Powered by Deep Web Technologies
Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

January 2013 Most Viewed Documents for Mathematics And Computing...  

Office of Scientific and Technical Information (OSTI)

January 2013 Most Viewed Documents for Mathematics And Computing Cybersecurity through Real-Time Distributed Control Systems Kisner, Roger A ORNL; Manges, Wayne W ORNL;...

2

March 2014 Most Viewed Documents for National Defense | OSTI...  

Office of Scientific and Technical Information (OSTI)

2014 Most Viewed Documents for National Defense Science Subject Feed The Effects of Nuclear Weapons Glasstone, Samuel (1964) 72 SMART BRIDGE: A tool for estimating the military...

3

July 2013 Most Viewed Documents for Renewable Energy Sources...  

Office of Scientific and Technical Information (OSTI)

2013 Most Viewed Documents for Renewable Energy Sources Science Subject Feed Chapter 11. Heat Exchangers Rafferty, Kevin D.; Culver, Gene (1998) 484 > Environmental Impacts of...

4

April 2013 Most Viewed Documents for Renewable Energy Sources...  

Office of Scientific and Technical Information (OSTI)

2013 Most Viewed Documents for Renewable Energy Sources Science Subject Feed Chapter 11. Heat Exchangers Rafferty, Kevin D.; Culver, Gene (1998) 1252 > Seventh Edition Fuel Cell...

5

September 2013 Most Viewed Documents for Fission And Nuclear...  

Office of Scientific and Technical Information (OSTI)

September 2013 Most Viewed Documents for Fission And Nuclear Technologies Science Subject Feed Estimation of gas leak rates through very small orifices and channels. From sealed...

6

January 2013 Most Viewed Documents for Fission And Nuclear Technologie...  

Office of Scientific and Technical Information (OSTI)

January 2013 Most Viewed Documents for Fission And Nuclear Technologies Laboratory studies of shearleach processing of zircaloy clad metallic uranium reactor fuel Swanson, J.L.;...

7

January 2013 Most Viewed Documents for Chemistry | OSTI, US Dept...  

Office of Scientific and Technical Information (OSTI)

January 2013 Most Viewed Documents for Chemistry Dialkylenecarbonate-Bridged Polysilsesquioxanes. Hybrid Organic-Inorganic Sol-Gels with a Thermally Labile Bridging Group Assink,...

8

June 2014 Most Viewed Documents for Fission And Nuclear Technologies...  

Office of Scientific and Technical Information (OSTI)

June 2014 Most Viewed Documents for Fission And Nuclear Technologies Behavior of spent nuclear fuel in water pool storage Johnson, A.B. Jr. (1977) 78 Estimation of gas leak rates...

9

July 2013 Most Viewed Documents for Fission And Nuclear Technologies...  

Office of Scientific and Technical Information (OSTI)

July 2013 Most Viewed Documents for Fission And Nuclear Technologies Science Subject Feed Estimation of gas leak rates through very small orifices and channels. From sealed PuO...

10

July 2013 Most Viewed Documents for Chemistry | OSTI, US Dept...  

Office of Scientific and Technical Information (OSTI)

July 2013 Most Viewed Documents for Chemistry Science Subject Feed Lithium literature review: lithium's properties and interactions Jeppson, D.W.; Ballif, J.L.; Yuan, W.W.; Chou,...

11

September 2013 Most Viewed Documents for National Defense | OSTI, US Dept  

Office of Scientific and Technical Information (OSTI)

September 2013 Most Viewed Documents for National Defense September 2013 Most Viewed Documents for National Defense SMART BRIDGE: A tool for estimating the military load classification of bridges using varying levels of information Van Groningen, C.N.; Paddock, R.A. (1997) 34 Left-Wing Extremism: The Current Threat Karl A. Seger (2001) 28 The Elusive Coefficients of Thermal Expansion in PBX 9502 C.B. Skidmore; T.A. Butler; C.W. Sandoval (2003) 28 Background chemistry for chemical warfare agents and decontamination processes in support of delisting waste streams at the U.S. Army Dugway Proving Ground, Utah Rosenblatt, D.H.; Small, M.J.; Kimmell, T.A.; Anderson, A.W. (1996) 27 MineSeis -- A MATLAB{reg_sign} GUI program to calculate synthetic seismograms from a linear, multi-shot blast source model Yang, X. (1998) 26 Comments on TNT Equivalence

12

September 2013 Most Viewed Documents for Energy Storage, Conversion, And  

Office of Scientific and Technical Information (OSTI)

September 2013 Most Viewed Documents for Energy Storage, Conversion, And September 2013 Most Viewed Documents for Energy Storage, Conversion, And Utilization Process Equipment Cost Estimation, Final Report H.P. Loh; Jennifer Lyons; Charles W. White, III (2002) 169 Evaluation of the 2010 Toyota Prius Hybrid Synergy Drive System Burress, Timothy A [ORNL]; Campbell, Steven L [ORNL]; Coomer, Chester [ORNL]; Ayers, Curtis William [ORNL]; Wereszczak, Andrew A [ORNL]; Cunningham, Joseph Philip [ORNL]; Marlino, Laura D [ORNL]; Seiber, Larry Eugene [ORNL]; Lin, Hua-Tay [ORNL] (2011) 116 Evaluation of the 2007 Toyota Camry Hybrid Syneregy Drive System Burress, T.A.; Coomer, C.L.; Campbell, S.L.; Seiber, L.E.; Marlino, L.D.; Staunton, R.H.; Cunningham, J.P. (2008) 102 A study of lead-acid battery efficiency near top-of-charge and the impact on PV system design

13

Most Viewed Documents - Mathematics and Computing | OSTI, US Dept of  

Office of Scientific and Technical Information (OSTI)

Most Viewed Documents - Mathematics and Computing Most Viewed Documents - Mathematics and Computing Metaphors for cyber security. Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H. (2008) Staggered-grid finite-difference acoustic modeling with the Time-Domain Atmospheric Acoustic Propagation Suite (TDAAPS). Aldridge, David Franklin; Collier, Sandra L. (U.S. Army Research Laboratory); Marlin, David H. (U.S. Army Research Laboratory); et al. (2005) Salinas : theory manual. Walsh, Timothy Francis; Reese, Garth M.; Bhardwaj, Manoj Kumar (2004) LANL Site Update Armstrong, Harold G [Los Alamos National Laboratory] (2012) Scientific Data Management Integrated Software Infrastructure Center (SDM/ISIC): Scientific Process Automation (SPA), FINAL REPORT Bertram Ludaescher; Ilkay Altintas (2012) HPC Utilities

14

April 2013 Most Viewed Documents for Energy Storage, Conversion, And  

Office of Scientific and Technical Information (OSTI)

April 2013 Most Viewed Documents for Energy Storage, Conversion, And April 2013 Most Viewed Documents for Energy Storage, Conversion, And Utilization Seventh Edition Fuel Cell Handbook NETL (2004) 628 Continuously variable transmissions: theory and practice Beachley, N.H.; Frank, A.A. (null) 205 A study of lead-acid battery efficiency near top-of-charge and the impact on PV system design Stevens, J.W.; Corey, G.P. (1996) 173 Energy Saving Potentials and Air Quality Benefits of Urban HeatIslandMitigation Akbari, Hashem (2005) 153 Building a secondary containment system Broder, M.F. (1994) 144 An Improved Method of Manufacturing Corrugated Boxes: Lateral Corrugator Frank C. Murray Ph.D.; , Roman Popil Ph.D.; Michael Shaepe (formerly with IPST, now at Cargill. Inc) (2008) 141 Ammonia usage in vapor compression for refrigeration and air-conditioning in the United States

15

Most Viewed Documents - Energy Storage, Conversion, and Utilization | OSTI,  

Office of Scientific and Technical Information (OSTI)

Most Viewed Documents - Energy Storage, Conversion, and Utilization Most Viewed Documents - Energy Storage, Conversion, and Utilization Process Equipment Cost Estimation, Final Report H.P. Loh; Jennifer Lyons; Charles W. White, III (2002) Continuously variable transmissions: theory and practice Beachley, N.H.; Frank, A.A. () Review of air flow measurement techniques McWilliams, Jennifer (2002) Building a secondary containment system Broder, M.F. (1994) Cost benefit analysis of the night-time ventilative cooling in office building Seppanen, Olli; Fisk, William J.; Faulkner, David (2003) Evaluation of the 2007 Toyota Camry Hybrid Syneregy Drive System Burress, T.A.; Coomer, C.L.; Campbell, S.L.; et al. (2008) Nanofluid technology : current status and future research. Choi, S. U.-S. (1998) An Improved Method of Manufacturing Corrugated Boxes: Lateral

16

Most Viewed Documents - Power Generation and Distribution | OSTI, US Dept  

Office of Scientific and Technical Information (OSTI)

Most Viewed Documents - Power Generation and Distribution Most Viewed Documents - Power Generation and Distribution Electric power high-voltage transmission lines: Design options, cost, and electric and magnetic field levels Stoffel, J.B.; Pentecost, E.D.; Roman, R.D.; et al. (1994) ASPEN Plus Simulation of CO2 Recovery Process Charles W. White III (2003) Systems and economic analysis of microalgae ponds for conversion of CO{sub 2} to biomass. Quarterly technical progress report, September 1993--December 1993 Benemann, J.R.; Oswald, W.J. (1994) Load flow analysis: Base cases, data, diagrams, and results Portante, E.C.; Kavicky, J.A.; VanKuiken, J.C.; et al. (1997) Multilevel converters -- A new breed of power converters Lai, J.S. [Oak Ridge National Lab., TN (United States). Engineering Technology Div.]; Peng, F.Z. [Univ. of Tennessee, Knoxville, TN (United

17

Most Viewed Documents - Environmental Sciences | OSTI, US Dept of Energy,  

Office of Scientific and Technical Information (OSTI)

Most Viewed Documents - Environmental Sciences Most Viewed Documents - Environmental Sciences Separation of heavy metals: Removal from industrial wastewaters and contaminated soil Peters, R.W.; Shem, L. (1993) Special Report on Emissions Scenarios : a special report of Working Group III of the Intergovernmental Panel on Climate Change Nakicenovic, Nebojsa; Alcamo, Joseph; Davis, Gerald; et al. (2000) CARBON DIOXIDE (REDUCTION) FUJITA,E. (2000) Ecological Screening Values for Surface Water, Sediment, and Soil Friday, G. P. (1999) Mitigation options for accidental releases of hazardous gases Fthenakis, V.M. (1995) Atmospheric Chemistry and Greenhouse Gases Ehhalt, D.; Prather, M.; Dentener, F.; et al. (2001) Ammonia usage in vapor compression for refrigeration and air-conditioning in the United States Fairchild, P.D.; Baxter, V.D. (1995)

18

April 2013 Most Viewed Documents for Fission And Nuclear Technologies |  

Office of Scientific and Technical Information (OSTI)

April 2013 Most Viewed Documents for Fission And Nuclear Technologies April 2013 Most Viewed Documents for Fission And Nuclear Technologies Behavior of spent nuclear fuel in water pool storage Johnson, A.B. Jr. (null) 298 Estimation of gas leak rates through very small orifices and channels. [From sealed PuO/sub 2/ containers under accident conditions] Bomelburg, H.J. (null) 292 Graphite design handbook Ho, F.H. (1988) 216 System Definition and Analysis: Power Plant Design and Layout NONE (1996) 123 Flow-induced vibration of circular cylindrical structures Chen, S.S. (1985) 116 Stress analysis and evaluation of a rectangular pressure vessel. [For equipment for sampling Hanford tank radwaste] Rezvani, M.A.; Ziada, H.H. (Westinghouse Hanford Co., Richland, WA (United States)); Shurrab, M.S. (Westinghouse Savannah River Co., Aiken, SC (United

19

April 2013 Most Viewed Documents for Power Generation And Distribution |  

Office of Scientific and Technical Information (OSTI)

April 2013 Most Viewed Documents for Power Generation And Distribution April 2013 Most Viewed Documents for Power Generation And Distribution Electric power high-voltage transmission lines: Design options, cost, and electric and magnetic field levels Stoffel, J.B.; Pentecost, E.D.; Roman, R.D.; Traczyk, P.A. (1994) 719 Seventh Edition Fuel Cell Handbook NETL (2004) 628 ASPEN Plus Simulation of CO2 Recovery Process Charles W. White III (2003) 343 Wet cooling towers: rule-of-thumb design and simulation Leeper, S.A. (1981) 290 Load flow analysis: Base cases, data, diagrams, and results Portante, E.C.; Kavicky, J.A.; VanKuiken, J.C.; Peerenboom, J.P. (1997) 248 Controlled low strength materials (CLSM), reported by ACI Committee 229 Rajendran, N. (1997) 106 Micro-CHP Systems for Residential Applications Timothy DeValve; Benoit Olsommer (2007)

20

September 2013 Most Viewed Documents for Renewable Energy Sources | OSTI,  

Office of Scientific and Technical Information (OSTI)

September 2013 Most Viewed Documents for Renewable Energy Sources September 2013 Most Viewed Documents for Renewable Energy Sources Chapter 11. Heat Exchangers Rafferty, Kevin D.; Culver, Gene (1998) 362 Wet cooling towers: rule-of-thumb design and simulation Leeper, S.A. (1981) 103 Chapter 17. Engineering cost analysis Higbee, Charles V. (1998) 79 Advanced Electric Submersible Pump Design Tool for Geothermal Applications Xuele Qi; Norman Turnquist; Farshad Ghasripoor (2012) 79 A study of lead-acid battery efficiency near top-of-charge and the impact on PV system design Stevens, J.W.; Corey, G.P. (1996) 76 PROPERTIES AND PERFORMANCE OF CEMENT-BASED GROUTS FOR GEOTHERMAL HEAT PUMP APPLICATIONS. ALLAN,M.L. (1999) 70 Solar radiation data manual for flat-plate and concentrating collectors Dunlap, M.A. [ed.]; Marion, W.; Wilcox, S. (null)

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

January 2013 Most Viewed Documents for Renewable Energy Sources...  

NLE Websites -- All DOE Office Websites (Extended Search)

Documents for Renewable Energy Sources Photovoltaic Materials Duty, C.; Angelini, J.; Armstrong, B.; Bennett, C.; Evans, B.; Jellison, G. E.; Joshi, P.; List, F.; Paranthaman, P.;...

22

Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Discovery of Uranium Discovery of Uranium Uranium was discovered in 1789 by Martin Klaproth, a German chemist, who isolated an oxide of uranium while analyzing pitchblende samples from the Joachimsal silver mines in the former Kingdom of Bohemia located in the present day Czech Republic. more facts >> Mailing List Signup Receive e-mail updates about this project and web site. your e-mail address Sign Me Up Search: OK Button DUF6 Guide DU Uses DUF6 Management and Uses DUF6 Conversion EIS Documents News FAQs Internet Resources Glossary Home » Documents Search Documents: Search PDF Documents View a list of all documents Depleted UF6 Management Program Documents Downloadable documents about depleted UF6 management and related topics, including Depleted UF6 Conversion and Programmatic EIS documents

23

Document  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

558 Federal Register 558 Federal Register / Vol. 74, No. 203 / Thursday, October 22, 2009 / Notices If you use a TDD, call the FRS, toll free, at 1-800-877-8339. VIII. Other Information Accessible Format: Individuals with disabilities can obtain this document and a copy of the application package in an accessible format (e.g., braille, large print, audiotape, or computer diskette) on request to the program contact person listed under For Further Information Contact in Section VII of this notice. Electronic Access to This Document: You can view this document, as well as all other documents of this Department published in the Federal Register, in text or Adobe Portable Document Format (PDF) on the Internet at the following site: http://www.ed.gov/news/ fedregister. To use PDF, you must have Adobe

24

Document  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

44 Federal Register 44 Federal Register / Vol. 76, No. 62 / Thursday, March 31, 2011 / Notices not anticipate recurrence of violations that gave rise to this PDL. As a result, under the authority in 20 U.S.C. 1234a(j), the Department has determined that compromise of this claim to $675,000 is appropriate. The public is invited to comment on the Department's intent to compromise this claim. Additional information may be obtained by contacting the person listed under FOR FURTHER INFORMATION CONTACT. Electronic Access to This Document: You can view this document, as well as all other documents of this Department published in the Federal Register, in text or Adobe Portable Document Format (PDF) on the Internet at the following site: http://www.ed.gov/news/ fedregister. To use PDF you must have

25

April 2013 Most Viewed Documents for Biology And Medicine | OSTI, US Dept  

Office of Scientific and Technical Information (OSTI)

April 2013 Most Viewed Documents for Biology And Medicine April 2013 Most Viewed Documents for Biology And Medicine Publications in biomedical and environmental sciences programs, 1981 Moody, J.B. (comp.) (1982) 306 Drug Retention Times Center for Human Reliability Studies (2007) 99 SURVEY OF NOISE SUPPRESSION SYSTEMS FOR ENGINE GENERATOR SETS. KRISHNA,C.R. (1999) 95 Defining the Effectiveness of UV Lamps Installed in Circulating Air Ductwork Douglas VanOsdell; Karin Foarde (2002) 84 Mesoporous Silica Nanomaterials for Applications in Catalysis, Sensing, Drug Delivery and Gene Transfection Daniela Rodica Radu (2005) 84 Advisory Committee on human radiation experiments. Supplemental Volume 2a, Sources and documentation appendices. Final report NONE (1995) 72 Dose and volume specification for reporting interstitial therapy

26

Global Threat Reduction Initiative | Department of Energy  

Office of Environmental Management (EM)

Reduction Initiative An overview of the Global Threat Reduction Initiative, U.S.-Origin Nuclear Fuel Removals. Global Threat Reduction Initiative More Documents &...

27

Global Threat Reduction Initiative | Department of Energy  

Office of Environmental Management (EM)

Initiative Global Threat Reduction Initiative The Current Status of Gap and U.S.-Origin Nuclear Fuel Removals 2011. Global Threat Reduction Initiative More Documents &...

28

Most Viewed Documents - National Defense | OSTI, US Dept of Energy, Office  

Office of Scientific and Technical Information (OSTI)

Most Viewed Documents - National Defense Most Viewed Documents - National Defense 2012 Monitoring Research Review: Ground-Based Nuclear Explosion Monitoring Technologies Wetovsky, Marvin A. [Los Alamos National Laboratory]; Anderson, Dale [Los Alamos National Laboratory]; Arrowsmith, Stephen J. [Los Alamos National Laboratory]; et al. (2012) Smart bridge: a tool for estimating the military load classification of bridges Van Groningen, C.N.; Paddock, R.A. (1997) The Effects of Nuclear Weapons Glasstone, Samuel (1964) Detonation and combustion of explosives: A selected bibliography Dobratz, B. [comp.] (1998) SMART BRIDGE: A tool for estimating the military load classification of bridges using varying levels of information Van Groningen, C.N.; Paddock, R.A. (1997) Current limiters Loescher, D.H. [Sandia National Labs., Albuquerque, NM (United States).

29

Most Viewed Documents - Biology and Medicine | OSTI, US Dept of Energy,  

Office of Scientific and Technical Information (OSTI)

Most Viewed Documents - Biology and Medicine Most Viewed Documents - Biology and Medicine Drug Retention Times Center for Human Reliability Studies (2007) External dose-rate conversion factors for calculation of dose to the public Not Available (1988) Carbon Dioxide Sequestering Using Microalgal Systems Daniel J. Stepan; Richard E. Shockey; Thomas A. Moe; et al. (2002) Mesoporous Silica Nanomaterials for Applications in Catalysis, Sensing, Drug Delivery and Gene Transfection Daniela Rodica Radu (2005) Tolerance doses for treatment planning Lyman, J.T. (1985) Preliminary Benchmarking Efforts and MCNP Simulation Results for Homeland Security Robert Hayes (2008) Function and dynamics of aptamers: A case study on the malachite green aptamer Wang, Tianjiao (2008) Extremophiles 2004 Frank Robb (2004) Elemental mercury removal using a wet scrubber.

30

Most Viewed Documents - Engineering | OSTI, US Dept of Energy, Office of  

Office of Scientific and Technical Information (OSTI)

Most Viewed Documents - Engineering Most Viewed Documents - Engineering Conduction heat transfer solutions VanSant, J.H. (1980) Lunar Wireless Power Transfer Feasibility Study Sheldon Freid, et al. (2008) Charpy impact test results on five materials and NIST verification specimens using instrumented 2-mm and 8-mm strikers Nanstad, R.K.; Sokolov, M.A. (1995) Heat transfer model of above and underground insulated piping systems Kwon, K.C. (1998) Stress analysis and evaluation of a rectangular pressure vessel. [For equipment for sampling Hanford tank radwaste] Rezvani, M.A.; Ziada, H.H. (Westinghouse Hanford Co., Richland, WA (United States)); Shurrab, M.S. (Westinghouse Savannah River Co., Aiken, SC (United States)) (1992) Damage identification and health monitoring of structural and mechanical systems from changes in their vibration characteristics: A

31

Most Viewed Documents - Renewable Energy | OSTI, US Dept of Energy, Office  

Office of Scientific and Technical Information (OSTI)

Most Viewed Documents - Renewable Energy Most Viewed Documents - Renewable Energy Seventh Edition Fuel Cell Handbook NETL (2004) Chapter 11. Heat Exchangers Rafferty, Kevin D.; Culver, Gene (1998) Heat Treatment Procedure Qualification -- Final Technical Report Robert C. Voigt (2004) Electric power high-voltage transmission lines: Design options, cost, and electric and magnetic field levels Stoffel, J.B.; Pentecost, E.D.; Roman, R.D.; et al. (1994) Metals design handbook Betts, W.S. (1988) Conduction heat transfer solutions VanSant, J.H. (1980) Lunar Wireless Power Transfer Feasibility Study Sheldon Freid, et al. (2008) The influence of grain size on the mechanical properties ofsteel Morris Jr., J.W. (2001) Fatigue design curves for 6061-T6 aluminum Yahr, G.T. (1993) Chapter 13. Absorption Refrigeration

32

Most Viewed Documents - Fission and Nuclear Technologies | OSTI, US Dept of  

Office of Scientific and Technical Information (OSTI)

Most Viewed Documents - Fission and Nuclear Technologies Most Viewed Documents - Fission and Nuclear Technologies Metals design handbook Betts, W.S. (1988) Estimation of gas leak rates through very small orifices and channels. [From sealed PuO/sub 2/ containers under accident conditions] Bomelburg, H.J. () Graphite design handbook Ho, F.H. (1988) Motor-operated valve (MOV) actuator motor and gearbox testing DeWall, K.; Watkins, J.C.; Bramwell, D. [Lockheed Idaho Technologies Co., Idaho Falls, ID (United States)] (1997) Environmental Aspects, Objectives and Targets Identification Process R. Green (2002) Flow-induced vibration of circular cylindrical structures Chen, S.S. (1985) System Definition and Analysis: Power Plant Design and Layout NONE (1996) Materials and design bases issues in ASME Code Case N-47 Huddleston, R.L.; Swindeman, R.W. (Oak Ridge National Lab., TN (United

33

April 2013 Most Viewed Documents for Chemistry | OSTI, US Dept of Energy,  

Office of Scientific and Technical Information (OSTI)

April 2013 Most Viewed Documents for Chemistry April 2013 Most Viewed Documents for Chemistry Lithium literature review: lithium's properties and interactions Jeppson, D.W.; Ballif, J.L.; Yuan, W.W.; Chou, B.E. (1978) 123 Electrical conductivity measurements of aqueous electrolyte solutions at high temperatures and high pressures Ho, P.C.; Palmer, D.A. (1995) 102 Vapor-liquid equilibria for nitric acid-water and plutonium nitrate-nitric acid-water solutions Maimoni, A. (1980) 95 Mesoporous Silica Nanomaterials for Applications in Catalysis, Sensing, Drug Delivery and Gene Transfection Daniela Rodica Radu (2005) 84 Flammability characteristics of combustible gases and vapors. [249 refs] Zabetakis, M.G. (1964) 80 Molecular catalytic hydrogenation of aromatic hydrocarbons and hydrotreating of coal liquids. Yang, Shiyong; Stock, L.M. (1996)

34

April 2013 Most Viewed Documents for Renewable Energy Sources | OSTI, US  

Office of Scientific and Technical Information (OSTI)

April 2013 Most Viewed Documents for Renewable Energy Sources April 2013 Most Viewed Documents for Renewable Energy Sources Chapter 11. Heat Exchangers Rafferty, Kevin D.; Culver, Gene (1998) 1252 Seventh Edition Fuel Cell Handbook NETL (2004) 628 Wet cooling towers: rule-of-thumb design and simulation Leeper, S.A. (1981) 290 Chapter 17. Engineering cost analysis Higbee, Charles V. (1998) 223 Geothermal Power Generation - A Primer on Low-Temperature, Small-Scale Applications Rafferty, K. (2000) 197 Calculation of brine properties. [Above 80/sup 0/F and for salt content between 5 and 25%] Dittman, G.L. (1977) 183 Chapter 13. Absorption Refrigeration Rafferty, Kevin D. (1998) 176 A study of lead-acid battery efficiency near top-of-charge and the impact on PV system design Stevens, J.W.; Corey, G.P. (1996) 173 Temperature coefficients for PV modules and arrays: Measurement

35

Most Viewed Documents - Chemistry | OSTI, US Dept of Energy, Office of  

Office of Scientific and Technical Information (OSTI)

Most Viewed Documents - Chemistry Most Viewed Documents - Chemistry Flammability characteristics of combustible gases and vapors. [249 refs] Zabetakis, M.G. (1964) Electrical conductivity measurements of aqueous electrolyte solutions at high temperatures and high pressures Ho, P.C.; Palmer, D.A. (1995) Aqueous electrolyte modeling in ASPEN PLUS{trademark} Bloomingburg, G.F. [Univ. of Tennessee, Knoxville, TN (United States). Dept. of Chemical Engineering]|[Oak Ridge National Lab., TN (United States)]; Simonson, J.M.; Moore, R.C.; et al. (1995) Vapor-liquid equilibria for nitric acid-water and plutonium nitrate-nitric acid-water solutions Maimoni, A. (1980) Reaction mechanisms in cellulose pyrolysis: a literature review Molton, P.M.; Demmitt, T.F. () Ultrasonic Sensor and Method of use Condreva, Kenneth J. (1999)

36

Most Viewed Documents - Geosciences | OSTI, US Dept of Energy, Office of  

Office of Scientific and Technical Information (OSTI)

Most Viewed Documents - Geosciences Most Viewed Documents - Geosciences Temperature Profiles and Hydrologic Implications from the Nevada Test Site David Gillespie (2005) 3-D full waveform inversion of seismic data; Part I. Theory Lee, Ki Ha (2003) Drilling and coring methods that minimize the disturbance of cuttings, core, and rock formation in the unsaturated zone, Yucca Mountain, Nevada Hammermeister, D.P.; Blout, D.O.; McDaniel, J.C. (1985) CO{sub 2}-H{sub 2}O mixtures in the geologic sequestration of CO{sub 2}. I. Assessment and calculation of mutual solubilities from 12 to 100 degrees C and up to 600 bar Spycher, Nicolas; Pruess, Karsten; Ennis-King, Jonathan (2002) ADVANCED CHARACTERIZATION OF FRACTURED RESERVOIRS IN CARBONATE ROCKS: THE MICHIGAN BASIN James R. Wood; William B. Harrison (2002)

37

September 2013 Most Viewed Documents for Chemistry | OSTI, US Dept of  

Office of Scientific and Technical Information (OSTI)

September 2013 Most Viewed Documents for Chemistry September 2013 Most Viewed Documents for Chemistry Molecular catalytic hydrogenation of aromatic hydrocarbons and hydrotreating of coal liquids. Yang, Shiyong; Stock, L.M. (1996) 36 Flammability characteristics of combustible gases and vapors. [249 refs] Zabetakis, M.G. (1964) 35 Reaction mechanisms in cellulose pyrolysis: a literature review Molton, P.M.; Demmitt, T.F. (1977) 32 Nuclear magnetic resonance measurement of ammonia diffusion in dense solid-liquid slurries. Revision 1 Bobroff, S.; Phillips, R.J. [Univ. of California, Davis, CA (United States). Dept. of Chemical Engineering]; Shekarriz, A. [Pacific Northwest National Lab., Richland, WA (United States)] (1998) 30 Determination of NAD+ and NADH level in a Single Cell Under H2O2 Stress by Capillary Electrophoresis

38

April 2013 Most Viewed Documents for Environmental Sciences | OSTI, US Dept  

Office of Scientific and Technical Information (OSTI)

April 2013 Most Viewed Documents for Environmental Sciences April 2013 Most Viewed Documents for Environmental Sciences Building a secondary containment system Broder, M.F. (1994) 144 Methods and opportunities in the recycling of rare earth based materials Ellis, T.W.; Schmidt, F.A.; Jones, L.L. (1994) 134 Ecological Screening Values for Surface Water, Sediment, and Soil Friday, G. P. (1999) 128 Ammonia usage in vapor compression for refrigeration and air-conditioning in the United States Fairchild, P.D.; Baxter, V.D. (1995) 124 SURVEY OF NOISE SUPPRESSION SYSTEMS FOR ENGINE GENERATOR SETS. KRISHNA,C.R. (1999) 95 Atmospheric Chemistry and Greenhouse Gases Ehhalt, D.; Prather, M.; Dentener, F.; Derwent, R.; Dlugokencky, Edward J.; Holland, E.; Isaksen, I.; Katima, J.; Kirchhoff, V.; Matson, P.; Midgley, P.; Wang, M.; Berntsen, T.; Bey, I.; Brasseur, G.; Buja, L.; Collins, W.

39

September 2013 Most Viewed Documents for Biology And Medicine | OSTI, US  

Office of Scientific and Technical Information (OSTI)

September 2013 Most Viewed Documents for Biology And Medicine September 2013 Most Viewed Documents for Biology And Medicine Drug Retention Times Center for Human Reliability Studies (2007) 29 Oleoresin Capsicum toxicology evaluation and hazard review Archuleta, M.M. (1995) 27 SURVEY OF NOISE SUPPRESSION SYSTEMS FOR ENGINE GENERATOR SETS. KRISHNA,C.R. (1999) 27 Site-Directed Research and Development FY 2012 Annual Report , (2013) 27 Human radiation studies: Remembering the early years. Oral history of Donner Lab Administrator Baird G. Whaley, August 15, 1994 NONE (1995) 26 Degradation of high concentrations of glycols, antifreeze, and deicing fluids Strong-Gunderson, J.M.; Wheelis, S.; Carroll, S.L.; Waltz, M.D.; Palumbo, A.V. (1995) 24 Human radiation studies: Remembering the early years. Oral history of Dr. George Voelz, M.D., November 29, 1994

40

April 2013 Most Viewed Documents for National Defense | OSTI, US Dept of  

Office of Scientific and Technical Information (OSTI)

April 2013 Most Viewed Documents for National Defense April 2013 Most Viewed Documents for National Defense Vapor-liquid equilibria for nitric acid-water and plutonium nitrate-nitric acid-water solutions Maimoni, A. (1980) 95 SMART BRIDGE: A tool for estimating the military load classification of bridges using varying levels of information Van Groningen, C.N.; Paddock, R.A. (1997) 69 LLNL small-scale drop-hammer impact sensitivity test Simpson, L.R.; Foltz, M.F. (1995) 67 Comments on TNT Equivalence Cooper, P.W. (1994) 66 Background chemistry for chemical warfare agents and decontamination processes in support of delisting waste streams at the U.S. Army Dugway Proving Ground, Utah Rosenblatt, D.H.; Small, M.J.; Kimmell, T.A.; Anderson, A.W. (1996) 65 Weapon container catalog. Volumes 1 & 2 Brown, L.A.; Higuera, M.C. (1998)

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

April 2013 Most Viewed Documents for Materials | OSTI, US Dept of Energy,  

Office of Scientific and Technical Information (OSTI)

April 2013 Most Viewed Documents for Materials April 2013 Most Viewed Documents for Materials Fatigue design curves for 6061-T6 aluminum Yahr, G.T. (1993) 554 Charpy impact test results on five materials and NIST verification specimens using instrumented 2-mm and 8-mm strikers Nanstad, R.K.; Sokolov, M.A. (1995) 534 Heat Treatment Procedure Qualification -- Final Technical Report Robert C. Voigt (2004) 488 The influence of grain size on the mechanical properties ofsteel Morris Jr., J.W. (2001) 356 Damage identification and health monitoring of structural and mechanical systems from changes in their vibration characteristics: A literature review Doebling, S.W.; Farrar, C.R.; Prime, M.B.; Shevitz, D.W. (1996) 246 Graphite design handbook Ho, F.H. (1988) 216 Mechanical properties and energy absorption characteristics of a

42

Most Viewed Documents - Physics | OSTI, US Dept of Energy, Office of  

Office of Scientific and Technical Information (OSTI)

Most Viewed Documents - Physics Most Viewed Documents - Physics Computational procedures for determining parameters in Ramberg-Osgood elastoplastic model based on modulus and damping versus strain Ueng, Tzou-Shin; Chen, Jian-Chu. (1992) Analysis of Lithium-Ion Battery Degradation During Thermal Aging JUNGST,RUDOLPH G.; NAGASUBRAMANIAN,GANESAN; CRAFTS,CHRIS C.; et al. (2000) Plastic Gamma Sensors: An Application in Detection of Radioisotopes S. Mukhopadhyay (2003) Lithium literature review: lithium's properties and interactions Jeppson, D.W.; Ballif, J.L.; Yuan, W.W.; et al. (1978) Fire protection system operating experience review for fusion applications Cadwallader, L.C. (1995) Organic light emitting diodes (OLEDS) and OLED-based structurally integrated optical sensors Cai, Yuankun (2010)

43

September 2013 Most Viewed Documents for Geosciences | OSTI, US Dept of  

Office of Scientific and Technical Information (OSTI)

September 2013 Most Viewed Documents for Geosciences September 2013 Most Viewed Documents for Geosciences Fundamental Research on Percussion Drilling: Improved rock mechanics analysis, advanced simulation technology, and full-scale laboratory investigations Michael S. Bruno (2005) 35 Seismic design evaluation guidelines for buried piping for the DOE HLW Facilities Lin, Chi-Wen [Consultant, Martinez, CA (United States)]; Antaki, G. [Westinghouse Savannah River Co., Aiken, SC (United States)]; Bandyopadhyay, K. [Brookhaven National Lab., Upton, NY (United States)]; Bush, S.H. [Review & Synthesis Association, Richland, WA (United States)]; Costantino, C. [City Univ. of New York, New York, NY (United States)]; Kennedy, R. [RPK Structural Mechanics, Yorba Linda, CA (United States). Consultant] (1995) 29 Proceedings of the wellbore sampling workshop

44

Most Viewed Documents - Materials | OSTI, US Dept of Energy, Office of  

Office of Scientific and Technical Information (OSTI)

Most Viewed Documents - Materials Most Viewed Documents - Materials Phase diagrams of the elements Young, D.A. (1975) Use of instrumented charpy tests to determine onset of upper-shelf energy Canonico, D.A.; Stelzman, W.J.; Berggren, R.G.; et al. (1975) Thermal and electrical conductivities and Seebeck coefficients of unirradiated and irradiated graphites from 300 to 1000 K Moore, J.P.; Graves, R.S.; McElroy, D.L. (1973) LITERATURE SURVEY ON DILUTE URANIUM ALLOYS FOR SANDIA BOOSTER CONCEPT TO SANDIA CORPORATION. Fackelmann, J.M.; Bauer, A.A.; Moak, D.P. (1969) Properties of chemical explosives and explosive simulants Dobratz, B.M. (1972) Review of x-ray diffraction studies in uranium alloys Yakel, H.L. (1973) Elevated-temperature true stress-tube strain tensile behavior of AISI Type 304 stainless steel

45

April 2013 Most Viewed Documents for Mathematics And Computing | OSTI, US  

Office of Scientific and Technical Information (OSTI)

April 2013 Most Viewed Documents for Mathematics And Computing April 2013 Most Viewed Documents for Mathematics And Computing Publications in biomedical and environmental sciences programs, 1981 Moody, J.B. (comp.) (1982) 306 A comparison of risk assessment techniques from qualitative to quantitative Altenbach, T.J. (1995) 159 Lecture notes for introduction to safety and health Biele, F. (1992) 138 Analytical considerations in the code qualification of piping systems Antaki, G.A. (1995) 113 Process Equipment Cost Estimation, Final Report H.P. Loh; Jennifer Lyons; Charles W. White, III (2002) 93 PC-1D installation manual and user's guide Basore, P.A. (1991) 70 SMART BRIDGE: A tool for estimating the military load classification of bridges using varying levels of information Van Groningen, C.N.; Paddock, R.A. (1997) 69 Computational procedures for determining parameters in

46

April 2013 Most Viewed Documents for Engineering | OSTI, US Dept of Energy,  

Office of Scientific and Technical Information (OSTI)

April 2013 Most Viewed Documents for Engineering April 2013 Most Viewed Documents for Engineering Charpy impact test results on five materials and NIST verification specimens using instrumented 2-mm and 8-mm strikers Nanstad, R.K.; Sokolov, M.A. (1995) 534 Heat Treatment Procedure Qualification -- Final Technical Report Robert C. Voigt (2004) 488 Conduction heat transfer solutions VanSant, J.H. (1980) 364 Damage identification and health monitoring of structural and mechanical systems from changes in their vibration characteristics: A literature review Doebling, S.W.; Farrar, C.R.; Prime, M.B.; Shevitz, D.W. (1996) 246 Lunar Wireless Power Transfer Feasibility Study Sheldon Freid, et al. (2008) 229 Heat transfer model of above and underground insulated piping systems Kwon, K.C. (1998) 201 SYNTHETIC SLING FAILURE - EVALUATIONS & RECOMMENDATIONS

47

April 2013 Most Viewed Documents for Physics | OSTI, US Dept of Energy,  

Office of Scientific and Technical Information (OSTI)

April 2013 Most Viewed Documents for Physics April 2013 Most Viewed Documents for Physics Lithium literature review: lithium's properties and interactions Jeppson, D.W.; Ballif, J.L.; Yuan, W.W.; Chou, B.E. (1978) 123 Plastic Gamma Sensors: An Application in Detection of Radioisotopes S. Mukhopadhyay (2003) 85 Organic light emitting diodes (OLEDS) and OLED-based structurally integrated optical sensors Cai, Yuankun (2010) 83 White LED with High Package Extraction Efficiency Yi Zheng; Matthew Stough (2008) 79 Analysis of Lithium-Ion Battery Degradation During Thermal Aging JUNGST,RUDOLPH G.; NAGASUBRAMANIAN,GANESAN; CRAFTS,CHRIS C.; INGERSOLL,DAVID; DOUGHTY,DANIEL H. (2000) 74 Cathodic arc plasma deposition Anders, Andre (2002) 73 Energy level structure and transition probabilities in the spectra of the trivalent lanthanides in LaF/sub 3/. [Tables, diagrams]

48

April 2013 Most Viewed Documents for Geosciences | OSTI, US Dept of Energy,  

Office of Scientific and Technical Information (OSTI)

April 2013 Most Viewed Documents for Geosciences April 2013 Most Viewed Documents for Geosciences Sloshing analysis of viscous liquid storage tanks Uras, R.Z. (1995) 83 Seismic design evaluation guidelines for buried piping for the DOE HLW Facilities Lin, Chi-Wen [Consultant, Martinez, CA (United States)]; Antaki, G. [Westinghouse Savannah River Co., Aiken, SC (United States)]; Bandyopadhyay, K. [Brookhaven National Lab., Upton, NY (United States)]; Bush, S.H. [Review & Synthesis Association, Richland, WA (United States)]; Costantino, C. [City Univ. of New York, New York, NY (United States)]; Kennedy, R. [RPK Structural Mechanics, Yorba Linda, CA (United States). Consultant] (1995) 48 CO{sub 2}-H{sub 2}O mixtures in the geologic sequestration of CO{sub 2}. I. Assessment and calculation of mutual solubilities from 12 to 100

49

Homicidal Threats  

Science Journals Connector (OSTI)

Every day in the media we hear about death threats. Death threats are often made against individuals, i.e ... e. “Death to America.” Often these threats are accompanied by shouts, specific gestures,...

Stephen J. Morewitz

2008-01-01T23:59:59.000Z

50

Document  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

197 Federal Register 197 Federal Register / Vol. 74, No. 117 / Friday, June 19, 2009 / Notices Instructions: All submissions received must include the agency name, docket number and title for this Federal Register document. The general policy for comments and other submissions from members of the public is to make these submissions available for public viewing on the Internet at http:// www.regulations.gov as they are received without change, including any personal identifiers or contact information. DoD Clearance Officer: Ms. Patricia Toppings. Written requests for copies of the information collection proposal should be sent to Ms. Toppings at WHS/ESD/ Information Management Division, 1777 North Kent Street, RPN, Suite 11000, Arlington, VA 22209-2133. Dated: May 31, 2009.

51

Document  

National Nuclear Security Administration (NNSA)

by processing it in the H- Canyon at the SRS, then sending it to the high-level waste tanks and DWPF. DOE seeks to take this action to reduce the threat of nuclear weapons...

52

Documentation  

Science Journals Connector (OSTI)

Documentation has a bad reputation among software developers. Just mention “documentation,” and those of us who were raised on traditional waterfall software project methods remember weighty requirements docum...

Patrick Cimolini; Karen Cannell

2012-01-01T23:59:59.000Z

53

2014 Threats  

Science Journals Connector (OSTI)

......Society Winter 2013 research-article Information Security 2014 Threats Gareth Niblett Gareth Niblett, Chairman of the BCS Information...www.bcs.org/securitycommunity FURTHERINFORMATION 2014 THREATS doi:10.1093/itnow/bwt073 2013 The British Computer......

Gareth Niblett

2013-01-01T23:59:59.000Z

54

Threat Characterization  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Michalski Michalski SNL Department 5621 Threat Characterization Summary Slide: Threat Characterization Outcomes: Develop a network analysis toolset to allow an analyst to efficiently "crawl" large data sets to discover relevant threat information. Road Map Challenges:"The ability to discover & understand emerging threats and vulnerabilities is a prerequisite to developing effective countermeasures" Major Successes: * Implemented prototype front end crawler and semantic analysis engine (Sandia National Labs). * Transition Development work to the Institute for Complex Additive System Analysis (ICASA) Center (NMTech) * Quarterly threat reports being produced  Schedule: Improvements to both the analyst process and GUI Interface, 4Q 2009; Transition maintenance and development to

55

SciTech Connect: Sequential Threat Detection for Harbor Defense...  

Office of Scientific and Technical Information (OSTI)

Sequential Threat Detection for Harbor Defense: An X-ray Physics-Based Bayesian Approach Citation Details In-Document Search Title: Sequential Threat Detection for Harbor Defense:...

56

Documents  

Open Energy Info (EERE)

documents en MHK LCOE Reporting documents en MHK LCOE Reporting Guidance Draft http://en.openei.org/community/document/mhk-lcoe-reporting-guidance-draft To normalize competing claims of LCOE, DOE has developed-for its own use-a standardized cost and performance data reporting process to facilitate uniform calculation of LCOE from MHK device developers. This standardization framework is only the first version in what is anticipated to be an iterative process that involves industry and the broader DOE stakeholder community. Multiple files are attached here for review and comment.document/mhk-lcoe-reporting-guidance-draft" target="_blank">read more http://en.openei.org/community/document/mhk-lcoe-reporting-guidance-draft#comments

57

Document  

National Nuclear Security Administration (NNSA)

various sources, and in view of the time needed to promulgate a rule, then-Secretary of Energy Pen a directed the Office of Environment, Safety and Health to publish a new DOE...

58

Document  

National Nuclear Security Administration (NNSA)

and is available for public inspection. The EA may also be viewed on the Commission's Web site at http:www.ferc.gov using the ''eLibrary'' link. Enter the docket number...

59

PROHIBITED USE OF ELECTRONIC RESOURCES FOR THREATS, HARASSMENT, AND PORNOGRAPHY  

E-Print Network (OSTI)

Page 1 PROHIBITED USE OF ELECTRONIC RESOURCES FOR THREATS, HARASSMENT, AND PORNOGRAPHY Policy, and prohibits the use of University Electronic Resources for threats, harassment, and pornography. Reason threats, engaging in harassing behavior, and viewing, downloading, or communicating pornography. Table

Shahriar, Selim

60

Document  

NLE Websites -- All DOE Office Websites (Extended Search)

988 Federal Register 988 Federal Register / Vol. 75, No. 242 / Friday, December 17, 2010 / Notices texts of formal documents issued by the Commission, such as orders, notices, and rulemakings. In addition, the Commission now offers a free service called eSubscription which allows you to keep track of all formal issuances and submittals in specific dockets. This can reduce the amount of time you spend researching proceedings by automatically providing you with notification of these filings, document summaries, and direct links to the documents. Go to http:// www.ferc.gov/esubscribenow.htm. Finally, public meetings or site visits will be posted on the Commission's calendar located at http://www.ferc.gov/ EventCalendar/EventsList.aspx along with other related information.

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Document  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0 Federal Register 0 Federal Register / Vol. 75, No. 220 / Tuesday, November 16, 2010 / Notices at the following site: http://www.ed.gov/ news/fedregister. To use PDF you must have Adobe Acrobat Reader, which is available free at this site. Note: The official version of this document is the document published in the Federal Register. Free Internet access to the official edition of the Federal Register and the Code of Federal Regulations is available on GPO access at: http://www.gpoaccess.gov/nara/ index.html. Authority: 5 U.S.C. 552a; 21 U.S.C. 862(a)(1). Dated: November 10, 2010. James F. Manning, Chief of Staff, Federal Student Aid, U.S. Department of Education. [FR Doc. 2010-28856 Filed 11-15-10; 8:45 am] BILLING CODE 4000-01-P DEPARTMENT OF ENERGY [OE Docket No. PP-371]

62

Document  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

667 Federal Register 667 Federal Register / Vol. 74, No. 105 / Wednesday, June 3, 2009 / Notices Part 1 Chapter 3 of the TGDC Recommendations, with the exception of Chapter 3's performance benchmark requirements. Part 1 Chapter 3 of the TGDC Recommendations is primarily a maintenance level upgrade to the 2005 VVSG with minor modifications, clarifications, and a few additions including performance and poll worker usability requirements. (The VSS 2002 contained almost no usability, accessibility, and privacy requirements. As a result, the 2005 VVSG Section 3 was mostly new material based on research, best practices, and standards relating to human factors and the design of user interfaces as they apply to voting systems.) 7. System Security Documentation Requirements-Security documentation

63

Document  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

52841 52841 Vol. 67, No. 157 Wednesday, August 14, 2002 DEPARTMENT OF AGRICULTURE Federal Crop Insurance Corporation 7 CFR Part 457 Common Crop Insurance Regulations; Sugarcane Crop Insurance Provisions AGENCY: Federal Crop Insurance Corporation, USDA. ACTION: Final rule; correction. SUMMARY: This document contains corrections to the final rule, Common Crop Insurance Regulations; Sugarcane Crop Insurance Provisions that the Federal Crop Insurance Corporation published in the Federal Register on Friday, July 12, 2002 (67 FR 46093- 46096). EFFECTIVE DATE: August 14, 2002. FOR FURTHER INFORMATION CONTACT: Arden Routh, Risk Management Specialist, Product Development Division, Federal Crop Insurance Corporation, United States Department of Agriculture, 6501 Beacon Drive,

64

Document  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79 Federal Register 79 Federal Register / Vol. 75, No. 242 / Friday, December 17, 2010 / Notices of a portion of National Guard Avenue to meet recommended stand-off distance between perimeter fence and mission critical resources and personnel). The decision was based on matters discussed in the Final Environmental Impact Statement (EIS) for the Proposed Realignment of National Guard Avenue and New Main Gate Construction, inputs from the public and regulatory agencies, and other relevant factors. The Final EIS was made available to the public on August 13, 2010 through a NOA in the Federal Register (Volume 75, Number 156, Page 49487) with a wait period that ended on September 14, 2010. The ROD documents only the decision of the Air Force with respect to the proposed Air Force actions analyzed

65

Document  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 4 Federal Register / Vol. 68, No. 79 / Thursday, April 24, 2003 / Notices j. Deadline for filing comments and/ or motions: May 19, 2003. All documents (original and eight copies) should be filed with: Magalie R. Salas, Secretary, Federal Energy Regulatory Commission, 888 First Street, NE., Washington, DC 20426. Please include the project number (P- 10855-005) on any comments or motions filed. k. Description of Request: Upper Peninsula Power Company (UPPCO) proposes to add additional acreage to the project boundary in the area of the Emergency Fuse Plug. The additional acres are necessary for project operations. l. Location of the Application: A copy of the application is available for inspection and reproduction at the Commission's Public Reference Room,

66

Document  

NLE Websites -- All DOE Office Websites (Extended Search)

July 2, 2008 Part V The President Executive Order 13467-Reforming Processes Related to Suitability for Government Employment, Fitness for Contractor Employees, and Eligibility for Access to Classified National Security Information VerDate Aug2005 18:32 Jul 01, 2008 Jkt 214001 PO 00000 Frm 00001 Fmt 4717 Sfmt 4717 E:\FR\FM\02JYE0.SGM 02JYE0 hsrobinson on PROD1PC76 with PROPOSALS2 VerDate Aug2005 18:32 Jul 01, 2008 Jkt 214001 PO 00000 Frm 00002 Fmt 4717 Sfmt 4717 E:\FR\FM\02JYE0.SGM 02JYE0 hsrobinson on PROD1PC76 with PROPOSALS2 Presidential Documents 38103 Federal Register Vol. 73, No. 128 Wednesday, July 2, 2008 Title 3- The President Executive Order 13467 of June 30, 2008 Reforming Processes Related to Suitability for Government Employment, Fitness for Contractor Employees, and Eligi-

67

Document  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

34 Federal Register 34 Federal Register / Vol. 72, No. 200 / Wednesday, October 17, 2007 / Notices public an opportunity to comment on the Guidance Memoranda prior to their approval. On May 6, 2005, a Notice of Availability was placed in the Federal Register (70 FR 24008) inviting the public to comment on the final draft of the Guidance Memoranda. As a result of public comment we received on the final draft, we have revised the Guidance Memoranda and invite the public to comment on the revised final draft. The programmatic regulations also require the concurrence of the Secretary of the Interior and the Governor of Florida on the Guidance Memoranda prior to their approval. An electronic copy of the guidance memoranda document is available at: http:// www.evergladesplan.org/pm/

68

Document  

National Nuclear Security Administration (NNSA)

44786 Federal Register 44786 Federal Register / Vol. 73, No. 148 / Thursday, July 31, 2008 / Notices same file as the submission itself, and not as separate files. Petitions will be available for public inspection by appointment with the staff of the USTR Public Reading Room, except for information granted ''business confidential'' status pursuant to 15 CFR 2003.6. If the submission contains business confidential information, a non-confidential version of the submission must also be submitted that indicates where confidential information was redacted by inserting asterisks where material was deleted. In addition, the confidential submission must be clearly marked ''BUSINESS CONFIDENTIAL'' in large, bold letters at the top and bottom of every page of the documents. The public version that does not contain

69

Document  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 Federal Register 2 Federal Register / Vol. 76, No. 14 / Friday, January 21, 2011 / Notices it is recommended that documents be transmitted by overnight mail, by electronic mail to Christopher.Lawrence@hq.doe.gov, or by facsimile to 202-586-8008. FOR FURTHER INFORMATION CONTACT: Christopher Lawrence (Program Office) 202-586-5260. SUPPLEMENTARY INFORMATION: Exports of electricity from the United States to a foreign country are regulated by the Department of Energy (DOE) pursuant to sections 301(b) and 402(f) of the Department of Energy Organization Act (42 U.S.C. 7151(b), 7172(f)) and require authorization under section 202(e) of the FPA (16 U.S.C.824a(e)). On August 31, 1999 the Department of Energy (DOE) issued Order No. EA-216, which authorized TEMUS to transmit electric energy from the United States to

70

Document  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

586 586 Federal Register / Vol. 64, No. 143 / Tuesday, July 27, 1999 / Notices Telephone: (202) 205-9817. If you use a telecommunications device for the deaf (TDD), you may call the Federal Information Relay Service (FIRS) at 1- 800-877-8339. However, the Department is not able to reproduce in an alternate format the standard forms included in the application package. FOR FURTHER INFORMATION CONTACT: Sylvia Johnson, U.S. Department of Education, 400 Maryland Avenue, SW. (room 3318, Switzer Building), Washington, DC 20202-2649. Telephone (202) 205-9312. If you use a telecommunications device for the deaf (TDD), you may call the Federal Information Relay Service (FIRS) at 1- 800-877-8339. Individuals with disabilities may obtain this document in an alternate format (e.g., Braille, large print,

71

Document  

NLE Websites -- All DOE Office Websites (Extended Search)

May 22, 2000 Part III Environmental Protection Agency 40 CFR Part 261 Regulatory Determination on Wastes from the Combustion of Fossil Fuels; Final Rule VerDate 112000 16:01 May 19, 2000 Jkt 190000 PO 00000 Frm 00001 Fmt 4717 Sfmt 4717 E:\FR\FM\22MYR3.SGM pfrm02 PsN: 22MYR3 32214 Federal Register / Vol. 65, No. 99 / Monday, May 22, 2000 / Rules and Regulations ENVIRONMENTAL PROTECTION AGENCY 40 CFR Part 261 [FRL-6588-1] RIN 2050-AD91 Notice of Regulatory Determination on Wastes From the Combustion of Fossil Fuels AGENCY: Environmental Protection Agency. ACTION: Regulatory determination. SUMMARY: This document explains EPA's determination of whether regulation of fossil fuel combustion wastes is warranted under subtitle C of the Resource Conservation and Recovery Act (RCRA). Today's action

72

Document  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

945 Federal Register 945 Federal Register / Vol. 75, No. 143 / Tuesday, July 27, 2010 / Notices 1 The full text of the Convention on Supplementary Compensation for Nuclear Damage is available at http://www.iaea.org/Publication/ Documents/Infircs/1998/infcirc567.shtml. A detailed interpretation of the CSC and its provisions is contained in ''The 1997 Vienna Convention on Civil Liability for Nuclear Damage and the 1997 Convention on Supplementary Compensation for Nuclear Damage-Explanatory Texts,'' International Atomic Energy Agency (IAEA) (''Explanatory Texts''). International Law Series No. 3 (2007). The Explanatory Texts is available at http://www- pub.iaea.org/MTCD/publications/PDF/ Pub1279_web.pdf . 2 SDR is the unit of account defined by the International Monetary Fund (''IMF'') and used by

73

Document  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

51 Federal Register 51 Federal Register / Vol. 76, No. 71 / Wednesday, April 13, 2011 / Notices VII. Agency Contact See chart in the Award Information section in this notice for the name, room number and telephone number of the contact person for each competition. You can write to the contact person at the following address: U.S. Department of Education, 400 Maryland Avenue, SW., Potomac Center Plaza (PCP), Washington, DC 20202-2600. If you use a TDD, call the Federal Relay Service (FRS), toll free, at 1-800- 877-8339. VIII. Other Information Accessible Format: Individuals with disabilities can obtain this document and a copy of the application package in an accessible format (e.g., braille, large print, audiotape, or computer diskette) by contacting the Grants and Contracts

74

Document  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

902 Federal Register 902 Federal Register / Vol. 75, No. 15 / Monday, January 25, 2010 / Notices including Comments Resolution Matrixes (CRMs) and track changed documents, will be posted at: http:// www.losangeles.af.mil/library/ factsheets/factsheet.asp?id=9364. Please send all CRM comments to Vimal Gopal by 5 February 2010. DATES: 12 February 2010: IS-GPS-200E. 8 a.m.-12 p.m. (Pacific Time). Dial-In Information: Phone: 1-800- FON-SAIC (1-800-366-7242). Code: 4511074. FOR FURTHER INFORMATION CONTACT: Vimal Gopal, vimal.gopal.ctr@losangeles.af.mil, 1- 310-909-7294 or Captain Neal Roach, neal.roach@losangeles.af.mil, 1-310- 653-3771. Bao-Anh Trinh, Air Force Federal Register Liaison Officer. [FR Doc. 2010-1273 Filed 1-22-10; 8:45 am] BILLING CODE 5001-05-P DEPARTMENT OF ENERGY

75

Document  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

945 Federal Register 945 Federal Register / Vol. 75, No. 143 / Tuesday, July 27, 2010 / Notices 1 The full text of the Convention on Supplementary Compensation for Nuclear Damage is available at http://www.iaea.org/Publication/ Documents/Infircs/1998/infcirc567.shtml. A detailed interpretation of the CSC and its provisions is contained in ''The 1997 Vienna Convention on Civil Liability for Nuclear Damage and the 1997 Convention on Supplementary Compensation for Nuclear Damage-Explanatory Texts,'' International Atomic Energy Agency (IAEA) (''Explanatory Texts''). International Law Series No. 3 (2007). The Explanatory Texts is available at http://www- pub.iaea.org/MTCD/publications/PDF/ Pub1279_web.pdf . 2 SDR is the unit of account defined by the International Monetary Fund (''IMF'') and used by

76

Document  

NLE Websites -- All DOE Office Websites (Extended Search)

5/R3 5/R3 Toxicological Benchmarks for Screening Contaminants of Potential Concern for Effects on Terrestrial Plants: 1997 Revision This document has been approved by the East Tennessee Technology Park Technical Information Office for release to the public. Date: ES/ER/TM-85/R3 Toxicological Benchmarks for Screening Contaminants of Potential Concern for Effects on Terrestrial Plants: 1997 Revision R. A. Efroymson M. E. Will G. W. Suter II A. C. Wooten Date Issued-November 1997 Prepared for the U.S. Department of Energy Office of Environmental Management under budget and reporting code EW 20 LOCKHEED MARTIN ENERGY SYSTEMS, INC. managing the Environmental Management Activities at the East Tennessee Technology Park Oak Ridge Y-12 Plant Oak Ridge National Laboratory Paducah Gaseous Diffusion Plant

77

Document  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

89 Federal Register 89 Federal Register / Vol. 74, No. 209 / Friday, October 30, 2009 / Notices Abstract: The regulations establish the requirements under which an institution must readmit servicemembers with the same academic status they had at the institution when they last attended before being called to uniformed service. Requests for copies of the information collection submission for OMB review may be accessed from http:// edicsweb.ed.gov, by selecting the ''Browse Pending Collections'' link and by clicking on link number 4075. When you access the information collection, click on ''Download Attachments '' to view. Written requests for information should be addressed to U.S. Department of Education, 400 Maryland Avenue, SW., LBJ, Washington, DC 20202-4537. Requests may also be electronically

78

Document  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

477 Federal Register 477 Federal Register / Vol. 73, No. 230 / Friday, November 28, 2008 / Notices EIS No. 20080338, ERP No. F-FHW- J40180-UT, UT-108 Transportation Improvement Project, To Improve Local and Regional Mobility from UT-108 between UT-127 (Antelope Drive) to UT-126 (1900 West) Located in Syracuse, West Point and Clinton in Dave County, and Roy and West Haven in Weber County, UT. Summary: EPA continues to have environmental concerns about mobile source air toxics. However, EPA is pleased that FHWA has addressed previous concerns raised about other construction emission BMPs and mitigation measures for impacts to sensitive receptors. EIS No. 20080367, ERP No. F-FHW- J40178-UT, Mountain View Corridor (MVC) Project, Proposed Transportation Improvement 2030 Travel Demand in Western Salt Lake

79

Categorizing threat : building and using a generic threat matrix.  

SciTech Connect

The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general use, such as the design of defenses and the development of mitigation strategies. To reduce the complexity of analyzing threat, the threat space must first be reduced. This is achieved by taking the continuous nature of the threat space and creating an abstraction that allows the entire space to be grouped, based on measurable attributes, into a small number of distinctly different levels. The work documented in this report is an effort to create such an abstraction.

Woodard, Laura; Veitch, Cynthia K.; Thomas, Sherry Reede; Duggan, David Patrick

2007-09-01T23:59:59.000Z

80

BOMB THREAT CALL PROCEDURES  

E-Print Network (OSTI)

THREAT CALL PROCEDURES BOMB THREAT CHECKLIST Date: Time: Time Caller Phone Number Where Hung Up: Call Received:Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act threat is received by phone: 1. Remain calm. Keep the caller on the line for as long as possible. DO

Guo, Ting

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Research Article Signaling Threat  

E-Print Network (OSTI)

Research Article Signaling Threat How Situational Cues Affect Women in Math, Science and organization,canmake potentialtargetsvulnerabletosocial identity threat.Objective and subjective measuresofidentity threat were collected from male and female math, science, and engineering (MSE) majors who watched

Gross, James J.

82

Threats and Countermeasures  

Science Journals Connector (OSTI)

......research-article Information Security Threats and Countermeasures Gareth Niblett Gareth...Specialist Group, takes a look at upcoming threats and countermeasures. Follow @bcsbooks...for the user's email account. This threat is not going to recede, so everyone should......

Gareth Niblett

2012-01-01T23:59:59.000Z

83

Vacuoles: a hollow threat?  

E-Print Network (OSTI)

2 EDITORIALS Vacuoles: a hollow threat? Tony L. Yaksh, PhDthat Vacuoles: a hollow threat? provided by procaine anda l’esprit : Vacuoles: a hollow threat? Ces vacuoles acides

Yaksh, Tony L.

2010-01-01T23:59:59.000Z

84

Insider Threat Program  

Directives, Delegations, and Requirements

To establish responsibilities and requirements for the Department of Energy (DOE) Insider Threat Program (ITP) to deter, detect, and mitigate insider threat actions by Federal and contractor employees in accordance with the requirements of Executive Order 13587, the National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs and other government-wide and DOE requirements. Does not cancel other directives.

2014-06-02T23:59:59.000Z

85

Metamaterials for threat reduction applications: imaging, signal processing, and cloaking  

E-Print Network (OSTI)

Metamaterials for threat reduction applications: imaging, signal processing, and cloaking R. D effort is underway to fill this "THz gap" in view of potential threat reduction applications) and Theoretical Divisions, are exploring metamaterials-based de- vices operating at THz frequencies for threat

86

Military Expenditure, Threats, and Growth  

E-Print Network (OSTI)

a country's external military threat; lgdp is the log ofMilitary Expenditure, Threats, and Growth * September 2003expenditure, external threats, corruption, and other

Aizenman, Joshua; Glick, Reuven

2003-01-01T23:59:59.000Z

87

BOMB THREAT CALL PROCEDURES  

E-Print Network (OSTI)

BOMB THREAT CALL PROCEDURES WHO TO CONTACT (select one) · Follow your local guidelines · Federal Protective Service (FPS) Police 1-877-4-FPS-411 (1-877-437-7411) · 911 Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act quickly, but remain calm and obtain

Boyce, Richard L.

88

Threats and Countermeasures  

Science Journals Connector (OSTI)

......research-article Information Security Threats and Countermeasures Gareth Niblett *Risk...into the future* to see what emerging threats we might have to contend with. doi...into the future* to see what emerging threats we might have to contend with. *Risk......

Gareth Niblett

2012-01-01T23:59:59.000Z

89

Five of the Threats  

Science Journals Connector (OSTI)

......research-article Information Security Five of the Threats Graeme Nash Today, social networking...Here are the top five social networking threats to which organisations may be exposed...probably infected themselves). Whilst the threat from this particular malware has now FIVE......

Graeme Nash

2013-01-01T23:59:59.000Z

90

Combating Future Threats  

Science Journals Connector (OSTI)

......research-article Future Combating Future Threats Andy Clark On 21 September BCS, The Chartered...leadership debate about future security threats. Andy Clark, Head of Forensics at Detica...and where are they? These are different threats. Smartphones are powerful, connected......

Andy Clark

2011-01-01T23:59:59.000Z

91

A threat-rigidity analysis of the Apache Software Foundation's response to reported server security issues  

E-Print Network (OSTI)

There exists a broad body of literature documenting organizational responses to competitive threats, including those responses which fit into the threat-rigidity hypothesis. The purpose of this thesis is to investigate how ...

Shapira, Yoav

2006-01-01T23:59:59.000Z

92

BOMB THREATS What should I know about bomb threats?  

E-Print Network (OSTI)

BOMB THREATS What should I know about bomb threats? Goals of a Bomb Threat: Motivation and goals for making a bomb threat usually comes from one of two goals: The Hoax Caller: The most frequent goal to warn of the threat to minimize personal injuries or property damage. The caller may be the person

Fernandez, Eduardo

93

WHAT DO THREAT LEVELS AND RESPONSE LEVELS MEAN? THREAT LEVELS  

E-Print Network (OSTI)

WHAT DO THREAT LEVELS AND RESPONSE LEVELS MEAN? THREAT LEVELS: The UK Threat Level is decided by the Government's Joint Terrorism Analysis Centre (JTAC). It is the system to assess the threat to the UK from Threat Levels: Low - an attack is unlikely Moderate - an attack is possible, but not likely Substantial

Edinburgh, University of

94

Bomb threat There are two types of Bomb Threats  

E-Print Network (OSTI)

v Bomb threat There are two types of Bomb Threats: 1. Specific Information/location will be given about the device, or a suspicious item and/or location. Specific Threat - On a landline Dial 6111, state you have received a "SPecific BOmB threat". If possible recall exact wording of threat. 2. Non

Hickman, Mark

95

BOMB THREATS What should I know about bomb threats?  

E-Print Network (OSTI)

BOMB THREATS What should I know about bomb threats? Goals of a Bomb Threat: Motivation and goals for making a bomb threat usually comes from one of two goals: The Hoax Caller: The most frequent goal of the threat to minimize personal injuries or property damage. The caller may be the person placing the bomb

Fernandez, Eduardo

96

BOMB THREATS What should I know about bomb threats?  

E-Print Network (OSTI)

BOMB THREATS What should I know about bomb threats? Goals of a Bomb Threat · The Hoax Caller and goals for making a bomb threat usually comes from one of two goals: · The Credible Caller: The caller or she wants to warn of the threat to minimize personal injuries or property damage. The caller may

Fernandez, Eduardo

97

Categorizing Threat Building and Using a Generic Threat Matrix | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Categorizing Threat Building and Using a Generic Threat Matrix Categorizing Threat Building and Using a Generic Threat Matrix Categorizing Threat Building and Using a Generic Threat Matrix The key piece of knowledge necessary for building defenses capable of withstanding or surviving cyber and kinetic attacks is an understanding of the capabilities posed by threats to a government, function, or system. With the number of threats continuing to increase, it is no longer feasible to enumerate the capabilities of all known threats and then build defenses based on those threats that are considered, at the time, to be the most relevant. Exacerbating the problem for critical infrastructure entities is the fact that the majority of detailed threat information for higher-level threats is held in classified status and is not available for general

98

COUNTERING MICROBIAL THREATS  

Science Journals Connector (OSTI)

COUNTERING MICROBIAL THREATS ... The highly contagious disease dubbed severe acute respiratory syndrome, first seen in Asia but now diagnosed in several other countries, underscores the report's key point: More must be done to improve the public health and medical communities' ability to prevent, detect, and control emerging and resurging health threats posed by wily microbes. ... Because we all live on the same global microbial real estate, "one nation's problem soon can become every nation's problem," warns Margaret A. Hamburg, cochair of the panel that produced the report, "Microbial Threats to Health: Emergence, Detection & Response." ...

LOIS EMBER

2003-03-24T23:59:59.000Z

99

Cyber Threat Trees for Large System Threat Cataloging and Analysis*  

E-Print Network (OSTI)

Cyber Threat Trees for Large System Threat Cataloging and Analysis* P. Ongsakorn, K. Turney, M, kturney, mitch, nair, szygenda, manikas}@lyle.smu.edu Abstract--The implementation of cyber threat. Because large systems have many possible threats that may be interdependent, it is crucial

Thornton, Mitchell

100

An Overview of Non-traditional Nuclear Threats  

SciTech Connect

In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, and passenger transport. The types of weapons have also expanded beyond nuclear warheads to include radiation dispersal devices (RDD) or ''dirty'' bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials entering our borders is considered. The radiation and other signatures or potential nuclear and radiological threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.

Geelhood, Bruce D.; Wogman, Ned A.

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

An Overview of Non-Traditional Nuclear Threats  

SciTech Connect

In view of the terrorist threats to the United States, the country needs to consider new vectors and weapons related to nuclear and radiological threats against our homeland. The traditional threat vectors, missiles and bombers, have expanded to include threats arriving through the flow of commerce. The new commerce-related vectors include: sea cargo, truck cargo, rail cargo, air cargo, and passenger transport. The types of weapons have also expanded beyond nuclear war-heads to include radiation dispersal devices (RDD) or “dirty” bombs. The consequences of these nuclear and radiological threats are considered. The defense against undesirable materials enter-ing our borders is considered. The radiation and other signatures of potential nuclear and radio-logical threats are examined along with potential sensors to discover undesirable items in the flow of commerce. Techniques to improve detection are considered. A strategy of primary and secondary screening is proposed to rapidly clear most cargo and carefully examine suspect cargo.

Geelhood, Bruce D.; Wogman, Ned A.

2005-01-01T23:59:59.000Z

102

Threat Insight Quarterly Wireless Technology  

E-Print Network (OSTI)

X-Force ® Threat Insight Quarterly Wireless Technology April 2006 #12;X - F O R C E T H R E A T I N the Wireless Threat ..................................................3 Wireless Threats-Force Catastrophic Risk Index...................................... 13 Future X-Force Threat Insight Quarterly Topics

103

BIODIVERSITY Geographical linkages between threats  

E-Print Network (OSTI)

BIODIVERSITY RESEARCH Geographical linkages between threats and imperilment in freshwater fish and species declines can be the result of different threats or combinations of threats, such as habitat, deter- mining whether the effects of any specific threat is related to the level of imperilment

Kark, Salit

104

Global Threat Reduction Initiative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

comprehensive comprehensive strategy to prevent nuclear terrorism; and  The key organization responsible for implementing the U.S. HEU minimization policy. GTRI MISSION Reduce and protect vulnerable nuclear and radiological material located at civilian sites worldwide. DOE STRATEGIC GOAL 2.2 Prevent the acquisition of nuclear and radiological materials for use in weapons of mass destruction and other acts of terrorism Protect high priority nuclear and radiological materials from theft and sabotage These efforts result in threat reduction by improving security on the bomb material remaining at civilian sites - each vulnerable building that is protected reduces the risk until a permanent threat reduction solution can be implemented.

105

Insider Threat.pptx  

NLE Websites -- All DOE Office Websites (Extended Search)

Mitigating the Insider Threat Mitigating the Insider Threat (and Other Security Issues) Roger G. Johnston, Ph.D., CPP Vulnerability Assessment Team Argonne National Laboratory http://www.ne.anl.gov/capabilities/vat Argonne National Laboratory ~$738 million annual budget 1500 acres, 3400 employees, 4400 facility users, 1500 students R&D and technical assistance for government & industry Sponsors * DHS * DoD * DOS * IAEA * Euratom * DOE/NNSA * private companies * intelligence agencies * public interest organizations The VAT has done detailed vulnerability assessments on hundreds of different security devices, systems, & programs. Vulnerability Assessment Team (VAT) The greatest of faults, I should say, is to be conscious of none.

106

ELM Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

ELM Home Documents ELM Plan ELM Tracts Tract Map ELM at Work ELM Home Documents ELM Plan ELM Tracts Tract Map ELM at Work ELM Documents Committee Charter: The formal charge from the Fermilab director to the ELM committee. Committee Membership: A list of the current members of the ELM committee. Tract Management ELM Plan: The site ecological management plan for the current year. Tract List: A list of links to tract summaries from the latest approved ELM plan. Tract Map: An interactive map showing the locations of the various ELM tracts. Fire Management Non-structural Fire Management Plan: (Microsoft Word Document) Burn Histories: View the burn histories for the relevant ELM tracts. Map of Proposed Burns for the current or upcoming fire management season. This map is interactive and can also display the locations of past burn sites.

107

BomB ThreaT Assume threat is real  

E-Print Network (OSTI)

Call 911 BomB ThreaT · Assume threat is real · Evacuate area explosion/ Fire · Activate fire alarm or office, do not let the person in · Do not block person's access to an exit · Move away from the threat

Alpay, S. Pamir

108

Before the House Subcommittee on Emerging Threats, Cyber Security and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Emerging Threats, Cyber Security Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security By: Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability 7-21-09_Final_Testimony_Hoffman.pdf More Documents & Publications Statement of Patricia Hoffman, Acting Assistant Secretary for Electricity Delivery and Energy Reliability Before the Subcommittee on Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security U.S. House of Representatives, Before the House Science and Technology Subcommittee on Energy and

109

Threat Analysis Framework | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Threat Analysis Framework The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be...

110

Threat Insight Quarterly Vulnerability Management  

E-Print Network (OSTI)

X-Force ® Threat Insight Quarterly Vulnerability Management July 2006 #12;X - F O R C E T H R E.................. 7 X-Force Catastrophic Risk Index.............................. 10 Future X-Force Threat Insight Introduction There is a wide range of threats that can exist in any network. The presence of unpatched

111

Threat Insight Quarterly Regulatory Compliance  

E-Print Network (OSTI)

X-Force ® Threat Insight Quarterly Regulatory Compliance www.iss.netwww.iss.net October 2006 #12 Risk Index ..............................................11 Future X-Force Threat Insight Quarterly Internet Security Systems X-Force® Threat Insight Quarterly > October 2006 ©2006 Internet Security Systems

112

Threat Insight Quarterly Browser Exploitation  

E-Print Network (OSTI)

X-Force ® Threat Insight Quarterly Browser Exploitation www.iss.netwww.iss.net January 2007 #12 . . . . . . . . . . . . . . . . . . . . . . . . 11 Previous X-Force Threat Insight Quarterly Topics . . . . . . . . . . 15 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Contents IBM Internet Security Systems X-Force® Threat Insight Quarterly > January 2007

113

Major Insect Threats; Cotton Insects, Grasshoppers, Corn Borer, And Army Worm Still Maior Threats  

Science Journals Connector (OSTI)

Major Insect Threats; Cotton Insects, Grasshoppers, Corn Borer, And Army Worm Still Maior Threats ...

. U S D A

1954-01-01T23:59:59.000Z

114

10/01/08 10:50 AMLoading "Document View" Page 1 of 4http://proquest.umi.com.proxy2.lib.umanitoba.ca/pqdweb?index=8&...ype=PQD&rqt=309&TS=1199983651&clientId=12305&cc=1&TS=1199983651  

E-Print Network (OSTI)

10/01/08 10:50 AMLoading "Document View" Page 1 of 4http://proquest.umi.com.proxy2.lib goes off track, the major culprit can often be traced to a lack of communication among team members. Di;10/01/08 10:50 AMLoading "Document View" Page 2 of 4http://proquest.umi.com.proxy2.lib

Major, Arkady

115

Threat Characterization: Trajectory Dynamics  

E-Print Network (OSTI)

Given a primary interest in "mitigation of the potential hazard" of near-Earth objects impacting the Earth, the subject of characterization takes on an aspect not normally present when considering asteroids as abstract bodies. Many deflection concepts are interested in the classic geophysical characteristics of asteroids when considering the physical challenge of modifying their orbits in order to cause them to subsequently miss an impact with Earth. Yet for all deflection concepts there are characteristics of the threat which overwhelm these traditional factors. For example, a close gravitational encounter with Earth some years or decades prior to impact can reduce the velocity change necessary for deflection by several orders of magnitude if the deflection precedes the close encounter (or encounters). Conversely this "benefit" comes at a "price"; a corresponding increase in the accuracy of tracking required to determine the probability of impact. Societal issues, both national and international, also characterize the NEO deflection process and these may strongly contend with the purely technical issues normally considered. Therefore critical factors not normally considered must be brought into play as one characterizes the threat of NEO impacts.

Russell Schweickart; Clark Chapman; Dan Durda; Bill Bottke; David Nesvorny; Piet Hut

2006-08-15T23:59:59.000Z

116

Risk Management for Trrorist Threats  

Science Journals Connector (OSTI)

Risk management for Homeland and National Security involves the calculus of funding preventative systems andd procedures based upon potential threat likelihood and consequences. ...

Zimet, Elihu

117

Global Threat Reduction Initiative  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nonproliferation Nonproliferation U.S. DEPARTMENT OF ENERGY 1 The Current Status of Gap and U.S.-Origin Nuclear Fuel Removals 2011 Jeff Galan, Deputy Project Manager U.S.-Origin Nuclear Remove Program National Nuclear Security Administration Global Threat Reduction Initiative Defense Nuclear Nonproliferation U.S. DEPARTMENT OF ENERGY 2 GTRI Mission and Goals GTRI is: A part of President Obama's comprehensive strategy to prevent nuclear terrorism; and The key organization responsible for implementing the U.S. HEU minimization policy. GTRI MISSION Reduce and protect vulnerable nuclear and radiological material located at civilian sites worldwide. DOE STRATEGIC GOAL 2.2 Prevent the acquisition of nuclear and radiological materials for use in weapons of mass destruction and other

118

Bio-threat microparticle simulants  

SciTech Connect

A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

Farquar, George Roy; Leif, Roald

2014-09-16T23:59:59.000Z

119

IBM Software Data Sheet IBM adaptive threat  

E-Print Network (OSTI)

IBM Software Data Sheet IBM adaptive threat protection Stay ahead of security threats with a state-of-the-art network protection engine Highlights Identify high-risk threats and zero-day attacks with protocol-based, behavioral anomaly detection Protect end users against the latest web-based threats, such as SQL injection

120

Promises and Threats with Conditionals and Disjunctions  

E-Print Network (OSTI)

Promises and Threats with Conditionals and Disjunctions Robert van Rooij and Michael Franke Version promises and threats. But with a disjunction "You do . . . , or I'll do . . . " we can only make threats is trying to influence the behavior of the hearer by conditional promises and threats: whereas

van Rooij, Robert

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Identifying Chemicals That Are Planetary Boundary Threats  

Science Journals Connector (OSTI)

Identifying Chemicals That Are Planetary Boundary Threats ... Our point of departure to develop profiles for chemicals that are potential planetary boundary threats is to identify scenarios in which a chemical could fulfill each of the three conditions for being a planetary boundary threat. ... Note that chemicals named as examples do not necessarily represent planetary boundary threats since at least one scenario from each of the three conditions must be fulfilled for a chemical to pose a planetary boundary threat. ...

Matthew MacLeod; Magnus Breitholtz; Ian T. Cousins; Cynthia A. de Wit; Linn M. Persson; Christina Rudén; Michael S. McLachlan

2014-09-02T23:59:59.000Z

122

Chinese Workers: Under Threat or a Threat to American Workers?  

E-Print Network (OSTI)

. At the same time, some employers have found ways to avoid following the spirit, if not the letter of the laws. The consequences for American workers are unclear, since their challenges are less about a direct threat from Chinese workers and more about...

Harper Ho, Virginia E.; Zhang, Lu

2010-07-01T23:59:59.000Z

123

Documents: DUF6 Conversion EIS Supporting Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

DUF6 Conversion EIS DUF6 Conversion EIS Search Documents: Search PDF Documents View a list of all documents NEPA Compliance: DUF6 Conversion EIS Supporting Documents PDF Icon Notice of Change in National Environmental Policy Act (NEPA) Compliance Approach for the Depleted Uranium Hexafluoride (DUF6) Conversion Facilities Project 38 KB details PDF Icon Press Release: DOE Seeks Public Input for Depleted Uranium Hexafluoride Environmental Impact Statement 90 KB details PDF Icon Advance Notice of Intent To Prepare an Environmental Impact Statement for Depleted Uranium Hexafluoride Conversion Facilities 52 KB details PDF Icon Notice of Intent to Prepare an Environmental Impact Statement for Depleted Uranium Hexafluoride Conversion Facilities 60 KB details PDF Icon Overview: Depleted Uranium Hexafluoride (DUF6) Management Program

124

Document Reviews  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Document Reviews, within the Office of Health, Safety and Security information and document declassification efforts promote the release of information needed by an informed citizenry...

125

Global Threat Reduction Initiative | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Threat Reduction Initiative | National Nuclear Security Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Global Threat Reduction Initiative Home > About Us > Our Programs > Nonproliferation > Global Threat Reduction Initiative Global Threat Reduction Initiative The mission of the Global Threat Reduction Initiative (GTRI) is to reduce

126

Global Threat Reduction Initiative | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Threat Reduction Initiative | National Nuclear Security Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Global Threat Reduction Initiative Home > About Us > Our Programs > Nonproliferation > Global Threat Reduction Initiative Global Threat Reduction Initiative The mission of the Global Threat Reduction Initiative (GTRI) is to reduce

127

E-Print Network 3.0 - action document modified Sample Search...  

NLE Websites -- All DOE Office Websites (Extended Search)

of Georgia Collection: Computer Technologies and Information Sciences 50 Event-based Document Sensing for Insider Threats Kenneth Anderson, Antonio Carzaniga, Dennis...

128

Electronic publishing: strengths, weaknesses and threats  

Science Journals Connector (OSTI)

...April 1998 news News Electronic publishing: strengths, weaknesses and threats Derek McNally Treasurer of the RAS 2.7 April 1998 Vol 39 NEWS Both Monthly...Treasurer of the RAS. Electronic publishing: strengths, weaknesses and threats...

Derek McNally

1998-04-01T23:59:59.000Z

129

Vetting Threats To Safe Drug Supplies  

Science Journals Connector (OSTI)

Vetting Threats To Safe Drug Supplies ... Representatives from government, drug companies, and national and international law enforcement agencies struggled to characterize what all agree is a large, growing, and frustratingly nebulous threat to public health and safety. ...

RICK MULLIN

2012-04-01T23:59:59.000Z

130

Nuclear Radiological Threat Task Force Established | National...  

National Nuclear Security Administration (NNSA)

Radiological Threat Task Force Established | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

131

Physical Degradation of Soils, Risks and Threats  

Science Journals Connector (OSTI)

Physical soil degradation...is one of the eight main risks and threats defined by the European Thematic Strategy for...

Winfried E. H. Blum

2014-08-01T23:59:59.000Z

132

nuclear threat science | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

threat science | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing...

133

Responding to WMD Terrorism Threats: The Role of Insurance Markets  

E-Print Network (OSTI)

the Biological Weapons and Bioterrorism Threat SSI http://Responding to WMD Terrorism Threats: The Role of InsuranceNeed for Comprehensive Threat and Risk Assessments of

Jaffee, Dwight M.; Russell, Thomas

2007-01-01T23:59:59.000Z

134

A Risk Management Approach to the 'Insider Threat'  

E-Print Network (OSTI)

Stochastic, and Insider Threat. Management Science, 48(6):modelling for insider threat mitigation. Paci?c Northwestbased model for analyzing threats that include those usually

2010-01-01T23:59:59.000Z

135

BOMB THREAT CHECKLIST QUESTIONS TO ASK  

E-Print Network (OSTI)

BOMB THREAT CHECKLIST QUESTIONS TO ASK: 1. When is the bomb going to explode? 2. Where is it right ___Clearing Throat ___Laughter ___Deep Breathing __Crying ___Cracking voice __Normal ___Disguised THREAT __Foul ___Taped __Message read by threat maker __Irrational If voice is familiar, who did it sound like

Cui, Yan

136

REVIEW/SYNTHSE Threat display in birds  

E-Print Network (OSTI)

REVIEW/SYNTHÃ?SE Threat display in birds Peter L. Hurd and Magnus Enquist Abstract: The study of threat displays has long been an area in which theory and empirical work have each spurred the other. A great deal that classical ethologists have accurately described about threat displays still lacks

Hurd, Peter L.

137

Unauthorized Collaboration on Facebook: Threats and Responses  

E-Print Network (OSTI)

Unauthorized Collaboration on Facebook: Threats and Responses Recent events at FSU have uncovered a threat to academic integrity that might be flying under the radar of most instructors. This resource can help you understand and respond to this threat, while providing positive forums for student interaction

McQuade, D. Tyler

138

Survey on Security Threats and Protection Mechanisms  

E-Print Network (OSTI)

Survey on Security Threats and Protection Mechanisms in Embedded Automotive Networks Ivan Studnia1 and can be seen as entry points for cyber attacks. In this paper, we present a survey on security threats in the embedded networks of current vehicles, we then analyze the potential threats targeting these networks

Paris-Sud XI, Université de

139

Developmental Changes in Responsivity to Threat are  

E-Print Network (OSTI)

Developmental Changes in Responsivity to Threat are Stimulus-Specific in Rats Christoph P 2000 ABSTRACT: During early ontogeny, stimuli that pose a threat to an animal change. Unrelated adult a threat only during a limited period of development, when the animal's particular developmental stage

Barr, Gordon A.

140

Neural Mechanisms Underlying Selective Attention to Threat  

E-Print Network (OSTI)

Neural Mechanisms Underlying Selective Attention to Threat SONIA J. BISHOP Behavioural and Clinical. This provides a framework for inves- tigating the neural mechanisms underlying selective attention to threat. Both subcortical regions implicated in threat detection--specifically the amygdala--and prefrontal

Bishop, Sonia

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults' memory errors  

E-Print Network (OSTI)

Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults, 90089-0191. Phone: 213-740-6772. Email: barbersa@usc.edu #12;STEREOTYPE THREAT REDUCES MEMORY ERRORS 2 Abstract (144 words) Stereotype threat often incurs the cost of reducing the amount of information

Mather, Mara

142

Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act  

E-Print Network (OSTI)

Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act quickly, but remain calm and obtain information with the checklist on this card. BOMB THREAT CALL PROCEDURE If a bomb threat is received by phone: Remain calm. Keep the caller on the line for as long

Slatton, Clint

143

Recognizing Threat: A Simple Geometric Shape Activates Neural Circuitry for Threat Detection  

E-Print Network (OSTI)

Recognizing Threat: A Simple Geometric Shape Activates Neural Circuitry for Threat Detection the perception of threat. We here re- port that the neural circuitry known to be mobilized by many realistic instantiating detection of threat and negative affect, suggesting that recognition of potential danger may

Sarinopoulos, Issidoros

144

Ionosphere Spatial Gradient Threat for LAAS: Mitigation and Tolerable Threat Space  

E-Print Network (OSTI)

1 Ionosphere Spatial Gradient Threat for LAAS: Mitigation and Tolerable Threat Space Ming Luo, Sam and a threat space was extrapolated based on the 6 April 2000 ionospheric storm. It was showed that the impact of the ionospheric anomalies depends on the threat parameters, namely, the ionospheric gradient, the slope width

Stanford University

145

Stereotype threat in sports 1 Running head: STEREOTYPE THREAT AND ACHIEVEMENT GOALS IN SPORTS  

E-Print Network (OSTI)

Stereotype threat in sports 1 Running head: STEREOTYPE THREAT AND ACHIEVEMENT GOALS IN SPORTS Do Achievement Goals Mediate Stereotype Threat? An Investigation on Females' Soccer Performance Aïna Chalabaev Psycholoy 30 (2008) 143-158" #12;Stereotype threat in sports 2 Abstract This research investigated

Paris-Sud XI, Université de

146

Required Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Required Documents Required Documents Required Documents All foreign nationals, including students and postdocs, must select the foreign nationals employment category to complete the new-hire process. Contact (505) 665-7158 Email Complete following forms before New-Hire Orientation Be sure to bring the forms with you for the orientation event, but do not sign and date: Form I-9, Employment Eligibility Verification (pdf) - original, unexpired documents for verification of employment eligibility. Please refer to the I-9 verification form titled, "Lists of Acceptable Documents", which was included with your offer letter. (Laminated documents or hospital/temporary birth certificates are not accepted.) Note: Failure to provide required documents will result in delay and/or

147

Meeting Decisions and Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Meeting Notices Meeting Decisions & Documents Production Team Indicators System Coastal Resilience Resources Make Our Science Accessible Link Climate Change & Health Provide Data and Tools Coordinate Internationally Meeting Decisions and Documents Print E-mail This page summarizes the decisions made by the National Climate Assessment Development and Advisory Committee (NCADAC) and the documents the committee has adopted in association with those decisions. The documents and decisions concern the operation of the committee, the content of the synthesis report(s), the sustained assessment process, and other important guidance and responsibilities. The full and official meeting records of the NCADAC are available on a dedicated NOAA page. To view the Federal Register notices announcing the meetings of the NCADAC, please click here.

148

Sensor-guided threat countermeasure system  

DOE Patents (OSTI)

A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

2012-12-25T23:59:59.000Z

149

Assessment Documents  

Energy Savers (EERE)

independent-oversight-review-lawrence-livermore-national-laboratory-september-2013" typeof"sioc:Item foaf:Document">

October 2,...

150

Enforcement Documents  

Office of Environmental Management (EM)

Documents en Consent Order, Battelle Memorial Institute - October 24, 2014 http:energy.goveadownloadsconsent-order-battelle-memorial-institute-october-24-2014

151

Countering the Nuclear Terrorist Threat  

SciTech Connect

The nuclear/radioactive threat to homeland security posed by terrorists can be broken into four categories. Of highest concern is the use of an improvised nuclear device (IND). An IND, as its name implies, is a nuclear explosive device. It produces nuclear yield, and this nuclear yield has catastrophic effects. An IND is the ultimate terrorist weapon, and terrorist groups are actively attempting to acquire nuclear weapons. Detonation of an IND could dwarf the devastation of the September 11 attack on the World Trade Center. Dealing with the aftermath of an IND would be horrific. Rescue efforts and cleanup would be hazardous and difficult. Workers would have to wear full protection suits and self-contained breathing apparatus. Because of the residual radioactivity, in certain locations they could only work short times before acquiring their ''lifetime'' dose. As with the Chernobyl event, some rescue workers might well expose themselves to lethal doses of radiation, adding to the casualty toll. Enormous volumes of contaminated debris would have to be removed and disposed. If a terrorist group decides not to pursue an actual nuclear device, it might well turn to Radiological Dispersal Devices (RDDs) or ''dirty bombs'' as they are often called. RDDs spread radioactivity but they do not generate nuclear yield. The fabrication of an RDD requires radioactive material and a dispersal mechanism. Radioactive materials are used all over the world for medical, industrial, and research applications. Standards for safe handling and accountability of radioactive material vary around the world. Stories in the press suggest inadequate controls on radiological materials in parts of the world. The effects of an RDD vary widely, and are measured in terms of contamination area, health effects to the exposed population, and economic consequences. Even a negligible, but measurable, exposure would exploit the general public's fear of things radioactive and would have significant psychological consequences. The greatest impact of a small release would probably be economic, associated with cleanup and restoration of the contaminated area. Another category of threat is the attack on a facility, either a power reactor or sabotage of a large radiation source. In general these facilities are hard targets (structurally), and damage and contamination are localized. The final category of threat is the use of radioactive materials to deliver a radiation dose to individuals. This type of attack is again localized and does not readily fall into the category of a weapon of mass destruction.

Vantine, H C

2002-10-04T23:59:59.000Z

152

Autonomous Realtime Threat-Hunting Robot (ARTHR  

SciTech Connect

Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

INL

2008-05-29T23:59:59.000Z

153

Autonomous Realtime Threat-Hunting Robot (ARTHR  

ScienceCinema (OSTI)

Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

INL

2009-09-01T23:59:59.000Z

154

design basis threat | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

design basis threat | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the...

155

CHEMICAL TERRORISM: THREATS TO WATER SUPPLIES  

Science Journals Connector (OSTI)

Although for practical reasons, terrorist attacks on water systems are considered less likely than on other targets, threats to drinking water cannot be ignored. A...

ALFRED BERNARD; CLAIRE DE BURBURE

2006-01-01T23:59:59.000Z

156

Addressing the cybersecurity Malicious Insider threat.  

E-Print Network (OSTI)

?? Malicious Insider threats consist of employees, contractors, or business partners who either have current authorized access, or have had authorized access to an organization's… (more)

Schluderberg, Larry E.

2015-01-01T23:59:59.000Z

157

Identification of threats using linguistics-based knowledge extraction.  

SciTech Connect

One of the challenges increasingly facing intelligence analysts, along with professionals in many other fields, is the vast amount of data which needs to be reviewed and converted into meaningful information, and ultimately into rational, wise decisions by policy makers. The advent of the world wide web (WWW) has magnified this challenge. A key hypothesis which has guided us is that threats come from ideas (or ideology), and ideas are almost always put into writing before the threats materialize. While in the past the 'writing' might have taken the form of pamphlets or books, today's medium of choice is the WWW, precisely because it is a decentralized, flexible, and low-cost method of reaching a wide audience. However, a factor which complicates matters for the analyst is that material published on the WWW may be in any of a large number of languages. In 'Identification of Threats Using Linguistics-Based Knowledge Extraction', we have sought to use Latent Semantic Analysis (LSA) and other similar text analysis techniques to map documents from the WWW, in whatever language they were originally written, to a common language-independent vector-based representation. This then opens up a number of possibilities. First, similar documents can be found across language boundaries. Secondly, a set of documents in multiple languages can be visualized in a graphical representation. These alone offer potentially useful tools and capabilities to the intelligence analyst whose knowledge of foreign languages may be limited. Finally, we can test the over-arching hypothesis--that ideology, and more specifically ideology which represents a threat, can be detected solely from the words which express the ideology--by using the vector-based representation of documents to predict additional features (such as the ideology) within a framework based on supervised learning. In this report, we present the results of a three-year project of the same name. We believe these results clearly demonstrate the general feasibility of an approach such as that outlined above. Nevertheless, there are obstacles which must still be overcome, relating primarily to how 'ideology' should be defined. We discuss these and point to possible solutions.

Chew, Peter A.

2008-09-01T23:59:59.000Z

158

The Nature of the Bioterrorism Threat  

SciTech Connect

This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

Regens, J. L.

2003-02-25T23:59:59.000Z

159

Design Basis Threat | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Design Basis Threat | National Nuclear Security Administration Design Basis Threat | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Design Basis Threat Home > About Us > Our Programs > Nuclear Security > Design Basis Threat Design Basis Threat NNSA has taken aggressive action to improve the security of its nuclear weapons material (often referred to as special nuclear material, or SNM)

160

ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling for Mobile Ad Hoc and  

E-Print Network (OSTI)

ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling. Chivers, Olwen Worthington and Pankaj Rohatgi Abstract-- This paper introduces a threat model for ad hoc and mobile ad hoc networks (MANETS). It identifies threat categories, modes of use, and a variety of threats

Sen, Sevil

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

The Law of Duress and the Economics of Credible Threats  

E-Print Network (OSTI)

seller has a credible threat, it is in the buyer’s interestand the more credible is the threat to breach it. C.existence of a credible threat, may be difficult to verify.

Bar-Gill, Oren; Ben-Shahar, Omri

2003-01-01T23:59:59.000Z

162

An Intelligent Threat Prevention Framework with Heterogeneous Information  

E-Print Network (OSTI)

An Intelligent Threat Prevention Framework with Heterogeneous Information Wenjun Ma 1 and Weiru Liu 1 Abstract. Three issues usually are associated with threat prevention intelligent surveillance, the de- mand of effectively predicting suspects' intention and ranking the potential threats posed

Liu, Weiru

163

Now or Later?--Endogenous Timing of Threats  

Science Journals Connector (OSTI)

Whereas early threats are chosen before bargaining, late threats are determined after bargaining ended in conflict. Instead of exogenously imposing the timing of threats, these are derived endogenously as in indi...

Siegfried K. Berninghaus; Werner Guth

2003-11-01T23:59:59.000Z

164

Manager, International Chemical Threat Reduction Department, Sandia  

NLE Websites -- All DOE Office Websites (Extended Search)

International Chemical Threat Reduction Department, Sandia International Chemical Threat Reduction Department, Sandia National Laboratories | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Nancy Jackson Manager, International Chemical Threat Reduction Department, Sandia National Laboratories

165

Manager, International Chemical Threat Reduction Department, Sandia  

National Nuclear Security Administration (NNSA)

International Chemical Threat Reduction Department, Sandia International Chemical Threat Reduction Department, Sandia National Laboratories | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Who We Are > In The Spotlight > Nancy Jackson Manager, International Chemical Threat Reduction Department, Sandia National Laboratories

166

Insider threat to secure facilities: data analysis  

SciTech Connect

Three data sets drawn from industries that have experienced internal security breaches are analyzed. The industries and the insider security breaches are considered analogous in one or more respects to insider threats potentially confronting managers in the nuclear industry. The three data sets are: bank fraud and embezzlement (BF and E), computer-related crime, and drug theft from drug manufacturers and distributors. A careful analysis by both descriptive and formal statistical techniques permits certain general conclusions on the internal threat to secure industries to be drawn. These conclusions are discussed and related to the potential insider threat in the nuclear industry. 49 tabs.

Not Available

1980-05-09T23:59:59.000Z

167

PETSc: Documentation  

NLE Websites -- All DOE Office Websites (Extended Search)

Documentation Documentation Home Download Features Documentation Manual pages and Users Manual Citing PETSc Tutorials Installation AMS Changes Bug Reporting Code Management FAQ License Linear Solver Table Applications/Publications Miscellaneous External Software Developers Site PETSc is a sophisticated package and fully understanding its usage requires time. However, application programmers can easily begin to use PETSc from a high level and then gradually learn more details according to their needs. Users should read the users manual before attempting to do any serious coding with PETSc! PETSc users manual - pdf (fully searchable with hyperlinks) Index of all help topics Index of all manual pages Strategies for using PETSc with Fortran PETSc Manual Pages and Examples MPI TAO Vector Operations (Vec)

168

Oversight Documents  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

oversight-documents Forrestal Building 1000 oversight-documents Forrestal Building 1000 Independence Avenue, SW Washington, DC 205851.800.dial.DOE en Independent Oversight Activity Report, Idaho Cleanup Project - November 2013 http://energy.gov/hss/downloads/independent-oversight-activity-report-idaho-cleanup-project-november-2013 Independent Oversight Activity Report, Idaho Cleanup Project - November 2013

169

Enforcement Documents  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

enforcement-documents Forrestal Building 1000 enforcement-documents Forrestal Building 1000 Independence Avenue, SW Washington, DC 205851.800.dial.DOE en Enforcement Letter, WEL-2013-04 http://energy.gov/hss/downloads/enforcement-letter-wel-2013-04 Enforcement Letter, WEL-2013-04

170

Death Threats and Violence at Schools and Colleges  

Science Journals Connector (OSTI)

This chapter examines the nature of death threats and other violence against schools and universities. Death threats and violence against schools and universities reflect...

Stephen J. Morewitz

2008-01-01T23:59:59.000Z

171

Comprehensive Vulnerability and Threat Analysis | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Vulnerability and Threat Analysis Our world is characterized by ever-changing threats to critical facilities, national assets and international interests. Understanding...

172

Seeking out silent threats to simulation integrity | EMSL  

NLE Websites -- All DOE Office Websites (Extended Search)

Seeking out silent threats to simulation integrity Seeking out silent threats to simulation integrity Controlling the impact of soft errors on optimization algorithm results NULL A...

173

Before the House Subcommittee on Emerging Threats, Cyber Security...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Emerging Threats, Cyber Security and Science and Technology Committee on Homeland Security Before the House Subcommittee on Emerging Threats, Cyber Security and Science and...

174

Autonomous Realtime Threat-Hunting Robot (ARTHR)  

ScienceCinema (OSTI)

Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

Idaho National Laboratory - David Bruemmer, Curtis Nielsen

2010-01-08T23:59:59.000Z

175

Autonomous Realtime Threat-Hunting Robot (ARTHR)  

SciTech Connect

Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

Idaho National Laboratory - David Bruemmer, Curtis Nielsen

2008-05-29T23:59:59.000Z

176

Source prestige and target reactions to threats  

Science Journals Connector (OSTI)

A 3 by 2 design was employed to study the effects of source capability and of punishment magnitude on the compliance of target individuals to contingent threats intermittently sent by a simulated source in...

Thomas V. Bonoma; Barry R. Schlenker; R. Bob Smith…

1970-08-01T23:59:59.000Z

177

Non-Military Threats to the Alliance  

Science Journals Connector (OSTI)

I have been given the opportunity to say a few words on what could become a dialogue between the EU and the U.S. concerning the rather difficult questions of non-military threats, also called global or transnatio...

Eric Danon

2000-01-01T23:59:59.000Z

178

The Fragmented Securitization of Cyber Threats  

Science Journals Connector (OSTI)

Cybersecurity is one of the most pressing national security issues nowadays. Cyber threats reached truly global scales, cyber attacks that potentially or actually cause physical damage are on the rise, and sec...

Agnes Kasper

2014-01-01T23:59:59.000Z

179

ARM - Conference Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

govPublicationsConference Documents Publications Journal Articles Conference Documents Program Documents Technical Reports Publications Database Public Information Materials Image...

180

Untitled Document  

NLE Websites -- All DOE Office Websites (Extended Search)

Remote-Handled Transuranic Waste Study - Remote-Handled Transuranic Waste Study - Main Menu DOE/CAO 95-1095 REMOTE-HANDLED TRANSURANIC WASTE STUDY U.S. Department of Energy Carlsbad Area Office Carlsbad, New Mexico October 1995 This document has been reproduced directly from the best possible copy. It is available to DOE and DOE contractors at the following address: Office of Scientific and Technical Information P. O. Box 62 Oak Ridge, TN 37831 For prices contact (615) 576-8401 The local WIPP contact for this document is George Basabilvazo (pronounced Baasa-bill-vaaso) (505) 234-7488 or E-Mail George.Basabilvazo@wipp.ws TABLE OF CONTENTS ACRONYMS AND ABBREVIATIONS (See below) EXECUTIVE SUMMARY (See below) 1.0 INTRODUCTION 1.1 Objectives 1.2 Background 2.0 THE TRANSURANIC WASTE DISPOSAL STRATEGY 2.1 Room Configuration

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

CHRG Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Documents Documents Benefit Value Manual Davis-Bacon Act Desk Guide Davis-Bacon Act of 1931 DEAR 970.5204-81 Diversity Plan - Acquisition Letter Directory of Classifications DOE Acquisition Regulations (Chapter 970) DOE F 350.1 - Contractor Salary-Wage Increase Expenditure Report DOE O 311.1A Equal Opportunity and Diversity Program DOE O 350.1 "Contractor Human Resources Programs" DOE O 442.1 Employee Concerns Program Equal Employment Opportunity Preaward Clearance Request Form Mandatory Guidelines for Federal Workplace Drug Testing Programs Procurement Policy Flashes Service Contract Act of 1965 Wage Determination Request Form Wage Determinations On-line Workplace Substance Abuse Programs at DOE Sites Reports Annual Payroll & Residence Report for Oak Ridge Area

182

NEPA Documentation  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Note for: Cynthia Quarterman Note for: Cynthia Quarterman Keith Harper From: Carol Borgstrom Subject: NEPA Documentation Date: December 3, 2008 Attached, per your request, are two lists: (1) DOE environmental assessments (EAs) issued since 12/1/2006 and (2) DOE environmental impact statements (EISs) issued since 12/1/2006. Also, per your request, is a copy of a general NEPA briefing provided to the Acting Deputy Secretary in May 2008. Please let me know if you have any further questions (carol.borgstrom @hq.doe.gov; 202-586-4600). cc: Ingrid Kolb, MA-1 (without attachments) Janet Barsy, GC-1 EA Database Listing Document Start FONSI Months Total NEPA Cost Program Number Title Date Date Complete Ops Office Office DOE/EA-1389 Charlie Creek-Williston Transmission 3/20/2001 2/20/2008 83.2 $345,236.21 WAPA

183

Survey of Threats and Assaults by Patients on Psychiatry Residents  

Science Journals Connector (OSTI)

The authors sought to determine the prevalence of threats and assaults by patients on psychiatry residents,...

Yael Dvir M.D.; Emiko Moniwa M.D.; Holly Crisp-Han M.D.…

2012-01-01T23:59:59.000Z

184

Invited Paper New Frontiers of Network Security: The Threat Within  

E-Print Network (OSTI)

Invited Paper New Frontiers of Network Security: The Threat Within Sugata Sanyal1 , Ajit Shelat2% of information security threats originate from inside the organization. The instances of insider threats have. The Insider threats are generally caused by current or ex-employees, contractors or partners, who have

Sanyal, Sugata

185

FUTURE THREATS AYCOCK & MAURUSHAT 275VIRUS BULLETIN CONFERENCE SEPTEMBER 2007  

E-Print Network (OSTI)

FUTURE THREATS AYCOCK & MAURUSHAT 275VIRUS BULLETIN CONFERENCE SEPTEMBER 2007 FUTURE THREATS John.maurushat@unsw.edu.au ABSTRACT `Aren't you just giving the virus writers ideas?' Research into future security threats begin to examine how far security research can go in terms of looking at future threats, particularly

Aycock, John

186

An Approach to Security Policy Configuration Using Semantic Threat Graphs  

E-Print Network (OSTI)

An Approach to Security Policy Configuration Using Semantic Threat Graphs Simon N. Foley, in turn, unnecessarily expose the enterprise to known threats. This paper pro- poses a threat management- nomic configuration of security mechanisms. This knowledge is mod- eled in terms of Semantic Threat

Foley, Simon

187

Running head: STEREOTYPE THREAT IN OLDER ADULTS 1 Stereotype threat can enhance, as well as impair, older adults' memory  

E-Print Network (OSTI)

Running head: STEREOTYPE THREAT IN OLDER ADULTS 1 Stereotype threat can enhance, as well as impair, and Rico Velasco for research assistance and to Dr. Tom Hess for providing us with the stereotype threat for publication. #12;STEREOTYPE THREAT IN OLDER ADULTS 2 Abstract (150) Negative stereotypes about aging can

Mather, Mara

188

Left-Wing Extremism: The Current Threat  

SciTech Connect

Left-wing extremism is ''alive and well'' both in the US and internationally. Although the current domestic terrorist threat within the U. S. is focused on right-wing extremists, left-wing extremists are also active and have several objectives. Leftist extremists also pose an espionage threat to U.S. interests. While the threat to the U.S. government from leftist extremists has decreased in the past decade, it has not disappeared. There are individuals and organizations within the U.S. who maintain the same ideology that resulted in the growth of left-wing terrorism in this country in the 1970s and 1980s. Some of the leaders from that era are still communicating from Cuba with their followers in the U.S., and new leaders and groups are emerging.

Karl A. Seger

2001-04-30T23:59:59.000Z

189

Ehron Documents  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Ehron Documents Ehron Documents 1993 S-F-1325.12 CORRESPONDENCE CONTROL FORM (11-90) OFFICE OF THE EXECLTIVE SECRETARIAT ACTIVITY ADD DO NOT DETACH FROM ORIGINAL CORRESPONDENCE 01/19/93 10:17 SOURCE CODE pM PUBLIC MAIL SPEC INT: _ CONTROL N( S93-000578 DATE CORR: 01/13/93 DATERECD: 01/19/93 DATECNTRL: 01/19/93 -DATE DUE: LETTER: MEMO: TWX: _OTHER: MOTION TO:SECY: X DEPSEC: UN SEC: OTHER: ROM:FLOWERS,G PATRICK TX O REMARKS: ENRON CORP. UB J : LEGAL -=--_- LITIGATION FOR USE fY ACT N OFFICE ONLY MOTION FOR LEAVE TO INTERVENE ACTION REFERRED TO DATE RETURN TO DUE OF NORTHERN NATURAL GAS CO., DATE TRANSWESTERN PIPELINE CO., 2 FLORIDA GAS TRANSMISSION CO... _3-_ ACTION TO: rr - TYPE ACTION: Appropriate action SIG OF: 3NCURRENCE: i NFORMATION:DS US EP FE ES1 D02 FILE CODE:PMFLOWFRS-ES930'00578 CONTROL ANALYST: B ATCHERSON 6-2255

190

AFFECTED DOCUMENT  

Office of Legacy Management (LM)

rr-osams rr-osams ADMIN RCD _ RESPONSE TRACKING INFORMATION I 'OWED BY: (ORG) I TARGET DATE { I CLOSING CCN COMPL. DATE { CLOSING REF I I lOWED BY: (ORG) { { I { { TARGET DATE I CLOSING CCN COMPL DATE CLOSING REF TECHNICAL SERVICES DIVISION (TSD) BACKFIT (Documents dated prior to 1 November 1988) FUSRAP COMMUNICATIONS DISTRIBUTION DOEIORO TECHNICAL SERVICES DIVISION (CE·53) BECHTEL NATIONAL, INC. -JOB 14501 _-....Iome....:.-R..%.JI&~S::....:::S.::...- TO_---.,!5~Z~IJ~u..~ COMM DATE &6 tlJ t.e ADDR CODE I I I I CLOSES CCN WBS _....:,;},=(J ........ 2._--- _ NUMBER ST SUBJECT CODE 70()O DOE FILE NO. _ SUBJECT NFs S RESIDIJAl.J OIJR;T 1tJ/UL t2U /DffG-./NE.5 ~..:ll..Jll~~l...3Io.,;~..:ll..Jll~~Io....JIo,.;~~~~Io....JIo,.;~~~~Io....JIo,.;:Io....1.~~~"""";:Io....1.~CCN _

191

Enron Documents  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Enron Documents 1994 U.S. DEPARTMENT OF ENERGY 13S. 12 CORRESPONDENCE CONTROL FORM 1) OFFICE OF THE EXECUTIVE SECRETARIAT 8CTIVITY ADD DO NOT DETACH FROM ORIGINAL CORRESPONDENCE 0/03/Y4 10: O0 5OURCECODE PM PUBLIC MAIL :?EC INT: CONTROL NO: ES94-012853 ,ATE CORR: 04/25/94 DATE RECD: 05/02/94 DATE CNTRL: 05/03/94 DATE DUE: NONE :TTER: X MEMO: TWX: _ OTHER: TO: SECY: X DEP SEC: _ UN SEC: OTHER: )M:LAY,KENNETH L \ TX O REMARKS: RELATES TO ES94-009882. i ENRON CORP. J: PUBLIC INFORMATION NATIONAL PETROLEUM COUNCIL ---- FOR USE BY ACTION OFFICE ONLY- ACCEPTS INV ITATION TO CONTINUE DUE ACTION REFERRED TO DATE RETURN TO TO SERVE AS A MEMBER OF THE DATE NATIONAL PETROLEUM COUNCIL I ___ 21 3 I .CTION TO: FE TYPE ACTION: Appropriate action SIG OF: _ CURRENCE: ORMATION: ES D04

192

Enron Documents  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6 6 ,. OFC OU.S. DEPARTMENT OF ENERGY OFFICE OF THE EXECUTIVE SECRETARIAT CORRESPONDENCE CONTROL TICKET IMPORTANT ES NUMBER:- ES96-000274 EXTERNAL kTE OF DOC: 12/28/95 REC'D: 01/04/96 CONTROLLED: 01/04/96 DUE: 01/26/96 FROM: I HAVE A DREAM NOTE REA: SUBJECT INFORMS SECRETARY THAT ENRON SUMMARY: GORP HAS MADE A CONTRIBUTION TO "I HAVE A DREAM - HOUSTON" IN THE SECRETARY HONOR SOURCE: PUBLIC MAIL DOCUMENT TYPE: LETTER ADDRESSED TO: SECRETARY FOR SIGNATURE OF: SECRETARY ACTION TO: OFFICE OF THE SECRETARY ACTION TYPE: Prepare final reply ACTION OFFICER: WALLACE ONCURRENCE COPIES TO: NFORMATION COPIES TO: ES1 TEAM NCURRENCES COMPLETED: EMARKS: :XECUTIVE SECRETARIAT CONTACT: G Holloway -------------------------- EXEC SEC INTERNAL USE ----------------- SUBJECT CROSS REF: SPECIAL INT. CODE:

193

Complete Experiment Safety Documentation  

NLE Websites -- All DOE Office Websites (Extended Search)

Complete Experiment Safety Documentation Print Complete Experiment Safety Documentation Print User Safety Overview The steps for authorization of your experiment are described below. The ALS Experiment Coordinators are available to support you through this process. Please This e-mail address is being protected from spambots. You need JavaScript enabled to view it at any stage if you have questions or need more information. Prior to Your Arrival at the ALS 1. Complete or Update and Experiment Safety Sheet If you did not submit a General User Proposal, you must submit an ESS one month prior to arrival at the ALS. 2. Biological, Radioactive, Hazardous, and Electrical Materials, and Lasers If your experiment involves the use of any of the above materials-no matter how small the quantities are or how innocuous the sample may be-additional authorization may be required. Please submit your ESS early and clearly identify your materials. Our staff will assess the hazards and contact you about any necessary supplementary documentation.

194

Complete Experiment Safety Documentation  

NLE Websites -- All DOE Office Websites (Extended Search)

Complete Experiment Safety Documentation Print Complete Experiment Safety Documentation Print User Safety Overview The steps for authorization of your experiment are described below. The ALS Experiment Coordinators are available to support you through this process. Please This e-mail address is being protected from spambots. You need JavaScript enabled to view it at any stage if you have questions or need more information. Prior to Your Arrival at the ALS 1. Complete or Update and Experiment Safety Sheet If you did not submit a General User Proposal, you must submit an ESS one month prior to arrival at the ALS. 2. Biological, Radioactive, Hazardous, and Electrical Materials, and Lasers If your experiment involves the use of any of the above materials-no matter how small the quantities are or how innocuous the sample may be-additional authorization may be required. Please submit your ESS early and clearly identify your materials. Our staff will assess the hazards and contact you about any necessary supplementary documentation.

195

Complete Experiment Safety Documentation  

NLE Websites -- All DOE Office Websites (Extended Search)

Complete Experiment Safety Documentation Print Complete Experiment Safety Documentation Print User Safety Overview The steps for authorization of your experiment are described below. The ALS Experiment Coordinators are available to support you through this process. Please This e-mail address is being protected from spambots. You need JavaScript enabled to view it at any stage if you have questions or need more information. Prior to Your Arrival at the ALS 1. Complete or Update and Experiment Safety Sheet If you did not submit a General User Proposal, you must submit an ESS one month prior to arrival at the ALS. 2. Biological, Radioactive, Hazardous, and Electrical Materials, and Lasers If your experiment involves the use of any of the above materials-no matter how small the quantities are or how innocuous the sample may be-additional authorization may be required. Please submit your ESS early and clearly identify your materials. Our staff will assess the hazards and contact you about any necessary supplementary documentation.

196

Complete Experiment Safety Documentation  

NLE Websites -- All DOE Office Websites (Extended Search)

Complete Experiment Safety Documentation Print Complete Experiment Safety Documentation Print User Safety Overview The steps for authorization of your experiment are described below. The ALS Experiment Coordinators are available to support you through this process. Please This e-mail address is being protected from spambots. You need JavaScript enabled to view it at any stage if you have questions or need more information. Prior to Your Arrival at the ALS 1. Complete or Update and Experiment Safety Sheet If you did not submit a General User Proposal, you must submit an ESS one month prior to arrival at the ALS. 2. Biological, Radioactive, Hazardous, and Electrical Materials, and Lasers If your experiment involves the use of any of the above materials-no matter how small the quantities are or how innocuous the sample may be-additional authorization may be required. Please submit your ESS early and clearly identify your materials. Our staff will assess the hazards and contact you about any necessary supplementary documentation.

197

Hardware Trojan Attacks: Threat Analysis and  

E-Print Network (OSTI)

of malicious modifications of electronic hardware at different stages of its life cycle, pose major securityINVITED P A P E R Hardware Trojan Attacks: Threat Analysis and Countermeasures This paper or the information being processed. The underlying hardware used for information processing has been considered

Bhunia, Swarup

198

Bomb threats hit Texas petrochemical plants  

Science Journals Connector (OSTI)

A recent rash of bomb threats has plagued petrochemical plants and refineries in the Houston area.No real bombs have been found. But plant managers are concerned that if law enforcement officials do not soon find those involved and discourage others, ...

ANN THAYER

1996-04-29T23:59:59.000Z

199

Introduction to Administrative Programs that Mitigate the Insider Threat  

SciTech Connect

This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

2012-09-01T23:59:59.000Z

200

Policing Cyber Hate, Cyber Threats and Cyber Terrorism  

Science Journals Connector (OSTI)

What are cyber threats? This book brings together a diverse range of multidisciplinary ideas to explore the extent of cyber threats, cyber hate and cyber terrorism. This ground-breaking text provides a comprehensive understanding of the range of activities ...

Imran Awan; Brian Blakemore

2012-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Environment-Driven Threats Elicitation for Web Applications  

Science Journals Connector (OSTI)

The popularity and complexity of web application present challenges to the security implementation for web engineering. Threat elicitation is an indispensable step for developers to identify the possible threats ...

Hui Guan; Weiru Chen; Lin Liu; Hongji Yang

2011-01-01T23:59:59.000Z

202

Classification of Threats Via a Multi-sensor Security Portal  

Science Journals Connector (OSTI)

Classification of threats has always been a major security decision ... walks through a security portal. To classify threat by combining data from multiple sensors like ... metal detectors. We wish to identify th...

Amar Singh; Lawrence Holder

2006-01-01T23:59:59.000Z

203

Environmental Metabolomics:? A SWOT Analysis (Strengths, Weaknesses, Opportunities, and Threats)  

Science Journals Connector (OSTI)

Environmental Metabolomics:? A SWOT Analysis (Strengths, Weaknesses, Opportunities, and Threats) ... An overall goal of environmental metabolomics is to understand what is metabolomically “normal” or adaptive and what constitutes a threat to human health and the environment. ...

Marion G. Miller

2007-01-04T23:59:59.000Z

204

Managing Threats to Web Databases and Cyber Systems  

Science Journals Connector (OSTI)

This chapter provides an overview of some of the cyber threats information systems as well as data management ... then discusses potential solutions and challenges. The threats include access control violations, ...

Bhavani Thuraisingham

2005-01-01T23:59:59.000Z

205

Securing Infrastructure from High Explosive Threats  

SciTech Connect

Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

2009-03-20T23:59:59.000Z

206

The same, only different: Threat management systems as homologues in the tree of life  

E-Print Network (OSTI)

T. , & ,Quirin, M. (2014). Threat and defense: From anxietyto manage uncertainty and threat associated with politicalD.M.T. (2013). Sizing up the threat: The envisioned physical

Holbrook, Colin; Fessler, Daniel M.T.

2015-01-01T23:59:59.000Z

207

Stereotype Threat in Organizations: An Examination of its Scope, Triggers, and Possible Interventions  

E-Print Network (OSTI)

and social identity threat. Advances in Experimental Socialmen triggers social identity threat among female engineers.C. (2007). Stereotype threat at work. Academy of Management

Kray, Laura J.; Shirako, Aiwa

2009-01-01T23:59:59.000Z

208

Rethinking the Threats to Scientific Balance in Contexts of Litigation and Regulation  

E-Print Network (OSTI)

Monograph Rethinking the Threats to Scienti?c Balance inc factors such as threats or dollars. Environmental Healthwatched for/resisted Threats; overt pressure to slant ?

Freudenburg, William R.

2008-01-01T23:59:59.000Z

209

Mobility changes anonymity: new passive threats in mobile ad hoc networks  

E-Print Network (OSTI)

Anonymity: New Passive Threats in Mobile Ad Hoc Networkson new anonymity threats and classify the correspondingagainst the new anonymity threats in mobile networks. The

Hong, Xiaoyan; Kong, Jiejun; Gerla, Mario

2006-01-01T23:59:59.000Z

210

Confronting Ego Threats with Reappraisal versus Rumination  

E-Print Network (OSTI)

of the requirements for the degree of MASTER OF SCIENCE Approved by: Chair of Committee, Brandon Schmeichel Committee Members, Eddie Harmon-Jones Jeffrey Ackerman Head of Department, Les Morey May 2009 Major Subject: Psychology iii ABSTRACT... Confronting Ego Threats with Reappraisal versus Rumination. (May 2009) Ryan Caskey, B.A., University of Arizona Chair of Advisory Committee: Dr. Brandon Schmeichel Two experiments compared the effects of two cognitive responses (i.e., rumination...

Caskey, Ryan

2010-01-16T23:59:59.000Z

211

Nonproliferation, Nuclear Security, and the Insider Threat  

SciTech Connect

Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

Balatsky, Galya I. [Los Alamos National Laboratory; Duggan, Ruth [SNL

2012-07-12T23:59:59.000Z

212

Handsets Malware Threats and Facing Techniques  

E-Print Network (OSTI)

Nowadays, mobile handsets combine the functionality of mobile phones and PDAs. Unfortunately, mobile handsets development process has been driven by market demand, focusing on new features and neglecting security. So, it is imperative to study the existing challenges that facing the mobile handsets threat containment process, and the different techniques and methodologies that used to face those challenges and contain the mobile handsets malwares. This paper also presents a new approach to group the different malware containment systems according to their typologies.

Elfattah, Marwa M A; Sarhan, Ebada

2012-01-01T23:59:59.000Z

213

The multi-sensor nuclear threat detection Dorit S. Hochbaum  

E-Print Network (OSTI)

an efficient graph algorithm that solves the problem in polynomial time. Detecting nuclear threatsThe multi-sensor nuclear threat detection problem Dorit S. Hochbaum Abstract One way of reducing sources. We address here the problem of detecting nuclear threats by using multiple detectors mounted

Hochbaum, Dorit S.

214

Maritime Threat Detection Using Probabilistic Graphical Models Bryan Auslander1  

E-Print Network (OSTI)

Maritime Threat Detection Using Probabilistic Graphical Models Bryan Auslander1 , Kalyan Moy Gupta1.lastname@knexusresearch.com | david.aha@nrl.navy.mil Abstract Maritime threat detection is a challenging problem because maritime them on a threat recognition task using track data obtained from force protection naval exercises

Gupta, Kalyan Moy

215

Insider Threat Detection using Stream Mining and Graph Mining  

E-Print Network (OSTI)

Insider Threat Detection using Stream Mining and Graph Mining Pallabi Parveen, Jonathan Evans threats who attempt to conceal their activities by varying their behaviors over time. This paper applies of insider threat detection, demonstrating that the ensemble-based approach is significantly more effective

Hamlen, Kevin W.

216

Mitigating the Risk of Insider Threats When Sharing  

E-Print Network (OSTI)

Mitigating the Risk of Insider Threats When Sharing Credentials by Muntaha NourEddin Qasem Alawneh requirement. Achieving secure content sharing requires a deep analy- sis and understanding of security threats affecting such a fundamental requirement. We study and analyze one of the major threats which affect secure

Sheldon, Nathan D.

217

European Commission DG ENV Soil biodiversity: functions, threats and  

E-Print Network (OSTI)

European Commission DG ENV Soil biodiversity: functions, threats and tools for policy makers.turbe@biois.com In association with #12;2 European Commission - DG ENV Soil biodiversity: functions, threats and tools for policy Putten, Eric Labouze, and Shailendra Mudgal. Soil biodiversity: functions, threats and tools for policy

Paris-Sud XI, Université de

218

THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS  

E-Print Network (OSTI)

THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS Joshua Pauli College of Business.xu@ndsu.nodak.edu Keywords: Software architecture, Security, Threat model, Use case, Misuse case, UML Abstract: To deal with software security issues in the early stages of system development, this paper presents a threat- driven

219

Rapid evolutionary dynamics and disease threats to biodiversity  

E-Print Network (OSTI)

Rapid evolutionary dynamics and disease threats to biodiversity Sonia Altizer1 , Drew Harvell2 should enable hosts to respond better to future disease threats. Infectious diseases are recognized populations, or have been implicated as threats to already declining species [4­6]. Although infectious

220

Decentralized Semantic Threat Graphs Simon N. Foley1  

E-Print Network (OSTI)

Decentralized Semantic Threat Graphs Simon N. Foley1 William M. Fitzgerald1 Cork Constraint.foley@cs.ucc.ie wfitzgerald@4c.ucc.ie Abstract. Threat knowledge-bases such as those maintained by MITRE and NIST provide a basis with which to mitigate known threats to an enterprise. These centralised knowledge-bases assume

Foley, Simon

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Maritime Threat Detection using Plan Recognition Bryan Auslander1  

E-Print Network (OSTI)

Maritime Threat Detection using Plan Recognition Bryan Auslander1 , Kalyan Moy Gupta1 , & David W algorithms for maritime threat detection employ a variety of normalcy models that are probabilistic and for threat detection. We compare their performance with a behavior recognition algorithm on simulated

Gupta, Kalyan Moy

222

BOMB THREAT PLACE THIS CARD UNDER YOUR TELEPHONE  

E-Print Network (OSTI)

BOMB THREAT PLACE THIS CARD UNDER YOUR TELEPHONE QUESTIONS TO ASK: 1. When is the bomb going? EXACT WORDING OF THE THREAT: Sex of caller: Race: Age: Number at which call received: Length of call: Check Caller ID - *69: Record caller's number: Time: Date: IMMEDIATELY REPORT BOMB THREATS TO

Slatton, Clint

223

FACTS about threat Possible INTERVENTIONS Strong domain identification  

E-Print Network (OSTI)

FACTS about threat Possible INTERVENTIONS Strong domain identification heightens the effect are able to self affirm in difficult situations can lessen the effects of threat. Encourage students to use to students not under threat. Educate students on self talk! Teach them to pay close attention

Chisholm, Rex L.

224

Ionosphere Threat to LAAS: Updated Model, User Impact, and Mitigations  

E-Print Network (OSTI)

1 Ionosphere Threat to LAAS: Updated Model, User Impact, and Mitigations Ming Luo, Sam Pullen-4], a "linear spatial gradient front" model was established and a threat space was extrapolated based on data from the 6 April 2000 ionospheric storm. User vertical error was estimated based on this threat model

Stanford University

225

Predictors of Threat and Error Management: Identification of Core  

E-Print Network (OSTI)

Predictors of Threat and Error Management: Identification of Core Nontechnical Skills In normal flight operations, crews are faced with a variety of external threats and commit a range of errors of these threats and errors therefore forms an essential element of enhancing performance and minimizing risk

226

Not All Threats are Created Equal: How Implicitness and Timing Affect the Effectiveness of Threats in Negotiations  

Science Journals Connector (OSTI)

The effectiveness of threats in negotiations was examined by exploring two ... implicitness, or the extent to which the threat mentions what action the perpetrator would take ... and timing, or the time when the

Marwan Sinaceur; Margaret A. Neale

2005-01-01T23:59:59.000Z

227

Notices Electronic Access to This Document:  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

805 Federal Register 805 Federal Register / Vol. 77, No. 67 / Friday, April 6, 2012 / Notices Electronic Access to This Document: The official version of this document is the document published in the Federal Register. Free Internet access to the official edition of the Federal Register and the Code of Federal Regulations is available via the Federal Digital System at: www.gpo.gov/fdsys. At this site you can view this document, as well as all other documents of this Department published in the Federal Register, in text or Adobe Portable Document Format (PDF). To use PDF you must have Adobe Acrobat Reader, which is available free at the site. You may also access documents of the Department published in the Federal Register by using the article search feature at: www.federalregister.gov.

228

Document Control Process  

NLE Websites -- All DOE Office Websites (Extended Search)

1 Document Control Process 11_0304 Page 1 of 7 1 Document Control Process 11_0304 Page 1 of 7 EOTA - Business Process Document Title: Document Control Process Document Number: P-001 Rev 11_0304 Document Owner: Elizabeth Sousa Backup Owner: Melissa Otero Approver(s): Melissa Otero Parent Document: Q-001, Quality Manual Notify of Changes: EOTA Employees Referenced Document(s): F-001 Document Control Template - Process, F-002 Document Control Template - Instruction, F-003 Document Control Template - Screenshot, F-004 Document Control Template - Form, F-005 Document Control Template - Form - Excel, MGTP-002 Skill Set Model, Q-003 EOTA Processes: Sequence and Interaction, P-003, Control of Records P-001 Document Control Process 11_0304 Page 2 of 7 Revision History: Rev. Description of Change

229

Evaluating and managing the integrity of computerized accountability systems against insider threats  

SciTech Connect

Accountability applications such as nuclear material accountability systems at Department of Energy (DOE) facilities provide for tracking inventories, documenting transactions, issuing periodic reports, and assisting in the detection of unauthorized system access and data falsification. Insider threats against the system represent the potential to degrade the integrity with which these functions are addressed. While preventing unauthorized access by external threats is vital, it is also critical to understand how application features affect the ability of insiders to impact the integrity of data in the system. Aspects of modern computing systems including powerful personal computers and applications on networks, mixed security environments, and more users with increased software knowledge and skills help heighten the concern about insider threats. A question arises as follows. How can managers and policy makers logically and pragmatically analyze the myriad customization and design options for accountability applications with respect to the insider threat. In this paper, we describe a methodology for addressing this question, along with insights from its application to local area network (LAN) material accountability systems.

Jones, E.; Sicherman, A.

1996-06-01T23:59:59.000Z

230

NNSA Launches Global Threat Reduction Initiative | National Nuclear  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Threat Reduction Initiative | National Nuclear Global Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > NNSA Launches Global Threat Reduction Initiative NNSA Launches Global Threat Reduction Initiative May 26, 2004 Vienna, Austria NNSA Launches Global Threat Reduction Initiative

231

Office of Nuclear Threat Science | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Threat Science | National Nuclear Security Administration Nuclear Threat Science | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Office of Nuclear Threat Science Home > About Us > Our Programs > Counterterrorism and Counterproliferation > Office of Nuclear Threat Science Office of Nuclear Threat Science

232

Office of Nuclear Threat Science | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Threat Science | National Nuclear Security Administration Threat Science | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Office of Nuclear Threat Science Home > About Us > Our Programs > Counterterrorism and Counterproliferation > Office of Nuclear Threat Science Office of Nuclear Threat Science

233

NNSA Launches Global Threat Reduction Initiative | National Nuclear  

National Nuclear Security Administration (NNSA)

Global Threat Reduction Initiative | National Nuclear Global Threat Reduction Initiative | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > NNSA Launches Global Threat Reduction Initiative NNSA Launches Global Threat Reduction Initiative May 26, 2004 Vienna, Austria NNSA Launches Global Threat Reduction Initiative

234

Review of July 2013 Nuclear Security Insider Threat Exercise November 2013  

SciTech Connect

This document is a review of the Nuclear Security Insider Threat Exercise which was hosted at ORNL in July 2013. Nuclear security culture and the insider threat are best learned through experience. Culture is inherently difficult to teach, and as such is best learned through modeled behaviors and learning exercise. This TTX, NSITE, is a tool that strives to aid students in learning what an effective (and ineffective) nuclear security culture might look like by simulating dynamic events that strengthen or weaken the nuclear security regime. The goals of NSITE are to stimulate complex thought and discussion and assist decision makers and management in determining the most effective policies and procedures for their country or facility.

Pederson, Ann C. [ORNL] [ORNL; Snow, Catherine L. [ORNL] [ORNL; Townsend, Jeremy [ORNL] [ORNL; Shannon, Michael [ORNL] [ORNL

2013-11-01T23:59:59.000Z

235

Control of External Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

2 Control of External Documents Process 11_0304 Page 1 of 5 2 Control of External Documents Process 11_0304 Page 1 of 5 EOTA - Business Process Document Title: Control of External Documents Process Document Number P-002 Rev 11_0304 Document Owner: Elizabeth Sousa Backup Owner: Melissa Otero Approver(s): Melissa Otero Parent Document: Q-001, Quality Manual Notify of Changes: EOTA Employees Referenced Document(s): REG-002, External Document Register P-002 Control of External Documents Process 11_0304 Page 2 of 5 Revision History: Rev. Description of Change A Initial Release 11_0304 Changed revision format from alpha character to numbers; modified process to include a step directing addition to REG-002 External Document Register and changed verbiage to clarify and more accurately reflect current process.

236

Chlorine Gas: An Evolving Hazardous Material Threat and Unconventional Weapon  

E-Print Network (OSTI)

biological, and chemical weapons of warfare and terrorism.Threat and Unconventional Weapon Robert Jones, MD Brandonand as a terrorist weapon. This review will summarize recent

Jones, Robert; Wills, Brandon; Kang, Christopher

2010-01-01T23:59:59.000Z

237

COLLOQUIUM: Nuclear Famine: The Threat to Humanity from Nuclear...  

NLE Websites -- All DOE Office Websites (Extended Search)

MBG Auditorium COLLOQUIUM: Nuclear Famine: The Threat to Humanity from Nuclear Weapons Dr. Alan Robock Rutgers University A nuclear war between India and Pakistan, with...

238

Mitigating the Insider Threat Using Behavioral Science Workshop  

SciTech Connect

PowerPoint presentations are included on: the Insider Threat; Detecting the Malicious Insider through Behavioral Science; and Psychological Barriers to Effective Nuclear Security.

Landers, John; De Castro, Kara

2012-11-26T23:59:59.000Z

239

ORISE: Securing the Golden State from threats foreign and domestic  

NLE Websites -- All DOE Office Websites (Extended Search)

Securing the Golden State from threats foreign and domestic ORISE helps California emergency planners with innovative training on state and local levels To protect the state of...

240

NNSA Supports Permanent Threat Reduction in Ukraine through Alternativ...  

National Nuclear Security Administration (NNSA)

terrorism around the world. Converting or replacing isotopic devices with non-isotopic alternative technology achieves permanent threat reduction by decreasing the availability...

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Working to keep us safe: Sara Brambilla, Postdoc creates threat...  

NLE Websites -- All DOE Office Websites (Extended Search)

to keep us safe: Sara Brambilla, Postdoc creates threat reduction tools Chemical engineer postdoc experiences a foreign culture while working on resources that respond to...

242

Threats from space: 20 years of progress  

E-Print Network (OSTI)

It has been 20 years since planning began for the 1995 United Nations International Conference on Near-Earth Objects. The conference proceedings established the scientific basis for an international organizational framework to support research and collective actions to mitigate a potential near-Earth object (NEO) threat to the planet. Since that time, researchers have conducted telescope surveys that should, within the coming decade, answer many questions about the size, number, and Earth impact probability of these objects. Space explorations to asteroids and comets have been successfully carried out, including sample recovery. Laboratory experiments and computer simulations at Sandia National Laboratories have analyzed the effects of soft X-ray radiation on meteorites - which might help researchers develop a way to redirect an incoming asteroid by vaporizing a thin layer of its surface. An Action Team on NEOs, established in 2001 in response to recommendations of the Third United Nations Conference on the E...

Remo, J L

2014-01-01T23:59:59.000Z

243

Decommissioning Documents | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Decommissioning Documents Decommissioning Documents More Documents & Publications Decommissioning Benchmarking Study Final Report Decommissioning Handbook dgappendices.pdf...

244

TotalView Parallel Debugger at NERSC  

NLE Websites -- All DOE Office Websites (Extended Search)

Totalview Totalview Totalview Description TotalView from Rogue Wave Software is a parallel debugging tool that can be run with up to 512 processors. It provides both X Windows-based Graphical User Interface (GUI) and command line interface (CLI) environments for debugging. The performance of the GUI can be greatly improved if used in conjunction with free NX software. The TotalView documentation web page is a good resource for learning more about some of the advanced TotalView features. Accessing Totalview at NERSC To use TotalView at NERSC, first load the TotalView modulefile to set the correct environment settings with the following command: % module load totalview Compiling Code to Run with TotalView In order to use TotalView, code must be compiled with the -g option. We

245

Nuclear Radiological Threat Task Force Established | National Nuclear  

NLE Websites -- All DOE Office Websites (Extended Search)

Radiological Threat Task Force Established | National Nuclear Radiological Threat Task Force Established | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > About Us > Our History > NNSA Timeline > Nuclear Radiological Threat Task Force Established Nuclear Radiological Threat Task Force Established November 03, 2003 Washington, DC Nuclear Radiological Threat Task Force Established

246

Global Threat Reduction Initiative | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Threat Reduction Global Threat Reduction ... Global Threat Reduction Initiative The Global Threat Reduction Initiative's Alarm Response Training provides training in the area of response for radiological events and provides an opportunity for the security forces, health and safety personnel, and other responsible parties such as the supporting local law enforcement to develop, discuss, and exercise their own tactics, techniques, procedures, and protocols when responding to a theft and/or sabotage event involving radioactive materials of significance. This voluntary program is free, and all expenses (travel, meals, etc.), other than the trainee's training time, will be paid by the GTRI Domestic Threat Reduction Program. Facilities participating in the Domestic Security Program are scheduled for

247

GTRI: Reducing Nuclear Threats | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Reducing Nuclear Threats | National Nuclear Security Administration Reducing Nuclear Threats | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > GTRI: Reducing Nuclear Threats Fact Sheet GTRI: Reducing Nuclear Threats Apr 12, 2013 Mission In 2004, NNSA established the Global Threat Reduction Initiative (GTRI) in the Office of Defense Nuclear Nonproliferation to, as quickly as possible,

248

Documents and Records Management  

Science Journals Connector (OSTI)

Walk into many enterprise organizations and ask someone in a department to describe their document storage and processing operations, and they will likely give you a story about how management of documents and...

Robert Garrett

2011-01-01T23:59:59.000Z

249

Documents for Foreign Nationals  

NLE Websites -- All DOE Office Websites (Extended Search)

documents as outlined in the chart below. Visa Types and Required Documents J1 Visa F1 Visa H1B Visa B1 Visa WB, WT, TN, or CP Visa Passport Passport Passport Passport...

250

POLICY RELATED TO THREATS OF CAMPUS DISRUPTION Bomb threats and similar situations are disruptive to the academic, research and operational functions of  

E-Print Network (OSTI)

POLICY RELATED TO THREATS OF CAMPUS DISRUPTION Bomb threats and similar situations are disruptive. Policy Any bomb threat or incident of a suspected explosive device shall be considered as valid by all advised that the situation is no longer considered a threat. Every effort must be made to protect

Collins, Gary S.

251

AMIEDoT: An annotation model for document tracking and recommendation service  

Science Journals Connector (OSTI)

The primary objective of document annotation in whatever form, manual or electronic is to allow those who may not have control to original document to provide personal view on information source. Beyond provid...

ROBERT Charles Abiodun

2007-01-01T23:59:59.000Z

252

SPEAR3 | Technical Documentation  

NLE Websites -- All DOE Office Websites (Extended Search)

Documentation Hardware Component Database: Mechanical Electrical Drawing shor tcuts BPM Development SSRL | SLAC | Stanford University | SSRL Computing | SLAC Computing last...

253

PDF Document (1182k)  

Office of Legacy Management (LM)

Only critical information was scanned. Entire document is available upon request - Click here to email a request....

254

Classification Documents and Publications  

Energy.gov (U.S. Department of Energy (DOE))

Certain documents and publications created or issued by the Office of Classification are available from this page.

255

GTT Tranmission Workshop- Documents  

Energy.gov (U.S. Department of Energy (DOE))

Use the links below to download documents from the GTT Transmission Workshop, held November 1-2, 2012.

256

September 2013 Most Viewed Documents for Mathematics And Computing | OSTI,  

Office of Scientific and Technical Information (OSTI)

Mathematics And Computing Mathematics And Computing Process Equipment Cost Estimation, Final Report H.P. Loh; Jennifer Lyons; Charles W. White, III (2002) 169 Lecture notes for introduction to safety and health Biele, F. (1992) 57 A comparison of risk assessment techniques from qualitative to quantitative Altenbach, T.J. (1995) 50 Computational procedures for determining parameters in Ramberg-Osgood elastoplastic model based on modulus and damping versus strain Ueng, Tzou-Shin; Chen, Jian-Chu. (1992) 50 Analytical considerations in the code qualification of piping systems Antaki, G.A. (1995) 38 Levenberg--Marquardt algorithm: implementation and theory More, J.J. (1977) 37 Mort User's Manual: For use with the Management Oversight and Risk Tree analytical logic diagram Knox, N.W.; Eicher, R.W. (1992)

257

September 2013 Most Viewed Documents for Fission And Nuclear Technologies |  

Office of Scientific and Technical Information (OSTI)

Fission And Nuclear Technologies Fission And Nuclear Technologies Estimation of gas leak rates through very small orifices and channels. [From sealed PuO/sub 2/ containers under accident conditions] Bomelburg, H.J. (1977) 133 Stress analysis and evaluation of a rectangular pressure vessel. [For equipment for sampling Hanford tank radwaste] Rezvani, M.A.; Ziada, H.H. (Westinghouse Hanford Co., Richland, WA (United States)); Shurrab, M.S. (Westinghouse Savannah River Co., Aiken, SC (United States)) (1992) 78 Graphite design handbook Ho, F.H. (1988) 76 Feed-pump hydraulic performance and design improvement, Phase I: research program design. Final report Brown, W.H.; Gopalakrishnan, S.; Fehlau, R.; Thompson, W.E.; Wilson, D.G. (1982) 69 Flow-induced vibration of circular cylindrical structures Chen, S.S. (1985)

258

September 2013 Most Viewed Documents for Environmental Sciences | OSTI, US  

Office of Scientific and Technical Information (OSTI)

Environmental Sciences Environmental Sciences Building a secondary containment system Broder, M.F. (1994) 59 Separation of heavy metals: Removal from industrial wastewaters and contaminated soil Peters, R.W.; Shem, L. (1993) 45 Test of a magnetic device for the amelioration of scale formation at Treatment Facility D Krauter, P.W., Harrar, J.E., Orloff, S.P., Bahowick, S.M. (1996) 38 Mitigation options for accidental releases of hazardous gases Fthenakis, V.M. (1995) 33 Ecological Screening Values for Surface Water, Sediment, and Soil Friday, G. P. (1999) 31 Ammonia usage in vapor compression for refrigeration and air-conditioning in the United States Fairchild, P.D.; Baxter, V.D. (1995) 30 Background chemistry for chemical warfare agents and decontamination processes in support of delisting waste streams at the U.S. Army Dugway

259

September 2013 Most Viewed Documents for Power Generation And Distribution  

Office of Scientific and Technical Information (OSTI)

Power Generation And Distribution Power Generation And Distribution Electric power high-voltage transmission lines: Design options, cost, and electric and magnetic field levels Stoffel, J.B.; Pentecost, E.D.; Roman, R.D.; Traczyk, P.A. (1994) 200 Wet cooling towers: rule-of-thumb design and simulation Leeper, S.A. (1981) 103 ASPEN Plus Simulation of CO2 Recovery Process Charles W. White III (2003) 76 Feed-pump hydraulic performance and design improvement, Phase I: research program design. Final report Brown, W.H.; Gopalakrishnan, S.; Fehlau, R.; Thompson, W.E.; Wilson, D.G. (1982) 69 Seventh Edition Fuel Cell Handbook NETL (2004) 65 Load flow analysis: Base cases, data, diagrams, and results Portante, E.C.; Kavicky, J.A.; VanKuiken, J.C.; Peerenboom, J.P. (1997) 52 Controlled low strength materials (CLSM), reported by ACI Committee

260

January 2013 Most Viewed Documents for Engineering | OSTI, US...  

Office of Scientific and Technical Information (OSTI)

Engineering; Hamad, F.A.; Abu-Arabi, M. University of Science and Technology, Irbid (Jordan). Dept. of Chemical Engineering Design and optimization of the low frequency eddy...

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Most Viewed Documents for Geosciences: September 2014 | OSTI...  

Office of Scientific and Technical Information (OSTI)

Los Alamos National Laboratory (2014) 24 Sloshing analysis of viscous liquid storage tanks Uras, R.Z. (1995) 22 Seismic and magneto-telluric imaging for geothermal exploration...

262

Most Viewed Documents for Fission And Nuclear Technologies: September...  

Office of Scientific and Technical Information (OSTI)

PWR and BWR Not Available (1975) 27 Sloshing analysis of viscous liquid storage tanks Uras, R.Z. (1995) 22 Flow-induced vibration of circular cylindrical structures Chen,...

263

July 2013 Most Viewed Documents for Geosciences | OSTI, US Dept...  

Office of Scientific and Technical Information (OSTI)

W.A. Stephenson, D.E. (1978) 22 > Sloshing analysis of viscous liquid storage tanks Uras, R.Z. (1995) 21 > COsub 2-Hsub 2O mixtures in the geologic sequestration of...

264

April 2013 Most Viewed Documents for Fission And Nuclear Technologies...  

Office of Scientific and Technical Information (OSTI)

W.B.; Allison, G.S. (1979) 89 > Sloshing analysis of viscous liquid storage tanks Uras, R.Z. (1995) 83 > Thermophysical properties of sodium nitrate and sodium...

265

Most Viewed Documents for Fossil Fuels: December 2014 | OSTI...  

Office of Scientific and Technical Information (OSTI)

North Slope Oils Tao Zhu; Jack A. Walker; J. Liang (2008) 29 Avian Collisions with Wind Turbines: A Summary of Existing Studies and Comparisons to Other Sources of Avian Collision...

266

Most Viewed Documents for Fossil Fuels: September 2014 | OSTI...  

Office of Scientific and Technical Information (OSTI)

Gas to Synthesis Gas Steven F. Rice; David P. Mann (2007) 51 Avian Collisions with Wind Turbines: A Summary of Existing Studies and Comparisons to Other Sources of Avian Collision...

267

Most Viewed Documents for Renewable Energy Sources: September...  

Office of Scientific and Technical Information (OSTI)

Gas to Synthesis Gas Steven F. Rice; David P. Mann (2007) 51 Avian Collisions with Wind Turbines: A Summary of Existing Studies and Comparisons to Other Sources of Avian Collision...

268

March 2014 Most Viewed Documents for Renewable Energy Sources...  

Office of Scientific and Technical Information (OSTI)

Final report Benemann, J.R.; Oswald, W.J. (1996) 65 > Avian Collisions with Wind Turbines: A Summary of Existing Studies and Comparisons to Other Sources of Avian Collision...

269

March 2014 Most Viewed Documents for Fossil Fuels | OSTI, US...  

Office of Scientific and Technical Information (OSTI)

Final report Benemann, J.R.; Oswald, W.J. (1996) 65 > Avian Collisions with Wind Turbines: A Summary of Existing Studies and Comparisons to Other Sources of Avian Collision...

270

Most Viewed Documents for Renewable Energy Sources: December...  

Office of Scientific and Technical Information (OSTI)

through 180-degree angle of attack for use in aerodynamic analysis of vertical axis wind turbines Sheldahl, R E; Klimas, P C (1981) 50 Calculation of brine properties. Above 80...

271

January 2013 Most Viewed Documents for Environmental Sciences...  

Office of Scientific and Technical Information (OSTI)

Karlsruhe GmbH, Institut fuer Neutronenphysik und Reaktortechnik, Karlsruhe (Germany) Microbial rehabilitation of soils in the vicinity of former coking plants;...

272

July 2013 Most Viewed Documents for National Defense | OSTI,...  

Office of Scientific and Technical Information (OSTI)

R.A. (1997) 44 > Specific heat and thermal conductivity of explosives, mixtures, and plastic-bonded explosives determined experimentally Baytos, J.F. (1979) 39 > The Effects of...

273

Most Viewed Documents for National Defense: December 2014 | OSTI...  

Office of Scientific and Technical Information (OSTI)

P.W. (1994) 32 Specific heat and thermal conductivity of explosives, mixtures, and plastic-bonded explosives determined experimentally Baytos, J.F. (1979) 28 Vapor-liquid...

274

Most Viewed Documents for Geosciences: December 2014 | OSTI,...  

NLE Websites -- All DOE Office Websites (Extended Search)

the coupled thermal-hydrological-mechanical-chemical (THMC) processes during in situ oil shale production Pawar, Rajesh J. Los Alamos National Laboratory (2012) 16...

275

March 2014 Most Viewed Documents for Geosciences | OSTI, US Dept...  

NLE Websites -- All DOE Office Websites (Extended Search)

the coupled thermal-hydrological-mechanical-chemical (THMC) processes during in situ oil shale production Pawar, Rajesh J. Los Alamos National Laboratory (2012) 14 > Worldwide...

276

January 2013 Most Viewed Documents for National Defense | OSTI...  

Office of Scientific and Technical Information (OSTI)

L.T. From separations to reconstitution - a short history of Plutonium in the U.S. and Russia Gray, L W Condensation induced water hammer safety Gintner, M.A. Direct calibration of...

277

January 2013 Most Viewed Documents for Geosciences | OSTI, US...  

Office of Scientific and Technical Information (OSTI)

Crater Formation for Selected Lawrence Livermore National Laboratory Underground Nuclear Tests - 2011, Part 2 Pawloski, G A Evaluation of Cross-Hole Seismic Tomography for...

278

Most Viewed Documents for Biology and Medicine: September 2014...  

Office of Scientific and Technical Information (OSTI)

Robert Hayes (2008) 16 Defining the Effectiveness of UV Lamps Installed in Circulating Air Ductwork Douglas VanOsdell; Karin Foarde (2002) 15 Toxicity and physical properties of...

279

September 2013 Most Viewed Documents for Biology And Medicine...  

Office of Scientific and Technical Information (OSTI)

Cramer, E. (1997) 16 > Defining the Effectiveness of UV Lamps Installed in Circulating Air Ductwork Douglas VanOsdell; Karin Foarde (2002) 16 > Synthesis of Polycyclic Natural...

280

July 2013 Most Viewed Documents for Biology And Medicine | OSTI...  

Office of Scientific and Technical Information (OSTI)

1994 NONE (1995) 39 > Defining the Effectiveness of UV Lamps Installed in Circulating Air Ductwork Douglas VanOsdell; Karin Foarde (2002) 32 > Mesoporous Silica Nanomaterials...

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Most Viewed Documents for Biology and Medicine: December 2014...  

Office of Scientific and Technical Information (OSTI)

Moe; Ryan Dorn (2002) 23 Toxicity and physical properties of atrazine and its degradation products: A literature survey Pugh, K.C. (1994) 18 Literature review: Phytoaccumulation of...

282

January 2013 Most Viewed Documents for Materials | OSTI, US Dept...  

Office of Scientific and Technical Information (OSTI)

1minusyFesub yOsub 3minusdelta (M Sr,Ca,Ba) perovskites Stevenson, J.W.; Armstrong, T.R.; Pederson, L.R.; Weber, W.J. Pacific Northwest Lab., Richland, WA (United...

283

Most Viewed Documents for National Defense: September 2014 |...  

Office of Scientific and Technical Information (OSTI)

Project 6.12 DETERMINATION OF HEIGHT OF BURST AND GROUND ZERO Tiede, Roland V.; Kelly, Daniel F.; Burger, Kenneth C. (1955) 17 Ground-based Nuclear Detonation Detection...

284

Most Viewed Documents for Power Generation and Distribution:...  

Office of Scientific and Technical Information (OSTI)

Methods for Power Distribution Systems: Final Report Tom McDermott (2010) 34 Industrial Power Factor Analysis Guidebook. Electrotek Concepts. (1995) 29 Recovery of Water from...

285

Most Viewed Documents for Materials: December 2014 | OSTI, US...  

Office of Scientific and Technical Information (OSTI)

of the transition Metals and Metal Silicides Drummond, T.J. (1999) 31 THERMOCHEMICAL HEAT STORAGE FOR CONCENTRATED SOLAR POWER PROJECT STAFF (2011) 30 Verification of...

286

Most Viewed Documents for Energy Storage, Conversion, and Utilization...  

Office of Scientific and Technical Information (OSTI)

R.K. R.K. Sen & Associates, Inc., Bethesda, MD (United States) (1997) 29 THERMOCHEMICAL HEAT STORAGE FOR CONCENTRATED SOLAR POWER PROJECT STAFF (2011) 29 Developing Clean Energy...

287

July 2013 Most Viewed Documents for Engineering | OSTI, US Dept...  

Office of Scientific and Technical Information (OSTI)

literature review Doebling, S.W.; Farrar, C.R.; Prime, M.B.; Shevitz, D.W. (1996) 122 > Heat transfer model of above and underground insulated piping systems Kwon, K.C. (1998)...

288

September 2013 Most Viewed Documents for Renewable Energy Sources...  

Office of Scientific and Technical Information (OSTI)

Corey, G.P. (1996) 76 > PROPERTIES AND PERFORMANCE OF CEMENT-BASED GROUTS FOR GEOTHERMAL HEAT PUMP APPLICATIONS. ALLAN,M.L. (1999) 70 > Solar radiation data manual for flat-plate...

289

March 2014 Most Viewed Documents for Engineering | OSTI, US Dept...  

Office of Scientific and Technical Information (OSTI)

Sierra, Dannelle P. ; Weir, Nathan A. ; Jones, James Frank (2005) 27 > Conduction heat transfer solutions VanSant, J.H. (1983) 25 > Standard NIM instrumentation system Not...

290

Most Viewed Documents for Energy Storage, Conversion, and Utilization...  

Office of Scientific and Technical Information (OSTI)

of American Railroads, Washington, DC (United States) (1996) 30 THERMOCHEMICAL HEAT STORAGE FOR CONCENTRATED SOLAR POWER PROJECT STAFF (2011) 30 High-albedo materials...

291

June 2014 Most Viewed Documents for Energy Storage, Conversion...  

Office of Scientific and Technical Information (OSTI)

Aggregate Production Greg Adel; Toni Kojovic; Darren Thornton (2006) 36 > THERMOCHEMICAL HEAT STORAGE FOR CONCENTRATED SOLAR POWER PROJECT STAFF (2011) 34 > Evaluation of the...

292

Most Viewed Documents for Power Generation and Distribution:...  

Office of Scientific and Technical Information (OSTI)

W ; Trainor-Guitton, W (2013) 18 Recovery of Water from Boiler Flue Gas Using Condensing Heat Exchangers Levy, Edward; Bilirgen, Harun; DuPont, John (2011) 18 Wind power...

293

January 2013 Most Viewed Documents for Energy Storage, Conversion...  

Office of Scientific and Technical Information (OSTI)

(Energitjenesten, Copenhagen (Denmark)) Norwegian energy policy Utseth, Anita Energy systems and technologies for the coming century. Proceedings Soenderberg Petersen, L.;...

294

September 2013 Most Viewed Documents for National Defense | OSTI...  

Office of Scientific and Technical Information (OSTI)

TNT Equivalence Cooper, P.W. (1994) 26 LLNL small-scale drop-hammer impact sensitivity test Simpson, L.R.; Foltz, M.F. (1995) 25 The future of components for high reliability...

295

June 2014 Most Viewed Documents for National Defense | OSTI,...  

Office of Scientific and Technical Information (OSTI)

acid-water solutions Maimoni, A. (1980) 25 LLNL Small-Scale Friction sensitivity (BAM) Test Simpson, L.R.; Foltz, M.F. (1996) 23 SMART BRIDGE: A tool for estimating the military...

296

July 2013 Most Viewed Documents for Mathematics And Computing...  

Office of Scientific and Technical Information (OSTI)

Process Equipment Cost Estimation, Final Report H.P. Loh; Jennifer Lyons; Charles W. White, III (2002) 567 > A comparison of risk assessment techniques from qualitative to...

297

June 2014 Most Viewed Documents for Power Generation And Distribution...  

Office of Scientific and Technical Information (OSTI)

Traczyk, P.A. (1994) 89 > ASPEN Plus Simulation of CO2 Recovery Process Charles W. White III (2003) 85 > Wet cooling towers: rule-of-thumb design and simulation Leeper, S.A....

298

April 2013 Most Viewed Documents for Mathematics And Computing...  

Office of Scientific and Technical Information (OSTI)

> Process Equipment Cost Estimation, Final Report H.P. Loh; Jennifer Lyons; Charles W. White, III (2002) 93 > PC-1D installation manual and user's guide Basore, P.A. (1991) 70 >...

299

July 2013 Most Viewed Documents for Power Generation And Distribution...  

Office of Scientific and Technical Information (OSTI)

Traczyk, P.A. (1994) 535 > ASPEN Plus Simulation of CO2 Recovery Process Charles W. White III (2003) 165 > Wet cooling towers: rule-of-thumb design and simulation Leeper, S.A....

300

Most Viewed Documents for Physics: December 2014 | OSTI, US Dept...  

Office of Scientific and Technical Information (OSTI)

27 Review of hydrogen isotope permeability through materials Steward, S.A. (1983) 27 White LED with High Package Extraction Efficiency Yi Zheng; Matthew Stough (2008) 20...

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Most Viewed Documents for Physics: September 2014 | OSTI, US...  

Office of Scientific and Technical Information (OSTI)

Goldstein's Classical Mechanics: Second edition Unseren, M.A.; Hoffman, F.M. (1993) 26 White LED with High Package Extraction Efficiency Yi Zheng; Matthew Stough (2008) 25...

302

July 2013 Most Viewed Documents for Energy Storage, Conversion...  

Office of Scientific and Technical Information (OSTI)

Process Equipment Cost Estimation, Final Report H.P. Loh; Jennifer Lyons; Charles W. White, III (2002) 567 > A study of lead-acid battery efficiency near top-of-charge and the...

303

June 2014 Most Viewed Documents for Engineering | OSTI, US Dept...  

Office of Scientific and Technical Information (OSTI)

displacement correlation method for estimating stress intensity factors Fu, P; Johnson, S M; Settgast, R R; Carrigan, C R (2011) 95 > Review of experiments and...

304

June 2014 Most Viewed Documents for Biology And Medicine | OSTI...  

Office of Scientific and Technical Information (OSTI)

Studies (2007) 24 > Radiation Protection Instrument Manual, Revision 1, PNL-MA-562 Johnson, Michelle Lynn (2009) 24 > Carbon Dioxide Sequestering Using Microalgal Systems...

305

January 2013 Most Viewed Documents for Power Generation And Distributi...  

Office of Scientific and Technical Information (OSTI)

T Tennessee Valley Authority (TVA); Morris, K Tennessee Valley Authority (TVA) National SCADA Test Bed Substation Automation Evaluation Report Kenneth Barnes; Briam Johnson...

306

Most Viewed Documents for Engineering: December 2014 | OSTI,...  

Office of Scientific and Technical Information (OSTI)

displacement correlation method for estimating stress intensity factors Fu, P; Johnson, S M; Settgast, R R; Carrigan, C R (2011) 107 Damage identification and health...

307

March 2014 Most Viewed Documents for Biology And Medicine | OSTI...  

Office of Scientific and Technical Information (OSTI)

Studies (2007) 18 > Radiation Protection Instrument Manual, Revision 1, PNL-MA-562 Johnson, Michelle Lynn (2009) 16 > MEDICAL EFFECTS OF ATOMIC BOMBS THE REPORT OF THE JOINT...

308

January 2013 Most Viewed Documents for Physics | OSTI, US Dept...  

Office of Scientific and Technical Information (OSTI)

Report on STTR Project DE-FG02-04ER86191 Hydrogen Cryostat for Muon Beam Cooling Johnson, Rolland P. Methods for Optical Calibration of the BigBite Hadron Spectrometer M....

309

June 2014 Most Viewed Documents for Renewable Energy Sources...  

Office of Scientific and Technical Information (OSTI)

(1998) 115 Generalized displacement correlation method for estimating stress intensity factors Fu, P; Johnson, S M; Settgast, R R; Carrigan, C R (2011) 95 Advanced Electric...

310

Most Viewed Documents for Fission and Nuclear Technologies: December...  

Office of Scientific and Technical Information (OSTI)

Nicolas; Pruess, Karsten (2004) 21 Levelized Costs for Nuclear, Gas and Coal for Electricity, under the Mexican Scenario Palacios, J.C.; Alonso, G.; Ramirez, R.; Gomez, A.;...

311

March 2014 Most Viewed Documents for Fission And Nuclear Technologies...  

Office of Scientific and Technical Information (OSTI)

J. (1978) 30 > Reactor safety study. An assessment of accident risks in U. S. commercial nuclear power plants. Executive summary: main report. PWR and BWR Not Available (1975)...

312

Most Viewed Documents - Fission and Nuclear Technologies | OSTI...  

Office of Scientific and Technical Information (OSTI)

States) (1997) Environmental Aspects, Objectives and Targets Identification Process R. Green (2002) Flow-induced vibration of circular cylindrical structures Chen, S.S. (1985)...

313

March 2014 Most Viewed Documents for Physics | OSTI, US Dept...  

Office of Scientific and Technical Information (OSTI)

J.N.; Wiedemann, H. (Stanford Univ., CA (USA). Stanford Synchrotron Radiation Lab.); Green, M.C.; Nelson, L.V. (Varian Associates, Inc., Palo Alto, CA (USA)); Miller, R.H....

314

Most Viewed Documents for Engineering: September 2014 | OSTI...  

Office of Scientific and Technical Information (OSTI)

based design for radioactive material transport packagings -- Historical review Smith, J.A.; Salzbrenner, D.; Sorenson, K.; McConnell, P. (1998) 61 Conduction heat transfer...

315

June 2014 Most Viewed Documents for Geosciences | OSTI, US Dept...  

Office of Scientific and Technical Information (OSTI)

Feed Multicomponent Equilibrium Models for Testing Geot Carl D. Palmer; Robert W. Smith; Travis L. McLing; (2013) 28 > Modification of fracture surfaces by dissolution. Part...

316

Most Viewed Documents for Chemistry: December 2014 | OSTI, US...  

Office of Scientific and Technical Information (OSTI)

by Light Scattering Investigations Sonny A. Ekhorutomwen; Samuel P. Sawan; Barbara F. Smith; Thomas W. Robison; Kennard V. Wilson (2004) 21 Reactive Distillation for...

317

June 2014 Most Viewed Documents for Materials | OSTI, US Dept...  

Office of Scientific and Technical Information (OSTI)

and polyester-polyol-based rigid urethane foam systems Madden, J.P.; Baker, G.K.; Smith, C.H. (1971) 38 > THERMOCHEMICAL HEAT STORAGE FOR CONCENTRATED SOLAR POWER PROJECT...

318

Most Viewed Documents for Mathematics and Computing: September...  

Office of Scientific and Technical Information (OSTI)

for configuration management using computer aided software engineering (CASE) tools Smith, P.R.; Sarfaty, R. (1993) 26 Ferrite Measurement in Austenitic and Duplex Stainless...

319

Most Viewed Documents for Environmental Sciences: September 2014...  

Office of Scientific and Technical Information (OSTI)

F.; Olivier, J.; Pickering, K.; Pitari, G.; Roelofs, G.-J.; Rogers, H.; Rognerud, B.; Smith, Steven J.; Solomon, S.; Staehelin, J.; Steele, P.; Stevenson, D. S.; Sundet, J.;...

320

March 2014 Most Viewed Documents for Materials | OSTI, US Dept...  

Office of Scientific and Technical Information (OSTI)

and polyester-polyol-based rigid urethane foam systems Madden, J.P.; Baker, G.K.; Smith, C.H. (1971) 33 > Work Functions of the transition Metals and Metal Silicides...

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

June 2014 Most Viewed Documents for Environmental Sciences |...  

Office of Scientific and Technical Information (OSTI)

F.; Olivier, J.; Pickering, K.; Pitari, G.; Roelofs, G.-J.; Rogers, H.; Rognerud, B.; Smith, Steven J.; Solomon, S.; Staehelin, J.; Steele, P.; Stevenson, D. S.; Sundet, J.;...

322

April 2013 Most Viewed Documents for Environmental Sciences ...  

Office of Scientific and Technical Information (OSTI)

F.; Olivier, J.; Pickering, K.; Pitari, G.; Roelofs, G.-J.; Rogers, H.; Rognerud, B.; Smith, Steven J.; Solomon, S.; Staehelin, J.; Steele, P.; Stevenson, D. S.; Sundet, J.;...

323

Most Viewed Documents for Environmental Sciences: December 2014...  

Office of Scientific and Technical Information (OSTI)

F.; Olivier, J.; Pickering, K.; Pitari, G.; Roelofs, G.-J.; Rogers, H.; Rognerud, B.; Smith, Steven J.; Solomon, S.; Staehelin, J.; Steele, P.; Stevenson, D. S.; Sundet, J.;...

324

July 2013 Most Viewed Documents for Materials | OSTI, US Dept...  

Office of Scientific and Technical Information (OSTI)

and polyester-polyol-based rigid urethane foam systems Madden, J.P.; Baker, G.K.; Smith, C.H. (1971) 86 > PROPERTIES AND PERFORMANCE OF CEMENT-BASED GROUTS FOR GEOTHERMAL...

325

March 2014 Most Viewed Documents for Environmental Sciences ...  

Office of Scientific and Technical Information (OSTI)

F.; Olivier, J.; Pickering, K.; Pitari, G.; Roelofs, G.-J.; Rogers, H.; Rognerud, B.; Smith, Steven J.; Solomon, S.; Staehelin, J.; Steele, P.; Stevenson, D. S.; Sundet, J.;...

326

Most Viewed Documents for Chemistry: September 2014 | OSTI, US...  

Office of Scientific and Technical Information (OSTI)

fracture: permeability increases with concurrent dissolutionreprecipitation reactions Smith, M M; Walsh, S C; McNab, W W; Carroll, S A (2013) 20 THERMAL EXPANSION AND PHASE...

327

Most Viewed Documents for Materials: September 2014 | OSTI, US...  

Office of Scientific and Technical Information (OSTI)

based design for radioactive material transport packagings -- Historical review Smith, J.A.; Salzbrenner, D.; Sorenson, K.; McConnell, P. (1998) 61 Charpy impact test...

328

June 2014 Most Viewed Documents for Chemistry | OSTI, US Dept...  

Office of Scientific and Technical Information (OSTI)

by Light Scattering Investigations Sonny A. Ekhorutomwen; Samuel P. Sawan; Barbara F. Smith; Thomas W. Robison; Kennard V. Wilson (2004) 19 > A kinetic study of methanol...

329

June 2014 Most Viewed Documents for Mathematics And Computing...  

Office of Scientific and Technical Information (OSTI)

for configuration management using computer aided software engineering (CASE) tools Smith, P.R.; Sarfaty, R. (1993) 18 > Description of DASSL: a differentialalgebraic system...

330

Most Viewed Documents for Mathematics and Computing: December...  

Office of Scientific and Technical Information (OSTI)

for configuration management using computer aided software engineering (CASE) tools Smith, P.R.; Sarfaty, R. (1993) 22 Solar Position Algorithm for Solar Radiation Applications...

331

March 2014 Most Viewed Documents for Chemistry | OSTI, US Dept...  

Office of Scientific and Technical Information (OSTI)

by Light Scattering Investigations Sonny A. Ekhorutomwen; Samuel P. Sawan; Barbara F. Smith; Thomas W. Robison; Kennard V. Wilson (2004) 15 > Efficient computation of volume of...

332

July 2013 Most Viewed Documents for Environmental Sciences |...  

Office of Scientific and Technical Information (OSTI)

Rogner, Hans-Holger; Sankovski, Alexei; Schlesinger, Michael; Shukla, Priyadarshi; Smith, Steven J.; Swart, Robert; van Rooijen, Sascha; Victor, Nadejda; Dadi, Zhou (2000) 51...

333

September 2013 Most Viewed Documents for Environmental Sciences...  

Office of Scientific and Technical Information (OSTI)

Soil Friday, G. P. (1999) 31 > Ammonia usage in vapor compression for refrigeration and air-conditioning in the United States Fairchild, P.D.; Baxter, V.D. (1995) 30 >...

334

January 2013 Most Viewed Documents for Biology And Medicine ...  

Office of Scientific and Technical Information (OSTI)

L. como biomonitor Nogueira, Claudio Ailton Development of simulation tools for virus shell assembly. Final report Berger, Bonnie Transcriptional Regulation of...

335

September 2013 Most Viewed Documents for Mathematics And Computing...  

Office of Scientific and Technical Information (OSTI)

22 > NM WAIDS: A PRODUCED WATER QUALITY AND INFRASTRUCTURE GIS DATABASE FOR NEW MEXICO OIL PRODUCERS Martha Cather; Robert Lee; Ibrahim Gundiler; Andrew Sung; Naomi Davidson;...

336

Office of Document Reviews  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Document Reviews ensures that all documents prepared at DOE Headquarters are properly marked to identify the level and category of protected information they contain (if any) and to ensure that all documents the Department prepares or is required to review under applicable statutes for public release contain no information requiring protection under law, regulations and Executive orders.

337

Technosocial Modeling of IED Threat Scenarios and Attacks  

SciTech Connect

This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.; Young, Jonathan; Wolf, Katherine E.; Thompson, Sandra E.; Niesen, David A.; Madsen, John M.; Henderson, Cynthia L.

2009-03-23T23:59:59.000Z

338

Response to Bomb Threats Page 1 of 3 Virginia Polytechnic Institute and State University No. 5600 Rev.: 4  

E-Print Network (OSTI)

Response to Bomb Threats Page 1 of 3 Virginia Polytechnic Institute and State University No. 5600 __________________________________________________________________________________ Subject: Response to Bomb Threats ............................................................................................................................................................1 3.1 Telephoned Threat

Virginia Tech

339

Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security  

E-Print Network (OSTI)

Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security Marwan Abi Science Carnegie Mellon University Pittsburgh, PA 15213 Center for Software Excellence Abstract Threat Foundation. #12;Keywords: Threat modeling, data flow diagrams, reflexion models, architecture-level security

Abi-Antoun, Marwan

340

THE VISUAL CUES USED BY THE LEMON PEEL ANGELFISH (CENTROPYGE FLAVISSIMA) TO DETERMINE THREAT  

E-Print Network (OSTI)

FLAVISSIMA) TO DETERMINE THREAT JESSICA   POST Integrative be used by fish to assess threat, and indicate when it is were  important in assessing threat.   Multiple cues were 

Post, Jessica

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Threat Facilitates Subsequent Executive Control During Anxious Mood Jeffrey L. Birk  

E-Print Network (OSTI)

Threat Facilitates Subsequent Executive Control During Anxious Mood Jeffrey L. Birk Tufts) posits that low-level threat may facilitate behavioral performance by influencing executive control functions. Anxiety is thought to strengthen this effect by enhancing threat's affective significance

Patel, Aniruddh D.

342

BLINK: Pixel-Domain Encryption for Secure Document Idris Atakli  

E-Print Network (OSTI)

be a video cable with an integrated decoder box; its interface is a single switch by which the user canBLINK: Pixel-Domain Encryption for Secure Document Management Idris Atakli Department of Electrical. The primary application is delivery of confidential documents that can only be viewed by a specific machine

Chen, Yu

343

INCOMING DOCUMENT CONTROL FORM DOCUMENT DESCRIPTION ORGANIZATIO  

Office of Legacy Management (LM)

INCOMING DOCUMENT CONTROL FORM DOCUMENT DESCRIPTION ORGANIZATIO )ATE COMPLETED: ACTION NUMBER: I ! I I DOCUMENT CONTROL DATE INITIALS DATA BASE: ACTION LOG: FILED: To : Doug Tonkay, OTS Decen From: MIchele Landis, dRW Subject: Draft report ~ Result= of the Radiologic; Former Ore Storage Site, Palmerton, Pennsylvania Attached is one copy of the draft report. PIE provide your comments to me by January 16, 1990. tlichele Landis ,9, 1989 "ey at the review and Results of the Radiological SJrvey at the Former Ore S&age Site, Palmerton, PennsylvLnia (PPOOI) J. L Quikd J. W. Cdchdr W. D. &rei ! I : HEALTH AND t5UEI-Y RESEARCH DMSi Waste Management Research and Development Prc (Activity No. AH 10 05 00 0; NEAHOOl) RESULTS OF 'I-HE RADIOLOGICAL SURV

344

V-220: Juniper Security Threat Response Manager Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Juniper Security Threat Response Manager Lets Remote 0: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands August 17, 2013 - 4:01am Addthis PROBLEM: A remote authenticated user can execute arbitrary commands on the target system. PLATFORM: 2010.0, 2012.0, 2012.1, 2013.1 ABSTRACT: A vulnerability was reported in Juniper Security Threat Response Manager (STRM) REFERENCE LINKS: SecurityTracker Alert ID: 1028921 CVE-2013-2970 IMPACT ASSESSMENT: High DISCUSSION: A remote authenticated user can inject commands to execute arbitrary operating system commands with the privileges of the target web service. This can be exploited to gain shell access on the target device.

345

Coping with stereotype threat: Denial as an impression management strategy  

E-Print Network (OSTI)

Four experiments tested the hypothesis that people who are concerned with impression management cope with stereotype threat through denial. Consistent with this hypothesis, temporary employees threatened by a stereotype ...

Von Hippel, W.; Von Hippel, C.; Conway, Leanne; Preacher, K. J.; Schooler, J. W.; Radvansky, G. A.

2005-01-01T23:59:59.000Z

346

Nuclear power's threat to health, safety, and freedom  

Science Journals Connector (OSTI)

Nuclear power's threat to health, safety, and freedom ... In particular, they may differ on whether the nuclear power plants that are the result of the 1953 Atoms for Peace movement help or hinder the control of nuclear weapons. ...

1980-10-13T23:59:59.000Z

347

A European vision for addressing global security threats  

Science Journals Connector (OSTI)

There is a robust consensus among EU Member States about the need to identify the complex links between the threats and challenges to the EU’s security. ... and instruments required to effectively respond to secu...

Gerhard Sabathil

2010-06-01T23:59:59.000Z

348

Chapter 2 - Threats and Hazards at Educational Institutions  

Science Journals Connector (OSTI)

Abstract This chapter describes the threats and hazards currently facing school administrators. It separately covers school districts (K-12) and higher education (colleges and universities), and includes information about legislation and protection measures.

Philip Purpura

2014-01-01T23:59:59.000Z

349

Threat assessment design for driver assistance system at intersections  

E-Print Network (OSTI)

This paper considers the decision-making problem for a human-driven vehicle crossing a road intersection in the presence of other, potentially errant, drivers. Our approach relies on a novel threat assessment module, which ...

Aoude, Georges

350

EWAS: Modeling Application for Early Detection of Terrorist Threats  

Science Journals Connector (OSTI)

This paper presents a model and system architecture for an early warning system to detect terrorist threats. The paper discusses the shortcomings of state ... of generation of early warnings to predict terrorist

Pir Abdul Rasool Qureshi; Nasrullah Memon…

2010-01-01T23:59:59.000Z

351

Threat-aware Path Planning in Uncertain Urban Environments  

E-Print Network (OSTI)

This paper considers the path planning problem for an autonomous vehicle in an urban environment populated with static obstacles and moving vehicles with uncertain intents. We propose a novel threat assessment module, ...

Aoude, Georges

352

Extinction by Miscalculation: The Threat to Sakinaw and Cultus Lake  

E-Print Network (OSTI)

Extinction by Miscalculation: The Threat to Sakinaw and Cultus Lake Sockeye MART R. GROSS of Economics, University of Toronto, 150 St. George Street, Toronto, Canada M5S 3G7. Email

Gross, Mart

353

Insider Threat to Nuclear and Radiological Materials: Fact Sheet | National  

National Nuclear Security Administration (NNSA)

Insider Threat to Nuclear and Radiological Materials: Fact Sheet | National Insider Threat to Nuclear and Radiological Materials: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Insider Threat to Nuclear and Radiological Materials: ... Fact Sheet Insider Threat to Nuclear and Radiological Materials: Fact Sheet

354

A Bayesian Belief Network of Threat Anticipation and Terrorist Motivations  

SciTech Connect

Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) as well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.

Olama, Mohammed M [ORNL; Allgood, Glenn O [ORNL; Davenport, Kristen M [ORNL; Schryver, Jack C [ORNL

2010-01-01T23:59:59.000Z

355

Preliminary thoughts concerning potential US Army threats/roles  

SciTech Connect

The rate at which the current world military/political perspective is changing demands consideration of a broader spectrum of potential threats then has been the case for the past few decades--during which the Soviet Union was the preeminent threat. Seemingly overnight, the cold war ceased, the requirement for massive U.S. military counters to the Soviet Union forces faded, and an era of constant (obvious) military threat disappeared. This situation has in turn been revolutionized by the Iraq invasion of Kuwait and the U.S. response. The paper addresses part of the problem facing military planners by defining a spectrum of threats that typify those the U.S. Army might face over the next decade or two. The purpose of the threat set is to support the evaluation of the effectiveness and usefulness, to the U.S. Army, of advanced technologies. The set of threats is intended to provide a complete set of characteristics rather then to be a complete list of the possibilities; it is illustrative rather than exhaustive. Although largely completed before the war with Iraq started, its content is still valid in that its purpose is to provide a framework for thinking about future U.S. Army technology needs.

Greene, R.A.; Solomon, K.A.; Miles, J.T.

1991-06-01T23:59:59.000Z

356

ARM - Data Documentation  

NLE Websites -- All DOE Office Websites (Extended Search)

Documentation Documentation Policies, Plans, Descriptions Data Documentation Home Data Sharing and Distribution Policy Data Management and Documentation Plan Data Product Registration and Submission Reading netCDF and HDF Data Files Time in ARM netCDF Data Files Data Archive Documentation ARM Archive's Catalog of Data Streams (Updated monthly) Access to Historical ARM Data More on Understanding and Finding ARM Data Data Quality Problem Reporting Data Documentation A day of data files is bundled or processed into a single 24-hour file that represents a data stream, which is then stored at the ARM Data Archive. A day of data files is bundled or processed into a single 24-hour file that represents a data stream, which is then stored at the ARM Data Archive. Data collected through the routine operations and scientific field

357

Documented Safety Analysis  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Documented Safety Analysis Documented Safety Analysis FUNCTIONAL AREA GOAL: A document that provides an adequate description of the hazards of a facility during its design, construction, operation, and eventual cleanup and the basis to prescribe operating and engineering controls through Technical Safety Requirements (TSR) or Administrative Controls (AC). REQUIREMENTS:  10 CFR 830.204, Nuclear Safety Rule  DOE-STD-1027-92, Hazard Categorization, 1992.  DOE-STD-1104-96, Change Notice 1, Review and Approval of Nuclear Facility Safety Basis Documents (documented Safety Analyses and Technical Safety Requirements), dated May 2002.  DOE-STD-3009-2002, Preparation Guide for U. S. Department of Energy Nonreactor Nuclear Facility Documented Safety Analyses, Change Notice No. 2, April 2002.

358

TUchem Documentation Introduction  

E-Print Network (OSTI)

TUchem Documentation Introduction TUchem is an automated chemical inventory database system design for use in academic environments. TUchem can be used to track inventory for locations, provide up

Wolfgang, Paul

359

RMOTC - Library - Environmental Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Environmental Documents The U.S. Department of Energy National Environmental Policy Act (NEPA) requires careful consideration of the potential environmental consequences of all...

360

FTCP Guiding Documents  

Energy.gov (U.S. Department of Energy (DOE))

Federal Technical Capability Program (FTCP) Guiding Documents includes Key FTCP Directives, Qualification Standards, Functional Area Qualification Standard (FAQS) Qualification Cards, and Technical Qualification Program (TQP) Accreditation.

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Appendix A: Conceptual Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

NREL-Research Support Facilities TABLE OF CONTENTS NREL-Research Support Facilities TABLE OF CONTENTS Solicitation No. RFJ-8-77550 Appendix A: Conceptual Documents Page 1 of 299 February 6, 2008 Appendix A CONCEPTUAL DOCUMENTS TABLE OF CONTENTS INTRODUCTION ...................................................................................................................... 2 PART 1-PROCEDURES .......................................................................................................... 3 PART 2-PROGRAM ............................................................................................................... 59 PART 3-PERFORMANCE SPECIFICATIONS .................................................................... 245 APPENDIX LIST .................................................................................................................. 299

362

NEED HELP ? Submitting Documents  

E-Print Network (OSTI)

the questions. Have you ever tried to follow a recipe? If you dump all the ingredients in a bowl without first in mind that incomplete documents will not be posted to your record and will be returned to you. 4. Follow students fax in documents and drop off or mail in paper copies. This is twice the work load and slows down

de Lijser, Peter

363

IDC System Specification Document.  

SciTech Connect

This document contains the system specifications derived to satisfy the system requirements found in the IDC System Requirements Document for the IDC Reengineering Phase 2 project. Revisions Version Date Author/Team Revision Description Authorized by V1.0 12/2014 IDC Reengineering Project Team Initial delivery M. Harris

Clifford, David J.

2014-12-01T23:59:59.000Z

364

IMPRESS CONNECT DOCUMENT ORDERING  

E-Print Network (OSTI)

IMPRESS CONNECT DOCUMENT ORDERING USER GUIDE FOR UNF August 2010 #12;OFFICEMAX IMPRESS CONNECT USERMax (case sensitive) Click on "Create New Custom Print Order" under Print & Document Services #12;The first landing page. You will see 3 options across the top of the landing page: Order Jobs, Track Jobs, Manage

Asaithambi, Asai

365

Project Documentation Group Members  

E-Print Network (OSTI)

agencies to track client services and outcomes, thus providing sound documentation that justifies stateCSC 4330 Project Documentation 11/30/2009 Group Members: Andy Bursavich Justin Farr Will Folse Chris Miceli Michael Miceli #12;Group Answers I. The Title ­ UREC Client Tracking System II. The project

Kundu, Sukhamay

366

Documents Notes Requirements  

E-Print Network (OSTI)

Documents Notes Common Requirements Application Form(typed) with 3 photos attached(3.5 x 4.5cm(including National Intelligence & Security Track), International Trade, International Finance, Korea and East Asia for Application : November 13(Tue), 2012 · Announcement of Documents Screening Results : 2 pm on November 21(Wed

Jang, Ju-Wook

367

CAPTURE DOCUMENT ORAUTEAM  

Office of Legacy Management (LM)

DATA DATA CAPTURE DOCUMENT ORAUTEAM ---- Dose Reconstruction ~v~:7 DISCOVERY AND REVIEW dA'~ Project for NIOSH The attached document may contain Privacy Act data. This information is protected by the Privacy Act, 5 U.S.C. §552a; disclosure to any third party without written consent of the individual to whom the information pertains is strictly prohibited. Data Capture Team or Other ORAU Team Member Capturing Data: Complete all information that applies to the data/document being submitted lor uploading to the Site Research Database (SRDB), attach this lonm to the lront olthe document, and send to: ORAU Team, Attention: SRDB Uploading, 4850 Smith Rd., Suite 200, Cincinnati, Ohio 45212. I ~ -!-R"e"guestor and Reviewer 1. Data Requestor: RSET Group 2. Reviewer Name (if different from Requestor): Don Morris 3. Target Data: Document Specified by Requestor Any relevant

368

Cray XT Documentation  

NLE Websites -- All DOE Office Websites (Extended Search)

Cray XT Documentation Cray XT Documentation Cray XT Documentation & Cray XT Documentation Search Preferences | Advanced Search Home Browse Books Man Pages Glossary Platforms Cray XC30 Cray XE and Cray XK Cray XT Cray Sonexion Cray X2 Cray X1 Knowledge Base by Category by Date by Platform by Title by User Release Announcements @Twitter Cray XT System Documentation Getting Started Cray XT System Overview Cray Linux Environment (CLE) Software Release Overview Cray Linux Environment (CLE) Software Release Overview Supplement Glossary of Terms Programming Environment Cray Application Developer's Environment User's Guide Cray Compiling Environment (CCE) Cray Fortran Reference Manual crayftn man page Cray C and C++ Reference Manual craycc man page crayCC man page Intrinsic function man pages Assign environment man pages

369

Multi-Agent Patrolling under Uncertainty and Threats Shaofei Chen1,2  

E-Print Network (OSTI)

Multi-Agent Patrolling under Uncertainty and Threats Shaofei Chen1,2 , Feng Wu2 , Lincheng Shen1 information is distributed alongside threats. The informa- tion and threat at each location are respectively by an agent. While agents obtain information at a location, they may suffer attacks from the threat

Yeoh, William

370

Threat Assessment Using Evidential Networks A. Benavoli, B. Ristic, A. Farina, M. Oxenham, L. Chisci  

E-Print Network (OSTI)

Threat Assessment Using Evidential Networks A. Benavoli, B. Ristic, A. Farina§, M. Oxenham, L by providing a threat assessment, that is an estimate of the extent to which an enemy platform poses a threat based on evidence about its intent and capability. Threat is modelled by a network of entities

Chisci, Luigi

371

Ionospheric Threat Model Methodology for Juan Blanch, Todd Walter, Per Enge. Stanford University  

E-Print Network (OSTI)

Ionospheric Threat Model Methodology for WAAS Juan Blanch, Todd Walter, Per Enge. Stanford of a threat model. The threat model is used to restrict the expected ionospheric behavior. It must not be too driving the ionosphere are not entirely known, a decision has been made to base the threat model

Stanford University

372

Old Threats Never Die By: Gunter Ollmann, Director of Security Strategy  

E-Print Network (OSTI)

Old Threats Never Die By: Gunter Ollmann, Director of Security Strategy IBM Internet Security Systems #12;Table of Contents Threat Lifecycle 1 Malware Threat Lifecycle 2 Vulnerability Lifecycle 2 Conclusions 12 #12;Old Threats Never Die Page 1 With year-on-year increases in vulnerabilities, malware

373

Using regulations.gov to find dockets and documents  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

regulations.gov to find dockets and documents regulations.gov to find dockets and documents Regulations.gov is a web-based repository of Federal regulatory documents. Publicly accessible documents associated with DOE Appliance and Equipment Standards rulemakings and related Federal Register notices are now accessible on regulations.gov On regulations.gov, you can: View Proposed and Final Rules and other regulatory documents or notices Read public comments, as well as public meeting presentations and transcripts These documents are part of a docket folder, which contains all documents associated with a particular rulemaking or notice. All current (and most historical) Appliance and Equipment Standards rulemakings have dockets in regulations.gov. You can access a docket via the rulemaking page on the Appliance and Equipment

374

On threats analysis approach applied to a Mediterranean remnant wetland: Is the assessment of human-induced threats related to different level of expertise of respondents?  

Science Journals Connector (OSTI)

Naming, listing and measuring human-induced threats in protected areas are crucial in conservation. ... , we defined a check-list of direct threats in a Mediterranean remnant wetland (central Italy ... students a...

Corrado Battisti; Luca Luiselli; Daniele Pantano…

2008-06-01T23:59:59.000Z

375

Protecting the Nation's Electric Grid from Cyber Threats | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats Protecting the Nation's Electric Grid from Cyber Threats January 11, 2012 - 11:28am Addthis A smarter, modernized, and more secure grid will be pivotal to the United States’ world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. A smarter, modernized, and more secure grid will be pivotal to the United States' world leadership in a clean energy future. | Photo courtesy of National Renewable Energy Laboratory. Howard A. Schmidt White House Cybersecurity Coordinator Secretary Steven Chu: "Establishing a comprehensive cybersecurity approach will give utility companies and grid operators another important tool to improve the grid's ability to respond to cybersecurity risks."

376

NNSA's Global Threat Reduction Initiative launches mobile app | National  

National Nuclear Security Administration (NNSA)

launches mobile app | National launches mobile app | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative launches mobile app NNSA's Global Threat Reduction Initiative launches mobile app Posted By Office of Public Affairs NNSA's Global Threat Reduction Initiative (GTRI) recently launched a

377

NNSA's Global Threat Reduction Initiative food face-off | National  

NLE Websites -- All DOE Office Websites (Extended Search)

food face-off | National food face-off | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative food face-off NNSA's Global Threat Reduction Initiative food face-off Posted By Office of Public Affairs NNSA's Global Threat Reduction Initiative holds a Feds Feeds Family face-off

378

Effects of intentional threats to power substation control systems  

Science Journals Connector (OSTI)

Power station control and management systems represent key elements for guaranteeing the security of the power grid infrastructure. Intrinsically conceived to support the continuous provision of power in secure conditions, those systems today make intensive use of information and communication systems and are therefore exposed to related accidental and intentional cyber threats. This paper describes a simulation of cyber attacks conducted in the CESI RICERCA laboratory testbed on a prototypical substation control infrastructure with the purpose of testing their feasibility and illustrating their impact on the control system services. A set of attack scenarios targeting several subsystems has been experimented, with different simulated threat motivations and different degrees of impact on the global substation service. The paper reports some considerations about the consequences of the implemented attacks, focusing on different facets of the problem, in an effort to elucidate the full significance of the potential cyber threats.

Giovanna Dondossola; Judit Szanto; Marcelo Masera; Igor Nai Fovino

2008-01-01T23:59:59.000Z

379

Documents: R&D/Uses Development  

NLE Websites -- All DOE Office Websites (Extended Search)

R&D/Uses Development R&D/Uses Development Search Documents: Search PDF Documents View a list of all documents R&D/Uses Development PDF Icon An Advanced Solution for the Storage, Transportation and Disposal of Spent Fuel and Vitrified High Level Waste 168 KB details PDF Icon Analyses of U.S. and R.F. Depleted-Uranium Concrete/Steel Transport and Storage Cask for Spent Nuclear Fuel 452 KB details PDF Icon Beneficial Uses of Depleted Uranium 63 KB details PDF Icon Cask Size and Weight Reduction Through the Use of Depleted Uranium Dioxide-Concrete Material 141 KB details PDF Icon Cask Size and Weight Reduction Through the Use of Depleted Uranium Dioxide (DUO2)–Steel Cermet Material 220 KB details PDF Icon Cermet Waste Packages Using Depleted Uranium Dioxide and Steel

380

User_ViewRecords  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

User Records User Records © 2011 SuccessFactors, Inc. - 1 - SuccessFactors Learning Confidential. All rights reserved. Job Aid: Viewing User Records Purpose The purpose of this job aid is to guide users through the step-by-step process of viewing their records. Each task demonstrates viewing of different records. Task A. View To-Do List Enter the web address (URL) of the user application into your browser Address field and press the Enter key. Enter your user ID in the User ID textbox. Enter your password in the Password textbox. Click Sign In. View To-Do List (filter, view) 7 Steps Task A View Completed Work 8 Steps Task B View Curriculum Status and Details 11 Steps Task C 3 3 1 2 2 1 SuccessFactors Learning v 6.4 User Job Aid Viewing User Records

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

GENII Guidance Document  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

GENII Computer Code GENII Computer Code Application Guidance for Documented Safety Analysis Final Report U.S. Department of Energy Office of Environment, Safety, and Health 1000 Independence Ave., S.W. Washington, DC 20585-2040 July 2004 GENII Guidance Report July 2004 Final Report INTENTIONALLY BLANK ii GENII Guidance Report July 2004 Final Report FOREWORD This document provides guidance to Department of Energy (DOE) facility analysts in the use of the GENII computer code for supporting Documented Safety Analysis applications. Information is provided herein that supplements information found in the GENII documentation provided by the code developer. GENII is one of six computer codes designated by the DOE Office of Environmental, Safety and Health as a toolbox code for safety analysis.

382

Frequently Requested Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Frequently Requested Documents Frequently Requested Documents Frequently Requested Documents This is an index of frequently requested documents provided by the Department of Energy Idaho Operations Office. You must use the Adobe Acrobat file reader to read the files. If you do not have the reader you can download it free from http://get.adobe.com/reader/. FOIA Requests Received by DOE-ID in 2013 (pdf) April - ID-2013-00854 AMWTP - Charcoal filter breakdown in PAPRs - 600 KB Adobe Acrobat Icon Employee Concern - 135 KB Adobe Acrobat Icon All Hands Feedback - 63 KB Adobe Acrobat Icon AMWTP Employee Concern Ltr 1 - 70 KB Adobe Acrobat Icon RE: Please contact - ITG, about the EC interview (by B&W) - 43 KB Adobe Acrobat Icon RE: Please contact - ITG, about the EC interview (by B&W) - 69 KB Adobe Acrobat Icon

383

Transportation System Requirements Document  

SciTech Connect

This Transportation System Requirements Document (Trans-SRD) describes the functions to be performed by and the technical requirements for the Transportation System to transport spent nuclear fuel (SNF) and high-level radioactive waste (HLW) from Purchaser and Producer sites to a Civilian Radioactive Waste Management System (CRWMS) site, and between CRWMS sites. The purpose of this document is to define the system-level requirements for Transportation consistent with the CRWMS Requirement Document (CRD). These requirements include design and operations requirements to the extent they impact on the development of the physical segments of Transportation. The document also presents an overall description of Transportation, its functions, its segments, and the requirements allocated to the segments and the system-level interfaces with Transportation. The interface identification and description are published in the CRWMS Interface Specification.

Not Available

1993-09-01T23:59:59.000Z

384

DOCUMENT RELEASE FORM  

NLE Websites -- All DOE Office Websites (Extended Search)

Change El Complete Revision (6) Document Title: Visual Inspection Plan for Single-Shell Tanks and Double-Shell Tanks (7) ChangeRelease Initial Release Description: (8) Change NA...

385

ARM - Program Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Glossary Logos Contacts RSS for Publications Program Documents Annual Reports FY 2013 (PDF, 7.2MB) FY 2012 (PDF, 1.2MB) FY 2011 (PDF, 4.4MB) FY 2010 (PDF, 2.1MB) FY 2009...

386

UESC Enabling Documents  

Energy.gov (U.S. Department of Energy (DOE))

Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—discusses the enabling documents to help federal contract officers establish utility energy service contracts (UESCs).

387

Document Type: Subject Terms  

E-Print Network (OSTI)

Title: Authors: Source: Document Type: Subject Terms: Abstract: Full Text Word Count: ISSN the department back on track. The action is to call a meeting of the team leaders and stress the urgency o

Major, Arkady

388

NNSA's Global Threat Reduction Initiative Receives 2010 Distinguished  

NLE Websites -- All DOE Office Websites (Extended Search)

Receives 2010 Distinguished Receives 2010 Distinguished Project Award from PMI | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Press Releases > NNSA's Global Threat Reduction Initiative Receives 2010 ... Press Release NNSA's Global Threat Reduction Initiative Receives 2010 Distinguished

389

DESIGN IS A DOCUMENT Al Sadiq A. M. M. Halepota, Philip W. Grant, and Christopher P. Jobling  

E-Print Network (OSTI)

of documents as user interfaces and draws on the ideas from software engineering. A Model-View- Controller environment is being developed which uses a document as the user interface. This document acts Application Programming Interface (API) documentation is produced from the program source code

Grant, P. W.

390

Cross-document Event Extraction and Tracking: Task, Evaluation, Techniques and Challenges  

E-Print Network (OSTI)

Cross-document Event Extraction and Tracking: Task, Evaluation, Techniques and Challenges Heng Ji This paper proposes a new task of cross-document event extraction and tracking and its evaluation metrics. We a richer set of views than is possible with document clustering for summarization or with topic tracking

391

Threats and Challenges in Reconfigurable Hardware Security Ryan Kastner  

E-Print Network (OSTI)

Reconfigurable Hardware Life Cycle Before we discuss specific security problems, attacks and solutions, we: The life cycle of reconfigurable hardware, from manufacturing to application development to deploymentThreats and Challenges in Reconfigurable Hardware Security Ryan Kastner Dept. of Computer Science

392

ANALYSIS OF ELECTRIC GRID SECURITY UNDER TERRORIST THREAT Javier Salmeron  

E-Print Network (OSTI)

ANALYSIS OF ELECTRIC GRID SECURITY UNDER TERRORIST THREAT Javier Salmeron Kevin Wood Operations techniques for analyzing the security and resilience of electrical power grids against disruptions caused analytical techniques to help mitigate the disruptions to electric power grids caused by terrorist attacks

Baldick, Ross

393

How to determine threat probabilities using ontologies and Bayesian networks  

E-Print Network (OSTI)

are capable to reduce the risk to an acceptable level at the lowest possible costs. Risk is defined. The elaborated concepts enable risk managers to comprehensibly quantify the current security status Terms Security Keywords threat probability determination, risk management, infor- mation security 1

394

Constructing Ionospheric Irregularity Threat Model for Korean SBAS  

E-Print Network (OSTI)

GNSS augmentation system and space weather forecasting for GNSS application. Jiyun Lee is an Assistant metrics which measure the density and uniformity of IPP distribution in a region. Thus, the threat model metrics, which characterize threatening undersampled geometries including the density of IPP distribution

Stanford University

395

WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President  

E-Print Network (OSTI)

WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President Dr. Peter H. Gleick1 October 9, 2008 Safe and adequate fresh water resources are central to the economy, foreign policy domestic and international challenges related to fresh water. These challenges will require unilateral

396

The cyber threat landscape: Challenges and future research directions  

Science Journals Connector (OSTI)

Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain ... Keywords: Culture of security, Cyber crime, Cyber exploitation, Policing and preventative strategy, Public private partnership, Routine Activity Theory

Kim-Kwang Raymond Choo

2011-11-01T23:59:59.000Z

397

Ecological factors and human threats both drive wildfowl population declines  

E-Print Network (OSTI)

; human population density. Correspondence Peter R. Long, Department of Biology and Biochemistry, Africa and Asia. Second, we use phylogenetic comparative analyses to test whether population size, globalEcological factors and human threats both drive wildfowl population declines P. R. Long1 , T. Sz

398

PERSISTENT SURVEILLANCE FOR PIPELINE PROTECTION AND THREAT INTERDICTION  

E-Print Network (OSTI)

-rated and IFE target supply processes and target related systems Electrically steer targets Making foam or fastPERSISTENT SURVEILLANCE FOR PIPELINE PROTECTION AND THREAT INTERDICTION Overview of the Fusion) for the Pedestal Developed and Tested · Formation of an edge barrier or "pedestal" allows high performance

399

Microsoft Word - Document7  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

of U.S. Secretary of Energy Spencer Abraham and Minister of the Russian Federation for Atomic Energy Aleksandr Rumyantsev on Cooperation to Transfer Russian-origin High-Enriched Uranium Research Reactor Fuel to the Russian Federation The U.S. Department of Energy and MinAtom of Russia recognize the great significance of cooperation in the issue of transferring high enriched uranium (HEU) research reactor fuel of Russian origin to the Russian Federation as a mutual contribution to the reduction of global stockpiles of weapons-usable nuclear materials and, therefore, to reducing the threat of international terrorism and preventing the proliferation of weapons of mass destruction. Such cooperation, which is being implemented with the active involvement of the

400

Document Control Template-Process  

NLE Websites -- All DOE Office Websites (Extended Search)

1_ADocument Control Template - Process.doc Page 1 of 7 1_ADocument Control Template - Process.doc Page 1 of 7 EOTA - Business Process Document Title: Document Control Template - Process Document Number: F-001 Rev. A Document Owner: Elizabeth Sousa Backup Owner: Melissa Otero Approver(s): Melissa Otero Parent Document: P-001, Document Control Process Notify of Changes: EOTA Employees Referenced Document(s): N/A F-001_ADocument Control Template - Process.doc Page 2 of 7 Revision History: Rev. Description of Change A Initial Release B C D E F-001_ADocument Control Template - Process.doc Page 3 of 7 EOTA - Business Process Document Title: DocTitle Document Number: P-DocID# Rev Document Owner: Elizabeth Sousa Backup Owner: David McKay Approver(s): Dennis Murphy Parent Document:

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Document Normalization Revisited Abdur Chowdhury  

E-Print Network (OSTI)

for fundamentally different document collections. We recomputed the normalization for the web track and obtainedDocument Normalization Revisited Abdur Chowdhury America Online Reston, Virginia chowdhury Pivoted Document Length Normalization has reached a point of stability where many researchers

Chowdhury, Abdur

402

SciTech Connect: Sequential Threat Detection for Harbor Defense...  

NLE Websites -- All DOE Office Websites (Extended Search)

Content: Close Send 0 pages in this document matching the terms "" Search For Terms: Enter terms in the toolbar above to search the full text of this document for pages...

403

documentation | OpenEI  

Open Energy Info (EERE)

documentation documentation Dataset Summary Description (Abstract): The Kenya Country Report describes the energy situation in Kenys and identifies solar and wind energy opportunities. (Purpose): To influence investment decisions by promoting and supporting renewable energy by overcoming informational barriers in solar and wind energy financing. Source Daniel Theuri - SWERA National Team Date Released November 23rd, 2008 (5 years ago) Date Updated Unknown Keywords documentation Kenya renewable energy solar SWERA UNEP wind Data application/pdf icon Download Report (pdf, 9.3 MiB) Quality Metrics Level of Review Some Review Comment Temporal and Spatial Coverage Frequency Time Period 2008 License License Open Data Commons Public Domain Dedication and Licence (PDDL) Comment Rate this dataset

404

Microsoft Word - Document2  

Buildings Energy Data Book (EERE)

09 09 D I S C L A I M E R This document was designed for the internal use of the United States Department of Energy. This document will be occasionally updated and, therefore, this copy may not reflect the most current version. This document was prepared as account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by

405

Enforcement Documents | Department of Energy  

Energy Savers (EERE)

Documents Enforcement Documents RSS December 2, 2014 Consent Order, Battelle Energy Alliance - NCO-2014-02 Nuclear Safety Enforcement Consent Order issued to Battelle Energy...

406

UESC Enabling Documents  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Innovation for Our Energy Future Innovation for Our Energy Future Karen Thomas National Renewable Energy Laboratory Biloxi, Mississippi May 6, 2009 Utility Energy Services Contracts: Enabling Documents 2009 Interim Update FEMP's UESC Enabling Documents Details: Legislation and Executive actions Legal opinions Agency guidance ...and more www.eere.energy.gov/femp/pdfs/28792.pdf National Renewable Energy Laboratory Innovation for Our Energy Future PURPOSE * Designed to assist federal agency and utility staff involved in administering utility energy service projects * Clearly show that federal agencies have the authority to enter

407

Appendix G Supporting Documentation  

Office of Legacy Management (LM)

Supporting Documentation Supporting Documentation for Focused Feasibility Study This page intentionally left blank Contents Section Ground Water Models for Alternatives 3 and 4 ........................................................................ G .O Human Health Risk Assessment Calculations ........................................................................... G2.0 Cost Analysis ........................................................................................................................... G3.0 This page intentionally left blank Section G1.0 Ground Water Models for Alternatives 3 and 4 This page intentionally left blank D o c o l ~ ~ e n t Nurt~her Q0029500 Appendix G MMTS OU 111 Feasibility Study Ground Water Modeling for Alternative 3: PRB Treatment Objective

408

Document Icons and Page Thumbnails: Issues in Construction of Document  

E-Print Network (OSTI)

Document Icons and Page Thumbnails: Issues in Construction of Document Thumbnails for Page appropriately. #12;Document Icons and Page Thumbnails: Issues in Construction of Document Thumbnails for Page, called doc- ument icons, are discussed; one algorithm, called log-area, seems most effective. 1

Janssen, Bill

409

Document Normalization Revisited Cosine Pivoted Document Length Normalization has  

E-Print Network (OSTI)

submitted results to the TREC-10 web track. 2. Calibrating the Slope for Ad Hoc Task Using pivoted documentDocument Normalization Revisited Abstract Cosine Pivoted Document Length Normalization has reached for the document collection degrades average precision by as much as 20%. 1. Introduction The cosine measure

410

SHERPA Document SHERPA Document -Institutional Repositories: Staff and Skills Requirements  

E-Print Network (OSTI)

SHERPA Document SHERPA Document - Institutional Repositories: Staff and Skills Requirements Mary This document began in response to requests received by the core SHERPA team for examples of job descriptions and UKCORR members. This document will be revised annually (July/August) to reflect changing needs

Southampton, University of

411

Guidance Document Cryogenic Liquids  

E-Print Network (OSTI)

Guidance Document Cryogenic Liquids [This is a brief and general summary. Read the full MSDS for more details before handling.] Introduction: All cryogenic liquids are gases at normal temperature liquefies them. Cryogenic liquids are kept in the liquid state at very low temperatures. Cryogenic liquids

412

ENERGY REVIEW Consultation Document  

E-Print Network (OSTI)

ENERGY REVIEW Consultation Document JANUARY 2006 Our Energy Challenge Securing clean, affordable energy for the long-term #12;Our Energy Challenge Securing clean, affordable energy for the long term #12;OUR ENERGY CHALLENGE ­ SECURING CLEAN, AFFORDABLE ENERGY FOR THE LONG TERM ii Why is the government

413

document accom sumed, therefore  

E-Print Network (OSTI)

S document accom sumed, therefore to submitting the Asper School of iboine Commun River College, an usiness should plete the Applica ness under Track ADMISSION SCHOOL O WITH: ASS Ã?COLE TEC RED RIVER COLLEGE O ents or Track 2. N REQUIREM F BUSINESS SINIBOINE C CHNIQUE ET R COLLEGE, OF THE NOR ve a minimum C Business

Major, Arkady

414

Technical approach document  

SciTech Connect

The Uranium Mill Tailings Radiation Control Act (UMTRCA) of 1978, Public Law 95-604 (PL95-604), grants the Secretary of Energy the authority and responsibility to perform such actions as are necessary to minimize radiation health hazards and other environmental hazards caused by inactive uranium mill sites. This Technical Approach Document (TAD) describes the general technical approaches and design criteria adopted by the US Department of Energy (DOE) in order to implement remedial action plans (RAPS) and final designs that comply with EPA standards. It does not address the technical approaches necessary for aquifer restoration at processing sites; a guidance document, currently in preparation, will describe aquifer restoration concerns and technical protocols. This document is a second revision to the original document issued in May 1986; the revision has been made in response to changes to the groundwater standards of 40 CFR 192, Subparts A--C, proposed by EPA as draft standards. New sections were added to define the design approaches and designs necessary to comply with the groundwater standards. These new sections are in addition to changes made throughout the document to reflect current procedures, especially in cover design, water resources protection, and alternate site selection; only minor revisions were made to some of the sections. Sections 3.0 is a new section defining the approach taken in the design of disposal cells; Section 4.0 has been revised to include design of vegetated covers; Section 8.0 discusses design approaches necessary for compliance with the groundwater standards; and Section 9.0 is a new section dealing with nonradiological hazardous constituents. 203 refs., 18 figs., 26 tabs.

Not Available

1989-12-01T23:59:59.000Z

415

Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial  

E-Print Network (OSTI)

Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial of the Threat and Consequences of Weapon Attacks on Commercial Aircraft CREATE Report 29 November 2005 John P FLIGHT PATH . . . . . . . . . . . . . . . . . . . . . . . . . . 20 WEAPON LETHALITY MODEL

Wang, Hai

416

Study of Internet Threats and Attack Methods Using Honeypots and Honeynets  

Science Journals Connector (OSTI)

The number of threats from the Internet has been growing in ... the most suitable protection the detailed information about threats are required. Honeypots and honeynets are effective ... tools for obtaining deta...

Tomas Sochor; Matej Zuzcak

2014-01-01T23:59:59.000Z

417

NNSA's Global Threat Reduction Initiative Completes First Plutonium  

National Nuclear Security Administration (NNSA)

Completes First Plutonium Completes First Plutonium Shipment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative Completes First ... NNSA's Global Threat Reduction Initiative Completes First Plutonium Shipment Posted By NNSA Public Affairs NNSA Blog The United States and Sweden announced today at the 2012 Nuclear Security

418

NNSA's Global Threat Reduction Initiative Completes First Plutonium  

NLE Websites -- All DOE Office Websites (Extended Search)

Completes First Plutonium Completes First Plutonium Shipment | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > NNSA's Global Threat Reduction Initiative Completes First ... NNSA's Global Threat Reduction Initiative Completes First Plutonium Shipment Posted By NNSA Public Affairs NNSA Blog The United States and Sweden announced today at the 2012 Nuclear Security

419

Threats and human influence on coastal ecosystem of Southern India  

Science Journals Connector (OSTI)

Populations of the majority of fish species showed drastic reduction over the past five decades in west coast of India. We conducted an intensive study of Aghanashini estuary for water quality and fish diversity in west coast of India. Coastal ecosystems are impacted by many stressors and are continually subjected to threats from multiple stresses imposed mostly by human activities predominantly as a result of increased population growth in India. The most significant categories of threats derive from water pollution from numerous sources including thermal effluents, heavy metals, oil, sewage, pesticides, pulp mills, habitat loss and degradation, overexploitation, eutrophication and misguided human perceptions. Wide array of prohibited fishing methods are rampant by using of insecticides as poisons, destruction and modification of habitats, dynamiting, using chemical and herbal poisons. Due to deteriorated water, quality from anthropogenic activities fish diversity has drastically reduced. In complex coastal ecosystems, strategies for restoration can become equally complicated.

D. Sannadurgappa

2010-01-01T23:59:59.000Z

420

Chapter 3 - Building Skills with Basics: Learning to Identify Threats  

Science Journals Connector (OSTI)

Abstract The karate student builds skills in a variety of ways, but one of the fundamental ways to practice is through repetition of the basics: blocks, punches, and kicks. A student learns to respond to real attacks from any direction, through continual training on the right way to defend and to eliminate an opponent. This is the starting point where a student develops proper techniques to attack and counterattack against a variety of violent threats. Organizations must recognize harmful hazards. Hazards may be obvious, such as risks from hurricanes, or may be less evident, such as the risks from a chemical spill on a nearby roadway. Threats to your organization can come in many formats, from natural to accidental to deliberate. To successfully prepare for problems, the next step in the assessment process calls for identifying potential risks and using available sources to identify what things you really should worry about.

Eric N. Smith

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Document Reviews | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Document Reviews Document Reviews Document Reviews The Office of Document Reviews, within the Office of Health, Safety and Security information and document declassification efforts promote the release of information needed by an informed citizenry to understand and oversee the actions of its Government. To meet our mission requirements, the Office of Document Reviews: Conducts pre-publication reviews of documents generated in classified subject areas at Headquarters that are to be released to the public. Conducts document reviews for other HSS and Headquarters organizations to identify classified and controlled unclassified information. Reviews classified documents requested under the Freedom of Information Act for the Department and denies the release of the document in total or provides a redacted copy for release to the requester.

422

Q&A with Steven Spencer: Speaker in the Women and STEM Series Talks About How He Became Interested in Studying Psychology, Dissonance, and Stereotype Threat  

E-Print Network (OSTI)

dissonance, and stereotype threat A Spencer’s talk, “Athe field of stereotype threat, I was impressed by his kindthink about contents stereotype threat. Therefore, I had the

Hooker, Courtney

2011-01-01T23:59:59.000Z

423

Assets at Risk: Menstrual Cycle Variation in the Envisioned Formidability of a Potential Sexual Assailant Reveals a Component of Threat Assessment  

E-Print Network (OSTI)

M. T. (2013). Sizing up the threat: The envisioned physicalconceptual links between threat, social status, and physicalReveals a Component of Threat Assessment Daniel M.T.

Fessler, Daniel M.T.; Holbrook, Colin; Fleischman, Diana S.

2014-01-01T23:59:59.000Z

424

A Study on Biological Threats to Texas Freshwater Resources  

E-Print Network (OSTI)

A STUDY ON BIOLOGICAL THREATS TO TEXAS FRESHWATER RESOURCES A Thesis by MICHAEL TYLER NEISCH Submitted to the Office of Graduate and Professional Studies of Texas A&M University in partial fulfillment of the requirements.... Roelke and Dr. Masser, and my committee member, Dr. Rogers, for their guidance and support throughout the course of this research. Special thanks also to Dr. Gatlin, Brian Ray and all the Texas A&M Aquaculture and Research Facility staff, John Johnson...

Neisch, Michael

2014-01-15T23:59:59.000Z

425

Application of Machine Learning and Crowdsourcing to Detection of Cybersecurity Threats Application of Machine Learning and Crowdsourcing  

E-Print Network (OSTI)

Application of Machine Learning and Crowdsourcing to Detection of Cybersecurity Threats 1 Application of Machine Learning and Crowdsourcing to Detection of Cybersecurity Threats February 2011 Eugene of Cybersecurity Threats 2 Abstract We are applying machine learning and crowdsourcing to cybersecurity

Fink, Eugene

426

Quantifying threats in a Mediterranean wetland: are there any changes in their evaluation during a training course?  

Science Journals Connector (OSTI)

“Threats analysis” is a conservation discipline directed to ... , quantify, rank, map the human-induced threats occurring in a specific study area, assessing ... of central Italy, where 15 human-induced threats w...

Corrado Battisti; Luca Luiselli; Corrado Teofili

2009-10-01T23:59:59.000Z

427

Countering Hybrid Eco-threats to Global Security Under International Law: The Need for an Comprehensive Legal Approach  

Science Journals Connector (OSTI)

Threats to environmental security (‘eco-threats’) face not only shortcomings of environmental ... of Armed Conflict. Considering the new ‘Hybrid Threat’ concept, which had recently been discussed ... for adopting...

Joachim Sanden; Sascha-Dominik Bachmann

2013-11-01T23:59:59.000Z

428

IONOSPHERIC THREATS TO THE INTEGRITY OF AIRBORNE GPS USERS A DISSERTATION  

E-Print Network (OSTI)

IONOSPHERIC THREATS TO THE INTEGRITY OF AIRBORNE GPS USERS A DISSERTATION SUBMITTED threats to user safety if left unmitigated. This work identifies when such disturbances may occur using indicates the need for a non-trivial threat model for the Federal Aviation Administration's Local Area

Stanford University

429

Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability  

E-Print Network (OSTI)

Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability by Georges;Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability by Georges Salim fulfillment of the requirements for the degree of Doctor of Philosophy Abstract This thesis develops threat

How, Jonathan P.

430

Modeling Medical System Threats with Conditional Probabilities using Multiple-Valued Logic Decision  

E-Print Network (OSTI)

Modeling Medical System Threats with Conditional Probabilities using Multiple-Valued Logic Decision system reliability has become an area of increasing importance. Medical system threats, which include system operation. To address these problems, we build upon our previous threat cataloging methodology

Thornton, Mitchell

431

Threat to the point: improving the value of comparative extinction risk analysis for conservation action  

E-Print Network (OSTI)

Threat to the point: improving the value of comparative extinction risk analysis for conservation of such analyses for conservation practice has been questioned. One reason for underperformance may be that threats this problem by (i) reviewing the use of threats in this field and (ii) quanti- tatively investigating

Davidson, Ana

432

Moderate threat causes longer lasting disruption to processing in anxious individuals  

E-Print Network (OSTI)

Moderate threat causes longer lasting disruption to processing in anxious individuals Sophie: Forster S, Castle E, Nunez-elizalde AO and Bishop SJ(2014) Moderate threat causes longer lasting in anxiety1 Moderate threat causes longer lasting disruption to processing2 in anxious individuals.3 Sophie

Bishop, Sonia

433

umankind faces a wide range of threats to its security and safety, from ter-  

E-Print Network (OSTI)

H umankind faces a wide range of threats to its security and safety, from ter- rorist groups and cybercriminals to disease pandemics and climate change. All these threats share one characteristic threats. Two years ago we suggested in our book Natural Security: A Darwinian Approach to a Dangerous

Grether, Gregory

434

Responses to Ecological and Human Threats to a California Water Basin Governance System  

E-Print Network (OSTI)

W06-41 Responses to Ecological and Human Threats to a California Water Basin Governance System to the management regime as well. This paper describes the threats to water management arrangements in the San increasingly robust to certain disturbances (or threats), the complex social ecological system has remained

Janssen, Marco

435

Passive Threats among Agents in State Oriented Domains Yair B. Weinberger and Jeffrey S. Rosenschein  

E-Print Network (OSTI)

Passive Threats among Agents in State Oriented Domains Yair B. Weinberger and Jeffrey S systems work considered the notion of threats during negotiation, but in order to do so introduced additional assumptions on the domain. This paper presents a new model of threats among negotiating agents

Rosenschein, Jeff

436

Learning about social threats in RS Learning biases underlying individual differences in sensitivity to social rejection  

E-Print Network (OSTI)

Learning about social threats in RS 1 Learning biases underlying individual differences. Ochsner, Department of Psychology, Columbia University Running Head: Learning about social threats in RS University, Northwest Science Bldg 290, Cambridge, MA 0213. #12;Learning about social threats in RS 2

Ochsner, Kevin

437

Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security  

E-Print Network (OSTI)

Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security Marwan Abi Science Carnegie Mellon University Pittsburgh, PA 15213 # Center for Software Excellence Abstract Threat Foundation. #12; Keywords: Threat modeling, data flow diagrams, reflexion models, architecture­level security

438

Ionospheric Threat Mitigation by Geometry Screening in Ground-Based Augmentation Systems  

E-Print Network (OSTI)

Ionospheric Threat Mitigation by Geometry Screening in Ground-Based Augmentation Systems Jiyun Lee observed during severe ionospheric storms pose potential threats to the integrity of the Ground threats, because ionospheric gradients are not observable to the ground monitor if they impact

Stanford University

439

CERNA WORKING PAPER SERIES Spatial price homogeneity as a mechanism to reduce the threat of  

E-Print Network (OSTI)

CERNA WORKING PAPER SERIES Spatial price homogeneity as a mechanism to reduce the threat price homogeneity as a mechanism to reduce the threat of regulatory intervention in locally monopolistic to retaliations from local elected officials. When investor-owned monopolies are exposed to this threat

Paris-Sud XI, Université de

440

Protecting Against Unsampled Ionospheric Threats Todd Walter, Sriram Rajagopal, Seebany Datta-Barua, and Juan Blanch  

E-Print Network (OSTI)

Protecting Against Unsampled Ionospheric Threats Todd Walter, Sriram Rajagopal, Seebany Datta features. Therefore, it is essential to understand the magnitude of such threats given the gaps in our observations. The methodology used to study these features is to start with well-observed threats from previous

Stanford University

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

MTRG/Ascension Management Plan 2002 SECTION 5: THREATS AND RECOMMENDED MANAGEMENT  

E-Print Network (OSTI)

MTRG/Ascension Management Plan 2002 14 SECTION 5: THREATS AND RECOMMENDED MANAGEMENT and control of pet cats 8) Continuation of ban on harvest of turtle products We give an account of all threats.1 General Habitat Degradation 5.1.1. Mining of Beach Sand 5.1.2. Light Pollution 5.1.3 Threat of Fuel Spill

Exeter, University of

442

EXTERNAL TERRORIST THREATS TO CIVILIAN AIRLINERS: A SUMMARY RISK ANALYSIS OF  

E-Print Network (OSTI)

EXTERNAL TERRORIST THREATS TO CIVILIAN AIRLINERS: A SUMMARY RISK ANALYSIS OF MANPADS, OTHER BALLISTIC WEAPONS RISKS, FUTURE THREATS, AND POSSIBLE COUNTERMEASURES POLICIES O'Sullivan, T. CREATE REPORT Threats to Civilian Airliners: A Summary Risk Analysis of MANPADS, Other Ballistic Weapons Risks, Future

Wang, Hai

443

Ionospheric Threat Parameterization for Local Area Global-Positioning-System-Based Aircraft Landing Systems  

E-Print Network (OSTI)

Ionospheric Threat Parameterization for Local Area Global-Positioning-System-Based Aircraft Landing of user separation. The method of data analysis that produced these results is described, and a threat space that parameterizes these possible threats to user integrity is defined. Certain configurations

Stanford University

444

Validity Threats in Empirical Software Engineering Research -An Initial Survey Robert Feldt, Ana Magazinius  

E-Print Network (OSTI)

Validity Threats in Empirical Software Engineering Research - An Initial Survey Robert Feldt, Ana important to consider threats to the validity of the study and the results. This is particularly important for empirical research where there is often a multitude of possible threats. With a growing focus on empirical

Feldt, Robert

445

Fast Threat Detection and Localization Using Super-Regenerative Transceiver in  

E-Print Network (OSTI)

Fast Threat Detection and Localization Using Super-Regenerative Transceiver in Random Noise Radar-Regenerative (SRG) transceiver as a type of ultra-fast electronics platform for threat detection and localization the Angle-of-Arrival (AOA) information of the inbound threats. Simulations and detailed laboratory

Zhang, Yan

446

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang  

E-Print Network (OSTI)

EVALUATING THREAT ASSESSMENT FOR MULTI-STAGE CYBER ATTACKS Shanchieh Jay Yang Rochester Institute on how to evaluate a threat assessment algorithm, especially for cyber security. Because of the variety and the constantly changing nature of hacker behavior and network vulnerabilities, a cyber threat assessment

Jay Yang, Shanchieh

447

THE GLOBALIzATION OF CHINESE SCIENCE: A THREAT OR AN  

E-Print Network (OSTI)

THE GLOBALIzATION OF CHINESE SCIENCE: A THREAT OR AN OPPORTuNITy? recently, I attended the 50th?" and "Is China a threat to the power of the United states?" We have known the host and his family for years). are they a welcome expansion or a threat to the quality of programs? In some years, conferencegoers have expressed

Zhu, Chen

448

Threat Modeling as a Basis for Security Requirements Suvda Myagmar Adam J. Lee William Yurcik  

E-Print Network (OSTI)

Threat Modeling as a Basis for Security Requirements Suvda Myagmar Adam J. Lee William Yurcik. Prior to claiming the security of a system, it is important to iden- tify the threats to the system in question. Enumerating the threats to a system helps system architects develop realis- tic and meaningful

449

High-Level Information Fusion and Mission Planning in Highly Anisotropic Threat Spaces  

E-Print Network (OSTI)

High-Level Information Fusion and Mission Planning in Highly Anisotropic Threat Spaces Mark sharing and high-level information fusion to allow for the visualisation of highly anisotropic threat options. Keywords: Information Fusion, Threat Map, Tactical Planning. 1 Introduction We present a first

Witkowski, Mark

450

Behavioral/Systems/Cognitive Neural Correlates of the Automatic Processing of Threat  

E-Print Network (OSTI)

Behavioral/Systems/Cognitive Neural Correlates of the Automatic Processing of Threat Facial Signals threat. Attention was focused on either scenes or faces presented in a single overlapping display. Facial. These results suggest that automaticity is not funda- mental to the processing of all facial signals of threat

Toronto, University of

451

Workplace Violence Prevention Policy Threats at imminent violence, violent incidents, or dangerous or emergency  

E-Print Network (OSTI)

Workplace Violence Prevention Policy Threats at imminent violence, violent incidents, or dangerous and staff, employees, students and visitors. Violent behavior, threats of violence, or physical intimidation of threatening or violent conduct in the workplace, or who observes such behavior or believes a credible threat

Goldberg, Bennett

452

The Effects of Age and Experience on Drivers Ability to Identify Threats  

E-Print Network (OSTI)

The Effects of Age and Experience on Drivers Ability to Identify Threats Ethan Fisher Professor The purpose of this study was to determine how long it takes for a driver to identify if a threat exists and where the threat is located in a static image. It is known that both older experienced and younger

Mountziaris, T. J.

453

Threats, design limits and design windows for laser IFE dry wall chambers  

E-Print Network (OSTI)

Threats, design limits and design windows for laser IFE dry wall chambers A. Rene´ Raffray-drive targets and a dry wall chamber. The dry wall must accommodate the ion and photon threat spectra from. The neutron energy is deposited deeper in the first wall and blanket and does not represent a major threat

Raffray, A. René

454

Preempting Uncertain Regulatory Threats Thomas P. Lyon and John W. Maxwelly  

E-Print Network (OSTI)

Preempting Uncertain Regulatory Threats Thomas P. Lyon and John W. Maxwelly September 15, 2004 assume certainty regarding the likelihood of the regulatory threat. We examine industry voluntary self and credible regulatory threat is needed to induce industry to take voluntary self-regulatory actions. 1

Lyon, Thomas P.

455

Stopping the Insider Threat: the case for implementing integrated autonomic defense mechanisms in computing systems  

E-Print Network (OSTI)

Stopping the Insider Threat: the case for implementing integrated autonomic defense mechanisms that are inseparable from the systems that are being defended. 1. Introduction Threats to the security of an information system may be initiated from either outside or from within an organization. Detecting such threats

Menascé, Daniel A.

456

Security threats on EPC based RFID systems J. G. Alfaro ,, M. Barbeau, and E. Kranakis  

E-Print Network (OSTI)

Security threats on EPC based RFID systems J. G. Alfaro ,, M. Barbeau, and E. Kranakis Abstract: We present an evaluation of threats on the Radio Frequency IDentification (RFID) system of the Electronic components due to the use of an insecure wireless channel. We analyze the threats according

Garcia-Alfaro, Joaquin

457

Threats to Security in DSRC/WAVE Christine Laurendeau and Michel Barbeau  

E-Print Network (OSTI)

Threats to Security in DSRC/WAVE Christine Laurendeau and Michel Barbeau School of Computer Science be reliable, accurate and confidential. To this end, we propose to identify the security threats inherent in the emerging DSRC Wireless Access in Vehicular Environments (WAVE) architecture. We rank the identified threats

Barbeau, Michel

458

Latest Documents and Notices  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

latest-documents-notices Office of National latest-documents-notices Office of National Environmental Policy Act (NEPA) Policy and Compliance 1000 Independence Avenue, S.W. Washington, DC 20585 202-586-4600 en EIS-0488: EPA Notice of Availability of Draft Environmental Impact Statement http://energy.gov/nepa/downloads/eis-0488-epa-notice-availability-draft-environmental-impact-statement EIS-0488: EPA Notice of Availability of Draft Environmental Impact Statement

459

Views on Automation  

Science Journals Connector (OSTI)

Views on Automation ... Industrial managements, he feels, must allay workers' fears by showing how they can take pride in the greater accomplishment of automated plants. ...

1957-07-29T23:59:59.000Z

460

Solar Background Document 3 | Department of Energy  

Energy Savers (EERE)

3 Solar Background Document 3 A list of private sector investment in Solyndra. Solar Background Document 3.pdf More Documents & Publications Solar Background Document 2 GridWise...

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Document Control Program | The Ames Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Training, Documents, & Records Document Control Program The Document Control (DC) Plan ensures that only approved, current versions of such documents are used in the workplace or...

462

NEWS & VIEWS Glass dynamics  

E-Print Network (OSTI)

NEWS & VIEWS Glass dynamics Diverging views on glass transition Gregory B. mc.mckenna@ttu.edu T he glass transition is one of the most intriguing phenomena in the world of soft condensed matter. Despite decades of study, many aspects of the behaviour of glass-forming liquids remain elusive

Weeks, Eric R.

463

News and Views  

Science Journals Connector (OSTI)

......Model 8600 and 8700 gas chromatographs to...untended operation of the gas chromatograph under...0325) 311044. 133 News and Views Macintosh-compatible...speed of the Apple drives and a software incompatibility...for a corporate 134 News and Views licence...that Chem-X was the natural choice: 'Chem-X......

Alan H. Fielding

1990-04-01T23:59:59.000Z

464

Policy and Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Environmental Protection, Sustainability Support & Corporate Safety Analysis Environmental Protection, Sustainability Support & Corporate Safety Analysis HS-20 Home Mission & Functions » Office of Nuclear Safety, Quality Assurance & Environment » Sustainability Support » Environmental Policy & Assistance » Corporate Safety Programs » Analysis Program Contacts What's New? Sustainability Support Environment Corporate Safety Programs Analysis Environment Environmental Policy Environmental Guidance Environmental Reports Environmental Management System Radiation Protection Environmental Compliance Environmental Justice Environmental Training Environmental Tools Search Our Documents Topics & Resources Air Analytical Services Program CERCLA Cultural & Natural Resources DOE Comments on Rulemakings Federal Environmental Laws

465

PCA, Continuous, & Epidural Narcotic Infusion Documentation (07.2013) Documentation  

E-Print Network (OSTI)

PCA, Continuous, & Epidural Narcotic Infusion Documentation (07.2013) Documentation Required Continuous Narcotic Infusions PCA Only PCA + Basal (Continuous) Infusion Epidural and Epidural PCA Continuous Verification AND Documentation of Dose / Rate of Infusion of · Every 4 hours (may be done as part of change

Oliver, Douglas L.

466

Document Control Template-Form  

NLE Websites -- All DOE Office Websites (Extended Search)

4 Publication Review and Approval 11_0608.doc608 Page 1 of 3 4 Publication Review and Approval 11_0608.doc608 Page 1 of 3 EOTA - Business Form Document Title: Publication Review and Approval Document Number: ITTF-014 Rev. 11_0608 Document Owner: Ben Aragon Backup Owner: Janet Lee Approver(s): Melissa Otero Parent Document: ITTP-015 Website Development Maintenance Notify of Changes: EOTA Employees Referenced Document(s): N/A ITTF-014 Publication Review and Approval 11_0608.doc608 Page 2 of 3 Revision History: Rev. Description of Changes A Initial Release 08_0523 Added review section for QA. Added "Approved w/changes" section. Changed "Corrections" and "Reason" to "Recommendations". Adjusted spacing on document. 08_1105 Added review section for Project Manager. Adjusted spacing on document.

467

Cray XC30 User Documentation  

NLE Websites -- All DOE Office Websites (Extended Search)

Documentation Documentation Cray XC30 User Documentation L Cray XC30 Documentation Search Preferences | Advanced Search Home Browse Books Man Pages Glossary Platforms Cray XC30 Cray XE and Cray XK Cray XT Cray Sonexion Cray X2 Cray X1 Knowledge Base by Category by Date by Platform by Title by User Release Announcements @Twitter Cray XC30 System Documentation This site map also contains legacy documentation. Always consult the latest version of documentation for your site-specific configuration and ask your Cray Customer Service representative for additional guidance on the latest software documents. Getting Started Cray Linux Environment (CLE) Software Release Overview Programming Environment Cray Programming Environments User Guide Cray Compiling Environment (CCE) Cray Fortran Reference Manual

468

Adaptive and Temporallydependent Document Filtering  

E-Print Network (OSTI)

Adaptive and Temporally­dependent Document Filtering een wetenschappelijke proeve op het gebied van . . . . . . . . . . . . . . . . . . . . . 1 1.2 Document Filtering . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 1.3 Filtering Filtering Track 57 5.1 What is TREC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 5

Arampatzis, Avi

469

Regulatory guidance document  

SciTech Connect

The Office of Civilian Radioactive Waste Management (OCRWM) Program Management System Manual requires preparation of the OCRWM Regulatory Guidance Document (RGD) that addresses licensing, environmental compliance, and safety and health compliance. The document provides: regulatory compliance policy; guidance to OCRWM organizational elements to ensure a consistent approach when complying with regulatory requirements; strategies to achieve policy objectives; organizational responsibilities for regulatory compliance; guidance with regard to Program compliance oversight; and guidance on the contents of a project-level Regulatory Compliance Plan. The scope of the RGD includes site suitability evaluation, licensing, environmental compliance, and safety and health compliance, in accordance with the direction provided by Section 4.6.3 of the PMS Manual. Site suitability evaluation and regulatory compliance during site characterization are significant activities, particularly with regard to the YW MSA. OCRWM`s evaluation of whether the Yucca Mountain site is suitable for repository development must precede its submittal of a license application to the Nuclear Regulatory Commission (NRC). Accordingly, site suitability evaluation is discussed in Chapter 4, and the general statements of policy regarding site suitability evaluation are discussed in Section 2.1. Although much of the data and analyses may initially be similar, the licensing process is discussed separately in Chapter 5. Environmental compliance is discussed in Chapter 6. Safety and Health compliance is discussed in Chapter 7.

NONE

1994-05-01T23:59:59.000Z

470

Risks and threats to civilization, humankind, and the earth  

Science Journals Connector (OSTI)

This paper is a brief look at a wide range of risks that are said to present great threats to humankind. It was stimulated by several interacting factors. First, too many books and articles about astrophysical catastrophes, in the scientific and semi-scientific press, give relatively little attention to their timeframe or the measures to anticipate and prepare for them. Second, and most important, is that the overblown effects of 9/11 have distorted the United States of America's perspective and agenda on catastrophes. The result is that billions of dollars have been wasted and attention turned away from threats that could be truly catastrophic for the United States and, in many cases, for the rest of the world. Third, are books that have become popular by raising the threat that what will happen to us will be similar to what happened to earlier societies such as the Maya and the Easter Islanders. Most notably among these is Jared Diamond's Collapse [Jared Diamond, Collapse: How Societies Choose to Fail or Succeed, Penguin Group, 2005]. The failure in these doomsday arguments is to overlook the greater sophistication, knowledge, awareness, monitoring and preparation currently in the United States and in other parts of the globe. The institutional structure and scientific knowledge today would either prevent or deal with the kind of socio-economic decline anticipated by the “collapse” arguments. In contrast several geophysical and celestial risks do imply global catastrophe. The value of this paper is as broad background to the specific scenario papers that follow. While it leans heavily on the work of others, it offers three new features for the analysis of any extreme risk. First is a scale of devastation, based on deaths. Second is a comprehensive time frame—now to the end of the Earth. Third is an outline of general questions that must be addressed for any risk, however large or small, if it is to provide insight into policy choices and promote systemic thinking.

Joseph F. Coates

2009-01-01T23:59:59.000Z

471

Recommended HSE-7 documents hierarchy  

SciTech Connect

This report recommends a hierarchy of waste management documents at Los Alamos National Laboratory (LANL or ``Laboratory``). The hierarchy addresses documents that are required to plan, implement, and document waste management programs at Los Alamos. These documents will enable the waste management group and the six sections contained within that group to satisfy requirements that are imposed upon them by the US Department of Energy (DOE), DOE Albuquerque Operations, US Environmental Protection Agency, various State of New Mexico agencies, and Laboratory management.

Klein, R.B.; Jennrich, E.A.; Lund, D.M.; Danna, J.G. [Rogers and Associates Engineering Corp., Salt Lake City, UT (United States); Davis, K.D.; Rutz, A.C. [Wastren, Inc., Idaho Falls, ID (United States)

1990-12-12T23:59:59.000Z

472

Recommended HSE-7 documents hierarchy  

SciTech Connect

This report recommends a hierarchy of waste management documents at Los Alamos National Laboratory (LANL or Laboratory''). The hierarchy addresses documents that are required to plan, implement, and document waste management programs at Los Alamos. These documents will enable the waste management group and the six sections contained within that group to satisfy requirements that are imposed upon them by the US Department of Energy (DOE), DOE Albuquerque Operations, US Environmental Protection Agency, various State of New Mexico agencies, and Laboratory management.

Klein, R.B.; Jennrich, E.A.; Lund, D.M.; Danna, J.G. (Rogers and Associates Engineering Corp., Salt Lake City, UT (United States)); Davis, K.D.; Rutz, A.C. (Wastren, Inc., Idaho Falls, ID (United States))

1990-12-12T23:59:59.000Z

473

The cyber threat landscape: Challenges and future research directions  

Science Journals Connector (OSTI)

Cyber threats are becoming more sophisticated with the blending of once distinct types of attack into more damaging forms. Increased variety and volume of attacks is inevitable given the desire of financially and criminally-motivated actors to obtain personal and confidential information, as highlighted in this paper. We describe how the Routine Activity Theory can be applied to mitigate these risks by reducing the opportunities for cyber crime to occur, making cyber crime more difficult to commit and by increasing the risks of detection and punishment associated with committing cyber crime. Potential research questions are also identified.

Kim-Kwang Raymond Choo

2011-01-01T23:59:59.000Z

474

Taking the long view  

NLE Websites -- All DOE Office Websites (Extended Search)

Taking the long view Taking the long view Taking the long view on environmental stewardship A newly articulated mission for environmental stewardship at the Laboratory can be summed up in a simple phrase: clean up the past, control current operations, and create a sustainable future. March 20, 2012 Los Alamos Aerial Aerial view of a canyon in Los Alamos, New Mexico. Contact Environmental Communication & Public Outreach P.O. Box 1663 MS M996 Los Alamos, NM 87545 (505) 667-0216 Email "The future viability of the Lab hinges on demonstrating to public that we protect human health and the environment." Environmental stewardship strategy looks 50 years into the future As a way of integrating environmental protection activities into a comprehensive strategy, Kevin Smith, manager of the U.S. Department of

475

Microsoft Word - Document1  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Greg Coulter [mailto:greg.coulter405@gmail.com] Greg Coulter [mailto:greg.coulter405@gmail.com] Sent: Friday, October 29, 2010 4:13 PM To: Barhydt, Laura Cc: Armstrong, Ashley; Leon Chapa Ismael Ricardo (GE Infra Energy Subject: GE-Prolec CCE Meeting October 19,2010 Ms. Barhydt, This e-mail documents the GE-Prolec CCE meeting of October 19, 2010 concerning Docket No. EERE-2010-BT-CE-0014. Mr. Ismael Leon and myself met with Ms. Ashley Armstrong, Ms. Celia Sher, Ms. Stephanie Weiner, and Ms. Laura Barhydt in your offices and discussed the attached charts concerning this NOPR. We appreciated the opportunity to meet with you and share a dialogue on the existing rule and changes outlined in the latest NOPR. You had specifically asked us to provide additional comments on our Issue #1. After further review, we continue to believe that the variety in

476

Enron Documents 1995  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5 5 U.S. DEPARTMENT OF ENERGY OFFICE OF THE EXECUTIVE SECRETARIAT CORRESPONDENCE CONTROL TICKET IMPORTANT ES NUMBER: ES95-000672 EXTERNAL 'E OF DOC: 01/10/95 REC'D: 01/13/95 CONTROLLED: 01/13/95 DUE: FROM: HILLINGS,E JOSEPH DC O NOTES AREA: ENRON WASHINGTON, INC. SUBJECT ENCLOSES MOST RECENT ISSUE OF SUMMARY: "ENRON BUSINESS" SOURCE: PUBLIC MAIL DOCUMENT TYPE: LETTER ADDRESSED TO: SECRETARY FOR SIGNATURE OF: ACTION TO: POLICY ACTION TYPE: For your information ACTION OFFICER: ~~~~~~~NCURRENCE COPIES TO: NCURRENCE COPIES TO: -- FORMATION COPIES TO: ES1 TM2 CURRENCES COMPLETED: :MARKS: :ECUTIVE SECRETARIAT CONTACT: Joyce Harrod 6-5131 --------------------------- EXEC SEC INTERNAL PSE ------------- SUBJECT CROSS REF: SPECIAL INT. CODE: SLATED CODE/NUMBER: SPECIAL INT. DATE:

477

PETSc: Documentation: FAQ  

NLE Websites -- All DOE Office Websites (Extended Search)

FAQ FAQ Home Download Features Documentation Manual pages and Users Manual Citing PETSc Tutorials Installation SAWs Changes Bug Reporting Code Management FAQ License Linear Solver Table Applications/Publications Miscellaneous External Software Developers Site General How can I subscribe to the PETSc mailing lists? Any useful books on numerical computing? What kind of parallel computers or clusters are needed to use PETSc? What kind of license is PETSc released under? Why is PETSc programmed in C, instead of Fortran or C++? Does all the PETSc error checking and logging reduce PETSc's efficiency? How do such a small group of people manage to write and maintain such a large and marvelous package as PETSc? For complex numbers will I get better performance using C or C++? How come when I run the same program on the same number of processes

478

Preliminary Safety Assessment Document  

NLE Websites -- All DOE Office Websites (Extended Search)

LCSAD-001, Ver. 2 LCSAD-001, Ver. 2 Linac Commissioning Safety Assessment Document for the National Synchrotron Light Source II Photon Sciences Directorate Version 2 May 11, 2011 Prepared by Brookhaven National Laboratory P.O. Box 5000 Upton, NY 11973-5000 managed by Brookhaven Science Associates for the U.S. Department of Energy Office of Science Basic Energy Science under contract DE-AC02-98CD10886 ii National Synchrotron Light Source II ii LT-C-ESH-LCSAD-001 ii DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, nor any of their contractors, subcontractors, or their employees, makes any

479

Preliminary Safety Assessment Document  

NLE Websites -- All DOE Office Websites (Extended Search)

BCSAD-001 BCSAD-001 Photon Sciences Directorate Booster Commissioning Safety Assessment Document For the National Synchrotron Light Source II Version 2 December 8, 2011 Prepared by Brookhaven National Laboratory P.O. Box 5000 Upton, NY 11973-5000 managed by Brookhaven Science Associates for the U.S. Department of Energy Office of Science Basic Energy Science under contract DE-AC02-98CD10886 ii National Synchrotron Light Source II Photon Sciences Directorate ii DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, nor any of their contractors, subcontractors, or their employees, makes any

480

Analysis of Threats to the Security of CPC Networks J. G. Alfaro,, M. Barbeau, and E. Kranakis  

E-Print Network (OSTI)

Analysis of Threats to the Security of CPC Networks J. G. Alfaro,, M. Barbeau, and E. Kranakis@scs.carleton.ca, kranakis@scs.carleton.ca Abstract Detecting and responding to security and privacy threats to Electronic of the threats in terms of importance must be done. We present such an evaluation. Our analysis of the threats

Kranakis, Evangelos

Note: This page contains sample records for the topic "threat view document" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Analysis of Threats to the Security of EPC Networks J. G. Alfaro,, M. Barbeau, and E. Kranakis  

E-Print Network (OSTI)

Analysis of Threats to the Security of EPC Networks J. G. Alfaro,, M. Barbeau, and E. Kranakis@scs.carleton.ca, kranakis@scs.carleton.ca Abstract Detecting and responding to security and privacy threats to Electronic of the threats in terms of importance must be done. We present such an evaluation. Our analysis of the threats

Garcia-Alfaro, Joaquin

482

Environmental threats to children's health – a global problem  

Science Journals Connector (OSTI)

Today's children are exposed to a wide range of environmental threats, whose consequences on health and development may appear early in life, throughout their youth and even later, in adulthood. Health problems linked to environmental hazards are multiplying and becoming more visible due to a rapidly changing environment, rapid population growth, overcrowding, fast industrialisation and uncontrolled pollution from many anthropogenic and also natural sources, and as a result of the effects of climate change. A World Health Organization report on the global burden of disease estimated that nearly a quarter of the global disease burden is related to environmental causes. These environmental-mediated diseases cause more than three million deaths in children under five every year. Such a large burden is unacceptable. Both industrialised and developing countries should reinforce their capacities to assess the environmental burden of paediatric diseases and characterise their impact on children's health. This will enable all responsible sectors to distinguish the main environmental threats affecting children's health and identify their specific roles in improving children's environments. Implementing these activities and turning efforts into prevention, education, policy-making and other actions will reduce the burden of disease affecting children globally, therefore contributing towards achieving the Millennium Development Goals (MDGs).

Maria Neira; Fiona Gore; Marie-Noel Brune; Tom Hudson; Jenny Pronczuk de Garbino

2008-01-01T23:59:59.000Z

483

A Risk Management Approach to the "Insider Threat"  

SciTech Connect

Abstract Recent surveys indicate that the financial impact and operating losses due to insider intrusions are increasing. But these studies often disagree on what constitutes an insider; indeed, many define it only implicitly. In theory, appropriate selection of, and enforcement of, properly specified security policies should prevent legitimate users from abusing their access to computer systems, information, and other resources. However, even if policies could be expressed precisely, the natural mapping between the natural language expression of a security policy, and the expression of that policy in a form that can be implemented on a computer system or network, creates gaps in enforcement. This paper defines insider precisely, in terms of these gaps, and explores an access-based model for analyzing threats that include those usually termed insider threats. This model enables an organization to order its resources based on the business value for that resource and of the information it contains. By identifying those users with access to high-value resources, we obtain an ordered list of users who can cause the greatest amount of damage. Concurrently with this, we examine psychological indicators in order to determine which users are at the greatest risk of acting inappropriately.We conclude by examining how to merge this model with one of forensic logging and auditing.

Bishop, Matt; Engle, Sophie J.; Frincke, Deborah A.; Gates, Carrie; Greitzer, Frank L.; Peisert, Sean; Whalen, Sean

2010-09-01T23:59:59.000Z

484

Typograph: Multiscale Spatial Exploration of Text Documents  

SciTech Connect

Visualizing large document collections using a spatial layout of terms can enable quick overviews of information. These visual metaphors (e.g., word clouds, tag clouds, etc.) traditionally show a series of terms organized by space-filling algorithms. However, often lacking in these views is the ability to interactively explore the information to gain more detail, and the location and rendering of the terms are often not based on mathematical models that maintain relative distances from other information based on similarity metrics. In this paper, we present Typograph, a multi-scale spatial exploration visualization for large document collections. Based on the term-based visualization methods, Typograh enables multiple levels of detail (terms, phrases, snippets, and full documents) within the single spatialization. Further, the information is placed based on their relative similarity to other information to create the “near = similar” geographic metaphor. This paper discusses the design principles and functionality of Typograph and presents a use case analyzing Wikipedia to demonstrate usage.

Endert, Alexander; Burtner, Edwin R.; Cramer, Nicholas O.; Perko, Ralph J.; Hampton, Shawn D.; Cook, Kristin A.

2013-10-06T23:59:59.000Z

485

Cray XC30 User Documentation  

NLE Websites -- All DOE Office Websites (Extended Search)

Cray XC30 Cray XC30 Documentation Cray XC30 User Documentation L Cray XC30 Documentation Search Preferences | Advanced Search Home Browse Books Man Pages Glossary Platforms Cray XC30 Cray XE and Cray XK Cray XT Cray Sonexion Cray X2 Cray X1 Knowledge Base by Category by Date by Platform by Title by User Release Announcements @Twitter Cray XC30 System Documentation This site map also contains legacy documentation. Always consult the latest version of documentation for your site-specific configuration and ask your Cray Customer Service representative for additional guidance on the latest software documents. Getting Started Cray Linux Environment (CLE) Software Release Overview Programming Environment Cray Programming Environments User Guide Cray Compiling Environment (CCE) Cray Fortran Reference Manual

486

Document Control Template-Form  

NLE Websites -- All DOE Office Websites (Extended Search)

7 Equipment Check-Out Form 08_0411 Page 1 of 3 7 Equipment Check-Out Form 08_0411 Page 1 of 3 EOTA - Business Form Document Title: Equipment Check-Out Form Document Number: MGTF-007 Rev. 08_0411 Document Owner: Elizabeth Sousa Backup Owner: Melissa Otero Approver(s): Melissa Otero Parent Document: MGTP-003, Control of Customer Property Notify of Changes: MGT, ADM Referenced Document(s): N/A MGTF-007 Equipment Check-Out Form 08_0411 Page 2 of 3 Revision History: Rev. Description of Change A Initial Release 08_0411 Footer removed as document is for internal use only MGTF-007 Equipment Check-Out Form 08_0411 NATIONAL NUCLEAR SECURITY ADMINISTRATION Emergency Operations Training Academy EQUIPMENT CHECK-OUT FORM Name: Date taken:

487

NEPA Documents | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Documents Documents NEPA Documents To see a list of available NEPA documents by type and sorted by publication date, click on the links below. Documents listed in this section are available to members of the public. To see documents not electronically available to the public see the Secure NEPA Documents page for more information. Categorical Exclusion (CX) Determinations Categorical exclusions are categories of actions that DOE has determined, by regulation, do not individually or cumulatively have a significant effect on the human environment and for which, therefore, neither an environmental assessment nor an environmental impact statement normally is required. DOE's categorical exclusions are listed in Appendices A and B to Subpart D of its NEPA regulations,10 CFR Part 1021.

488

Are Government Secrecy and Surveillance a Threat to National...  

NLE Websites -- All DOE Office Websites (Extended Search)

is their national security served? VIEW THIS ARTICLE PDF ICON PDF ICON IN THIS ISSUE Detonation: From the Bottom Up What's in the U.S. Nuclear Stockpile? U.K. Is Modernizing for...

489

Documents: Paducah DUF6 Conversion Facility Final EIS and ROD  

NLE Websites -- All DOE Office Websites (Extended Search)

Paducah DUF6 Final EIS Paducah DUF6 Final EIS Search Documents: Search PDF Documents View a list of all documents Paducah DUF6 Conversion Facility Final EIS and Record of Decision Full text of the Record of Decision and Final Environmental Impact Statement for Construction and Operation of a Depleted Uranium Hexafluoride Conversion Facility at the Paducah, Kentucky, Site. The full text of the Record of Decision and Paducah DUF6 Conversion Facility Final EIS and ROD is available for downloading or browsing in Adobe Acrobat PDF format through the links below. You may also order a CD-ROM or paper copy of the Depleted UF6 Conversion Facility EISs by submitting a Final EIS Document Request Form. Record of Decision PDF Icon Paducah DUF6 Conversion Facility: Record of Decision 3.6 MB details

490

Chapter 1 - Social engineering: The ultimate low tech hacking threat  

Science Journals Connector (OSTI)

Publisher Summary This chapter presents various social engineering topics, from understanding the minds of hackers and victims to methods for protecting personal, household and business information from theft and destruction. Social engineering has become the low tech hacker's most valuable and effective tool. The bad guys have continued to use the art of the con to gain access to intellectual property and if necessary the buildings that house that property. In this chapter, several examples illustrate how social engineering attacks happen in homes and businesses, and possible measures to prevent them. Today, every area of concern with security involves managing the risks associated with staying safe and secure. Most of the social engineering tools come from yard sales, thrift stores, flea markets, pawn shops, and Internet. This ranges from hats, jackets with corporate logos, tool belts, tools, listening devices, briefcases, spyware, and locks that can be used quite effectively for social engineering. The overall sneakiness of the threats associated with social engineering make it very easy for social engineers to catch anyone off guard. Several useful risk management countermeasures against social engineering are also described in the chapter. Social engineering is not a new phenomenon. Yet, it is still one of the most effective outsider-insider threats to any security plan. Despite valiant attempts by corporations to manage risk by not becoming victims of social engineering attacks, it is often far too easy for hackers to use the art of the con to gain access to intellectual property and to the buildings housing that property. This chapter explores the phenomenon of social engineering and explains why it is the ultimate low tech hacking threat. The chapter begins by explaining what social engineering is and how easy it is to pull off. Next, it digs into the minds of a social engineering attacker and a victim of an attack, and covers some of the more popular tools of the trade. The chapter also includes interviews with specialists in technical security issues, and closes with a few countermeasures associated with social engineering.

Jack Wiles; Terry Gudaitis; Jennifer Jabbusch; Russ Rogers; Sean Lowther

2012-01-01T23:59:59.000Z

491

Public views on multiple dimensions of security : nuclear waepons, terrorism, energy, and the environment : 2007.  

SciTech Connect

We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.

Herron, Kerry Gale (University of Oklahoma, Norman, OK); Jenkins-Smith, Hank C. (University of Oklahoma, Norman, OK)

2008-01-01T23:59:59.000Z

492

2014 Annual Planning Summary for the NNSA Global Threat Reduction Initiative Office  

Energy.gov (U.S. Department of Energy (DOE))

The ongoing and projected Environmental Assessments and Environmental Impact Statements for 2014 and 2015 within the NNSA Global Threat Reduction Initiative Office.

493

Game Theoretic Evaluation of Threat Detection Problems-The Central Role of the Adversary  

SciTech Connect

A wide variety of security problems hinge on the detection of threats and discrimination of threats from innocuous objects. The theory that frames these problems is common among medical diagnostics, radar and sonar imaging, and detection of radiological, chemical, and biological agents. In many of these problems, the nature of the threat is subject to control by a malicious adversary, and the choice of a reference (or "design basis") threat is a very diffcult, and often intractable, aspect of the problem. It is this class of problems that this report considers.

Heasler, Patrick G.; Wood, Thomas W.; Reichmuth, Barbara A.

2007-01-01T23:59:59.000Z

494

How ORISE is Making a Difference: Preparing for the Threat of...  

NLE Websites -- All DOE Office Websites (Extended Search)

Amber Waves ORISE coordinates tabletop exercise to help agencies prepare for the threat of dirty bombs Radiological dispersion devices (RDDs), also known as dirty bombs, are...

495

Solar Background Document 6 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Background Document 6 Graph illustrating solar cell production in the United States and China from 2002 to 2010. Solar Background Document 6.pdf More Documents & Publications Solar...

496

Reports and Other Documents | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Reports and Other Documents Reports and Other Documents Reports and other documents from DOE and other relevant agencies, listed by topic. AUGUST 2003 BLACKOUT CONTROL SYSTEMS...

497

Civilian Radioactive Waste Management System Requirements Document...  

Office of Environmental Management (EM)

Civilian Radioactive Waste Management System Requirements Document Civilian Radioactive Waste Management System Requirements Document This document specifies the top-level...

498

Solar Background Document 5 | Department of Energy  

Energy Savers (EERE)

5 Solar Background Document 5 Graph illustrating Chinese Development Bank financing to Chinese solar companies. Solar Background Document 5.pdf More Documents & Publications Solar...

499

Solar Background Document 6 | Department of Energy  

Energy Savers (EERE)

6 Solar Background Document 6 Graph illustrating solar cell production in the United States and China from 2002 to 2010. Solar Background Document 6.pdf More Documents &...

500

Solar Background Document 4 | Department of Energy  

Energy Savers (EERE)

4 Solar Background Document 4 Graph illustrating global distribution of solar manufacturing market share from 1990 to 2010. Solar Background Document 4.pdf More Documents &...