Sample records for threat reduction initiative

  1. NNSA's Global Threat Reduction Initiative launches mobile app...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Press Releases Video Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home NNSA Blog NNSA's Global Threat Reduction Initiative launches mobile app...

  2. NNSA's Global Threat Reduction Initiative Removes More Than One...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Press Releases Video Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home NNSA Blog NNSA's Global Threat Reduction Initiative Removes More ......

  3. Global threat reduction initiative Russian nuclear material removal progress

    SciTech Connect (OSTI)

    Cummins, Kelly [DOE/NNSA (United States); Bolshinsky, Igor [INL/NNSA (United States)

    2008-07-15T23:59:59.000Z

    In December 1999 representatives from the United States, the Russian Federation, and the International Atomic Energy Agency (IAEA) started discussing a program to return to Russia Soviet- or Russian-supplied highly enriched uranium (HEU) fuel stored at the Russian-designed research reactors outside Russia. Trilateral discussions among the United States, Russian Federation, and the International Atomic Energy Agency (IAEA) have identified more than 20 research reactors in 17 countries that have Soviet- or Russian-supplied HEU fuel. The Global Threat Reduction Initiative's Russian Research Reactor Fuel Return Program is an important aspect of the U.S. Government's commitment to cooperate with the other nations to prevent the proliferation of nuclear weapons and weapons-usable proliferation-attractive nuclear materials. To date, 496 kilograms of Russian-origin HEU have been shipped to Russia from Serbia, Latvia, Libya, Uzbekistan, Romania, Bulgaria, Poland, Germany, and the Czech Republic. The pilot spent fuel shipment from Uzbekistan to Russia was completed in April 2006. (author)

  4. The Global Threat Reduction Initiative's Orphan Source Recovery Project in the Russian Federation

    SciTech Connect (OSTI)

    Russell, J. W. [NSTec; Ahumada, A. D. [NSTec; Blanchard, T. A. [NNSA

    2012-06-04T23:59:59.000Z

    After 9/11, officials at the United States Department of Energy (DOE), National Nuclear Security Administration (NNSA) grew more concerned about radiological materials that were vulnerable to theft and illicit use around the world. The concern was that terrorists could combine stolen radiological materials with explosives to build and detonate a radiological dispersal device (RDD), more commonly known as a “dirty bomb.” In response to this and other terrorist threats, the DOE/NNSA formed what is now known as the Global Threat Reduction Initiative (GTRI) to consolidate and accelerate efforts to reduce and protect vulnerable nuclear and radiological materials located at civilian sites worldwide. Although a cooperative program was already underway in the Russian Federation to secure nuclear materials at a range of different facilities, thousands of sealed radioactive sources remained vulnerable at medical, research, and industrial sites. In response, GTRI began to focus efforts on addressing these materials. GTRI’s Russia Orphan Source Recovery Project, managed at the Nevada National Security Site’s North Las Vegas facility, was initiated in 2002. Throughout the life of the project, Joint Stock Company “Isotope” has served as the primary Russian subcontractor, and the organization has proven to be a successful partner. Since the first orphan source recovery of an industrial cobalt-60 irradiator with 647 curies (Ci) at an abandoned facility in Moscow in 2003, the GTRI Orphan Source Recovery Project in the Russian Federation has accomplished substantial levels of threat reduction. To date, GTRI has recovered and securely disposed of more than 5,100 sources totaling more that 628,000 Ci. This project serves as an extraordinary example of how international cooperation can be implemented by partners with mutual interests to achieve significant goals.

  5. Global Threat Reduction Initiative Fuel-Thermo-Physical Characterization Project Quality Assurance Plan

    SciTech Connect (OSTI)

    Pereira, Mario M.; Slonecker, Bruce D.

    2012-06-01T23:59:59.000Z

    The charter of the Fuel Thermo-Physical Characterization Project is to ready Pacific Northwest National Laboratory (PNNL) facilities and processes for the receipt of unirradiated and irradiated low enriched uranium (LEU) molybdenum (U-Mo) fuel element samples, and to perform analysis to support the Global Threat Reduction Initiative conversion program. PNNL’s support for the program will include the establishment of post-irradiation examination processes, including thermo-physical properties, unique to the U.S. Department of Energy laboratories. These processes will ultimately support the submission of the base fuel qualification (BFQ) to the U.S. Nuclear Regulatory Commission (NRC) and revisions to High Performance Research Reactor Safety Analysis Reports to enable conversion from highly enriched uranium to LEU fuel. This quality assurance plan (QAP) provides the quality assurance requirements and processes that support the NRC BFQ. This QAP is designed to be used by project staff, and prescribes the required management control elements that are to be met and how they are implemented. Additional controls are captured in Fuel Thermo-Physical Characterization Project plans, existing procedures, and procedures to be developed that provide supplemental information on how work is conducted on the project.

  6. An overview of the global threat reduction initiative's physical protection work in Tanzania.

    SciTech Connect (OSTI)

    Banzi, Firmi Paul (Tanzania Atomic Energy Commission Arusha, United Republic of Tanzania); Itamura, Michael Takeshi (U.S. Department of Energy National Nuclear Security Administration, Washington, DC); Robinson, Phillip W. (U.S. Department of Energy National Nuclear Security Administration, Washington, DC); Strosinski, Micheal Vernon

    2010-06-01T23:59:59.000Z

    The U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) established the Global Threat Reduction Initiative's (GTRI) mission to reduce and protect nuclear and radiological materials located at civilian sites worldwide. Internationally, over 80 countries are cooperating with GTRI to enhance security of facilities with these materials. In 2004, a GTRI delegation began working with the Tanzania Atomic Energy Commission, (TAEC). The team conducted site assessments for the physical protection of radiological materials in Tanzania. Today, GTRI and the Government of Tanzania continue cooperative efforts to enhance physical security at several radiological sites, including a central sealed-source storage facility, and sites in the cities of Arusha, Dar Es Salaam, and Tanga. This paper describes the scope of physical protection work, lessons learned, and plans for future cooperation between the GTRI program and the TAEC. Additionally the paper will review the cooperative efforts between TAEC and the International Atomic Energy Agency (IAEA) with regards to a remote monitoring system at a storage facility and to the repackaging of radioactive sources.

  7. Global Threat Reduction Initiative Fuel Thermo-Physical Characterization Project: Sample Management Plan

    SciTech Connect (OSTI)

    Casella, Amanda J.; Pereira, Mario M.; Steen, Franciska H.

    2013-01-01T23:59:59.000Z

    This sample management plan provides guidelines for sectioning, preparation, acceptance criteria, analytical path, and end-of-life disposal for the fuel element segments utilized in the Global Threat Reduction Initiative (GTRI), Fuel Thermo-Physical Characterization Project. The Fuel Thermo-Physical Characterization Project is tasked with analysis of irradiated Low Enriched Uranium (LEU) Molybdenum (U-Mo) fuel element samples to support the GTRI conversion program. Sample analysis may include optical microscopy (OM), scanning electron microscopy (SEM) fuel-surface interface analysis, gas pycnometry (density) measurements, laser flash analysis (LFA), differential scanning calorimetry (DSC), thermogravimetry and differential thermal analysis with mass spectroscopy (TG /DTA-MS), Inductively Coupled Plasma Spectrophotometry (ICP), alpha spectroscopy, and Thermal Ionization Mass Spectroscopy (TIMS). The project will utilize existing Radiochemical Processing Laboratory (RPL) operating, technical, and administrative procedures for sample receipt, processing, and analyses. Test instructions (TIs), which are documents used to provide specific details regarding the implementation of an existing RPL approved technical or operational procedure, will also be used to communicate to staff project specific parameters requested by the Principal Investigator (PI). TIs will be developed, reviewed, and issued in accordance with the latest revision of the RPL-PLN-700, RPL Operations Plan. Additionally, the PI must approve all project test instructions and red-line changes to test instructions.

  8. Global Threat Reduction Initiative

    E-Print Network [OSTI]

    Kemner, Ken

    the dual application of splitting the atom, U.S. policy towards civilian use of highly enriched uranium and test reactors fueled first with low enriched uranium (LEU) and then later with HEU. By the early 1970s as the nuclear material protection and removal programs. Since 1978, under RERTR and more recently under GTRI

  9. Global Threat Reduction Initiative

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy ChinaofSchaefer To: CongestionDevelopment of a downholeReactors |Department ofGraphic

  10. Global Threat Reduction Initiative

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently Asked Questions for DOE FY 2011Talley,GENIIFY14 BudgetHollettGive UsDepartment ofGlobal

  11. Radiological Threat Reduction | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Radiation Protection Regulations:Radiological Threat Reduction SHARE

  12. Metamaterials for threat reduction applications: imaging, signal processing, and cloaking

    E-Print Network [OSTI]

    Metamaterials for threat reduction applications: imaging, signal processing, and cloaking R. D effort is underway to fill this "THz gap" in view of potential threat reduction applications) and Theoretical Divisions, are exploring metamaterials-based de- vices operating at THz frequencies for threat

  13. Global Threat Reduction Initiative | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM Flash2011-12 OPAMGeneral Guidance onGlenn Podonsky

  14. Global Threat Reduction Initiative | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2 OPAM Flash2011-12 OPAMGeneral Guidance onGlenn PodonskyAn overview of the

  15. DEFENSE THREAT REDUCTION AGENCY 8725 JOHN J . KINGMAN ROAD, STOP 620 1

    E-Print Network [OSTI]

    Spence, Harlan Ernest

    DEFENSE THREAT REDUCTION AGENCY 8725 JOHN J . KINGMAN ROAD, STOP 620 1 FORT BELVOIR, VA 22060-6201 February 28, 2013 Industry and Academia Partners of the Defense Threat Reduction Agency and U.S. Strategic of unceltainty for the entire Department of Defense. The Def1 ns Threat Reduction Agency and U. S. Strategic

  16. AMBASSADOR BONNIE D. JENKINS Coordinator, Threat Reduction Programs,

    E-Print Network [OSTI]

    to address these challenges? How can PNNL's capabilities--from basic science through technology development, deployment, and training--address emerging threats? For more information, please contact PNNL's Center for Global Security. Jana Fankhauser, Director, jana.fankhauser@pnl.gov · http://cgs.pnnl.gov PNNL-SA-78562

  17. NNSA's Global Threat Reduction Initiative Receives 2010 Distinguished...

    National Nuclear Security Administration (NNSA)

    said Mark A. Langley, president and CEO of PMI. "Few organizational missions demand excellent project execution more than the NNSA G2 project. It is extremely...

  18. NNSA Launches Global Threat Reduction Initiative | National Nuclear

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTubahq.na.govSecurityMaintainingAdministrationAnnouncement of

  19. Global Threat Reduction Initiative | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist.NewofGeothermal Heat Pump Basics31/2007 TeppeiProgramsGlobal

  20. Global Threat Reduction Initiative Africa and Middle East Project Plan 2012

    SciTech Connect (OSTI)

    Jamison, Jeremy D.

    2012-02-01T23:59:59.000Z

    GTRI Africa and Middle East Project Plan submitted for school project to American Graduate University.

  1. NNSA's Global Threat Reduction Initiative Removes More Than One Ton of

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA Approved: 5-13-14 FEDERAL EMPLOYEEAdministration takes part in

  2. U.S. Global Threat Reduction Initiative/U.S.-Origin Nuclear Fuel Removals |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3E Ambassadors and C3EDepartment3 AnnualANNOUNCEMENTofDepartment

  3. The Global Threat Reduction Initiative's Molybdenum-99 Program, OAS-L-12-07

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergy Solar Decathlon2001 PowerofUseResearch and TrainingAudit

  4. The National Nuclear Security Administration Global Threat Reduction Initiative's Contract Administration, OAS-L-12-01

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssuesEnergy Solar Decathlon2001Competitiveness |The MakingThe

  5. BOMB THREAT CALL PROCEDURES

    E-Print Network [OSTI]

    Guo, Ting

    THREAT CALL PROCEDURES BOMB THREAT CHECKLIST Date: Time: Time Caller Phone Number Where Hung Up: Call Received:Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act threat is received by phone: 1. Remain calm. Keep the caller on the line for as long as possible. DO

  6. Vacuoles: a hollow threat?

    E-Print Network [OSTI]

    Yaksh, Tony L.

    2010-01-01T23:59:59.000Z

    2 EDITORIALS Vacuoles: a hollow threat? Tony L. Yaksh, PhDthat Vacuoles: a hollow threat? provided by procaine anda l’esprit : Vacuoles: a hollow threat? Ces vacuoles acides

  7. Research Article Signaling Threat

    E-Print Network [OSTI]

    Gross, James J.

    Research Article Signaling Threat How Situational Cues Affect Women in Math, Science and organization,canmake potentialtargetsvulnerabletosocial identity threat.Objective and subjective measuresofidentity threat were collected from male and female math, science, and engineering (MSE) majors who watched

  8. Insider Threat Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-06-02T23:59:59.000Z

    To establish responsibilities and requirements for the Department of Energy (DOE) Insider Threat Program (ITP) to deter, detect, and mitigate insider threat actions by Federal and contractor employees in accordance with the requirements of Executive Order 13587, the National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs and other government-wide and DOE requirements. Does not cancel other directives.

  9. Cyber threat metrics.

    SciTech Connect (OSTI)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01T23:59:59.000Z

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  10. Identity Implications of Relationship (Re)Definition Goals: An Analysis of Face Threats and Facework as Young Adults Initiate, Intensify, and Disengage from Romantic Relationships

    E-Print Network [OSTI]

    Kunkel, Adrianne; Wilson, Steven R.; Robson, Scott; Soliz, Jordan; Olufowote, James O.

    2009-01-01T23:59:59.000Z

    Identity implications theory (IIT) is applied to analyze how young adults manage identity concerns associated with the goals of initiating, intensifying, and disengaging from romantic relationships. Participants wrote their ...

  11. BOMB THREAT CALL PROCEDURES

    E-Print Network [OSTI]

    Boyce, Richard L.

    BOMB THREAT CALL PROCEDURES WHO TO CONTACT (select one) · Follow your local guidelines · Federal Protective Service (FPS) Police 1-877-4-FPS-411 (1-877-437-7411) · 911 Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act quickly, but remain calm and obtain

  12. Reduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection RadiationRecord-SettingHead of ContractingofReducing WasteReduction

  13. Reduction of damage initiation density in fused silica optics via UV laser conditioning

    DOE Patents [OSTI]

    Peterson, John E.; Maricle, Stephen M.; Brusasco, Raymond M.; Penetrante, Bernardino M.

    2004-03-16T23:59:59.000Z

    The present invention provides a method for reducing the density of sites on the surface of fused silica optics that are prone to the initiation of laser-induced damage, resulting in optics which have far fewer catastrophic defects and are better capable of resisting optical deterioration upon exposure for a long period of time to a high-power laser beam having a wavelength of about 360 nm or less. The initiation of laser-induced damage is reduced by conditioning the optic at low fluences below levels that normally lead to catastrophic growth of damage. When the optic is then irradiated at its high fluence design limit, the concentration of catastrophic damage sites that form on the surface of the optic is greatly reduced.

  14. Scientific uncertainties in atmospheric mercury models III: Boundary and initial conditions, model grid resolution, and Hg(II) reduction mechanism

    SciTech Connect (OSTI)

    Lin, Che-Jen [ORNL; Pongprueksa, Pruek [Lamar University; Lindberg, Steven Eric [ORNL; Jang, Carey [U.S. Environmental Protection Agency, Raleigh, North Carolina; Braverman, Thomas [U.S. Environmental Protection Agency, Raleigh, North Carolina; Bullock, Russell O [NOAA; Ho, Thomas [ORNL; Chu, Hsing-Wei [Lamar University

    2008-03-01T23:59:59.000Z

    In this study, the model response in terms of simulated mercury concentration and deposition to boundary condition (BC), initial condition (IC), model grid resolution (12 km versus 36 km), and two alternative Hg(II) reduction mechanisms, was investigated. The model response to the change of gaseous elemental mercury (GEM) concentration from 0 to 2 ngm3 in IC/BC is found to be very linear (r240.99) based on the results of sensitivity simulations in July 2001. An increase of 1 ngm3 of GEM in BC resulted in an increase of 0.81 ngm3 in the monthly average of total mercury concentration, and 1270 ngm2 in the monthly total deposition. IC has similar but weaker effects compared to those of BC. An increase of 1 ngm3 of GEM in IC resulted in an increase of 0.14 ngm3 in the monthly average of total mercury concentration, and 250 ngm2 in the monthly total deposition. Varying reactive gaseous mercury (RGM) or particulate mercury (PHg) in BC/IC has much less significant impact. Simulation results at different grid resolutions show good agreement (slope 0.950 1.026, r 0.816 0.973) in mercury concentration, dry deposition, and total deposition. The agreement in wet deposition is somewhat weaker (slope 0.770 0.794, r 0.685 0.892) due to the difference in emission dilution and simulated precipitation that subsequently change reaction rates in the aqueous phase. Replacing the aqueous Hg(II)-HO2 reduction by either RGM reduction by CO (51018cm3 molecule1 s1) or photoreduction of RGM (1105 s1) gives significantly better model agreement with the wet deposition measured by Mercury Deposition Network (MDN). Possible ranges of the reduction rates are estimated based on model sensitivity results. The kinetic estimate requires further verification by laboratory studies.

  15. Bomb threat There are two types of Bomb Threats

    E-Print Network [OSTI]

    Hickman, Mark

    v Bomb threat There are two types of Bomb Threats: 1. Specific Information/location will be given about the device, or a suspicious item and/or location. Specific Threat - On a landline Dial 6111, state you have received a "SPecific BOmB threat". If possible recall exact wording of threat. 2. Non

  16. WHAT DO THREAT LEVELS AND RESPONSE LEVELS MEAN? THREAT LEVELS

    E-Print Network [OSTI]

    Edinburgh, University of

    WHAT DO THREAT LEVELS AND RESPONSE LEVELS MEAN? THREAT LEVELS: The UK Threat Level is decided by the Government's Joint Terrorism Analysis Centre (JTAC). It is the system to assess the threat to the UK from Threat Levels: Low - an attack is unlikely Moderate - an attack is possible, but not likely Substantial

  17. BomB ThreaT Assume threat is real

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Call 911 BomB ThreaT · Assume threat is real · Evacuate area explosion/ Fire · Activate fire alarm or office, do not let the person in · Do not block person's access to an exit · Move away from the threat

  18. Radiological Threat Reduction | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    safely packaging and transporting those materials to a more stable state; and Protecting radiological materials at facilities that use or process such materials through facility...

  19. Manager, International Chemical Threat Reduction Department, Sandia

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTubahq.na.govSecurityMaintaining the Stockpile Maintaining the

  20. Cyber Threat Trees for Large System Threat Cataloging and Analysis*

    E-Print Network [OSTI]

    Thornton, Mitchell

    Cyber Threat Trees for Large System Threat Cataloging and Analysis* P. Ongsakorn, K. Turney, M, kturney, mitch, nair, szygenda, manikas}@lyle.smu.edu Abstract--The implementation of cyber threat. Because large systems have many possible threats that may be interdependent, it is crucial

  1. Threat Insight Quarterly Wireless Technology

    E-Print Network [OSTI]

    X-Force ® Threat Insight Quarterly Wireless Technology April 2006 #12;X - F O R C E T H R E A T I N the Wireless Threat ..................................................3 Wireless Threats-Force Catastrophic Risk Index...................................... 13 Future X-Force Threat Insight Quarterly Topics

  2. Status of Environmental Management Initiatives to Accelerate the Reduction of Environmental Risks and Challenges Posed by the Legacy of the Cold War

    Broader source: Energy.gov [DOE]

    This Report to Congress was prepared pursuant to section 3130 of the National Defense Authorization Act (NDAA) for Fiscal Year (FY) 2008, and summarized the EM program and initiatives to accelerate the reduction of environmental risks and challenges posed by the legacy of the Cold War.

  3. Airborne Particulate Threat Assessment

    SciTech Connect (OSTI)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31T23:59:59.000Z

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our findings and APICD Gen II subsystems for automated collection, deposition and detection of ambient particulate matter. Key findings from the APTA Program include: Ambient biological PM taxonomy; Demonstration of key subsystems needed for autonomous bioaerosol detection; System design; Efficient electrostatic collection; Automated bioagent recognition; Raman analysis performance validating Td<9 sec; Efficient collection surface regeneration; and Development of a quantitative bioaerosol defection model. The objective of the APTA program was to advance the state of our knowledge of ambient background PM composition. Operation of an automated aerosol detection system was enhanced by a more accurate assessment of background variability, especially for sensitive and specific sensing strategies like Raman detection that are background-limited in performance. Based on this improved knowledge of background, the overall threat detection performance of Raman sensors was improved.

  4. Overlooked? The Growing Threat of Desertification

    E-Print Network [OSTI]

    Zhu, Julian

    2012-01-01T23:59:59.000Z

    Overlooked? The Growing Threat of Desertification Julian Zhuovergrazing directly threat- ens the natural resilience ofspite the fact that the threat of desertification is both

  5. Proliferation: Threat and response

    SciTech Connect (OSTI)

    NONE

    1996-04-01T23:59:59.000Z

    During the height of the Cold War, the Russian physicist Andre Sakharov said, `Reducing the risk of annihilating humanity in a nuclear war carries an absolute priority over all other considerations.` The end of the Cold War has reduced the threat of global nuclear war, but today a new threat is rising from the global spread of nuclear, biological, and chemical weapons. Hostile groups and nations have tried - or have been able - to obtain these weapons, the technology, and homegrown ability to make them or ballistic missiles that can deliver the massive annihilation, poison, and death of these weapons hundreds of miles away. For rogue nations, these weapons are a ticket to power, stature, and confidence in regional war.

  6. Threat Insight Quarterly Regulatory Compliance

    E-Print Network [OSTI]

    X-Force ® Threat Insight Quarterly Regulatory Compliance www.iss.netwww.iss.net October 2006 #12 Risk Index ..............................................11 Future X-Force Threat Insight Quarterly Internet Security Systems X-Force® Threat Insight Quarterly > October 2006 ©2006 Internet Security Systems

  7. BOMB THREAT CHECKLIST Telephone Procedures

    E-Print Network [OSTI]

    Derisi, Joseph

    BOMB THREAT CHECKLIST Telephone Procedures DATE: / / TIME RECEIVED: : AM/PM CONCLUDED: : AM - GIVE NOTE SAYING "CALL UC POLICE - BOMB THREAT" 9-911 IF YOUR PHONE HAS CALLER ID DISPLAY, RECORD NUMBER OF INCOMING CALL __________________________ WRITE DOWN EXACT WORDS OF THE CALLER AND THREAT DON

  8. Threat Insight Quarterly Browser Exploitation

    E-Print Network [OSTI]

    X-Force ® Threat Insight Quarterly Browser Exploitation www.iss.netwww.iss.net January 2007 #12 . . . . . . . . . . . . . . . . . . . . . . . . 11 Previous X-Force Threat Insight Quarterly Topics . . . . . . . . . . 15 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Contents IBM Internet Security Systems X-Force® Threat Insight Quarterly > January 2007

  9. Threat Insight Quarterly Vulnerability Management

    E-Print Network [OSTI]

    X-Force ® Threat Insight Quarterly Vulnerability Management July 2006 #12;X - F O R C E T H R E.................. 7 X-Force Catastrophic Risk Index.............................. 10 Future X-Force Threat Insight Introduction There is a wide range of threats that can exist in any network. The presence of unpatched

  10. Stopping the Insider Threat: the case for implementing integrated autonomic defense mechanisms in computing systems

    E-Print Network [OSTI]

    Menascé, Daniel A.

    Stopping the Insider Threat: the case for implementing integrated autonomic defense mechanisms that are inseparable from the systems that are being defended. 1. Introduction Threats to the security of an information system may be initiated from either outside or from within an organization. Detecting such threats

  11. Emerging Threats and Opportunities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMFormsGasRelease Date:researchEmerging Threats and Opportunities

  12. Addressing the insider threat

    SciTech Connect (OSTI)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01T23:59:59.000Z

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  13. Addressing the insider threat

    SciTech Connect (OSTI)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01T23:59:59.000Z

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  14. Threat Characterization: Trajectory Dynamics

    E-Print Network [OSTI]

    Russell Schweickart; Clark Chapman; Dan Durda; Bill Bottke; David Nesvorny; Piet Hut

    2006-08-15T23:59:59.000Z

    Given a primary interest in "mitigation of the potential hazard" of near-Earth objects impacting the Earth, the subject of characterization takes on an aspect not normally present when considering asteroids as abstract bodies. Many deflection concepts are interested in the classic geophysical characteristics of asteroids when considering the physical challenge of modifying their orbits in order to cause them to subsequently miss an impact with Earth. Yet for all deflection concepts there are characteristics of the threat which overwhelm these traditional factors. For example, a close gravitational encounter with Earth some years or decades prior to impact can reduce the velocity change necessary for deflection by several orders of magnitude if the deflection precedes the close encounter (or encounters). Conversely this "benefit" comes at a "price"; a corresponding increase in the accuracy of tracking required to determine the probability of impact. Societal issues, both national and international, also characterize the NEO deflection process and these may strongly contend with the purely technical issues normally considered. Therefore critical factors not normally considered must be brought into play as one characterizes the threat of NEO impacts.

  15. PITTSBURGH REGIONAL ENVIRONMENTAL THREATS ANALYSIS

    E-Print Network [OSTI]

    Jiang, Huiqiang

    AND COMMUNITIES PITTSBURGH, PA. | AUGUST 2013 #12;PRETA AIR: HAZARDOUS AIR POLLUTANTS 32 PITTSBURGH REGIONAL ENVIRONMENTAL THREATS ANALYSIS REPORT PRETA AIR: HAZARDOUS AIR POLLUTANTS (HAPs)/AIR TOXICS PREPARED BY AUTHORSPITTSBURGH REGIONAL ENVIRONMENTAL THREATS ANALYSIS (PRETA) REPORT PRETA AIR: HAZARDOUS AIR

  16. Bio-threat microparticle simulants

    DOE Patents [OSTI]

    Farquar, George Roy; Leif, Roald

    2014-09-16T23:59:59.000Z

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  17. Bio-threat microparticle simulants

    DOE Patents [OSTI]

    Farquar, George Roy; Leif, Roald N

    2012-10-23T23:59:59.000Z

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  18. Technosocial Modeling of IED Threat Scenarios and Attacks

    SciTech Connect (OSTI)

    Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.; Young, Jonathan; Wolf, Katherine E.; Thompson, Sandra E.; Niesen, David A.; Madsen, John M.; Henderson, Cynthia L.

    2009-03-23T23:59:59.000Z

    This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

  19. The New Nuclear Threat John Deutch

    E-Print Network [OSTI]

    Deutch, John

    The New Nuclear Threat John Deutch FOREIGN AFFAIRS Volume 71 · Number 4 Foreign AffairsThe contents. Deutch THE NEW NUCLEAR THREAT he threat of nuclear weapons spread across the world has displaced the fear

  20. Network Television and the Digital Threat

    E-Print Network [OSTI]

    Lapan, Lisa

    2009-01-01T23:59:59.000Z

    NETWORK TV AND THE DIGITAL THREAT tertainment are availableNETWORK TV AND THE DIGITAL THREAT luring users to watch the91 Ryan Nakashima, Digital Threat Prompts Movie Industry

  1. Department of Energy Launches Initiative with Industry to Better...

    Office of Environmental Management (EM)

    of Energy Launches Initiative with Industry to Better Protect the Nation's Electric Grid from Cyber Threats Department of Energy Launches Initiative with Industry to Better...

  2. IBM Software Data Sheet IBM adaptive threat

    E-Print Network [OSTI]

    IBM Software Data Sheet IBM adaptive threat protection Stay ahead of security threats with a state-of-the-art network protection engine Highlights Identify high-risk threats and zero-day attacks with protocol-based, behavioral anomaly detection Protect end users against the latest web-based threats, such as SQL injection

  3. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    IBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net May 2007 #12 The Emerging Threat Landscape . . . . . . . . . . . . . . . . . . . . . . . . 2 Mobile Security Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly May

  4. Some Thoughts on Threat Modelling Peter Gutmann

    E-Print Network [OSTI]

    Gutmann, Peter

    Some Thoughts on Threat Modelling Peter Gutmann University of Auckland Traditional Threat Modelling Think up threats until you get bored, then declare victory Often leads to circular reasoning · "Our threat model is whatever our application defends against" Example: DNSSEC · The requirements document

  5. A Bayesian Belief Network of Threat Anticipation and Terrorist Motivations

    SciTech Connect (OSTI)

    Olama, Mohammed M [ORNL; Allgood, Glenn O [ORNL; Davenport, Kristen M [ORNL; Schryver, Jack C [ORNL

    2010-01-01T23:59:59.000Z

    Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) as well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.

  6. Chinese Workers: Under Threat or a Threat to American Workers?

    E-Print Network [OSTI]

    Harper Ho, Virginia E.; Zhang, Lu

    2010-07-01T23:59:59.000Z

    . At the same time, some employers have found ways to avoid following the spirit, if not the letter of the laws. The consequences for American workers are unclear, since their challenges are less about a direct threat from Chinese workers and more about...

  7. Cyber Threats to Nuclear Infrastructures

    SciTech Connect (OSTI)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01T23:59:59.000Z

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  8. Android Keylogging Threat Fadi Mohsen, Mohammed Shehab

    E-Print Network [OSTI]

    Shehab, Mohamed

    Android Keylogging Threat Fadi Mohsen, Mohammed Shehab Department of Software and Information of keylogging attacks on Android. Which is a security threat pertaining to Android openness on specific feature

  9. Nuclear Radiological Threat Task Force Established | National...

    National Nuclear Security Administration (NNSA)

    Radiological Threat Task Force Established | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  10. Chlorine Gas: An Evolving Hazardous Material Threat and Unconventional Weapon

    E-Print Network [OSTI]

    Jones, Robert; Wills, Brandon; Kang, Christopher

    2010-01-01T23:59:59.000Z

    Chlorine Gas: An Evolving Hazardous Material Threat andChlorine gas represents a hazardous material threat fromrepresents a persistent hazardous material (HAZMAT) threat.

  11. Rethinking the Cyber Threat A Framework and Path Forward

    E-Print Network [OSTI]

    Bernstein, Phil

    Rethinking the Cyber Threat A Framework and Path Forward SCOTT CHARNEY Corporate Vice President ..................................................................................................................................................5 Understanding the Cyber Threat .................................................................................................................5 Rethinking the Cyber Threat

  12. A Risk Management Approach to the 'Insider Threat'

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    Stochastic, and Insider Threat. Management Science, 48(6):modelling for insider threat mitigation. Paci?c Northwestbased model for analyzing threats that include those usually

  13. Collision Course: The Threat and Effects of an Asteroid Impact

    E-Print Network [OSTI]

    Reddy, Sharath

    2013-01-01T23:59:59.000Z

    reviewing asteroid impact threat. Retrieved from http://reviewing-asteroid-impact-threat/ Edwards, L. (2010, Octoberoccurring. Comparing the threat of an asteroid impact to the

  14. A Risk Management Approach to the 'Insider Threat'

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    Stochastic, and Insider Threat. Management Science, 48(6):modelling for insider threat mitigation. Pacific Northwestbased model for analyzing threats that include those usually

  15. Bayesian Discovery of Threat Networks

    E-Print Network [OSTI]

    Smith, Steven T; Senne, Kenneth D; Bernstein, Garrett; Philips, Scott

    2013-01-01T23:59:59.000Z

    A novel unified Bayesian framework for network detection is developed, under which a detection algorithm is derived based on random walks on graphs. The algorithm detects threat networks using partial observations of their activity, and is proved to be optimum in the Neyman-Pearson sense. The algorithm is defined by a graph, at least one observation, and a diffusion model for threat. A link to well-known spectral detection methods is provided, and the equivalence of the random walk and harmonic solutions to the Bayesian formulation is proven. A general diffusion model is introduced that utilizes spatio-temporal relationships between vertices, and is used for a specific space-time formulation that leads to significant performance improvements on coordinated covert networks. This performance is demonstrated using a new hybrid interaction model introduced to simulate random covert networks with realistic properties.

  16. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    IBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net February 2007 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly February 2007 #12;X-Force® Threat Insight Monthly > February 2007 www.iss.netwww.iss.net About this report

  17. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    IBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net June 2007 #12 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly June 2007 #12;X-Force® Threat Insight Monthly > June 2007 www.iss.netwww.iss.net About this report

  18. BOMB THREAT CHECKLIST QUESTIONS TO ASK

    E-Print Network [OSTI]

    Cui, Yan

    BOMB THREAT CHECKLIST QUESTIONS TO ASK: 1. When is the bomb going to explode? 2. Where is it right ___Clearing Throat ___Laughter ___Deep Breathing __Crying ___Cracking voice __Normal ___Disguised THREAT __Foul ___Taped __Message read by threat maker __Irrational If voice is familiar, who did it sound like

  19. REVIEW/SYNTHSE Threat display in birds

    E-Print Network [OSTI]

    Hurd, Peter L.

    REVIEW/SYNTHČSE Threat display in birds Peter L. Hurd and Magnus Enquist Abstract: The study of threat displays has long been an area in which theory and empirical work have each spurred the other. A great deal that classical ethologists have accurately described about threat displays still lacks

  20. Neural Mechanisms Underlying Selective Attention to Threat

    E-Print Network [OSTI]

    Bishop, Sonia

    Neural Mechanisms Underlying Selective Attention to Threat SONIA J. BISHOP Behavioural and Clinical. This provides a framework for inves- tigating the neural mechanisms underlying selective attention to threat. Both subcortical regions implicated in threat detection--specifically the amygdala--and prefrontal

  1. Developmental Changes in Responsivity to Threat are

    E-Print Network [OSTI]

    Barr, Gordon A.

    Developmental Changes in Responsivity to Threat are Stimulus-Specific in Rats Christoph P 2000 ABSTRACT: During early ontogeny, stimuli that pose a threat to an animal change. Unrelated adult a threat only during a limited period of development, when the animal's particular developmental stage

  2. Deriving Security Requirements from Crosscutting Threat Descriptions

    E-Print Network [OSTI]

    Haley, Charles B.

    Deriving Security Requirements from Crosscutting Threat Descriptions Charles B. Haley, Robin C representing threats as crosscutting concerns aids in determining the effect of security requirements on the functional requirements. Assets (objects that have value in a system) are first enumerated, and then threats

  3. Stereotype threat in sports 1 Running head: STEREOTYPE THREAT AND ACHIEVEMENT GOALS IN SPORTS

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Stereotype threat in sports 1 Running head: STEREOTYPE THREAT AND ACHIEVEMENT GOALS IN SPORTS Do Achievement Goals Mediate Stereotype Threat? An Investigation on Females' Soccer Performance Aďna Chalabaev Psycholoy 30 (2008) 143-158" #12;Stereotype threat in sports 2 Abstract This research investigated

  4. Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults' memory errors

    E-Print Network [OSTI]

    Mather, Mara

    Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults, 90089-0191. Phone: 213-740-6772. Email: barbersa@usc.edu #12;STEREOTYPE THREAT REDUCES MEMORY ERRORS 2 Abstract (144 words) Stereotype threat often incurs the cost of reducing the amount of information

  5. Ionosphere Spatial Gradient Threat for LAAS: Mitigation and Tolerable Threat Space

    E-Print Network [OSTI]

    Stanford University

    1 Ionosphere Spatial Gradient Threat for LAAS: Mitigation and Tolerable Threat Space Ming Luo, Sam and a threat space was extrapolated based on the 6 April 2000 ionospheric storm. It was showed that the impact of the ionospheric anomalies depends on the threat parameters, namely, the ionospheric gradient, the slope width

  6. Recognizing Threat: A Simple Geometric Shape Activates Neural Circuitry for Threat Detection

    E-Print Network [OSTI]

    Sarinopoulos, Issidoros

    Recognizing Threat: A Simple Geometric Shape Activates Neural Circuitry for Threat Detection the perception of threat. We here re- port that the neural circuitry known to be mobilized by many realistic instantiating detection of threat and negative affect, suggesting that recognition of potential danger may

  7. NNSA Supports Permanent Threat Reduction in Ukraine through Alternativ...

    National Nuclear Security Administration (NNSA)

    today announced the successful transfer of a linear accelerator (LINAC), used for cancer therapy treatment, from the University of Minnesota Masonic Children's Hospital to the...

  8. 2014 Annual Planning Summary for the NNSA Global Threat Reduction

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment ofCBFO-13-3322(EE) |2DepartmentNatural

  9. Sensor-guided threat countermeasure system

    DOE Patents [OSTI]

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25T23:59:59.000Z

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  10. Autonomous Realtime Threat-Hunting Robot (ARTHR

    SciTech Connect (OSTI)

    INL

    2008-05-29T23:59:59.000Z

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  11. Autonomous Realtime Threat-Hunting Robot (ARTHR

    ScienceCinema (OSTI)

    INL

    2009-09-01T23:59:59.000Z

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  12. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    of cryptography as it relates to the computer security industry. We will look at some of the underlying technologyIBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net September . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly

  13. The Nature of the Bioterrorism Threat

    SciTech Connect (OSTI)

    Regens, J. L.

    2003-02-25T23:59:59.000Z

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  14. Nuclear threats from small states

    SciTech Connect (OSTI)

    Kahan, J.H.

    1994-06-13T23:59:59.000Z

    What are the policy implications regarding proliferation and counter proliferation of nuclear weapons among Third World states. How does deterrence operate outside the parameters of superpower confrontation as defined by the cold war elaborate system of constraints enforced by concepts like mutual assured destruction, and counter-value and counter-force targeting. How can US policymakers devise contingencies for dealing with nuclear threats posed by countries like North Korea, Libya, Iraq, Iran, and Syria. These are some of the unsettling but nevertheless important questions addressed by the author in this monograph. In his analysis, Mr. Jerome Kahan examines the likelihood that one or more of these countries will use nuclear weapons before the year 2000. He also offers a framework that policymakers and planners might use in assessing US interests in preempting the use of nuclear weapons or in retaliating for their use. Ironically, with the end of the cold war, it is imperative that defense strategists, policymakers, and military professionals think about the `unthinkable`. In the interest of fostering debate on this important subject, the Strategic Studies Institute commends this insightful monograph.

  15. ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling for Mobile Ad Hoc and

    E-Print Network [OSTI]

    Sen, Sevil

    ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling. Chivers, Olwen Worthington and Pankaj Rohatgi Abstract-- This paper introduces a threat model for ad hoc and mobile ad hoc networks (MANETS). It identifies threat categories, modes of use, and a variety of threats

  16. Coping with stereotype threat: Denial as an impression management strategy

    E-Print Network [OSTI]

    Von Hippel, W.; Von Hippel, C.; Conway, Leanne; Preacher, K. J.; Schooler, J. W.; Radvansky, G. A.

    2005-01-01T23:59:59.000Z

    , Ferguson, Brooks, & Hagadone, 2004), suggest- ing that one manner of coping with stereotype threat is by using humor to reinterpret the situation as a challenge rather than a threat (see Kuiper, Martin, & Olinger, 1993). Stereotype threat has also been...

  17. An Intelligent Threat Prevention Framework with Heterogeneous Information

    E-Print Network [OSTI]

    Liu, Weiru

    An Intelligent Threat Prevention Framework with Heterogeneous Information Wenjun Ma 1 and Weiru Liu 1 Abstract. Three issues usually are associated with threat prevention intelligent surveillance, the de- mand of effectively predicting suspects' intention and ranking the potential threats posed

  18. How to determine threat probabilities using ontologies and Bayesian networks

    E-Print Network [OSTI]

    How to determine threat probabilities using ontologies and Bayesian networks [Extended Abstract Business Austria Vienna, Austria neubauer@securityresearch.ac.at ABSTRACT The subjective threat probability- and Bayesian-based approach for determining asset-specific and comprehensible threat probabilities

  19. Constructing Ionospheric Irregularity Threat Model for Korean SBAS

    E-Print Network [OSTI]

    Stanford University

    Constructing Ionospheric Irregularity Threat Model for Korean SBAS Eugene Bang, Jinsil Lee Points (IGPs). Using an ionospheric irregularity undersampled threat model, the integrity bounds, called Grid Ionospheric Vertical Errors (GIVEs), must be augmented to bound ionospheric irregularity threats

  20. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    SciTech Connect (OSTI)

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2008-05-29T23:59:59.000Z

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  1. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    ScienceCinema (OSTI)

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2010-01-08T23:59:59.000Z

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  2. The rise of "china threat" arguments

    E-Print Network [OSTI]

    Ueki, Chikako

    2006-01-01T23:59:59.000Z

    The study seeks to explain the rise of "China threat" arguments in the United States and Japan in the 1990s by using three theories of states behavior- realism, organization theory, and democratic peace theory. The rise ...

  3. Bio-Terrorism Threat and Casualty Prevention

    SciTech Connect (OSTI)

    NOEL,WILLIAM P.

    2000-01-01T23:59:59.000Z

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  4. An Information Fusion Framework for Threat Assessment

    SciTech Connect (OSTI)

    Beaver, Justin M [ORNL; Kerekes, Ryan A [ORNL; Treadwell, Jim N [ORNL

    2009-01-01T23:59:59.000Z

    Modern enterprises are becoming increasingly sensitive to the potential destructive power of small groups or individuals with malicious intent. In response, significant investments are being made in developing a means to assess the likelihood of certain threats to their enterprises. Threat assessment needs are typically focused in very specific application areas where current processes rely heavily on human analysis to both combine any available data and draw conclusions about the probability of a threat. A generic approach to threat assessment is proposed, including a threat taxonomy and decision-level information fusion framework, that provides a computational means for merging multi-modal data for the purpose of assessing the presence of a threat. The framework is designed for flexibility, and intentionally accounts for the accuracy of each data source, given the environmental conditions, in order to manage the uncertainty associated with any acquired data. The taxonomy and information fusion framework is described, and discussed in the context of real-world applications such as shipping container security and cyber security.

  5. Threat Mitigation: The Asteroid Tugboat

    E-Print Network [OSTI]

    Russell Schweickart; Clark Chapman; Dan Durda; Piet Hut

    2006-08-15T23:59:59.000Z

    The Asteroid Tugboat (AT) is a fully controlled asteroid deflection concept using a robotic spacecraft powered by a high efficiency, electric propulsion system (ion or plasma) which docks with and attaches to the asteroid, conducts preliminary operations, and then thrusts continuously parallel to the asteroid velocity vector until the desired velocity change is achieved. Based on early warning, provided by ground tracking and orbit prediction, it would be deployed a decade or more prior to a potential impact. On completion of the initial rendezvous with the near-Earth object (NEO) the AT would first reduce the uncertainty in the orbit of the asteroid via Earth tracking of its radio transponder while it is station keeping with the asteroid. If on analysis of tracking data a deflection is required the AT would execute a reconnaissance phase collecting and processing information about the physical characteristics of the asteroid to support subsequent operations. The AT would then dock at the appropriate pole (i.e. on the spin axis), attach to the asteroid surface, and initiate a NEO reorientation maneuver. Following completion of the NEO reorientation the AT would initiate the deflection phase by thrusting continuously parallel to the asteroid velocity vector until the resultant target orbit is achieved. The orbit of the asteroid is continuously monitored throughout the deflection process and the end state is known in real time. If one assumes a nuclear-electric propulsion (NEP) system similar to that formerly under development in the recently canceled Prometheus Program, the AT would be capable of deflecting threatening NEOs up to 800 meters in diameter or more.

  6. An Approach to Security Policy Configuration Using Semantic Threat Graphs

    E-Print Network [OSTI]

    Foley, Simon

    An Approach to Security Policy Configuration Using Semantic Threat Graphs Simon N. Foley, in turn, unnecessarily expose the enterprise to known threats. This paper pro- poses a threat management- nomic configuration of security mechanisms. This knowledge is mod- eled in terms of Semantic Threat

  7. Invited Paper New Frontiers of Network Security: The Threat Within

    E-Print Network [OSTI]

    Sanyal, Sugata

    Invited Paper New Frontiers of Network Security: The Threat Within Sugata Sanyal1 , Ajit Shelat2% of information security threats originate from inside the organization. The instances of insider threats have. The Insider threats are generally caused by current or ex-employees, contractors or partners, who have

  8. Multi-threat Containment with Dynamic Wireless Neighborhood Networks

    E-Print Network [OSTI]

    Jay Yang, Shanchieh

    Multi-threat Containment with Dynamic Wireless Neighborhood Networks Nathan A. Ransoma teams to solve a multi-threat containment problem. The multi-threat containment problem has the robot teams surround a number of threats that may occur randomly. Approaches with and without utilizing

  9. Running head: STEREOTYPE THREAT IN OLDER ADULTS 1 Stereotype threat can enhance, as well as impair, older adults' memory

    E-Print Network [OSTI]

    Mather, Mara

    Running head: STEREOTYPE THREAT IN OLDER ADULTS 1 Stereotype threat can enhance, as well as impair, and Rico Velasco for research assistance and to Dr. Tom Hess for providing us with the stereotype threat for publication. #12;STEREOTYPE THREAT IN OLDER ADULTS 2 Abstract (150) Negative stereotypes about aging can

  10. The threat of terrorism and other attacks raises profound dilemmas for the electric power industry.

    E-Print Network [OSTI]

    Amin, S. Massoud

    &D) on infrastructure security at the Electric Power Research Institute (EPRI). At first, I was faced with many reports launched an Infrastructure Security Initiative (ISI), a two-year pro- gram funded by the electric powerThe threat of terrorism and other attacks raises profound dilemmas for the electric power industry

  11. Status of Environmental Management Initiatives to Accelerate the Reduction of Environmental Risks and Challenges Posed by the Legacy of the Cold War

    SciTech Connect (OSTI)

    None

    2009-01-01T23:59:59.000Z

    Fifty years of nuclear weapons production and energy research in the United States during the Cold War generated large amounts of radioactive wastes, spent nuclear fuel (SNF), excess plutonium and uranium, thousands of contaminated facilities, and contaminated soil and groundwater. During most of that half century, the Nation did not have the environmental regulatory structure or nuclear waste cleanup technologies that exist today. The result was a legacy of nuclear waste that was stored and disposed of in ways now considered unacceptable. Cleaning up and ultimately disposing of these wastes is the responsibility of the U.S. Department of Energy (DOE). In 1989, DOE established the Office of Environmental Management (EM) to solve the large scale and technically challenging risks posed by the world's largest nuclear cleanup. This required EM to build a new nuclear cleanup infrastructure, assemble and train a technically specialized workforce, and develop the technologies and tools required to safely decontaminate, disassemble, stabilize, disposition, and remediate unique radiation hazards. The sites where nuclear activities produced legacy waste and contamination include the original Manhattan Project sites--Los Alamos, New Mexico; Hanford, Washington; and Oak Ridge, Tennessee--as well as major Cold War sites, such as Savannah River Site, South Carolina; the Idaho National Laboratory, Idaho; Rocky Flats Plant, Colorado; and Fernald, Ohio. Today EM has responsibility for nuclear cleanup activities at 21 sites covering more than two million acres in 13 states, and employs more than 30,000 Federal and contractor employees, including scientists, engineers and hazardous waste technicians. This cleanup poses unique, technically complex problems, which must be solved under the most hazardous of conditions, and which will require billions of dollars a year for several more decades. The EM program focus during its first 10 years was on managing the most urgent risks and maintaining safety at each site while negotiating state and Federal environmental compliance agreements. The program also concentrated on characterizing waste and nuclear materials and assessing the magnitude and extent of environmental contamination. By the late 1990s, EM had made significant progress in identifying and characterizing the extent of contamination and cleanup required and began transitioning from primarily a characterization and stabilization program to an active cleanup and closure program. During that time, EM formulated multi-year cleanup and closure plans, which contributed to cleanup progress; however, reducing the overall environmental risk associated with the cleanup program remained a challenge. In response, the Secretary of Energy directed a review of the EM program be undertaken. The resulting 'Top-to Bottom Review' re-directed the program focus from managing risks to accelerating the reduction of these risks.

  12. Satellite Threat Warning and Attack Reporting

    SciTech Connect (OSTI)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31T23:59:59.000Z

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  13. Unauthorized Collaboration on Facebook: Threats and Responses

    E-Print Network [OSTI]

    McQuade, D. Tyler

    Unauthorized Collaboration on Facebook: Threats and Responses Recent events at FSU have uncovered and collaboration. The Problem: When students, faculty, and staff join Facebook using a valid FSU email address this and believe it is affiliated with or endorsed by Florida State University. Facebook also allows students

  14. Global Warming: The Threat to the Planet*

    E-Print Network [OSTI]

    Hansen, James E.

    Global Warming: The Threat to the Planet* Jim Hansen 17 April 2007 2007 Leo Szilard Lecture. Graham Red Squirrel #12;Survival of Species 1. "Business-as-Usual" Scenario - Global Warming ~ 3ÂşC - Likely Extinctions ~ 50 percent 2. "Alternative" Scenario - Global Warming ~ 1ÂşC - Likely Extinctions

  15. Forest Fuels ReductionForest Fuels Reduction Department of

    E-Print Network [OSTI]

    Bolding, M. Chad

    the initial fuels reduction treatments leave the site with regard to long-term forest vegetation and soil are the productivity and cost rates for alternative choices of equipment for mechanical fuels reduction; what reduction operations for existing markets and new markets? (eg. biomass energy) Research Rationale

  16. Insider Threat - Material Control and Accountability Mitigation

    SciTech Connect (OSTI)

    Powell, Danny H [ORNL] [ORNL; Elwood Jr, Robert H [ORNL] [ORNL; Roche, Charles T [ORNL] [ORNL

    2011-01-01T23:59:59.000Z

    The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur by an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with compensating mitigation can decrease the risk of an insider performing a malicious act without detection.

  17. Introduction to Administrative Programs that Mitigate the Insider Threat

    SciTech Connect (OSTI)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01T23:59:59.000Z

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  18. A Risk Management Approach to the 'Insider Threat'

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    Insider Threat” [Gel05] Mike Gelles. Exploring the mind ofL. Krofcheck and Mike G. Gelles. Behavioral consultation in

  19. The same, only different: Threat management systems as homologues in the tree of life

    E-Print Network [OSTI]

    Holbrook, Colin; Fessler, Daniel M.T.

    2015-01-01T23:59:59.000Z

    T. , & ,Quirin, M. (2014). Threat and defense: From anxietyto manage uncertainty and threat associated with politicalD.M.T. (2013). Sizing up the threat: The envisioned physical

  20. Reducing Stereotype Threat in Academically At-Risk African-Americans Students: A Self-

    E-Print Network [OSTI]

    Simmons, Crystal Marie

    2011-01-01T23:59:59.000Z

    the effects of stereotype threat on African American collegeThe role of stereotype threat. Psychological Science, 12,and  White:  Stereotype  threat and the  race  gap  on  

  1. The Chronicles of Grokster: Who is the Biggest Threat in the P2P Battle?

    E-Print Network [OSTI]

    Chan, Alvin

    2008-01-01T23:59:59.000Z

    Groksten Who is the Biggest Threat in the P2P Battle? Alvininvariably identify a different threat as marginalizing itsnently identifiable threats are perhaps not as hazardous as

  2. Stereotype Threat in Organizations: An Examination of its Scope, Triggers, and Possible Interventions

    E-Print Network [OSTI]

    Kray, Laura J.; Shirako, Aiwa

    2009-01-01T23:59:59.000Z

    and social identity threat. Advances in Experimental Socialmen triggers social identity threat among female engineers.C. (2007). Stereotype threat at work. Academy of Management

  3. The Threat from Within: American Jews, the State of Israel, and Intermarriage

    E-Print Network [OSTI]

    Minkin, Sarah Anne

    2011-01-01T23:59:59.000Z

    and Nation. Sage Publications. Minkin, Threat from Within14, 2: 32-6. Minkin, Threat from Within Eisen, Arnold. 1986.Brandeis University Press. Minkin, Threat from Within Sarna,

  4. Minimizing the threat of pandemic emergence from avian influenza in poultry systems

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    Open Access Minimizing the threat of pandemic emergence fromY: The continued pandemic threat posed by avian influenzaet al. : Minimizing the threat of pandemic emergence from

  5. A Policy of Stereotype Threat: The Intergroup Impact of Policing Stereotypes

    E-Print Network [OSTI]

    Epstein, Liana Maris

    2012-01-01T23:59:59.000Z

    J. (1995). Stereotype threat and the intellectual testC. L. (2002). The role of threats in intergroup relations.factors in stereotype threat. Journal of Experimental Social

  6. EPR Severe Accident Threats and Mitigation

    SciTech Connect (OSTI)

    Azarian, G. [Framatome ANP SAS, Tour Areva, Place de la Coupole 92084 Paris la Defense (France); Kursawe, H.M.; Nie, M.; Fischer, M.; Eyink, J. [Framatome ANP GmbH, Freyeslebenstrasse, 1, D-91058 Erlangen (Germany); Stoudt, R.H. [Framatome ANP Inc. - 3315 Old Forest Rd, Lynchburgh, VA 24501 (United States)

    2004-07-01T23:59:59.000Z

    Despite the extremely low EPR core melt frequency, an improved defence-in-depth approach is applied in order to comply with the EPR safety target: no stringent countermeasures should be necessary outside the immediate plant vicinity like evacuation, relocation or food control other than the first harvest in case of a severe accident. Design provisions eliminate energetic events and maintain the containment integrity and leak-tightness during the entire course of the accident. Based on scenarios that cover a broad range of physical phenomena and which provide a sound envelope of boundary conditions associated with each containment challenge, a selection of representative loads has been done, for which mitigation measures have to cope with. This paper presents the main critical threats and the approach used to mitigate those threats. (authors)

  7. Securing Infrastructure from High Explosive Threats

    SciTech Connect (OSTI)

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20T23:59:59.000Z

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  8. Predictors of Threat and Error Management: Identification of Core

    E-Print Network [OSTI]

    Predictors of Threat and Error Management: Identification of Core Nontechnical Skills In normal flight operations, crews are faced with a variety of external threats and commit a range of errors of these threats and errors therefore forms an essential element of enhancing performance and minimizing risk

  9. INFLATABLE PLUG FOR THREAT MITIGATION IN TRANSPORTATION TUNNELS

    E-Print Network [OSTI]

    Barbero, Ever J.

    INFLATABLE PLUG FOR THREAT MITIGATION IN TRANSPORTATION TUNNELS Xavier Martinez1 , Julio Davalos2 and government entities. Fires, noxious fumes, deadly gasses, and flooding threats have occurred in major are of difficult and limited accessibility, but also because most of the potential threats, such as fires, flooding

  10. BOMB THREAT PLACE THIS CARD UNDER YOUR TELEPHONE

    E-Print Network [OSTI]

    Slatton, Clint

    BOMB THREAT PLACE THIS CARD UNDER YOUR TELEPHONE QUESTIONS TO ASK: 1. When is the bomb going? EXACT WORDING OF THE THREAT: Sex of caller: Race: Age: Number at which call received: Length of call: Check Caller ID - *69: Record caller's number: Time: Date: IMMEDIATELY REPORT BOMB THREATS TO

  11. THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS

    E-Print Network [OSTI]

    THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS Joshua Pauli College of Business.xu@ndsu.nodak.edu Keywords: Software architecture, Security, Threat model, Use case, Misuse case, UML Abstract: To deal with software security issues in the early stages of system development, this paper presents a threat- driven

  12. Insider Threat Detection using Stream Mining and Graph Mining

    E-Print Network [OSTI]

    Hamlen, Kevin W.

    Insider Threat Detection using Stream Mining and Graph Mining Pallabi Parveen, Jonathan Evans threats who attempt to conceal their activities by varying their behaviors over time. This paper applies of insider threat detection, demonstrating that the ensemble-based approach is significantly more effective

  13. FACTS about threat Possible INTERVENTIONS Strong domain identification

    E-Print Network [OSTI]

    Chisholm, Rex L.

    FACTS about threat Possible INTERVENTIONS Strong domain identification heightens the effect are able to self affirm in difficult situations can lessen the effects of threat. Encourage students to use to students not under threat. Educate students on self talk! Teach them to pay close attention

  14. Security Threat Mitigation Trends in Low-cost RFID Systems

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Security Threat Mitigation Trends in Low-cost RFID Systems Joaquin Garcia-Alfaro1,2 , Michel of security threat mitigation mecha- nisms in RFID systems, specially in low-cost RFID tags, are gaining great. Cryptography is a key tool to address these threats. Nevertheless, strong hardware constraints

  15. Maritime Threat Detection Using Probabilistic Graphical Models Bryan Auslander1

    E-Print Network [OSTI]

    Gupta, Kalyan Moy

    Maritime Threat Detection Using Probabilistic Graphical Models Bryan Auslander1 , Kalyan Moy Gupta1.lastname@knexusresearch.com | david.aha@nrl.navy.mil Abstract Maritime threat detection is a challenging problem because maritime them on a threat recognition task using track data obtained from force protection naval exercises

  16. Pervasive competition between threat and reward in the brain

    E-Print Network [OSTI]

    Pessoa, Luiz

    Pervasive competition between threat and reward in the brain Jong Moon Choi, Srikanth Padmala, USA In the current functional MRI study, we investigated interactions between reward and threat to the salience hypothesis, in the condition involving both reward and threat, enhanced activation would

  17. Maritime Threat Detection using Plan Recognition Bryan Auslander1

    E-Print Network [OSTI]

    Gupta, Kalyan Moy

    Maritime Threat Detection using Plan Recognition Bryan Auslander1 , Kalyan Moy Gupta1 , & David W algorithms for maritime threat detection employ a variety of normalcy models that are probabilistic and for threat detection. We compare their performance with a behavior recognition algorithm on simulated

  18. Ionosphere Threat to LAAS: Updated Model, User Impact, and Mitigations

    E-Print Network [OSTI]

    Stanford University

    1 Ionosphere Threat to LAAS: Updated Model, User Impact, and Mitigations Ming Luo, Sam Pullen-4], a "linear spatial gradient front" model was established and a threat space was extrapolated based on data from the 6 April 2000 ionospheric storm. User vertical error was estimated based on this threat model

  19. Decentralized Semantic Threat Graphs Simon N. Foley1

    E-Print Network [OSTI]

    Foley, Simon

    Decentralized Semantic Threat Graphs Simon N. Foley1 William M. Fitzgerald1 Cork Constraint.foley@cs.ucc.ie wfitzgerald@4c.ucc.ie Abstract. Threat knowledge-bases such as those maintained by MITRE and NIST provide a basis with which to mitigate known threats to an enterprise. These centralised knowledge-bases assume

  20. Joshua Rosenthol, CISSP Trends in the Threat Landscape

    E-Print Network [OSTI]

    Joshua Rosenthol, CISSP Trends in the Threat Landscape #12;2 Year in Review Data Theft Targeted-virus, firewalls, and intrusion prevention) are only effective against 30-50% of current security threats. Moreover, customers expect the effectiveness of signature-based security to continue to decline rapidly. IDC Threat

  1. Internet Security Systems, an IBM Company Threat Insight Monthly

    E-Print Network [OSTI]

    Internet Security Systems, an IBM Company X-Force ® Threat Insight Monthly www . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Contents www.iss.netwww.iss.net Internet Security Systems, an IBM Company X-Force Threat Insight Monthly April 2007 #12;X-Force® Threat Insight Monthly > April 2007 www.iss.netwww.iss.net About

  2. Nonproliferation, Nuclear Security, and the Insider Threat

    SciTech Connect (OSTI)

    Balatsky, Galya I. [Los Alamos National Laboratory; Duggan, Ruth [SNL

    2012-07-12T23:59:59.000Z

    Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

  3. Threat Analysis Framework | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2Uranium Transferon theTed Donat AboutTheDepartment ofEarlyThreat Analysis

  4. Deterring regional threats from nuclear proliferation

    SciTech Connect (OSTI)

    Spector, L.S.

    1992-03-12T23:59:59.000Z

    The most prominent shift in the National Military Strategy is from the global Soviet threat to a new focus on regional contingencies. No threat looms larger in these contingencies than the proliferation of nuclear weapons and ballistic missiles. This study examines proliferation trends and proposes a predominately diplomatic strategy for containing the problem. Dr. Spector identifies three waves of proliferation: the first is the five states with declared weapons and doctrine-the United States, Russia, Great Britain, France, and China; the second includes a less visible group that developed a covert capability, without testing weapons or declaring a doctrine of deterrence-for example, Israel, India, and probably Pakistan; and, a third wave of would-be proliferators includes radical states like Iraq, Iran, Libya, and North Korea. Spector's political approach is based on the common interest of wave one and two states to prevent further proliferation. Political-economic incentives have already worked in the cases of Brazil, Argentina, Taiwan, and South Africa-states which appear to have abandoned their nuclear weapons programs. Spector does not rule out the option of military force. Force, especially under international sanctions, can be a powerful tool to back diplomatic efforts. Use of force, however, remains a last resort.

  5. Augmenting Probabilistic Risk Assesment with Malevolent Initiators

    SciTech Connect (OSTI)

    Curtis Smith; David Schwieder

    2011-11-01T23:59:59.000Z

    As commonly practiced, the use of probabilistic risk assessment (PRA) in nuclear power plants only considers accident initiators such as natural hazards, equipment failures, and human error. Malevolent initiators are ignored in PRA, but are considered the domain of physical security, which uses vulnerability assessment based on an officially specified threat (design basis threat). This paper explores the implications of augmenting and extending existing PRA models by considering new and modified scenarios resulting from malevolent initiators. Teaming the augmented PRA models with conventional vulnerability assessments can cost-effectively enhance security of a nuclear power plant. This methodology is useful for operating plants, as well as in the design of new plants. For the methodology, we have proposed an approach that builds on and extends the practice of PRA for nuclear power plants for security-related issues. Rather than only considering 'random' failures, we demonstrated a framework that is able to represent and model malevolent initiating events and associated plant impacts.

  6. Demand Reduction

    Broader source: Energy.gov [DOE]

    Grantees may use funds to coordinate with electricity supply companies and utilities to reduce energy demands on their power systems. These demand reduction programs are usually coordinated through...

  7. Mitigating the Insider Threat Using Behavioral Science Workshop

    SciTech Connect (OSTI)

    Landers, John; De Castro, Kara

    2012-11-26T23:59:59.000Z

    PowerPoint presentations are included on: the Insider Threat; Detecting the Malicious Insider through Behavioral Science; and Psychological Barriers to Effective Nuclear Security.

  8. ORISE: Securing the Golden State from threats foreign and domestic

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Securing the Golden State from threats foreign and domestic ORISE helps California emergency planners with innovative training on state and local levels To protect the state of...

  9. Threats from space: 20 years of progress

    E-Print Network [OSTI]

    Remo, J L

    2014-01-01T23:59:59.000Z

    It has been 20 years since planning began for the 1995 United Nations International Conference on Near-Earth Objects. The conference proceedings established the scientific basis for an international organizational framework to support research and collective actions to mitigate a potential near-Earth object (NEO) threat to the planet. Since that time, researchers have conducted telescope surveys that should, within the coming decade, answer many questions about the size, number, and Earth impact probability of these objects. Space explorations to asteroids and comets have been successfully carried out, including sample recovery. Laboratory experiments and computer simulations at Sandia National Laboratories have analyzed the effects of soft X-ray radiation on meteorites - which might help researchers develop a way to redirect an incoming asteroid by vaporizing a thin layer of its surface. An Action Team on NEOs, established in 2001 in response to recommendations of the Third United Nations Conference on the E...

  10. Management of Security Policy Configuration using a Semantic Threat Graph Approach

    E-Print Network [OSTI]

    Foley, Simon

    Management of Security Policy Configuration using a Semantic Threat Graph Approach Simon N. Foley, in turn, unnec- essarily expose the enterprise to known threats. This paper proposes a threat management Threat Graphs, a variation of the tradi- tional Threat/Attack Tree, extended in order to relate semantic

  11. Defined: There is some credible general threat information that may affect the University. Examples include an FBI alert of a threat directed at a college

    E-Print Network [OSTI]

    Rose, Annkatrin

    Defined: There is some credible general threat information that may affect the University. Examples include an FBI alert of a threat directed at a college campus in North Carolina, or a hurricane warning information about a specific threat directed towards the University. May involve a man-made threat, or flash

  12. Superluminous supernovae: No threat from Eta Carinae

    E-Print Network [OSTI]

    Brian C. Thomas; Adrian L. Melott; Brian D. Fields; Barbara J. Anthony-Twarog

    2007-09-25T23:59:59.000Z

    Recently Supernova 2006gy was noted as the most luminous ever recorded, with a total radiated energy of ~10^44 Joules. It was proposed that the progenitor may have been a massive evolved star similar to eta Carinae, which resides in our own galaxy at a distance of about 2.3 kpc. eta Carinae appears ready to detonate. Although it is too distant to pose a serious threat as a normal supernova, and given its rotation axis is unlikely to produce a Gamma-Ray Burst oriented toward the Earth, eta Carinae is about 30,000 times nearer than 2006gy, and we re-evaluate it as a potential superluminous supernova. We find that given the large ratio of emission in the optical to the X-ray, atmospheric effects are negligible. Ionization of the atmosphere and concomitant ozone depletion are unlikely to be important. Any cosmic ray effects should be spread out over ~10^4 y, and similarly unlikely to produce any serious perturbation to the biosphere. We also discuss a new possible effect of supernovae, endocrine disruption induced by blue light near the peak of the optical spectrum. This is a possibility for nearby supernovae at distances too large to be considered "dangerous" for other reasons. However, due to reddening and extinction by the interstellar medium, eta Carinae is unlikely to trigger such effects to any significant degree.

  13. THE VISUAL CUES USED BY THE LEMON PEEL ANGELFISH (CENTROPYGE FLAVISSIMA) TO DETERMINE THREAT

    E-Print Network [OSTI]

    Post, Jessica

    2012-01-01T23:59:59.000Z

    FLAVISSIMA) TO DETERMINE THREAT JESSICA   POST Integrative be used by fish to assess threat, and indicate when it is were  important in assessing threat.   Multiple cues were 

  14. Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security

    E-Print Network [OSTI]

    Abi-Antoun, Marwan

    Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security Marwan Abi Science Carnegie Mellon University Pittsburgh, PA 15213 Center for Software Excellence Abstract Threat Foundation. #12;Keywords: Threat modeling, data flow diagrams, reflexion models, architecture-level security

  15. Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security

    E-Print Network [OSTI]

    Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security Marwan Abi Science Carnegie Mellon University Pittsburgh, PA 15213 # Center for Software Excellence Abstract Threat Foundation. #12; Keywords: Threat modeling, data flow diagrams, reflexion models, architecture­level security

  16. Tilting at Modern: Elizabeth Gordon's "The Threat to the Next America"

    E-Print Network [OSTI]

    Corbett, Kathleen LaMoine

    2010-01-01T23:59:59.000Z

    philosophy Gordon, ?The Threat to the Next America,?129.Advertisement for “The Threat to the Next America,” Business121. Figure 27. “The Threat to the Next America” carried a

  17. Threat Facilitates Subsequent Executive Control During Anxious Mood Jeffrey L. Birk

    E-Print Network [OSTI]

    Patel, Aniruddh D.

    Threat Facilitates Subsequent Executive Control During Anxious Mood Jeffrey L. Birk Tufts) posits that low-level threat may facilitate behavioral performance by influencing executive control functions. Anxiety is thought to strengthen this effect by enhancing threat's affective significance

  18. Human Bed Nucleus of the Stria Terminalis Indexes Hypervigilant Threat Monitoring

    E-Print Network [OSTI]

    Whalen, Paul J.

    Human Bed Nucleus of the Stria Terminalis Indexes Hypervigilant Threat Monitoring Leah H disorders is hypervigilant threat monitoring, its biological bases in humans remain poorly understood. Animal models suggest that anxious processes such as hypervigilant threat monitoring are distinct from

  19. A Risk Management Approach to the 'Insider Threat'

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    Dir90] [DOD08] [FK92] A Risk Management Approach to the “A Risk Management Approach to the “Insider Threat” Mattgleep” is useless un- A Risk Management Approach to the “

  20. A Risk Management Approach to the 'Insider Threat'

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    554–563, October 1992. A Risk Management Approach to the “A Risk Management Approach to the “Insider Threat” Mattgleep” is useless un- A Risk Management Approach to the “

  1. Additive Manufacturing in China: Threats, Opportunities, and Developments (Part I)

    E-Print Network [OSTI]

    ANDERSON, Eric

    2013-01-01T23:59:59.000Z

    application of additive manufacturing in China’s aviationAnalysis May 2013 Additive Manufacturing in China: Threats,an overview of China’s additive manufacturing industry is

  2. Threat assessment design for driver assistance system at intersections

    E-Print Network [OSTI]

    Aoude, Georges

    This paper considers the decision-making problem for a human-driven vehicle crossing a road intersection in the presence of other, potentially errant, drivers. Our approach relies on a novel threat assessment module, which ...

  3. Threat-aware Path Planning in Uncertain Urban Environments

    E-Print Network [OSTI]

    Aoude, Georges

    This paper considers the path planning problem for an autonomous vehicle in an urban environment populated with static obstacles and moving vehicles with uncertain intents. We propose a novel threat assessment module, ...

  4. Response of initial field to stiffness perturbation

    E-Print Network [OSTI]

    Chen-Wu Wu

    2014-03-19T23:59:59.000Z

    Response of initial elastic field to stiffness perturbation and its possible application is investigated. Virtual thermal softening is used to produce the stiffness reduction for demonstration. It is interpreted that the redistribution of the initial strain will be developed by the non-uniform temperature elevation, as which leads to the non-uniform reduction of the material stiffness. Therefore, the initial filed is related to the stiffness perturbation and incremental field in a matrix form after eliminating the thermal expansion effect.

  5. Global Security: Asymmetric Threats The modules in this class introduce transnational, asymmetric threats/warfare, from terror organizations

    E-Print Network [OSTI]

    Rhode Island, University of

    /Global Shipping) 5. Agriculture & Food 6. Water Supplies 7. Telecommunications 8. Chemicals & Hazardous Materials 9. Nuclear & Radiological Materials Module 2 Asymmetric Tactics to Combat Nation States 1, terrorist threats to America's agriculture and food supplies, water telecommunications, chemicals

  6. Working to keep us safe: Sara Brambilla, Postdoc creates threat reduction

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengtheningWildfires may contribute more to &83 3.3At DOECareers

  7. Using Multiple-Valued Logic Decision Diagrams to Model System Threat Probabilities

    E-Print Network [OSTI]

    Manikas, Theodore

    Using Multiple-Valued Logic Decision Diagrams to Model System Threat Probabilities Theodore W importance. To effectively address both natural and intentional threats to large systems, the threats must be cataloged and analyzed. Extremely large and complex systems can have an accordingly large number of threat

  8. Towards A Theory Of Insider Threat Assessment Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Shambhu Upadhyaya

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    Towards A Theory Of Insider Threat Assessment Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Shambhu}@cse.buffalo.edu Abstract Insider attacks are a well-known problem acknowl- edged as a threat as early as 1980s. The threat to the lack of tools and techniques, security analysts do not correctly perceive the threat, and hence

  9. Ionospheric Threat Model Methodology for Juan Blanch, Todd Walter, Per Enge. Stanford University

    E-Print Network [OSTI]

    Stanford University

    Ionospheric Threat Model Methodology for WAAS Juan Blanch, Todd Walter, Per Enge. Stanford of a threat model. The threat model is used to restrict the expected ionospheric behavior. It must not be too driving the ionosphere are not entirely known, a decision has been made to base the threat model

  10. Threat Assessment Using Evidential Networks A. Benavoli, B. Ristic, A. Farina, M. Oxenham, L. Chisci

    E-Print Network [OSTI]

    Chisci, Luigi

    Threat Assessment Using Evidential Networks A. Benavoli, B. Ristic, A. Farina§, M. Oxenham, L by providing a threat assessment, that is an estimate of the extent to which an enemy platform poses a threat based on evidence about its intent and capability. Threat is modelled by a network of entities

  11. Modeling System Threat Probabilities Using Mixed-Radix Multiple-Valued Logic Decision

    E-Print Network [OSTI]

    Thornton, Mitchell

    Modeling System Threat Probabilities Using Mixed-Radix Multiple-Valued Logic Decision Diagrams securing systems from both natural and intentional threats. Extremely large and complex systems can have an ac- cordingly large number of threat scenarios, thus simply listing the threats and devising

  12. A Statistical Model for Generating a Population of Unclassified Objects and Radiation Signatures Spanning Nuclear Threats

    SciTech Connect (OSTI)

    Nelson, K; Sokkappa, P

    2008-10-29T23:59:59.000Z

    This report describes an approach for generating a simulated population of plausible nuclear threat radiation signatures spanning a range of variability that could be encountered by radiation detection systems. In this approach, we develop a statistical model for generating random instances of smuggled nuclear material. The model is based on physics principles and bounding cases rather than on intelligence information or actual threat device designs. For this initial stage of work, we focus on random models using fissile material and do not address scenarios using non-fissile materials. The model has several uses. It may be used as a component in a radiation detection system performance simulation to generate threat samples for injection studies. It may also be used to generate a threat population to be used for training classification algorithms. In addition, we intend to use this model to generate an unclassified 'benchmark' threat population that can be openly shared with other organizations, including vendors, for use in radiation detection systems performance studies and algorithm development and evaluation activities. We assume that a quantity of fissile material is being smuggled into the country for final assembly and that shielding may have been placed around the fissile material. In terms of radiation signature, a nuclear weapon is basically a quantity of fissile material surrounded by various layers of shielding. Thus, our model of smuggled material is expected to span the space of potential nuclear weapon signatures as well. For computational efficiency, we use a generic 1-dimensional spherical model consisting of a fissile material core surrounded by various layers of shielding. The shielding layers and their configuration are defined such that the model can represent the potential range of attenuation and scattering that might occur. The materials in each layer and the associated parameters are selected from probability distributions that span the range of possibilities. Once an object is generated, its radiation signature is calculated using a 1-dimensional deterministic transport code. Objects that do not make sense based on physics principles or other constraints are rejected. Thus, the model can be used to generate a population of spectral signatures that spans a large space, including smuggled nuclear material and nuclear weapons.

  13. SCB initiator

    DOE Patents [OSTI]

    Bickes Jr., Robert W.; Renlund, Anita M.; Stanton, Philip L.

    1994-11-01T23:59:59.000Z

    A detonator for high explosives initiated by mechanical impact includes a cylindrical barrel, a layer of flyer material mechanically covering the barrel at one end, and a semiconductor bridge ignitor including a pair of electrically conductive pads connected by a semiconductor bridge. The bridge is in operational contact with the layer, whereby ignition of said bridge forces a portion of the layer through the barrel to detonate the explosive. Input means are provided for igniting the semiconductor bridge ignitor.

  14. SCB initiator

    DOE Patents [OSTI]

    Bickes, Jr., Robert W. (Albuquerque, NM); Renlund, Anita M. (Albuquerque, NM); Stanton, Philip L. (Albuquerque, NM)

    1994-01-01T23:59:59.000Z

    A detonator for high explosives initiated by mechanical impact includes a cylindrical barrel, a layer of flyer material mechanically covering the barrel at one end, and a semiconductor bridge ignitor including a pair of electrically conductive pads connected by a semiconductor bridge. The bridge is in operational contact with the layer, whereby ignition of said bridge forces a portion of the layer through the barrel to detonate the explosive. Input means are provided for igniting the semiconductor bridge ignitor.

  15. Matching and fairness in threat-based mobile sensor coverage

    SciTech Connect (OSTI)

    Ma, Cheng-Yu {Jan} L [ORNL; Yau, King Y [ORNL; Chin, Jren-Chit [ORNL; Rao, Nageswara S [ORNL; Shankar, Mallikarjun [ORNL

    2009-12-01T23:59:59.000Z

    Mobile sensors can be used to effect complete coverage of a surveillance area for a given threat over time, thereby reducing the number of sensors necessary. The surveillance area may have a given threat profile as determined by the kind of threat, and accompanying meteorological, environmental, and human factors. In planning the movement of sensors, areas that are deemed higher threat should receive proportionately higher coverage. We propose a coverage algorithm for mobile sensors to achieve a coverage that will match - over the long term and as quantified by an RMSE metric - a given threat profile. Moreover, the algorithm has the following desirable properties: (1) stochastic, so that it is robust to contingencies and makes it hard for an adversary to anticipate the sensor's movement, (2) efficient, and (3) practical, by avoiding movement over inaccessible areas. Further to matching, we argue that a fairness measure of performance over the shorter time scale is also important. We show that the RMSE and fairness are, in general, antagonistic, and argue for the need of a combined measure of performance, which we call efficacy. We show how a pause time parameter of the coverage algorithm can be used to control the trade-off between the RMSE and fairness, and present an efficient offline algorithm to determine the optimal pause time maximizing the efficacy. Finally, we discuss the effects of multiple sensors, under both independent and coordinated operation. Extensive simulation results - under realistic coverage scenarios - are presented for performance evaluation.

  16. Threat of nuclear movement. Research report

    SciTech Connect (OSTI)

    Paine, G.M.

    1997-04-01T23:59:59.000Z

    While weapons of mass destruction (WMD) include biological, chemical and nuclear material, this paper will focus on the nuclear component. With the collapse of the Soviet Union, nuclear material was left throughout the Commonwealth of Independent States (CIS). As these new states focused on economic and social issues, security and safety of nuclear material became secondary. This change in focus has provided conditions for the illicit movement of nuclear material and expertise. CIS admissions that illegal movement has occurred have been limited; however, material and technical expertise has been found in numerous locations. The United States and Russia have initiated many notable programs, but the potential exists for continual illicit movement. As such, continual emphasis needs to be placed on stemming the movement of nuclear material and expertise.

  17. Initial Proposal

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News linkThermal PhenomenaInitial

  18. SmallholderSmallholder CarbonCarbon AgroforestryAgroforestry && Carbon for Poverty ReductionCarbon for Poverty Reduction

    E-Print Network [OSTI]

    SmallholderSmallholder CarbonCarbon AgroforestryAgroforestry && Carbon for Poverty ReductionCarbon for Poverty Reduction Roundtable (CAPR)Roundtable (CAPR) GEO Forest Monitoring SymposiumGEO Forest Monitoring)Amazon Initiative Consortium (IA) #12;Carbon for Poverty Reduction Roundtable (CAPR)Carbon for Poverty Reduction

  19. Sorghum Ergot: New Disease Threat to the Sorghum Industry

    E-Print Network [OSTI]

    Krausz, Joseph P.; Isakeit, Thomas

    1998-07-20T23:59:59.000Z

    of the sorghum ergot pathogen and likely serves as an overwintering source of ergot inoculum in south Texas. E-461 6-98 Sorghum Ergot New Disease Threat to the Sorghum Industry *Extension Plant Pathologists, The Texas A&M University System. Newly formed honeydew... dripping from an infected panicle. Joseph Krausz and Thomas Isakeit* Ho w is it a Threat to Texas? Each f_lo wer infected with ergot represents a direct loss of one seed. Additional losses occur because the stickiness of infected panicles inter- feres...

  20. WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President

    E-Print Network [OSTI]

    WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President Dr. Peter H. Gleick1 October 9, 2008 Safe and adequate fresh water resources are central to the economy, foreign policy domestic and international challenges related to fresh water. These challenges will require unilateral

  1. Climate Threat to the Planet* Implications for Energy Policy

    E-Print Network [OSTI]

    Hansen, James E.

    Climate Threat to the Planet* Implications for Energy Policy Jim Hansen 4 July 2008 United Nations's Paleoclimate History 2. On-Going Climate Changes 3. Climate Models #12;#12;Green Triangle = Volcano; Red Box;#12;Observations: Domingues, C.M. et al., Nature 453, 1090-1093, 2008. Model: Hansen, J. et al., Science 308, 1431

  2. Secretarial Succession, Threat Level Notification, and Successor Tracking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-01-28T23:59:59.000Z

    This order establishes the Secretarial Order of Succession in the Department of Energy pursuant to section 202(a) of the Department of Energy Organization Act, 42 U.S.C. 7132(a) and establish a mechanism for tracking the locations of successors at the various threat levels. Admin Chg, dated 9-13-2013, cancels DOE O 100.1E.

  3. Secretarial Succession, Threat Level Notification and Successor Tracking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-01-28T23:59:59.000Z

    The Order establishes the Secretarial Order of Succession pursuant to section 202(a) of the Department of Energy Organization Act, 42 U.S.C. 7132(a) and establishes a mechanism for tracking the locations of successors at various threat levels. Cancels DOE O 100.1D.

  4. Secretarial Succession, Threat Level Notification, and Successor Tracking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-04-20T23:59:59.000Z

    This Order establishes the Secretarial Order of Succession pursuant to section 202(a) of the Department of Energy Organization Act and establishes a mechanism for tracking the locations of successors at various threat levels. Cancels DOE O 100.1C. Canceled by DOE O 100.1E

  5. Threats from Climate Change to Terrestrial Vertebrate Hotspots in Europe

    E-Print Network [OSTI]

    Zimmermann, Niklaus E.

    Threats from Climate Change to Terrestrial Vertebrate Hotspots in Europe Luigi Maiorano1 to extreme climates. Our results outline that the Mediterranean basin represents both an important hotspot change projected to occur over the coming decades, especially in the Mediterranean bioregion, posing

  6. The Shanghai Six:The Shanghai Six: Milit Th t E i Alli ?Milit Th t E i Alli ?Military Threat or Economic Alliance?Military Threat or Economic Alliance?

    E-Print Network [OSTI]

    New Hampshire, University of

    The Shanghai Six:The Shanghai Six: Milit Th t E i Alli ?Milit Th t E i Alli ?Military Threat or Economic Alliance?Military Threat or Economic Alliance? Anna BrownAnna Brown #12;Maps courtesy of Google Maps. #12;Is the SCO a Military Threat?Is the SCO a Military Threat?Is the SCO a Military Threat

  7. A threat analysis framework as applied to critical infrastructures in the Energy Sector.

    SciTech Connect (OSTI)

    Michalski, John T.; Duggan, David Patrick

    2007-09-01T23:59:59.000Z

    The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be used to identify the elements required to quantify threats against critical infrastructure assets and provide a means of distributing actionable threat information to critical infrastructure entities for the protection of infrastructure assets. This document identifies and describes five key elements needed to perform a comprehensive analysis of threat: the identification of an adversary, the development of generic threat profiles, the identification of generic attack paths, the discovery of adversary intent, and the identification of mitigation strategies.

  8. Large Fleets Lead in Petroleum Reduction (Fact Sheet)

    SciTech Connect (OSTI)

    Proc, H.

    2011-03-01T23:59:59.000Z

    Fact sheet describes Clean Cities' National Petroleum Reduction Partnership, an initiative through which large private fleets can receive support from Clean Cities to reduce petroleum consumption.

  9. Notice of Intent to Develop DOE O 470.X, Insider Threat Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-10-17T23:59:59.000Z

    The Order establishes top-level responsibilities and requirements for DOE's Insider Threat Program, which is intended to deter, detect, and mitigate insider threat actions by all Federal and contractor employees.

  10. A threat taxonomy for mHealth privacy Institute for Security, Technology, and Society

    E-Print Network [OSTI]

    A threat taxonomy for mHealth privacy David Kotz Institute for Security, Technology, and SocietyHealth technologies. We develop a taxonomy of the privacy-related threats, and discuss some of the technologies

  11. A threat-rigidity analysis of the Apache Software Foundation's response to reported server security issues

    E-Print Network [OSTI]

    Shapira, Yoav

    2006-01-01T23:59:59.000Z

    There exists a broad body of literature documenting organizational responses to competitive threats, including those responses which fit into the threat-rigidity hypothesis. The purpose of this thesis is to investigate how ...

  12. MultiMulti--threat Containment withthreat Containment with Cooperative Autonomous AgentsCooperative Autonomous Agents

    E-Print Network [OSTI]

    Jay Yang, Shanchieh

    as Newtonian particles Quadratic APF (QAPF) · Simple yet does the job Three QAPFs · Moving toward the threats

  13. Q&A with Steven Spencer: Speaker in the Women and STEM Series Talks About How He Became Interested in Studying Psychology, Dissonance, and Stereotype Threat

    E-Print Network [OSTI]

    Hooker, Courtney

    2011-01-01T23:59:59.000Z

    dissonance, and stereotype threat A Spencer’s talk, “Athe field of stereotype threat, I was impressed by his kindthink about contents stereotype threat. Therefore, I had the

  14. Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability

    E-Print Network [OSTI]

    How, Jonathan P.

    Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability by Georges;Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability by Georges Salim fulfillment of the requirements for the degree of Doctor of Philosophy Abstract This thesis develops threat

  15. Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial

    E-Print Network [OSTI]

    Wang, Hai

    Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial of the Threat and Consequences of Weapon Attacks on Commercial Aircraft CREATE Report 29 November 2005 John P Security has determined that external weapon threats due to surface-air missiles, as well as some

  16. Threat to the point: improving the value of comparative extinction risk analysis for conservation action

    E-Print Network [OSTI]

    Davidson, Ana

    Threat to the point: improving the value of comparative extinction risk analysis for conservation of such analyses for conservation practice has been questioned. One reason for underperformance may be that threats this problem by (i) reviewing the use of threats in this field and (ii) quanti- tatively investigating

  17. OPEN-FILE REPORT 2005-1164 An Assessment of Volcanic Threat and Monitoring

    E-Print Network [OSTI]

    OPEN-FILE REPORT 2005-1164 An Assessment of Volcanic Threat and Monitoring Capabilities Reawakens Volcanic Threat Assessment: Analysis of Hazard and Risk Factors......................... 14 · Table 2. List of hazard and exposure factors used in the NVEWS threat assessment · Figure 3

  18. Reducing the Wildland Fire Threat to Homes: Where and How Much?1

    E-Print Network [OSTI]

    Standiford, Richard B.

    Reducing the Wildland Fire Threat to Homes: Where and How Much?1 Jack D. Cohen2 Abstract. The threat of life and property losses during wildland fires is a significant issue for Federal, State such as hazard mapping and fuel management. The threat of life and property losses during wildland fires

  19. Ionospheric Threat Parameterization for Local Area Global-Positioning-System-Based Aircraft Landing Systems

    E-Print Network [OSTI]

    Stanford University

    Ionospheric Threat Parameterization for Local Area Global-Positioning-System-Based Aircraft Landing of user separation. The method of data analysis that produced these results is described, and a threat space that parameterizes these possible threats to user integrity is defined. Certain configurations

  20. Title: Campus Violence and Threat Management Effective Date: September 1, 2012 Page: Page 1 of 4

    E-Print Network [OSTI]

    Swaddle, John

    Title: Campus Violence and Threat Management Effective Date: September 1, 2012 Page: Page 1 of 4 personal force or violence [and] threats of violence." The policy also fulfills the university's statutory obligations under Section 23-9.2:10 of the Code of Virginia, pursuant to which it has established a threat

  1. Journal of Experimental Psychology: Applied Seeing the Crowd for the Bomber: Spontaneous Threat

    E-Print Network [OSTI]

    Patel, Aniruddh D.

    Journal of Experimental Psychology: Applied Seeing the Crowd for the Bomber: Spontaneous Threat: Spontaneous Threat Perception From Static and Randomly Moving Crowd Simulations. Journal of Experimental for the Bomber: Spontaneous Threat Perception From Static and Randomly Moving Crowd Simulations Tad T. Brunyé U

  2. High-Level Information Fusion and Mission Planning in Highly Anisotropic Threat Spaces

    E-Print Network [OSTI]

    Witkowski, Mark

    High-Level Information Fusion and Mission Planning in Highly Anisotropic Threat Spaces Mark sharing and high-level information fusion to allow for the visualisation of highly anisotropic threat options. Keywords: Information Fusion, Threat Map, Tactical Planning. 1 Introduction We present a first

  3. Fast Threat Detection and Localization Using Super-Regenerative Transceiver in

    E-Print Network [OSTI]

    Zhang, Yan

    Fast Threat Detection and Localization Using Super-Regenerative Transceiver in Random Noise Radar-Regenerative (SRG) transceiver as a type of ultra-fast electronics platform for threat detection and localization the Angle-of-Arrival (AOA) information of the inbound threats. Simulations and detailed laboratory

  4. Behavioral/Systems/Cognitive Threat of Punishment Motivates Memory Encoding via

    E-Print Network [OSTI]

    Adcock, R. Alison

    Behavioral/Systems/Cognitive Threat of Punishment Motivates Memory Encoding via Amygdala circuits associated with motivated declarative encoding and active threat avoidance have both been an upcoming scene image. Items associated with the threat of shock were better recognized 24 h later

  5. Ionospheric Threat Mitigation by Geometry Screening in Ground-Based Augmentation Systems

    E-Print Network [OSTI]

    Stanford University

    Ionospheric Threat Mitigation by Geometry Screening in Ground-Based Augmentation Systems Jiyun Lee observed during severe ionospheric storms pose potential threats to the integrity of the Ground threats, because ionospheric gradients are not observable to the ground monitor if they impact

  6. On the Value of a Threat Advisory System for Managing Supply Chain Disruptions

    E-Print Network [OSTI]

    Snyder, Larry

    On the Value of a Threat Advisory System for Managing Supply Chain Disruptions Brian T. Tomlin "lean" otherwise. In this paper, we propose and investigate a threat advisory system in which the firm in the threat level. We consider a model in which the firm has a single unreliable supplier, for which inventory

  7. Moderate threat causes longer lasting disruption to processing in anxious individuals

    E-Print Network [OSTI]

    Bishop, Sonia

    Moderate threat causes longer lasting disruption to processing in anxious individuals Sophie: Forster S, Castle E, Nunez-elizalde AO and Bishop SJ(2014) Moderate threat causes longer lasting in anxiety1 Moderate threat causes longer lasting disruption to processing2 in anxious individuals.3 Sophie

  8. Threat Modeling as a Basis for Security Requirements Suvda Myagmar Adam J. Lee William Yurcik

    E-Print Network [OSTI]

    Threat Modeling as a Basis for Security Requirements Suvda Myagmar Adam J. Lee William Yurcik. Prior to claiming the security of a system, it is important to iden- tify the threats to the system in question. Enumerating the threats to a system helps system architects develop realis- tic and meaningful

  9. Subversion as a Threat in Information Warfare Emory A. Anderson1

    E-Print Network [OSTI]

    Irvine, Cynthia E.

    Subversion as a Threat in Information Warfare Emory A. Anderson1 , Cynthia E. Irvine2 , and Roger R-mail: Roger.Schell@aesec.com; ABSTRACT As adversaries develop Information Warfare capabilities, the threat for subversion, that this threat is real, and that it represents a significant vulnerability. Mitigation

  10. The Threat to the Planet: How Can We Avoid Dangerous Human-Made Climate Change?

    E-Print Network [OSTI]

    Hansen, James E.

    The Threat to the Planet: How Can We Avoid Dangerous Human-Made Climate Change? Remarks of James E to describe the threat to our planet posed by unbridled consumption of fossil fuels. I recognize the debt owed to the threat of climate change has been sudden and profound. Only in recent years has the extent and immediacy

  11. LAAS Ionosphere Spatial Gradient Threat Model and Impact of LGF and Airborne Monitoring

    E-Print Network [OSTI]

    Stanford University

    LAAS Ionosphere Spatial Gradient Threat Model and Impact of LGF and Airborne Monitoring Ming Luo of users for the current Category I LAAS architecture. In the ionosphere threat model used by previous-case ionosphere conditions. In this paper, the ionosphere threat model is reexamined based on WAAS and IGS data

  12. Enabling Automated Threat Response through the Use of a Dynamic Security Policy

    E-Print Network [OSTI]

    Boyer, Edmond

    Enabling Automated Threat Response through the Use of a Dynamic Security Policy Herv´e Debar1: Intrusion Detection, Threat Response, Reaction, Access Control Abstract Information systems security issues to provide countermea- sures to threats compromising the security policy. The response process is far from

  13. 8. SYNTHESIS OF RISK ASSESSMENTS: TAXONOMIC, REGIONAL, AND THREAT-BASED PATTERNS

    E-Print Network [OSTI]

    457 8. SYNTHESIS OF RISK ASSESSMENTS: TAXONOMIC, REGIONAL, AND THREAT-BASED PATTERNS Estimated specific or generic information indicating relatively high susceptibility to certain threats (e susceptibility to threats and/or known occurrence in diverse or marginal habitats. Many, if not most, species

  14. TITLE: RELEASING PROTECTED HEALTH INFORMATION TO PREVENT A SERIOUS THREAT TO HEALTH OR SAFETY

    E-Print Network [OSTI]

    Grishok, Alla

    TITLE: RELEASING PROTECTED HEALTH INFORMATION TO PREVENT A SERIOUS THREAT TO HEALTH OR SAFETY the patient's authorization in order to prevent a serious threat to health or safety. PURPOSE The purpose will release a patient's PHI without the patient's authorization to prevent a serious threat to health

  15. Worry Is Associated With Impaired Gating of Threat From Working Memory

    E-Print Network [OSTI]

    Larson, Christine L.

    Emotion Worry Is Associated With Impaired Gating of Threat From Working Memory Daniel M. Stout, C. L. (2014, August 25). Worry Is Associated With Impaired Gating of Threat From Working Memory Is Associated With Impaired Gating of Threat From Working Memory Daniel M. Stout University of Wisconsin

  16. University of Newcastle upon Tyne Threat Analysis of Cryptographic Election Schemes

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    University of Newcastle upon Tyne COMPUTING SCIENCE Threat Analysis of Cryptographic Election IVERSITY OF #12;TECHNICAL REPORT SERIES No. CS-TR-971 June, 2006 Threat Analysis of Cryptographic Election Schemes P. Y. A. Ryan and T. Peacock. Abstract We discuss some vulnerabilities, threats and counter

  17. THE GLOBALIzATION OF CHINESE SCIENCE: A THREAT OR AN

    E-Print Network [OSTI]

    Zhu, Chen

    THE GLOBALIzATION OF CHINESE SCIENCE: A THREAT OR AN OPPORTuNITy? recently, I attended the 50th?" and "Is China a threat to the power of the United states?" We have known the host and his family for years). are they a welcome expansion or a threat to the quality of programs? In some years, conferencegoers have expressed

  18. Behavioral/Systems/Cognitive Neural Correlates of the Automatic Processing of Threat

    E-Print Network [OSTI]

    Toronto, University of

    Behavioral/Systems/Cognitive Neural Correlates of the Automatic Processing of Threat Facial Signals threat. Attention was focused on either scenes or faces presented in a single overlapping display. Facial. These results suggest that automaticity is not funda- mental to the processing of all facial signals of threat

  19. Factoring species, non-species values and threats into biodiversity prioritisation across the ecoregions

    E-Print Network [OSTI]

    Vermont, University of

    population density, and the extinction risk of species. This threat index is positively correlated with allFactoring species, non-species values and threats into biodiversity prioritisation across Biodiversity Species Non-species biological values Threat A B S T R A C T Biodiversity in Africa, Madagascar

  20. SmartNotes: Application of Crowdsourcing to the Detection of Web Threats

    E-Print Network [OSTI]

    Fink, Eugene

    --Crowdsourcing, Machine Learning, Web Security. I. INTRODUCTION Cybersecurity threats can be broadly divided to two high such security threats is still an ongoing battle, but there is another critical type of cybersecurity threats at al., 2009] and other similar scams have emerged due to the increased popularity of on-line banking

  1. Transportation Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

  2. Identification of threats using linguistics-based knowledge extraction.

    SciTech Connect (OSTI)

    Chew, Peter A.

    2008-09-01T23:59:59.000Z

    One of the challenges increasingly facing intelligence analysts, along with professionals in many other fields, is the vast amount of data which needs to be reviewed and converted into meaningful information, and ultimately into rational, wise decisions by policy makers. The advent of the world wide web (WWW) has magnified this challenge. A key hypothesis which has guided us is that threats come from ideas (or ideology), and ideas are almost always put into writing before the threats materialize. While in the past the 'writing' might have taken the form of pamphlets or books, today's medium of choice is the WWW, precisely because it is a decentralized, flexible, and low-cost method of reaching a wide audience. However, a factor which complicates matters for the analyst is that material published on the WWW may be in any of a large number of languages. In 'Identification of Threats Using Linguistics-Based Knowledge Extraction', we have sought to use Latent Semantic Analysis (LSA) and other similar text analysis techniques to map documents from the WWW, in whatever language they were originally written, to a common language-independent vector-based representation. This then opens up a number of possibilities. First, similar documents can be found across language boundaries. Secondly, a set of documents in multiple languages can be visualized in a graphical representation. These alone offer potentially useful tools and capabilities to the intelligence analyst whose knowledge of foreign languages may be limited. Finally, we can test the over-arching hypothesis--that ideology, and more specifically ideology which represents a threat, can be detected solely from the words which express the ideology--by using the vector-based representation of documents to predict additional features (such as the ideology) within a framework based on supervised learning. In this report, we present the results of a three-year project of the same name. We believe these results clearly demonstrate the general feasibility of an approach such as that outlined above. Nevertheless, there are obstacles which must still be overcome, relating primarily to how 'ideology' should be defined. We discuss these and point to possible solutions.

  3. RLJ/STAT/UPDATE 1-18-11 1 Situation Threat Assessment Policy and Protocol (Update 1/18/11)

    E-Print Network [OSTI]

    Rusu, Adrian

    RLJ/STAT/UPDATE 1-18-11 1 Situation Threat Assessment Policy and Protocol (Update 1/18/11) Rowan will use available resources within the Division of Student Affairs in responding to alleged threats or acts of violence by students. Definitions Threat: A threat is defined as any behavior that suggests

  4. Anomaly Detection in Multiple Scale for Insider Threat Analysis

    SciTech Connect (OSTI)

    Kim, Yoohwan [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Hively, Lee M [ORNL] [ORNL

    2012-01-01T23:59:59.000Z

    We propose a method to quantify malicious insider activity with statistical and graph-based analysis aided with semantic scoring rules. Different types of personal activities or interactions are monitored to form a set of directed weighted graphs. The semantic scoring rules assign higher scores for the events more significant and suspicious. Then we build personal activity profiles in the form of score tables. Profiles are created in multiple scales where the low level profiles are aggregated toward more stable higherlevel profiles within the subject or object hierarchy. Further, the profiles are created in different time scales such as day, week, or month. During operation, the insider s current activity profile is compared to the historical profiles to produce an anomaly score. For each subject with a high anomaly score, a subgraph of connected subjects is extracted to look for any related score movement. Finally the subjects are ranked by their anomaly scores to help the analysts focus on high-scored subjects. The threat-ranking component supports the interaction between the User Dashboard and the Insider Threat Knowledge Base portal. The portal includes a repository for historical results, i.e., adjudicated cases containing all of the information first presented to the user and including any additional insights to help the analysts. In this paper we show the framework of the proposed system and the operational algorithms.

  5. Neutron Interrogation System For Underwater Threat Detection And Identification

    SciTech Connect (OSTI)

    Barzilov, Alexander P.; Novikov, Ivan S.; Womble, Phil C. [Department of Physics and Astronomy, Western Kentucky University, 1906 College Heights Blvd, 11077 Bowling Green, KY 42101 (United States)

    2009-03-10T23:59:59.000Z

    Wartime and terrorist activities, training and munitions testing, dumping and accidents have generated significant munitions contamination in the coastal and inland waters in the United States and abroad. Although current methods provide information about the existence of the anomaly (for instance, metal objects) in the sea bottom, they fail to identify the nature of the found objects. Field experience indicates that often in excess of 90% of objects excavated during the course of munitions clean up are found to be non-hazardous items (false alarm). The technology to detect and identify waterborne or underwater threats is also vital for protection of critical infrastructures (ports, dams, locks, refineries, and LNG/LPG). We are proposing a compact neutron interrogation system, which will be used to confirm possible threats by determining the chemical composition of the suspicious underwater object. The system consists of an electronic d-T 14-MeV neutron generator, a gamma detector to detect the gamma signal from the irradiated object and a data acquisition system. The detected signal then is analyzed to quantify the chemical elements of interest and to identify explosives or chemical warfare agents.

  6. Social/Ethical Issues in Predictive Insider Threat Monitoring

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Frincke, Deborah A.; Zabriskie, Mariah

    2011-01-01T23:59:59.000Z

    Combining traditionally monitored cybersecurity data with other kinds of organizational data is one option for inferring the motivations of individuals, which may in turn allow early prediction and mitigation of insider threats. While unproven, some researchers believe that this combination of data may yield better results than either cybersecurity or organizational data would in isolation. However, this nontraditional approach creates a potential conflict between goals, such as conflicts between organizational security improvements and individual privacy considerations. There are many facets to debate. Should warning signs of a potential malicious insider be addressed before a malicious event has occurred to prevent harm to the organization and discourage the insider from violating the organization’s rules? Would intervention violate employee trust or legal guidelines? What about the possibilities of misuse? Predictive approaches cannot be validated a priori; false accusations can affect the career of the accused; and collection/monitoring of certain types of data may affect employee morale. In this chapter, we explore some of the social and ethical issues stemming from predictive insider threat monitoring and discuss ways that a predictive modeling approach brings to the forefront social and ethical issues that should be considered and resolved by stakeholders and communities of interest.

  7. Safeguards Evaluation Method for evaluating vulnerability to insider threats

    SciTech Connect (OSTI)

    Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

    1986-01-01T23:59:59.000Z

    As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation.

  8. Wilderness threats matrix: A framework for assessing impacts. Forest Service research paper

    SciTech Connect (OSTI)

    Cole, D.N.

    1994-04-01T23:59:59.000Z

    The report includes the framework represented as a matrix of potential threats and attributes of wilderness character. Cells in the matrix represent the impacts of threats on each attribute. Potential application of the matrix are described. An application of the matrix to the wildernesses in the Forest Service's Northern Region (northern Idaho and Montana) suggests that fire management is the most significant threat to those wildernesses and that aquatic systems are the most threatened wilderness attribute.

  9. Method to monitor HC-SCR catalyst NOx reduction performance for lean exhaust applications

    DOE Patents [OSTI]

    Viola, Michael B. (Macomb Township, MI); Schmieg, Steven J. (Troy, MI); Sloane, Thompson M. (Oxford, MI); Hilden, David L. (Shelby Township, MI); Mulawa, Patricia A. (Clinton Township, MI); Lee, Jong H. (Rochester Hills, MI); Cheng, Shi-Wai S. (Troy, MI)

    2012-05-29T23:59:59.000Z

    A method for initiating a regeneration mode in selective catalytic reduction device utilizing hydrocarbons as a reductant includes monitoring a temperature within the aftertreatment system, monitoring a fuel dosing rate to the selective catalytic reduction device, monitoring an initial conversion efficiency, selecting a determined equation to estimate changes in a conversion efficiency of the selective catalytic reduction device based upon the monitored temperature and the monitored fuel dosing rate, estimating changes in the conversion efficiency based upon the determined equation and the initial conversion efficiency, and initiating a regeneration mode for the selective catalytic reduction device based upon the estimated changes in conversion efficiency.

  10. Because It's Not There: Verbal Visuality and the Threat of Graphics in Interactive Fiction

    E-Print Network [OSTI]

    Kashtan, Aaron

    2009-01-01T23:59:59.000Z

    the Threat of Graphics in Interactive Fiction Aaron Kashtantwo contemporary works of interactive fiction (IF), NickHuman Factors Keywords Interactive fiction, ekphrasis, word-

  11. Because It's Not There: Verbal Visuality and the Threat of Graphics in Interactive Fiction

    E-Print Network [OSTI]

    Kashtan, Aaron

    2009-01-01T23:59:59.000Z

    of the power of computer graphics, text still has access tothat are unavailable in graphics – including visual effects.Visuality and the Threat of Graphics in Interactive Fiction

  12. Dynamic reduction, Version 1. 0

    SciTech Connect (OSTI)

    Rogers, G.J.; Wong, D.Y.; Ottevangers, J.; Wang, L. (Ontario Hydro, Toronto, ON (Canada))

    1993-04-01T23:59:59.000Z

    This report describes the theoretical background of the EPRI Dynamic Reduction DYNRED V 1.0. EPRI initiated research under project RP763 to develop the original reduction program DYNEQU. This program was the first to be based on the concept of aggregating of coherent groups of synchronous generators into a single equivalent generator model. While technically advanced, DYNEQU proved difficult to use. Since then, the stability problems encountered in power system planning and operations have changed. The emphasis on first swing transient stability has been replaced by emphasis on inter-area oscillations and voltage stability. The method of identification of coherent generators used in DYNEQU is based on the comparison of rotor angle swings, in a linearized system model, following a fault. It has been shown that this method of coherency identification is good for first swing stability. For inter-area oscillation studies, this method of generator aggregation is less accurate. Far better, are identification methods based on the structure of the power system. Because of these changes in the requirements for reduced order power system models, a new dynamic reduction program (DYNRED) has been developed under EPRI project RP2447-1. It is coherency based, as is DYNEQU, but it has structurally based coherency identification methods in addition to the method used in DYNEQU. This report describes the techniques used in DYNRED, that is: Coherency Identification; Network Reduction; Method of Aggregation, Generator Aggregation, Excitation Aggregation, Primemover/Governor Aggregation. An example of the application of DYNRED to the reduction of a large interconnected power system model is also presented. DYNRED uses the special modeling and network solution techniques developed to enable systems having up to 12,000 bus to be studied. Dynamic data is completely compatible between MASS, PEALS, and the EPRI Extended Transient Midterm Stability Program (ETMSP).

  13. GEOSPATIOTEMPORAL DATA MINING IN AN EARLY WARNING SYSTEM FOR FOREST THREATS IN THE UNITED STATES

    E-Print Network [OSTI]

    Mills, Richard

    GEOSPATIOTEMPORAL DATA MINING IN AN EARLY WARNING SYSTEM FOR FOREST THREATS IN THE UNITED STATES F) for the conterminous United States as part of an early warning system to identify threats to forest ecosystems. Cluster States (CONUS) as part of a two tier system: An early warning system that monitors continental-scale ar

  14. Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid

    E-Print Network [OSTI]

    Wang, Wenye

    Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid Zhuo Lu Park, NC 27709 Email: cliff.wang@us.army.mil Abstract--The smart grid, generally referred in the smart grid. In this paper, we aim at classifying and evaluating the security threats

  15. Recommendations for the Next President Pacific Institute Fresh Water: Threats and Opportunities

    E-Print Network [OSTI]

    . Gleicki October 9, 2008 Lack of a National Water Policy As we enter the 21st century, pressures on waterRecommendations for the Next President Pacific Institute Fresh Water: Threats and Opportunities WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President Background Material Dr. Peter H

  16. Climate change is one of the greatest threats facing us today. CICERO's mission

    E-Print Network [OSTI]

    Johansen, Tom Henning

    Climate change is one of the greatest threats facing us today. CICERO's mission is to provide reliable and comprehensive knowledge about all aspects of the climate change problem. Foto: Scanpix #12;Climate change is one of the greatest threats facing us today. CICERO's mission is to provide reliable

  17. Economic evaluation of volume reduction for Defense transuranic waste

    SciTech Connect (OSTI)

    Brown, C.M.

    1981-07-01T23:59:59.000Z

    This study evaluates the economics of volume reduction of retrievably stored and newly generated DOE transuranic waste by comparing the costs of reduction of the waste with the savings possible in transportation and disposal of the waste. The report develops a general approach to the comparison of TRU waste volume reduction costs and cost savings, establishes an initial set of cost data, and develops conclusions to support selecting technologies and facilities for the disposal of DOE transuranic waste. Section I outlines the analysis which considers seven types of volume reduction from incineration and compaction of combustibles to compaction, size reduction, shredding, melting, and decontamination of metals. The study considers the volume reduction of contact-handled newly generated, and retrievably stored DOE transuranic waste. Section II of this report describes the analytical approach, assumptions, and flow of waste material through sites. Section III presents the waste inventories, disposal, and transportation savings with volume reduction and the volume reduction techniques and savings.

  18. Novel Threat-risk Index Using Probabilistic Risk Assessment and Human Reliability Analysis - Final Report

    SciTech Connect (OSTI)

    George A. Beitel

    2004-02-01T23:59:59.000Z

    In support of a national need to improve the current state-of-the-art in alerting decision makers to the risk of terrorist attack, a quantitative approach employing scientific and engineering concepts to develop a threat-risk index was undertaken at the Idaho National Engineering and Environmental Laboratory (INEEL). As a result of this effort, a set of models has been successfully integrated into a single comprehensive model known as Quantitative Threat-Risk Index Model (QTRIM), with the capability of computing a quantitative threat-risk index on a system level, as well as for the major components of the system. Such a threat-risk index could provide a quantitative variant or basis for either prioritizing security upgrades or updating the current qualitative national color-coded terrorist threat alert.

  19. Catalyst Paper No-Carb Strategy for GHG Reduction

    E-Print Network [OSTI]

    McClain, C.; Robinson, J.

    2008-01-01T23:59:59.000Z

    The Catalyst Paper strategy to manage GHG exposure is a combination of energy reduction initiatives in manufacturing and the effective use of biomass and alternative fuels to produce mill steam and electricity from the powerhouse. The energy...

  20. Un-reduction

    E-Print Network [OSTI]

    Martins Bruveris; David C. P. Ellis; Francois Gay-Balmaz; Darryl D. Holm

    2015-04-08T23:59:59.000Z

    This paper provides a full geometric development of a new technique called un-reduction, for dealing with dynamics and optimal control problems posed on spaces that are unwieldy for numerical implementation. The technique, which was originally concieved for an application to image dynamics, uses Lagrangian reduction by symmetry in reverse. A deeper understanding of un-reduction leads to new developments in image matching which serve to illustrate the mathematical power of the technique.

  1. Sustainable Forest Bioenergy Initiative

    SciTech Connect (OSTI)

    Breger, Dwayne; Rizzo, Rob

    2011-09-20T23:59:59.000Z

    In the state’s Electricity Restructuring Act of 1998, the Commonwealth of Massachusetts recognized the opportunity and strategic benefits to diversifying its electric generation capacity with renewable energy. Through this legislation, the Commonwealth established one of the nation’s first Renewable Energy Portfolio Standard (RPS) programs, mandating the increasing use of renewable resources in its energy mix. Bioenergy, meeting low emissions and advanced technology standards, was recognized as an eligible renewable energy technology. Stimulated by the state’s RPS program, several project development groups have been looking seriously at building large woody biomass generation units in western Massachusetts to utilize the woody biomass resource. As a direct result of this development, numerous stakeholders have raised concerns and have prompted the state to take a leadership position in pursuing a science based analysis of biomass impacts on forest and carbon emissions, and proceed through a rulemaking process to establish prudent policy to support biomass development which can contribute to the state’s carbon reduction commitments and maintain safeguards for forest sustainability. The Massachusetts Sustainable Forest Bioenergy Initiative (SFBI) was funded by the Department of Energy and started by the Department of Energy Resources before these contentious biomass issues were fully raised in the state, and continued throughout the substantive periods of this policy development. Thereby, while SFBI maintained its focus on the initially proposed Scope of Work, some aspects of this scope were expanded or realigned to meet the needs for groundbreaking research and policy development being advanced by DOER. SFBI provided DOER and the Commonwealth with a foundation of state specific information on biomass technology and the biomass industry and markets, the most comprehensive biomass fuel supply assessment for the region, the economic development impact associated with biomass usage, an understanding of forest management trends including harvesting and fuel processing methods, and the carbon profile of utilizing forest based woody biomass for the emerging biomass markets. Each of the tasks and subtasks have provided an increased level of understanding to support new directives, policies and adaptation of existing regulations within Massachusetts. The project has provided the essential information to allow state policymakers and regulators to address emerging markets, while ensuring forest sustainability and understanding the complex science on CO2 accounting and impacts as a result of biomass harvesting for power generation. The public at large and electricity ratepayers in Massachusetts will all benefit from the information garnered through this project. This is a result of the state’s interest to provide financial incentives to only biomass projects that demonstrate an acceptable carbon profile, an efficient use of the constrained supply of fuel, and the harvest of biomass to ensure forest sustainability. The goals of the Massachusetts Sustainable Forest Bioenergy Initiative as proposed in 2006 were identified as: increase the diversity of the Massachusetts energy mix through biomass; promote economic development in the rural economy through forest industry job creation; help fulfill the state’s energy and climate commitments under the Renewable Energy Portfolio Standard and Climate Protection Plan; assist the development of a biomass fuel supply infrastructure to support energy project demands; provide education and outreach to the public on the benefits and impacts of bioenergy; improve the theory and practice of sustainable forestry in the Commonwealth. Completed project activities summarized below will demonstrate the effectiveness of the project in meeting the above goals. In addition, as discussed above, Massachusetts DOER needed to make some modifications to its work plan and objectives during the term of this project due to changing public policy demands brought forth in the course of the public discours

  2. Insider Threat - Material Control and Accountability Mitigation (Presentation)

    SciTech Connect (OSTI)

    Powell, Danny H [ORNL] [ORNL; Elwood Jr, Robert H [ORNL] [ORNL

    2011-01-01T23:59:59.000Z

    Why is the insider a concern? There are many documented cases of nuclear material available for sale - there are more insider diversions than outsider attacks and more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. Insider attributes are: have access, has authority, possesses knowledge, works with absence of timeline, can test system, and may act alone or support a team. Material control and accountability (MC&A) is an essential part of an integrated safeguards system. Objectives of MC&A are: (1) Ongoing confirmation of the presence of special nuclear material (SNM) in assigned locations; (2) Prompt investigation of anomalies that may indicate a loss of SNM; (3) Timely and localized detection of loss, diversion, or theft of a goal quantity; (4) Rapid assessment and response to detection alarms; and (5) Timely generation of information to aid in the recovery of SNM in the event of an actual loss, diversion, or theft from the purview of the MC&A system. Control and accountability of material, equipment, and data are essential to minimizing insider threats.

  3. Fe(III) Reduction and U(VI) Immobilization by Paenibacillus sp...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of either of electron transfer mediators (ETMs) flavin mononucleotide (FMN) or anthraquinone-2,6-disulfonate (AQDS). Maximum initial Fh reduction rates were observed at...

  4. Learning and cost reductions for generating technologies in the national energy modeling system (NEMS)

    E-Print Network [OSTI]

    Gumerman, Etan; Marnay, Chris

    2004-01-01T23:59:59.000Z

    of International Learning on Technology Cost. In Issues ofbetween initial new technology cost estimates and actualthe revolutionary technologies have cost reductions beyond

  5. DTT Energy Reduction Project

    E-Print Network [OSTI]

    Heinrich, C.

    2004-01-01T23:59:59.000Z

    DuPont Titanium Technologies has developed a sustainable growth strategy that includes an initiative focused on improving energy efficiency. The energy efficiency initiative is a disciplined approach that began with creation of an Energy...

  6. APEC Smart Grid Initiative

    SciTech Connect (OSTI)

    Bloyd, Cary N.

    2012-03-01T23:59:59.000Z

    This brief paper describes the activities of the Asia Pacific Economic Cooperation (APEC) Smart Grid Initiative (ASGI) which is being led by the U.S. and developed by the APEC Energy Working Group. In the paper, I describe the origin of the initiative and briefly mention the four major elements of the initiative along with existing APEC projects which support it.

  7. 52293Federal Register / Vol. 79, No. 170 / Wednesday, September 3, 2014 / Proposed Rules that even if each threat individually

    E-Print Network [OSTI]

    if each threat individually does not result in population-level effects that may warrant protection). For the other six petitioned species, we have specifically considered whether two or more of the threats or in the foreseeable future. We have no information to suggest that the identified threats to the species will work

  8. 36284 Federal Register / Vol. 79, No. 123 / Thursday, June 26, 2014 / Proposed Rules threat (e.g., fishery interactions, ship

    E-Print Network [OSTI]

    36284 Federal Register / Vol. 79, No. 123 / Thursday, June 26, 2014 / Proposed Rules threat (e concludes that the recovering population in combination with the removal of previously identified threats- and long-term; (7) the effects of other threats, including whaling, disease and predation, contaminants

  9. Detecting Threat-Related Intentional Actions of Others: Effects of Image Quality, Response Mode, and Target Cuing on Vigilance

    E-Print Network [OSTI]

    Parasuraman, Raja

    Detecting Threat-Related Intentional Actions of Others: Effects of Image Quality, Response Mode to detect infrequent threat-related actions. Participants indicated detection of target actions either vigilance task. Irrespective of response mode, the detection rate of intentional threats declined over time

  10. Stereotype Threat Excerpt from Malcolm Gladwell's "The Art of Failure" in the New Yorker, August 21 & 28,

    E-Print Network [OSTI]

    McMains, Sara

    Stereotype Threat Excerpt from Malcolm Gladwell's "The Art of Failure" in the New Yorker, August 21 they call "stereotype threat": when black students are put into a situation where they are directly-- the resulting pressure causes their performance to suffer." "Steele and others have found stereotype threat

  11. Stereotype Threat Reinterpreted as a Regulatory Mismatch Lisa R. Grimm, Arthur B. Markman, W. Todd Maddox, and Grant C. Baldwin

    E-Print Network [OSTI]

    Maddox, W. Todd

    Stereotype Threat Reinterpreted as a Regulatory Mismatch Lisa R. Grimm, Arthur B. Markman, W. Todd of strands of work to identify causes of stereotype threat in a way that allows them to reverse the effects. This work suggests that stereotype threat effects emerge from a prevention focus combined with tasks

  12. Threat of Bodily Harm Has Opposing Effects on Cognition Kesong Hu, Andrew Bauer, Srikanth Padmala, and Luiz Pessoa

    E-Print Network [OSTI]

    Pessoa, Luiz

    Emotion Threat of Bodily Harm Has Opposing Effects on Cognition Kesong Hu, Andrew Bauer, Srikanth., Bauer, A., Padmala, S., & Pessoa, L. (2011, June 27). Threat of Bodily Harm Has Opposing Effects on Cognition. Emotion. Advance online publication. doi: 10.1037/a0024345 #12;Threat of Bodily Harm Has Opposing

  13. INFECTIOUS DISEASE OUTBREAKS Avian Flu, measles, Mumps, SARs, and other infectious diseases can pose a threat to the

    E-Print Network [OSTI]

    Meyers, Steven D.

    pose a threat to the University community as they do to communities worldwide. If there is an outbreak has extensive information on these and other health threats on their website (http are appropriate to the emerging threat and ready for implementation. Response team meets with increasing frequency

  14. 34.07.99.M0.02 Bomb Threat Procedures Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    34.07.99.M0.02 Bomb Threat Procedures Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 34.07.99.M0.02 Bomb Threat Procedures Approved September 25, 2001 Revised April 30, 2010 Next scheduled review: April 4, 2016 Standard Administrative Procedure Statement Any and all bomb threats are regarded seriously

  15. DownloadedBy:[NorthwesternUniversity]At:03:5419April2008 Conscious intrusion of threat information via

    E-Print Network [OSTI]

    Reber, Paul J.

    DownloadedBy:[NorthwesternUniversity]At:03:5419April2008 Conscious intrusion of threat information University, Chicago, IL, USA Preferential processing of threat has been implicated in the development and perpetuation of anxiety. We investigated threat processing and anxiety using a subliminal priming paradigm

  16. Darwin's Pangenesis and the Problem of Unconceived Alternatives P. Kyle Stanford has argued that the most substantial threat to scientific realism

    E-Print Network [OSTI]

    Barrett, Jeffrey A.

    argued that the most substantial threat to scientific realism arises from the problem of unconceived significant threat to scientific realism derives neither from traditional underdetermination arguments nor

  17. Project Programming and Commissioning as a Risk Mitigation and Threat Analysis Tool

    E-Print Network [OSTI]

    Weiss, M. L.

    2006-01-01T23:59:59.000Z

    beyond traditional disciplines including risk/threat analysis and mitigation programs. This paper discusses the growing trend of using a commissioning approach as a documentation process for the validation requirements, which are documented in the study...

  18. Threat assessment for safe navigation in environments with uncertainty in predictability

    E-Print Network [OSTI]

    Aoudé, Georges Salim

    2011-01-01T23:59:59.000Z

    This thesis develops threat assessment algorithms to improve the safety of the decision making of autonomous and human-operated vehicles navigating in dynamic and uncertain environments, where the source of uncertainty is ...

  19. What Happens When Low Status Groups Start Moving Up? Prejudice and Threat to Group Position

    E-Print Network [OSTI]

    Nierman, Angela J.

    2007-11-20T23:59:59.000Z

    Does threat operate as a cause or a consequence of prejudice? Three studies investigated how high status groups respond to low status groups' advances. I hypothesized that gays' status gains are threatening to heterosexuals' privileged group...

  20. CERNA WORKING PAPER SERIES Spatial price homogeneity as a mechanism to reduce the threat of

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    district heating sector in 2007, confirms the theoretical predictions. Keywords: regulatory threat, district heating, Sweden JEL Classification: L12, L21, L51, L97 hal-00659458,version1-12Jan2012 #12;2 1

  1. A unified framework for trajectory planning, threat assessment, and semi-autonomous control of passenger vehicles

    E-Print Network [OSTI]

    Anderson, Sterling J., Ph. D. Massachusetts Institute of Technology

    2009-01-01T23:59:59.000Z

    This thesis describes the design of an active safety framework that performs trajectory planning, threat assessment, and semi-autonomous control of passenger vehicles in hazard avoidance scenarios. The vehicle navigation ...

  2. Tackling the Triple-Threat Genome of Miscanthus x giganteus (2010 JGI User Meeting)

    ScienceCinema (OSTI)

    Moose, Steve

    2011-04-25T23:59:59.000Z

    Steve Moose from the University of Illinois at Urbana-Champaign and the Energy Biosciences Institute on "Tackling the Triple-Threat Genome of Miscanthus x giganteus" on March 25, 2010 at the 5th Annual DOE JGI User Meeting

  3. Jack N. Summe Director, Navy Insider Threat to Cyber Security (ITCS)

    E-Print Network [OSTI]

    Jack N. Summe Director, Navy Insider Threat to Cyber Security (ITCS) Mr. Jack Summe currently Psychological Operations Group (Airborne) from 2003-2005. A native of Warsaw, Indiana, he holds a bachelor

  4. Anomaly metrics to differentiate threat sources from benign sources in primary vehicle screening.

    SciTech Connect (OSTI)

    Cohen, Israel Dov; Mengesha, Wondwosen

    2011-09-01T23:59:59.000Z

    Discrimination of benign sources from threat sources at Port of Entries (POE) is of a great importance in efficient screening of cargo and vehicles using Radiation Portal Monitors (RPM). Currently RPM's ability to distinguish these radiological sources is seriously hampered by the energy resolution of the deployed RPMs. As naturally occurring radioactive materials (NORM) are ubiquitous in commerce, false alarms are problematic as they require additional resources in secondary inspection in addition to impacts on commerce. To increase the sensitivity of such detection systems without increasing false alarm rates, alarm metrics need to incorporate the ability to distinguish benign and threat sources. Principal component analysis (PCA) and clustering technique were implemented in the present study. Such techniques were investigated for their potential to lower false alarm rates and/or increase sensitivity to weaker threat sources without loss of specificity. Results of the investigation demonstrated improved sensitivity and specificity in discriminating benign sources from threat sources.

  5. Detection and Analysis of Threats to the Energy Sector: DATES

    SciTech Connect (OSTI)

    Alfonso Valdes

    2010-03-31T23:59:59.000Z

    This report summarizes Detection and Analysis of Threats to the Energy Sector (DATES), a project sponsored by the United States Department of Energy and performed by a team led by SRI International, with collaboration from Sandia National Laboratories, ArcSight, Inc., and Invensys Process Systems. DATES sought to advance the state of the practice in intrusion detection and situational awareness with respect to cyber attacks in energy systems. This was achieved through adaptation of detection algorithms for process systems as well as development of novel anomaly detection techniques suited for such systems into a detection suite. These detection components, together with third-party commercial security systems, were interfaced with the commercial Security Information Event Management (SIEM) solution from ArcSight. The efficacy of the integrated solution was demonstrated on two testbeds, one based on a Distributed Control System (DCS) from Invensys, and the other based on the Virtual Control System Environment (VCSE) from Sandia. These achievements advance the DOE Cybersecurity Roadmap [DOE2006] goals in the area of security monitoring. The project ran from October 2007 until March 2010, with the final six months focused on experimentation. In the validation phase, team members from SRI and Sandia coupled the two test environments and carried out a number of distributed and cross-site attacks against various points in one or both testbeds. Alert messages from the distributed, heterogeneous detection components were correlated using the ArcSight SIEM platform, providing within-site and cross-site views of the attacks. In particular, the team demonstrated detection and visualization of network zone traversal and denial-of-service attacks. These capabilities were presented to the DistribuTech Conference and Exhibition in March 2010. The project was hampered by interruption of funding due to continuing resolution issues and agreement on cost share for four months in 2008. This resulted in delays in finalizing agreements with commercial partners, and in particular the Invensys testbed was not installed until December 2008 (as opposed to the March 2008 plan). The project resulted in a number of conference presentations and publications, and was well received when presented at industry forums. In spite of some interest on the part of the utility sector, we were unfortunately not able to engage a utility for a full-scale pilot deployment.

  6. Threat of Hydride Re-orientation to Spent Fuel Integrity During Transportation Accidents: Myth or Reality?

    SciTech Connect (OSTI)

    Rashid, Joe [ANATECH, 5435 Oberlin Drive, San Diego, CA 92121 (United States); Machiels, Albert [EPRI, 3420 Hillview Avenue, Palo Alto, CA 94304 (United States)

    2007-07-01T23:59:59.000Z

    The source-term study conducted by Sandia National Laboratories nearly two decades ago for the spent fuel inventory known at the time, which was in the low-to-medium burnup range ({approx}35 GWd/MTU), showed that the effects of transportation accidents on spent fuel failures, and consequential radioactivity release to the environment, were relatively benign. However, with today's discharged fuel burnups routinely greater than 45 GWd/MTU, potential hydride reorientation during interim dry storage, and its effects on cladding properties, has become one of the primary concerns for spent fuel transportation. Laboratory tests of un-irradiated cladding specimens subjected to heat treatments promoting hydride dissolution followed by re-precipitation in the radial direction have shown that relatively moderate concentrations ({approx}70 ppm) of radial hydrides can significantly degrade cladding ductility, at least at room temperature. The absence of specific data that are relevant to high-burnup spent fuel under dry storage conditions have led to the conjecture, deduced from those tests, that massive cladding failures, possibly resulting in fuel reconfiguration, can be expected during cask drop events. Such conclusions are not borne out by the findings in this paper. The analysis results indicate that cladding failure is bi-modal: a state of failure initiation at the cladding ID remaining as part-wall damage with less than 2% probability of occurrence, and a through-wall failure at a probability of 1 E-5. These results indicate that spent fuel conditions that could promote the formation of radial hydrides during dry storage are not sufficient to produce radial hydrides concentrations of significant levels to cause major threat to spent fuel integrity. It is important to note in this regard that the through-wall cladding failure probability of 1 E-5 is of the same order of magnitude as calculated in the cited Sandia study for low burnup fuel. (authors)

  7. US strategic nuclear forces in the post strategic arms reduction talk world: Is there a future for nuclear deterrence. Research report

    SciTech Connect (OSTI)

    Filler, R.J.

    1998-06-01T23:59:59.000Z

    Following victory in the Cold War, the Soviet threat that shaped United States` nuclear deterrent strategy for the past 40 years, is gone. That defined, monolithic threat has been replaced by a diverse array of new challenges including proliferation of nuclear, chemical and biological Weapons of Mass Destruction (WMD) among regional powers, rogue states and non-state actors. In the face of this emerging WMD threat, the United States is dismantling its chemical and biological weapons stockpile and remains committed to further reductions in its nuclear arsenal. Can a reduced U.S. nuclear weapons arsenal provide a credible deterrent to the growing threat posed by proliferation of WMD. Finally, in light of the current Revolution in Military Affairs (RMA), is it time to reduce our dependence on nuclear weapons and pursue other deterrent options.

  8. DISCLOSURE OF EDUCATION RECORDS IN HEALTH AND SAFETY EMERGENCIES If the university determines that there is an articulable and significant threat to the health or safety of a student or

    E-Print Network [OSTI]

    Duchowski, Andrew T.

    If the university determines that there is an articulable and significant threat individuals. · ``Articulable and significant threat'' means that if a school reasonably believes that a student poses a significant threat, such as a threat

  9. Energy Security Initiatives Update

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

  10. Initiating Business with INL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Initiating Business with INL The INL Small Business Program Office (SBPO) serves as the advocate and point of contact for businesses seeking contracting opportunities. We ask you...

  11. Strategic Growth Initiative (Michigan)

    Broader source: Energy.gov [DOE]

    A joint venture between Michigan Department of Agriculture and Rural Development (MDARD) and the Michigan Economic Development Corporation (MEDC), the Strategic Growth Initiative Grant Program was...

  12. Salt Waste Processing Initiatives

    Office of Environmental Management (EM)

    1 Patricia Suggs Salt Processing Team Lead Assistant Manager for Waste Disposition Project Office of Environmental Management Savannah River Site Salt Waste Processing Initiatives...

  13. Wind Powering America Initiative (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2011-01-01T23:59:59.000Z

    The U.S. Department of Energy's Wind Powering America initiative engages in technology market acceptance, barrier reduction, and technology deployment support activities. This fact sheet outlines ways in which the Wind Powering America team works to reduce barriers to appropriate wind energy deployment, primarily by focusing on six program areas: workforce development, communications and outreach, stakeholder analysis and resource assessment, wind technology technical support, wind power for Native Americans, and federal sector support and collaboration.

  14. Dose reduction at nuclear power plants

    SciTech Connect (OSTI)

    Baum, J.W.; Dionne, B.J.

    1983-01-01T23:59:59.000Z

    The collective dose equivalent at nuclear power plants increased from 1250 rem in 1969 to nearly 54,000 rem in 1980. This rise is attributable primarily to an increase in nuclear generated power from 1289 MW-y to 29,155 MW-y; and secondly, to increased average plant age. However, considerable variation in exposure occurs from plant to plant depending on plant type, refueling, maintenance, etc. In order to understand the factors influencing these differences, an investigation was initiated to study dose-reduction techniques and effectiveness of as low as reasonably achievable (ALARA) planning at light water plants. Objectives are to: identify high-dose maintenance tasks and related dose-reduction techniques; investigate utilization of high-reliability, low-maintenance equipment; recommend improved radioactive waste handling equipment and procedures; examine incentives for dose reduction; and compile an ALARA handbook.

  15. A Materials Facilities Initiative -

    E-Print Network [OSTI]

    A Materials Facilities Initiative - FMITS & MPEX D.L. Hillis and ORNL Team Fusion & Materials for Nuclear Systems Division July 10, 2014 #12;2 Materials Facilities Initiative JET ITER FNSF Fusion Reactor Challenges for materials: fluxes and fluence, temperatures 50 x divertor ion fluxes up to 100 x neutron

  16. Florida Hydrogen Initiative

    SciTech Connect (OSTI)

    Block, David L

    2013-06-30T23:59:59.000Z

    The Florida Hydrogen Initiative (FHI) was a research, development and demonstration hydrogen and fuel cell program. The FHI program objectives were to develop Florida?s hydrogen and fuel cell infrastructure and to assist DOE in its hydrogen and fuel cell activities The FHI program funded 12 RD&D projects as follows: Hydrogen Refueling Infrastructure and Rental Car Strategies -- L. Lines, Rollins College This project analyzes strategies for Florida's early stage adaptation of hydrogen-powered public transportation. In particular, the report investigates urban and statewide network of refueling stations and the feasibility of establishing a hydrogen rental-car fleet based in Orlando. Methanol Fuel Cell Vehicle Charging Station at Florida Atlantic University ? M. Fuchs, EnerFuel, Inc. The project objectives were to design, and demonstrate a 10 kWnet proton exchange membrane fuel cell stationary power plant operating on methanol, to achieve an electrical energy efficiency of 32% and to demonstrate transient response time of less than 3 milliseconds. Assessment of Public Understanding of the Hydrogen Economy Through Science Center Exhibits, J. Newman, Orlando Science Center The project objective was to design and build an interactive Science Center exhibit called: ?H2Now: the Great Hydrogen Xchange?. On-site Reformation of Diesel Fuel for Hydrogen Fueling Station Applications ? A. Raissi, Florida Solar Energy Center This project developed an on-demand forecourt hydrogen production technology by catalytically converting high-sulfur hydrocarbon fuels to an essentially sulfur-free gas. The removal of sulfur from reformate is critical since most catalysts used for the steam reformation have limited sulfur tolerance. Chemochromic Hydrogen Leak Detectors for Safety Monitoring ? N. Mohajeri and N. Muradov, Florida Solar Energy Center This project developed and demonstrated a cost-effective and highly selective chemochromic (visual) hydrogen leak detector for safety monitoring at any facility engaged in transport, handling and use of hydrogen. Development of High Efficiency Low Cost Electrocatalysts for Hydrogen Production and PEM Fuel Cell Applications ? M. Rodgers, Florida Solar Energy Center The objective of this project was to decrease platinum usage in fuel cells by conducting experiments to improve catalyst activity while lowering platinum loading through pulse electrodeposition. Optimum values of several variables during electrodeposition were selected to achieve the highest electrode performance, which was related to catalyst morphology. Understanding Mechanical and Chemical Durability of Fuel Cell Membrane Electrode Assemblies ? D. Slattery, Florida Solar Energy Center The objective of this project was to increase the knowledge base of the degradation mechanisms for membranes used in proton exchange membrane fuel cells. The results show the addition of ceria (cerium oxide) has given durability improvements by reducing fluoride emissions by an order of magnitude during an accelerated durability test. Production of Low-Cost Hydrogen from Biowaste (HyBrTec?) ? R. Parker, SRT Group, Inc., Miami, FL This project developed a hydrogen bromide (HyBrTec?) process which produces hydrogen bromide from wet-cellulosic waste and co-produces carbon dioxide. Eelectrolysis dissociates hydrogen bromide producing recyclable bromine and hydrogen. A demonstration reactor and electrolysis vessel was designed, built and operated. Development of a Low-Cost and High-Efficiency 500 W Portable PEMFC System ? J. Zheng, Florida State University, H. Chen, Bing Energy, Inc. The objectives of this project were to develop a new catalyst structures comprised of highly conductive buckypaper and Pt catalyst nanoparticles coated on its surface and to demonstrate fuel cell efficiency improvement and durability and cell cost reductions in the buckypaper based electrodes. Development of an Interdisciplinary Hydrogen and Fuel Cell Technology Academic Program ? J. Politano, Florida Institute of Technology, Melbourne, FL This project developed a hydrogen and fuel cel

  17. INVESTING IN HEALTH FOR ECONOMIC GROWTH AND POVERTY REDUCTION: New perspectives and opportunities

    E-Print Network [OSTI]

    Klein, Ophir

    W2 2 MI F H 6 0 h PROGRAMME INVESTING IN HEALTH FOR ECONOMIC GROWTH AND POVERTY REDUCTION: New, and an increasingly complex developmental agenda that emphasizes debt and poverty reduction as a means to promote; integrating new health initiatives into a broader poverty reduction and development framework; and resolving

  18. Threat-aware Path Planning in Uncertain Urban Environments Georges S. Aoude, Brandon D. Luders, Daniel S. Levine, and Jonathan P. How

    E-Print Network [OSTI]

    How, Jonathan P.

    Threat-aware Path Planning in Uncertain Urban Environments Georges S. Aoude, Brandon D. Luders intents. We propose a novel threat assessment module, consisting of an intention predictor and a threat assessor, which augments the host vehicle's path planner with a real-time threat value representing

  19. Situation Threat Assessment Policy and Protocol (Updated 9/1/11) Rowan University is committed to promoting a safe and secure learning environment. It is

    E-Print Network [OSTI]

    Rusu, Adrian

    Situation Threat Assessment Policy and Protocol (Updated 9/1/11) Rowan University is committed resources within the Division of Student Life in responding to alleged threats or acts of violence by students. Definitions Threat: A threat is defined as any behavior that suggests intent to harm self

  20. REDUCTIONS WITHOUT REGRET: SUMMARY

    SciTech Connect (OSTI)

    Swegle, J.; Tincher, D.

    2013-09-16T23:59:59.000Z

    This paper briefly summarizes the series in which we consider the possibilities for losing, or compromising, key capabilities of the U.S. nuclear force in the face of modernization and reductions. The first of the three papers takes an historical perspective, considering capabilities that were eliminated in past force reductions. The second paper is our attempt to define the needed capabilities looking forward in the context of the current framework for force modernization and the current picture of the evolving challenges of deterrence and assurance. The third paper then provides an example for each of our undesirable outcomes: the creation of roach motels, box canyons, and wrong turns.

  1. Initial data engineering

    E-Print Network [OSTI]

    Piotr T. Chrusciel; James Isenberg; Daniel Pollack

    2005-06-16T23:59:59.000Z

    We present a local gluing construction for general relativistic initial data sets. The method applies to generic initial data, in a sense which is made precise. In particular the trace of the extrinsic curvature is not assumed to be constant near the gluing points, which was the case for previous such constructions. No global conditions on the initial data sets such as compactness, completeness, or asymptotic conditions are imposed. As an application, we prove existence of spatially compact, maximal globally hyperbolic, vacuum space-times without any closed constant mean curvature spacelike hypersurface.

  2. The President's Biofuels Initiative

    Broader source: Energy.gov (indexed) [DOE]

    Biofuels Initiative Neil Rossmeissl Office of the Biomass Program Energy Efficiency and Renewable Energy Why Can't We Regulate Our Way There? 25 20 15 10 5 0 1970 1980 1990 2000...

  3. Mississippi Clean Energy Initiative

    Broader source: Energy.gov [DOE]

    In April 2010, the Mississippi Legislature enacted [http://billstatus.ls.state.ms.us/documents/2010/pdf/HB/1700-1799/HB1701S... HB 1701], establishing the Mississippi Clean Energy Initiative. This...

  4. President's Hydrogen Fuel Initiative

    Broader source: Energy.gov (indexed) [DOE]

    Hydrogen Fuel Initiative Workshop on Manufacturing R&D for the Hydrogen Economy Washington, DC July 13, 2005 JoAnn Milliken DOE Hydrogen Program Planning U.S. Energy Dependence is...

  5. Climate VISION: Private Sector Initiatives: Magnesium

    Office of Scientific and Technical Information (OSTI)

    Leading magnesium producers and casting companies are working with the U.S. Environmental Protection Agency (EPA) to alleviate the global environmental threat of climate...

  6. A threat-based definition of IA- and IA-enabled products.

    SciTech Connect (OSTI)

    Shakamuri, Mayuri; Schaefer, Mark A.; Campbell, Philip LaRoche

    2010-07-01T23:59:59.000Z

    This paper proposes a definition of 'IA and IA-enabled products' based on threat, as opposed to 'security services' (i.e., 'confidentiality, authentication, integrity, access control or non-repudiation of data'), as provided by Department of Defense (DoD) Instruction 8500.2, 'Information Assurance (IA) Implementation.' The DoDI 8500.2 definition is too broad, making it difficult to distinguish products that need higher protection from those that do not. As a consequence the products that need higher protection do not receive it, increasing risk. The threat-based definition proposed in this paper solves those problems by focusing attention on threats, thereby moving beyond compliance to risk management. (DoDI 8500.2 provides the definitions and controls that form the basis for IA across the DoD.) Familiarity with 8500.2 is assumed.

  7. A threat-based definition of IA and IA-enabled products.

    SciTech Connect (OSTI)

    Shakamuri, Mayuri; Schaefer, Mark A.; Campbell, Philip LaRoche

    2010-09-01T23:59:59.000Z

    This paper proposes a definition of 'IA and IA-enabled products' based on threat, as opposed to 'security services' (i.e., 'confidentiality, authentication, integrity, access control or non-repudiation of data'), as provided by Department of Defense (DoD) Instruction 8500.2, 'Information Assurance (IA) Implementation.' The DoDI 8500.2 definition is too broad, making it difficult to distinguish products that need higher protection from those that do not. As a consequence the products that need higher protection do not receive it, increasing risk. The threat-based definition proposed in this paper solves those problems by focusing attention on threats, thereby moving beyond compliance to risk management. (DoDI 8500.2 provides the definitions and controls that form the basis for IA across the DoD.) Familiarity with 8500.2 is assumed.

  8. Comprehensive test ban treaty international monitoring system security threats and proposed security attributes

    SciTech Connect (OSTI)

    Draelos, T.J.; Craft, R.L.

    1996-03-01T23:59:59.000Z

    To monitor compliance with a Comprehensive Test Ban Treaty (CTBT), a sensing network, referred to as the International Monitoring System (IMS), is being deployed. Success of the IMS depends on both its ability to preform its function and the international community`s confidence in the system. To ensure these goals, steps must be taken to secure the system against attacks that would undermine it; however, it is not clear that consensus exists with respect to the security requirements that should be levied on the IMS design. In addition, CTBT has not clearly articulated what threats it wishes to address. This paper proposes four system-level threats that should drive IMS design considerations, identifies potential threat agents, and collects into one place the security requirements that have been suggested by various elements of the IMS community. For each such requirement, issues associated with the requirement are identified and rationale for the requirement is discussed.

  9. Invasion of French Polynesia by the Glassy-Winged Sharpshooter, Homalodisca coagulata (Hemiptera: Cicadellidae): A New Threat

    E-Print Network [OSTI]

    Hoddle, Mark S.

    (Hemiptera: Cicadellidae): A New Threat to the South Pacific1 Julie Grandgirard,2,3 Mark S. Hoddle,4 George K

  10. Aluminum reduction cell electrode

    DOE Patents [OSTI]

    Goodnow, W.H.; Payne, J.R.

    1982-09-14T23:59:59.000Z

    The invention is directed to cathode modules comprised of refractory hard metal materials, such as TiB[sub 2], for an electrolytic cell for the reduction of alumina wherein the modules may be installed and replaced during operation of the cell and wherein the structure of the cathode modules is such that the refractory hard metal materials are not subjected to externally applied forces or rigid constraints. 9 figs.

  11. Clean Coal Power Initiative

    SciTech Connect (OSTI)

    Doug Bartlett; Rob James; John McDermott; Neel Parikh; Sanjay Patnaik; Camilla Podowski

    2006-03-31T23:59:59.000Z

    This report is the fifth quarterly Technical Progress Report submitted by NeuCo, Incorporated, under Award Identification Number, DE-FC26-04NT41768. This award is part of the Clean Coal Power Initiative (''CCPI''), the ten-year, $2B initiative to demonstrate new clean coal technologies in the field. This report is one of the required reports listed in Attachment B Federal Assistance Reporting Checklist, part of the Cooperative Agreement. The report covers the award period January 1, 2006 - March 31, 2006 and NeuCo's efforts within design, development, and deployment of on-line optimization systems during that period.

  12. Initiatives | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 111 1,613 122Commercial602 1,39732on Armed ServicesDepartmentInformationInitiatives Initiatives

  13. GLOBAL TAXONOMY INITIATIVE

    E-Print Network [OSTI]

    Grant, Taran

    #12;THE GLOBAL TAXONOMY INITIATIVE: Using Systematic Inventories to Meet Country and Regional Needs International #12;Table of Contents Introduction 1 I. Using Inventories to Build Capacity and Advance the GTI 2 for systematic inventories. A major component of the workshop addressed how systematic inventories can serve

  14. BRAZIL RESEARCH INITIATIVES

    E-Print Network [OSTI]

    Liu, Taosheng

    BRAZIL RESEARCH INITIATIVES Michigan State University (MSU) identifies Brazil as a global priority and challenges become increasingly part of the U.S.-Brazil agenda, MSU desires partnerships aimed at producing in the U.S. and one in Brazil, to share research strategies and explore joint projects in several research

  15. ----------------IRI ---------------Initiative & Referendum Institute

    E-Print Network [OSTI]

    Rohs, Remo

    results a conservative cast: · Marijuana rejected. Marijuana proponents went 0-4 on election night. California's Propo- sition 19 that would have legalized marijuana was one of the highest profile initiatives this year. In early polls, it led substantially but ended up failing 45-55. The silver lining for marijuana

  16. Staff Initials ______ Membership Application*

    E-Print Network [OSTI]

    NOT include the basketball gym. #12;Staff Initials ______ Furman University Fitness Center Acknowledgement and Release Form I, the undersigned, acknowledge that I am at least 18 years of age and that I am voluntarily here) I acknowledge that I am aware of the possible risks, dangers, and hazards associated with my

  17. The Sustainability "Green Initiative"

    E-Print Network [OSTI]

    Harms, Kyle E.

    sustainability approach aimed at: ·Lowering energy use and cost ·Reducing greenhouse gases ·Water and waste waterThe Sustainability "Green Initiative" At LAPPA October, 2008 #12;Sustainability is the capacity ·Carbon Footprint ·Ozone Friendly ·Global Warming ·Renewable Energy ·Biodegradable What does this whole

  18. NOM's National Marine Fisheries Service (NMFS) is working to reduce these threats to

    E-Print Network [OSTI]

    human actˇvˇtˇes, such as dredging in the marˇne envˇronment 0r the ˇntakes of power plants, may ˇnc power plants often take in sea water to cool the reactors. Sea turtles may be trapped against intakeNOM's National Marine Fisheries Service (NMFS) is working to reduce these threats to help conserve

  19. Modeling threat assessments of water supply systems using markov latent effects methodology.

    SciTech Connect (OSTI)

    Silva, Consuelo Juanita

    2006-12-01T23:59:59.000Z

    Recent amendments to the Safe Drinking Water Act emphasize efforts toward safeguarding our nation's water supplies against attack and contamination. Specifically, the Public Health Security and Bioterrorism Preparedness and Response Act of 2002 established requirements for each community water system serving more than 3300 people to conduct an assessment of the vulnerability of its system to a terrorist attack or other intentional acts. Integral to evaluating system vulnerability is the threat assessment, which is the process by which the credibility of a threat is quantified. Unfortunately, full probabilistic assessment is generally not feasible, as there is insufficient experience and/or data to quantify the associated probabilities. For this reason, an alternative approach is proposed based on Markov Latent Effects (MLE) modeling, which provides a framework for quantifying imprecise subjective metrics through possibilistic or fuzzy mathematics. Here, an MLE model for water systems is developed and demonstrated to determine threat assessments for different scenarios identified by the assailant, asset, and means. Scenario assailants include terrorists, insiders, and vandals. Assets include a water treatment plant, water storage tank, node, pipeline, well, and a pump station. Means used in attacks include contamination (onsite chemicals, biological and chemical), explosives and vandalism. Results demonstrated highest threats are vandalism events and least likely events are those performed by a terrorist.

  20. Damage Threats and Response of Final Optics for Laser-Fusion Power Plants

    E-Print Network [OSTI]

    Tillack, Mark

    Damage Threats and Response of Final Optics for Laser-Fusion Power Plants M. S. Tillack1 , S. A-1597 The final optics for laser-IFE (inertial fusion energy) power plants will be exposed to a variety of damage to be the most serious concerns for a power plant. 1. Introduction Survival of the final optic is one of the most

  1. DO GLOBAL WARMING AND CLIMATE CHANGE REPRESENT A SERIOUS THREAT TO OUR WELFARE

    E-Print Network [OSTI]

    DO GLOBAL WARMING AND CLIMATE CHANGE REPRESENT A SERIOUS THREAT TO OUR WELFARE AND ENVIRONMENT? By Michael E. Mann I. Introduction The subjects of "global warming" and "climate change" have become parts of both the popular lexicon and the public discourse. Discussions of global warming often evoke passionate

  2. EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang

    E-Print Network [OSTI]

    Jay Yang, Shanchieh

    attacks has become a critical issue, yet different from that of traditional physical attacks. Current behavior, hacking methods, and network vulnerabilities. This is different from traditional physical attacks by traditional physical attacks. The question then is how good a cyber threat assessment algorithm one should

  3. Toward a generic model of security in organizational context: exploring insider threats to information infrastructure.

    SciTech Connect (OSTI)

    Martinez-Moyano, I. J.; Samsa, M. E.; Burke, J. F.; Akcam, B. K.; Decision and Information Sciences; Rockefeller Coll. at the State Univ. of New York at Albany

    2008-01-01T23:59:59.000Z

    This paper presents a generic model for information security implementation in organizations. The model presented here is part of an ongoing research stream related to critical infrastructure protection and insider threat and attack analysis. This paper discusses the information security implementation case.

  4. Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats

    E-Print Network [OSTI]

    Wang, Wenye

    Greenbench: A Benchmark for Observing Power Grid Vulnerability Under Data-Centric Threats Mingkui infrastructure and begins to show its inability as the demand for power delivery and consumption boosts in recent power grid. This integration, however, brings a new host of vulnerabilities stem from Internet and opens

  5. ARTICLE doi:10.1038/nature09440 Global threats to human water security

    E-Print Network [OSTI]

    McIntyre, Peter

    ,20 . The success of integrated water management strategies depends on striking a balance between human resource use policy and management responses to this crisis, and underscores the necessity of limiting threats change, urb- anization, industrialization and engineering schemes like reservoirs, irrigation

  6. The Threat to the Planet* Dark & Bright Sides of Global Warming

    E-Print Network [OSTI]

    Hansen, James E.

    The Threat to the Planet* Dark & Bright Sides of Global Warming Jim Hansen 3 October 2007 presented provides most important information on global warming. Recorded human history occurs within the Holocene for these large climate change is perturbations of Earth's orbit. #12;Continental Drift Fig. 1 "Global Warming

  7. International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions

    E-Print Network [OSTI]

    Aloul, Fadi

    to be able to communicate with smart meters via a Home Area Network (HAN) facilitating efficient powerInternational Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid

  8. Risk Analysis of Phytophthora ramorum, a Newly Recognised Pathogen Threat to Europe

    E-Print Network [OSTI]

    Risk Analysis of Phytophthora ramorum, a Newly Recognised Pathogen Threat to Europe and the Cause; 23rd January 2009) Deliverable Report D28 Report on the risk of entry, establishment, spread OF TABLES LIST OF FIGURES LIST OF PARTICIPANTS AND CONTRIBUTORS 3 5 6 SUMMARY: PEST RISK ANALYSIS

  9. Cosmic bombardment V: Threat object-dispersing approaches to active planetary defense

    SciTech Connect (OSTI)

    Teller, E.; Wood, L. [Stanford Univ., CA (United States). Hoover Institution on War, Revolution and Peace]|[Lawrence Livermore National Lab., CA (United States); Ishikawa, M. [Stanford Univ., CA (United States). Dept. of Aeronautics and Astronautics]|[Lawrence Livermore National Lab., CA (United States); Hyde, R. [Lawrence Livermore National Lab., CA (United States)

    1995-05-24T23:59:59.000Z

    Earth-impacting comets and asteroids with diameters {approx}0.03 - 10 km pose the greatest threats to the terrestrial biosphere in terms of impact frequency-weighted impact consequences, and thus are of most concern to designers of active planetary defenses. Specific gravitational binding energies of such objects range from 10{sup -7} to 10{sup -2} J/gm, and are small compared with the specific energies of 1x10{sup 3} to 3x10{sup 3} J/gm required to vaporize objects of typical composition or the specific energies required to pulverize them, which are 10{sup -1} to 10 J/gm. All of these are small compared to the specific kinetic energy of these objects in the Earth- centered frame, which is 2x10{sup 5} to 2x10{sup 6} J/gm. The prospect naturally arises of negating all such threats by deflecting, pulverizing or vaporizing the objects. Pulverization-with-dispersal is an attractive option of reasonable defensive robustness. Examples of such equipments - which employ no explosives of any type - are given. Vaporization is the maximally robust defensive option, and may be invoked to negate threat objects not observed until little time is left until Earth-strike, and pulverization-with-dispersal has proven inadequate. Physically larger threats may be vaporized with nuclear explosives. No contemporary technical means of any kind appear capable of directly dispersing the -100 km diameter scale Charon- class cometary objects recently observed in the outer solar system, although such objects may be deflected to defensively useful extents. Means of implementing defenses of each of these types are proposed for specificity, and areas for optimization noted. Biospheric impacts of threat object debris are briefly considered, for bounding purposes. Experiments are suggested on cometary and asteroidal objects.

  10. Selective catalyst reduction light-off strategy

    DOE Patents [OSTI]

    Gonze, Eugene V [Pinckney, MI

    2011-10-18T23:59:59.000Z

    An emissions control system includes a temperature determination module and an emissions control module. The temperature determination module determines a first temperature of a heater element of a diesel particulate filter (DPF) assembly in an exhaust system and determines a second temperature of a catalyst of the DPF assembly. The emissions control module selectively activates the heater element, selectively initiates a predefined combustion process in an engine based upon the first temperature, and selectively starts a reductant injection process based upon the second temperature.

  11. Approximate Dynamic Programming for Networks: Fluid Models and Constraint Reduction

    E-Print Network [OSTI]

    Veatch, Michael H.

    of approximating functions for the differential cost. The first contribution of this paper is identifying new or piece-wise quadratic. Fluid cost has been used to initialize the value iteration algorithm [5Approximate Dynamic Programming for Networks: Fluid Models and Constraint Reduction Michael H

  12. Data Management & Characterization: Pipeline Approaches to Calibration/Reduction

    E-Print Network [OSTI]

    Ellingson, Steven W.

    /23/2001 LWA Data Management 1 #12;The LWA & the VLSS · VLSS 74 MHz all sky survey will deliver initialData Management & Characterization: Pipeline Approaches to Calibration/Reduction Namir Kassim NRL 5 ­ emerging ionospheric weather diagnostics 5/23/2001 LWA Data Management 2 #12;VLSS: Good science, Good

  13. Vehicle Technologies Office: National Idling Reduction Network...

    Office of Environmental Management (EM)

    Idling Reduction Network News Archives Vehicle Technologies Office: National Idling Reduction Network News Archives The National Idling Reduction Network brings together trucking...

  14. Aluminum reduction cell electrode

    DOE Patents [OSTI]

    Payne, J.R.

    1983-09-20T23:59:59.000Z

    The invention is directed to an anode-cathode structure for an electrolytic cell for the reduction of alumina wherein the structure is comprised of a carbon anode assembly which straddles a wedge-shaped refractory hard metal cathode assembly having steeply sloped cathodic surfaces, each cathodic surface being paired in essentially parallel planar relationship with an anode surface. The anode-cathode structure not only takes into account the structural weakness of refractory hard metal materials but also permits the changing of the RHM assembly during operation of the cell. Further, the anode-cathode structure enhances the removal of anode gas from the interpolar gap between the anode and cathode surfaces. 10 figs.

  15. Hanford tanks initiative plan

    SciTech Connect (OSTI)

    McKinney, K.E.

    1997-07-01T23:59:59.000Z

    Abstract: The Hanford Tanks Initiative (HTI) is a five-year project resulting from the technical and financial partnership of the U.S. Department of Energy`s Office of Waste Management (EM-30) and Office of Science and Technology Development (EM-50). The HTI project accelerates activities to gain key technical, cost performance, and regulatory information on two high-level waste tanks. The HTI will provide a basis for design and regulatory decisions affecting the remainder of the Tank Waste Remediation System`s tank waste retrieval Program.

  16. UNLV Nuclear Hydrogen Initiative

    SciTech Connect (OSTI)

    Hechanova, Anthony E.; Johnson, Allen; O'Toole, Brendan; Trabia, Mohamed; Peterson, Per

    2012-10-25T23:59:59.000Z

    Evaluation of the Crack growth rate (CGR) of Alloy 617 and Alloy 276 under constant K at ambient temperature has been completed. Creep deformation of Alloy 230 at different temperature range and load level has been completed and heat to heat variation has been noticed. Creep deformation study of Alloy 276 has been completed under an applied initial stress level of 10% of yield stress at 950şC. The grain size evaluation of the tested creep specimens of Alloy 276 has been completed.

  17. World Consensus Initiative 2004

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengtheningWildfires may contribute more toConsensus Initiative 2004 Texas

  18. Technical Report No. 249, Department of Computer Science, ETH Zurich, July 1996 1 Faster Algorithms for Integer Lattice Basis Reduction

    E-Print Network [OSTI]

    Storjohann, Arne

    a given integer lattice basis b1 ; b2 ; : : : ; bn 2 ZZ n into a reduced basis. The cost of L 3 ­reduction product. The L 3 ­reduction algorithm presented in [12] guarantees to return a basis with initial vector for Integer Lattice Basis Reduction Arne Storjohann Eidgen¨ossische Technische Hochschule CH­8092 Z

  19. Dose Reduction Techniques

    SciTech Connect (OSTI)

    WAGGONER, L.O.

    2000-05-16T23:59:59.000Z

    As radiation safety specialists, one of the things we are required to do is evaluate tools, equipment, materials and work practices and decide whether the use of these products or work practices will reduce radiation dose or risk to the environment. There is a tendency for many workers that work with radioactive material to accomplish radiological work the same way they have always done it rather than look for new technology or change their work practices. New technology is being developed all the time that can make radiological work easier and result in less radiation dose to the worker or reduce the possibility that contamination will be spread to the environment. As we discuss the various tools and techniques that reduce radiation dose, keep in mind that the radiological controls should be reasonable. We can not always get the dose to zero, so we must try to accomplish the work efficiently and cost-effectively. There are times we may have to accept there is only so much you can do. The goal is to do the smart things that protect the worker but do not hinder him while the task is being accomplished. In addition, we should not demand that large amounts of money be spent for equipment that has marginal value in order to save a few millirem. We have broken the handout into sections that should simplify the presentation. Time, distance, shielding, and source reduction are methods used to reduce dose and are covered in Part I on work execution. We then look at operational considerations, radiological design parameters, and discuss the characteristics of personnel who deal with ALARA. This handout should give you an overview of what it takes to have an effective dose reduction program.

  20. Precision flyer initiator

    DOE Patents [OSTI]

    Frank, A.M.; Lee, R.S.

    1998-05-26T23:59:59.000Z

    A precision flyer initiator forms a substantially spherical detonation wave in a high explosive (HE) pellet. An explosive driver, such as a detonating cord, a wire bridge circuit or a small explosive, is detonated. A flyer material is sandwiched between the explosive driver and an end of a barrel that contains an inner channel. A projectile or ``flyer`` is sheared from the flyer material by the force of the explosive driver and projected through the inner channel. The flyer than strikes the HE pellet, which is supported above a second end of the barrel by a spacer ring. A gap or shock decoupling material delays the shock wave in the barrel from predetonating the HE pellet before the flyer. A spherical detonation wave is formed in the HE pellet. Thus, a shock wave traveling through the barrel fails to reach the HE pellet before the flyer strikes the HE pellet. The precision flyer initiator can be used in mining devices, well-drilling devices and anti-tank devices. 10 figs.

  1. Precision flyer initiator

    DOE Patents [OSTI]

    Frank, Alan M. (Livermore, CA); Lee, Ronald S. (Livermore, CA)

    1998-01-01T23:59:59.000Z

    A precision flyer initiator forms a substantially spherical detonation wave in a high explosive (HE) pellet. An explosive driver, such as a detonating cord, a wire bridge circuit or a small explosive, is detonated. A flyer material is sandwiched between the explosive driver and an end of a barrel that contains an inner channel. A projectile or "flyer" is sheared from the flyer material by the force of the explosive driver and projected through the inner channel. The flyer than strikes the HE pellet, which is supported above a second end of the barrel by a spacer ring. A gap or shock decoupling material delays the shock wave in the barrel from predetonating the HE pellet before the flyer. A spherical detonation wave is formed in the HE pellet. Thus, a shock wave traveling through the barrel fails to reach the HE pellet before the flyer strikes the HE pellet. The precision flyer initiator can be used in mining devices, well-drilling devices and anti-tank devices.

  2. Exposure Levels for Chemical Threat Compounds; Information to Facilitate Chemical Incident Response

    SciTech Connect (OSTI)

    Hauschild, Veronique [U.S. Army Public Health Command] [U.S. Army Public Health Command; Watson, Annetta Paule [ORNL] [ORNL

    2013-01-01T23:59:59.000Z

    Exposure Standards, Limits and Guidelines for Chemical Threat Compunds ABSTRACT Exposure criteria for chemical warfare (CW) agents and certain toxic industrial chemicals (TICs) used as CW agents (such as chlorine fill in an improvised explosive device) have been developed for protection of the civilian general public, civilian employees in chemical agent processing facilities and deployed military populations. In addition, compound-specific concentrations have been developed to serve as how clean is clean enough clearance criteria guiding facility recovery following chemical terrorist or other hazardous release events. Such criteria are also useful to verify compound absence, identify containment boundaries and expedite facility recovery following chemical threat release. There is no single right value or concentration appropriate for all chemical hazard control applications. It is acknowledged that locating and comparing the many sources of CW agent and TIC exposure criteria has not been previously well-defined. This paper summarizes many of these estimates and assembles critical documentation regarding their derivation and use.

  3. Backscatter from the Data Plane --- Threats to Stability and Security in Information-Centric Networking

    E-Print Network [OSTI]

    Vahlenkamp, Matthias Wählisch Thomas C Schmidt Markus

    2012-01-01T23:59:59.000Z

    Information-centric networking approaches attract much attention in the ongoing search for a future communication paradigm of the Internet. Replacing the host-to-host connectivity by a data-oriented publish/subscribe service eases content distribution and authentication by concept, while eliminating all threats from unwanted traffic. However, current proposals to content routing heavily rely on data-driven protocol events and thereby introduce a strong coupling of the control to the data plane in the underlying routing infrastructure. In this paper, we analyze in theory and practical experiments threats to the stability and performance of the content distribution system. We discuss new attack vectors present in its current state of development, as well as possibilities and limitations to mitigate them.

  4. Review of July 2013 Nuclear Security Insider Threat Exercise November 2013

    SciTech Connect (OSTI)

    Pederson, Ann C. [ORNL] [ORNL; Snow, Catherine L. [ORNL] [ORNL; Townsend, Jeremy [ORNL] [ORNL; Shannon, Michael [ORNL] [ORNL

    2013-11-01T23:59:59.000Z

    This document is a review of the Nuclear Security Insider Threat Exercise which was hosted at ORNL in July 2013. Nuclear security culture and the insider threat are best learned through experience. Culture is inherently difficult to teach, and as such is best learned through modeled behaviors and learning exercise. This TTX, NSITE, is a tool that strives to aid students in learning what an effective (and ineffective) nuclear security culture might look like by simulating dynamic events that strengthen or weaken the nuclear security regime. The goals of NSITE are to stimulate complex thought and discussion and assist decision makers and management in determining the most effective policies and procedures for their country or facility.

  5. Self-Reduction Rate of a Microtubule

    E-Print Network [OSTI]

    Takashi Hiramatsu; Tetsuo Matsui; Kazuhiko Sakakibara

    2007-11-01T23:59:59.000Z

    We formulate and study a quantum field theory of a microtubule, a basic element of living cells. Following the quantum theory of consciousness by Hameroff and Penrose, we let the system to reduce to one of the classical states without measurement if certain conditions are satisfied(self-reductions), and calculate the self-reduction time $\\tau_N$ (the mean interval between two successive self-reductions) of a cluster consisting of more than $N$ neighboring tubulins (basic units composing a microtubule). $\\tau_N$ is interpreted there as an instance of the stream of consciousness. We analyze the dependence of $\\tau_N$ upon $N$ and the initial conditions, etc. For relatively large electron hopping amplitude, $\\tau_N$ obeys a power law $\\tau_N \\sim N^b$, which can be explained by the percolation theory. For sufficiently small values of the electron hopping amplitude, $\\tau_N$ obeys an exponential law, $\\tau_N \\sim \\exp(c' N)$. By using this law, we estimate the condition for $\\tau_N $ to take realistic values $\\tau_N$ \\raisebox{-0.5ex}{$\\stackrel{>}{\\sim}$} $10^{-1}$ sec as $N$ \\raisebox{-0.5ex} {$\\stackrel{>}{\\sim}$} 1000.

  6. Chapter citation (as of Dec., 2012): Barber, S. J., & Mather, M. (in press). Stereotype threat in older adults: When and why

    E-Print Network [OSTI]

    Mather, Mara

    Chapter citation (as of Dec., 2012): Barber, S. J., & Mather, M. (in press). Stereotype threat threat in older adults: When and why does it occur and who is most affected? Author Names: Sarah J: barbersa@usc.edu Abstract: Stereotype threat occurs when people fear that poor performance on their part

  7. The threat of terrorism in our homeland became horrifically real on September 11, 2001. The shock was felt at home and around the world. The subsequent response

    E-Print Network [OSTI]

    #12;Preface The threat of terrorism in our homeland became horrifically real on September 11, 2001. The shock was felt at home and around the world. The subsequent response to this threat has taken many forms, and respond to threats. The US Department of Homeland Security (DHS) chartered the National Visu- alization

  8. The City University of New York Medical Withdrawal and Re-entry Policy and Procedures Governing Student Behavior that Presents a Direct Threat of

    E-Print Network [OSTI]

    Qiu, Weigang

    Student Behavior that Presents a Direct Threat of Harm to Self or Others or Substantially Disrupts of a medical condition, engage in behavior that presents a direct threat of harm to themselves or to others 911 or taking other immediate action in case of imminent threat to life or limb. In addition to taking

  9. Threat Assessment Design for Driver Assistance System at Intersections Georges S. Aoude, Brandon D. Luders, Kenneth K. H. Lee, Daniel S. Levine, and Jonathan P. How

    E-Print Network [OSTI]

    How, Jonathan P.

    Threat Assessment Design for Driver Assistance System at Intersections Georges S. Aoude, Brandon D, potentially errant, drivers. Our approach relies on a novel threat assessment module, which combines an intention predictor based on support vector machines with an efficient threat assessor using rapidly

  10. Ribonucleotide reduction and redox regulation in Archaea : surprising twists on a common theme

    E-Print Network [OSTI]

    Hernandez, Hector Hugo

    2008-01-01T23:59:59.000Z

    To study the nucleotide reduction system in Archaea, we have expressed the Archaeoglobus fulgidus gene encoding the adenosylcobalamin (AdoCbl) dependent ribonucleotide reductase (afuRNR) protein. Initial characterization ...

  11. Before the deluge? Assessing the threat of nuclear leakage from the post-Soviet states

    SciTech Connect (OSTI)

    Potter, W.C.

    1995-10-01T23:59:59.000Z

    Most nuclear security problems are linked to the Russian Federation and the region`s troubled economic, political and social conditions. They are unlikely to be resolved without substantial progress in stabilizing the economy and renewing public trust in government institutions. The author makes a risk assessment of the threat and cites specific cases of theft and diversion of fissile materials and the need for action to control this activity. 17 refs.

  12. Worldwide threat assessment brief to the Senate Select Committee on intelligence statement for the record

    SciTech Connect (OSTI)

    Deutch, J.

    1996-02-22T23:59:59.000Z

    This report outlines the threats to the United States and its interests now and into the next century. We still call this the post-Cold War world. Among the opportunities and challenges of our time, there is not yet one dominant enough to define the era on its own terms and give it a name. Looking beyond our borders, we see much that is uncertain: The stability of many regions of the world is threatened by ethnic turmoil and humanitarian crises. Two great powers, Russia and China, are in the process of metamorphosis and their final shape is still very much in question.-Free nations of the world are threatened by rogue nations - - Iran, Iraq, North Korea, and Libya, that have built up significant military forces and seek to acquire weapons of mass destruction. The world community is under assault from those who deal in proliferation of weapons of mass destruction, terrorism, drugs and crime. And the interdependence of the world economy has made us more vulnerable to economic shocks beyond our borders. The strategic threat to our continent is reduced, but the potential for surprise is greater than it was in the days when we could focus our energies on the well-recognized instruments of Soviet power. No one challenge today is yet as formidable as the threat from the former Soviet Union. If nurtured by neglect on our part, these new challenges could expand to threaten the growth of democracy and free markets. All the tools of national security -- diplomacy, the military, and intelligence -- must remain sharp. It is the task of the Intelligence Community to provide policymakers and military commanders with early warning of emerging problems -- warning that can allow us to avoid crisis or military conflict. We must continuously monitor and assess the threats so that our leaders can manage these wisely.

  13. Facilities Initiatives | Department of Energy

    Energy Savers [EERE]

    page available through this link. Note: Emission reduction estimates are measured in MTCO2e, Metric Tonnes (tons) of Carbon Dioxide Equivalent. This is the standard measurement...

  14. Instrumented Pipeline Initiative

    SciTech Connect (OSTI)

    Thomas Piro; Michael Ream

    2010-07-31T23:59:59.000Z

    This report summarizes technical progress achieved during the cooperative agreement between Concurrent Technologies Corporation (CTC) and U.S. Department of Energy to address the need for a for low-cost monitoring and inspection sensor system as identified in the Department of Energy (DOE) National Gas Infrastructure Research & Development (R&D) Delivery Reliability Program Roadmap.. The Instrumented Pipeline Initiative (IPI) achieved the objective by researching technologies for the monitoring of pipeline delivery integrity, through a ubiquitous network of sensors and controllers to detect and diagnose incipient defects, leaks, and failures. This report is organized by tasks as detailed in the Statement of Project Objectives (SOPO). The sections all state the objective and approach before detailing results of work.

  15. Large Wind Property Tax Reduction

    Broader source: Energy.gov [DOE]

    In 2001, North Dakota established property tax reductions for commercial wind turbines constructed before 2011. Originally, the law reduced the taxable value of centrally-assessed* wind turbines...

  16. National Security Science and Technology Initiative: Air Cargo Screening

    SciTech Connect (OSTI)

    Bingham, Philip R [ORNL; White, Tim [Pacific Northwest National Laboratory (PNNL); Cespedes, Ernesto [Idaho National Laboratory (INL); Bowerman, Biays [Brookhaven National Laboratory (BNL); Bush, John [Battelle

    2010-11-01T23:59:59.000Z

    The non-intrusive inspection (NII) of consolidated air cargo carried on commercial passenger aircraft continues to be a technically challenging, high-priority requirement of the Department of Homeland Security's Science and Technology Directorate (DHS S&T), the Transportation Security Agency and the Federal Aviation Administration. The goal of deploying a screening system that can reliably and cost-effectively detect explosive threats in consolidated cargo without adversely affecting the flow of commerce will require significant technical advances that will take years to develop. To address this critical National Security need, the Battelle Memorial Institute (Battelle), under a Cooperative Research and Development Agreement (CRADA) with four of its associated US Department of Energy (DOE) National Laboratories (Oak Ridge, Pacific Northwest, Idaho, and Brookhaven), conducted a research and development initiative focused on identifying, evaluating, and integrating technologies for screening consolidated air cargo for the presence of explosive threats. Battelle invested $8.5M of internal research and development funds during fiscal years 2007 through 2009. The primary results of this effort are described in this document and can be summarized as follows: (1) Completed a gap analysis that identified threat signatures and observables, candidate technologies for detection, their current state of development, and provided recommendations for improvements to meet air cargo screening requirements. (2) Defined a Commodity/Threat/Detection matrix that focuses modeling and experimental efforts, identifies technology gaps and game-changing opportunities, and provides a means of summarizing current and emerging capabilities. (3) Defined key properties (e.g., elemental composition, average density, effective atomic weight) for basic commodity and explosive benchmarks, developed virtual models of the physical distributions (pallets) of three commodity types and three explosive benchmarks combinations, and conducted modeling and simulation studies to begin populating the matrix of commodities, threats, and detection technologies. (4) Designed and fabricated basic (homogeneous) commodity test pallets and fabricated inert stimulants to support experiments and to validate modeling/simulation results. (5) Developed/expanded the team's capabilities to conduct full-scale imaging (neutron and x-ray) experiments of air cargo commodities and explosive benchmarks. (6) Conducted experiments to improve the collection of trace particles of explosives from a variety of surfaces representative of air cargo materials by means of mechanical (air/vibration/pressure), thermal, and electrostatic methods. Air cargo screening is a difficult challenge that will require significant investment in both research and development to find a suitable solution to ensure the safety of passengers without significantly hindering the flow of commodities. The initiative funded by Battelle has positioned this group to make major contributions in meeting the air cargo challenge by developing collaborations, developing laboratory test systems, improving knowledge of the challenges (both technical and business) for air cargo screening, and increasing the understanding of the capabilities for current inspection methods (x-ray radiography, x-ray backscatter, etc.) and potential future inspection methods (neutron radiography, fusion of detector modalities, advanced trace detection, etc.). Lastly, air cargo screening is still an issue that will benefit from collaboration between Department of Energy Laboratories and Battelle. On January 7, 2010, DHS Secretary Napolitano joined White House Press Secretary Robert Gibbs and Assistant to the President for Counterterrorism and Homeland Security John Brennan to announce several recommendations DHS has made to the President for improving the technology and procedures used to protect air travel from acts of terrorism. (This announcement followed the 25 Dec'09 Delta/Northwest Airlines Flight 253 terror attack.) Secretary Napolitano out

  17. Hydrogen Compression, Storage, and Dispensing Cost Reduction...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Compression, Storage, and Dispensing Cost Reduction Workshop Addendum Hydrogen Compression, Storage, and Dispensing Cost Reduction Workshop Addendum Document states additional...

  18. Contiguous Platinum Monolayer Oxygen Reduction Electrocatalysts...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Contiguous Platinum Monolayer Oxygen Reduction Electrocatalysts on High-Stability-Low-Cost Supports Contiguous Platinum Monolayer Oxygen Reduction Electrocatalysts on...

  19. Waste Characterization, Reduction, and Repackaging Facility ...

    Office of Environmental Management (EM)

    Waste Characterization, Reduction, and Repackaging Facility (WCRRF) Waste Characterization Glovebox Operations Waste Characterization, Reduction, and Repackaging Facility (WCRRF)...

  20. Standardization and Application of Spectrophotometric Method for Reductive Capacity Measurement of Nanomaterials 

    E-Print Network [OSTI]

    Hwang, Wonjoong

    2011-10-21T23:59:59.000Z

    method had been lacking until this work. The reductive capacity of nanoparticles was defined as the mass of iron reduced from Fe3 to Fe2 by unit mass of nanoparticles, in an aqueous solution that initially contained ferric ions. To measure the reductive...

  1. Standardization and Application of Spectrophotometric Method for Reductive Capacity Measurement of Nanomaterials

    E-Print Network [OSTI]

    Hwang, Wonjoong

    2011-10-21T23:59:59.000Z

    method had been lacking until this work. The reductive capacity of nanoparticles was defined as the mass of iron reduced from Fe3 to Fe2 by unit mass of nanoparticles, in an aqueous solution that initially contained ferric ions. To measure the reductive...

  2. Will Russian Scientists Go Rogue? A Survey on the Threat and the Impact of Western Assistance

    SciTech Connect (OSTI)

    Ball, D Y; Gerber, T P

    2004-12-27T23:59:59.000Z

    The collapse of the Soviet Union sparked fears throughout the world that rogue nations and terrorist organizations would gain access to weapons of mass destruction (WMD). One specific concern has been 'WMD brain drain.' Russians with knowledge about nuclear, chemical, and biological weapons could now depart to any country of their choice, including rogue nations seeking to produce WMD. Meanwhile, Russian science fell into a protracted crisis, with plummeting salaries, little funding for research, and few new recruits to science. These developments increased both the incentives and the opportunities for scientists to sell their knowledge to governments and terrorist organizations with hostile intentions toward the United States. Recognizing the threat of WMD brain drain from Russia, the United States, and other governments implemented a host of programs designed to reduce the risk. Despite, or perhaps partly because of, massive assistance from the West to prevent scientists with WMD knowledge from emigrating, the threat of Russian WMD brain drain has recently faded from view. Yet we have seen no evidence that these programs are effective and little systematic assessment of the current threat of WMD migration. Our data from an unprecedented survey of 602 Russian physicists, biologists, and chemists suggest that the threat of WMD brain drain from Russia should still be at the forefront of our attention. Roughly 20 percent of Russian physicists, biologists, and chemists say they would consider working in rogue nations such as North Korea, Iran, Syria, or Iraq (still considered a rogue state at the time of the survey). At the same time, the data reveal that U.S. and Western nonproliferation assistance programs work. They significantly reduce the likelihood that Russian scientists would consider working in these countries. Moreover, Russian grants do not reduce scientists' propensity to 'go rogue'. These survey findings have clear policy implications: the U.S. and its allies must continue to adequately fund nonproliferation assistance programs rather than hastily declare victory. The U.S. should remain engaged with former Soviet WMD scientists until they are willing and able to find support for their research from competitive, civilian-oriented, privately funded projects. Otherwise, we run a great risk that WMD expertise will migrate from the former Soviet Union to countries or organizations that harbor hostile intentions toward the U.S. Assistance programs work to reduce the threat of WMD brain drain, but their task is not complete. Now is not the time to pull back.

  3. MONTANA PALLADIUM RESEARCH INITIATIVE

    SciTech Connect (OSTI)

    Peters, John

    2012-05-09T23:59:59.000Z

    Project Objective: The overarching objective of the Montana Palladium Research Initiative is to perform scientific research on the properties and uses of palladium in the context of the U.S. Department of Energy'Ă?Â?Ă?Â?Ă?Â?Ă?Â?Ă?Â?Ă?Â?Ă?Â?Ă?Â?s Hydrogen, Fuel Cells and Infrastructure Technologies Program. The purpose of the research will be to explore possible palladium as an alternative to platinum in hydrogen-economy applications. To achieve this objective, the Initiatives activities will focus on several cutting-edge research approaches across a range of disciplines, including metallurgy, biomimetics, instrumentation development, and systems analysis. Background: Platinum-group elements (PGEs) play significant roles in processing hydrogen, an element that shows high potential to address this need in the U.S. and the world for inexpensive, reliable, clean energy. Platinum, however, is a very expensive component of current and planned systems, so less-expensive alternatives that have similar physical properties are being sought. To this end, several tasks have been defined under the rubric of the Montana Palladium Research Iniative. This broad swath of activities will allow progress on several fronts. The membrane-related activities of Task 1 employs state-of-the-art and leading-edge technologies to develop new, ceramic-substrate metallic membranes for the production of high-purity hydrogen, and develop techniques for the production of thin, defect-free platinum group element catalytic membranes for energy production and pollution control. The biomimetic work in Task 2 explores the use of substrate-attached hydrogen-producing enzymes and the encapsulation of palladium in virion-based protein coats to determine their utility for distributed hydrogen production. Task 3 work involves developing laser-induced breakdown spectroscopy (LIBS) as a real-time, in situ diagnostic technique to characterize PGEs nanoparticles for process monitoring and control. The systems engineering work in task 4 will determine how fuel cells Ă?Â?Ă?Â?Ă?Â?Ă?Â?Ă?Â?Ă?Â?Ă?Â?Ă?Â?taken as systems behave over periods of time that should show how their reformers and other subsystems deteriorate with time.

  4. Ultrasonic, Non-Invasive Classification/Discrimination of Liquid Explosives (LEs) and Threat Liquids from Non-Threat Liquids in Sealed Containers

    SciTech Connect (OSTI)

    Diaz, Aaron A.; Cinson, Anthony D.; Tucker, Brian J.; Samuel, Todd J.; Morales, Romarie

    2009-07-20T23:59:59.000Z

    Government agencies and homeland security organizations are searching for more effective approaches for dealing with the increasing demand for inspections involving potential threat liquids and hazardous chemicals, including liquid explosives (LEs). The quantity and variability of hand-held and cargo-sized containers being shipped worldwide drives the need for rapid and effective ways for conducting non-intrusive inspections of liquid-filled containers of a diverse range of types, shapes and sizes. Such inspections need to quickly classify/discriminate between liquids within containers and also ascertain the presence of unexpected objects within a container. The science base, methodology and prototype device for classification/discrimination between classes of liquids has been developed. The Pacific Northwest National Laboratory (PNNL) has developed a methodology and prototype device for classification/discrimination of a wide variety of liquids (including threat liquids and their precursors), providing noninvasive liquid classification/discrimination capabilities using a nondestructive ultrasonic measurement approach for inspecting sealed containers. The Container Screening Device (CSD) employs frequency-modulated (FM) chirp excitation and pulse-compression signal processing techniques to measure ultrasonic velocity and a relative attenuation value for liquids within a container, and is capable of determining other acoustic properties from through-transmission, contact measurements over a wide frequency range. Recent algorithm developments are beginning to address the issues of container wall variations and thickness. A description of the basic science, measurement approach and sources of variability in the measurement will be presented and laboratory measurements acquired from a suite of commercial products and precursor liquids used in the manufacturing of Homemade Explosives (HMEs) will be given.

  5. Woodland Park Healthy Forest Initiative

    E-Print Network [OSTI]

    March 2010 Woodland Park Healthy Forest Initiative Collaboration Case Study #12;Woodland Park Healthy Forest Initiative 1 1 Colorado Forest Restoration Institute Collaboration Case Study: Woodland at Colorado State University, to conduct case studies of two collaborative forest health efforts

  6. Digital Library Initiative Rice University

    E-Print Network [OSTI]

    Digital Library Initiative Rice University Project Management General guidelines for digital projects Contact: dli (at) rice (dot) edu October, 2007 #12;Digital Library Initiative, Rice University................................................................................................8 #12;Guidelines for managing digital projects Page 2 STATEMENT OF PURPOSE We recognized

  7. Environmental Sustainability Paper Usage / Reduction

    E-Print Network [OSTI]

    ;carbon footprint and develop carbon reduction projects around IT and staff/student behaviour change is supported by the Environmental Sustainability Manager and is seen as a key link to the University's Carbon Management Programme (e.g. to produce a forecast of carbon reductions as required by the Carbon Trust

  8. Comprehensive Poverty Reduction Strategies in

    E-Print Network [OSTI]

    Peak, Derek

    Comprehensive Poverty Reduction Strategies in Canada: Policy or Window Dressing? Charles Plante, Upstream: Institute for a Healthy Society #12;Overview What is poverty? Current state of poverty in Saskatchewan What is a Comprehensive Poverty Reduction Strategy (CPRS)? Are CPRS effective at reducing

  9. Oklahoma GSHP Initiative Jim Bullington

    E-Print Network [OSTI]

    10/1/2012 1 Oklahoma GSHP Initiative Jim Bullington Trade & Industrial Education Oklahoma the Oklahoma CareerTech GSHP Initiative Model · Provide my contact information for you to share with your and Technical Education · Encourage you to contact them to get an initiative rolling Who is Oklahoma Career

  10. Initial Cladding Condition

    SciTech Connect (OSTI)

    E. Siegmann

    2000-08-22T23:59:59.000Z

    The purpose of this analysis is to describe the condition of commercial Zircaloy clad fuel as it is received at the Yucca Mountain Project (YMP) site. Most commercial nuclear fuel is encased in Zircaloy cladding. This analysis is developed to describe cladding degradation from the expected failure modes. This includes reactor operation impacts including incipient failures, potential degradation after reactor operation during spent fuel storage in pool and dry storage and impacts due to transportation. Degradation modes include cladding creep, and delayed hydride cracking during dry storage and transportation. Mechanical stresses from fuel handling and transportation vibrations are also included. This Analysis and Model Report (AMR) does not address any potential damage to assemblies that might occur at the YMP surface facilities. Ranges and uncertainties have been defined. This analysis will be the initial boundary condition for the analysis of cladding degradation inside the repository. In accordance with AP-2.13Q, ''Technical Product Development Planning'', a work plan (CRWMS M&O 2000c) was developed, issued, and utilized in the preparation of this document. There are constraints, caveats and limitations to this analysis. This cladding degradation analysis is based on commercial Pressurized Water Reactor (PWR) fuel with Zircaloy cladding but is applicable to Boiling Water Reactor (BWR) fuel. Reactor operating experience for both PWRs and BWRs is used to establish fuel reliability from reactor operation. It is limited to fuel exposed to normal operation and anticipated operational occurrences (i.e. events which are anticipated to occur within a reactor lifetime), and not to fuel that has been exposed to severe accidents. Fuel burnup projections have been limited to the current commercial reactor licensing environment with restrictions on fuel enrichment, oxide coating thickness and rod plenum pressures. The information provided in this analysis will be used in evaluating the post-closure performance of the Monitored Geologic Repository (MGR) in relation to waste form degradation.

  11. REDUCTIONS WITHOUT REGRET: HISTORICAL PERSPECTIVES

    SciTech Connect (OSTI)

    Swegle, J.; Tincher, D.

    2013-09-09T23:59:59.000Z

    This is the first of three papers (in addition to an introductory summary) aimed at providing a framework for evaluating future reductions or modifications of the U.S. nuclear force, first by considering previous instances in which nuclear-force capabilities were eliminated; second by looking forward into at least the foreseeable future at the features of global and regional deterrence (recognizing that new weapon systems currently projected will have expected lifetimes stretching beyond our ability to predict the future); and third by providing examples of past or possible undesirable outcomes in the shaping of the future nuclear force, as well as some closing thoughts for the future. This paper examines the circumstances and consequences of the elimination of ? The INF-range Pershing II ballistic missile and Gryphon Ground-Launched Cruise Missile (GLCM), deployed by NATO under a dual-track strategy to counter Soviet intermediate-range missiles while pursuing negotiations to limit or eliminate all of these missiles. ? The Short-Range Attack Missile (SRAM), which was actually a family of missiles including SRAM A, SRAM B (never deployed), and SRAM II and SRAM T, these last two cancelled during an over-budget/behind-schedule development phase as part of the Presidential Nuclear Initiatives of 1991 and 1992. ? The nuclear-armed version of the Tomahawk Land-Attack Cruise Missile (TLAM/N), first limited to shore-based storage by the PNIs, and finally eliminated in deliberations surrounding the 2010 Nuclear Posture Review Report. ? The Missile-X (MX), or Peacekeeper, a heavy MIRVed ICBM, deployed in fixed silos, rather than in an originally proposed mobile mode. Peacekeeper was likely intended as a bargaining chip to facilitate elimination of Russian heavy missiles. The plan failed when START II did not enter into force, and the missiles were eliminated at the end of their intended service life. ? The Small ICBM (SICBM), or Midgetman, a road-mobile, single-warhead missile for which per-unit costs were climbing when it was eliminated under the PNIs. Although there were liabilities associated with each of these systems, there were also unique capabilities; this paper lays out the pros and cons for each. Further, we articulate the capabilities that were eliminated with these systems.

  12. Student attitudes toward the threat of nuclear war: Friends as influential reference persons

    SciTech Connect (OSTI)

    Marasch, M.J.

    1992-01-01T23:59:59.000Z

    A renewed interest in research into the psychology of the threat of nuclear war occurred in the past decade as national attention focused increasingly on the arms race between the US and the USSR. Some of this research began the task of exploring the social influences upon attitudes and responses to the nuclear threat. Research on friends as potential influences upon nuclear attitudes was minimal. The present study investigated the role of college friends as potential reference persons in the formation of nuclear attitudes. A battery of questionnaires addressing various nuclear war and non-nuclear war attitudes was completed by 200 student-friend dyads from introductory psychology and sociology courses at the University of North Dakota. Three hypotheses were presented in this study. One hypothesis was that students would perceive their friends as having similar attitudes toward the threat of nuclear war. A second hypothesis was that the actual attitudes between pairs of students and friends would be similar. The third hypothesis was that the attitudes would have become more similar over the course of the development of the friendship (as measured retrospectively). The first hypothesis was borne out by the data. The second and third hypotheses were not supported. There are several implications of the findings. One implication is that the nuclear issue may not be as salient to college students as other, more immediate, issues. Another implication is that a relative lack of communication between college students on political issues precludes more effective mutual influence upon the development and change of such attitudes. A false consensus bias appeared to be operative when the students perceived that their attitudes were similar. Further discussion is presented in regard to past and future psychological research upon nuclear war attitudes.

  13. Nevada State Energy Reduction Plan

    Broader source: Energy.gov [DOE]

    As mandated by the Nevada statutes, the Nevada Energy Office prepared a state energy reduction plan which requires state agencies, departments, and other entities in the Executive Branch to reduce...

  14. NOx Reduction through Efficiency Gain 

    E-Print Network [OSTI]

    Benz, R.; Thompson, R.; Staedter, M.

    2007-01-01T23:59:59.000Z

    with a novel control design to deliver a comprehensive boiler controls retrofit that provides reductions in emissions as well as substantial cost savings. Combining mechanical engineering expertise with substantial experience in control engineering...

  15. Economics of Steam Pressure Reduction

    E-Print Network [OSTI]

    Sylva, D. M.

    Economics of Steam Pressure Reduction is a technical paper that addresses the operating and economic advantages associated with the program to lower the steam operating pressure. Evaluation of a testing program will be discussed. The paper...

  16. Column Initialization 1 Initializing Distillation Column Models 1

    E-Print Network [OSTI]

    Dundee, University of

    Column Initialization 1 Initializing Distillation Column Models 1 Roger Fletcher \\Lambda with the optimisation of distillation column models by non­ linear programming are considered. The paper presents of the distillation column model. A certain limiting case of the column model is examined, that of infinite reflux

  17. Innovative Manufacturing Initiative Recognition Day

    Broader source: Energy.gov [DOE]

    The Innovative Manufacturing Initiative (IMI) Recognition Day (held in Washington, DC on June 20, 2012) showcased IMI projects selected by the Energy Department to help American manufacturers...

  18. Evaluation of Conservation Voltage Reduction (CVR) on a National Level

    SciTech Connect (OSTI)

    Schneider, Kevin P.; Fuller, Jason C.; Tuffner, Francis K.; Singh, Ruchi

    2010-09-29T23:59:59.000Z

    Conservation Voltage Reduction (CVR) is a reduction of energy consumption resulting from a reduction of feeder voltage. While there have been numerous CVR systems deployed in North America there has been little substantive analytic analysis of the effect; the majority of the published results are based on empirical field measurements. Since these results are based on empirical measurements it is difficult to extrapolate how this technology will behave on the various types of distribution feeders found throughout the nation. This report has utilized the Taxonomy of Prototypical feeder developed under the Modern Grid Initiative (MGI), now the Modern Grid Strategy (MGS), in order to estimate the benefits of CVR on multiple distribution feeder types. This information will then be used to determine an estimate of the national benefits of a wide scale deployment of CVR.

  19. Catalyst for the reduction of sulfur dioxide to elemental sulfur

    DOE Patents [OSTI]

    Jin, Yun (Peking, CN); Yu, Qiquan (Peking, CN); Chang, Shih-Ger (El Cerrito, CA)

    1996-01-01T23:59:59.000Z

    The inventive catalysts allow for the reduction of sulfur dioxide to elemental sulfur in smokestack scrubber environments. The catalysts have a very high sulfur yield of over 90% and space velocity of 10,000 h.sup.-1. They also have the capacity to convert waste gases generated during the initial conversion into elemental sulfur. The catalysts have inexpensive components, and are inexpensive to produce. The net impact of the invention is to make this technology practically available to industrial applications.

  20. Systems Engineering Advancement Research Initiative

    E-Print Network [OSTI]

    de Weck, Olivier L.

    Systems Engineering Advancement Research Initiative RESEARCH PORTFOLIO Fall 2008 About SEAri http://seari.mit.edu The Systems Engineering Advancement Research Initiative brings together a set of sponsored research projects and a consortium of systems engineering leaders from industry, government, and academia. SEAri is positioned within

  1. Clean Energy Infrastructure Educational Initiative

    SciTech Connect (OSTI)

    Hallinan, Kevin; Menart, James; Gilbert, Robert

    2012-08-31T23:59:59.000Z

    The Clean Energy Infrastructure Educational Initiative represents a collaborative effort by the University of Dayton, Wright State University and Sinclair Community College. This effort above all aimed to establish energy related programs at each of the universities while also providing outreach to the local, state-wide, and national communities. At the University of Dayton, the grant has aimed at: solidfying a newly created Masterâ??s program in Renewable and Clean Energy; helping to establish and staff a regional sustainability organization for SW Ohio. As well, as the prime grantee, the University of Dayton was responsible for insuring curricular sharing between WSU and the University of Dayton. Finally, the grant, through its support of graduate students, and through cooperation with the largest utilities in SW Ohio enabled a region-wide evaluation of over 10,000 commercial building buildings in order to identify the priority buildings in the region for energy reduction. In each, the grant has achieved success. The main focus of Wright State was to continue the development of graduate education in renewable and clean energy. Wright State has done this in a number of ways. First and foremost this was done by continuing the development of the new Renewable and Clean Energy Masterâ??s Degree program at Wright State . Development tasks included: continuing development of courses for the Renewable and Clean Energy Masterâ??s Degree, increasing the student enrollment, and increasing renewable and clean energy research work. The grant has enabled development and/or improvement of 7 courses. Collectively, the University of Dayton and WSU offer perhaps the most comprehensive list of courses in the renewable and clean energy area in the country. Because of this development, enrollment at WSU has increased from 4 students to 23. Secondly, the grant has helped to support student research aimed in the renewable and clean energy program. The grant helped to solidify new research in the renewable and clean energy area. The educational outreach provided as a result of the grant included activities to introduce renewable and clean energy design projects into the Mechanical and Materials Engineering senior design class, the development of a geothermal energy demonstration unit, and the development of renewable energy learning modules for high school students. Finally, this grant supported curriculum development by Sinclair Community College for seven new courses and acquisition of necessary related instrumentation and laboratory equipment. These new courses, EGV 1201 Weatherization Training, EGV 1251 Introduction to Energy Management Principles, EGV 2301 Commercial and Industrial Assessment, EGV 2351 LEED Green Associate Exam Preparation, EGV 2251 Energy Control Strategies, EGV Solar Photovoltaic Design and Installation, and EGV Solar Thermal Systems, enable Sinclair to offer complete Energy Technology Certificate and an Energy Management Degree programs. To date, 151 students have completed or are currently registered in one of the seven courses developed through this grant. With the increasing interest in the Energy Management Degree program, Sinclair has begun the procedure to have the program approved by the Ohio Board of Regents.

  2. Bifunctional Catalysts for the Selective Catalytic Reduction...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    as Reductants Bifunctional Catalysts for the Selective Catalytic Reduction of NO by Hydrocarbons Development of Optimal Catalyst Designs and Operating Strategies for Lean NOx...

  3. Bifunctional Catalysts for the Selective Catalytic Reduction...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Publications Bifunctional Catalysts for the Selective Catalytic Reduction of NO by Hydrocarbons Selectlive Catalytic Reducution of NOx wilth Diesel-Based Fuels as Reductants...

  4. Facile and controllable electrochemical reduction of graphene...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and controllable electrochemical reduction of graphene oxide and its applications. Facile and controllable electrochemical reduction of graphene oxide and its applications....

  5. Characterizing Test Methods and Emissions Reduction Performance...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Test Methods and Emissions Reduction Performance of In-Use Diesel Retrofit Technologies from the National Clean Diesel Campaign Characterizing Test Methods and Emissions Reduction...

  6. Plasma-assisted catalytic reduction system

    DOE Patents [OSTI]

    Vogtlin, G.E.; Merritt, B.T.; Hsiao, M.C.; Wallman, P.H.; Penetrante, B.M.

    1998-01-27T23:59:59.000Z

    Non-thermal plasma gas treatment is combined with selective catalytic reduction to enhance NO{sub x} reduction in oxygen-rich vehicle engine exhausts. 8 figs.

  7. Electrocatalytic Reactivity for Oxygen Reduction of Palladium...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Reactivity for Oxygen Reduction of Palladium-Modified Carbon Nanotubes Synthesized in Supercritical Fluid. Electrocatalytic Reactivity for Oxygen Reduction of Palladium-Modified...

  8. Sequential high temperature reduction, low temperature hydrolysis...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    high temperature reduction, low temperature hydrolysis for the regeneration of sulfated NOx trap catalysts. Sequential high temperature reduction, low temperature hydrolysis for...

  9. Demonstrating Fuel Consumption and Emissions Reductions with...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Fuel Consumption and Emissions Reductions with Next Generation Model-Based Diesel Engine Control Demonstrating Fuel Consumption and Emissions Reductions with Next Generation...

  10. Boston Architectural College Urban Sustainability Initiative

    SciTech Connect (OSTI)

    Byers, Arthur C.

    2013-07-31T23:59:59.000Z

    The Boston Architectural College's Urban Sustainability initiative is a demonstration project as defined by the National Energy Technology Laboratory. BAC's proposed project with the U.S. Department of Energy - NETL, is a large part of that overall initiative. The BAC's Urban Sustainability Initiative is a multi-part project with several important goals and objectives that will have a significant impact on the surrounding neighborhood including: energy conservation, reduction of storm water runoff, generation of power through alternative energy sources, elimination/reduction of BAC carbon footprint, and to create a vehicle for ongoing public outreach and education. Education and outreach opportunities will serve to add to the already comprehensive Sustainability Design courses offered at BAC relative to energy savings, performance and conservation in building design. At the finish of these essential capital projects there will be technical materials created for the education of the design, sustainability, engineering, community development and historic preservation communities, to inform a new generation of environmentally-minded designers and practitioners, the city of Boston and the general public. The purpose of the initiative, through our green renovations program, is to develop our green alley projects and energy saving renovations to the BAC physical plant, to serve as a working model for energy efficient design in enclosed 19th century and 20th century urban sites and as an educational laboratory for teaching ecological and sustainable technologies to students and the public while creating jobs. The scope of our project as it relates to the BAC and the U.S. Department of Energy- NETL combined efforts includes: Task I of the project is Phase II (Green Alley). Task I encompasses various renovation activities that will demonstrate the effectiveness of permeable paving and ground water recharge systems. It will aid in the reduction of storm water runoff into the Charles River Basin in one of its most significantly polluted sections and, will provide a green renovation mechanism for the redirected storm water of a public alley way. This activity is designed to improve the quality of water recharging the ground water and protecting the vulnerable wood pilings under many of the historic masonry buildings in Boston's Back Bay. Sustainable design research and system monitoring opportunities will also be incorporated, providing ongoing tools for public outreach and education through innovative signage and "virtual tour" technology. The monitoring will include a "building performance dash board" that reflects real time operating conditions and improvements in environmental and economic performance to be prominently displayed on the face of our 320 Newbury Street building (approximately 1.5 million people walk by annually). The project site and demonstration area is located at the rear of 951 Boylston Street, Boston, MA 02115 and the parking area adjacent to Public Alley #444 in Boston's historic Back Bay. Task II of the project is Geothermal Solution. This task involves the installation of approximately seven Geothermal wells which will tap into the earth's constant underground temperatures to provide air-conditioning and heating for BAC facilities. The environmentally friendly geothermal system uses no fossil fuel, produces no emissions and runs silently, providing a sustainable model for commercial and residential buildings throughout Boston. Ultimately the combination of this project and other projects will assist in making the BAC "carbon-neutral", and could generate enough additional energy to provide free power to the Engine 33 and Ladder 15 Firehouse located at 941 Boylston Street. The project is located at the rear of 951 Boylston Street, Boston, MA 02115 and the parking area adjacent to Public Alley #444 in Boston's historic Back Bay. Task III of the project is the Sustainability Design Curriculum at the BAC. The BAC is the nation’s largest independent, multi-disciplinary college of spatial design, and a leader in

  11. GE funds initiative to support STEM initiatives in Oklahoma ...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    STEM Empowers OK: Initiative to enrich STEM education in Oklahoma Click to email this to a friend (Opens in new window) Share on Facebook (Opens in new window) Click to share...

  12. Microbial reduction of iron ore

    DOE Patents [OSTI]

    Hoffmann, Michael R. (Pasadena, CA); Arnold, Robert G. (Pasadena, CA); Stephanopoulos, Gregory (Pasadena, CA)

    1989-01-01T23:59:59.000Z

    A process is provided for reducing iron ore by treatment with microorganisms which comprises forming an aqueous mixture of iron ore, microorganisms operable for reducing the ferric iron of the iron ore to ferrous iron, and a substrate operable as an energy source for the microbial reduction; and maintaining the aqueous mixture for a period of time and under conditions operable to effect the reduction of the ore. Preferably the microorganism is Pseudomonas sp. 200 and the reduction conducted anaerobically with a domestic wastewater as the substrate. An aqueous solution containing soluble ferrous iron can be separated from the reacted mixture, treated with a base to precipitate ferrous hydroxide which can then be recovered as a concentrated slurry.

  13. Microbial reduction of iron ore

    DOE Patents [OSTI]

    Hoffmann, M.R.; Arnold, R.G.; Stephanopoulos, G.

    1989-11-14T23:59:59.000Z

    A process is provided for reducing iron ore by treatment with microorganisms which comprises forming an aqueous mixture of iron ore, microorganisms operable for reducing the ferric iron of the iron ore to ferrous iron, and a substrate operable as an energy source for the microbial reduction; and maintaining the aqueous mixture for a period of time and under conditions operable to effect the reduction of the ore. Preferably the microorganism is Pseudomonas sp. 200 and the reduction conducted anaerobically with a domestic wastewater as the substrate. An aqueous solution containing soluble ferrous iron can be separated from the reacted mixture, treated with a base to precipitate ferrous hydroxide which can then be recovered as a concentrated slurry. 11 figs.

  14. “If your vagina could speak, what would it say?”: Dangerous Femininity, Anxious Masculinity and the Threat of Female Desire in the 1975 Pornographic Movie "The Sex that Speaks"

    E-Print Network [OSTI]

    Garrigou-Kempton, Emilie

    2010-01-01T23:59:59.000Z

    speak, what would it say? ” Dangerous Femininity, Anxiouslies the threat of a dangerous feminine sexuality that needsthat women’s desire is dangerous without the implementation

  15. The Measurement Problem and the Reduction Postulate of Quantum Mechanics

    E-Print Network [OSTI]

    Rodolfo Gambini

    1998-06-18T23:59:59.000Z

    It is well known, that the causal Schr\\"odinger evolution of a quantum state is not compatible with the reduction postulate, even when decoherence is taken into account. The violation of the causal evolution, introduced by the standard reduction postulate distinguishes certain systems (as the measurement devices), whose states are very close to statistical mixtures (as the ones resulting from the process of decoherence). In these systems, this violation has not any observable effect. In arbitrary quantum systems, the transition from the initial density matrix to a diagonal matrix predicted by the standard reduction postulate, would lead to a complete breakdown of the Schr\\"odinger evolution, and consequently would destroy all the predictive power of quantum mechanics. What we show here, is that there is a modified version of the postulate that allows to treat all the quantum mechanical systems on equal footing. The standard reduction postulate may be considered as a good approximation, useful for practical purposes, of this modified version which is consistent with the Schr\\"odinger evolution and via decoherence with the experimental results. Within this approach, the physical role played by the reduction postulate is as a tool for the computation of relative probabilities and consequently for the determination of the probabilities of consistent histories.

  16. Thin-film optical initiator

    DOE Patents [OSTI]

    Erickson, Kenneth L. (Albuquerque, NM)

    2001-01-01T23:59:59.000Z

    A thin-film optical initiator having an inert, transparent substrate, a reactive thin film, which can be either an explosive or a pyrotechnic, and a reflective thin film. The resultant thin-film optical initiator system also comprises a fiber-optic cable connected to a low-energy laser source, an output charge, and an initiator housing. The reactive thin film, which may contain very thin embedded layers or be a co-deposit of a light-absorbing material such as carbon, absorbs the incident laser light, is volumetrically heated, and explodes against the output charge, imparting about 5 to 20 times more energy than in the incident laser pulse.

  17. Geospatiotemporal Data Mining in an Early Warning System for Forest Threats in the United States

    SciTech Connect (OSTI)

    Hoffman, Forrest M [ORNL; Mills, Richard T [ORNL; Kumar, Jitendra [ORNL; Vulli, Srinivasa S [ORNL; HargroveJr., William Walter [United States Department of Agriculture (USDA), United States Forest Service (USFS)

    2010-01-01T23:59:59.000Z

    We investigate the potential of geospatiotemporal data mining of multi-year land surface phenology data (250~m Normalized Difference Vegetation Index (NDVI) values derived from the Moderate Resolution Imaging Spectroradiometer (MODIS) in this study) for the conterminous United States as part of an early warning system to identify threats to forest ecosystems. Cluster analysis of this massive data set, using high-performance computing, provides a basis for several possible approaches to defining the bounds of ``normal'' phenological patterns, indicating healthy vegetation in a given geographic location. We demonstrate the applicability of such an approach, using it to identify areas in Colorado, USA, where an ongoing mountain pine beetle outbreak has caused significant tree mortality.

  18. Combining Radiography and Passive Measurements for Radiological Threat Detection in Cargo

    SciTech Connect (OSTI)

    Miller, Erin A.; White, Timothy A.; Jarman, Kenneth D.; Kouzes, Richard T.; Kulisek, Jonathan A.; Robinson, Sean M.; Scherrer, Charles; Wittman, Richard S.

    2012-12-01T23:59:59.000Z

    Abstract Radiography is widely understood to provide information complimentary to passive detection: while not directly sensitive to radiological materials, radiography can reveal highly shielded regions which may mask a passive radiological signal. We present a method for combining radiographic and passive data which uses the radiograph to provide an estimate of scatter and attenuation for possible sources. This approach allows quantitative use of radiographic images without relying on image interpretation, and results in a probabilistic description of likely source locations and strengths. We present first results for this method for a simple modeled test case of a cargo container driving through a PVT portal. With this inversion approach, we address criteria for an integrated passive and radiographic screening system and how detection of SNM threats might be improved in such a system.

  19. Does nitrate deposition following astrophysical ionizing radiation events pose an additional threat to amphibians?

    E-Print Network [OSTI]

    Brian C. Thomas; Michelle D. Honeyman

    2008-06-27T23:59:59.000Z

    It is known that amphibians are especially susceptible to the combination of heightened UVB radiation and increased nitrate concentrations. Various astrophysical events have been suggested as sources of ionizing radiation that could pose a threat to life on Earth, through destruction of the ozone layer and subsequent increase in UVB, followed by deposition of nitrate. In this study, we investigate whether the nitrate deposition following an ionizing event is sufficiently large to cause an additional stress beyond that of the heightened UVB previously considered. We have converted predicted nitrate depositions to concentration values, utilizing data from the New York State Department of Environmental Conservation Acid Rain Monitoring Network web site. Our results show that the increase in nitrate concentration in bodies of water following the most intense ionization event likely in the last billion years would not be sufficient to cause a serious additional stress on amphibian populations and may actually provide some benefit by acting as fertilizer.

  20. Low-Altitude Airbursts and the Impact Threat - Final LDRD Report.

    SciTech Connect (OSTI)

    Boslough, Mark B.; Crawford, David A.

    2007-12-01T23:59:59.000Z

    The purpose of this nine-week project was to advance the understanding of low-altitude airbursts by developing the means to model them at extremely high resolution in order to span the scales of entry physics as well as blast wave and plume formation. Small asteroid impacts on Earth are a recognized hazard, but the full nature of the threat is still not well understood. We used shock physics codes to discover emergent phenomena associated with low-altitude airbursts such as the Siberian Tunguska event of 1908 and the Egyptian glass-forming event 29 million years ago. The planetary defense community is beginning to recognize the significant threat from such airbursts. Low-altitude airbursts are the only class of impacts that have a significant probability of occurring within a planning time horizon. There is roughly a 10% chance of a megaton-scale low-altitude airburst event in the next decade.The first part of this LDRD final project report is a preprint of our proceedings paper associated with the plenary presentation at the Hypervelocity Impact Society 2007 Symposium in Williamsburg, Virginia (International Journal of Impact Engineering, in press). The paper summarizes discoveries associated with a series of 2D axially-symmetric CTH simulations. The second part of the report contains slides from an invited presentation at the American Geophysical Union Fall 2007 meeting in San Francisco. The presentation summarizes the results of a series of 3D oblique impact simulations of the 1908 Tunguska explosion. Because of the brevity of this late-start project, the 3D results have not yet been written up for a peer-reviewed publication. We anticipate the opportunity to eventually run simulations that include the actual topography at Tunguska, at which time these results will be published.3

  1. Beta Reduction Constraints Manuel Bodirsky Katrin Erk

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Beta Reduction Constraints Manuel Bodirsky Katrin Erk Alexander Koller Joachim Niehren Programming partially. In this paper, we introduce beta reduction constraints to describe beta reduction steps between partially known lambda terms. We show that beta reduction constraints can be expressed in an extension

  2. Energy Efficient Schools Initiative- Grants

    Broader source: Energy.gov [DOE]

    The Energy Efficient Schools Initiative was created in May 2008 to provide grants and [http://www.dsireusa.org/incentives/incentive.cfm?Incentive_Code=TN57F&re... loans] to Tennessee school...

  3. Georgia Power- Advanced Solar Initiative

    Broader source: Energy.gov [DOE]

    Note: According to Georgia Power's website, the Advanced Solar Initiative's final program guidelines are due to be published on June 25th and the bidding period for is expected to open on July 10,...

  4. Review of transient initiator frequencies of a BWR PRA

    SciTech Connect (OSTI)

    Anavim, E.; Ilberg, D.; Shiu, K.

    1985-01-01T23:59:59.000Z

    Estimation of transient initiator frequencies is important in the assessment of BWR core damage frequencies. The use of more up-to-date data bases and methodology as part of a peer review of a recent PRA, resulted in a different set of initiator frequencies. The impact on core damage frequencies is discussed. In addition, several related issues are addressed, such as the impact of excluding the first year of plant experience from the data base. It is concluded that the impact of the new up-to-date data base is significant, and more important than the effect of the use of the more rigorous two stage Bayesian method. The effect of ignoring the first year of experience has resulted in a reduction of merely 20% in the overall transient initiator frequency and 15% in the overall core damage frequency which is judged to be small.

  5. Initial

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn Other News linkThermal Phenomena

  6. Jet initiation of PBX 9502

    SciTech Connect (OSTI)

    McAfee, J.M.

    1987-07-01T23:59:59.000Z

    This report details the progress of an effort to determine the quantitative aspects of the initiation of PBX 9502 (95% TATB, 5% Kel-F 800) by copper jets. The particular jet used was that produced by the LAW warhead (66-mm diameter, 42/sup 0/ angle cone, copper-lined, conical shaped charge). Fifteen experiments, in various configurations, have been fired to define the essential parameters for quantitatively measuring the jet performance and initiation of bare PBX 9502. 7 refs., 8 figs.

  7. Lead reduction in ambient air

    SciTech Connect (OSTI)

    Smith, R.D.; Kiehn, O.A.; Wilburn, D.R.; Bowyer, R.C.

    1987-01-01T23:59:59.000Z

    The Bureau of Mines evaluated the emission control methods, including the capital investments and operating cost, necessary for further reducing lead levels in ambient air at the Glover, Herculaneum, and Buick smelter-refineries in Missouri and the East Helena, MT, smelter. This report presents theoretically achievable lead emission reductions and estimated capital and operating costs.

  8. Behavioral Initiatives for Energy Efficiency: Large-Scale Energy Reductions through Sensors, Feedback & Information Technology

    SciTech Connect (OSTI)

    None

    2010-01-12T23:59:59.000Z

    Broad Funding Opportunity Announcement Project: A team of researchers from more than 10 departments at Stanford University is collaborating to transform the way Americans interact with our energy-use data. The team built a web-based platform that collects historical electricity data which it uses to perform a variety of experiments to learn what triggers people to respond. Experiments include new financial incentives, a calculator to understand the potential savings of efficient appliances, new Facebook interface designs, communication studies using Twitter, and educational programs with the Girl Scouts. Economic modeling is underway to better understand how results from the San Francisco Bay Area can be broadened to other parts of the country.

  9. Preventing industrial pollution at its source: the final report of the Michigan source reduction initiative

    SciTech Connect (OSTI)

    None

    1999-09-01T23:59:59.000Z

    This report describes a collaborative effort between NRDC, Dow Chemical, and Michigan Environmental Groups. The effort resulted in the identification and implementation of 17 pollution prevention projects that reduced substantial quantities of wastes and emissions and saved Dow considerable money.

  10. Southface Energy Institute: Advanced Commercial Buildings Initiative...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Southface Energy Institute: Advanced Commercial Buildings Initiative - 2015 Peer Review Southface Energy Institute: Advanced Commercial Buildings Initiative - 2015 Peer Review...

  11. Clean Energy Manufacturing Initiative Midwest Regional Summit...

    Office of Environmental Management (EM)

    Clean Energy Manufacturing Initiative Midwest Regional Summit: Lightweighting Breakout Session Summary Clean Energy Manufacturing Initiative Midwest Regional Summit: Lightweighting...

  12. Research Initiative Will Demonstrate Low Temperature Geothermal...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Research Initiative Will Demonstrate Low Temperature Geothermal Electrical Power Generation Systems Using Oilfield Fluids Research Initiative Will Demonstrate Low Temperature...

  13. State Buildings Energy Reduction Plan

    Broader source: Energy.gov [DOE]

    The Governor of Virginia signed Executive Order 82, "Greening of State Government" in June 2009 as part of the greater RENEW VIRGINIA Initiative. This Order builds upon [http://www.lva.virginia.gov...

  14. Reductive Dissolution of Goethite and Hematite by Reduced Flavins

    SciTech Connect (OSTI)

    Shi, Zhi; Zachara, John M.; Wang, Zheming; Shi, Liang; Fredrickson, Jim K.

    2013-10-02T23:59:59.000Z

    The abiotic reductive dissolution of goethite and hematite by the reduced forms of flavin mononucleotide (FMNH2) and riboflavin (RBFH2), electron transfer mediators (ETM) secreted by the dissimilatory iron-reducing bacterium Shewanella, was investigated under stringent anaerobic conditions. In contrast to the rapid redox reaction rate observed for ferrihydrite and lepidocrocite (Shi et al., 2012), the reductive dissolution of crystalline goethite and hematite was slower, with the extent of reaction limited by the thermodynamic driving force at circumneutral pH. Both the initial reaction rate and reaction extent increased with decreasing pH. On a unit surface area basis, goethite was less reactive than hematite between pH 4.0 and 7.0. AH2DS, the reduced form of the well-studied synthetic ETM anthraquinone-2,6-disulfonate (AQDS), yielded higher rates than FMNH2 under most reaction conditions, despite the fact that FMNH2 was a more effective reductant than AH2DS for ferryhydrite and lepidocrocite. Two additional model compounds, methyl viologen and benzyl viologen, were investigated under similar reaction conditions to explore the relationship between reaction rate and thermodynamic properties. Relevant kinetic data from the literature were also included in the analysis to span a broad range of half-cell potentials. Other conditions being equal, the surface area normalized initial reaction rate (ra) increased as the redox potential of the reductant became more negative. A non-linear, parabolic relationship was observed between log ra and the redox potential for eight reducants at pH 7.0, as predicted by Marcus theory for electron transfer. When pH and reductant concentration were fixed, log ra was positively correlated to the redox potential of four Fe(III) oxides over a wide pH range, following a non-linear parabolic relationship as well.

  15. Improving the Performance of Sampling-Based Planners by Using a Symmetry-Exploiting Gap Reduction Algorithm

    E-Print Network [OSTI]

    LaValle, Steven M.

    reduction technique that exploits group symmetries of the system to avoid costly numerical integrations and extended to generate new nodes and edges. If a path in the graph that connects the initial state and a goalImproving the Performance of Sampling-Based Planners by Using a Symmetry-Exploiting Gap Reduction

  16. Abstract--We identify the security threats facing a sensor network for wireless medical monitoring, and we propose a

    E-Print Network [OSTI]

    Wang, Lan

    1 Abstract--We identify the security threats facing a sensor network for wireless medical of medical sensors that convey information on his or her vital signs to a bedside monitoring device. However mobility, especially for long-term care. Recent advances in sensor technology have enabled the development

  17. CYBER THREAT ANALYSIS A KEY ENABLING TECHNOLOGY FOR THE OBJECTIVE FORCE (A CASE STUDY IN NETWORK INTRUSION DETECTION)

    E-Print Network [OSTI]

    Kumar, Vipin

    60000 90 91 92 93 94 95 96 97 98 99 00 01 Today computers control power, oil and gas deliveryCYBER THREAT ANALYSIS ­ A KEY ENABLING TECHNOLOGY FOR THE OBJECTIVE FORCE (A CASE STUDY IN NETWORK-of-systems technologies will enable decisive maneuver, both horizon- tal and vertical, during day and night, and in all

  18. Modest carbon price could save Borneo forests: study Reuters, 4 June 2009 -Tropical forests in Borneo under threat of conversion to palm oil

    E-Print Network [OSTI]

    in Borneo under threat of conversion to palm oil plantations could be more profitable left standing threat of being converted to oil palm plantations. "They are not meant to be clearing forest for palm oil development. It's pretty clear that forests are being felled for oil palm," said Venter, a conservation

  19. Stable reduction product of misonidazole

    SciTech Connect (OSTI)

    Panicucci, R.; McClelland, R.A.; Rauth, A.M.

    1986-07-01T23:59:59.000Z

    The predominant stable product (greater than 80%) of the anaerobic radiation chemical reduction (pH 7, formate, N/sub 2/O) of misonidazole (MISO) has been identified as the cyclic guanidinium ion MISO-DDI, a 4,5-dihydro-4,5-dihydroxyimidazolium ion. This cation was prepared as its sulfate salt by the reaction of glyoxal and the appropriate N-substituted guanidinium sulfate. Its formation during MISO reduction was established by NMR spectral comparison and by derivatization as glyoxal bis-oxime, which was formed in 86% yield in fully reduced systems. The toxicity of pure MISO-DDI X sulfate was examined in vivo (C/sub 3/H mice) and in vitro (CHO cells). This product is less toxic than the parent MISO and free glyoxal. A reactive, short-lived, intermediate is suggested as the agent responsible for the toxicity of MISO under hypoxic conditions.

  20. Emissions Reduction Impact of Renewables

    E-Print Network [OSTI]

    Haberl, J. S.; Yazdani, B.; Culp, C.

    2012-01-01T23:59:59.000Z

    p. 1 Energy Systems Laboratory ? 2012 EMISSIONS REDUCTION IMPACT OF RENEWABLES October 2012 Jeff Haberl, Bahman Yazdani, Charles Culp Energy Systems Laboratory Texas A&M University p. 2 Energy Systems Laboratory ? 2012... Do TCEQ: Vince Meiller, Bob Gifford ERCOT: Warren Lasher USEPA: Art Diem, Julie Rosenberg ACKNOWLEDGEMENTS p. 3 Energy Systems Laboratory ? 2012 RENEWABLES Solar PV Solar Thermal Hydro Biomass Landfill Gas Geothermal p. 4...

  1. Emissions Reduction Impact of Renewables 

    E-Print Network [OSTI]

    Haberl, J. S.; Yazdani, B.; Culp, C.

    2012-01-01T23:59:59.000Z

    Systems Laboratory ? 2012 p. 9 Energy Systems Laboratory ? 2012 p. 10 Energy Systems Laboratory ? 2012 WIND PROJECTS IN TEXAS Completed, Announced, and Retired Wind Projects in Texas, as of December 2011 p. 11 Energy Systems Laboratory ? 2012... Laboratory ? 2012 p. 24 Energy Systems Laboratory ? 2012 p. 25 Energy Systems Laboratory ? 2012 NOx REDUCTIONS FROM WIND POWER New 2010 Annual eGrid for NOx Emissions West Zone North Zone Houston Zone South Zone Unit: lbs of NOx/MWh Unit: lbs...

  2. AVAILABLE ONLINE AT: INITIATED BY:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973 1 Introduction In the design INITIATED BY: INITIATED

  3. Simulated Interdiction: Proliferation Security Initiative

    E-Print Network [OSTI]

    2009-01-01T23:59:59.000Z

    ………………………………... Technical Capabilities to Support PSI ………………………………… Foreign Policy and External Relations ………………………............... Republic of Bevostan ………………………………………………………….. Geography ……………………………………………………………... iii 1 3 4 5 6 7 8 8 8 8 8 9 9 10... Security, Science and Policy Institute (NSSPI) Texas A&M University May 6, 2009 Simulated Interdiction: The Proliferation Security Initiative (PSI) Acknowledgements The National Nuclear Security Administration (NNSA) of the U.S. Department...

  4. Zentrum fr Nutzfahrzeugtechnologie Initial situation

    E-Print Network [OSTI]

    Berns, Karsten

    with a vehicle model in the MKS software for the study of vehicle dynamic behavior. Schindler03_2012_03 Zentrum to calculate the tyre dynamic behavior when travelling through the soil surface. It can be fur- ther integratedZentrum fĂĽr Nutzfahrzeugtechnologie Initial situation: The study on the trafficability

  5. Managing Critical Management Improvement Initiatives

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-10-01T23:59:59.000Z

    Provides requirements and responsibilities for planning, executing and assessing critical management improvement initiatives within DOE. DOE N 251.59, dated 9/27/2004, extends this Notice until 10/01/2005. Archived 11-8-10. Does not cancel other directives.

  6. Climate VISION: Private Sector Initiatives: Aluminum: Results

    Office of Scientific and Technical Information (OSTI)

    the goal set for 2010. A 56 percent reduction in direct process emissions per ton of production, including combined reductions in PFC's and CO2, exceeds the 53 percent commitment...

  7. Initiation disruptor systems and methods of initiation disruption

    DOE Patents [OSTI]

    Baum, Dennis W

    2014-09-23T23:59:59.000Z

    A system that may be used as an initiation disruption system (IDS) according to one embodiment includes an explosive charge; a plurality of particles in a layer at least partially surrounding the explosive charge; and a fire suppressant adjacent the plurality of particles. A method for disabling an object according to one embodiment includes placing the system as recited above near an object; and causing the explosive charge to initiate, thereby applying mechanical loading to the object such that the object becomes disabled. Additional systems and methods are also presented. A device according to another embodiment includes a plurality of particles bound by a binder thereby defining a sidewall having an interior for receiving an explosive; and a fire suppressant adjacent the plurality of particles and binder. Additional systems and methods are also presented.

  8. Achieving competitive excellence in nuclear energy: The threat of proliferation; the challenge of inertial confinement fusion

    SciTech Connect (OSTI)

    Nuckolls, J.H.

    1994-06-01T23:59:59.000Z

    Nuclear energy will have an expanding role in meeting the twenty-first-century challenges of population and economic growth, energy demand, and global warming. These great challenges are non-linearly coupled and incompletely understood. In the complex global system, achieving competitive excellence for nuclear energy is a multi-dimensional challenge. The growth of nuclear energy will be driven by its margin of economic advantage, as well as by threats to energy security and by growing evidence of global warming. At the same time, the deployment of nuclear energy will be inhibited by concerns about nuclear weapons proliferation, nuclear waste and nuclear reactor safety. These drivers and inhibitors are coupled: for example, in the foreseeable future, proliferation in the Middle East may undermine energy security and increase demand for nuclear energy. The Department of Energy`s nuclear weapons laboratories are addressing many of these challenges, including nuclear weapons builddown and nonproliferation, nuclear waste storage and burnup, reactor safety and fuel enrichment, global warming, and the long-range development of fusion energy. Today I will focus on two major program areas at the Lawrence Livermore National Laboratory (LLNL): the proliferation of nuclear weapons and the development of inertial confinement fusion (ICF) energy.

  9. Psychosocial Modeling of Insider Threat Risk Based on Behavioral and Word Use Analysis

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Kangas, Lars J.; Noonan, Christine F.; Brown, Christopher R.; Ferryman, Thomas A.

    2013-10-01T23:59:59.000Z

    In many insider crimes, managers and other coworkers observed that the offenders had exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers to using such psychosocial indicators include the inability to recognize the signs and the failure to record the behaviors so that they can be assessed. A psychosocial model was developed to assess an employee’s behavior associated with an increased risk of insider abuse. The model is based on case studies and research literature on factors/correlates associated with precursor behavioral manifestations of individuals committing insider crimes. A complementary Personality Factor modeling approach was developed based on analysis to derive relevant personality characteristics from word use. Several implementations of the psychosocial model were evaluated by comparing their agreement with judgments of human resources and management professionals; the personality factor modeling approach was examined using email samples. If implemented in an operational setting, these models should be part of a set of management tools for employee assessment to identify employees who pose a greater insider threat.

  10. Threat of a sinkhole: A reevaluation of Cavern 4, Bayou Choctaw salt dome, Louisiana

    SciTech Connect (OSTI)

    Neal, J.T.; Todd, J.L.; Linn, J.K. [Sandia National Labs., Albuquerque, NM (United States); Magorian, T.R. [Magorian (Thomas R.), Amherst, NY (United States)

    1993-09-01T23:59:59.000Z

    Cavern Lake at Bayou Choctaw salt dome resulted from the failure of Cavern 7 in 1954. Uncontrolled solutioning of this cavern through the thin caprock had set the stage for overburden to collapse into the cavern below. A similar situation developed with nearby Cavern 4, but with less dissolutioning of the caprock. Because pressure loss was already a problem and because another 800 ft diameter lake would have endangered surface operations, solutioning of Cavern 4 was stopped and the cavern abandoned in 1957 in order to protect the already-small site. In 1978 the Strategic Petroleum Reserve (SPR) acquired a number of caverns at Bayou Choctaw, including Cavern 4, and the possible repeat of the Cavern 7 failure and formation of another lake thus became an issue. The cavern dimensions were re-sonared in 1980 for comparison with 1963 and 1977 surveys. Annual surface leveling between 1982--1992 showed less subsidence occurring than the site average, and a cavern monitoring system, installed in 1984, has revealed no anomalous motion. Repeat sonar surveys in 1992 showed very little, if any, change occurred since 1980 although a small amount of uncertainty exists as a result of changing sonar techniques. We conclude that significant additional solutioning or erosion of the caprock has not occurred and that there is no increased threat to SPR operations.

  11. Identifying at-risk employees: A behavioral model for predicting potential insider threats

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Kangas, Lars J.; Noonan, Christine F.; Dalton, Angela C.

    2010-09-01T23:59:59.000Z

    A psychosocial model was developed to assess an employee’s behavior associated with an increased risk of insider abuse. The model is based on case studies and research literature on factors/correlates associated with precursor behavioral manifestations of individuals committing insider crimes. In many of these crimes, managers and other coworkers observed that the offenders had exhibited signs of stress, disgruntlement, or other issues, but no alarms were raised. Barriers to using such psychosocial indicators include the inability to recognize the signs and the failure to record the behaviors so that they could be assessed by a person experienced in psychosocial evaluations. We have developed a model using a Bayesian belief network with the help of human resources staff, experienced in evaluating behaviors in staff. We conducted an experiment to assess its agreement with human resources and management professionals, with positive results. If implemented in an operational setting, the model would be part of a set of management tools for employee assessment that can raise an alarm about employees who pose higher insider threat risks. In separate work, we combine this psychosocial model’s assessment with computer workstation behavior to raise the efficacy of recognizing an insider crime in the making.

  12. Reduction of Quantum Phase Fluctuations Implies Antibunching of Photon

    E-Print Network [OSTI]

    Prakash Gupta; Anirban Pathak

    2007-01-25T23:59:59.000Z

    A clear physical meaning of the Carruthers-Nieto symmetric quantum phase fluctuation parameter (U) has been provided in Susskind Glogower and Barnett Pegg formalism of quantum phase and it is shown that the reduction of phase fluctuation parameter U with respect to its coherent state value corresponds to an antibunched state. Thus nonclassicality of a state may be manifested through the phase fluctuation parameters. As examples, quantum phase fluctuations in different optical processes, such as four wave mixing, six wave mixing and second harmonic generation have been studied by using Carruthers-Nieto quantum phase fluctuation parameters. The operators required for the calculation of quantum phase fluctuations are expressed in closed analytical forms (up to second order in coupling constant). It is also found that the reduction of phase fluctuations compared to their initial values are possible in all three cases which means nonclassical (antibunched) state exists in all these cases.

  13. "Ecosystem Services, Biodiversity and Poverty Reduction

    E-Print Network [OSTI]

    "Ecosystem Services, Biodiversity and Poverty Reduction: Is conservation the answer?" Paul van for the foreseeable future. #12;John Beddington's "Perfect Storm" Population Increase Poverty Reduction Food Security Globalisation Climate Change Health Water Security Poverty Alleviation Finance Urbanisation Population Energy

  14. Ozone Reductions using Residential Building Envelopes

    E-Print Network [OSTI]

    Ozone Reductions using Residential Building Envelopes I.S. Walker, M.H. Sherman and W.W. Nazaroff or adequacy of the information in this report. #12;Arnold Schwarzenegger Governor Ozone Reductions Using

  15. Electricity Generation and Emissions Reduction Decisions

    E-Print Network [OSTI]

    Electricity Generation and Emissions Reduction Decisions under Policy Uncertainty: A General analysis, and public education in global environmental change. It seeks to provide leadership;1 Electricity Generation and Emissions Reduction Decisions under Policy Uncertainty: A General Equilibrium

  16. Bioaugmentation for Reduction of Diffuse Pesticide Contamination

    E-Print Network [OSTI]

    Bioaugmentation for Reduction of Diffuse Pesticide Contamination A Bioprophylactic Concept Karin/Repro, Uppsala 2013 #12;Bioaugmentation for Reduction of Diffuse Pesticide Contamination. A Bioprophylactic Concept. Abstract Pesticides and their residues frequently contaminate surface waters and groundwater so

  17. Extracellular Reduction of Hexavalent Chromium by Cytochromes...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Reduction of Hexavalent Chromium by Cytochromes MtrC and OmcA of Shewanella oneidensis MR-1. Extracellular Reduction of Hexavalent Chromium by Cytochromes MtrC and OmcA of...

  18. Carbon Dioxide Reduction Through Urban Forestry

    E-Print Network [OSTI]

    Standiford, Richard B.

    . Retrieval Terms: urban forestry, carbon dioxide, sequestration, avoided energy The Authors E. Gregory McCarbon Dioxide Reduction Through Urban Forestry: Guidelines for Professional and Volunteer Tree; Simpson, James R. 1999. Carbon dioxide reduction through urban forestry

  19. California Solar Initiative California Public Utilities Commission

    E-Print Network [OSTI]

    California Solar Initiative California Public Utilities Commission Staff Progress Report January 2008 #12;California Solar Initiative, CPUC Staff Progress Report, January 2008 This page intentionally left blank. #12;California Solar Initiative, CPUC Staff Progress Report, January 2008 Table of Contents

  20. Green Button Initiative Growing | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Initiative Growing Green Button Initiative Growing May 17, 2013 - 1:17pm Addthis The Green Button initiative, which is the common-sense idea that electricity customers should...

  1. A Compressed Air Reduction Program

    E-Print Network [OSTI]

    Hawks, K. D.

    A COMPRESSED AIR REDUCTION PROGRAM K. Dwight Hawks General Motors Corporation - Ruick-Oldsmobi1e-Cadillac Group Warren, Michigan ABSTRACT The reascn for implementing this program was to assist the plant in Quantifying some of its leaks... in the equipme~t throuqhout the plant and to provide direction as to which leaks are yenerat~ng high uti 1ity costs. The direction is very beneficial in lIlaking maintenance aware of prolill,Pls within equipment .IS \\Iell as notifying them as to whf're thei...

  2. Relative trajectory data reduction analysis

    E-Print Network [OSTI]

    Grant, Kenneth William

    1969-01-01T23:59:59.000Z

    REDATIVE TRAJECTORY DATA RFDUCTION ANA1. YS1S A Thesis KENNE'Ill Vi. GRANT Subrnitl ed to the Gratluate College of 'J exas ASM University in pa) &ial full'illment of the reouir ament for the degree of MASTER OF SCIENCE August 1969 Major... Trajectory Data Reduction Analysis. (August 1969) Kenneth W. Grant, B. A. , University of California at Riverside Directed by: Dr. Rudolph Freund Knowledge of missile/drone intercept parameters is extremely important in the analysis of ordnance system...

  3. Scenarios for exercising technical approaches to verified nuclear reductions

    SciTech Connect (OSTI)

    Doyle, James [Los Alamos National Laboratory

    2010-01-01T23:59:59.000Z

    Presidents Obama and Medvedev in April 2009 committed to a continuing process of step-by-step nuclear arms reductions beyond the new START treaty that was signed April 8, 2010 and to the eventual goal of a world free of nuclear weapons. In addition, the US Nuclear Posture review released April 6, 2010 commits the US to initiate a comprehensive national research and development program to support continued progress toward a world free of nuclear weapons, including expanded work on verification technologies and the development of transparency measures. It is impossible to predict the specific directions that US-RU nuclear arms reductions will take over the 5-10 years. Additional bilateral treaties could be reached requiring effective verification as indicated by statements made by the Obama administration. There could also be transparency agreements or other initiatives (unilateral, bilateral or multilateral) that require monitoring with a standard of verification lower than formal arms control, but still needing to establish confidence to domestic, bilateral and multilateral audiences that declared actions are implemented. The US Nuclear Posture Review and other statements give some indication of the kinds of actions and declarations that may need to be confirmed in a bilateral or multilateral setting. Several new elements of the nuclear arsenals could be directly limited. For example, it is likely that both strategic and nonstrategic nuclear warheads (deployed and in storage), warhead components, and aggregate stocks of such items could be accountable under a future treaty or transparency agreement. In addition, new initiatives or agreements may require the verified dismantlement of a certain number of nuclear warheads over a specified time period. Eventually procedures for confirming the elimination of nuclear warheads, components and fissile materials from military stocks will need to be established. This paper is intended to provide useful background information for establishing a conceptual approach to a five-year technical program plan for research and development of nuclear arms reductions verification and transparency technologies and procedures.

  4. Progress on Footprint Reduction at the Hanford Site - 12406

    SciTech Connect (OSTI)

    McKenney, Dale E. [CH2M HILL, Plateau Remediation Company, Richland, Washington 99352 (United States); Seeley, Paul [Cenibark International, Inc., Richland, Washington 99352 (United States); Farabee, Al [U.S. Department of Energy, Richland Operations Office, Richland, Washington 99352 (United States)

    2012-07-01T23:59:59.000Z

    The Department of Energy (DOE) Office of Environmental Management (EM) continues to reduce the footprint of legacy sites throughout the EM complex. Footprint reduction is being accomplished by focusing cleanup activities on decontamination and demolition of excess contaminated facilities, soil and groundwater remediation, and solid waste disposition. All of these initiatives are being accomplished with established technologies in proven regulatory frameworks. Ultimately, completion of these environmental cleanup activities will reduce the monitoring and maintenance costs associated with managing large federal facilities, allowing EM to place more focus on other high priority cleanup efforts and facilitate a successful transition to land-term stewardship of these sites. Through the American Recovery and Reinvestment Act (ARRA) investment, the Department's cleanup footprint has been reduced by 45 percent to date, from 2411 km{sup 2} (931 mi{sup 2}) to 1336 km{sup 2} (516 mi{sup 2}s). With this significant progress on footprint reduction, the Department is on track towards their goal to reduce its overall footprint by approximately 90 percent by 2015. In addition, some areas cleaned up may become available for alternate uses (i.e. recreation, conservation, preservation, industrialization or development). Much of the work to reduce the complex's footprint occurred at the Savannah River Site in South Carolina and the Hanford Site in Washington, but cleanup continues across the complex. Footprint reduction is progressing well at the Hanford Site, supported predominantly through ARRA investment. To date, 994 km{sup 2} (384 mi{sup 2}) (65%) of footprint reduction have been achieved at Hanford, with a goal to achieve a 90% reduction by Fiscal Year 2015. The DOE EM and DOE Richland Operations Office, continue to make great progress to reduce the legacy footprint of the Hanford Site. Footprint reduction is being accomplished by focusing cleanup activities on decontamination and demolition of excess facilities, both contaminated and uncontaminated, waste site cleanup activities, and debris pile removal. All of these activities can be accomplished with proven technologies and within established regulatory frameworks. Footprint reduction goals for Fiscal Year 2011 were exceeded, largely with the help of ARRA funding. As cleanup projects are completed and the total area requiring cleanup shrinks, overall costs for surveillance and maintenance operations and infrastructure services decrease. This work completion and decrease in funding requirements to maintain waste sites and antiquated facilities allows more focus on high priority site missions (i.e. groundwater remediation, tank waste disposition, etc.) and moves Site areas closer to transition from EM to the Legacy Management program. The progress in the Hanford footprint reduction effort will help achieve success in these other important mission areas. (authors)

  5. Catalyst for the reduction of sulfur dioxide to elemental sulfur

    DOE Patents [OSTI]

    Jin, Y.; Yu, Q.; Chang, S.G.

    1996-02-27T23:59:59.000Z

    The inventive catalysts allow for the reduction of sulfur dioxide to elemental sulfur in smokestack scrubber environments. The catalysts have a very high sulfur yield of over 90% and space velocity of 10,000 h{sup {minus}1}. They also have the capacity to convert waste gases generated during the initial conversion into elemental sulfur. The catalysts have inexpensive components, and are inexpensive to produce. The net impact of the invention is to make this technology practically available to industrial applications. 21 figs.

  6. Guam Initial Technical Assessment Report

    SciTech Connect (OSTI)

    Baring-Gould, I.; Conrad, M.; Haase, S.; Hotchkiss, E.; McNutt, P.

    2011-04-01T23:59:59.000Z

    Under an interagency agreement, funded by the Department of Interior's (DOI) Office of Insular Affairs (OIA), the National Renewable Energy Laboratory (NREL) was tasked to deliver technical assistance to the island of Guam by conducting an island initial technical assessment that would lay out energy consumption and production data and establish a baseline. This assessment will be used to conduct future analysis and studies by NREL that will estimate energy efficiency and renewable energy potential for the island of Guam.

  7. The President's Biofuels Initiative | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    The President's Biofuels Initiative The President's Biofuels Initiative Presentation by Neil Rossmeissl at the October 24, 2006 Bio-Derived Liquids to Hydrogen Distributed...

  8. Voluntary Initiative on Incentives: Toolkit Training Webinar...

    Energy Savers [EERE]

    Voluntary Initiative on Incentives: Toolkit Training Webinar Voluntary Initiative on Incentives: Toolkit Training Webinar March 26, 2015 12:30PM to 2:0...

  9. Innovative Corridors Initiative: Business Model Analysis

    E-Print Network [OSTI]

    Shaheen, Susan; Lingham, Viginia; Finson, Rachel S.

    2007-01-01T23:59:59.000Z

    Wenger, Joyce. Business Models for Vehicle InfrastructureCorridors Initiative: Business Model Analysis Rachel S.Corridors Initiative: Business Model Analysis Task Order

  10. Advanced Manufacturing Initiative Improves Turbine Blade Productivity...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Advanced Manufacturing Initiative Improves Turbine Blade Productivity Advanced Manufacturing Initiative Improves Turbine Blade Productivity May 20, 2011 - 2:56pm Addthis This is an...

  11. Climate VISION: Private Sector Initiatives: Cement: Resources...

    Office of Scientific and Technical Information (OSTI)

    The Cement Sustainability Initiative Coordinated by the World Business Council for Sustainable Development, the Cement Sustainability Initiative (CSI) helps the cement...

  12. Clean Coal Power Initiative | Department of Energy

    Office of Environmental Management (EM)

    Clean Coal Power Initiative Clean Coal Power Initiative "Clean coal technology" describes a new generation of energy processes that sharply reduce air emissions and other...

  13. California Low Carbon Fuels Infrastructure Investment Initiative...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Low Carbon Fuels Infrastructure Investment Initiative California Low Carbon Fuels Infrastructure Investment Initiative 2012 DOE Hydrogen and Fuel Cells Program and Vehicle...

  14. Energy Innovation: Green Button Initiative Empowering Americans...

    Energy Savers [EERE]

    Energy Innovation: Green Button Initiative Empowering Americans to Save Energy and Money Energy Innovation: Green Button Initiative Empowering Americans to Save Energy and Money...

  15. Energy Transition Initiative: Islands Playbook (Book) | OSTI...

    Office of Scientific and Technical Information (OSTI)

    Energy Transition Initiative: Islands Playbook (Book) Re-direct Destination: The Island Energy Playbook (the Playbook) provides an action-oriented guide to successfully initiating,...

  16. A Comparison Between Model Reduction and Controller Reduction: Application to a PWR Nuclear Planty

    E-Print Network [OSTI]

    Gevers, Michel

    A Comparison Between Model Reduction and Controller Reduction: Application to a PWR Nuclear Planty model reduction with controller reduction for the same PWR system. We show that closed-loop techniques to the design of a low-order con- troller for a realistic model of order 42 of a Pressurized Water Reactor (PWR

  17. GRiP - A flexible approach for calculating risk as a function of consequence, vulnerability, and threat.

    SciTech Connect (OSTI)

    Whitfield, R. G.; Buehring, W. A.; Bassett, G. W. (Decision and Information Sciences)

    2011-04-08T23:59:59.000Z

    Get a GRiP (Gravitational Risk Procedure) on risk by using an approach inspired by the physics of gravitational forces between body masses! In April 2010, U.S. Department of Homeland Security Special Events staff (Protective Security Advisors [PSAs]) expressed concern about how to calculate risk given measures of consequence, vulnerability, and threat. The PSAs believed that it is not 'right' to assign zero risk, as a multiplicative formula would imply, to cases in which the threat is reported to be extremely small, and perhaps could even be assigned a value of zero, but for which consequences and vulnerability are potentially high. They needed a different way to aggregate the components into an overall measure of risk. To address these concerns, GRiP was proposed and developed. The inspiration for GRiP is Sir Isaac Newton's Universal Law of Gravitation: the attractive force between two bodies is directly proportional to the product of their masses and inversely proportional to the squares of the distance between them. The total force on one body is the sum of the forces from 'other bodies' that influence that body. In the case of risk, the 'other bodies' are the components of risk (R): consequence, vulnerability, and threat (which we denote as C, V, and T, respectively). GRiP treats risk as if it were a body within a cube. Each vertex (corner) of the cube represents one of the eight combinations of minimum and maximum 'values' for consequence, vulnerability, and threat. The risk at each of the vertices is a variable that can be set. Naturally, maximum risk occurs when consequence, vulnerability, and threat are at their maximum values; minimum risk occurs when they are at their minimum values. Analogous to gravitational forces among body masses, the GRiP formula for risk states that the risk at any interior point of the box depends on the squares of the distances from that point to each of the eight vertices. The risk value at an interior (movable) point will be dominated by the value of one vertex as that point moves closer and closer to that one vertex. GRiP is a visualization tool that helps analysts better understand risk and its relationship to consequence, vulnerability, and threat. Estimates of consequence, vulnerability, and threat are external to GRiP; however, the GRiP approach can be linked to models or data that provide estimates of consequence, vulnerability, and threat. For example, the Enhanced Critical Infrastructure Program/Infrastructure Survey Tool produces a vulnerability index (scaled from 0 to 100) that can be used for the vulnerability component of GRiP. We recognize that the values used for risk components can be point estimates and that, in fact, there is uncertainty regarding the exact values of C, V, and T. When we use T = t{sub o} (where t{sub o} is a value of threat in its range), we mean that threat is believed to be in an interval around t{sub o}. Hence, a value of t{sub o} = 0 indicates a 'best estimate' that the threat level is equal to zero, but still allows that it is not impossible for the threat to occur. When t{sub o} = 0 but is potentially small and not exactly zero, there will be little impact on the overall risk value as long as the C and V components are not large. However, when C and/or V have large values, there can be large differences in risk given t{sub o} = 0, and t{sub o} = epsilon (where epsilon is small but greater than a value of zero). We believe this scenario explains the PSA's intuition that risk is not equal to zero when t{sub o} = 0 and C and/or V have large values. (They may also be thinking that if C has an extremely large value, it is unlikely that T is equal to 0; in the terrorist context, T would likely be dependent on C when C is extremely large.) The PSAs are implicitly recognizing the potential that t{sub o} = epsilon. One way to take this possible scenario into account is to replace point estimates for risk with interval values that reflect the uncertainty in the risk components. In fact, one could argue that T never equals zero for a man-made hazard. This

  18. Extended defense systems :I. adversary-defender modeling grammar for vulnerability analysis and threat assessment.

    SciTech Connect (OSTI)

    Merkle, Peter Benedict

    2006-03-01T23:59:59.000Z

    Vulnerability analysis and threat assessment require systematic treatments of adversary and defender characteristics. This work addresses the need for a formal grammar for the modeling and analysis of adversary and defender engagements of interest to the National Nuclear Security Administration (NNSA). Analytical methods treating both linguistic and numerical information should ensure that neither aspect has disproportionate influence on assessment outcomes. The adversary-defender modeling (ADM) grammar employs classical set theory and notation. It is designed to incorporate contributions from subject matter experts in all relevant disciplines, without bias. The Attack Scenario Space U{sub S} is the set universe of all scenarios possible under physical laws. An attack scenario is a postulated event consisting of the active engagement of at least one adversary with at least one defended target. Target Information Space I{sub S} is the universe of information about targets and defenders. Adversary and defender groups are described by their respective Character super-sets, (A){sub P} and (D){sub F}. Each super-set contains six elements: Objectives, Knowledge, Veracity, Plans, Resources, and Skills. The Objectives are the desired end-state outcomes. Knowledge is comprised of empirical and theoretical a priori knowledge and emergent knowledge (learned during an attack), while Veracity is the correspondence of Knowledge with fact or outcome. Plans are ordered activity-task sequences (tuples) with logical contingencies. Resources are the a priori and opportunistic physical assets and intangible attributes applied to the execution of associated Plans elements. Skills for both adversary and defender include the assumed general and task competencies for the associated plan set, the realized value of competence in execution or exercise, and the opponent's planning assumption of the task competence.

  19. Redundancy Reduction Techniques and Content Analysis for Multimedia Services the European COST 211quat Action

    E-Print Network [OSTI]

    Gabbouj, Moncef

    Redundancy Reduction Techniques and Content Analysis for Multimedia Services ­ the European COST, such as the ongoing ISO MPEG-4 standardisation phase as well as the new ISO MPEG-7 initiative. The aim is to define philosophy of COST projects is introduced before narrowing the focus to the COST 211 series. For more than 20

  20. a 50% reduction in Prlr gene dose, provides strong evidence for PRL being the mediator

    E-Print Network [OSTI]

    Kenig, Fabien

    a 50% reduction in Prlr gene dose, provides strong evidence for PRL being the mediator of pregnancy adaptation initiated early in pregnancy and mediated by PRL. Pregnancy is associated with several other transient alterations in mater- nal physiological functions, many of which can be affected by PRL and

  1. Surface Plasmon-Driven Water Reduction: Gold Nanoparticle Size...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Plasmon-Driven Water Reduction: Gold Nanoparticle Size Matters. Surface Plasmon-Driven Water Reduction: Gold Nanoparticle Size Matters. Abstract: Water reduction under two visible...

  2. Engine Friction Reduction Through Surface Finish and Coatings...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Friction Reduction Through Surface Finish and Coatings Engine Friction Reduction Through Surface Finish and Coatings Opportunities exist for friction reduction in piston rings and...

  3. Greenhouse Gas Reductions: SF6

    ScienceCinema (OSTI)

    Anderson, Diana

    2013-04-19T23:59:59.000Z

    Argonne National Laboratory is leading the way in greenhouse gas reductions, particularly with the recapture and recycling of sulfur hexafluoride (SF6). SF6 is a gas used in industry as an anti-arcing agent. It is an extremely potent greenhouse gas ? one pound of SF6 is equivalent to 12 tons of carbon dioxide. While the U.S. does not currently regulate SF6 emissions, Argonne is proactively and voluntarily recovering and recycling to reduce SF6 emissions. Argonne saves over 16,000 tons of SF6 from being emitted into the atmosphere each year, and by recycling the gas rather than purchasing it new, we save taxpayers over $208,000 each year.

  4. Greenhouse Gas Reductions: SF6

    SciTech Connect (OSTI)

    Anderson, Diana

    2012-01-01T23:59:59.000Z

    Argonne National Laboratory is leading the way in greenhouse gas reductions, particularly with the recapture and recycling of sulfur hexafluoride (SF6). SF6 is a gas used in industry as an anti-arcing agent. It is an extremely potent greenhouse gas — one pound of SF6 is equivalent to 12 tons of carbon dioxide. While the U.S. does not currently regulate SF6 emissions, Argonne is proactively and voluntarily recovering and recycling to reduce SF6 emissions. Argonne saves over 16,000 tons of SF6 from being emitted into the atmosphere each year, and by recycling the gas rather than purchasing it new, we save taxpayers over $208,000 each year.

  5. PLAINS CO2 REDUCTION PARTNERSHIP

    SciTech Connect (OSTI)

    Edward N. Steadman; John A. Harju; Erin M. O'Leary; James A. Sorensen; Daniel J. Daly; Melanie D. Jensen; Thea E. Reikoff

    2005-01-01T23:59:59.000Z

    The Plains CO{sub 2} Reduction (PCOR) Partnership continues to make great progress. Task 2 (Technology Deployment) focused on developing information regarding deployment issues to support Task 5 (Modeling and Phase II Action Plans) by providing information to be used to assess CO{sub 2} sequestration opportunities in the PCOR Partnership region. Task 3 (Public Outreach) focused on developing an informational video about CO{sub 2} sequestration. Progress in Task 4 (Sources, Sinks, and Infrastructure) included the continued collection of data regarding CO{sub 2} sources and sinks and data on the performance and costs for CO{sub 2} separation, capture, treatment, and compression for pipeline transportation. Task 5 focused on screening and qualitatively assessing sequestration options. Task 5 activities also continue to be useful in structuring data collection and other activities in Tasks 2, 3, and 5.

  6. Dimensional Reduction in Quantum Gravity

    E-Print Network [OSTI]

    G. 't Hooft

    2009-03-20T23:59:59.000Z

    The requirement that physical phenomena associated with gravitational collapse should be duly reconciled with the postulates of quantum mechanics implies that at a Planckian scale our world is not 3+1 dimensional. Rather, the observable degrees of freedom can best be described as if they were Boolean variables defined on a two-dimensional lattice, evolving with time. This observation, deduced from not much more than unitarity, entropy and counting arguments, implies severe restrictions on possible models of quantum gravity. Using cellular automata as an example it is argued that this dimensional reduction implies more constraints than the freedom we have in constructing models. This is the main reason why so-far no completely consistent mathematical models of quantum black holes have been found. Essay dedicated to Abdus Salam.

  7. PLAINS CO2 REDUCTION PARTNERSHIP

    SciTech Connect (OSTI)

    Edward N. Steadman; John A. Harju; Erin M. O'Leary; James A. Sorensen; Daniel J. Daly; Melanie D. Jensen; Thea E. Reikoff

    2004-10-01T23:59:59.000Z

    The Plains CO{sub 2} Reduction (PCOR) Partnership continues to make great progress. Task 2 (Technology Deployment) focused on developing information regarding deployment issues to support Task 5 (Modeling and Phase II Action Plans) by providing information to be used to assess CO{sub 2} sequestration opportunities in the PCOR Partnership region. Task 3 (Public Outreach) focused on developing an informational video about CO{sub 2} sequestration. Progress in Task 4 (Sources, Sinks, and Infrastructure) included the continued collection of data regarding CO{sub 2} sources and sinks and data on the performance and costs for CO{sub 2} separation, capture, treatment, and compression for pipeline transportation. Task 5 focused on screening and qualitatively assessing sequestration options. Task 5 activities also continue to be useful in structuring data collection and other activities in Tasks 2, 3, and 5.

  8. Electrolyte treatment for aluminum reduction

    DOE Patents [OSTI]

    Brown, Craig W. (Seattle, WA); Brooks, Richard J. (Seattle, WA); Frizzle, Patrick B. (Seattle, WA); Juric, Drago D. (Bulleen, AU)

    2002-01-01T23:59:59.000Z

    A method of treating an electrolyte for use in the electrolytic reduction of alumina to aluminum employing an anode and a cathode, the alumina dissolved in the electrolyte, the treating improving wetting of the cathode with molten aluminum during electrolysis. The method comprises the steps of providing a molten electrolyte comprised of ALF.sub.3 and at least one salt selected from the group consisting of NaF, KF and LiF, and treating the electrolyte by providing therein 0.004 to 0.2 wt. % of a transition metal or transition metal compound for improved wettability of the cathode with molten aluminum during subsequent electrolysis to reduce alumina to aluminum.

  9. Initial Decision and Risk Analysis

    SciTech Connect (OSTI)

    Engel, David W.

    2012-02-29T23:59:59.000Z

    Decision and Risk Analysis capabilities will be developed for industry consideration and possible adoption within Year 1. These tools will provide a methodology for merging qualitative ranking of technology maturity and acknowledged risk contributors with quantitative metrics that drive investment decision processes. Methods and tools will be initially introduced as applications to the A650.1 case study, but modular spreadsheets and analysis routines will be offered to industry collaborators as soon as possible to stimulate user feedback and co-development opportunities.

  10. AVAILABLE ONLINE AT: INITIATED BY:

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City,EnrichedSupplementalAdministrationAdministration INITIATED

  11. AVAILABLE ONLINE AT: INITIATED BY:

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City,EnrichedSupplementalAdministrationAdministration INITIATED

  12. REDUCTION CAPACITY OF SALTSTONE AND SALTSTONE COMPONENTS

    SciTech Connect (OSTI)

    Roberts, K.; Kaplan, D.

    2009-11-30T23:59:59.000Z

    The duration that saltstone retains its ability to immobilize some key radionuclides, such as technetium (Tc), plutonium (Pu), and neptunium (Np), depends on its capacity to maintain a low redox status (or low oxidation state). The reduction capacity is a measure of the mass of reductants present in the saltstone; the reductants are the active ingredients that immobilize Tc, Pu, and Np. Once reductants are exhausted, the saltstone loses its ability to immobilize these radionuclides. The reduction capacity values reported here are based on the Ce(IV)/Fe(II) system. The Portland cement (198 {micro}eq/g) and especially the fly ash (299 {micro}eq/g) had a measurable amount of reduction capacity, but the blast furnace slag (820 {micro}eq/g) not surprisingly accounted for most of the reduction capacity. The blast furnace slag contains ferrous iron and sulfides which are strong reducing and precipitating species for a large number of solids. Three saltstone samples containing 45% slag or one sample containing 90% slag had essentially the same reduction capacity as pure slag. There appears to be some critical concentration between 10% and 45% slag in the Saltstone formulation that is needed to create the maximum reduction capacity. Values from this work supported those previously reported, namely that the reduction capacity of SRS saltstone is about 820 {micro}eq/g; this value is recommended for estimating the longevity that the Saltstone Disposal Facility will retain its ability to immobilize radionuclides.

  13. A Qualitative Examination of the History of E-Extension (eXtension), Implementation of Moodle (A Course Management System) and Associated Strengths, Weaknesses, Opportunities and Threats

    E-Print Network [OSTI]

    Hightower, Tayla Elise

    2011-08-08T23:59:59.000Z

    ) in Extension. The second part sought to identify the strengths, weaknesses, opportunities and threats (SWOT) related to the use of Moodle as a Course Management System within eXtension. Interviews were conducted with five individuals knowledgeable...

  14. Climate VISION: Private Sector Initiatives: Cement: Resources...

    Office of Scientific and Technical Information (OSTI)

    Resources & Links Technical Information Publications Case Studies Publications Energy Efficiency and Carbon Dioxide Emission Reduction Opportunities in the U.S. Cement Industry,...

  15. Climate VISION: Private Sector Initiatives: Semiconductors

    Office of Scientific and Technical Information (OSTI)

    Agreements The U.S. semiconductor industry, represented by the members of the Environmental Protection Agency's PFC ReductionClimate Partnership for the Semiconductor...

  16. NOx reduction in gas turbine combustors

    E-Print Network [OSTI]

    Sung, Nak Won

    1976-01-01T23:59:59.000Z

    NOx REDUCTION IN GAS TURBINE COMBUSTORS A Thesis by Nak Won Sung Submitted to the Graduate College of Texas A&M University in partial fullfillment of the requirement for the degree of MASTER OF SCIENCE August 1976 Major Subject: Mechanical... Engineering NOx REDUCTION IN GAS TURBINE COMBUSTORS A Thesis by Nak Won Sung Approved as to style and content by: (Chairman of Committe (Head of Department) (Member) August 1976 "40308 (Member) 1 1. 1 ABSTRACT NOx Reduction in Gas Turbine...

  17. Plug-in Hybrid Initiative

    SciTech Connect (OSTI)

    Goodman, Angie; Moore, Ray; Rowden, Tim

    2013-09-27T23:59:59.000Z

    Our main project objective was to implement Plug-in Electric Vehicles (PEV) and charging infrastructure into our electric distribution service territory and help reduce barriers in the process. Our research demonstrated the desire for some to be early adopters of electric vehicles and the effects lack of education plays on others. The response of early adopters was tremendous: with the initial launch of our program we had nearly 60 residential customers interested in taking part in our program. However, our program only allowed for 15 residential participants. Our program provided assistance towards purchasing a PEV and installation of Electric Vehicle Supply Equipment (EVSE). The residential participants have all come to love their PEVs and are more than enthusiastic about promoting the many benefits of driving electric.

  18. Direct laser initiation of PETN

    SciTech Connect (OSTI)

    Early, J. W. (James W.); Kennedy, J. E. (James E.)

    2001-01-01T23:59:59.000Z

    In the early 1970s Yang and Menichelli demonstrated that direct laser illumination of low-density secondary explosive prr:ssings through a transparent window could produce detonation. 'The energy requirement for threshold initiation of detonation was reduced when a thin metal coating of metal covered the side of the window against which the low-density explosive was pressed. We have obtained experimental results that are in general agreement with the results of Renllund, Stanton and Trott (1 989) and recent: work by Nagayama, hou and Nakahara (2001). We report exploration of the effects of laser beam diameter, PEiTN density and specific surface area, and thickness of a titanium coating on the window.

  19. Waste Characterization, Reduction, and Repackaging Facility ...

    Office of Environmental Management (EM)

    Operations, EP-WCRR-WO-DOP-0233 Waste Characterization, Reduction, and Repackaging Facility (WCRRF) Waste Characterization Glovebox Operations, EP-WCRR-WO-DOP-0233 The documents...

  20. Plasma Assisted Catalysis System for NOx Reduction

    Broader source: Energy.gov (indexed) [DOE]

    2 NOXTECH NOXTECH PLASMA ASSISTED CATALYSIS SYSTEM FOR NOx REDUCTION BY NOXTECH With the Support & Cooperation of DOE Noxtech, Inc. *Delaware Corporation registered to do business...

  1. CoolCab Truck Thermal Load Reduction

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    - On-board idle reduction technologies * Bergstrom battery electric AC * Airtronic diesel-fired heater * Objectives - Quantify truck cabin heat transfer - Identify potential...

  2. RMOTC to Test Oil Viscosity Reduction Technology

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    RMOTC to Test Oil Viscosity Reduction Technology The Rocky Mountain Oilfield Testing Center (RMOTC) announces that the "Teapot Dome" oil field in Wyoming is hosting a series of...

  3. Metal Artifact Reduction in Computed Tomography /

    E-Print Network [OSTI]

    Karimi, Seemeen

    2014-01-01T23:59:59.000Z

    Monoenergetic imaging of dual-energy CT reduces artifactsartifact reduction by dual energy computed tomography usingimage re- construction for dual energy X-ray transmission

  4. Pollution Prevention - Environmental Impact Reduction Checklists...

    Broader source: Energy.gov (indexed) [DOE]

    provides a valuable opportunity for Federal agency NEPA309 reviewers to incorporate pollution prevention and environmental impact reduction into actions (or projects). This...

  5. PLAINS CO2 REDUCTION PARTNERSHIP

    SciTech Connect (OSTI)

    Edward N. Steadman; John A. Harju; Erin M. O'Leary; James A. Sorensen; Daniel J. Daly; Melanie D. Jensen; Thea E. Reikoff

    2005-04-01T23:59:59.000Z

    The Plains CO{sub 2} Reduction (PCOR) Partnership continues to make great progress. Task 2 (Technology Deployment) focused on developing information regarding deployment issues to support Task 5 (Modeling and Phase II Action Plans) and provided information to be used to assess CO{sub 2} sequestration opportunities in the PCOR Partnership region. Task 2 efforts also included preparation of a draft topical report entitled ''Deployment Issues Related to Geologic CO{sub 2} Sequestration in the PCOR Partnership Region'', which is nearing completion. Task 3 (Public Outreach) focused on developing an informational video about CO{sub 2} sequestration. The video will be completed and aired on Prairie Public Television in the next quarter. Progress in Task 4 (Sources, Sinks, and Infrastructure) included the continued collection of data regarding CO{sub 2} sources and sinks and data on the performance and costs for CO{sub 2} separation, capture, treatment, and compression for pipeline transportation. The addition of the Canadian province of Alberta to the PCOR Partnership region expanded the decision support system (DSS) geographic information system database. Task 5 screened and qualitatively assessed sequestration options. Task 5 activities also continue to be useful in structuring data collection and other activities in Tasks 2, 3, and 5.

  6. PLAINS CO2 REDUCTION PARTNERSHIP

    SciTech Connect (OSTI)

    Edward N. Steadman; John A. Harju; Erin M. O'Leary; James A. Sorensen; Daniel J. Daly; Melanie D. Jensen; Lisa S. Botnen

    2005-07-01T23:59:59.000Z

    The Plains CO{sub 2} Reduction (PCOR) Partnership characterization work is nearing completion, and most remaining efforts are related to finalizing work products. Task 2 (Technology Deployment) has developed a Topical Report entitled ''Deployment Issues Related to Geologic CO{sub 2} Sequestration in the PCOR Partnership Region''. Task 3 (Public Outreach) has developed an informational Public Television program entitled ''Nature in the Balance'', about CO{sub 2} sequestration. The program was completed and aired on Prairie Public Television in this quarter. Task 4 (Sources, Sinks, and Infrastructure) efforts are nearing completion, and data regarding CO{sub 2} sources and sinks and data on the performance and costs for CO{sub 2} separation, capture, treatment, and compression for pipeline transportation are being incorporated into a series of topical reports. The expansion of the Decision Support System Geographic Information System database has continued with the development of a ''save bookmark'' feature that allows users to save a map from the system easily. A feature that allows users to develop a report that summarizes CO{sub 2} sequestration parameters was also developed. Task 5 (Modeling and Phase II Action Plans) focused on screening and qualitatively assessing sequestration options and developing economic estimates for important regional CO{sub 2} sequestration strategies.

  7. NOx reduction methods and apparatuses

    DOE Patents [OSTI]

    Tonkyn, Russell G.; Barlow, Stephan E.; Balmer, M. Lou; Maupin, Gary D.

    2004-10-26T23:59:59.000Z

    A NO.sub.x reduction method includes treating a first gas containing NO.sub.x, producing a second gas containing NO.sub.2, reducing a portion of the NO.sub.2 in the second gas to N.sub.2, and producing a third gas containing less NO.sub.x than the first gas, substantially all of the third gas NO.sub.x being NO. The method also includes treating the third gas, producing a fourth gas containing NO.sub.2, reducing a portion of the NO.sub.2 in the fourth gas to N.sub.2, and producing a fifth gas containing less NO.sub.x than the third gas, substantially all of the fifth gas NO.sub.x being NO. Treating the first and/or third gas can include treatment with a plasma. Reducing a portion of the NO.sub.2 in the second and/or fourth gas can include reducing with a catalyst. The method can further include controlling energy consumption of the plasmas independent of each other.

  8. Electrical initiation of an energetic nanolaminate film

    DOE Patents [OSTI]

    Tringe, Joseph W. (Walnut Creek, CA); Gash, Alexander E. (Brentwood, CA); Barbee, Jr., Troy W. (Palo Alto, CA)

    2010-03-30T23:59:59.000Z

    A heating apparatus comprising an energetic nanolaminate film that produces heat when initiated, a power source that provides an electric current, and a control that initiates the energetic nanolaminate film by directing the electric current to the energetic nanolaminate film and joule heating the energetic nanolaminate film to an initiation temperature. Also a method of heating comprising providing an energetic nanolaminate film that produces heat when initiated, and initiating the energetic nanolaminate film by directing an electric current to the energetic nanolaminate film and joule heating the energetic nanolaminate film to an initiation temperature.

  9. Adaptive dimension reduction for clustering high dimensional data Chris Ding a , Xiaofeng He a , Hongyuan Zha b and Horst D. Simon a

    E-Print Network [OSTI]

    Ding, Chris

    ) and reduces computational cost. In most applications, dimension reduction is carried out as a preprocessingAdaptive dimension reduction for clustering high dimensional data Chris Ding a , Xiaofeng He in local minimum. Many initialization methods were proposed to tackle this problem , but with only limited

  10. Overview of reductants utilized in nuclear fuel reprocessing/recycling

    SciTech Connect (OSTI)

    Patricia Paviet-Hartmann; Catherine Riddle; Keri Campbell; Edward Mausolf

    2013-10-01T23:59:59.000Z

    Most of the aqueous processes developed, or under consideration worldwide for the recycling of used nuclear fuel (UNF) utilize the oxido-reduction properties of actinides to separate them from other radionuclides. Generally, after acid dissolution of the UNF, (essentially in nitric acid solution), actinides are separated from the raffinate by liquid-liquid extraction using specific solvents, associated along the process, with a particular reductant that will allow the separation to occur. For example, the industrial PUREX process utilizes hydroxylamine as a plutonium reductant. Hydroxylamine has numerous advantages: not only does it have the proper attributes to reduce Pu(IV) to Pu(III), but it is also a non-metallic chemical that is readily decomposed to innocuous products by heating. However, it has been observed that the presence of high nitric acid concentrations or impurities (such as metal ions) in hydroxylamine solutions increase the likelihood of the initiation of an autocatalytic reaction. Recently there has been some interest in the application of simple hydrophilic hydroxamic ligands such as acetohydroxamic acid (AHA) for the stripping of tetravalent actinides in the UREX process flowsheet. This approach is based on the high coordinating ability of hydroxamic acids with tetravalent actinides (Np and Pu) compared with hexavalent uranium. Thus, the use of AHA offers a route for controlling neptunium and plutonium in the UREX process by complexant based stripping of Np(IV) and Pu(IV) from the TBP solvent phase, while U(VI) ions are not affected by AHA and remain solvated in the TBP phase. In the European GANEX process, AHA is also used to form hydrophilic complexes with actinides and strip them from the organic phase into nitric acid. However, AHA does not decompose completely when treated with nitric acid and hampers nitric acid recycling. In lieu of using AHA in the UREX + process, formohydroxamic acid (FHA), although not commercially available, hold promises as a replacement for AHA. FHA undergoes hydrolysis to formic acid which is volatile, thus allowing the recycling of nitric acid. Unfortunately, FHA powder was not stable in the experiments we ran in our laboratory. In addition, AHA and FHA also decompose to hydroxylamine which may undergo an autocatalytic reaction. Other reductants are available and could be extremely useful for actinides separation. The review presents the current plutonium reductants used in used nuclear fuel reprocessing and will introduce innovative and novel reductants that could become reducers for future research on UNF separation.

  11. Physical protection: threat response and performance goals as applied at the nuclear material inspection and storage (NMIS) building

    SciTech Connect (OSTI)

    Sanford, T.H.

    1982-01-01T23:59:59.000Z

    Only one aspect of nuclear security has been discussed here, a disciplined approach to physical protection systems (PPS) design. The best security against a multitude of threats to the nuclear industry is a dynamic and multifaceted safeguards program. It is one that combines PPS design with employee screening, reliability or behavioral observation programs, procedural control, assessment techniques, response capabilities, and security hardware. To be effective, such a program must be supported by management and applied uniformly to all personnel, including the safeguards and security staff.

  12. CALIFORNIA SOLAR INITIATIVE-THERMAL PROGRAMHANDBOOK

    E-Print Network [OSTI]

    CALIFORNIA SOLAR INITIATIVE-THERMAL PROGRAMHANDBOOK CALIFORNIA PUBLIC UTILITIES California Solar Initiative Thermal Program Handbook i 1. Introduction to CSI-Thermal Program....................................................................................3 2.1.1 Host Customer

  13. Childhood Cancer Tracking Initiative in Massachusetts

    E-Print Network [OSTI]

    Childhood Cancer Tracking Initiative in Massachusetts: Developing a New Electronic Tool Presented (CEH) Massachusetts Department of Public Health (MDPH) #12;Childhood Cancer Tracking Initiative "Develop methods for linking environmental databases with childhood cancer incidence data to identify

  14. California Solar Initiative California Public Utilities Commission

    E-Print Network [OSTI]

    California Solar Initiative California Public Utilities Commission Staff Progress Report July 2008 #12;California Solar Initiative, CPUC Staff Progress Report, July 2008 Cover Photo Credits: Photographer: Andrew McKinney Name of Installer: Marin Solar System owner

  15. Steam Load Reduction Guidance Emergency Management Program

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Steam Load Reduction Guidance Emergency Management Program v October 2014 Steam_Load_Reduction_Guidance_DSRDSR 1.0 PurposeandScope Utilities provides steam to the campus community for space heating, hot water in the steam distribution system or the Central Energy Plant, the preservation of building infrastructure

  16. aeolicus initiates primer: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Juan A. Valiente Kroon 2007-12-20 203 Column Initialization 1 Initializing Distillation Column Models 1 Mathematics Websites Summary: Column Initialization 1 Initializing...

  17. a549 cells initial: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Juan A. Valiente Kroon 2007-12-20 93 Column Initialization 1 Initializing Distillation Column Models 1 Mathematics Websites Summary: Column Initialization 1 Initializing...

  18. aspa initial results: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Juan A. Valiente Kroon 2007-12-20 192 Column Initialization 1 Initializing Distillation Column Models 1 Mathematics Websites Summary: Column Initialization 1 Initializing...

  19. areas initial results: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Juan A. Valiente Kroon 2007-12-20 269 Column Initialization 1 Initializing Distillation Column Models 1 Mathematics Websites Summary: Column Initialization 1 Initializing...

  20. aachen aspa initial: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A. Valiente Kroon 2007-12-20 137 Column Initialization 1 Initializing Distillation Column Models 1 Mathematics Websites Summary: Column Initialization 1 Initializing...

  1. aav initiator protein: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Juan A. Valiente Kroon 2007-12-20 94 Column Initialization 1 Initializing Distillation Column Models 1 Mathematics Websites Summary: Column Initialization 1 Initializing...

  2. aquifex aeolicus initiates: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Juan A. Valiente Kroon 2007-12-20 44 Column Initialization 1 Initializing Distillation Column Models 1 Mathematics Websites Summary: Column Initialization 1 Initializing...

  3. adenocarcinomas initial clinical: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Juan A. Valiente Kroon 2007-12-20 98 Column Initialization 1 Initializing Distillation Column Models 1 Mathematics Websites Summary: Column Initialization 1 Initializing...

  4. REDUCTIONS WITHOUT REGRET: DETAILS - AVOIDING BOX CANYONS, ROACH MOTELS, AND WRONG TURNS

    SciTech Connect (OSTI)

    Swegle, John A.; Tincher, Douglas J.

    2013-08-09T23:59:59.000Z

    The United States is concurrently pursuing the goals of reducing the size of its nuclear weapons force – strategic and non-strategic, deployed and non-deployed – and of modernizing the weapons it continues to possess. Many of the existing systems were deployed 30 to 50 years ago, and the modernization process can be expected to extend over the next decade or more. Given the impossibility of predicting the future over the lifetime of systems that could extend to the end of this century, it is essential that dead ends in force development be avoided, and the flexibility and availability of options be retained that allow for • Scalability downward in the event that further reductions are agreed upon; • Reposturing to respond to changes in threat levels and to new nuclear actors; and • Breakout response in the event that a competitor significantly increases its force size or force capability, In this paper, we examine the current motivations for reductions and modernization; review a number of historical systems and the attendant capabilities that have been eliminated in recent decades; discuss the current path forward for the U.S. nuclear force; provide a view of the evolving deterrence situation and our assessment of the uncertainties involved; and present examples of possibly problematic directions in force development. We close with our thoughts on how to maintain flexibility and the availability of options for which a need might recur in the future.

  5. Voluntary Initiative: Partnering to Enhance Program Capacity...

    Energy Savers [EERE]

    to Enhance Program Capacity Better Buildings Residential Network Program Sustainability Peer Exchange Call Series: Voluntary Initiative: Partnering to Enhance Program...

  6. Clean Energy Manufacturing Initiative Industrial Efficiency and...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Industrial Efficiency and Energy Productivity Video Clean Energy Manufacturing Initiative Industrial Efficiency and Energy Productivity Video Addthis Description Industrial...

  7. Agricultural pathogen decontamination technology-reducing the threat of infectious agent spread.

    SciTech Connect (OSTI)

    Betty, Rita G.; Bieker, Jill Marie; Tucker, Mark David

    2005-10-01T23:59:59.000Z

    Outbreaks of infectious agricultural diseases, whether natural occurring or introduced intentionally, could have catastrophic impacts on the U.S. economy. Examples of such agricultural pathogens include foot and mouth disease (FMD), avian influenza (AI), citrus canker, wheat and soy rust, etc. Current approaches to mitigate the spread of agricultural pathogens include quarantine, development of vaccines for animal diseases, and development of pathogen resistant crop strains in the case of plant diseases. None of these approaches is rapid, and none address the potential persistence of the pathogen in the environment, which could lead to further spread of the agent and damage after quarantine is lifted. Pathogen spread in agricultural environments commonly occurs via transfer on agricultural equipment (transportation trailers, tractors, trucks, combines, etc.), having components made from a broad range of materials (galvanized and painted steel, rubber tires, glass and Plexiglas shields, etc), and under conditions of heavy organic load (mud, soil, feces, litter, etc). A key element of stemming the spread of an outbreak is to ensure complete inactivation of the pathogens in the agricultural environment and on the equipment used in those environments. Through the combination of enhanced agricultural pathogen decontamination chemistry and a validated inactivation verification methodology, important technologies for incorporation as components of a robust response capability will be enabled. Because of the potentially devastating economic impact that could result from the spread of infectious agricultural diseases, the proposed capability components will promote critical infrastructure protection and greater border and food supply security. We investigated and developed agricultural pathogen decontamination technologies to reduce the threat of infectious-agent spread, and thus enhance agricultural biosecurity. Specifically, enhanced detergency versions of the patented Sandia decontamination chemistry were developed and tested against a few surrogate pathogens under conditions of relatively heavy organic load. Tests were conducted on surfaces commonly found in agricultural environments. Wide spectrum decontamination efficacy, low corrosivity, and biodegradability issues were addressed in developing an enhanced detergency formulation. A method for rapid assessment of loss of pathogenic activity (inactivation) was also assessed. This enhanced technology will enable rapid assessment of contamination following an intentional event, and will also be extremely useful in routine assessment of agricultural environments. The primary effort during the second year was progress towards a demonstration of both decontamination and viral inactivation technologies of Foot and Mouth virus (FMDv) using the modified SNL chemistry developed through this project. Lab studies using a surrogate virus (bovine enterovirus) were conducted using DF200, modified DF200 chemistry, and decontaminants currently recommended for use in heavily loaded organic, agricultural environments (VirkonS, 10% bleach, sodium hydroxide and citric acid). Tests using actual FMD virus will be performed at the Department of Homeland Security's Plum Island facilities in the fall of 2005. Success and the insight gained from this project will lead to enhanced response capability, which will benefit agencies such as USDA, DHS, DOD, and the agricultural industry.

  8. Safeguards and security by design (SSBD) for the domestic threat - theft and sabotage

    SciTech Connect (OSTI)

    Demuth, Scott F [Los Alamos National Laboratory; Mullen, Mark [Los Alamos National Laboratory

    2011-10-05T23:59:59.000Z

    Safeguards by Design (SBD) is receiving significant interest with respect to international safeguards objectives. However, less attention has been focused on the equally important topic of domestic Safeguards and Security by Design (SSBD), which addresses requirements such as those of the Nuclear Regulatory Commission (NRC) in the United States. While international safeguards are concerned with detecting State diversion of nuclear material from peaceful to nuclear explosives purposes, domestic Material Protection, Control and Accounting measures (MPC&A) are focused on non-State theft and sabotage. The International Atomic Energy Agency (IAEA) has described the Safeguards by Design (SBD) concept as an approach in which 'international safeguards are fully integrated into the design process of a new nuclear facility from the initial planning through design, construction, operation, and decommissioning.' This same concept is equally applicable to SSBD for domestic requirements. The United States Department of Energy (DOE) has initiated a project through its Office of Nuclear Energy (NE) and more specifically its Fuel Cycle Research and Development (FCRD) program, to develop a domestic SSBD discipline and methodology in parallel with similar efforts sponsored by the DOE Next Generation Safeguards Initiative (NGSI) and the IAEA for international safeguards. This activity includes the participation of industry (through DOE-sponsored contracts) and DOE National Laboratories. This paper will identify the key domestic safeguards and security requirements (i.e. MC&A and physical protection) and explain how and why Safeguards and Security by Design (SSBD) is important and beneficial for the design of future US nuclear energy systems.

  9. Explosive laser light initiation of propellants

    DOE Patents [OSTI]

    Piltch, M.S.

    1993-05-18T23:59:59.000Z

    A improved initiator for artillery shell using an explosively generated laser light to uniformly initiate the propellent. A small quantity of a high explosive, when detonated, creates a high pressure and temperature, causing the surrounding noble gas to fluoresce. This fluorescence is directed into a lasing material, which lases, and directs laser light into a cavity in the propellant, uniformly initiating the propellant.

  10. California Solar Initiative California Public Utilities Commission

    E-Print Network [OSTI]

    California Solar Initiative California Public Utilities Commission Staff Progress Report January 2009 #12;2 California Solar Initiative CPUC Staff Progress Report - January 2009 The California Public progress on the California Solar Initiative, the country's largest solar incentive program. In January 2007

  11. California Solar Initiative California Public Utilities Commission

    E-Print Network [OSTI]

    California Solar Initiative California Public Utilities Commission Staff Progress Report October 2008 #12;2 California Solar Initiative CPUC Staff Progress Report - October 2008 The California Public progress on the California Solar Initiative, the country's largest solar incentive program. In January 2007

  12. Shock Initiation of Damaged Explosives

    SciTech Connect (OSTI)

    Chidester, S K; Vandersall, K S; Tarver, C M

    2009-10-22T23:59:59.000Z

    Explosive and propellant charges are subjected to various mechanical and thermal insults that can increase their sensitivity over the course of their lifetimes. To quantify this effect, shock initiation experiments were performed on mechanically and thermally damaged LX-04 (85% HMX, 15% Viton by weight) and PBX 9502 (95% TATB, 5% Kel-F by weight) to obtain in-situ manganin pressure gauge data and run distances to detonation at various shock pressures. We report the behavior of the HMX-based explosive LX-04 that was damaged mechanically by applying a compressive load of 600 psi for 20,000 cycles, thus creating many small narrow cracks, or by cutting wedge shaped parts that were then loosely reassembled, thus creating a few large cracks. The thermally damaged LX-04 charges were heated to 190 C for long enough for the beta to delta solid - solid phase transition to occur, and then cooled to ambient temperature. Mechanically damaged LX-04 exhibited only slightly increased shock sensitivity, while thermally damaged LX-04 was much more shock sensitive. Similarly, the insensitive explosive PBX 9502 was mechanically damaged using the same two techniques. Since PBX 9502 does not undergo a solid - solid phase transition but does undergo irreversible or 'rachet' growth when thermally cycled, thermal damage to PBX 9502 was induced by this procedure. As for LX-04, the thermally damaged PBX 9502 demonstrated a greater shock sensitivity than mechanically damaged PBX 9502. The Ignition and Growth reactive flow model calculated the increased sensitivities by igniting more damaged LX-04 and PBX 9502 near the shock front based on the measured densities (porosities) of the damaged charges.

  13. Suspension Hydrogen Reduction of Iron Oxide Concentrates

    SciTech Connect (OSTI)

    H.Y. Sohn

    2008-03-31T23:59:59.000Z

    The objective of the project is to develop a new ironmaking technology based on hydrogen and fine iron oxide concentrates in a suspension reduction process. The ultimate objective of the new technology is to replace the blast furnace and to drastically reduce CO2 emissions in the steel industry. The goals of this phase of development are; the performance of detailed material and energy balances, thermochemical and equilibrium calculations for sulfur and phosphorus impurities, the determination of the complete kinetics of hydrogen reduction and bench-scale testing of the suspension reduction process using a large laboratory flash reactor.

  14. Nox reduction system utilizing pulsed hydrocarbon injection

    DOE Patents [OSTI]

    Brusasco, Raymond M. (Livermore, CA); Penetrante, Bernardino M. (San Ramon, CA); Vogtlin, George E. (Fremont, CA); Merritt, Bernard T. (Livermore, CA)

    2001-01-01T23:59:59.000Z

    Hydrocarbon co-reductants, such as diesel fuel, are added by pulsed injection to internal combustion engine exhaust to reduce exhaust NO.sub.x to N.sub.2 in the presence of a catalyst. Exhaust NO.sub.x reduction of at least 50% in the emissions is achieved with the addition of less than 5% fuel as a source of the hydrocarbon co-reductants. By means of pulsing the hydrocarbon flow, the amount of pulsed hydrocarbon vapor (itself a pollutant) can be minimized relative to the amount of NO.sub.x species removed.

  15. Highway noise reduction by barrier walls

    E-Print Network [OSTI]

    Young, Murray F

    1971-01-01T23:59:59.000Z

    's Variables 3. Noise Reduction and Noise Reduction Factor 4. Relationship Between Noise Attenuation and d 5. Rettinger's Variables 6. Relationship of Sound-Level Reduction and v 7. Basic Principles in Sound-Transmission Loss 8. The Mass Law Relationship... that the barrier wall is acoustically opaque (i. e. , impermeable to sound waves). Purcell (8) found that the noise transmission loss of a wall was a measure of the ratio of the acoustical energy transmitted through the wall to the acoustical energy incident...

  16. Graphics processing units accelerated semiclassical initial value representation molecular dynamics

    SciTech Connect (OSTI)

    Tamascelli, Dario; Dambrosio, Francesco Saverio [Dipartimento di Fisica, Universitŕ degli Studi di Milano, via Celoria 16, 20133 Milano (Italy)] [Dipartimento di Fisica, Universitŕ degli Studi di Milano, via Celoria 16, 20133 Milano (Italy); Conte, Riccardo [Department of Chemistry and Cherry L. Emerson Center for Scientific Computation, Emory University, Atlanta, Georgia 30322 (United States)] [Department of Chemistry and Cherry L. Emerson Center for Scientific Computation, Emory University, Atlanta, Georgia 30322 (United States); Ceotto, Michele, E-mail: michele.ceotto@unimi.it [Dipartimento di Chimica, Universitŕ degli Studi di Milano, via Golgi 19, 20133 Milano (Italy)] [Dipartimento di Chimica, Universitŕ degli Studi di Milano, via Golgi 19, 20133 Milano (Italy)

    2014-05-07T23:59:59.000Z

    This paper presents a Graphics Processing Units (GPUs) implementation of the Semiclassical Initial Value Representation (SC-IVR) propagator for vibrational molecular spectroscopy calculations. The time-averaging formulation of the SC-IVR for power spectrum calculations is employed. Details about the GPU implementation of the semiclassical code are provided. Four molecules with an increasing number of atoms are considered and the GPU-calculated vibrational frequencies perfectly match the benchmark values. The computational time scaling of two GPUs (NVIDIA Tesla C2075 and Kepler K20), respectively, versus two CPUs (Intel Core i5 and Intel Xeon E5-2687W) and the critical issues related to the GPU implementation are discussed. The resulting reduction in computational time and power consumption is significant and semiclassical GPU calculations are shown to be environment friendly.

  17. Climate VISION: Private Sector Initiatives: Mining: Results

    Office of Scientific and Technical Information (OSTI)

    Results No measured results exist at this time in terms of greenhouse gas intensity reductions, given the recent start-up of the Climate VISION program and evolving industry...

  18. Climate VISION: Private Sector Initiatives: Semiconductors: Resources...

    Office of Scientific and Technical Information (OSTI)

    by Scott Bartos, U.S. EPA. Estimating the Impact of Migration to Asian Foundry Production on Attaining the WSC 2010 PFC Reduction Goal. (PDF 458 KB) 11th Annual ISESH...

  19. Climate VISION: Private Sector Initiatives: Cement - Results

    Office of Scientific and Technical Information (OSTI)

    time in terms of greenhouse gas intensity reductions, given the recent start-up of the Climate VISION program and evolving industry commitments. As the program develops and the...

  20. Climate VISION: Private Sector Initiatives: Automobile Manufacturers...

    Office of Scientific and Technical Information (OSTI)

    time in terms of greenhouse gas intensity reductions, given the recent start-up of the Climate VISION program and evolving industry commitments. As the program develops and the...