System  

Science Journals Connector (OSTI)

Abstract It is important to understand what the threats are that raise the risk probability in a pipeline system and how to assess them. External corrosion on a pipeline could be from microbiological (MIC), galvanic action or electrochemical reaction, where the steel pipe becomes an anode in an electrochemical cell. External corrosion direct assessment (ECDA) is a structured process that is intended to improve safety by assessing and reducing the impact of external corrosion on a pipeline. Other tools for assessing external corrosion are direct current voltage gradient (DCVG), CIP, ILI using intelligent pigging, and pressure testing. Use of guided wave ultrasonic testing (GWUT) as an alternative tool for ECDA has been promoted and sometimes used.

Ramesh Singh

2014-01-01T23:59:59.000Z

325

High tech criminal threats to the national information infrastructure  

Science Journals Connector (OSTI)

National information infrastructure (NII), vital to the nation's security and economic stability, comprises both physical and electronic infrastructures. Information and communications technologies (ICT) form the backbone of many aspects of the NII and reliance on ICT has created many new risks. Cyberthreats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. This paper examines the technology-related risks associated with the NII and provides examples of existing incidents and areas in which new threats might emerge. To be able to mitigate these risks, it remains crucial to understand infrastructure interdependencies and to establish public-private partnerships to ensure that weaknesses in systems are not able to be exploited.

Kim-Kwang Raymond Choo

2010-01-01T23:59:59.000Z

326

No Significant Impact Effluent Reduction Los Alamos National Laboratory  

Broader source: Energy.gov (indexed) [DOE]

Finding of Finding of No Significant Impact Effluent Reduction Los Alamos National Laboratory Los Alamos, New Mexico U. S. Department of Energy Los Alamos Area Office 528 35th Street Los Alamos, NM 87544 DEPARTMENT OF ENERGY FINDING OF NO SIGNIFICANT IMPACT EFFLUENT REDUCTION LOS ALAMOS NATIONAL LABORATORY EFFLUENT REDUCTION FINAL ENVIRONMENTAL ASSESSMENT: The Environmental Assessment (EA) for Effluent Reduction (DOE/EA-1156) (attached) briefly provides sufficient evidence and analysis t o determine that a finding of no significant impact is appropriate for this action. The EA documents the evidence and analysis in the following chapters: 1. Purpose and Need for Agency Action; 2. Description of Alternatives; 3. Affected Environment and Environmental Consequences; 4. Abnormal Events; 5. Agencies

327

Agency Energy Coordinators for Award Nominations  

Broader source: Energy.gov [DOE]

Federal agency energy coordinators handle all nominations for the Federal Energy and Water Management Awards. Contact your agency energy coordinator well in advance of all award deadlines to learn...

328

ENVIRONMENTAL PROTECTION AGENCY 40 CFR Part 194  

E-Print Network [OSTI]

characterization measures and quality assurance plans before allowing other waste generator sites to ship waste Disposal Regulations: Certification Decision AGENCY: Environmental Protection Agency. ACTION: Proposed rule E. Assurance Requirements F. Waste Acceptance Criteria G. Background Radiation H. Topographic Maps I

329

Chicago Metropolitan Agency for Planning Data Dashboard  

Broader source: Energy.gov [DOE]

The data dashboard for Chicago Metropolitan Agency for Planning, a partner in the Better Buildings Neighborhood Program.

330

Advanced Research Projects Agency - Energy | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Advanced Research Projects Agency - Energy Advanced Research Projects Agency - Energy recovery act Advanced Research Projects Agency - Energy More Documents & Publications Advanced...

331

Japan International Cooperation Agency (JICA) | Open Energy Informatio...  

Open Energy Info (EERE)

International Cooperation Agency (JICA) Jump to: navigation, search Logo: Japan International Cooperation Agency (JICA) Name: Japan International Cooperation Agency (JICA) Address:...

332

Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid  

E-Print Network [OSTI]

Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid Zhuo Lu Park, NC 27709 Email: cliff.wang@us.army.mil Abstract--The smart grid, generally referred in the smart grid. In this paper, we aim at classifying and evaluating the security threats

Wang, Wenye

333

Climate change is one of the greatest threats facing us today. CICERO's mission  

E-Print Network [OSTI]

Climate change is one of the greatest threats facing us today. CICERO's mission is to provide reliable and comprehensive knowledge about all aspects of the climate change problem. Foto: Scanpix #12;Climate change is one of the greatest threats facing us today. CICERO's mission is to provide reliable

Johansen, Tom Henning

334

NOM's National Marine Fisheries Service (NMFS) is working to reduce these threats to  

E-Print Network [OSTI]

NOM's National Marine Fisheries Service (NMFS) is working to reduce these threats to help conserve threats to marine turtles, NMFS and the U.S. Fish and Wildlife Service have developed recovery plans you see turtles and/or jellyfish at the surface, slow down and ma¡nta¡n a ded¡cated lookout. 0 Wear

335

Advanced Persistent Threat: Understanding the Danger and How to Protect Your Organization, 1st edition  

Science Journals Connector (OSTI)

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue ...

Eric Cole

2012-12-01T23:59:59.000Z

336

A threat taxonomy for mHealth privacy Institute for Security, Technology, and Society  

E-Print Network [OSTI]

A threat taxonomy for mHealth privacy David Kotz Institute for Security, Technology, and Society and to manage medical conditions. In this paper, we examine the privacy-related threats to these so-called mHealth that could support privacy-sensitive mHealth systems. We conclude with a brief summary of research challenges

337

An outcome-based learning model to identify emerging threats : experimental and simulation results.  

SciTech Connect (OSTI)

The authors present experimental and simulation results of an outcome-based learning model as it applies to the identification of emerging threats. This model integrates judgment, decision making, and learning theories to provide an integrated framework for the behavioral study of emerging threats.

Martinez-Moyano, I. J.; Conrad, S. H.; Andersen, D. F.; Decision and Information Sciences; SNL; Univ. at Albany

2007-01-01T23:59:59.000Z

338

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems  

E-Print Network [OSTI]

iLOC: An invisible LOCalization Attack to Internet Threat Monitoring Systems Xun Wang, Wei Yu, Xinwen Fu, Dong Xuan and Wei Zhao Abstract--In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack, which can accurately and invisibly localize monitors of Internet threat monitoring

Xuan, Dong

339

Agency Financial Reports | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Agency Financial Reports Agency Financial Reports Agency Financial Reports The Reports Consolidation Act of 2000 authorizes Federal agencies, with the Office of Management and Budget's (OMB) concurrence, to consolidate various reports in order to provide performance, financial and related information in a more meaningful and useful format. The Department of Energy (Department or DOE) has chosen an alternative reporting to the consolidated Performance and Accountability Report and instead, produces an Agency Financial Report, an Annual Performance Report and a Summary of Performance and Financial Information, pursuant to the OMB Circular A-136. This reporting approach simplifies and streamlines the performance presentations while utilizing the Internet for providing and leveraging

340

Agency Financial Reports | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Agency Financial Reports Agency Financial Reports Agency Financial Reports The Reports Consolidation Act of 2000 authorizes Federal agencies, with the Office of Management and Budget's (OMB) concurrence, to consolidate various reports in order to provide performance, financial and related information in a more meaningful and useful format. The Department of Energy (Department or DOE) has chosen an alternative reporting to the consolidated Performance and Accountability Report and instead, produces an Agency Financial Report, an Annual Performance Report and a Summary of Performance and Financial Information, pursuant to the OMB Circular A-136. This reporting approach simplifies and streamlines the performance presentations while utilizing the Internet for providing and leveraging

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Federal Agency Participation | Data.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Federal Agency Participation Federal Agency Participation This report is also available for download in the following formats: CSV | EXCEL Data last updated on 01/04/2014 12:16 AM. Agencies and Subagencies 175 Departments/Agencies/Organizations Agency/Sub-Agency/Organization Datasets Latest Entry Department of Agriculture 294 2014-01-02 Agricultural Marketing Service 60 2014-01-02 Agricultural Research Service 43 2014-01-02 Animal and Plant Health Inspection Service 3 2014-01-02 Departmental Management 1 2014-01-02 Economic Research Service 45 2014-01-02 Farm Service Agency 58 2014-01-02 Food Safety and Inspection Service 2 2014-01-02 Food and Nutrition Service 12 2014-01-02 Foreign Agricultural Service 8 2014-01-02 National Agricultural Statistics Service 5 2014-01-02

342

Federal Agency Participation | Data.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Federal Agency Participation Federal Agency Participation This report is also available for download in the following formats: CSV | EXCEL Data last updated on 01/11/2014 4:56 AM. Agencies and Subagencies 174 Departments/Agencies/Organizations Agency/Sub-Agency/Organization Datasets Latest Entry Department of Agriculture 242 2014-01-10 Agricultural Marketing Service 60 2014-01-10 Agricultural Research Service 43 2014-01-10 Animal and Plant Health Inspection Service 3 2014-01-10 Departmental Management 1 2014-01-10 Economic Research Service 45 2014-01-10 Farm Service Agency 58 2014-01-10 Food Safety and Inspection Service 2 2014-01-10 Food and Nutrition Service 12 2014-01-10 Foreign Agricultural Service 8 2014-01-10 National Agricultural Statistics Service 5 2014-01-10

343

FY 2012 Agency Financial Report  

Broader source: Energy.gov (indexed) [DOE]

in order to provide performance, financial in order to provide performance, financial and related information in a more meaningful and useful format. The Department of Energy (Department or DOE), has chosen an alternative reporting to the consolidated Performance and Accountability Report and instead, produces an Agency Financial Report, an Annual Performance Report and a Summary of Performance and Financial Information, pursuant to the OMB Circular A-136. This reporting approach simplifies and streamlines the performance presentations while utilizing the Internet for providing and leveraging additional performance information. The Department's fiscal year (FY) 2012 reporting includes the following three components and will be available at the website below, as each component

344

Topeka, Kansas, Flood Damage Reduction Project 30 January 2009  

E-Print Network [OSTI]

with and approved by the necessary resource agencies. The long-term environmental and cultural consequences of planTopeka, Kansas, Flood Damage Reduction Project 30 January 2009 Abstract: The recommended plan provides for flood risk management and restores the reliability of the Topeka, Kansas, Levee System located

US Army Corps of Engineers

345

UNITED STATES ENVIRONMENTAL PROTECTION AGENCY  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

e'-ä\r., e'-ä\r., a"àT#j UNITED STATES ENVIRONMENTAL PROTECTION AGENCY REGION 6 14,15 ROSS AVENUE, SUITE 1200 DALLAS, TX 752A2-n33 JA¡t 5 20ll cERTrrmD rytAlr- RETIIRN RECETPT REOITESIEn COPY Edward Ziemianski Acting Manager U.S. Department of Energy Carlsbad Field Offïce P.O. Box 3090 Carlsbad, NM 88221 RE: United States Environmental Protection Agency (EPA) Region 6 Response to the Waste Isolation Pilot Plant OVPP) Approval Request to Use Panel 8 to Store and Land Dispose Polychlorinated Biphenyls (PCBs) at the WIPP Fasility located in Carlsbadr New Mexico DearMr. Ziemianski: After review ofthe design and proposed operation ofPanel 8, you are hereby approved to dispose of PCB wastes in Þanel 8 subject to the enclosed Conditions of Afproval. Your letter (dated October 25,2010) qéquested apprgrral to-qse

346

Enzymes responsible for chlorate reduction by Pseudomonas sp. are different from those used for perchlorate reduction by Azospira sp.  

E-Print Network [OSTI]

ability to respire using chlorate under aerobic conditions. The chlorate reductase produced by PDA)chlo- rate] reduction produced by Azospira sp. KJ based on subunit composition and other enzyme properties; Remediation; Respiration 1. Introduction The US Environmental Protection Agency (EPA) estimates

347

Paperwork Reduction Act Submission (OMB 83-I)  

Broader source: Energy.gov (indexed) [DOE]

PA PA PERW ORK REDUCTION A CT SUBM ISSION to: . 1. Agency/Subagency originating request b. None - a. a. a. Regular b. b. / / c. c. Delegated d. e. Yes N o f. a. b. / Yes N o 7. Title (Mark primary with "P" and all others that apply with "X") (Mark primary with "P" and all others that apply with "X") a. d. a. Voluntary b. e. b. c. f. c. % a. b. a. e. c. Reporting b. f. Research 1. 2. 3. c. General purpose statistics g. Regulatory or compliance 4. Quarterly 5. 6. d. 7. Biennially 8. Yes N o Phone: Please read the instructions before completing this form. For additional forms or assistance in completing this form, contact your agency's Paperwork Clearance Officer. Send two copies of this form, the collection instrument to be reviewed, the Supporting Statement, and any additional documentation

348

Assess Potential Agency Size Changes that Impact Greenhouse Gases from Vehicles and Mobile Equipment  

Broader source: Energy.gov [DOE]

Planned changes in a Federal agency's size, missions, transportation needs, and vehicle inventory all impact the strategic portfolio planning efforts that target greenhouse gas (GHG) emissions mitigation for vehicles and mobile equipment. Under Section 142 of the Energy Independence and Security Act (EISA) and Section 8 of Executive Order (E.O.) 13514, agencies are required to develop a plan that will reduce fleet GHG emissions to meet Federally mandated petroleum reduction and alternative fuel increase targets. Agencies can use these plans as a basis for determining potential changes in fleet size and composition and should attempt to harmonize the ongoing development for these plans with GHG strategic portfolio planning efforts. FEMP's E.O. 13514 Section 12 Federal Fleet Management Guidance for Federal Agencies describes in detail the required plan components and strategies for meeting these requirements.

349

The Shanghai Six:The Shanghai Six: Milit Th t E i Alli ?Milit Th t E i Alli ?Military Threat or Economic Alliance?Military Threat or Economic Alliance?  

E-Print Network [OSTI]

or Economic Alliance?Military Threat or Economic Alliance? Anna BrownAnna Brown #12;Maps courtesy of Google

New Hampshire, University of

350

Developing "BUILDING/ FACILITY ENERGY CONSUMPTION DATA SHEET" for Political Subdivisions, Institutions of Higher Education, and State Agencies, to Satisfy Senate Bill 898 (82nd R) Reporting Requirements  

E-Print Network [OSTI]

, the amount of energy savings and estimated reduction in pollution achieved as a result of the implementation of the programs, and then provide the information to the Texas Commission on Environmental Quality, the United States Environmental Protection Agency...

Parker, P.; Baltazar, J.; Haberl, J.; Yazdani, B.; Zilbershtein, G.

2012-01-01T23:59:59.000Z

351

ESMAP-China Energy Intensity Reduction Strategy | Open Energy Information  

Open Energy Info (EERE)

Intensity Reduction Strategy Intensity Reduction Strategy Jump to: navigation, search Name China-ESMAP Low Carbon Growth Country Studies Program Agency/Company /Organization Energy Sector Management Assistance Program of the World Bank Sector Energy, Land Focus Area Energy Efficiency, Renewable Energy, Forestry, Agriculture Topics Low emission development planning, Policies/deployment programs, Background analysis Website http://www.esmap.org/filez/pub Country China Eastern Asia References China Energy Intensity Reduction Strategy[1] Overview "The study involves the development of pragmatic "implementation" focused policy notes to support the Government of China's goal of reducing energy intensity in China focusing on: Reevaluation of renewable energy targets, growth path, and related

352

Human-UAV Coordinated Flight Path Planning of UAV Low-Altitude Penetration on Pop-Up Threats  

Science Journals Connector (OSTI)

Human-UAV coordinated flight path planning of UAV low-altitude penetration on pop-up threats is a key technology achieving manned and ... of the flight path planning on pop-up threats. A lot of simulation studies...

Peng Ren; Xiao-guang Gao; Jun Chen

2014-01-01T23:59:59.000Z

353

Annex A -Potential threats in EU Organism(s) Means of spread Control measures Control approaches being used in  

E-Print Network [OSTI]

Annex A - Potential threats in EU Organism(s) Means of spread Control measures Control approaches options Potential threats in EU keep out, knowledge of trade routes, awareness on nurseries, foresters

354

Open literature review of threats including sabotage and theft of fissile material transport in Japan.  

SciTech Connect (OSTI)

This report is a review of open literature concerning threats including sabotage and theft related to fissile material transport in Japan. It is intended to aid Japanese officials in the development of a design basis threat. This threat includes the external threats of the terrorist, criminal, and extremist, and the insider threats of the disgruntled employee, the employee forced into cooperation via coercion, the psychotic employee, and the criminal employee. Examination of the external terrorist threat considers Japanese demographics, known terrorist groups in Japan, and the international relations of Japan. Demographically, Japan has a relatively homogenous population, both ethnically and religiously. Japan is a relatively peaceful nation, but its history illustrates that it is not immune to terrorism. It has a history of domestic terrorism and the open literature points to the Red Army, Aum Shinrikyo, Chukaku-Ha, and Seikijuku. Japan supports the United States in its war on terrorism and in Iraq, which may make Japan a target for both international and domestic terrorists. Crime appears to remain low in Japan; however sources note that the foreign crime rate is increasing as the number of foreign nationals in the country increases. Antinuclear groups' recent foci have been nuclear reprocessing technology, transportation of MOX fuel, and possible related nuclear proliferation issues. The insider threat is first defined by the threat of the disgruntled employee. This threat can be determined by studying the history of Japan's employment system, where Keiretsu have provided company stability and lifetime employment. Recent economic difficulties and an increase of corporate crime, due to sole reliability on the honor code, have begun to erode employee loyalty.

Cochran, John Russell; Furaus, James Phillip; Marincel, Michelle K.

2005-06-01T23:59:59.000Z

355

Agency datasets monthly list | Data.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Law Enforcement Agency Identifiers Crosswalk, 1996 The crosswalk file is designed to provide geographic and other identification information for each record included in either the Federal Bureau of Investigation's Uniform Crime Reporting (UCR) Program files or in the Bureau of Justice Statistics' Census of State and Local Law Enforcement Agencies (CSLLEA). The main variables each record contains are the alpha state code, county name, place name, government agency name and type, police agency name, government identification number, Federal Information Processing Standards (FIPS) state, county, and place codes, and Originating Agency Identifier (ORI) code. These variables allow a researcher to take agency-level data, combine it with Bureau of the Census and BJS data, and perform place-level and government-level analyses. DOJ BJS Law Enforcement, Courts, and Prisons 2013-05-03 14:51:53

356

INFECTIOUS DISEASE OUTBREAKS Avian Flu, measles, Mumps, SARs, and other infectious diseases can pose a threat to the  

E-Print Network [OSTI]

pose a threat to the University community as they do to communities worldwide. If there is an outbreak has extensive information on these and other health threats on their website (http are appropriate to the emerging threat and ready for implementation. Response team meets with increasing frequency

Meyers, Steven D.

357

Detecting Threat-Related Intentional Actions of Others: Effects of Image Quality, Response Mode, and Target Cuing on Vigilance  

E-Print Network [OSTI]

Detecting Threat-Related Intentional Actions of Others: Effects of Image Quality, Response Mode to detect infrequent threat-related actions. Participants indicated detection of target actions either vigilance task. Irrespective of response mode, the detection rate of intentional threats declined over time

Parasuraman, Raja

358

The CSUF Center for Entrepreneurship and CSUF Center for Family Business present: "Patent Trolls and Other IP-Related Threats  

E-Print Network [OSTI]

and Other IP-Related Threats: How to Protect Your Business from a New Kind of Predator" Mihaylo College trolls, with threats of lawsuits and litigation. At this seminar, panelists Roger N. Behle (IP litigator Other intellectual property threats Current and pending legislation designed to address patent trolling

de Lijser, Peter

359

The nature of threat category changes in three Mediterranean biodiversity hotspots Felipe Domnguez Lozano a,e,  

E-Print Network [OSTI]

The nature of threat category changes in three Mediterranean biodiversity hotspots Felipe Domínguez Conservation assessments Red List Spain Threat analysis Threatened plants IUCN categories Western Australia a b s t r a c t Step changes in threat category can be quantified and analyzed in relation to reasons

Moreno Saiz, Juan Carlos

360

Stereotype Threat Excerpt from Malcolm Gladwell's "The Art of Failure" in the New Yorker, August 21 & 28,  

E-Print Network [OSTI]

Stereotype Threat Excerpt from Malcolm Gladwell's "The Art of Failure" in the New Yorker, August 21 they call "stereotype threat": when black students are put into a situation where they are directly-- the resulting pressure causes their performance to suffer." "Steele and others have found stereotype threat

McMains, Sara

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Threat of Bodily Harm Has Opposing Effects on Cognition Kesong Hu, Andrew Bauer, Srikanth Padmala, and Luiz Pessoa  

E-Print Network [OSTI]

Emotion Threat of Bodily Harm Has Opposing Effects on Cognition Kesong Hu, Andrew Bauer, Srikanth., Bauer, A., Padmala, S., & Pessoa, L. (2011, June 27). Threat of Bodily Harm Has Opposing Effects on Cognition. Emotion. Advance online publication. doi: 10.1037/a0024345 #12;Threat of Bodily Harm Has Opposing

Pessoa, Luiz

362

Distributed Localization of Threats using Sensor PI: I. Schizas (schizas@uta.edu)/ 817 272-3467  

E-Print Network [OSTI]

Distributed Localization of Threats using Sensor Nets PI: I. Schizas (schizas@uta.edu)/ 817 272 AT ARLINGTON Technical barriers/problems: · Utilize sensor networks to locate threats · Develop distributed algorithms · Limited power resources in sensors · Threats unpredictable both spatially and temporally

Texas at Arlington, University of

363

The versatility of graded acoustic measures in classification of predation threats by the tufted titmouse Baeolophus bicolor  

E-Print Network [OSTI]

The versatility of graded acoustic measures in classification of predation threats by the tufted titmouse Baeolophus bicolor: exploring a mixed framework for threat communication Kathryn E. Sieving-based' alarms encode graded or ranked threat-levels by varying the production patterns of the same call types

Sieving, Kathryn E.

364

Stereotype Threat Reinterpreted as a Regulatory Mismatch Lisa R. Grimm, Arthur B. Markman, W. Todd Maddox, and Grant C. Baldwin  

E-Print Network [OSTI]

Stereotype Threat Reinterpreted as a Regulatory Mismatch Lisa R. Grimm, Arthur B. Markman, W. Todd of strands of work to identify causes of stereotype threat in a way that allows them to reverse the effects. This work suggests that stereotype threat effects emerge from a prevention focus combined with tasks

Maddox, W. Todd

365

34.07.99.M0.02 Bomb Threat Procedures Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE  

E-Print Network [OSTI]

34.07.99.M0.02 Bomb Threat Procedures Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 34.07.99.M0 4, 2016 Standard Administrative Procedure Statement Any and all bomb threats are regarded seriously. 2. ADDITIONAL NOTIFICATION AND EVALUATION 2.1 Upon receipt of a bomb threat to a particular building

366

Fact Sheet: Detection and Analysis of Threats to the Energy Sector (DATES)  

Broader source: Energy.gov (indexed) [DOE]

Detection and Analysis of Threats Detection and Analysis of Threats to the Energy Sector (DATES) A groundbreaking integrated capability in intrusion detection, security event management, and sector-wide threat analysis Detecting cyber attacks against digital control systems quickly and accurately is essential to energy sector security. Current intrusion detection systems (IDS) continuously scan control system communication paths and alert operators of suspicious network traffic. But existing IDS, often not tailored to the control environment, typically offer limited attack response capability and frequently produce false alarms or fail to alert. Without carefully deployed monitoring, these devices can produce an overwhelming number of alarms

367

Coupling Multi-Criteria Decision Analysis, Life-Cycle Assessment, and Risk Assessment for Emerging Threats  

Science Journals Connector (OSTI)

Coupling Multi-Criteria Decision Analysis, Life-Cycle Assessment, and Risk Assessment for Emerging Threats ... Emerging environmental threats such as novel chemical compounds, biological agents, and nanomaterials present serious challenges to traditional models of risk analysis and regulatory risk management processes. ... The recent emergence of new materials, technologies, and other environmental stressors in both the marketplace and the public consciousness coincides with increased recognition of the importance of an integrated systems approach to environmental health and safety that includes life-cycle thinking, public participation, and adaptive management of risks associated with emerging threats. ...

Igor Linkov; Thomas P. Seager

2011-04-27T23:59:59.000Z

368

State Agency Loan Program | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

State Agency Loan Program State Agency Loan Program State Agency Loan Program < Back Eligibility State Government Savings Category Heating & Cooling Commercial Heating & Cooling Heating Cooling Other Construction Appliances & Electronics Commercial Lighting Lighting Home Weatherization Commercial Weatherization Solar Windows, Doors, & Skylights Buying & Making Electricity Swimming Pool Heaters Water Heating Wind Program Info Funding Source Oil Overcharge Restitution Trust funds, RGGI, ARRA State Maryland Program Type State Loan Program Rebate Amount Varies, typical loans from $50,000 - $250,000 Provider Maryland Energy Administration The State Agency Loan Program (SALP) was established in 1991 using funds from the Energy Overcharge Restitution Fund. Through this revolving loan

369

Environmental Protection Agency | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Environmental Protection Agency Environmental Protection Agency Environmental Protection Agency Selected documents prepared by the Environmental Protection Agency that provide guidance on the NEPA process August 24, 2012 EPA -- Amended Environmental Impact Statement Filing System Guidance Amended Environmental Impact Statement Filing System Guidance for Implementing 40 CFR 1506.9 and 1506.10 of the Council on Environmental Quality's Regulations Implementing the National Environmental Policy Act August 1, 2012 EPA -- Addressing Children's Health through Reviews Conducted Pursuant to the National Environmental Policy Act and Section 309 of the Clean Air Act Addressing Children's Health through Reviews Conducted Pursuant to the National Environmental Policy Act and Section 309 of the Clean Air Act

370

AGENCY: National Nuclear Security Administration (NNSA)  

National Nuclear Security Administration (NNSA)

Department of Natural Resources, Missouri State Historic Preservation Office, U.S. Fish and Wildlife Service, U.S. Environmental Protection Agency Region 7, local...

371

International Energy Agency (IEA) | Open Energy Information  

Open Energy Info (EERE)

International Energy Agency, headquartered in Paris, France, acts as an energy policy advisor for the governments of its 28 member countries including: Australia, Austria,...

372

Proposed Agency Information Collection: Federal Register Notice...  

Broader source: Energy.gov (indexed) [DOE]

54 - Aug. 10, 2011 Proposed Agency Information Collection: Federal Register Notice Volume 76, No. 154 - Aug. 10, 2011 The Department of Energy (DOE) invites public comment on DOE's...

373

Proposed Agency Information Collection: Federal Register Notice...  

Broader source: Energy.gov (indexed) [DOE]

95 - Oct. 7, 2011 Proposed Agency Information Collection: Federal Register Notice Volume 76, No. 195 - Oct. 7, 2011 The Department of Energy (DOE) invites public comment on DOE's...

374

Illinois Municipal Electric Agency- Electric Efficiency Program  

Broader source: Energy.gov [DOE]

The Illinois Municipal Electric Agency (IMEA) offers rebates to member municipal utilities* (those who purchase wholesale electric service from IMEA) and retail customers for energy efficiency...

375

Connecting Sustainability to the Agency's Mission | Department...  

Broader source: Energy.gov (indexed) [DOE]

Sustainability to the Agency's Mission Fact sheet describes a case study on the U.S. Fish and Wildlife Service (FWS) Energy Management Program's mission to increase energy...

376

Energy for Poverty Reduction and Sustainable Development: UNDP Energy  

Open Energy Info (EERE)

Energy for Poverty Reduction and Sustainable Development: UNDP Energy Energy for Poverty Reduction and Sustainable Development: UNDP Energy Documents and Publications Catalogue Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Energy for Poverty Reduction and Sustainable Development: UNDP Energy Documents and Publications Catalogue Agency/Company /Organization: United Nations Development Programme (UNDP) Sector: Energy Focus Area: Renewable Energy, Economic Development, Energy Efficiency Phase: Create a Vision Topics: - Energy Access Resource Type: Publications User Interface: Website Website: www.undp.org/energy/docs/Catalogue-Energy%20for%20Poverty%20Reduction% Cost: Free Language: English This catalogue contains documents produced over the past decade by UNDP together with its partners in the area of energy for poverty reduction and

377

Evaluate Greenhouse Gas Reduction Strategies Using Renewable Energy in  

Broader source: Energy.gov (indexed) [DOE]

Evaluate Greenhouse Gas Reduction Strategies Using Renewable Energy Evaluate Greenhouse Gas Reduction Strategies Using Renewable Energy in Buildings Evaluate Greenhouse Gas Reduction Strategies Using Renewable Energy in Buildings October 7, 2013 - 11:23am Addthis Once Federal sites have been screened for viability of different renewable energy resources to evaluate emissions profile, the next step is to establish what renewable energy resources developed at which particular sites would have the greatest impact on the agency's overall greenhouse gas (GHG) emissions goals. It is important to consider that some types of renewable energy generation could impact not only Scope 1 and 2 GHG goals, but also Scope 3 goals through avoided transmission and distribution losses. Estimate Greenhouse Gas Reduction Potential It is important to note that solar systems can have the greatest reduction

378

South Africa - Greenhouse Gas Emission Baselines and Reduction Potentials  

Open Energy Info (EERE)

Africa - Greenhouse Gas Emission Baselines and Reduction Potentials Africa - Greenhouse Gas Emission Baselines and Reduction Potentials from Buildings Jump to: navigation, search Name South Africa - Greenhouse Gas Emission Baselines and Reduction Potentials from Buildings Agency/Company /Organization United Nations Environment Programme Sector Energy Focus Area Buildings Topics Baseline projection, GHG inventory, Pathways analysis, Background analysis Resource Type Publications Website http://www.unep.org/sbci/pdfs/ Country South Africa UN Region Southern Africa References South Africa - Greenhouse Gas Emission Baselines and Reduction Potentials from Buildings[1] South Africa - Greenhouse Gas Emission Baselines and Reduction Potentials from Buildings Screenshot "This report aims to provide: a summary quantification of the influence of buildings on climate

379

Estimate Greenhouse Gas Reduction Potential and Cost-Effectiveness of  

Broader source: Energy.gov (indexed) [DOE]

Greenhouse Gas Reduction Potential and Cost-Effectiveness Greenhouse Gas Reduction Potential and Cost-Effectiveness of Strategies for Vehicles and Mobile Equipment Estimate Greenhouse Gas Reduction Potential and Cost-Effectiveness of Strategies for Vehicles and Mobile Equipment October 7, 2013 - 11:58am Addthis YOU ARE HERE: Step 3 After identifying petroleum reduction strategies, a Federal agency should estimate the greenhouse gas (GHG) reduction potential and cost effectiveness of these strategies for vehicles and mobile equipment. The table below provides steps for identifying optimal vehicle acquisition strategies. Table 1. Framework for Identifying Optimal Vehicle Acquisition Strategies Step Summary Purpose PLAN and COLLECT 1 Determine vehicle acquisition requirements Establish a structured Vehicle Allocation Matrix (VAM) to determine the numbers and types of vehicles required to accomplish your fleet's mission

380

Methodology for Estimating Reductions of GHG Emissions from Mosaic  

Open Energy Info (EERE)

Methodology for Estimating Reductions of GHG Emissions from Mosaic Methodology for Estimating Reductions of GHG Emissions from Mosaic Deforestation Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Methodology for Estimating Reductions of GHG Emissions from Mosaic Deforestation Agency/Company /Organization: World Bank Sector: Land Focus Area: Forestry Topics: Co-benefits assessment, GHG inventory, Resource assessment Resource Type: Publications Website: wbcarbonfinance.org/docs/REDD_Mosaic_Methodology.pdf Methodology for Estimating Reductions of GHG Emissions from Mosaic Deforestation Screenshot References: Methodology for Estimating Reductions of GHG Emissions from Mosaic Deforestation[1] Overview "This methodology is for project activities that reduce emissions of greenhouse gases (GHG) from mosaic deforestation and, where relevant and

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

DOE Program Resources and Tools for Petroleum Reduction in the  

Open Energy Info (EERE)

DOE Program Resources and Tools for Petroleum Reduction in the DOE Program Resources and Tools for Petroleum Reduction in the Transportation Sector Webinar Jump to: navigation, search Tool Summary Name: DOE Program Resources and Tools for Petroleum Reduction in the Transportation Sector Agency/Company /Organization: National Renewable Energy Laboratory Partner: United States Department of Energy Sector: Energy Focus Area: Transportation Topics: Co-benefits assessment Resource Type: Webinar, Guide/manual, Training materials References: DOE Program Resources and Tools for Petroleum Reduction in the Transportation Sector[1] Logo: DOE Program Resources and Tools for Petroleum Reduction in the Transportation Sector Sponsored by the U.S. Department of Energy Technical Assistance Project for state and local officials, this Webinar discussed the resources and tools

382

FACT SHEET: Homeland Security Partner Agencies (Page 1 of 2) Agency Project  

E-Print Network [OSTI]

FACT SHEET: Homeland Security Partner Agencies (Page 1 of 2) Agency Project US Department Liberty International Airport. US Department of Homeland Security - - Office of Intelligence and Analysis Project US Army - - Tank and Automotive Research, Development and Engineering Center Mobile Computing

383

Extra-terrestrial life in the European Space Agencys Cosmic Vision plan and beyond  

Science Journals Connector (OSTI)

...Royal Society 13 February 2011 review-article Articles 1000 8 71...Space Agencys Cosmic Vision plan and beyond Malcolm Fridlund...programme. Following favourable reviews by ESAs scientific advisory...Space Agency's Cosmic Vision plan and beyond. | Our exciting...

2011-01-01T23:59:59.000Z

384

Detecting Nuclear Threats | U.S. DOE Office of Science (SC)  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Detecting Nuclear Threats Detecting Nuclear Threats Stories of Discovery & Innovation Detecting Nuclear Threats Enlarge Photo Photo: Denise Applewhite The MINDS device was invented by a team of engineers at the Princeton Plasma Physics Laboratory, including, from left: Kenny Silber, Henry Carnevale, Charles Gentile, Dana Mastrovito, and Bill Davis. Enlarge Photo 03.28.11 Detecting Nuclear Threats Plasma physics challenge yields portable nuclear detector for homeland security. In 1999, faced with the task of decommissioning the legendary Tokamak Fusion Test Reactor (TFTR), officials at the U.S. Department of Energy's Princeton Plasma Physics Laboratory (PPPL) realized they needed something that didn't yet exist-a non-destructive, real time device to detect certain "hot" elements lacing the inner vessel of the doughnut-

385

Integrating species traits with extrinsic threats: closing the gap between predicting and preventing species declines  

Science Journals Connector (OSTI)

...Centre for Plant Biodiversity...the Amphibian Disease Ecology Group...this pandemic disease [13]. Nevertheless...key threats (disease, invasive...to powerful prediction of species...the field of machine learning [29], for...

2011-01-01T23:59:59.000Z

386

Natural and Human Threats to Biodiversity in the Marine Ecosystem of Coastal Pakistan  

Science Journals Connector (OSTI)

There exist several natural and made-made threats to biodiversity along the coast of Pakistan. Natural stresses include high wave action, high temperatures and salinity, and seasonal spread of oxygen-poor wate...

Muzammil Ahmad

1997-01-01T23:59:59.000Z

387

Agriculture, Ecosystems and Environment 84 (2001) 120 Economic and environmental threats of alien plant,  

E-Print Network [OSTI]

Agriculture, Ecosystems and Environment 84 (2001) 1­20 Economic and environmental threats of alien. Precise economic costs associated with some of the most ecologically damaging alien species; Animals; Alien; Economic; Ecology; Environment; Agriculture; Non-indigenous 1. Introduction Quantifying

California at Berkeley, University of

388

Threats to observers, keepers, visitors, and others by zoo mangabeys (Cercocebus galeritus chrysogaster)  

Science Journals Connector (OSTI)

The facial threats of ten captive golden-bellied mangabeys (Cercocebus galeritus chrysogaster...) were categorized by object threatened. Adult males threatened more than did females except when the object was a n...

G. Mitchell; Stephanie D. Obradovich; Fred H. Herring; Brad Dowd

1991-10-01T23:59:59.000Z

389

Environmental Scanning and Knowledge Representation for the Detection of Organised Crime Threats  

Science Journals Connector (OSTI)

...ePOOLICE aims at developing an efficient and effective strategic early warning system that utilises environmental scanning for the early warning and detection of current, emergent and future organised crime threats

Ben Brewster; Simon Andrews; Simon Polovina

2014-01-01T23:59:59.000Z

390

Mitigating Security Threats to Large-Scale Cross Border Virtualization Infrastructures  

Science Journals Connector (OSTI)

The large-scale cross border virtualization infrastructures can be seen as a federation of heterogeneous clouds. We present pragmatic analysis of the potential threats posed to the emerging large-scale cross...in...

Philippe Massonet; Syed Naqvi; Francesco Tusa; Massimo Villari

2010-01-01T23:59:59.000Z

391

Study on Threats to Security of Space TT&C Systems  

Science Journals Connector (OSTI)

A space Tracking, Telemetry and Command (TT&C) system is a spaceflight support system and its security is of great significance. A framework of space TT&C system security threat assessment is proposed and it comp...

Qi Wang; Bo Wang; Bin Wu

2013-01-01T23:59:59.000Z

392

Assessing security threat scenarios for utility-based reputation model in grids  

Science Journals Connector (OSTI)

Trust and reputation models play an important role in enabling trusted computations over large-scale distributed grids. Many models have been recently proposed and implemented within trust management systems. Nevertheless, the existing approaches usually assess performance of models in terms of resource management while less attention is paid to the analysis of security threat scenarios for such models. In this paper, we assess the most important and critical security threats for a utility-based reputation model in grids. The existing model is extended to address these threat scenarios. With simulations that were run using data collected from the EGEE Grid-Observatory project, we analyse efficiency of the utility-based reputation model against these threats.

Olga Kussul; Nataliia Kussul; Sergii Skakun

2013-01-01T23:59:59.000Z

393

Effects of Threats to Self-Esteem and Goal Orientation on Asking for Help.  

E-Print Network [OSTI]

??This paper studied whether threats to self-esteem and goal orientation affected an individual?s propensity to ask for help. Eighty-two undergraduate students from the University of (more)

Chung, Andrew

2006-01-01T23:59:59.000Z

394

Anomaly metrics to differentiate threat sources from benign sources in primary vehicle screening.  

SciTech Connect (OSTI)

Discrimination of benign sources from threat sources at Port of Entries (POE) is of a great importance in efficient screening of cargo and vehicles using Radiation Portal Monitors (RPM). Currently RPM's ability to distinguish these radiological sources is seriously hampered by the energy resolution of the deployed RPMs. As naturally occurring radioactive materials (NORM) are ubiquitous in commerce, false alarms are problematic as they require additional resources in secondary inspection in addition to impacts on commerce. To increase the sensitivity of such detection systems without increasing false alarm rates, alarm metrics need to incorporate the ability to distinguish benign and threat sources. Principal component analysis (PCA) and clustering technique were implemented in the present study. Such techniques were investigated for their potential to lower false alarm rates and/or increase sensitivity to weaker threat sources without loss of specificity. Results of the investigation demonstrated improved sensitivity and specificity in discriminating benign sources from threat sources.

Cohen, Israel Dov; Mengesha, Wondwosen

2011-09-01T23:59:59.000Z

395

Postural threat during walking: effects on energy cost and accompanying gait changes  

Science Journals Connector (OSTI)

Balance control during walking has been shown to involve a metabolic cost in healthy subjects, but it is unclear how this cost changes as a function of postural threat. ... determine the influence of postural thr...

Trienke IJmker; Claudine J Lamoth

2014-04-01T23:59:59.000Z

396

S with 2000 data INTERNATIONAL ENERGY AGENCY  

E-Print Network [OSTI]

on how renewable energy markets are developing in response to policy supports. In producing the report-ordination with Eurostat for European Union member countries, the IEA is now publishing the data from the second yearI E A S T A T I S T I C S with 2000 data INTERNATIONAL ENERGY AGENCY AGENCE INTERNATIONALE DE L'ENERGIE

397

International Atomic Energy Agency safeguards  

SciTech Connect (OSTI)

The International Atomic Energy Agency (IAEA) is unique among international organizations in its use of on-site inspections to verify that States are in compliance with the terms of a negotiated agreement. The legal basis for the inspections is agreements between the IAEA and the State, concluded in the framework of the Nuclear Nonproliferation Treaty, for full scope safeguards on all nuclear materials. In addition, other more limited agreements for safeguards on a portion of a State's nuclear material are also concluded with States not party to the Treaty. In either case, the role of the IAEA is to verify compliance with the terms of these agreements by auditing facility operating records and reports submitted to the IAEA by the State; by independent measurement of nuclear materials by IAEA inspectors; and by emplacement of surveillance devices to monitor facility operations in the inspector's absence. Although IAEA safeguards are applied only to peaceful nuclear activities and do not attempt to control or reduce the numbers of nuclear weapons, there are aspects of the IAEA methods and technology that may be applicable to treaty verification for arms control. Among these aspects are: (1) the form of the IAEA's agreements with States; (2) the IAEA approach to inspection planning; and (3) the instrumentation employed by the IAEA for monitoring facility activities and for measuring nuclear material.

Avenhaus, R.; Markin, J.

1985-01-01T23:59:59.000Z

398

International Energy Agency | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

International Energy Agency International Energy Agency International Energy Agency November 1, 2013 - 11:40am Addthis International Energy Agency logo DOE's market transformation efforts have reached to European and other countries who are part of the international distributed and decentralized energy community. Through its partnership with DOE, the combined heat and power (CHP) program of the International Energy Agency (IEA) conducts research and analysis of CHP markets and deployment efforts around the world and has used lessons learned from U.S. research, development, and deployment efforts to recommend market transformation activities and policies that will lead to new CHP installations worldwide. Addthis Related Articles International District Energy Association Related Links U.S. Clean Heat and Power Association

399

Agency datasets monthly list | Data.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2 United States Government Manual in XML As the official handbook of the Federal Government, the United States Government Manual provides comprehensive information on the agencies of the legislative, judicial, and executive branches. It also includes information on quasi-official agencies; international organizations in which the United States participates; and boards, commissions, and committees. The Manual begins with reprints of the Declaration of Independence and the U.S. Constitution. A typical agency description includes a list of officials heading major operating units, a summary statement of the agency's purpose and role in the Federal Government, a brief history of the agency, including its legislative or executive authority, and a description of its programs and activities, and information, addresses, and phone numbers to help users locate detailed information on consumer activities, contracts and grants, employment, publications, and other matters of public interest. NARA OFR Other 2013-01-10 23:36:43

400

Using Other Agencies' Contracts | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Using Other Agencies' Contracts Using Other Agencies' Contracts Using Other Agencies' Contracts The Department of Energy's (DOE) use of other agencies contracts has increased in recent years. Other agency contracts include Economy Act interagency agreements, Franchise Fund Organizations, Federal Supply Schedule (FSS) and Government-Wide Acquisition Contracts (GWAC). These contracts, where used appropriately, provide DOE with effective vehicles to meet its contract requirements. To take full advantage of benefits that these contracts offer, DOE contracting professionals must ensure that the use of these contracts are in DOE's best interests, meet DOE's delivery, quality and cost requirements, and comply with applicable laws, regulations, and policies. GSA's "Get It Right" campaign has raised the visibility and interest in the

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Launching Agency and Utility Participation and Projects  

Broader source: Energy.gov (indexed) [DOE]

Launching Agency and Utility Launching Agency and Utility Participation and Projects (UESC Lessons Learned & Breaking Down the Barriers) [Direct Assistance] Working Session: Facilitated Group Discussion Cape Canaveral, Florida May 1, 2007 Objectives of this Working Session Outcomes of the San Francisco working session * Increase awareness of UESC vehicles * Better promote FUPWG * Improve communication among partners and stakeholders * Educate key stakeholders * Provide technical assistance to kick-start projects * Reach out to new partners * Make UESC website easier to find Overview of FEMP UESC Assistance Utility Energy Services Contract (UESC) Direct Assistance provides guidance, training and direct support to agencies so that they may accomplish cost effective, sensible, and comprehensive

402

Assessing homeland chemical hazards outside the military gates: industrial hazard threat assessments for department of defense installations  

Science Journals Connector (OSTI)

As part of comprehensive joint medical surveillance measures outlined by the Department of Defense, the US Army Center for Health Promotion and Preventive Medicine (USACHPPM) is beginning to assess environmental health threats to continental US military installations. A common theme in comprehensive joint medical surveillance, in support of Force Health Protection, is the identification and assessment of potential environmental health hazards, and the evaluation and documentation of actual exposures in both a continental US and outside a continental US setting. For the continental US assessments, the USACHPPM has utilized the US Environmental Protection Agency (EPA) database for risk management plans in accordance with Public Law 106-40, and the toxic release inventory database, in a state-of the art geographic information systems based program, termed the Consequence Assessment and Management Tool Set, or CATS, for assessing homeland industrial chemical hazards outside the military gates. As an example, the US EPA toxic release inventory and risk management plans databases are queried to determine the types and locations of industries surrounding a continental US military installation. Contaminants of concern are then ranked with respect to known toxicological and physical hazards, where they are then subject to applicable downwind hazard simulations using applicable meteorological and climatological data sets. The composite downwind hazard areas are mapped in relation to emergency response planning guidelines (ERPG), which were developed by the American Industrial Hygiene Association to assist emergency response personnel planning for catastrophic chemical releases. In addition, other geographic referenced data such as transportation routes, satellite imagery and population data are included in the operational, equipment, and morale risk assessment and management process. These techniques have been developed to assist military medical planners and operations personnel in determining the industrial hazards, vulnerability assessments and health risk assessments to continental United States military installations. These techniques and procedures support the Department of Defense Force Protection measures, which provides awareness of a terrorism threat, appropriate measures to prevent terrorist attacks and mitigate terrorism's effects in the event that preventive measures are ineffective.

Jeffrey S Kirkpatrick; Jacqueline M Howard; David A Reed

2002-01-01T23:59:59.000Z

403

Reduction of fuel consumption  

Science Journals Connector (OSTI)

Replacing standard oil pumps with bypass control by regulated oil pumps with variable oil pressure which adapt their variable oil pumping quantity to the engine oil pressure requirements promises reductions in fuel

Dieter Voigt

2003-12-01T23:59:59.000Z

404

Situation Threat Assessment Policy and Protocol (Updated 9/1/11) Rowan University is committed to promoting a safe and secure learning environment. It is  

E-Print Network [OSTI]

Situation Threat Assessment Policy and Protocol (Updated 9/1/11) Rowan University is committed resources within the Division of Student Life in responding to alleged threats or acts of violence by students. Definitions Threat: A threat is defined as any behavior that suggests intent to harm self

Rusu, Adrian

405

Mexico-Quantifying Emission Reduction Opportunities in Emerging Economies |  

Open Energy Info (EERE)

Mexico-Quantifying Emission Reduction Opportunities in Emerging Economies Mexico-Quantifying Emission Reduction Opportunities in Emerging Economies Jump to: navigation, search Name Mexico-Quantifying Emission Reduction Opportunities in Emerging Economies Agency/Company /Organization Ecofys Sector Energy Topics Background analysis, GHG inventory, Low emission development planning, Pathways analysis Website http://www.ecofys.com/files/fi Program Start 2009 Country Mexico Central America References G8 Climate Scorecards[1] Overview Ecofys developed emission reduction scenarios for the G5 developing countries including; business as usual, no- regret, and ambitious scenarios. They also evaluated current national climate plans. From the study: "The participation of emerging economies is one of the major items of discussion on a future international climate regime. Action

406

South Africa-Quantifying Emission Reduction Opportunities in Emerging  

Open Energy Info (EERE)

South Africa-Quantifying Emission Reduction Opportunities in Emerging South Africa-Quantifying Emission Reduction Opportunities in Emerging Economies Jump to: navigation, search Name South Africa-Quantifying Emission Reduction Opportunities in Emerging Economies Agency/Company /Organization Ecofys Sector Energy Topics Background analysis, GHG inventory, Low emission development planning, Pathways analysis Website http://www.ecofys.com/files/fi Program Start 2009 Country South Africa Southern Africa References G8 Climate Scorecards[1] Overview Ecofys developed emission reduction scenarios for the G5 developing countries including; business as usual, no- regret, and ambitious scenarios. They also evaluated current national climate plans. From the study: "The participation of emerging economies is one of the major items of discussion on a future international climate regime. Action

407

Baselines for Greenhouse Gas Reductions: Problems, Precedents, Solutions |  

Open Energy Info (EERE)

Baselines for Greenhouse Gas Reductions: Problems, Precedents, Solutions Baselines for Greenhouse Gas Reductions: Problems, Precedents, Solutions Jump to: navigation, search Tool Summary Name: Baselines for Greenhouse Gas Reductions: Problems, Precedents, Solutions Agency/Company /Organization: World Bank Sector: Energy Topics: Baseline projection, GHG inventory, Pathways analysis Resource Type: Publications, Lessons learned/best practices Website: www.p2pays.org/ref/22/21739.pdf References: Baselines for Greenhouse Gas Reductions: Problems, Precedents, Solutions[1] Summary "Rigor in baselines It's important to establish the right degree of rigor in baselining. Overly lax baselines will threaten the system's credibility and usefulness, and shift rents from high quality providers to low quality providers of offsets. Overly stringent baselines will discourage valid projects and

408

Evaluate Greenhouse Gas Reduction Strategies for Vehicles and Mobile  

Broader source: Energy.gov (indexed) [DOE]

Vehicles and Vehicles and Mobile Equipment Evaluate Greenhouse Gas Reduction Strategies for Vehicles and Mobile Equipment October 7, 2013 - 11:48am Addthis YOU ARE HERE: Step 3 Reducing petroleum consumption is the principal means to reduce greenhouse gas (GHG) emissions from vehicles and mobile equipment. Each agency has the flexibility to evaluate a variety of options to ensure its strategy best fits the mission and makeup of its fleets. The purpose of this evaluation is to: Identify strategies that will best encourage the reduction of petroleum use in Federal vehicles Estimate the GHG reduction potential and cost effectiveness of these strategies. Next Step After evaluating GHG reduction strategies, the next step in the GHG mitigation planning for vehicles and mobile equipment is to estimate the

409

Indonesia-GTZ Emissions Reductions in Urban Transport | Open Energy  

Open Energy Info (EERE)

Reductions in Urban Transport Reductions in Urban Transport Jump to: navigation, search Logo: Indonesia-GTZ Emissions Reductions in Urban Transport Name Indonesia-GTZ Emissions Reductions in Urban Transport Agency/Company /Organization GTZ Partner Ministry of Transportation Sector Energy Focus Area Transportation Topics Background analysis Website http://www.gtz.de/en/themen/um Program Start 2008 Program End 2012 Country Indonesia UN Region South-Eastern Asia References GTZ Transport & Climate Change Website[1] GTZ is working with Indonesia on this program with the following objective: "Indonesian cities increasingly plan and implement measures for a transport system that is energy efficient as well as environmentally and climate friendly." Background of the project is the absence of a national policy on

410

Brazil-Quantifying Emission Reduction Opportunities in Emerging Economies |  

Open Energy Info (EERE)

Brazil-Quantifying Emission Reduction Opportunities in Emerging Economies Brazil-Quantifying Emission Reduction Opportunities in Emerging Economies Jump to: navigation, search Name Brazil-Quantifying Emission Reduction Opportunities in Emerging Economies Agency/Company /Organization Ecofys Sector Energy Topics Background analysis, GHG inventory, Low emission development planning, Pathways analysis Website http://www.ecofys.com/files/fi Program Start 2009 Country Brazil South America References G8 Climate Scorecards[1] Overview Ecofys developed emission reduction scenarios for the G5 developing countries including; business as usual, no- regret, and ambitious scenarios. They also evaluated current national climate plans. From the study: "The participation of emerging economies is one of the major items of discussion on a future international climate regime. Action

411

Bridging the Divide Between Poverty Reduction and Climate Change Through  

Open Energy Info (EERE)

Bridging the Divide Between Poverty Reduction and Climate Change Through Bridging the Divide Between Poverty Reduction and Climate Change Through Sustainable and Innovative Energy Technologies Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Bridging the Divide Between Poverty Reduction and Climate Change Through Sustainable and Innovative Energy Technologies Agency/Company /Organization: Dr. Anilla Cherian Sector: Climate, Energy Focus Area: Renewable Energy Topics: Co-benefits assessment, - Energy Access, Low emission development planning, Pathways analysis Resource Type: Publications User Interface: Website Website: www.undp.ro/download/sustainable%20Innovative%20Energy%20Technologies% Cost: Free Language: English This expert report highlights the need to bridge the divide between climate change and poverty reduction through innovative energy technologies and to

412

India-Quantifying Emission Reduction Opportunities in Emerging Economies |  

Open Energy Info (EERE)

India-Quantifying Emission Reduction Opportunities in Emerging Economies India-Quantifying Emission Reduction Opportunities in Emerging Economies Jump to: navigation, search Name India-Quantifying Emission Reduction Opportunities in Emerging Economies Agency/Company /Organization Ecofys Sector Energy Topics Background analysis, GHG inventory, Low emission development planning, Pathways analysis Website http://www.ecofys.com/files/fi Program Start 2009 Country India Southern Asia References G8 Climate Scorecards[1] Overview Ecofys developed emission reduction scenarios for the G5 developing countries including; business as usual, no- regret, and ambitious scenarios. They also evaluated current national climate plans. From the study: "The participation of emerging economies is one of the major items of discussion on a future international climate regime. Action

413

Federal Agency Projects | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Federal Agency Projects Federal Agency Projects Federal Agency Projects Technical experts from the U.S. Department of Energy (DOE) and the National Renewable Energy Laboratory (NREL) help federal agencies pursue aggressive and integrated solutions to energy independence. Examples include work with the U.S. Department of Defense (DOD) and the National Science Foundation (NSF) to meet net-zero energy goals at military installations and reduce fossil fuel use in polar regions. U.S. Department of Defense DOE and DOD have teamed up to help military installations across the United States reduce their reliance on local energy grids by producing as much energy on-site as their buildings, facilities, and fleet vehicles consume. U.S. Marine Corps Air Station Miramar DOE and NREL are performing assessments at select DOD sites to evaluate the

414

Intermountain Power Agency | Open Energy Information  

Open Energy Info (EERE)

Agency Agency Jump to: navigation, search Name Intermountain Power Agency Place California Utility Id 40576 Utility Location Yes Ownership P NERC Location WECC Operates Generating Plant Yes Activity Generation Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png No rate schedules available. Average Rates No Rates Available References ↑ "EIA Form EIA-861 Final Data File for 2010 - File1_a" Retrieved from "http://en.openei.org/w/index.php?title=Intermountain_Power_Agency&oldid=410879" Categories: EIA Utility Companies and Aliases Utility Companies

415

Property:LeadAgency | Open Energy Information  

Open Energy Info (EERE)

LeadAgency LeadAgency Jump to: navigation, search Property Name LeadAgency Property Type Page Pages using the property "LeadAgency" Showing 25 pages using this property. (previous 25) (next 25) B BLM-NV-WN-ES-08-01-1310, NV-020-08-01 + BLM + C CA-017-05-051 + BLM + CA-170-02-15 + BLM + CA-650-2005-086 + BLM + CA-670-2010-107 + BLM + CA-670-2010-CX + BLM + CA-96062042 + United States Forest Service + D DOE-EA-1116 + United States Department of Energy + DOE-EA-1621 + United States Department of Energy + DOE-EA-1676 + United States Department of Energy + DOE-EA-1733 + United States Department of Energy + DOE-EA-1759 + United States Department of Energy + DOE-EA-1849 + United States Department of Energy + DOE-EA-1961 + United States Department of Energy +

416

Federal Emergency Management Agency | Open Energy Information  

Open Energy Info (EERE)

Emergency Management Agency Emergency Management Agency Jump to: navigation, search Logo: Federal Emergency Management Agency Name Federal Emergency Management Agency Address 500 C Street SW Place Washington, District of Columbia Zip 20472 Year founded 1979 Website http://www.fema.gov/ Coordinates 38.8858427°, -77.0182049° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":38.8858427,"lon":-77.0182049,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

417

Texas Municipal Power Agency | Open Energy Information  

Open Energy Info (EERE)

Municipal Power Agency Municipal Power Agency Jump to: navigation, search Name Texas Municipal Power Agency Place Texas Utility Id 18715 Utility Location Yes Ownership M NERC Location TRE NERC ERCOT Yes Operates Generating Plant Yes Activity Generation Yes Activity Transmission Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png No rate schedules available. Average Rates No Rates Available References ↑ "EIA Form EIA-861 Final Data File for 2010 - File1_a" Retrieved from "http://en.openei.org/w/index.php?title=Texas_Municipal_Power_Agency&oldid=411659" Categories:

418

European Environment Agency | Open Energy Information  

Open Energy Info (EERE)

Environment Agency Environment Agency Jump to: navigation, search Logo: European Environment Agency Name European Environment Agency Address Kongens Nytorv 6 1050 Place Copenhagen, Denmark Phone number (+45) 33 36 71 00 Website http://www.eea.europa.eu/ Coordinates 55.6811436°, 12.5866457° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":55.6811436,"lon":12.5866457,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

419

MSR Public Power Agency | Open Energy Information  

Open Energy Info (EERE)

MSR Public Power Agency MSR Public Power Agency Jump to: navigation, search Name MSR Public Power Agency Place California Utility Id 21704 Utility Location Yes Ownership P NERC Location WECC NERC WECC Yes Activity Generation Yes Activity Transmission Yes Activity Buying Transmission Yes Activity Wholesale Marketing Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png No rate schedules available. Average Rates No Rates Available References ↑ "EIA Form EIA-861 Final Data File for 2010 - File1_a" Retrieved from "http://en.openei.org/w/index.php?title=MSR_Public_Power_Agency&oldid=41102

420

Mid Wales Energy Agency | Open Energy Information  

Open Energy Info (EERE)

Wales Energy Agency Wales Energy Agency Jump to: navigation, search Name Mid Wales Energy Agency Place Aberystwyth, United Kingdom Zip SY23 2AZ Sector Efficiency, Renewable Energy Product Mid Wales Energy Agency is here to promote energy efficiency and appropriately scaled renewable energy throughout Mid Wales. Coordinates 52.41605°, -4.077869° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":52.41605,"lon":-4.077869,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Category:Government Agencies | Open Energy Information  

Open Energy Info (EERE)

Government Agencies Government Agencies Jump to: navigation, search Geothermalpower.jpg Looking for the Category:Organizations page? For detailed information on exploration techniques, click here. Add.png Add a new Government Agency Pages in category "Government Agencies" The following 196 pages are in this category, out of 196 total. A Advisory Council on Historic Preservation Alaska Department of Environmental Conservation Alaska Department of Fish and Game Alaska Department of Natural Resources Alaska Department of Transportation and Public Facilities Alaska Division of Mining Land and Water B BLM BLM Alaska State Office BLM Arizona State Office BLM Battle Mountain District Office BLM Bishop Field Office BLM Boise District Office BLM Burley Field Office BLM Burns District Office

422

Environmental Protection Agency - Edison, New Jersey | Department...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Protection Agency (EPA) has a laboratory in Edison, New Jersey that is the site of an alternative energy project. It uses a super ambient solar thermal collector or solar hot...

423

Microsoft Word - Agencies Publish Final Environmental Impact...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Bethany Shively, DOE (202) 586-4940 Joe Walsh, USFS (202) 205-1134 Agencies Publish Final Environmental Impact Statement on Energy Corridor Designation in the West WASHINGTON, DC -...

424

Assam Energy Development Agency | Open Energy Information  

Open Energy Info (EERE)

Agency Agency Jump to: navigation, search Name Assam Energy Development Agency Place Guwahati, Assam, India Zip 781005 Sector Renewable Energy Product Nodal agency focused on promotion renewable energy in the state of Assam. Coordinates 26.17389°, 91.75456° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":26.17389,"lon":91.75456,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

425

U.S. Virgin Islands Transportation Petroleum Reduction Plan  

Broader source: Energy.gov (indexed) [DOE]

Transportation Petroleum Reduction Plan Caley Johnson Technical Report NREL/TP-7A40-52565 September 2011 NREL is a national laboratory of the U.S. Department of Energy, Office of Energy Efficiency & Renewable Energy, operated by the Alliance for Sustainable Energy, LLC. National Renewable Energy Laboratory 1617 Cole Boulevard Golden, Colorado 80401 303-275-3000 * www.nrel.gov Contract No. DE-AC36-08GO28308 U.S. Virgin Islands Transportation Petroleum Reduction Plan Caley Johnson Prepared under Task No. IDVI.0070 Technical Report NREL/TP-7A40-52565 September 2011 NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, makes any warranty,

426

U.S. Virgin Islands Transportation Petroleum Reduction Plan  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Petroleum Reduction Plan Caley Johnson Technical Report NREL/TP-7A40-52565 September 2011 NREL is a national laboratory of the U.S. Department of Energy, Office of Energy Efficiency & Renewable Energy, operated by the Alliance for Sustainable Energy, LLC. National Renewable Energy Laboratory 1617 Cole Boulevard Golden, Colorado 80401 303-275-3000 * www.nrel.gov Contract No. DE-AC36-08GO28308 U.S. Virgin Islands Transportation Petroleum Reduction Plan Caley Johnson Prepared under Task No. IDVI.0070 Technical Report NREL/TP-7A40-52565 September 2011 NOTICE This report was prepared as an account of work sponsored by an agency of the United States government. Neither the United States government nor any agency thereof, nor any of their employees, makes any warranty,

427

Alternative Fuels Data Center: State Agency Electric Vehicle Supply  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

State Agency Electric State Agency Electric Vehicle Supply Equipment (EVSE) Installation to someone by E-mail Share Alternative Fuels Data Center: State Agency Electric Vehicle Supply Equipment (EVSE) Installation on Facebook Tweet about Alternative Fuels Data Center: State Agency Electric Vehicle Supply Equipment (EVSE) Installation on Twitter Bookmark Alternative Fuels Data Center: State Agency Electric Vehicle Supply Equipment (EVSE) Installation on Google Bookmark Alternative Fuels Data Center: State Agency Electric Vehicle Supply Equipment (EVSE) Installation on Delicious Rank Alternative Fuels Data Center: State Agency Electric Vehicle Supply Equipment (EVSE) Installation on Digg Find More places to share Alternative Fuels Data Center: State Agency Electric Vehicle Supply Equipment (EVSE) Installation on

428

Alternative Fuels Data Center: State Agency Energy Plan Transportation  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

State Agency Energy State Agency Energy Plan Transportation Requirements to someone by E-mail Share Alternative Fuels Data Center: State Agency Energy Plan Transportation Requirements on Facebook Tweet about Alternative Fuels Data Center: State Agency Energy Plan Transportation Requirements on Twitter Bookmark Alternative Fuels Data Center: State Agency Energy Plan Transportation Requirements on Google Bookmark Alternative Fuels Data Center: State Agency Energy Plan Transportation Requirements on Delicious Rank Alternative Fuels Data Center: State Agency Energy Plan Transportation Requirements on Digg Find More places to share Alternative Fuels Data Center: State Agency Energy Plan Transportation Requirements on AddThis.com... More in this section... Federal State Advanced Search

429

Advanced Research Projects Agency - Energy Program Specific Recovery...  

Office of Environmental Management (EM)

Advanced Research Projects Agency - Energy Program Specific Recovery Plan Advanced Research Projects Agency - Energy Program Specific Recovery Plan Microsoft Word - 44F1801D.doc...

430

Secretary Chu Joins 7 Other Agencies in Launching Renewable Energy...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Joins 7 Other Agencies in Launching Renewable Energy and Energy Efficiency Export Initiative Secretary Chu Joins 7 Other Agencies in Launching Renewable Energy and Energy...

431

Central Information and Business Agency CIBA | Open Energy Information  

Open Energy Info (EERE)

and Business Agency CIBA Jump to: navigation, search Name: Central Information and Business Agency (CIBA) Place: Lewis, Delaware Sector: Solar Product: Developer of solar farms in...

432

Agency Information Collection Extension Notice of Public Comment...  

Broader source: Energy.gov (indexed) [DOE]

Agency Information Collection Extension Notice of Public Comment: Federal Register Vol. 79, No. 178, September 15, 2014 Agency Information Collection Extension Notice of Public...

433

DOE Issues Agency Information Collection Extension for OE-417...  

Broader source: Energy.gov (indexed) [DOE]

Issues Agency Information Collection Extension for OE-417 Form in the Federal Register DOE Issues Agency Information Collection Extension for OE-417 Form in the Federal Register...

434

Advertising: The advertising agency and the r&d department  

Science Journals Connector (OSTI)

The role of the advertising agency in selling products is discussed. Suggestions ... helping an agency develop and implement a sound advertising campaign.

Mike Jag Lois

1983-07-01T23:59:59.000Z

435

National Science and Technology Development Agency | Open Energy...  

Open Energy Info (EERE)

National Science and Technology Development Agency Jump to: navigation, search Name: National Science and Technology Development Agency Place: Thailand Product: Thai national R&D...

436

White House Honors Federal Agencies for Saving Taxpayers $133...  

Office of Environmental Management (EM)

White House Honors Federal Agencies for Saving Taxpayers 133 Million in Energy Costs by Increasing Efficiency Measures White House Honors Federal Agencies for Saving Taxpayers...

437

Expanded "Green Button" Will Reach Federal Agencies and More...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

"Green Button" Will Reach Federal Agencies and More American Energy Consumers Expanded "Green Button" Will Reach Federal Agencies and More American Energy Consumers December 6,...

438

Hydrogen Fuel Cell Bus Evaluation for California Transit Agencies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Transportation Projects Hydrogen Fuel Cell Bus Evaluation for California Transit Agencies Hydrogen Fuel Cell Bus Evaluation for California Transit Agencies In February 2000, the...

439

Chicago Metropolitan Agency for Planning Data Dashboard | Department...  

Energy Savers [EERE]

Data Dashboard Chicago Metropolitan Agency for Planning Data Dashboard The data dashboard for Chicago Metropolitan Agency for Planning, a partner in the Better Buildings...

440

Alternative Fuels Data Center: State Agency Electric Vehicle Supply  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

State Agency Electric State Agency Electric Vehicle Supply Equipment (EVSE) Installation to someone by E-mail Share Alternative Fuels Data Center: State Agency Electric Vehicle Supply Equipment (EVSE) Installation on Facebook Tweet about Alternative Fuels Data Center: State Agency Electric Vehicle Supply Equipment (EVSE) Installation on Twitter Bookmark Alternative Fuels Data Center: State Agency Electric Vehicle Supply Equipment (EVSE) Installation on Google Bookmark Alternative Fuels Data Center: State Agency Electric Vehicle Supply Equipment (EVSE) Installation on Delicious Rank Alternative Fuels Data Center: State Agency Electric Vehicle Supply Equipment (EVSE) Installation on Digg Find More places to share Alternative Fuels Data Center: State Agency Electric Vehicle Supply Equipment (EVSE) Installation on

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Air Force Civil Engineer Support Agency | Open Energy Information  

Open Energy Info (EERE)

Engineer Support Agency Jump to: navigation, search Name: Air Force Civil Engineer Support Agency Place: Florida Zip: 32403-5319 Sector: Renewable Energy Product: Florida-based...

442

Assessing the integrity of local area network materials accountability systems against insider threats  

SciTech Connect (OSTI)

DOE facilities rely increasingly on computerized systems to manage nuclear materials accountability data and to protect against diversion of nuclear materials or other malevolent acts (e.g., hoax due to falsified data) by insider threats. Aspects of modern computerized material accountability (MA) systems including powerful personal computers and applications on networks, mixed security environments, and more users with increased knowledge, skills and abilities help heighten the concern about insider threats to the integrity of the system. In this paper, we describe a methodology for assessing MA applications to help decision makers identify ways of and compare options for preventing or mitigating possible additional risks from the insider threat. We illustrate insights from applying the methodology to local area network materials accountability systems.

Jones, E.; Sicherman, A.

1996-07-01T23:59:59.000Z

443

A threat-based definition of IA and IA-enabled products.  

SciTech Connect (OSTI)

This paper proposes a definition of 'IA and IA-enabled products' based on threat, as opposed to 'security services' (i.e., 'confidentiality, authentication, integrity, access control or non-repudiation of data'), as provided by Department of Defense (DoD) Instruction 8500.2, 'Information Assurance (IA) Implementation.' The DoDI 8500.2 definition is too broad, making it difficult to distinguish products that need higher protection from those that do not. As a consequence the products that need higher protection do not receive it, increasing risk. The threat-based definition proposed in this paper solves those problems by focusing attention on threats, thereby moving beyond compliance to risk management. (DoDI 8500.2 provides the definitions and controls that form the basis for IA across the DoD.) Familiarity with 8500.2 is assumed.

Shakamuri, Mayuri; Schaefer, Mark A.; Campbell, Philip LaRoche

2010-09-01T23:59:59.000Z

444

A threat-based definition of IA- and IA-enabled products.  

SciTech Connect (OSTI)

This paper proposes a definition of 'IA and IA-enabled products' based on threat, as opposed to 'security services' (i.e., 'confidentiality, authentication, integrity, access control or non-repudiation of data'), as provided by Department of Defense (DoD) Instruction 8500.2, 'Information Assurance (IA) Implementation.' The DoDI 8500.2 definition is too broad, making it difficult to distinguish products that need higher protection from those that do not. As a consequence the products that need higher protection do not receive it, increasing risk. The threat-based definition proposed in this paper solves those problems by focusing attention on threats, thereby moving beyond compliance to risk management. (DoDI 8500.2 provides the definitions and controls that form the basis for IA across the DoD.) Familiarity with 8500.2 is assumed.

Shakamuri, Mayuri; Schaefer, Mark A.; Campbell, Philip LaRoche

2010-07-01T23:59:59.000Z

445

Comprehensive test ban treaty international monitoring system security threats and proposed security attributes  

SciTech Connect (OSTI)

To monitor compliance with a Comprehensive Test Ban Treaty (CTBT), a sensing network, referred to as the International Monitoring System (IMS), is being deployed. Success of the IMS depends on both its ability to preform its function and the international community`s confidence in the system. To ensure these goals, steps must be taken to secure the system against attacks that would undermine it; however, it is not clear that consensus exists with respect to the security requirements that should be levied on the IMS design. In addition, CTBT has not clearly articulated what threats it wishes to address. This paper proposes four system-level threats that should drive IMS design considerations, identifies potential threat agents, and collects into one place the security requirements that have been suggested by various elements of the IMS community. For each such requirement, issues associated with the requirement are identified and rationale for the requirement is discussed.

Draelos, T.J.; Craft, R.L.

1996-03-01T23:59:59.000Z

446

International Energy Agency (IEA) | Open Energy Information  

Open Energy Info (EERE)

International Energy Agency (IEA) International Energy Agency (IEA) (Redirected from International Energy Agency) Jump to: navigation, search Logo: International Energy Agency (IEA) Name International Energy Agency (IEA) Address 9 rue de la Fédération Place Paris, France Zip 75015 Number of employees 51-200 Year founded 1974 Phone number +33 1 40 57 65 54 Website http://www.iea.org Coordinates 48.8548086°, 2.2905775° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":48.8548086,"lon":2.2905775,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

447

FY 2013 AgencY FinAnciAl RepoRt www.nasa.gov  

E-Print Network [OSTI]

FY 2013 AgencY FinAnciAl RepoRt www.nasa.gov National Aeronautics and Space Administration #12;Front Cover: Outside Front Main Image: Artist concept of planets space. (Credit: NASA) Outside Front of extrave- hicular activity (EVA) as work continues on the International Space Station. (Credit: NASA

Waliser, Duane E.

448

Chicago Metropolitan Agency for Planning Summary of Reported Data  

Broader source: Energy.gov [DOE]

Summary of data reported by Better Buildings Neighborhood Program partner Chicago Metropolitan Agency for Planning.

449

FTA- SunLine Transit Agency- Final Report  

Broader source: Energy.gov [DOE]

Final Report on the Federal Transit Administration, SunLine Transit Agency Cooperative Agreement (Part One)

450

Analytical quality control services of the International Atomic Energy Agency  

Science Journals Connector (OSTI)

The International Atomic Energy Agency provides quality control services to analytical laboratories. These services...

O. Suschny

1986-01-01T23:59:59.000Z

451

FEMP Best Practices and Lessons Learned for Federal Agency ESPC...  

Broader source: Energy.gov (indexed) [DOE]

FEMP Best Practices and Lessons Learned for Federal Agency ESPC Projects Contents 1. Introduction ......

452

CEQ Memorandum on Designation of Non-Federal Agencies as Cooperating Agencies  

Broader source: Energy.gov (indexed) [DOE]

'WASHINGTON D C 20503 'WASHINGTON D C 20503 July 25, I999 MEMOR4NDUM FOR HEADS OF FEDERAL AGENCIES FRO&l: GEORGE T. FIWMPTON. JR. Acting Chair SUBJECT: ATTACHED MEMORANDUM Attached please find a memorandum regarding the designation of non-federal agencies to be cooperating agencies in implementing the procedural requirements of the National Environmental Policy Act. If you have any questions concerning this memorandum, please do not hesitate to contact Dinah Bear, the Council on Environmental Quality's General Counsel, at (202)395-5750. Attachment Recycled Paper EXECUTIVE OFFICE OF THE PRESIDENT COUNCIL ON ENVIRONMENTAL QUALITY WASHINGTON. 0 C ZOSOJ July 28, 1999 &IEh[ORANDL'?vI FOR HEADS OF FEDERAL AGENCIES SUBJECT: DESIGNATION OF NON-FEDERAL AGENCIES TO BE COOPERqTIXG

453

Agencies plan continued DOE landfill remediation  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Agencies plan continued DOE landfill remediation Agencies plan continued DOE landfill remediation The U.S. Department of Energy (DOE), Idaho Department of Environmental Quality and U.S. Environmental Protection Agency have released a planning document that specifies how DOE will continue to remediate a landfill containing hazardous and transuranic waste at DOE's Idaho Site located in eastern Idaho. The Phase 1 Remedial Design/Remedial Action Work Plan for Operable Unit 7-13/14 document was issued after the September 2008 Record of Decision (ROD) and implements the retrieval of targeted waste at the Subsurface Disposal Area (SDA) within the Radioactive Waste Management Complex (RWMC). The SDA began receiving waste in 1952 and contains radioactive and chemical waste in approximately 35 acres of disposal pits, trenches and soil vaults.

454

Illinois Municipal Elec Agency | Open Energy Information  

Open Energy Info (EERE)

Illinois Municipal Elec Agency Illinois Municipal Elec Agency Place Illinois Utility Id 9286 Utility Location Yes Ownership A NERC Location RFC & SERC NERC RFC Yes NERC SERC Yes Operates Generating Plant Yes Activity Generation Yes Activity Buying Transmission Yes Activity Buying Distribution Yes Activity Wholesale Marketing Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png No rate schedules available. Average Rates No Rates Available References ↑ "EIA Form EIA-861 Final Data File for 2010 - File1_a" Retrieved from "http://en.openei.org/w/index.php?title=Illinois_Municipal_Elec_Agency&oldid=410862

455

Property:FundingAgency | Open Energy Information  

Open Energy Info (EERE)

FundingAgency FundingAgency Jump to: navigation, search This is a property of type Page. Pages using the property "FundingAgency" Showing 21 pages using this property. B BLM-NV-WN-ES-08-01-1310, NV-020-08-01 + United States Department of Energy + D DOE-EA-1116 + United States Department of Energy + DOE-EA-1621 + United States Department of Energy + DOE-EA-1733 + United States Department of Energy + DOE-EA-1759 + United States Department of Energy + DOE-EA-1849 + United States Department of Energy + DOE-EA-1961 + United States Department of Energy + DOE-EIS-0298 + DOE Geothermal Technologies Office + DOI-BLM-CA-C050-2009-0005-EA + United States Department of Energy + DOI-BLM-NV-B010-2011-0015-EA + United States Department of Energy + DOI-BLM-NV-B020-2010-????-CX + United States Department of Energy +

456

European Space Agency | Open Energy Information  

Open Energy Info (EERE)

Agency Agency Jump to: navigation, search Name European Space Agency Place Paris, France Zip 75738 Sector Services, Solar Product String representation "ESA¡¯s job is ... ole of mankind." is too long. Coordinates 48.85693°, 2.3412° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":48.85693,"lon":2.3412,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

457

NREL: Technology Deployment - Other Federal Agency Support  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Other Federal Agency Support Other Federal Agency Support Photo of a man and a woman standing behind a ground-mounted solar panel installation. Merry Edwards Winery in California is almost 100% solar powered and just one example of the more than 77,511 project applications reviewed by NREL prior to receiving funding through the U.S. Department of Treasury Recovery Act Section 1603 Treasury Grant Program. Courtesy of Ben Miller, Merry Edwards Winery Through work-for-others agreements, NREL supports other federal agencies in finding ways to meet energy savings goals through energy assessments, analysis, project guidance, and other activities. General Services Administration Since 2007, NREL has worked with the General Services Administration (GSA) to conduct energy assessments and identify opportunities for distributed

458

Yuba County Water Agency | Open Energy Information  

Open Energy Info (EERE)

Yuba County Water Agency Yuba County Water Agency Place California Utility Id 21140 Utility Location Yes Ownership P NERC Location WECC NERC WECC Yes ISO CA Yes Operates Generating Plant Yes Activity Wholesale Marketing Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png No rate schedules available. Average Rates No Rates Available References ↑ "EIA Form EIA-861 Final Data File for 2010 - File1_a" Retrieved from "http://en.openei.org/w/index.php?title=Yuba_County_Water_Agency&oldid=412223" Categories: EIA Utility Companies and Aliases Utility Companies Organizations

459

Wyoming Municipal Power Agency | Open Energy Information  

Open Energy Info (EERE)

Wyoming Municipal Power Agency Wyoming Municipal Power Agency Place Wyoming Utility Id 40603 Utility Location Yes Ownership A NERC Location WECC NERC WECC Yes Operates Generating Plant Yes Activity Generation Yes Activity Transmission Yes Activity Buying Transmission Yes Activity Wholesale Marketing Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png No rate schedules available. Average Rates No Rates Available References ↑ "EIA Form EIA-861 Final Data File for 2010 - File1_a" Retrieved from "http://en.openei.org/w/index.php?title=Wyoming_Municipal_Power_Agency&oldid=412214

460

California Environmental Protection Agency | Open Energy Information  

Open Energy Info (EERE)

Environmental Protection Agency Environmental Protection Agency Name California Environmental Protection Agency Address 1001 I Street, PO Box 2815 Place Sacramento, California Zip 95812-2815 Phone number 916-323-2514 Website http://www.calepa.ca.gov/ Coordinates 38.58181°, -121.492159° Loading map... {"minzoom":false,"mappingservice":"googlemaps3","type":"ROADMAP","zoom":14,"types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"geoservice":"google","maxzoom":false,"width":"600px","height":"350px","centre":false,"title":"","label":"","icon":"","visitedicon":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"copycoords":false,"static":false,"wmsoverlay":"","layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","locations":[{"text":"","title":"","link":null,"lat":38.58181,"lon":-121.492159,"alt":0,"address":"","icon":"","group":"","inlineLabel":"","visitedicon":""}]}

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Indiana Municipal Power Agency | Open Energy Information  

Open Energy Info (EERE)

Municipal Power Agency Municipal Power Agency Place Indiana Utility Id 9234 Utility Location Yes Ownership A NERC Location RFC NERC RFC Yes RTO PJM Yes ISO MISO Yes Operates Generating Plant Yes Activity Generation Yes Activity Transmission Yes Activity Buying Transmission Yes Activity Wholesale Marketing Yes References EIA Form EIA-861 Final Data File for 2010 - File1_a[1] LinkedIn Connections CrunchBase Profile No CrunchBase profile. Create one now! This article is a stub. You can help OpenEI by expanding it. Utility Rate Schedules Grid-background.png No rate schedules available. Average Rates No Rates Available References ↑ "EIA Form EIA-861 Final Data File for 2010 - File1_a" Retrieved from "http://en.openei.org/w/index.php?title=Indiana_Municipal_Power_Agency&oldid=41086

462

Guidance for Federal Departments and Agencies on Establishing, Applying,  

Broader source: Energy.gov (indexed) [DOE]

for Federal Departments and Agencies on Establishing, for Federal Departments and Agencies on Establishing, Applying, and Revising Categorical Exclusions Under the National Environmental Policy Act Guidance for Federal Departments and Agencies on Establishing, Applying, and Revising Categorical Exclusions Under the National Environmental Policy Act This guidance from the Council on Environmental Quality provides methods for substantiating categorical exclusions, clarifies the process for establishing categorical exclusions, outlines how agencies should engage the public when establishing and using categorical exclusions, describes how agencies can document the use of categorical exclusions, and recommends periodic agency review of existing categorical exclusions. Final Guidance for Federal Departments and Agencies on Establishing,

463

Reporting Cooperating Agencies in Implementing the Procedural Requirements  

Broader source: Energy.gov (indexed) [DOE]

Reporting Cooperating Agencies in Implementing the Procedural Reporting Cooperating Agencies in Implementing the Procedural Requirements of the National Environmental Policy Act Reporting Cooperating Agencies in Implementing the Procedural Requirements of the National Environmental Policy Act The purpose of this Council on Environmental Quality Memorandum is to establish a revised report to ensure that all Federal agencies are consistently reporting designation of Federal and non-federal cooperating agencies in the preparation of analyses and documentation required by the National Environmental Policy Act (NEPA). REPORTING COOPERATING AGENCIES IN IMPLEMENTING THE PROCEDURAL REQUIREMENTS OF THE NATIONAL ENVIRONMENTAL POLICY ACT More Documents & Publications Cooperating Agencies in Implementing the Procedural Requirements of the

464

Reporting Cooperating Agencies in Implementing the Procedural Requirements  

Broader source: Energy.gov (indexed) [DOE]

Reporting Cooperating Agencies in Implementing the Procedural Reporting Cooperating Agencies in Implementing the Procedural Requirements of the National Environmental Policy Act Reporting Cooperating Agencies in Implementing the Procedural Requirements of the National Environmental Policy Act The purpose of this Council on Environmental Quality Memorandum is to establish a revised report to ensure that all Federal agencies are consistently reporting designation of Federal and non-federal cooperating agencies in the preparation of analyses and documentation required by the National Environmental Policy Act (NEPA). REPORTING COOPERATING AGENCIES IN IMPLEMENTING THE PROCEDURAL REQUIREMENTS OF THE NATIONAL ENVIRONMENTAL POLICY ACT More Documents & Publications Cooperating Agencies in Implementing the Procedural Requirements of the

465

Guidance for Federal Departments and Agencies on Establishing, Applying,  

Broader source: Energy.gov (indexed) [DOE]

Guidance for Federal Departments and Agencies on Establishing, Guidance for Federal Departments and Agencies on Establishing, Applying, and Revising Categorical Exclusions Under the National Environmental Policy Act Guidance for Federal Departments and Agencies on Establishing, Applying, and Revising Categorical Exclusions Under the National Environmental Policy Act This guidance from the Council on Environmental Quality provides methods for substantiating categorical exclusions, clarifies the process for establishing categorical exclusions, outlines how agencies should engage the public when establishing and using categorical exclusions, describes how agencies can document the use of categorical exclusions, and recommends periodic agency review of existing categorical exclusions. Final Guidance for Federal Departments and Agencies on Establishing,

466

Section 1: Agency Policy and Strategy  

Office of Legacy Management (LM)

consideration of energy reduction as a factor in the decision process for maintenance and repair * Re-benchmarking individually metered buildings (annually) to compare building...

467

Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures  

E-Print Network [OSTI]

Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures Federico Maggi, and to what extent these abuses can impact the end users. With these questions in mind, we first analyzed and April 2012, and collected 24,953,881 distinct short URLs. With this large dataset, we studied the abuse

California at Santa Barbara, University of

468

Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures  

E-Print Network [OSTI]

DRAFT COPY Two Years of Short URLs Internet Measurement: Security Threats and Countermeasures URLs, and to what extent these abuses can impact the end users. With these questions in mind, we first and April 2012, and collected 24,953,881 distinct short URLs. With this large dataset, we studied the abuse

Vigna, Giovanni

469

Analysis and Modelling of Fraud and Revenue Assurance Threats in Future Telecommunications Network and Service Environments  

E-Print Network [OSTI]

Analysis and Modelling of Fraud and Revenue Assurance Threats in Future Telecommunications Network and revenue assurance in future telecommunication network and service environments. 1. Introduction, usually, to obtain property or services from him or her unjustly [1]. The Telecommunications (Fraud) Act

Haddadi, Hamed

470

Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats  

E-Print Network [OSTI]

Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui- grates communication networks into traditional power grid. This integration, however, makes the power and applications. But in power grid, these data-centric attacks may result in instable power systems, and further

Wang, Wenye

471

Evaluating and managing the integrity of computerized accountability systems against insider threats  

SciTech Connect (OSTI)

Accountability applications such as nuclear material accountability systems at Department of Energy (DOE) facilities provide for tracking inventories, documenting transactions, issuing periodic reports, and assisting in the detection of unauthorized system access and data falsification. Insider threats against the system represent the potential to degrade the integrity with which these functions are addressed. While preventing unauthorized access by external threats is vital, it is also critical to understand how application features affect the ability of insiders to impact the integrity of data in the system. Aspects of modern computing systems including powerful personal computers and applications on networks, mixed security environments, and more users with increased software knowledge and skills help heighten the concern about insider threats. A question arises as follows. How can managers and policy makers logically and pragmatically analyze the myriad customization and design options for accountability applications with respect to the insider threat. In this paper, we describe a methodology for addressing this question, along with insights from its application to local area network (LAN) material accountability systems.

Jones, E.; Sicherman, A.

1996-06-01T23:59:59.000Z

472

Threat Analysis of Portable Hack Tools from USB Storage Devices and Protection Solutions  

E-Print Network [OSTI]

Threat Analysis of Portable Hack Tools from USB Storage Devices and Protection Solutions Dung V hack tools. However, beside U3 technology, attackers also have another more flexible alternative, portable application or application virtualization, which allows a wide range of hack tools to be compiled

Halgamuge, Malka N.

473

Marine biodiversity in the Caribbean UK overseas territories: Perceived threats and constraints to environmental management  

Science Journals Connector (OSTI)

Islands are often considered to be a priority for conservation, because of their relatively high levels of biodiversity and their vulnerability to a range of natural and anthropogenic threats. However, the capacity of islands to conserve and manage biodiversity may depend upon their governance structures. Many island states are affiliated to other countries through an overseas territory status, which may provide them with access to resources and support mechanisms, but which may also influence the capacity for local-scale management of environmental issues. The United Kingdom has 12 island Overseas Territories (UKOTs), most of which support biodiversity of high conservation concern. This study investigates perceptions of current and future threats to marine ecosystems and constraints to environmental protection on the six Caribbean UKOTs, through semi-structured interviews with officials from UK and UKOT government departments and non-governmental organisations. Coastal development, pollution and over-fishing were perceived as threats of most concern for the next decade, but climate change was perceived as by far the greatest future threat to the islands' marine ecosystems. However, a series of common institutional limitations that currently constrain mitigation and conservation efforts were also identified, including insufficient personnel and financial support, a lack of long-term, sustainable projects for persistent environmental problems and inadequate environmental legislation. These findings highlight the need for regional cooperation and capacity-building throughout the Caribbean and a more concerted approach to an UKOT environmental management by the UK and UKOTs' governments.

J. Forster; I.R. Lake; A.R. Watkinson; J.A. Gill

2011-01-01T23:59:59.000Z

474

Recent advances to address European Union Health Security from cross border chemical health threats  

Science Journals Connector (OSTI)

Abstract The European Union (EU) Decision (1082/2013/EU) on serious cross border threats to health was adopted by the European Parliament in November 2013, in recognition of the need to strengthen the capacity of Member States to coordinate the public health response to cross border threats, whether from biological, chemical, environmental events or events which have an unknown origin. Although mechanisms have been in place for years for reporting cross border health threats from communicable diseases, this has not been the case for incidents involving chemicals and/or environmental events. A variety of collaborative EU projects have been funded over the past 10years through the Health Programme to address gaps in knowledge on health security and to improve resilience and response to major incidents involving chemicals. This paper looks at the EU Health Programme that underpins recent research activities to address gaps in resilience, planning, responding to and recovering from a cross border chemical incident. It also looks at how the outputs from the research programme will contribute to improving public health management of transnational incidents that have the potential to overwhelm national capabilities, putting this into context with the new requirements as the Decision on serious cross border threats to health as well as highlighting areas for future development.

R. Duarte-Davidson; R. Orford; S. Wyke; M. Griffiths; R. Amlt; R. Chilcott

2014-01-01T23:59:59.000Z

475

Botnets: To what extent are they a threat to information security?  

Science Journals Connector (OSTI)

Russian advertisement offering botnet services The purpose of this article is to examine to what extent botnets pose a threat to information security. In Chapter 1 the terms in the title are defined, and a comprehensive overview of botnets is provided ...

Claire Elliott

2010-08-01T23:59:59.000Z

476

Factoring species, non-species values and threats into biodiversity prioritisation across the ecoregions  

E-Print Network [OSTI]

population density, and the extinction risk of species. This threat index is positively correlated with all the ecoregions of Africa and its islands Neil D. Burgessa,b, *, Jennifer D'Amico Halesa , Taylor H. Rickettsa I N F O Article history: Received 3 September 2004 Available online 11 October 2005 Keywords: Africa

Vermont, University of

477

Threat-based evaluation for context-aware multimedia surveillance system  

Science Journals Connector (OSTI)

Multimedia surveillance has become commonplace and getting increasingly intelligent in recent years. The technological advances in computer-vision techniques help to detect suspicious movement and identify objects. Meanwhile, as surveillance system is ... Keywords: context-aware, cost, multimedia surveillance, privacy, security, threat evaluation

Yuan Tian; Biao Song; Mznah Al-Rodhaan; Abdullah Al-Dhelaan; Eui-Nam Huh

2014-01-01T23:59:59.000Z

478

Alternative Fuels Data Center: State Agency Energy Plan  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

State Agency Energy State Agency Energy Plan to someone by E-mail Share Alternative Fuels Data Center: State Agency Energy Plan on Facebook Tweet about Alternative Fuels Data Center: State Agency Energy Plan on Twitter Bookmark Alternative Fuels Data Center: State Agency Energy Plan on Google Bookmark Alternative Fuels Data Center: State Agency Energy Plan on Delicious Rank Alternative Fuels Data Center: State Agency Energy Plan on Digg Find More places to share Alternative Fuels Data Center: State Agency Energy Plan on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type State Agency Energy Plan To improve air quality and reduce operating expenses from state vehicle use, all state agencies were directed to reduce petroleum consumption by

479

Alternative Fuels Data Center: State Agency Strategic Energy Plans  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

State Agency Strategic State Agency Strategic Energy Plans to someone by E-mail Share Alternative Fuels Data Center: State Agency Strategic Energy Plans on Facebook Tweet about Alternative Fuels Data Center: State Agency Strategic Energy Plans on Twitter Bookmark Alternative Fuels Data Center: State Agency Strategic Energy Plans on Google Bookmark Alternative Fuels Data Center: State Agency Strategic Energy Plans on Delicious Rank Alternative Fuels Data Center: State Agency Strategic Energy Plans on Digg Find More places to share Alternative Fuels Data Center: State Agency Strategic Energy Plans on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type State Agency Strategic Energy Plans Each Arkansas state agency must develop an individual strategic energy plan

480

Identifying Non-Federal Cooperating Agencies in Implementing the Procedural  

Broader source: Energy.gov (indexed) [DOE]

Identifying Non-Federal Cooperating Agencies in Implementing the Identifying Non-Federal Cooperating Agencies in Implementing the Procedural Requirements of NEPA Identifying Non-Federal Cooperating Agencies in Implementing the Procedural Requirements of NEPA The purpose of this Council on Environmental Quality Memorandum is to ensure that all federal and non-federal cooperating agencies are identified on the cover sheet of each Environmental Impact Statement (EIS) prepared by your agency. G-CEQ-IdentnonfedCooperatingAgencies.pdf More Documents & Publications Designation of Non-Federal Agencies as Cooperating Agencies Cooperating Agencies in Implementing the Procedural Requirements of the National Environmental Policy Act Reporting Cooperating Agencies in Implementing the Procedural Requirements of the National Environmental Policy Act

Note: This page contains sample records for the topic "threat reduction agency" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Agency datasets monthly list | Data.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Green Energy (R&D Results) Data Service Contains bibliographic data for research and development results relating to various forms of green energy, including solar, wind, tidal, bioenergy, and others, resulting from sponsored research by the Department of Energy and predecessor agencies. Default request returns first twenty-five records. See Technical Documentation for instructions on obtaining additional records. This data service allows the downloading of bibliographic records in formats that can be used to load the records into other databases or search tools. To search the DOE Green Energy Portal, use the Agency Program Page below. DOE OSTI Science and Technology 2013-10-31 09:41:29 Green Energy (R&D Results) Data Service Contains bibliographic data for research and development results relating to various forms of green energy, including solar, wind, tidal, bioenergy, and others, resulting from sponsored research by the Department of Energy and predecessor agencies. Default request returns first twenty-five records. See Technical Documentation for instructions on obtaining additional records. This data service allows the downloading of bibliographic records in formats that can be used to load the records into other databases or search tools. To search the DOE Green Energy Portal, use the Agency Program Page below. DOE OSTI Science and Technology 2013-10-31 09:41:29 DOE Green Energy (Patents) Data Service Contains bibliographic data for patents relating to various forms of green energy, including solar, wind, tidal, bioenergy, and others, resulting from sponsored research by the Department of Energy and predecessor agencies. Default request returns first twenty-five records. See Technical Documentation for instructions on obtaining additional records. This data service allows the downloading of bibliographic records in formats that can be used to load the records into other databases or search tools. To search the DOE Green Energy Portal, use the Agency Program Page below. DOE OSTI Science and Technology 2013-10-31 09:41:29

482

Identification of Genomic Signatures for the Design of Assays for the Detection and Monitoring of Anthrax Threats  

E-Print Network [OSTI]

of Anthrax Threats S. Draghici, P. Khatri, Y. Liu, K.J. Chase, E.A. Bode, D.A. Kulesh, L.P. Wasieloski, D OF ASSAYS FOR THE DETECTION AND MONITORING OF ANTHRAX THREATS SORIN DRAGHICI1, , PURVESH KHATRI1

483

Evaluate Greenhouse Gas Reduction Strategies | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Reduction Strategies Reduction Strategies Evaluate Greenhouse Gas Reduction Strategies October 7, 2013 - 10:16am Addthis For each major emission source identified in the previous step to evaluate greenhouse gas (GHG) emission profile, Federal agencies should review possible strategies for reducing GHG emissions and determine what assets may benefit from each strategy. This guidance describes technologies, policies, practices, and other strategies for reducing GHG emissions from each major emission source: Buildings Vehicles and mobile equipment Business travel Employee commuting. It also helps users determine what strategies are applicable to their facilities, employees, or other assets, and estimate the GHG emissions that may be avoided if they are adopted. For example, a facility manager may

484

Heavy Oil Consumption Reduction Program (Quebec, Canada) | Department of  

Broader source: Energy.gov (indexed) [DOE]

Heavy Oil Consumption Reduction Program (Quebec, Canada) Heavy Oil Consumption Reduction Program (Quebec, Canada) Heavy Oil Consumption Reduction Program (Quebec, Canada) < Back Eligibility Commercial Agricultural Industrial Construction Savings Category Solar Buying & Making Electricity Maximum Rebate $5 million per site Program Info Funding Source Government of Quebec State Quebec Program Type Rebate Program Provider Agence de l'efficacité énergétique This program helps heavy oil consumers move toward sustainable development while improving their competitive position by reducing their consumption. Financial assistance is offered to carry out various analyses as well as implement energy efficient measures relating to heavy fuel oil or to switch to other forms of energy containing fewer pollutants, such as natural gas,

485

TEMPORARY AGENCY APPOINTMENTS HUMAN RESOURCES GUIDELINE  

E-Print Network [OSTI]

submit the Request for Temporary Support form to Workforce Planning available on the Human Resources web or performance issues should be reported to Workforce Planning. Workforce Planning will contact the temporary of the Request for Temporary Support, Workforce Planning will determine that the services of a temporary agency

Su, Xiao

486

Project Title Project Sponsor (funding agency)  

E-Print Network [OSTI]

and procedures applicable to the above project; and we confirm that the PI is eligible to apply in accordance Project Title Project Sponsor (funding agency) Declaration of Principal Investigator (PI) I certify that: I agree that my participation in the project must be in accordance with all

Saskatchewan, University of

487

UNITED STATES OF AMERICA ENVIRONMENTAL PROTECTION AGENCY  

E-Print Network [OSTI]

ENVIRONMENTAL PROTECTION AGENCY PUBLIC COMMENT ON CERTIFICATION OF WASTE ISOLATION PILOT PROJECT CARLSBAD, NEW JANUARY 5, 1997 - CARLSBAD, NEW MEXICO SANTA FE DEPOSITION SERVICE (505) 983-4643 #12;1 2 3 4 5 6 7 8 9 FRANK HANSENN 59 PAUL SANCHEZ 62 MARY ELLEN KLAUS 66 JANUARY 5, 1997 - CARLSBAD, NEW MEXICO SANTA FE

488

U.S. Environmental Protection Agency  

Broader source: Energy.gov [DOE]

The U.S. Environmental Protection Agency's (EPA) Combined Heat and Power (CHP) Partnership works to raise awareness in the effective use of CHP, especially in market sectors where there has been historically limited use. The Partnership provides technical support to all public and private industry sectors with its current focus sectors being municipal wastewater treatment facilities, data centers, utilities, and tribal casinos.

489

Alternative Fuels Data Center: State Agency Alternative Fuel Use  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

State Agency State Agency Alternative Fuel Use Requirement to someone by E-mail Share Alternative Fuels Data Center: State Agency Alternative Fuel Use Requirement on Facebook Tweet about Alternative Fuels Data Center: State Agency Alternative Fuel Use Requirement on Twitter Bookmark Alternative Fuels Data Center: State Agency Alternative Fuel Use Requirement on Google Bookmark Alternative Fuels Data Center: State Agency Alternative Fuel Use Requirement on Delicious Rank Alternative Fuels Data Center: State Agency Alternative Fuel Use Requirement on Digg Find More places to share Alternative Fuels Data Center: State Agency Alternative Fuel Use Requirement on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type State Agency Alternative Fuel Use Requirement

490

Cooperating Agencies in Implementing the Procedural Requirements of NEPA  

Broader source: Energy.gov (indexed) [DOE]

30, 2002 30, 2002 MEMORANDUM FOR THE HEADS OF FEDERAL AGENCIES FROM: JAMES CONNAUGHTON Chair SUBJECT: COOPERATING AGENCIES IN IMPLEMENTING THE PROCEDURAL REQUIREMENTS OF THE NATIONAL ENVIRONMENTAL POLICY ACT The purpose of this Memorandum is to ensure that all Federal agencies are actively considering designation of Federal and non-federal cooperating agencies in the preparation of analyses and documentation required by the National Environmental Policy Act (NEPA), and to ensure that Federal agencies actively participate as cooperating agencies in other agency's NEPA processes. 1 The CEQ regulations addressing cooperating agencies status (40 C.F.R. §§ 1501.6 & 1508.5) implement the NEPA mandate that Federal agencies responsible for preparing NEPA

491

Alternative Fuels Data Center: State Agency Alternative Fuel Use  

Alternative Fuels and Advanced Vehicles Data Center [Office of Energy Efficiency and Renewable Energy (EERE)]

State Agency State Agency Alternative Fuel Use Requirement to someone by E-mail Share Alternative Fuels Data Center: State Agency Alternative Fuel Use Requirement on Facebook Tweet about Alternative Fuels Data Center: State Agency Alternative Fuel Use Requirement on Twitter Bookmark Alternative Fuels Data Center: State Agency Alternative Fuel Use Requirement on Google Bookmark Alternative Fuels Data Center: State Agency Alternative Fuel Use Requirement on Delicious Rank Alternative Fuels Data Center: State Agency Alternative Fuel Use Requirement on Digg Find More places to share Alternative Fuels Data Center: State Agency Alternative Fuel Use Requirement on AddThis.com... More in this section... Federal State Advanced Search All Laws & Incentives Sorted by Type State Agency Alternative Fuel Use Requirement

492

Establish Internal Greenhouse Gas Emission Reduction Targets  

Broader source: Energy.gov [DOE]

Not all administrative units within the agency have the same potential to contribute to agency-level targets. This step aims to help agencies establish what each major administrative unit (e.g. program site) should contribute to the agency goal based on its planned growth trajectory and estimates of its cost and potential to reduce GHG emissions.

493

List of Publications from the Energy for Development and Poverty Reduction  

Open Energy Info (EERE)

List of Publications from the Energy for Development and Poverty Reduction List of Publications from the Energy for Development and Poverty Reduction Website Jump to: navigation, search Tool Summary LAUNCH TOOL Name: List of Publications from the Energy for Development and Poverty Reduction Website Agency/Company /Organization: Energy for Development and Poverty Reduction Sector: Energy Focus Area: Renewable Energy Phase: Create a Vision Topics: - Energy Access, Finance Resource Type: Publications User Interface: Website Website: www.energyfordevelopment.com/p/publications.html Language: English List of publications from the Energy for Development and Poverty Reduction website. Publications mainly focus on rural electrification and cooking stoves and its potential environmental, social and health benefits. List of publications from the Energy for Development and Poverty Reduction

494

Economics of Grade Reduction  

E-Print Network [OSTI]

the following abbreviations are used:* C25 diameter in inches of high pressure cylinder. c= diameter in inches of low pressure cylinder. P= boiler pressure. R}= ratio of mean effective pressure to boiler pressure in low pressure cylinder, taken from Pig. E.... But the only error of moment in such case will be in the es- timated saving in train mileage, for the same degree of efficiency or inefficiency is to be expected after the reduction of grade as before. As the estimated saving per train mile as given...

Neff, Paul J.

1914-02-10T23:59:59.000Z

495

Project Information Form Project Title Reduction of Lifecycle Green House Gas Emissions From Road  

E-Print Network [OSTI]

Project Information Form Project Title Reduction of Lifecycle Green House Gas Emissions From Road@ucdavis.edu Funding Source(s) and Amounts Provided (by each agency or organization) US DOT $30,000 Total Project Cost Brief Description of Research Project This white paper will summarize the state of knowledge and state

California at Davis, University of

496

Evaluate Greenhouse Gas Reduction Strategies  

Broader source: Energy.gov [DOE]

For each major emission source identified in the previous step to evaluate greenhouse gas (GHG) emission profile, Federal agencies should review possible strategies for reducing GHG emissions and determine what assets may benefit from each strategy.

497

Hydrogen economy in China: Strengthsweaknessesopportunitiesthreats analysis and strategies prioritization  

Science Journals Connector (OSTI)

Abstract The objective of this paper is to analyze the internal and external environment of hydrogen economy in China using strengthsweaknessesopportunitiesthreats (SWOT) analytical method, and then to prioritize the strategies for promoting the development of hydrogen economy in China. After the key strengths, weaknesses, opportunities and threats of the hydrogen economy in China were identified and nine effective strategies were proposed, a multi-criteria decision-making method by integrating goal programming and fuzzy theory has been developed for prioritizing these strategies, which can help the stakeholders/decision-makers to implement these strategies appropriately, The proposed method is not limited to China, and it is a generic method that can also be used to study the hydrogen economy of other regions.

Jingzheng Ren; Suzhao Gao; Shiyu Tan; Lichun Dong

2015-01-01T23:59:59.000Z

498

Review of July 2013 Nuclear Security Insider Threat Exercise November 2013  

SciTech Connect (OSTI)

This document is a review of the Nuclear Security Insider Threat Exercise which was hosted at ORNL in July 2013. Nuclear security culture and the insider threat are best learned through experience. Culture is inherently difficult to teach, and as such is best learned through modeled behaviors and learning exercise. This TTX, NSITE, is a tool that strives to aid students in learning what an effective (and ineffective) nuclear security culture might look like by simulating dynamic events that strengthen or weaken the nuclear security regime. The goals of NSITE are to stimulate complex thought and discussion and assist decision makers and management in determining the most effective policies and procedures for their country or facility.

Pederson, Ann C. [ORNL] [ORNL; Snow, Catherine L. [ORNL] [ORNL; Townsend, Jeremy [ORNL] [ORNL; Shannon, Michael [ORNL] [ORNL

2013-11-01T23:59:59.000Z

499

Backscatter from the Data Plane --- Threats to Stability and Security in Information-Centric Networking  

E-Print Network [OSTI]

Information-centric networking approaches attract much attention in the ongoing search for a future communication paradigm of the Internet. Replacing the host-to-host connectivity by a data-oriented publish/subscribe service eases content distribution and authentication by concept, while eliminating all threats from unwanted traffic. However, current proposals to content routing heavily rely on data-driven protocol events and thereby introduce a strong coupling of the control to the data plane in the underlying routing infrastructure. In this paper, we analyze in theory and practical experiments threats to the stability and performance of the content distribution system. We discuss new attack vectors present in its current state of development, as well as possibilities and limitations to mitigate them.

Vahlenkamp, Matthias Whlisch Thomas C Schmidt Markus

2012-01-01T23:59:59.000Z

500

Reduction relations for monoid semirings  

Science Journals Connector (OSTI)

In this paper we study rewriting techniques for monoid semirings. Based on disjoint and non-disjoint representations of the elements of monoid semirings we define two different reduction relations. We prove that in both cases the reduction relation describes ... Keywords: Confluence, Congruence, Critical pair, Reduction relation, Rewriting system, Semiring, Termination

Friedrich Otto; Olga Sokratova

2004-03-01T23:59:59.000Z