Sample records for threat view document

  1. September 2013 Most Viewed Documents for Biology And Medicine...

    Office of Scientific and Technical Information (OSTI)

    September 2013 Most Viewed Documents for Biology And Medicine Science Subject Feed Drug Retention Times Center for Human Reliability Studies (2007) 29 > Oleoresin Capsicum...

  2. March 2014 Most Viewed Documents for Biology And Medicine | OSTI...

    Office of Scientific and Technical Information (OSTI)

    March 2014 Most Viewed Documents for Biology And Medicine Science Subject Feed Carbon Dioxide Sequestering Using Microalgal Systems Daniel J. Stepan; Richard E. Shockey; Thomas A....

  3. January 2013 Most Viewed Documents for Power Generation And Distributi...

    Office of Scientific and Technical Information (OSTI)

    January 2013 Most Viewed Documents for Power Generation And Distribution Lessons from Large-Scale Renewable Energy Integration Studies: Preprint Bird, L.; Milligan, M. Small punch...

  4. March 2015 Most Viewed Documents for Biology And Medicine | OSTI...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    March 2015 Most Viewed Documents for Biology And Medicine Measuring dopamine release in the human brain with PET Volkow, N.D. Brookhaven National Lab., Upton, NY (United...

  5. June 2014 Most Viewed Documents for Fission And Nuclear Technologies...

    Office of Scientific and Technical Information (OSTI)

    Viewed Documents for Fission And Nuclear Technologies Behavior of spent nuclear fuel in water pool storage Johnson, A.B. Jr. (1977) 78 Estimation of gas leak rates through very...

  6. Rhetoric, World-view, and Strategy in United States National Security Strategy Documents

    E-Print Network [OSTI]

    Cram, Travis J.

    2014-08-31T23:59:59.000Z

    to solve global problems and manage threats requires that these audiences buy-in to the president’s assessment of threats and possible solutions. Evaluating NSS documents as instances of symbolic action may enable critics to understand how NSS documents... the United States as the unwilling, virtuous victim in order to legitimize defense build-ups, explain policy failures, or warrant American military interventions abroad (Ivie, 1984; Klope, 1986). Reagan’s approach to nuclear weapons and missile defenses...

  7. January 2013 Most Viewed Documents for Mathematics And Computing...

    Office of Scientific and Technical Information (OSTI)

    Documents for Mathematics And Computing Cybersecurity through Real-Time Distributed Control Systems Kisner, Roger A ORNL; Manges, Wayne W ORNL; MacIntyre, Lawrence Paul...

  8. June 2014 Most Viewed Documents for Power Generation And Distribution...

    Office of Scientific and Technical Information (OSTI)

    Documents for Power Generation And Distribution Science Subject Feed Seventh Edition Fuel Cell Handbook NETL (2004) 118 > Electric power high-voltage transmission lines:...

  9. April 2013 Most Viewed Documents for Biology And Medicine | OSTI...

    Office of Scientific and Technical Information (OSTI)

    Delivery and Gene Transfection Daniela Rodica Radu (2005) 84 > Advisory Committee on human radiation experiments. Supplemental Volume 2a, Sources and documentation appendices....

  10. March 2015 Most Viewed Documents for Mathematics And Computing...

    Office of Scientific and Technical Information (OSTI)

    system solver Petzold, L.R. (1982) 98 Health and environmental effects document on geothermal energy: 1981 Layton, D.W.; Anspaugh, L.R.; O'Banion, K.D. (1981) 95 Comparison of...

  11. June 2015 Most Viewed Documents for Mathematics And Computing...

    Office of Scientific and Technical Information (OSTI)

    (1997) 53 PC-1D installation manual and user's guide Basore, P.A. (1991) 52 Conduction heat transfer solutions VanSant, J.H. (1983) 52 Health and environmental effects document...

  12. April 2013 Most Viewed Documents for Energy Storage, Conversion, And

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternativeOperational Management » History » Manhattanand

  13. April 2013 Most Viewed Documents for Fission And Nuclear Technologies |

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternativeOperational Management » History » ManhattanandOffice

  14. April 2013 Most Viewed Documents for Power Generation And Distribution |

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternativeOperational Management » History »Dept of Energy,OSTI, US

  15. Some Thoughts on Threat Modelling Peter Gutmann

    E-Print Network [OSTI]

    Gutmann, Peter

    Some Thoughts on Threat Modelling Peter Gutmann University of Auckland Traditional Threat Modelling Think up threats until you get bored, then declare victory Often leads to circular reasoning · "Our threat model is whatever our application defends against" Example: DNSSEC · The requirements document

  16. Document

    Energy Savers [EERE]

    5320 Federal Register Vol. 75, No. 204 Friday, October 22, 2010 Notices intervene or protest must serve a copy of that document on the Applicant. Notice is hereby given that...

  17. Document:

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    position monitor (BPM) is on the order of a few milliseconds, the cooling effect due to remote water convection is limited. In addition, in view of the localized power input, it...

  18. document

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4 Self-Scrubbing:,, , ., ..., ,+ .-detonation detectionDocument

  19. Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField Campaign:INEA : Papers69 Federal Register / Vol.PREDICTINGvN3Documents

  20. P2P Views Over Annotated Documents Konstantinos Karanasos, Ioana Manolescu

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    . Publication of such resources is inherently distributed. One could consider up- loading all published content] and social networks' tagging are among the most common methods to express annotations. Here, we designate and annotations. At the core of content sharing in AnnoVIP stand materialized views over the whole network content

  1. April 2013 Most Viewed Documents for Materials | OSTI, US Dept of Energy,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternativeOperational Management » History »

  2. April 2013 Most Viewed Documents for Biology And Medicine | OSTI, US Dept

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternativeOperational Management » History » Manhattanand Summer

  3. April 2013 Most Viewed Documents for Chemistry | OSTI, US Dept of Energy,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternativeOperational Management » History » Manhattanand SummerOffice

  4. April 2013 Most Viewed Documents for Engineering | OSTI, US Dept of Energy,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternativeOperational Management » History » ManhattanandOffice of

  5. April 2013 Most Viewed Documents for Environmental Sciences | OSTI, US Dept

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternativeOperational Management » History » ManhattanandOffice ofof

  6. April 2013 Most Viewed Documents for Geosciences | OSTI, US Dept of Energy,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternativeOperational Management » History » ManhattanandOfficeOffice

  7. April 2013 Most Viewed Documents for Mathematics And Computing | OSTI, US

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternativeOperational Management » History »Dept of Energy, Office of

  8. April 2013 Most Viewed Documents for National Defense | OSTI, US Dept of

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternativeOperational Management » History »Dept of Energy, Office

  9. April 2013 Most Viewed Documents for Physics | OSTI, US Dept of Energy,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternativeOperational Management » History »Dept of Energy,

  10. April 2013 Most Viewed Documents for Renewable Energy Sources | OSTI, US

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternativeOperational Management » History »Dept of Energy,OSTI,

  11. BOMB THREAT CALL PROCEDURES

    E-Print Network [OSTI]

    Guo, Ting

    THREAT CALL PROCEDURES BOMB THREAT CHECKLIST Date: Time: Time Caller Phone Number Where Hung Up: Call Received:Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act threat is received by phone: 1. Remain calm. Keep the caller on the line for as long as possible. DO

  12. Vacuoles: a hollow threat?

    E-Print Network [OSTI]

    Yaksh, Tony L.

    2010-01-01T23:59:59.000Z

    2 EDITORIALS Vacuoles: a hollow threat? Tony L. Yaksh, PhDthat Vacuoles: a hollow threat? provided by procaine anda l’esprit : Vacuoles: a hollow threat? Ces vacuoles acides

  13. Research Article Signaling Threat

    E-Print Network [OSTI]

    Gross, James J.

    Research Article Signaling Threat How Situational Cues Affect Women in Math, Science and organization,canmake potentialtargetsvulnerabletosocial identity threat.Objective and subjective measuresofidentity threat were collected from male and female math, science, and engineering (MSE) majors who watched

  14. Metamaterials for threat reduction applications: imaging, signal processing, and cloaking

    E-Print Network [OSTI]

    Metamaterials for threat reduction applications: imaging, signal processing, and cloaking R. D effort is underway to fill this "THz gap" in view of potential threat reduction applications) and Theoretical Divisions, are exploring metamaterials-based de- vices operating at THz frequencies for threat

  15. Insider Threat Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2014-06-02T23:59:59.000Z

    To establish responsibilities and requirements for the Department of Energy (DOE) Insider Threat Program (ITP) to deter, detect, and mitigate insider threat actions by Federal and contractor employees in accordance with the requirements of Executive Order 13587, the National Insider Threat Policy and Minimum Standards for Executive Branch Insider Threat Programs and other government-wide and DOE requirements. Does not cancel other directives.

  16. Cyber threat metrics.

    SciTech Connect (OSTI)

    Frye, Jason Neal; Veitch, Cynthia K.; Mateski, Mark Elliot; Michalski, John T.; Harris, James Mark; Trevino, Cassandra M.; Maruoka, Scott

    2012-03-01T23:59:59.000Z

    Threats are generally much easier to list than to describe, and much easier to describe than to measure. As a result, many organizations list threats. Fewer describe them in useful terms, and still fewer measure them in meaningful ways. This is particularly true in the dynamic and nebulous domain of cyber threats - a domain that tends to resist easy measurement and, in some cases, appears to defy any measurement. We believe the problem is tractable. In this report we describe threat metrics and models for characterizing threats consistently and unambiguously. The purpose of this report is to support the Operational Threat Assessment (OTA) phase of risk and vulnerability assessment. To this end, we focus on the task of characterizing cyber threats using consistent threat metrics and models. In particular, we address threat metrics and models for describing malicious cyber threats to US FCEB agencies and systems.

  17. BOMB THREAT CALL PROCEDURES

    E-Print Network [OSTI]

    Boyce, Richard L.

    BOMB THREAT CALL PROCEDURES WHO TO CONTACT (select one) · Follow your local guidelines · Federal Protective Service (FPS) Police 1-877-4-FPS-411 (1-877-437-7411) · 911 Most bomb threats are received by phone. Bomb threats are serious until proven otherwise. Act quickly, but remain calm and obtain

  18. A threat-rigidity analysis of the Apache Software Foundation's response to reported server security issues

    E-Print Network [OSTI]

    Shapira, Yoav

    2006-01-01T23:59:59.000Z

    There exists a broad body of literature documenting organizational responses to competitive threats, including those responses which fit into the threat-rigidity hypothesis. The purpose of this thesis is to investigate how ...

  19. Bomb threat There are two types of Bomb Threats

    E-Print Network [OSTI]

    Hickman, Mark

    v Bomb threat There are two types of Bomb Threats: 1. Specific Information/location will be given about the device, or a suspicious item and/or location. Specific Threat - On a landline Dial 6111, state you have received a "SPecific BOmB threat". If possible recall exact wording of threat. 2. Non

  20. WHAT DO THREAT LEVELS AND RESPONSE LEVELS MEAN? THREAT LEVELS

    E-Print Network [OSTI]

    Edinburgh, University of

    WHAT DO THREAT LEVELS AND RESPONSE LEVELS MEAN? THREAT LEVELS: The UK Threat Level is decided by the Government's Joint Terrorism Analysis Centre (JTAC). It is the system to assess the threat to the UK from Threat Levels: Low - an attack is unlikely Moderate - an attack is possible, but not likely Substantial

  1. BomB ThreaT Assume threat is real

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Call 911 BomB ThreaT · Assume threat is real · Evacuate area explosion/ Fire · Activate fire alarm or office, do not let the person in · Do not block person's access to an exit · Move away from the threat

  2. Cyber Threat Trees for Large System Threat Cataloging and Analysis*

    E-Print Network [OSTI]

    Thornton, Mitchell

    Cyber Threat Trees for Large System Threat Cataloging and Analysis* P. Ongsakorn, K. Turney, M, kturney, mitch, nair, szygenda, manikas}@lyle.smu.edu Abstract--The implementation of cyber threat. Because large systems have many possible threats that may be interdependent, it is crucial

  3. Threat Insight Quarterly Wireless Technology

    E-Print Network [OSTI]

    X-Force ® Threat Insight Quarterly Wireless Technology April 2006 #12;X - F O R C E T H R E A T I N the Wireless Threat ..................................................3 Wireless Threats-Force Catastrophic Risk Index...................................... 13 Future X-Force Threat Insight Quarterly Topics

  4. A threat analysis framework as applied to critical infrastructures in the Energy Sector.

    SciTech Connect (OSTI)

    Michalski, John T.; Duggan, David Patrick

    2007-09-01T23:59:59.000Z

    The need to protect national critical infrastructure has led to the development of a threat analysis framework. The threat analysis framework can be used to identify the elements required to quantify threats against critical infrastructure assets and provide a means of distributing actionable threat information to critical infrastructure entities for the protection of infrastructure assets. This document identifies and describes five key elements needed to perform a comprehensive analysis of threat: the identification of an adversary, the development of generic threat profiles, the identification of generic attack paths, the discovery of adversary intent, and the identification of mitigation strategies.

  5. Project Programming and Commissioning as a Risk Mitigation and Threat Analysis Tool

    E-Print Network [OSTI]

    Weiss, M. L.

    2006-01-01T23:59:59.000Z

    beyond traditional disciplines including risk/threat analysis and mitigation programs. This paper discusses the growing trend of using a commissioning approach as a documentation process for the validation requirements, which are documented in the study...

  6. Airborne Particulate Threat Assessment

    SciTech Connect (OSTI)

    Patrick Treado; Oksana Klueva; Jeffrey Beckstead

    2008-12-31T23:59:59.000Z

    Aerosol threat detection requires the ability to discern between threat agents and ambient background particulate matter (PM) encountered in the environment. To date, Raman imaging technology has been demonstrated as an effective strategy for the assessment of threat agents in the presence of specific, complex backgrounds. Expanding our understanding of the composition of ambient particulate matter background will improve the overall performance of Raman Chemical Imaging (RCI) detection strategies for the autonomous detection of airborne chemical and biological hazards. Improving RCI detection performance is strategic due to its potential to become a widely exploited detection approach by several U.S. government agencies. To improve the understanding of the ambient PM background with subsequent improvement in Raman threat detection capability, ChemImage undertook the Airborne Particulate Threat Assessment (APTA) Project in 2005-2008 through a collaborative effort with the National Energy Technology Laboratory (NETL), under cooperative agreement number DE-FC26-05NT42594. During Phase 1 of the program, a novel PM classification based on molecular composition was developed based on a comprehensive review of the scientific literature. In addition, testing protocols were developed for ambient PM characterization. A signature database was developed based on a variety of microanalytical techniques, including scanning electron microscopy, FT-IR microspectroscopy, optical microscopy, fluorescence and Raman chemical imaging techniques. An automated particle integrated collector and detector (APICD) prototype was developed for automated collection, deposition and detection of biothreat agents in background PM. During Phase 2 of the program, ChemImage continued to refine the understanding of ambient background composition. Additionally, ChemImage enhanced the APICD to provide improved autonomy, sensitivity and specificity. Deliverables included a Final Report detailing our findings and APICD Gen II subsystems for automated collection, deposition and detection of ambient particulate matter. Key findings from the APTA Program include: Ambient biological PM taxonomy; Demonstration of key subsystems needed for autonomous bioaerosol detection; System design; Efficient electrostatic collection; Automated bioagent recognition; Raman analysis performance validating Td<9 sec; Efficient collection surface regeneration; and Development of a quantitative bioaerosol defection model. The objective of the APTA program was to advance the state of our knowledge of ambient background PM composition. Operation of an automated aerosol detection system was enhanced by a more accurate assessment of background variability, especially for sensitive and specific sensing strategies like Raman detection that are background-limited in performance. Based on this improved knowledge of background, the overall threat detection performance of Raman sensors was improved.

  7. Overlooked? The Growing Threat of Desertification

    E-Print Network [OSTI]

    Zhu, Julian

    2012-01-01T23:59:59.000Z

    Overlooked? The Growing Threat of Desertification Julian Zhuovergrazing directly threat- ens the natural resilience ofspite the fact that the threat of desertification is both

  8. Proliferation: Threat and response

    SciTech Connect (OSTI)

    NONE

    1996-04-01T23:59:59.000Z

    During the height of the Cold War, the Russian physicist Andre Sakharov said, `Reducing the risk of annihilating humanity in a nuclear war carries an absolute priority over all other considerations.` The end of the Cold War has reduced the threat of global nuclear war, but today a new threat is rising from the global spread of nuclear, biological, and chemical weapons. Hostile groups and nations have tried - or have been able - to obtain these weapons, the technology, and homegrown ability to make them or ballistic missiles that can deliver the massive annihilation, poison, and death of these weapons hundreds of miles away. For rogue nations, these weapons are a ticket to power, stature, and confidence in regional war.

  9. Threat Insight Quarterly Regulatory Compliance

    E-Print Network [OSTI]

    X-Force ® Threat Insight Quarterly Regulatory Compliance www.iss.netwww.iss.net October 2006 #12 Risk Index ..............................................11 Future X-Force Threat Insight Quarterly Internet Security Systems X-Force® Threat Insight Quarterly > October 2006 ©2006 Internet Security Systems

  10. BOMB THREAT CHECKLIST Telephone Procedures

    E-Print Network [OSTI]

    Derisi, Joseph

    BOMB THREAT CHECKLIST Telephone Procedures DATE: / / TIME RECEIVED: : AM/PM CONCLUDED: : AM - GIVE NOTE SAYING "CALL UC POLICE - BOMB THREAT" 9-911 IF YOUR PHONE HAS CALLER ID DISPLAY, RECORD NUMBER OF INCOMING CALL __________________________ WRITE DOWN EXACT WORDS OF THE CALLER AND THREAT DON

  11. Threat Insight Quarterly Browser Exploitation

    E-Print Network [OSTI]

    X-Force ® Threat Insight Quarterly Browser Exploitation www.iss.netwww.iss.net January 2007 #12 . . . . . . . . . . . . . . . . . . . . . . . . 11 Previous X-Force Threat Insight Quarterly Topics . . . . . . . . . . 15 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 Contents IBM Internet Security Systems X-Force® Threat Insight Quarterly > January 2007

  12. Threat Insight Quarterly Vulnerability Management

    E-Print Network [OSTI]

    X-Force ® Threat Insight Quarterly Vulnerability Management July 2006 #12;X - F O R C E T H R E.................. 7 X-Force Catastrophic Risk Index.............................. 10 Future X-Force Threat Insight Introduction There is a wide range of threats that can exist in any network. The presence of unpatched

  13. Emerging Threats and Opportunities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMFormsGasRelease Date:researchEmerging Threats and Opportunities

  14. Insider Threat - Material Control and Accountability Mitigation

    SciTech Connect (OSTI)

    Powell, Danny H [ORNL] [ORNL; Elwood Jr, Robert H [ORNL] [ORNL; Roche, Charles T [ORNL] [ORNL

    2011-01-01T23:59:59.000Z

    The technical objectives of nuclear safeguards are (1) the timely detection of diversion of significant quantities of nuclear material from peaceful uses to the manufacture of nuclear weapons or other nuclear explosive devices or for purposes unknown and (2) the deterrence of such diversion by the risk of early detection. The safeguards and security program must address both outsider threats and insider threats. Outsider threats are primarily addressed by the physical protection system. Insider threats can be any level of personnel at the site including passive or active insiders that could attempt protracted or abrupt diversion. This could occur by an individual acting alone or by collusion between an individual with material control and accountability (MC&A) responsibilities and another individual who has responsibility or control within both the physical protection and the MC&A systems. The insider threat is one that must be understood and incorporated into the safeguards posture. There have been more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. The insider has access, authority, and knowledge, as well as a set of attributes, that make him/her difficult to detect. An integrated safeguards program is designed as a defense-in-depth system that seeks to prevent the unauthorized removal of nuclear material, to provide early detection of any unauthorized attempt to remove nuclear material, and to rapidly respond to any attempted removal of nuclear material. The program is also designed to support protection against sabotage, espionage, unauthorized access, compromise, and other hostile acts that may cause unacceptable adverse impacts on national security, program continuity, the health and safety of employees, the public, or the environment. Nuclear MC&A play an essential role in the capabilities of an integrated safeguards system to deter and detect theft or diversion of nuclear material. An integrated safeguards system with compensating mitigation can decrease the risk of an insider performing a malicious act without detection.

  15. Addressing the insider threat

    SciTech Connect (OSTI)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-05-01T23:59:59.000Z

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  16. Addressing the insider threat

    SciTech Connect (OSTI)

    Hochberg, J.G.; Jackson, K.A.; McClary, J.F.; Simmonds, D.D.

    1993-01-01T23:59:59.000Z

    Computers have come to play a major role in the processing of information vital to our national security. As we grow more dependent on computers, we also become more vulnerable to their misuse. Misuse may be accidental, or may occur deliberately for purposes of personal gain, espionage, terrorism, or revenge. While it is difficult to obtain exact statistics on computer misuse, clearly it is growing. It is also clear that insiders -- authorized system users -- are responsible for most of this increase. Unfortunately, their insider status gives them a greater potential for harm This paper takes an asset-based approach to the insider threat. We begin by characterizing the insider and the threat posed by variously motivated insiders. Next, we characterize the asset of concern: computerized information of strategic or economic value. We discuss four general ways in which computerized information is vulnerable to adversary action by the insider: disclosure, violation of integrity, denial of service, and unauthorized use of resources. We then look at three general remedies for these vulnerabilities. The first is formality of operations, such as training, personnel screening, and configuration management. The second is the institution of automated safeguards, such as single-use passwords, encryption, and biometric devices. The third is the development of automated systems that collect and analyze system and user data to look for signs of misuse.

  17. Threat Characterization: Trajectory Dynamics

    E-Print Network [OSTI]

    Russell Schweickart; Clark Chapman; Dan Durda; Bill Bottke; David Nesvorny; Piet Hut

    2006-08-15T23:59:59.000Z

    Given a primary interest in "mitigation of the potential hazard" of near-Earth objects impacting the Earth, the subject of characterization takes on an aspect not normally present when considering asteroids as abstract bodies. Many deflection concepts are interested in the classic geophysical characteristics of asteroids when considering the physical challenge of modifying their orbits in order to cause them to subsequently miss an impact with Earth. Yet for all deflection concepts there are characteristics of the threat which overwhelm these traditional factors. For example, a close gravitational encounter with Earth some years or decades prior to impact can reduce the velocity change necessary for deflection by several orders of magnitude if the deflection precedes the close encounter (or encounters). Conversely this "benefit" comes at a "price"; a corresponding increase in the accuracy of tracking required to determine the probability of impact. Societal issues, both national and international, also characterize the NEO deflection process and these may strongly contend with the purely technical issues normally considered. Therefore critical factors not normally considered must be brought into play as one characterizes the threat of NEO impacts.

  18. PITTSBURGH REGIONAL ENVIRONMENTAL THREATS ANALYSIS

    E-Print Network [OSTI]

    Jiang, Huiqiang

    AND COMMUNITIES PITTSBURGH, PA. | AUGUST 2013 #12;PRETA AIR: HAZARDOUS AIR POLLUTANTS 32 PITTSBURGH REGIONAL ENVIRONMENTAL THREATS ANALYSIS REPORT PRETA AIR: HAZARDOUS AIR POLLUTANTS (HAPs)/AIR TOXICS PREPARED BY AUTHORSPITTSBURGH REGIONAL ENVIRONMENTAL THREATS ANALYSIS (PRETA) REPORT PRETA AIR: HAZARDOUS AIR

  19. Bio-threat microparticle simulants

    DOE Patents [OSTI]

    Farquar, George Roy; Leif, Roald

    2014-09-16T23:59:59.000Z

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  20. Bio-threat microparticle simulants

    DOE Patents [OSTI]

    Farquar, George Roy; Leif, Roald N

    2012-10-23T23:59:59.000Z

    A bio-threat simulant that includes a carrier and DNA encapsulated in the carrier. Also a method of making a simulant including the steps of providing a carrier and encapsulating DNA in the carrier to produce the bio-threat simulant.

  1. Better Buildings Network View | May 2014 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    May 2014 More Documents & Publications Better Buildings Network View | July-August 2014 Better Buildings Network View | June...

  2. The New Nuclear Threat John Deutch

    E-Print Network [OSTI]

    Deutch, John

    The New Nuclear Threat John Deutch FOREIGN AFFAIRS Volume 71 · Number 4 Foreign AffairsThe contents. Deutch THE NEW NUCLEAR THREAT he threat of nuclear weapons spread across the world has displaced the fear

  3. Network Television and the Digital Threat

    E-Print Network [OSTI]

    Lapan, Lisa

    2009-01-01T23:59:59.000Z

    NETWORK TV AND THE DIGITAL THREAT tertainment are availableNETWORK TV AND THE DIGITAL THREAT luring users to watch the91 Ryan Nakashima, Digital Threat Prompts Movie Industry

  4. Better Buildings Network View | November 2014 | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    November 2014 More Documents & Publications Better Buildings Network View | July-August 2014 Better Buildings Network View | December 2014 Better Buildings Network View | January...

  5. IBM Software Data Sheet IBM adaptive threat

    E-Print Network [OSTI]

    IBM Software Data Sheet IBM adaptive threat protection Stay ahead of security threats with a state-of-the-art network protection engine Highlights Identify high-risk threats and zero-day attacks with protocol-based, behavioral anomaly detection Protect end users against the latest web-based threats, such as SQL injection

  6. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    IBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net May 2007 #12 The Emerging Threat Landscape . . . . . . . . . . . . . . . . . . . . . . . . 2 Mobile Security Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly May

  7. The Co-Design of Scenarios for a Didactic-based E-learning System viewed as an Adaptive Virtual Document

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    The Co-Design of Scenarios for a Didactic-based E-learning System viewed as an Adaptive Virtual of the theory in didactic anthropology of knowledge and to show why we can formalize them in a hierarchical task scientific approaches ­ from computer science, didactic, cognitive psychology, education, etc. The design

  8. Chinese Workers: Under Threat or a Threat to American Workers?

    E-Print Network [OSTI]

    Harper Ho, Virginia E.; Zhang, Lu

    2010-07-01T23:59:59.000Z

    . At the same time, some employers have found ways to avoid following the spirit, if not the letter of the laws. The consequences for American workers are unclear, since their challenges are less about a direct threat from Chinese workers and more about...

  9. Cyber Threats to Nuclear Infrastructures

    SciTech Connect (OSTI)

    Robert S. Anderson; Paul Moskowitz; Mark Schanfein; Trond Bjornard; Curtis St. Michel

    2010-07-01T23:59:59.000Z

    Nuclear facility personnel expend considerable efforts to ensure that their facilities can maintain continuity of operations against both natural and man-made threats. Historically, most attention has been placed on physical security. Recently however, the threat of cyber-related attacks has become a recognized and growing world-wide concern. Much attention has focused on the vulnerability of the electric grid and chemical industries to cyber attacks, in part, because of their use of Supervisory Control and Data Acquisition (SCADA) systems. Lessons learned from work in these sectors indicate that the cyber threat may extend to other critical infrastructures including sites where nuclear and radiological materials are now stored. In this context, this white paper presents a hypothetical scenario by which a determined adversary launches a cyber attack that compromises the physical protection system and results in a reduced security posture at such a site. The compromised security posture might then be malevolently exploited in a variety of ways. The authors conclude that the cyber threat should be carefully considered for all nuclear infrastructures.

  10. Android Keylogging Threat Fadi Mohsen, Mohammed Shehab

    E-Print Network [OSTI]

    Shehab, Mohamed

    Android Keylogging Threat Fadi Mohsen, Mohammed Shehab Department of Software and Information of keylogging attacks on Android. Which is a security threat pertaining to Android openness on specific feature

  11. Nuclear Radiological Threat Task Force Established | National...

    National Nuclear Security Administration (NNSA)

    Radiological Threat Task Force Established | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  12. Chlorine Gas: An Evolving Hazardous Material Threat and Unconventional Weapon

    E-Print Network [OSTI]

    Jones, Robert; Wills, Brandon; Kang, Christopher

    2010-01-01T23:59:59.000Z

    Chlorine Gas: An Evolving Hazardous Material Threat andChlorine gas represents a hazardous material threat fromrepresents a persistent hazardous material (HAZMAT) threat.

  13. Rethinking the Cyber Threat A Framework and Path Forward

    E-Print Network [OSTI]

    Bernstein, Phil

    Rethinking the Cyber Threat A Framework and Path Forward SCOTT CHARNEY Corporate Vice President ..................................................................................................................................................5 Understanding the Cyber Threat .................................................................................................................5 Rethinking the Cyber Threat

  14. A Risk Management Approach to the 'Insider Threat'

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    Stochastic, and Insider Threat. Management Science, 48(6):modelling for insider threat mitigation. Paci?c Northwestbased model for analyzing threats that include those usually

  15. Collision Course: The Threat and Effects of an Asteroid Impact

    E-Print Network [OSTI]

    Reddy, Sharath

    2013-01-01T23:59:59.000Z

    reviewing asteroid impact threat. Retrieved from http://reviewing-asteroid-impact-threat/ Edwards, L. (2010, Octoberoccurring. Comparing the threat of an asteroid impact to the

  16. A Risk Management Approach to the 'Insider Threat'

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    Stochastic, and Insider Threat. Management Science, 48(6):modelling for insider threat mitigation. Pacific Northwestbased model for analyzing threats that include those usually

  17. Bayesian Discovery of Threat Networks

    E-Print Network [OSTI]

    Smith, Steven T; Senne, Kenneth D; Bernstein, Garrett; Philips, Scott

    2013-01-01T23:59:59.000Z

    A novel unified Bayesian framework for network detection is developed, under which a detection algorithm is derived based on random walks on graphs. The algorithm detects threat networks using partial observations of their activity, and is proved to be optimum in the Neyman-Pearson sense. The algorithm is defined by a graph, at least one observation, and a diffusion model for threat. A link to well-known spectral detection methods is provided, and the equivalence of the random walk and harmonic solutions to the Bayesian formulation is proven. A general diffusion model is introduced that utilizes spatio-temporal relationships between vertices, and is used for a specific space-time formulation that leads to significant performance improvements on coordinated covert networks. This performance is demonstrated using a new hybrid interaction model introduced to simulate random covert networks with realistic properties.

  18. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    IBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net February 2007 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly February 2007 #12;X-Force® Threat Insight Monthly > February 2007 www.iss.netwww.iss.net About this report

  19. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    IBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net June 2007 #12 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly June 2007 #12;X-Force® Threat Insight Monthly > June 2007 www.iss.netwww.iss.net About this report

  20. BOMB THREAT CHECKLIST QUESTIONS TO ASK

    E-Print Network [OSTI]

    Cui, Yan

    BOMB THREAT CHECKLIST QUESTIONS TO ASK: 1. When is the bomb going to explode? 2. Where is it right ___Clearing Throat ___Laughter ___Deep Breathing __Crying ___Cracking voice __Normal ___Disguised THREAT __Foul ___Taped __Message read by threat maker __Irrational If voice is familiar, who did it sound like

  1. REVIEW/SYNTHSE Threat display in birds

    E-Print Network [OSTI]

    Hurd, Peter L.

    REVIEW/SYNTHÈSE Threat display in birds Peter L. Hurd and Magnus Enquist Abstract: The study of threat displays has long been an area in which theory and empirical work have each spurred the other. A great deal that classical ethologists have accurately described about threat displays still lacks

  2. Neural Mechanisms Underlying Selective Attention to Threat

    E-Print Network [OSTI]

    Bishop, Sonia

    Neural Mechanisms Underlying Selective Attention to Threat SONIA J. BISHOP Behavioural and Clinical. This provides a framework for inves- tigating the neural mechanisms underlying selective attention to threat. Both subcortical regions implicated in threat detection--specifically the amygdala--and prefrontal

  3. Developmental Changes in Responsivity to Threat are

    E-Print Network [OSTI]

    Barr, Gordon A.

    Developmental Changes in Responsivity to Threat are Stimulus-Specific in Rats Christoph P 2000 ABSTRACT: During early ontogeny, stimuli that pose a threat to an animal change. Unrelated adult a threat only during a limited period of development, when the animal's particular developmental stage

  4. Deriving Security Requirements from Crosscutting Threat Descriptions

    E-Print Network [OSTI]

    Haley, Charles B.

    Deriving Security Requirements from Crosscutting Threat Descriptions Charles B. Haley, Robin C representing threats as crosscutting concerns aids in determining the effect of security requirements on the functional requirements. Assets (objects that have value in a system) are first enumerated, and then threats

  5. Stereotype threat in sports 1 Running head: STEREOTYPE THREAT AND ACHIEVEMENT GOALS IN SPORTS

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Stereotype threat in sports 1 Running head: STEREOTYPE THREAT AND ACHIEVEMENT GOALS IN SPORTS Do Achievement Goals Mediate Stereotype Threat? An Investigation on Females' Soccer Performance Aïna Chalabaev Psycholoy 30 (2008) 143-158" #12;Stereotype threat in sports 2 Abstract This research investigated

  6. Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults' memory errors

    E-Print Network [OSTI]

    Mather, Mara

    Running head: STEREOTYPE THREAT REDUCES MEMORY ERRORS Stereotype threat can reduce older adults, 90089-0191. Phone: 213-740-6772. Email: barbersa@usc.edu #12;STEREOTYPE THREAT REDUCES MEMORY ERRORS 2 Abstract (144 words) Stereotype threat often incurs the cost of reducing the amount of information

  7. Ionosphere Spatial Gradient Threat for LAAS: Mitigation and Tolerable Threat Space

    E-Print Network [OSTI]

    Stanford University

    1 Ionosphere Spatial Gradient Threat for LAAS: Mitigation and Tolerable Threat Space Ming Luo, Sam and a threat space was extrapolated based on the 6 April 2000 ionospheric storm. It was showed that the impact of the ionospheric anomalies depends on the threat parameters, namely, the ionospheric gradient, the slope width

  8. Recognizing Threat: A Simple Geometric Shape Activates Neural Circuitry for Threat Detection

    E-Print Network [OSTI]

    Sarinopoulos, Issidoros

    Recognizing Threat: A Simple Geometric Shape Activates Neural Circuitry for Threat Detection the perception of threat. We here re- port that the neural circuitry known to be mobilized by many realistic instantiating detection of threat and negative affect, suggesting that recognition of potential danger may

  9. Better Buildings Network View | April 2014 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    April 2014 More Documents & Publications Better Buildings Network View | December 2014 Better Buildings Residential Network Orientation Better Buildings Network View | November...

  10. Better Buildings Network View | January 2015 | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    5 More Documents & Publications Better Buildings Network View | December 2014 Better Buildings Network View | November 2014 Better Buildings Residential Network Orientation...

  11. Better Buildings Network View | February 2015 | Department of...

    Broader source: Energy.gov (indexed) [DOE]

    5 More Documents & Publications Better Buildings Network View | November 2014 Better Buildings Network View | September 2014 Better Buildings Residential Network Case Study:...

  12. Sensor-guided threat countermeasure system

    DOE Patents [OSTI]

    Stuart, Brent C.; Hackel, Lloyd A.; Hermann, Mark R.; Armstrong, James P.

    2012-12-25T23:59:59.000Z

    A countermeasure system for use by a target to protect against an incoming sensor-guided threat. The system includes a laser system for producing a broadband beam and means for directing the broadband beam from the target to the threat. The countermeasure system comprises the steps of producing a broadband beam and directing the broad band beam from the target to blind or confuse the incoming sensor-guided threat.

  13. Autonomous Realtime Threat-Hunting Robot (ARTHR

    SciTech Connect (OSTI)

    INL

    2008-05-29T23:59:59.000Z

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  14. Autonomous Realtime Threat-Hunting Robot (ARTHR

    ScienceCinema (OSTI)

    INL

    2009-09-01T23:59:59.000Z

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats.

  15. Identification of threats using linguistics-based knowledge extraction.

    SciTech Connect (OSTI)

    Chew, Peter A.

    2008-09-01T23:59:59.000Z

    One of the challenges increasingly facing intelligence analysts, along with professionals in many other fields, is the vast amount of data which needs to be reviewed and converted into meaningful information, and ultimately into rational, wise decisions by policy makers. The advent of the world wide web (WWW) has magnified this challenge. A key hypothesis which has guided us is that threats come from ideas (or ideology), and ideas are almost always put into writing before the threats materialize. While in the past the 'writing' might have taken the form of pamphlets or books, today's medium of choice is the WWW, precisely because it is a decentralized, flexible, and low-cost method of reaching a wide audience. However, a factor which complicates matters for the analyst is that material published on the WWW may be in any of a large number of languages. In 'Identification of Threats Using Linguistics-Based Knowledge Extraction', we have sought to use Latent Semantic Analysis (LSA) and other similar text analysis techniques to map documents from the WWW, in whatever language they were originally written, to a common language-independent vector-based representation. This then opens up a number of possibilities. First, similar documents can be found across language boundaries. Secondly, a set of documents in multiple languages can be visualized in a graphical representation. These alone offer potentially useful tools and capabilities to the intelligence analyst whose knowledge of foreign languages may be limited. Finally, we can test the over-arching hypothesis--that ideology, and more specifically ideology which represents a threat, can be detected solely from the words which express the ideology--by using the vector-based representation of documents to predict additional features (such as the ideology) within a framework based on supervised learning. In this report, we present the results of a three-year project of the same name. We believe these results clearly demonstrate the general feasibility of an approach such as that outlined above. Nevertheless, there are obstacles which must still be overcome, relating primarily to how 'ideology' should be defined. We discuss these and point to possible solutions.

  16. IBM Internet Security Systems Threat Insight Monthly

    E-Print Network [OSTI]

    of cryptography as it relates to the computer security industry. We will look at some of the underlying technologyIBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net September . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Contents www.iss.netwww.iss.net IBM Internet Security Systems X-Force ® Threat Insight Monthly

  17. The Nature of the Bioterrorism Threat

    SciTech Connect (OSTI)

    Regens, J. L.

    2003-02-25T23:59:59.000Z

    This analysis provides an overview of the nature of the bioterrorism threat. It identifies potential CDC Class A biological agents that are likely candidates for use in a terrorist incident and describes the known sources of vulnerability. The paper also summarizes S&T resources/needs and assesses response options for achieving effective biodefense against terrorist threats.

  18. Nuclear threats from small states

    SciTech Connect (OSTI)

    Kahan, J.H.

    1994-06-13T23:59:59.000Z

    What are the policy implications regarding proliferation and counter proliferation of nuclear weapons among Third World states. How does deterrence operate outside the parameters of superpower confrontation as defined by the cold war elaborate system of constraints enforced by concepts like mutual assured destruction, and counter-value and counter-force targeting. How can US policymakers devise contingencies for dealing with nuclear threats posed by countries like North Korea, Libya, Iraq, Iran, and Syria. These are some of the unsettling but nevertheless important questions addressed by the author in this monograph. In his analysis, Mr. Jerome Kahan examines the likelihood that one or more of these countries will use nuclear weapons before the year 2000. He also offers a framework that policymakers and planners might use in assessing US interests in preempting the use of nuclear weapons or in retaliating for their use. Ironically, with the end of the cold war, it is imperative that defense strategists, policymakers, and military professionals think about the `unthinkable`. In the interest of fostering debate on this important subject, the Strategic Studies Institute commends this insightful monograph.

  19. ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling for Mobile Ad Hoc and

    E-Print Network [OSTI]

    Sen, Sevil

    ITA CONFERENCE 1569048773 THREAT MODELLING FOR MOBILE AD HOC AND SENSOR NETWORKS 1 Threat Modelling. Chivers, Olwen Worthington and Pankaj Rohatgi Abstract-- This paper introduces a threat model for ad hoc and mobile ad hoc networks (MANETS). It identifies threat categories, modes of use, and a variety of threats

  20. Coping with stereotype threat: Denial as an impression management strategy

    E-Print Network [OSTI]

    Von Hippel, W.; Von Hippel, C.; Conway, Leanne; Preacher, K. J.; Schooler, J. W.; Radvansky, G. A.

    2005-01-01T23:59:59.000Z

    , Ferguson, Brooks, & Hagadone, 2004), suggest- ing that one manner of coping with stereotype threat is by using humor to reinterpret the situation as a challenge rather than a threat (see Kuiper, Martin, & Olinger, 1993). Stereotype threat has also been...

  1. An Intelligent Threat Prevention Framework with Heterogeneous Information

    E-Print Network [OSTI]

    Liu, Weiru

    An Intelligent Threat Prevention Framework with Heterogeneous Information Wenjun Ma 1 and Weiru Liu 1 Abstract. Three issues usually are associated with threat prevention intelligent surveillance, the de- mand of effectively predicting suspects' intention and ranking the potential threats posed

  2. How to determine threat probabilities using ontologies and Bayesian networks

    E-Print Network [OSTI]

    How to determine threat probabilities using ontologies and Bayesian networks [Extended Abstract Business Austria Vienna, Austria neubauer@securityresearch.ac.at ABSTRACT The subjective threat probability- and Bayesian-based approach for determining asset-specific and comprehensible threat probabilities

  3. Constructing Ionospheric Irregularity Threat Model for Korean SBAS

    E-Print Network [OSTI]

    Stanford University

    Constructing Ionospheric Irregularity Threat Model for Korean SBAS Eugene Bang, Jinsil Lee Points (IGPs). Using an ionospheric irregularity undersampled threat model, the integrity bounds, called Grid Ionospheric Vertical Errors (GIVEs), must be augmented to bound ionospheric irregularity threats

  4. Revised: 12.23.2013 Bb 9(SP13): Customizing the Instructor's View of the Grade Center p. 1 of 7 This document covers features in the Grade Center that helps an instructor to manage the grade

    E-Print Network [OSTI]

    Qiu, Weigang

    This document covers features in the Grade Center that helps an instructor to manage the grade columns Center documents for more information about managing the Grade Center. Renaming Columns You can change in the Grade Center table. The document includes the following topics: Renaming Columns Rearranging Columns

  5. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    SciTech Connect (OSTI)

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2008-05-29T23:59:59.000Z

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  6. Autonomous Realtime Threat-Hunting Robot (ARTHR)

    ScienceCinema (OSTI)

    Idaho National Laboratory - David Bruemmer, Curtis Nielsen

    2010-01-08T23:59:59.000Z

    Idaho National Laboratory researchers developed an intelligent plug-and-play robot payload that transforms commercial robots into effective first responders for deadly chemical, radiological and explosive threats. To learn more, visit

  7. The rise of "china threat" arguments

    E-Print Network [OSTI]

    Ueki, Chikako

    2006-01-01T23:59:59.000Z

    The study seeks to explain the rise of "China threat" arguments in the United States and Japan in the 1990s by using three theories of states behavior- realism, organization theory, and democratic peace theory. The rise ...

  8. Bio-Terrorism Threat and Casualty Prevention

    SciTech Connect (OSTI)

    NOEL,WILLIAM P.

    2000-01-01T23:59:59.000Z

    The bio-terrorism threat has become the ''poor man's'' nuclear weapon. The ease of manufacture and dissemination has allowed an organization with only rudimentary skills and equipment to pose a significant threat with high consequences. This report will analyze some of the most likely agents that would be used, the ease of manufacture, the ease of dissemination and what characteristics of the public health response that are particularly important to the successful characterization of a high consequence event to prevent excessive causalities.

  9. An Information Fusion Framework for Threat Assessment

    SciTech Connect (OSTI)

    Beaver, Justin M [ORNL; Kerekes, Ryan A [ORNL; Treadwell, Jim N [ORNL

    2009-01-01T23:59:59.000Z

    Modern enterprises are becoming increasingly sensitive to the potential destructive power of small groups or individuals with malicious intent. In response, significant investments are being made in developing a means to assess the likelihood of certain threats to their enterprises. Threat assessment needs are typically focused in very specific application areas where current processes rely heavily on human analysis to both combine any available data and draw conclusions about the probability of a threat. A generic approach to threat assessment is proposed, including a threat taxonomy and decision-level information fusion framework, that provides a computational means for merging multi-modal data for the purpose of assessing the presence of a threat. The framework is designed for flexibility, and intentionally accounts for the accuracy of each data source, given the environmental conditions, in order to manage the uncertainty associated with any acquired data. The taxonomy and information fusion framework is described, and discussed in the context of real-world applications such as shipping container security and cyber security.

  10. An Approach to Security Policy Configuration Using Semantic Threat Graphs

    E-Print Network [OSTI]

    Foley, Simon

    An Approach to Security Policy Configuration Using Semantic Threat Graphs Simon N. Foley, in turn, unnecessarily expose the enterprise to known threats. This paper pro- poses a threat management- nomic configuration of security mechanisms. This knowledge is mod- eled in terms of Semantic Threat

  11. Invited Paper New Frontiers of Network Security: The Threat Within

    E-Print Network [OSTI]

    Sanyal, Sugata

    Invited Paper New Frontiers of Network Security: The Threat Within Sugata Sanyal1 , Ajit Shelat2% of information security threats originate from inside the organization. The instances of insider threats have. The Insider threats are generally caused by current or ex-employees, contractors or partners, who have

  12. Multi-threat Containment with Dynamic Wireless Neighborhood Networks

    E-Print Network [OSTI]

    Jay Yang, Shanchieh

    Multi-threat Containment with Dynamic Wireless Neighborhood Networks Nathan A. Ransoma teams to solve a multi-threat containment problem. The multi-threat containment problem has the robot teams surround a number of threats that may occur randomly. Approaches with and without utilizing

  13. Safeguards Evaluation Method for evaluating vulnerability to insider threats

    SciTech Connect (OSTI)

    Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

    1986-01-01T23:59:59.000Z

    As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation.

  14. Running head: STEREOTYPE THREAT IN OLDER ADULTS 1 Stereotype threat can enhance, as well as impair, older adults' memory

    E-Print Network [OSTI]

    Mather, Mara

    Running head: STEREOTYPE THREAT IN OLDER ADULTS 1 Stereotype threat can enhance, as well as impair, and Rico Velasco for research assistance and to Dr. Tom Hess for providing us with the stereotype threat for publication. #12;STEREOTYPE THREAT IN OLDER ADULTS 2 Abstract (150) Negative stereotypes about aging can

  15. Satellite Threat Warning and Attack Reporting

    SciTech Connect (OSTI)

    Hilland, D. [Kirkland AFB, NM (United States). Air Force Research Lab.; Phipps, G. [Sandia National Labs., Albuquerque, NM (United States). Optics & Technologies Dept.; Jingle, C.; Newton, G. [Schafer Corp., Albuquerque, NM (United States)

    1997-12-31T23:59:59.000Z

    The Air Force Research Laboratory`s Satellite Threat Warning and Attack Reporting (STW/AR) program will provide technologies for advanced threat warning and reporting of radio frequency (RF) and laser threats. The STW/AR program objectives are: (a) develop cost- effective technologies to detect, identify, locate, characterize, and report attacks or interference against U.S. and Allied satellites. (b) demonstrate innovative, light-weight, low-power, laser and RF sensors. The program focuses on the demonstration of RF and laser sensors. The RF sensor effort includes the investigation of interferometric antenna arrays, multi-arm spiral and butler matrix antennas, wideband receivers, adaptive processors, and improved processing algorithms. The laser sensor effort includes the investigation of alternative detectors, broadband grating and optical designs, active pixel sensing, and improved processing algorithms.

  16. INCOMING DOCUMENT CONTROL FORM DOCUMENT DESCRIPTION ORGANIZATIO

    Office of Legacy Management (LM)

    INCOMING DOCUMENT CONTROL FORM DOCUMENT DESCRIPTION ORGANIZATIO )ATE COMPLETED: ACTION NUMBER: I I I DOCUMENT CONTROL DATE INITIALS DATA BASE: ACTION LOG: FILED: To : Doug...

  17. Unauthorized Collaboration on Facebook: Threats and Responses

    E-Print Network [OSTI]

    McQuade, D. Tyler

    Unauthorized Collaboration on Facebook: Threats and Responses Recent events at FSU have uncovered and collaboration. The Problem: When students, faculty, and staff join Facebook using a valid FSU email address this and believe it is affiliated with or endorsed by Florida State University. Facebook also allows students

  18. Global Warming: The Threat to the Planet*

    E-Print Network [OSTI]

    Hansen, James E.

    Global Warming: The Threat to the Planet* Jim Hansen 17 April 2007 2007 Leo Szilard Lecture. Graham Red Squirrel #12;Survival of Species 1. "Business-as-Usual" Scenario - Global Warming ~ 3ºC - Likely Extinctions ~ 50 percent 2. "Alternative" Scenario - Global Warming ~ 1ºC - Likely Extinctions

  19. More Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLove Your1 SECTIONES2008-54174More Documents More Documents

  20. Creation Date: May 7, 2013 Version: 1 Edited by: SR Client Services ITS Managed Document

    E-Print Network [OSTI]

    Northern British Columbia, University of

    Creation Date: May 7, 2013 Version: 1 Edited by: SR Client Services ITS Managed Document VIEW Client Services ITS Managed Document VIEW CLIENT INSTALLATION - MAC Page 2 When prompted with the End Edited by: SR Client Services ITS Managed Document VIEW CLIENT INSTALLATION - MAC Page 3 In Launchpad

  1. Creation Date: Feb 2014 Version: 1 Edited by: LB Application Services ITS Managed Document

    E-Print Network [OSTI]

    Northern British Columbia, University of

    Creation Date: Feb 2014 Version: 1 Edited by: LB Application Services ITS Managed Document VIEW: LB Application Services ITS Managed Document VIEW CLIENT INSTALLATION - MICROSOFT FEB 2014 STUDENT Managed Document VIEW CLIENT INSTALLATION - MICROSOFT FEB 2014 STUDENT Page 3 Virtual Desktop Login

  2. Creation Date: Mar 2014 Version: 1 Edited by: LB Application Services ITS Managed Document

    E-Print Network [OSTI]

    Northern British Columbia, University of

    Creation Date: Mar 2014 Version: 1 Edited by: LB Application Services ITS Managed Document VIEW Date: Mar 2014 Version: 1 Edited by: LB Application Services ITS Managed Document VIEW CLIENT Date: Mar 2014 Version: 1 Edited by: LB Application Services ITS Managed Document VIEW CLIENT

  3. Insider Threat - Material Control and Accountability Mitigation (Presentation)

    SciTech Connect (OSTI)

    Powell, Danny H [ORNL] [ORNL; Elwood Jr, Robert H [ORNL] [ORNL

    2011-01-01T23:59:59.000Z

    Why is the insider a concern? There are many documented cases of nuclear material available for sale - there are more insider diversions than outsider attacks and more than 18 documented cases of theft or loss of plutonium or highly enriched uranium. Insider attributes are: have access, has authority, possesses knowledge, works with absence of timeline, can test system, and may act alone or support a team. Material control and accountability (MC&A) is an essential part of an integrated safeguards system. Objectives of MC&A are: (1) Ongoing confirmation of the presence of special nuclear material (SNM) in assigned locations; (2) Prompt investigation of anomalies that may indicate a loss of SNM; (3) Timely and localized detection of loss, diversion, or theft of a goal quantity; (4) Rapid assessment and response to detection alarms; and (5) Timely generation of information to aid in the recovery of SNM in the event of an actual loss, diversion, or theft from the purview of the MC&A system. Control and accountability of material, equipment, and data are essential to minimizing insider threats.

  4. Honors Enrichment Contracts Faculty View Page 1 Honors Enrichment Contracts Faculty View

    E-Print Network [OSTI]

    Honors Enrichment Contracts ­ Faculty View Page 1 Honors Enrichment Contracts ­ Faculty View INITIAL APPROVAL #12;Honors Enrichment Contracts ­ Faculty View Page 2 Summary This document contains information about how to make initial and final decisions on Honors Enrichment Contracts submitted by honors

  5. Introduction to Administrative Programs that Mitigate the Insider Threat

    SciTech Connect (OSTI)

    Gerke, Gretchen K.; Rogers, Erin; Landers, John; DeCastro, Kara

    2012-09-01T23:59:59.000Z

    This presentation begins with the reality of the insider threat, then elaborates on these tools to mitigate the insider threat: Human Reliability Program (HRP); Nuclear Security Culture (NSC) Program; Employee Assistance Program (EAP).

  6. A Risk Management Approach to the 'Insider Threat'

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    Insider Threat” [Gel05] Mike Gelles. Exploring the mind ofL. Krofcheck and Mike G. Gelles. Behavioral consultation in

  7. The same, only different: Threat management systems as homologues in the tree of life

    E-Print Network [OSTI]

    Holbrook, Colin; Fessler, Daniel M.T.

    2015-01-01T23:59:59.000Z

    T. , & ,Quirin, M. (2014). Threat and defense: From anxietyto manage uncertainty and threat associated with politicalD.M.T. (2013). Sizing up the threat: The envisioned physical

  8. Reducing Stereotype Threat in Academically At-Risk African-Americans Students: A Self-

    E-Print Network [OSTI]

    Simmons, Crystal Marie

    2011-01-01T23:59:59.000Z

    the effects of stereotype threat on African American collegeThe role of stereotype threat. Psychological Science, 12,and  White:  Stereotype  threat and the  race  gap  on  

  9. The Chronicles of Grokster: Who is the Biggest Threat in the P2P Battle?

    E-Print Network [OSTI]

    Chan, Alvin

    2008-01-01T23:59:59.000Z

    Groksten Who is the Biggest Threat in the P2P Battle? Alvininvariably identify a different threat as marginalizing itsnently identifiable threats are perhaps not as hazardous as

  10. Stereotype Threat in Organizations: An Examination of its Scope, Triggers, and Possible Interventions

    E-Print Network [OSTI]

    Kray, Laura J.; Shirako, Aiwa

    2009-01-01T23:59:59.000Z

    and social identity threat. Advances in Experimental Socialmen triggers social identity threat among female engineers.C. (2007). Stereotype threat at work. Academy of Management

  11. The Threat from Within: American Jews, the State of Israel, and Intermarriage

    E-Print Network [OSTI]

    Minkin, Sarah Anne

    2011-01-01T23:59:59.000Z

    and Nation. Sage Publications. Minkin, Threat from Within14, 2: 32-6. Minkin, Threat from Within Eisen, Arnold. 1986.Brandeis University Press. Minkin, Threat from Within Sarna,

  12. Minimizing the threat of pandemic emergence from avian influenza in poultry systems

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    Open Access Minimizing the threat of pandemic emergence fromY: The continued pandemic threat posed by avian influenzaet al. : Minimizing the threat of pandemic emergence from

  13. A Policy of Stereotype Threat: The Intergroup Impact of Policing Stereotypes

    E-Print Network [OSTI]

    Epstein, Liana Maris

    2012-01-01T23:59:59.000Z

    J. (1995). Stereotype threat and the intellectual testC. L. (2002). The role of threats in intergroup relations.factors in stereotype threat. Journal of Experimental Social

  14. EPR Severe Accident Threats and Mitigation

    SciTech Connect (OSTI)

    Azarian, G. [Framatome ANP SAS, Tour Areva, Place de la Coupole 92084 Paris la Defense (France); Kursawe, H.M.; Nie, M.; Fischer, M.; Eyink, J. [Framatome ANP GmbH, Freyeslebenstrasse, 1, D-91058 Erlangen (Germany); Stoudt, R.H. [Framatome ANP Inc. - 3315 Old Forest Rd, Lynchburgh, VA 24501 (United States)

    2004-07-01T23:59:59.000Z

    Despite the extremely low EPR core melt frequency, an improved defence-in-depth approach is applied in order to comply with the EPR safety target: no stringent countermeasures should be necessary outside the immediate plant vicinity like evacuation, relocation or food control other than the first harvest in case of a severe accident. Design provisions eliminate energetic events and maintain the containment integrity and leak-tightness during the entire course of the accident. Based on scenarios that cover a broad range of physical phenomena and which provide a sound envelope of boundary conditions associated with each containment challenge, a selection of representative loads has been done, for which mitigation measures have to cope with. This paper presents the main critical threats and the approach used to mitigate those threats. (authors)

  15. Securing Infrastructure from High Explosive Threats

    SciTech Connect (OSTI)

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20T23:59:59.000Z

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  16. Documenting Spreadsheets

    E-Print Network [OSTI]

    Payette, Raymond

    2008-01-01T23:59:59.000Z

    This paper discusses spreadsheets documentation and new means to achieve this end by using Excel's built-in "Comment" function. By structuring comments, they can be used as an essential tool to fully explain spreadsheet. This will greatly facilitate spreadsheet change control, risk management and auditing. It will fill a crucial gap in corporate governance by adding essential information that can be managed in order to satisfy internal controls and accountability standards.

  17. Predictors of Threat and Error Management: Identification of Core

    E-Print Network [OSTI]

    Predictors of Threat and Error Management: Identification of Core Nontechnical Skills In normal flight operations, crews are faced with a variety of external threats and commit a range of errors of these threats and errors therefore forms an essential element of enhancing performance and minimizing risk

  18. INFLATABLE PLUG FOR THREAT MITIGATION IN TRANSPORTATION TUNNELS

    E-Print Network [OSTI]

    Barbero, Ever J.

    INFLATABLE PLUG FOR THREAT MITIGATION IN TRANSPORTATION TUNNELS Xavier Martinez1 , Julio Davalos2 and government entities. Fires, noxious fumes, deadly gasses, and flooding threats have occurred in major are of difficult and limited accessibility, but also because most of the potential threats, such as fires, flooding

  19. BOMB THREAT PLACE THIS CARD UNDER YOUR TELEPHONE

    E-Print Network [OSTI]

    Slatton, Clint

    BOMB THREAT PLACE THIS CARD UNDER YOUR TELEPHONE QUESTIONS TO ASK: 1. When is the bomb going? EXACT WORDING OF THE THREAT: Sex of caller: Race: Age: Number at which call received: Length of call: Check Caller ID - *69: Record caller's number: Time: Date: IMMEDIATELY REPORT BOMB THREATS TO

  20. THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS

    E-Print Network [OSTI]

    THREAT-DRIVEN ARCHITECTURAL DESIGN OF SECURE INFORMATION SYSTEMS Joshua Pauli College of Business.xu@ndsu.nodak.edu Keywords: Software architecture, Security, Threat model, Use case, Misuse case, UML Abstract: To deal with software security issues in the early stages of system development, this paper presents a threat- driven

  1. Insider Threat Detection using Stream Mining and Graph Mining

    E-Print Network [OSTI]

    Hamlen, Kevin W.

    Insider Threat Detection using Stream Mining and Graph Mining Pallabi Parveen, Jonathan Evans threats who attempt to conceal their activities by varying their behaviors over time. This paper applies of insider threat detection, demonstrating that the ensemble-based approach is significantly more effective

  2. FACTS about threat Possible INTERVENTIONS Strong domain identification

    E-Print Network [OSTI]

    Chisholm, Rex L.

    FACTS about threat Possible INTERVENTIONS Strong domain identification heightens the effect are able to self affirm in difficult situations can lessen the effects of threat. Encourage students to use to students not under threat. Educate students on self talk! Teach them to pay close attention

  3. Security Threat Mitigation Trends in Low-cost RFID Systems

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Security Threat Mitigation Trends in Low-cost RFID Systems Joaquin Garcia-Alfaro1,2 , Michel of security threat mitigation mecha- nisms in RFID systems, specially in low-cost RFID tags, are gaining great. Cryptography is a key tool to address these threats. Nevertheless, strong hardware constraints

  4. Maritime Threat Detection Using Probabilistic Graphical Models Bryan Auslander1

    E-Print Network [OSTI]

    Gupta, Kalyan Moy

    Maritime Threat Detection Using Probabilistic Graphical Models Bryan Auslander1 , Kalyan Moy Gupta1.lastname@knexusresearch.com | david.aha@nrl.navy.mil Abstract Maritime threat detection is a challenging problem because maritime them on a threat recognition task using track data obtained from force protection naval exercises

  5. Pervasive competition between threat and reward in the brain

    E-Print Network [OSTI]

    Pessoa, Luiz

    Pervasive competition between threat and reward in the brain Jong Moon Choi, Srikanth Padmala, USA In the current functional MRI study, we investigated interactions between reward and threat to the salience hypothesis, in the condition involving both reward and threat, enhanced activation would

  6. Maritime Threat Detection using Plan Recognition Bryan Auslander1

    E-Print Network [OSTI]

    Gupta, Kalyan Moy

    Maritime Threat Detection using Plan Recognition Bryan Auslander1 , Kalyan Moy Gupta1 , & David W algorithms for maritime threat detection employ a variety of normalcy models that are probabilistic and for threat detection. We compare their performance with a behavior recognition algorithm on simulated

  7. Ionosphere Threat to LAAS: Updated Model, User Impact, and Mitigations

    E-Print Network [OSTI]

    Stanford University

    1 Ionosphere Threat to LAAS: Updated Model, User Impact, and Mitigations Ming Luo, Sam Pullen-4], a "linear spatial gradient front" model was established and a threat space was extrapolated based on data from the 6 April 2000 ionospheric storm. User vertical error was estimated based on this threat model

  8. Decentralized Semantic Threat Graphs Simon N. Foley1

    E-Print Network [OSTI]

    Foley, Simon

    Decentralized Semantic Threat Graphs Simon N. Foley1 William M. Fitzgerald1 Cork Constraint.foley@cs.ucc.ie wfitzgerald@4c.ucc.ie Abstract. Threat knowledge-bases such as those maintained by MITRE and NIST provide a basis with which to mitigate known threats to an enterprise. These centralised knowledge-bases assume

  9. Joshua Rosenthol, CISSP Trends in the Threat Landscape

    E-Print Network [OSTI]

    Joshua Rosenthol, CISSP Trends in the Threat Landscape #12;2 Year in Review Data Theft Targeted-virus, firewalls, and intrusion prevention) are only effective against 30-50% of current security threats. Moreover, customers expect the effectiveness of signature-based security to continue to decline rapidly. IDC Threat

  10. Internet Security Systems, an IBM Company Threat Insight Monthly

    E-Print Network [OSTI]

    Internet Security Systems, an IBM Company X-Force ® Threat Insight Monthly www . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Contents www.iss.netwww.iss.net Internet Security Systems, an IBM Company X-Force Threat Insight Monthly April 2007 #12;X-Force® Threat Insight Monthly > April 2007 www.iss.netwww.iss.net About

  11. Nonproliferation, Nuclear Security, and the Insider Threat

    SciTech Connect (OSTI)

    Balatsky, Galya I. [Los Alamos National Laboratory; Duggan, Ruth [SNL

    2012-07-12T23:59:59.000Z

    Insider threat concept is evolving and getting more attention: (1) Domestically, internationally and in foreign countries, (2) At the government, academia, and industry levels, and (3) Public awareness and concerns are also growing. Negligence can be an insider's action. Technology advancements provide more opportunities, new tools for the insider. Our understanding of the insider is shaped by our cultural, social and ethnic perceptions and traditions. They also can limit our recognition of the issues and response actions.

  12. Radiological Threat Reduction | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Radiation Protection Regulations:Radiological Threat Reduction SHARE

  13. Document13

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisitingContract ManagementDiscovering How Muscles ReallyDDT DDTViewDoDocument

  14. Reference Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection RadiationRecord-SettingHead ofReference-Documents Sign In About |

  15. Document Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField Campaign:INEA : Papers69 Federal Register / Vol. 71, No.5 Document

  16. Exposure Levels for Chemical Threat Compounds; Information to Facilitate Chemical Incident Response

    SciTech Connect (OSTI)

    Hauschild, Veronique [U.S. Army Public Health Command] [U.S. Army Public Health Command; Watson, Annetta Paule [ORNL] [ORNL

    2013-01-01T23:59:59.000Z

    Exposure Standards, Limits and Guidelines for Chemical Threat Compunds ABSTRACT Exposure criteria for chemical warfare (CW) agents and certain toxic industrial chemicals (TICs) used as CW agents (such as chlorine fill in an improvised explosive device) have been developed for protection of the civilian general public, civilian employees in chemical agent processing facilities and deployed military populations. In addition, compound-specific concentrations have been developed to serve as how clean is clean enough clearance criteria guiding facility recovery following chemical terrorist or other hazardous release events. Such criteria are also useful to verify compound absence, identify containment boundaries and expedite facility recovery following chemical threat release. There is no single right value or concentration appropriate for all chemical hazard control applications. It is acknowledged that locating and comparing the many sources of CW agent and TIC exposure criteria has not been previously well-defined. This paper summarizes many of these estimates and assembles critical documentation regarding their derivation and use.

  17. Review of July 2013 Nuclear Security Insider Threat Exercise November 2013

    SciTech Connect (OSTI)

    Pederson, Ann C. [ORNL] [ORNL; Snow, Catherine L. [ORNL] [ORNL; Townsend, Jeremy [ORNL] [ORNL; Shannon, Michael [ORNL] [ORNL

    2013-11-01T23:59:59.000Z

    This document is a review of the Nuclear Security Insider Threat Exercise which was hosted at ORNL in July 2013. Nuclear security culture and the insider threat are best learned through experience. Culture is inherently difficult to teach, and as such is best learned through modeled behaviors and learning exercise. This TTX, NSITE, is a tool that strives to aid students in learning what an effective (and ineffective) nuclear security culture might look like by simulating dynamic events that strengthen or weaken the nuclear security regime. The goals of NSITE are to stimulate complex thought and discussion and assist decision makers and management in determining the most effective policies and procedures for their country or facility.

  18. Threat Analysis Framework | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011 Strategic2Uranium Transferon theTed Donat AboutTheDepartment ofEarlyThreat Analysis

  19. Deterring regional threats from nuclear proliferation

    SciTech Connect (OSTI)

    Spector, L.S.

    1992-03-12T23:59:59.000Z

    The most prominent shift in the National Military Strategy is from the global Soviet threat to a new focus on regional contingencies. No threat looms larger in these contingencies than the proliferation of nuclear weapons and ballistic missiles. This study examines proliferation trends and proposes a predominately diplomatic strategy for containing the problem. Dr. Spector identifies three waves of proliferation: the first is the five states with declared weapons and doctrine-the United States, Russia, Great Britain, France, and China; the second includes a less visible group that developed a covert capability, without testing weapons or declaring a doctrine of deterrence-for example, Israel, India, and probably Pakistan; and, a third wave of would-be proliferators includes radical states like Iraq, Iran, Libya, and North Korea. Spector's political approach is based on the common interest of wave one and two states to prevent further proliferation. Political-economic incentives have already worked in the cases of Brazil, Argentina, Taiwan, and South Africa-states which appear to have abandoned their nuclear weapons programs. Spector does not rule out the option of military force. Force, especially under international sanctions, can be a powerful tool to back diplomatic efforts. Use of force, however, remains a last resort.

  20. Plans, Updates, Regulatory Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Stewardship Environmental Protection Obeying Environmental Laws Individual Permit Documents Individual Permit: Plans, Updates, Regulatory Documents1335769200000Plans...

  1. XML Document XML Document Types and Validation

    E-Print Network [OSTI]

    Weber, Gregory D.

    XML Document Types and Validation IIM-I340 Objectives XML Document Types and Validation IIM-I340 April, 2010 #12;XML Document Types and Validation IIM-I340 Objectives Learning Objectives Understand: The need for validation Two ways to specify validity: Document Type Definitions (DTDs) XML Schemas #12;XML

  2. NNSA's Global Threat Reduction Initiative launches mobile app...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Press Releases Video Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home NNSA Blog NNSA's Global Threat Reduction Initiative launches mobile app...

  3. NNSA's Global Threat Reduction Initiative Removes More Than One...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Press Releases Video Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home NNSA Blog NNSA's Global Threat Reduction Initiative Removes More ......

  4. Mitigating the Insider Threat Using Behavioral Science Workshop

    SciTech Connect (OSTI)

    Landers, John; De Castro, Kara

    2012-11-26T23:59:59.000Z

    PowerPoint presentations are included on: the Insider Threat; Detecting the Malicious Insider through Behavioral Science; and Psychological Barriers to Effective Nuclear Security.

  5. ORISE: Securing the Golden State from threats foreign and domestic

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Securing the Golden State from threats foreign and domestic ORISE helps California emergency planners with innovative training on state and local levels To protect the state of...

  6. Omega documentation

    SciTech Connect (OSTI)

    Howerton, R.J.; Dye, R.E.; Giles, P.C.; Kimlinger, J.R.; Perkins, S.T.; Plechaty, E.F.

    1983-08-01T23:59:59.000Z

    OMEGA is a CRAY I computer program that controls nine codes used by LLNL Physical Data Group for: 1) updating the libraries of evaluated data maintained by the group (UPDATE); 2) calculating average values of energy deposited in secondary particles and residual nuclei (ENDEP); 3) checking the libraries for internal consistency, especially for energy conservation (GAMCHK); 4) producing listings, indexes and plots of the library data (UTILITY); 5) producing calculational constants such as group averaged cross sections and transfer matrices for diffusion and Sn transport codes (CLYDE); 6) producing and updating standard files of the calculational constants used by LLNL Sn and diffusion transport codes (NDFL); 7) producing calculational constants for Monte Carlo transport codes that use group-averaged cross sections and continuous energy for particles (CTART); 8) producing and updating standard files used by the LLNL Monte Carlo transport codes (TRTL); and 9) producing standard files used by the LANL pointwise Monte Carlo transport code MCNP (MCPOINT). The first four of these functions and codes deal with the libraries of evaluated data and the last five with various aspects of producing calculational constants for use by transport codes. In 1970 a series, called PD memos, of internal and informal memoranda was begun. These were intended to be circulated among the group for comment and then to provide documentation for later reference whenever questions arose about the subject matter of the memos. They have served this purpose and now will be drawn upon as source material for this more comprehensive report that deals with most of the matters covered in those memos.

  7. Threats from space: 20 years of progress

    E-Print Network [OSTI]

    Remo, J L

    2014-01-01T23:59:59.000Z

    It has been 20 years since planning began for the 1995 United Nations International Conference on Near-Earth Objects. The conference proceedings established the scientific basis for an international organizational framework to support research and collective actions to mitigate a potential near-Earth object (NEO) threat to the planet. Since that time, researchers have conducted telescope surveys that should, within the coming decade, answer many questions about the size, number, and Earth impact probability of these objects. Space explorations to asteroids and comets have been successfully carried out, including sample recovery. Laboratory experiments and computer simulations at Sandia National Laboratories have analyzed the effects of soft X-ray radiation on meteorites - which might help researchers develop a way to redirect an incoming asteroid by vaporizing a thin layer of its surface. An Action Team on NEOs, established in 2001 in response to recommendations of the Third United Nations Conference on the E...

  8. Management of Security Policy Configuration using a Semantic Threat Graph Approach

    E-Print Network [OSTI]

    Foley, Simon

    Management of Security Policy Configuration using a Semantic Threat Graph Approach Simon N. Foley, in turn, unnec- essarily expose the enterprise to known threats. This paper proposes a threat management Threat Graphs, a variation of the tradi- tional Threat/Attack Tree, extended in order to relate semantic

  9. Research Data Management - Documentation

    E-Print Network [OSTI]

    Collins, Anna

    2013-01-01T23:59:59.000Z

    This short (16 slide) presentation "Documentation" explains the need to create documentation using several clear examples of the benefits from good documentation (and what can happen if it is not good), making research reproducible...

  10. Defined: There is some credible general threat information that may affect the University. Examples include an FBI alert of a threat directed at a college

    E-Print Network [OSTI]

    Rose, Annkatrin

    Defined: There is some credible general threat information that may affect the University. Examples include an FBI alert of a threat directed at a college campus in North Carolina, or a hurricane warning information about a specific threat directed towards the University. May involve a man-made threat, or flash

  11. Superluminous supernovae: No threat from Eta Carinae

    E-Print Network [OSTI]

    Brian C. Thomas; Adrian L. Melott; Brian D. Fields; Barbara J. Anthony-Twarog

    2007-09-25T23:59:59.000Z

    Recently Supernova 2006gy was noted as the most luminous ever recorded, with a total radiated energy of ~10^44 Joules. It was proposed that the progenitor may have been a massive evolved star similar to eta Carinae, which resides in our own galaxy at a distance of about 2.3 kpc. eta Carinae appears ready to detonate. Although it is too distant to pose a serious threat as a normal supernova, and given its rotation axis is unlikely to produce a Gamma-Ray Burst oriented toward the Earth, eta Carinae is about 30,000 times nearer than 2006gy, and we re-evaluate it as a potential superluminous supernova. We find that given the large ratio of emission in the optical to the X-ray, atmospheric effects are negligible. Ionization of the atmosphere and concomitant ozone depletion are unlikely to be important. Any cosmic ray effects should be spread out over ~10^4 y, and similarly unlikely to produce any serious perturbation to the biosphere. We also discuss a new possible effect of supernovae, endocrine disruption induced by blue light near the peak of the optical spectrum. This is a possibility for nearby supernovae at distances too large to be considered "dangerous" for other reasons. However, due to reddening and extinction by the interstellar medium, eta Carinae is unlikely to trigger such effects to any significant degree.

  12. Sandia Energy - SCADA Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Documents Home Stationary Power Grid Modernization Cyber Security for Electric Infrastructure National Supervisory Control and Data Acquisition (SCADA) SCADA Documents SCADA...

  13. Technosocial Modeling of IED Threat Scenarios and Attacks

    SciTech Connect (OSTI)

    Whitney, Paul D.; Brothers, Alan J.; Coles, Garill A.; Young, Jonathan; Wolf, Katherine E.; Thompson, Sandra E.; Niesen, David A.; Madsen, John M.; Henderson, Cynthia L.

    2009-03-23T23:59:59.000Z

    This paper describes an approach for integrating sociological and technical models to develop more complete threat assessment. Current approaches to analyzing and addressing threats tend to focus on the technical factors. This paper addresses development of predictive models that encompass behavioral as well as these technical factors. Using improvised explosive device (IED) attacks as motivation, this model supports identification of intervention activities 'left of boom' as well as prioritizing attack modalities. We show how Bayes nets integrate social factors associated with IED attacks into general threat model containing technical and organizational steps from planning through obtaining the IED to initiation of the attack. The social models are computationally-based representations of relevant social science literature that describes human decision making and physical factors. When combined with technical models, the resulting model provides improved knowledge integration into threat assessment for monitoring. This paper discusses the construction of IED threat scenarios, integration of diverse factors into an analytical framework for threat assessment, indicator identification for future threats, and future research directions.

  14. THE VISUAL CUES USED BY THE LEMON PEEL ANGELFISH (CENTROPYGE FLAVISSIMA) TO DETERMINE THREAT

    E-Print Network [OSTI]

    Post, Jessica

    2012-01-01T23:59:59.000Z

    FLAVISSIMA) TO DETERMINE THREAT JESSICA   POST Integrative be used by fish to assess threat, and indicate when it is were  important in assessing threat.   Multiple cues were 

  15. Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security

    E-Print Network [OSTI]

    Abi-Antoun, Marwan

    Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security Marwan Abi Science Carnegie Mellon University Pittsburgh, PA 15213 Center for Software Excellence Abstract Threat Foundation. #12;Keywords: Threat modeling, data flow diagrams, reflexion models, architecture-level security

  16. Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security

    E-Print Network [OSTI]

    Checking Threat Modeling Data Flow Diagrams for Implementation Conformance and Security Marwan Abi Science Carnegie Mellon University Pittsburgh, PA 15213 # Center for Software Excellence Abstract Threat Foundation. #12; Keywords: Threat modeling, data flow diagrams, reflexion models, architecture­level security

  17. Tilting at Modern: Elizabeth Gordon's "The Threat to the Next America"

    E-Print Network [OSTI]

    Corbett, Kathleen LaMoine

    2010-01-01T23:59:59.000Z

    philosophy Gordon, ?The Threat to the Next America,?129.Advertisement for “The Threat to the Next America,” Business121. Figure 27. “The Threat to the Next America” carried a

  18. Threat Facilitates Subsequent Executive Control During Anxious Mood Jeffrey L. Birk

    E-Print Network [OSTI]

    Patel, Aniruddh D.

    Threat Facilitates Subsequent Executive Control During Anxious Mood Jeffrey L. Birk Tufts) posits that low-level threat may facilitate behavioral performance by influencing executive control functions. Anxiety is thought to strengthen this effect by enhancing threat's affective significance

  19. Human Bed Nucleus of the Stria Terminalis Indexes Hypervigilant Threat Monitoring

    E-Print Network [OSTI]

    Whalen, Paul J.

    Human Bed Nucleus of the Stria Terminalis Indexes Hypervigilant Threat Monitoring Leah H disorders is hypervigilant threat monitoring, its biological bases in humans remain poorly understood. Animal models suggest that anxious processes such as hypervigilant threat monitoring are distinct from

  20. Supporting Document Strategic Plan

    E-Print Network [OSTI]

    Auckland, University of

    1 Supporting Document Strategic Plan 2013­2020 #12;2 Supporting Document Strategic Plan 2013 more critical to the University's future than was the case in 2005. The purpose of this document are summarised via a SWOT analysis in Appendix 1. This document should therefore be read in conjunction

  1. A Risk Management Approach to the 'Insider Threat'

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    Dir90] [DOD08] [FK92] A Risk Management Approach to the “A Risk Management Approach to the “Insider Threat” Mattgleep” is useless un- A Risk Management Approach to the “

  2. A Risk Management Approach to the 'Insider Threat'

    E-Print Network [OSTI]

    2010-01-01T23:59:59.000Z

    554–563, October 1992. A Risk Management Approach to the “A Risk Management Approach to the “Insider Threat” Mattgleep” is useless un- A Risk Management Approach to the “

  3. Additive Manufacturing in China: Threats, Opportunities, and Developments (Part I)

    E-Print Network [OSTI]

    ANDERSON, Eric

    2013-01-01T23:59:59.000Z

    application of additive manufacturing in China’s aviationAnalysis May 2013 Additive Manufacturing in China: Threats,an overview of China’s additive manufacturing industry is

  4. Threat assessment design for driver assistance system at intersections

    E-Print Network [OSTI]

    Aoude, Georges

    This paper considers the decision-making problem for a human-driven vehicle crossing a road intersection in the presence of other, potentially errant, drivers. Our approach relies on a novel threat assessment module, which ...

  5. Threat-aware Path Planning in Uncertain Urban Environments

    E-Print Network [OSTI]

    Aoude, Georges

    This paper considers the path planning problem for an autonomous vehicle in an urban environment populated with static obstacles and moving vehicles with uncertain intents. We propose a novel threat assessment module, ...

  6. Will Russian Scientists Go Rogue? A Survey on the Threat and the Impact of Western Assistance

    SciTech Connect (OSTI)

    Ball, D Y; Gerber, T P

    2004-12-27T23:59:59.000Z

    The collapse of the Soviet Union sparked fears throughout the world that rogue nations and terrorist organizations would gain access to weapons of mass destruction (WMD). One specific concern has been 'WMD brain drain.' Russians with knowledge about nuclear, chemical, and biological weapons could now depart to any country of their choice, including rogue nations seeking to produce WMD. Meanwhile, Russian science fell into a protracted crisis, with plummeting salaries, little funding for research, and few new recruits to science. These developments increased both the incentives and the opportunities for scientists to sell their knowledge to governments and terrorist organizations with hostile intentions toward the United States. Recognizing the threat of WMD brain drain from Russia, the United States, and other governments implemented a host of programs designed to reduce the risk. Despite, or perhaps partly because of, massive assistance from the West to prevent scientists with WMD knowledge from emigrating, the threat of Russian WMD brain drain has recently faded from view. Yet we have seen no evidence that these programs are effective and little systematic assessment of the current threat of WMD migration. Our data from an unprecedented survey of 602 Russian physicists, biologists, and chemists suggest that the threat of WMD brain drain from Russia should still be at the forefront of our attention. Roughly 20 percent of Russian physicists, biologists, and chemists say they would consider working in rogue nations such as North Korea, Iran, Syria, or Iraq (still considered a rogue state at the time of the survey). At the same time, the data reveal that U.S. and Western nonproliferation assistance programs work. They significantly reduce the likelihood that Russian scientists would consider working in these countries. Moreover, Russian grants do not reduce scientists' propensity to 'go rogue'. These survey findings have clear policy implications: the U.S. and its allies must continue to adequately fund nonproliferation assistance programs rather than hastily declare victory. The U.S. should remain engaged with former Soviet WMD scientists until they are willing and able to find support for their research from competitive, civilian-oriented, privately funded projects. Otherwise, we run a great risk that WMD expertise will migrate from the former Soviet Union to countries or organizations that harbor hostile intentions toward the U.S. Assistance programs work to reduce the threat of WMD brain drain, but their task is not complete. Now is not the time to pull back.

  7. A Bayesian Belief Network of Threat Anticipation and Terrorist Motivations

    SciTech Connect (OSTI)

    Olama, Mohammed M [ORNL; Allgood, Glenn O [ORNL; Davenport, Kristen M [ORNL; Schryver, Jack C [ORNL

    2010-01-01T23:59:59.000Z

    Recent events highlight the need for efficient tools for anticipating the threat posed by terrorists, whether individual or groups. Antiterrorism includes fostering awareness of potential threats, deterring aggressors, developing security measures, planning for future events, halting an event in process, and ultimately mitigating and managing the consequences of an event. To analyze such components, one must understand various aspects of threat elements like physical assets and their economic and social impacts. To this aim, we developed a three-layer Bayesian belief network (BBN) model that takes into consideration the relative threat of an attack against a particular asset (physical layer) as well as the individual psychology and motivations that would induce a person to either act alone or join a terrorist group and commit terrorist acts (social and economic layers). After researching the many possible motivations to become a terrorist, the main factors are compiled and sorted into categories such as initial and personal indicators, exclusion factors, and predictive behaviors. Assessing such threats requires combining information from disparate data sources most of which involve uncertainties. BBN combines these data in a coherent, analytically defensible, and understandable manner. The developed BBN model takes into consideration the likelihood and consequence of a threat in order to draw inferences about the risk of a terrorist attack so that mitigation efforts can be optimally deployed. The model is constructed using a network engineering process that treats the probability distributions of all the BBN nodes within the broader context of the system development process.

  8. Global Security: Asymmetric Threats The modules in this class introduce transnational, asymmetric threats/warfare, from terror organizations

    E-Print Network [OSTI]

    Rhode Island, University of

    /Global Shipping) 5. Agriculture & Food 6. Water Supplies 7. Telecommunications 8. Chemicals & Hazardous Materials 9. Nuclear & Radiological Materials Module 2 Asymmetric Tactics to Combat Nation States 1, terrorist threats to America's agriculture and food supplies, water telecommunications, chemicals

  9. Prarie View RDF

    Energy Savers [EERE]

    PRAIRIE VIEW RDF 2 Prairie View RDF Located at JAAP (approx. 40 miles southwest of Chicago), 223 acres on 455 Acre Parcel Will County Owner; Waste Management, Operator ...

  10. Detection and Analysis of Threats to the Energy Sector: DATES

    SciTech Connect (OSTI)

    Alfonso Valdes

    2010-03-31T23:59:59.000Z

    This report summarizes Detection and Analysis of Threats to the Energy Sector (DATES), a project sponsored by the United States Department of Energy and performed by a team led by SRI International, with collaboration from Sandia National Laboratories, ArcSight, Inc., and Invensys Process Systems. DATES sought to advance the state of the practice in intrusion detection and situational awareness with respect to cyber attacks in energy systems. This was achieved through adaptation of detection algorithms for process systems as well as development of novel anomaly detection techniques suited for such systems into a detection suite. These detection components, together with third-party commercial security systems, were interfaced with the commercial Security Information Event Management (SIEM) solution from ArcSight. The efficacy of the integrated solution was demonstrated on two testbeds, one based on a Distributed Control System (DCS) from Invensys, and the other based on the Virtual Control System Environment (VCSE) from Sandia. These achievements advance the DOE Cybersecurity Roadmap [DOE2006] goals in the area of security monitoring. The project ran from October 2007 until March 2010, with the final six months focused on experimentation. In the validation phase, team members from SRI and Sandia coupled the two test environments and carried out a number of distributed and cross-site attacks against various points in one or both testbeds. Alert messages from the distributed, heterogeneous detection components were correlated using the ArcSight SIEM platform, providing within-site and cross-site views of the attacks. In particular, the team demonstrated detection and visualization of network zone traversal and denial-of-service attacks. These capabilities were presented to the DistribuTech Conference and Exhibition in March 2010. The project was hampered by interruption of funding due to continuing resolution issues and agreement on cost share for four months in 2008. This resulted in delays in finalizing agreements with commercial partners, and in particular the Invensys testbed was not installed until December 2008 (as opposed to the March 2008 plan). The project resulted in a number of conference presentations and publications, and was well received when presented at industry forums. In spite of some interest on the part of the utility sector, we were unfortunately not able to engage a utility for a full-scale pilot deployment.

  11. September 2013 Most Viewed Documents for Power Generation And...

    Office of Scientific and Technical Information (OSTI)

    Gas Turbine Exhaust Diffuser Norris, Thomas R. (2009) 23 > Dynamic performance and control of a static var generator using cascade multilevel inverters Peng, Fang Zheng...

  12. March 2015 Most Viewed Documents for Power Generation And Distribution...

    Office of Scientific and Technical Information (OSTI)

    Methods for Power Distribution Systems: Final Report Tom McDermott (2010) 67 Frequency Control Concerns in the North American Electric Power System Kirby, B.J. (2003) 64 A...

  13. January 2013 Most Viewed Documents for Environmental Sciences...

    Office of Scientific and Technical Information (OSTI)

    Karlsruhe GmbH, Institut fuer Neutronenphysik und Reaktortechnik, Karlsruhe (Germany) Microbial rehabilitation of soils in the vicinity of former coking plants;...

  14. June 2015 Most Viewed Documents for Biology And Medicine | OSTI...

    Office of Scientific and Technical Information (OSTI)

    Christopher; Keasling, Jay (2011) 59 PRODUCTION OF RADIOACTIVE IODINE. SCHLYER,D.J. (2001) 58 Defining the Effectiveness of UV Lamps Installed in Circulating Air Ductwork...

  15. July 2013 Most Viewed Documents for Mathematics And Computing...

    Office of Scientific and Technical Information (OSTI)

    implementation and theory More, J.J. (1977) 38 > The Effects of Nuclear Weapons Glasstone, Samuel (1964) 35 > Understanding seismic design criteria for Japanese nuclear...

  16. July 2013 Most Viewed Documents for Fission And Nuclear Technologies...

    Office of Scientific and Technical Information (OSTI)

    waste Ashley, C. (1970) 39 > 1965 audit of SRP radioactive waste Ashley, C. (1966) 39 > Case studies of sealing methods and materials used in the salt and potash mining...

  17. September 2013 Most Viewed Documents for Renewable Energy Sources...

    Office of Scientific and Technical Information (OSTI)

    NM (United States). Photovoltaic System Components Dept. (1997) 33 > European Geothermal Drilling Experience-Problem Areas and Case Studies Baron, G.; Ungemach, P. (1981) 32...

  18. Most Viewed Documents - Fission and Nuclear Technologies | OSTI...

    Office of Scientific and Technical Information (OSTI)

    States) (1997) Environmental Aspects, Objectives and Targets Identification Process R. Green (2002) Flow-induced vibration of circular cylindrical structures Chen, S.S. (1985)...

  19. September 2013 Most Viewed Documents for Environmental Sciences...

    Office of Scientific and Technical Information (OSTI)

    Soil Friday, G. P. (1999) 31 > Ammonia usage in vapor compression for refrigeration and air-conditioning in the United States Fairchild, P.D.; Baxter, V.D. (1995) 30 >...

  20. March 2014 Most Viewed Documents for Renewable Energy Sources...

    Office of Scientific and Technical Information (OSTI)

    on Low-Temperature, Small-Scale Applications Rafferty, K. (2000) 69 > Seventh Edition Fuel Cell Handbook NETL (2004) 68 > Systems and economic analysis of microalgae ponds for...

  1. Most Viewed Documents for Renewable Energy Sources: September...

    Office of Scientific and Technical Information (OSTI)

    towers: rule-of-thumb design and simulation Leeper, S.A. (1981) 70 Seventh Edition Fuel Cell Handbook NETL (2004) 67 Temperature coefficients for PV modules and arrays:...

  2. September 2013 Most Viewed Documents for Energy Storage, Conversion...

    Office of Scientific and Technical Information (OSTI)

    Ph.D.; Michael Shaepe (formerly with IPST, now at Cargill. Inc) (2008) 76 Seventh Edition Fuel Cell Handbook NETL (2004) 65 Building a secondary containment system Broder, M.F....

  3. April 2013 Most Viewed Documents for Energy Storage, Conversion...

    Office of Scientific and Technical Information (OSTI)

    for Energy Storage, Conversion, And Utilization Science Subject Feed Seventh Edition Fuel Cell Handbook NETL (2004) 628 > Continuously variable transmissions: theory and...

  4. April 2013 Most Viewed Documents for Renewable Energy Sources...

    Office of Scientific and Technical Information (OSTI)

    11. Heat Exchangers Rafferty, Kevin D.; Culver, Gene (1998) 1252 > Seventh Edition Fuel Cell Handbook NETL (2004) 628 > Wet cooling towers: rule-of-thumb design and...

  5. March 2015 Most Viewed Documents for Energy Storage, Conversion...

    Office of Scientific and Technical Information (OSTI)

    Seiber, L.E.; Marlino, L.D.; Staunton, R.H.; Cunningham, J.P. (2008) 113 Seventh Edition Fuel Cell Handbook NETL (2004) 111 New Regenerative Cycle for Vapor Compression...

  6. Most Viewed Documents for Renewable Energy Sources: December...

    Office of Scientific and Technical Information (OSTI)

    factors Fu, P; Johnson, S M; Settgast, R R; Carrigan, C R (2011) 107 Seventh Edition Fuel Cell Handbook NETL (2004) 96 Advanced Electric Submersible Pump Design Tool for...

  7. March 2014 Most Viewed Documents for Power Generation And Distribution...

    Office of Scientific and Technical Information (OSTI)

    Stoffel, J.B.; Pentecost, E.D.; Roman, R.D.; Traczyk, P.A. (1994) 83 > Seventh Edition Fuel Cell Handbook NETL (2004) 68 > Load flow analysis: Base cases, data, diagrams, and...

  8. April 2013 Most Viewed Documents for Power Generation And Distribution...

    Office of Scientific and Technical Information (OSTI)

    Stoffel, J.B.; Pentecost, E.D.; Roman, R.D.; Traczyk, P.A. (1994) 719 Seventh Edition Fuel Cell Handbook NETL (2004) 628 ASPEN Plus Simulation of CO2 Recovery Process Charles...

  9. Most Viewed Documents for Energy Storage, Conversion, and Utilization...

    Office of Scientific and Technical Information (OSTI)

    wastewaters and contaminated soil Peters, R.W.; Shem, L. (1993) 107 Seventh Edition Fuel Cell Handbook NETL (2004) 96 An Improved Method of Manufacturing Corrugated Boxes:...

  10. July 2013 Most Viewed Documents for Power Generation And Distribution...

    Office of Scientific and Technical Information (OSTI)

    E.C.; Kavicky, J.A.; VanKuiken, J.C.; Peerenboom, J.P. (1997) 135 > Seventh Edition Fuel Cell Handbook NETL (2004) 133 > Feed-pump hydraulic performance and design...

  11. Most Viewed Documents for Energy Storage, Conversion, and Utilization...

    Office of Scientific and Technical Information (OSTI)

    Quality Benefits of Urban HeatIslandMitigation Akbari, Hashem (2005) 76 Seventh Edition Fuel Cell Handbook NETL (2004) 67 Separation of heavy metals: Removal from industrial...

  12. June 2014 Most Viewed Documents for Renewable Energy Sources...

    Office of Scientific and Technical Information (OSTI)

    11. Heat Exchangers Rafferty, Kevin D.; Culver, Gene (1998) 300 > Seventh Edition Fuel Cell Handbook NETL (2004) 118 > Chapter 17. Engineering cost analysis Higbee,...

  13. Most Viewed Documents for Power Generation and Distribution:...

    Office of Scientific and Technical Information (OSTI)

    Stoffel, J.B.; Pentecost, E.D.; Roman, R.D.; Traczyk, P.A. (1994) 133 Seventh Edition Fuel Cell Handbook NETL (2004) 96 ASPEN Plus Simulation of CO2 Recovery Process Charles W....

  14. July 2013 Most Viewed Documents for Renewable Energy Sources...

    Office of Scientific and Technical Information (OSTI)

    the impact on PV system design Stevens, J.W.; Corey, G.P. (1996) 142 > Seventh Edition Fuel Cell Handbook NETL (2004) 133 > Temperature coefficients for PV modules and arrays:...

  15. June 2014 Most Viewed Documents for Energy Storage, Conversion...

    Office of Scientific and Technical Information (OSTI)

    Report H.P. Loh; Jennifer Lyons; Charles W. White, III (2002) 337 > Seventh Edition Fuel Cell Handbook NETL (2004) 118 > Energy Saving Potentials and Air Quality Benefits of...

  16. March 2014 Most Viewed Documents for Energy Storage, Conversion...

    Office of Scientific and Technical Information (OSTI)

    Benefits of Urban HeatIslandMitigation Akbari, Hashem (2005) 85 > Seventh Edition Fuel Cell Handbook NETL (2004) 68 > Separation of heavy metals: Removal from industrial...

  17. Most Viewed Documents for Power Generation and Distribution:...

    Office of Scientific and Technical Information (OSTI)

    towers: rule-of-thumb design and simulation Leeper, S.A. (1981) 70 Seventh Edition Fuel Cell Handbook NETL (2004) 67 Load flow analysis: Base cases, data, diagrams, and...

  18. July 2013 Most Viewed Documents for Energy Storage, Conversion...

    Office of Scientific and Technical Information (OSTI)

    the impact on PV system design Stevens, J.W.; Corey, G.P. (1996) 142 > Seventh Edition Fuel Cell Handbook NETL (2004) 133 > An Improved Method of Manufacturing Corrugated...

  19. March 2015 Most Viewed Documents for Renewable Energy Sources...

    Office of Scientific and Technical Information (OSTI)

    from 20sup 0C to 330sup 0C Ozbek, H.; Phillips, S.L. (1979) 137 Seventh Edition Fuel Cell Handbook NETL (2004) 111 A kinetic study of methanol synthesis in a slurry...

  20. Most Viewed Documents for National Defense: December 2014 | OSTI...

    Office of Scientific and Technical Information (OSTI)

    levels of information Van Groningen, C.N.; Paddock, R.A. (1997) 24 Detonation and combustion of explosives: A selected bibliography Dobratz, B. comp. (1998) 22 LLNL...

  1. June 2014 Most Viewed Documents for Biology And Medicine | OSTI...

    Office of Scientific and Technical Information (OSTI)

    to the Monte Carlo N-Particle (MCNP) Visual Editor (MCNPVised) to Read in Computer Aided Design (CAD) Files Randolph Schwarz; Leland L. Carter; Alysia Schwarz (2005) 37...

  2. Most Viewed Documents - Energy Storage, Conversion, and Utilization...

    Office of Scientific and Technical Information (OSTI)

    - Energy Storage, Conversion, and Utilization Process Equipment Cost Estimation, Final Report H.P. Loh; Jennifer Lyons; Charles W. White, III (2002) Continuously variable...

  3. March 2015 Most Viewed Documents for Fission And Nuclear Technologies...

    Office of Scientific and Technical Information (OSTI)

    solutions Maimoni, A. (1980) 101 Behavior of spent nuclear fuel in water pool storage Johnson, A.B. Jr. (1977) 87 One-dimensional drift-flux model and constitutive...

  4. June 2015 Most Viewed Documents for Renewable Energy Sources...

    Office of Scientific and Technical Information (OSTI)

    through 180-degree angle of attack for use in aerodynamic analysis of vertical axis wind turbines Sheldahl, R E; Klimas, P C (1981) 192 Calculation of brine properties. Above...

  5. June 2015 Most Viewed Documents for Power Generation And Distribution...

    Office of Scientific and Technical Information (OSTI)

    Knoxville, TN (United States)|Oak Ridge National Lab., TN (United States) (1995) 53 Wind power forecasting : state-of-the-art 2009. Monteiro, C.; Bessa, R.; Miranda, V.;...

  6. Most Viewed Documents for National Defense: September 2014 |...

    Office of Scientific and Technical Information (OSTI)

    Kenneth C. (1955) 17 Ground-based Nuclear Detonation Detection (GNDD) Technology Roadmap Casey, Leslie A. (2014) 17 Manual for the prediction of blast and fragment loadings...

  7. April 2013 Most Viewed Documents for Mathematics And Computing...

    Office of Scientific and Technical Information (OSTI)

    for Mathematics And Computing Science Subject Feed Publications in biomedical and environmental sciences programs, 1981 Moody, J.B. (comp.) (1982) 306 > A comparison of risk...

  8. January 2013 Most Viewed Documents for Energy Storage, Conversion...

    Office of Scientific and Technical Information (OSTI)

    2012: Executive Summary Portuguese version NONE Energy indicators for electricity production : comparing technologies and the nature of the indicators Energy Payback Ratio...

  9. January 2013 Most Viewed Documents for Fission And Nuclear Technologie...

    Office of Scientific and Technical Information (OSTI)

    ; Park, H. S. IDENTIFYING IMPURITIES IN SURPLUS NON PIT PLUTONIUM FEEDS FOR MOX OR ALTERNATIVE DISPOSITION Allender, J; Moore, E TESTING AND CHARACTERIZATION OF ENGINEERED FORMS...

  10. Most Viewed Documents for Fission and Nuclear Technologies: December...

    Office of Scientific and Technical Information (OSTI)

    various two-phase flow regimes Ishii, M. (1977) 20 3rd Miami international conference on alternative energy sources Nejat Veziroglu, T. (1980) 19 Fission fragment rockets: A...

  11. September 2013 Most Viewed Documents for Fission And Nuclear...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    I: research program design. Final report Brown, W.H.; Gopalakrishnan, S.; Fehlau, R.; Thompson, W.E.; Wilson, D.G. (1982) 69 > Flow-induced vibration of circular cylindrical...

  12. June 2015 Most Viewed Documents for Fission And Nuclear Technologies...

    Office of Scientific and Technical Information (OSTI)

    Savannah River Co., Aiken, SC (United States)) (1992) 245 Cleaning Contaminated Water at Fukushima Rende, Dean; Nenoff, Tina (2013) 204 Flow-induced vibration of circular...

  13. March 2014 Most Viewed Documents for Environmental Sciences ...

    Office of Scientific and Technical Information (OSTI)

    F.; Olivier, J.; Pickering, K.; Pitari, G.; Roelofs, G.-J.; Rogers, H.; Rognerud, B.; Smith, Steven J.; Solomon, S.; Staehelin, J.; Steele, P.; Stevenson, D. S.; Sundet, J.;...

  14. April 2013 Most Viewed Documents for Environmental Sciences ...

    Office of Scientific and Technical Information (OSTI)

    F.; Olivier, J.; Pickering, K.; Pitari, G.; Roelofs, G.-J.; Rogers, H.; Rognerud, B.; Smith, Steven J.; Solomon, S.; Staehelin, J.; Steele, P.; Stevenson, D. S.; Sundet, J.;...

  15. Most Viewed Documents for Environmental Sciences: September 2014...

    Office of Scientific and Technical Information (OSTI)

    F.; Olivier, J.; Pickering, K.; Pitari, G.; Roelofs, G.-J.; Rogers, H.; Rognerud, B.; Smith, Steven J.; Solomon, S.; Staehelin, J.; Steele, P.; Stevenson, D. S.; Sundet, J.;...

  16. June 2014 Most Viewed Documents for Environmental Sciences |...

    Office of Scientific and Technical Information (OSTI)

    F.; Olivier, J.; Pickering, K.; Pitari, G.; Roelofs, G.-J.; Rogers, H.; Rognerud, B.; Smith, Steven J.; Solomon, S.; Staehelin, J.; Steele, P.; Stevenson, D. S.; Sundet, J.;...

  17. July 2013 Most Viewed Documents for Environmental Sciences |...

    Office of Scientific and Technical Information (OSTI)

    Rogner, Hans-Holger; Sankovski, Alexei; Schlesinger, Michael; Shukla, Priyadarshi; Smith, Steven J.; Swart, Robert; van Rooijen, Sascha; Victor, Nadejda; Dadi, Zhou (2000) 51...

  18. Most Viewed Documents for Mathematics and Computing: December...

    Office of Scientific and Technical Information (OSTI)

    for configuration management using computer aided software engineering (CASE) tools Smith, P.R.; Sarfaty, R. (1993) 22 Solar Position Algorithm for Solar Radiation Applications...

  19. March 2015 Most Viewed Documents for Environmental Sciences ...

    Office of Scientific and Technical Information (OSTI)

    T. L.; Schumann, U.; Schwartz, Stephen E.; Schwartzkopf, M. D.; Shine, K. P.; Smith, Steven J.; Stevenson, D. S.; Stordal, F.; Tegen, I.; van Dorland, R.; Zhang, Y.;...

  20. June 2014 Most Viewed Documents for Mathematics And Computing...

    Office of Scientific and Technical Information (OSTI)

    for configuration management using computer aided software engineering (CASE) tools Smith, P.R.; Sarfaty, R. (1993) 18 > Description of DASSL: a differentialalgebraic system...

  1. Most Viewed Documents for Mathematics and Computing: September...

    Office of Scientific and Technical Information (OSTI)

    for configuration management using computer aided software engineering (CASE) tools Smith, P.R.; Sarfaty, R. (1993) 26 Ferrite Measurement in Austenitic and Duplex Stainless...

  2. Most Viewed Documents for Environmental Sciences: December 2014...

    Office of Scientific and Technical Information (OSTI)

    F.; Olivier, J.; Pickering, K.; Pitari, G.; Roelofs, G.-J.; Rogers, H.; Rognerud, B.; Smith, Steven J.; Solomon, S.; Staehelin, J.; Steele, P.; Stevenson, D. S.; Sundet, J.;...

  3. September 2013 Most Viewed Documents for National Defense | OSTI...

    Office of Scientific and Technical Information (OSTI)

    Equivalence Cooper, P.W. (1994) 26 > LLNL small-scale drop-hammer impact sensitivity test Simpson, L.R.; Foltz, M.F. (1995) 25 > The future of components for high reliability...

  4. Most Viewed Documents for Fission And Nuclear Technologies: September...

    Office of Scientific and Technical Information (OSTI)

    under accident conditions Bomelburg, H.J. (1977) 71 Behavior of spent nuclear fuel in water pool storage Johnson, A.B. Jr. (1977) 68 Stress analysis and evaluation of a...

  5. March 2014 Most Viewed Documents for Fission And Nuclear Technologies...

    Office of Scientific and Technical Information (OSTI)

    Fission And Nuclear Technologies Science Subject Feed Behavior of spent nuclear fuel in water pool storage Johnson, A.B. Jr. (1977) 72 > Peer-review study of the draft handbook...

  6. April 2013 Most Viewed Documents for Fission And Nuclear Technologies...

    Office of Scientific and Technical Information (OSTI)

    Fission And Nuclear Technologies Science Subject Feed Behavior of spent nuclear fuel in water pool storage Johnson, A.B. Jr. (null) 298 > Estimation of gas leak rates through very...

  7. September 2013 Most Viewed Documents for Mathematics And Computing...

    Office of Scientific and Technical Information (OSTI)

    heat and mass transfer code Zyvoloski, G.; Dash, Z.; Kelkar, S. (1988) 21 > Productivity and injectivity of horizontal wells. Quarterly report, January 1, 1995--March 31,...

  8. July 2013 Most Viewed Documents for Biology And Medicine | OSTI...

    Office of Scientific and Technical Information (OSTI)

    DOSE ASSESSMENT A. Achudume (2004) 17 > Control of temperature for health and productivity inoffices Seppanen, Olli; Fisk, William J.; Faulkner, David (2004) 17 > Literature...

  9. March 2014 Most Viewed Documents for Mathematics And Computing...

    Office of Scientific and Technical Information (OSTI)

    and state-of-the-art assessment Mileti, D.S. (Colorado State Univ., Fort Collins, CO (USA)); Sorensen, J.H. (Oak Ridge National Lab., TN (USA)) (1990) 18 > Health and...

  10. Most Viewed Documents for Biology and Medicine: December 2014...

    Office of Scientific and Technical Information (OSTI)

    J.M.; Wheelis, S.; Carroll, S.L.; Waltz, M.D.; Palumbo, A.V. (1995) 24 Carbon Dioxide Sequestering Using Microalgal Systems Daniel J. Stepan; Richard E. Shockey;...

  11. Most Viewed Documents for Biology and Medicine: September 2014...

    Office of Scientific and Technical Information (OSTI)

    32 Dose and volume specification for reporting interstitial therapy NONE (1997) 28 Carbon Dioxide Sequestering Using Microalgal Systems Daniel J. Stepan; Richard E. Shockey;...

  12. June 2015 Most Viewed Documents for Environmental Sciences |...

    Office of Scientific and Technical Information (OSTI)

    contaminated soil Peters, R.W.; Shem, L. (1993) 234 Statistical methods for environmental pollution monitoring Gilbert, R.O. (1987) 102 Building a secondary containment system...

  13. Most Viewed Documents - Power Generation and Distribution | OSTI...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of CO2 Recovery Process Charles W. White III (2003) Systems and economic analysis of microalgae ponds for conversion of COsub 2 to biomass. Quarterly technical progress report,...

  14. January 2013 Most Viewed Documents for Biology And Medicine ...

    Office of Scientific and Technical Information (OSTI)

    L. como biomonitor Nogueira, Claudio Ailton Development of simulation tools for virus shell assembly. Final report Berger, Bonnie Transcriptional Regulation of...

  15. January 2013 Most Viewed Documents for National Defense | OSTI...

    Office of Scientific and Technical Information (OSTI)

    Wright, B. Los Alamos National Lab., NM (United States) Investigations into seismic discrimination between earthquakes, chemical explosions and nuclear explosions...

  16. January 2013 Most Viewed Documents for Renewable Energy Sources...

    Office of Scientific and Technical Information (OSTI)

    Energy Consortium of New York Photovoltaic Research and Development Center Klein, Petra M. A Feasibility Study to Evaluate Wind Energy Potential on the Navajo Nation Terry Battiest...

  17. January 2013 Most Viewed Documents for Energy Storage, Conversion, And

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation PeerNOON... NoJamesJanos6 AnOffice

  18. January 2013 Most Viewed Documents for Environmental Sciences | OSTI, US

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation PeerNOON... NoJamesJanos6 AnOfficeEnergy,Dept

  19. January 2013 Most Viewed Documents for Fission And Nuclear Technologies |

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation PeerNOON... NoJamesJanos6

  20. January 2013 Most Viewed Documents for Power Generation And Distribution |

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 Investigation PeerNOON... NoJamesJanos6Energy,Office

  1. July 2013 Most Viewed Documents for Energy Storage, Conversion, And

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron beamJoin2015 Bonneville Power

  2. July 2013 Most Viewed Documents for Fission And Nuclear Technologies |

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron beamJoin2015 Bonneville PowerOffice of

  3. July 2013 Most Viewed Documents for Power Generation And Distribution |

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron beamJoin2015 Bonneville PowerOfficeEnergy,OSTI, US

  4. June 2014 Most Viewed Documents for Energy Storage, Conversion, And

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron beamJoin2015 BonnevilleJulyJune1 »1,7 M o

  5. June 2014 Most Viewed Documents for Fission And Nuclear Technologies |

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron beamJoin2015 BonnevilleJulyJune1 »1,7 M

  6. June 2014 Most Viewed Documents for Power Generation And Distribution |

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron beamJoin2015 BonnevilleJulyJune1 »1,7DeptOffice

  7. Most Viewed Documents - Energy Storage, Conversion, and Utilization | OSTI,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHighandSWPA / SPRA /Ml'.Solar Thermal16,(SC) Mortimer M.US Dept of

  8. Most Viewed Documents - Environmental Sciences | OSTI, US Dept of Energy,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHighandSWPA / SPRA /Ml'.Solar Thermal16,(SC) Mortimer M.US DeptOffice

  9. Most Viewed Documents - Mathematics and Computing | OSTI, US Dept of

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHighandSWPA / SPRA /Ml'.Solar Thermal16,(SC) MortimerEnergy, Office of

  10. September 2013 Most Viewed Documents for Mathematics And Computing | OSTI,

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem Not Found Item Not Found The item you requested, OSTISciTechEnergy, OfficeUS Dept of

  11. September 2013 Most Viewed Documents for Power Generation And Distribution

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem Not Found Item Not Found The item you requested, OSTISciTechEnergy, OfficeUS| OSTI,

  12. September 2013 Most Viewed Documents for Renewable Energy Sources | OSTI,

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem Not Found Item Not Found The item you requested, OSTISciTechEnergy, OfficeUS|

  13. March 2014 Most Viewed Documents for Energy Storage, Conversion, And

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronicCurves | SciTech ConnectLow-Cycle-Fatigueof Energy, Office

  14. March 2014 Most Viewed Documents for Fission And Nuclear Technologies |

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronicCurves | SciTech ConnectLow-Cycle-Fatigueof Energy,

  15. March 2014 Most Viewed Documents for Power Generation And Distribution |

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronicCurves | SciTech ConnectLow-Cycle-Fatigueof

  16. March 2015 Most Viewed Documents for Energy Storage, Conversion, And

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronicCurves | SciTech ConnectLow-Cycle-FatigueofDept of

  17. March 2015 Most Viewed Documents for Fission And Nuclear Technologies |

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronicCurves | SciTech ConnectLow-Cycle-FatigueofDept ofOffice ofofOSTI,

  18. March 2015 Most Viewed Documents for Power Generation And Distribution |

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronicCurves | SciTech ConnectLow-Cycle-FatigueofDeptOffice of

  19. Most Viewed Documents - Power Generation and Distribution | OSTI, US Dept

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronicCurves | SciTechLagrange MultiplierMoltenScientific andScientific andof

  20. Most Viewed Documents for Energy Storage, Conversion, and Utilization:

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronicCurves | SciTechLagrange MultiplierMoltenScientificEnergy, Office

  1. Most Viewed Documents for Energy Storage, Conversion, and Utilization:

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronicCurves | SciTechLagrange MultiplierMoltenScientificEnergy,

  2. Most Viewed Documents for Environmental Sciences: December 2014 | OSTI, US

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronicCurves | SciTechLagrange MultiplierMoltenScientificEnergy,Energy,Dept of

  3. Most Viewed Documents for Environmental Sciences: September 2014 | OSTI, US

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronicCurves | SciTechLagrange MultiplierMoltenScientificEnergy,Energy,Dept

  4. Most Viewed Documents for Fission And Nuclear Technologies: September 2014

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronicCurves | SciTechLagrange MultiplierMoltenScientificEnergy,Energy,Dept|

  5. Most Viewed Documents for Fission and Nuclear Technologies: December 2014 |

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronicCurves | SciTechLagrange

  6. Most Viewed Documents for Mathematics and Computing: December 2014 | OSTI,

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronicCurves | SciTechLagrangeEnergy, Office of ScientificUS Dept of Energy,

  7. Most Viewed Documents for Mathematics and Computing: September 2014 | OSTI,

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronicCurves | SciTechLagrangeEnergy, Office of ScientificUS Dept of Energy,US

  8. Most Viewed Documents for Power Generation and Distribution: December 2014

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronicCurves | SciTechLagrangeEnergy, Office of ScientificUS Dept ofofEnergy,|

  9. Most Viewed Documents for Power Generation and Distribution: September 2014

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronicCurves | SciTechLagrangeEnergy, Office of ScientificUS Dept

  10. Most Viewed Documents for Renewable Energy Sources: December 2014 | OSTI,

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronicCurves | SciTechLagrangeEnergy, Office of ScientificUS DeptUS Dept of

  11. Most Viewed Documents for Renewable Energy Sources: September 2014 | OSTI,

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronicCurves | SciTechLagrangeEnergy, Office of ScientificUS DeptUS Dept ofUS

  12. September 2013 Most Viewed Documents for Energy Storage, Conversion, And

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem Not Found Item Not Found The item you requested, OSTISciTech Connect

  13. September 2013 Most Viewed Documents for Environmental Sciences | OSTI, US

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem Not Found Item Not Found The item you requested, OSTISciTech ConnectEnergy,Dept

  14. September 2013 Most Viewed Documents for Fission And Nuclear Technologies |

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem Not Found Item Not Found The item you requested, OSTISciTech

  15. June 2015 Most Viewed Documents for Energy Storage, Conversion, And

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronic Input OptionsEnergy, Office of ScientificOffice of Scientific

  16. June 2015 Most Viewed Documents for Fission And Nuclear Technologies |

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronic Input OptionsEnergy, Office of ScientificOffice of

  17. June 2015 Most Viewed Documents for Power Generation And Distribution |

    Office of Scientific and Technical Information (OSTI)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilAElectronic Input OptionsEnergy, Office of ScientificOffice ofOfficeOffice ofOSTI,

  18. Using Multiple-Valued Logic Decision Diagrams to Model System Threat Probabilities

    E-Print Network [OSTI]

    Manikas, Theodore

    Using Multiple-Valued Logic Decision Diagrams to Model System Threat Probabilities Theodore W importance. To effectively address both natural and intentional threats to large systems, the threats must be cataloged and analyzed. Extremely large and complex systems can have an accordingly large number of threat

  19. Towards A Theory Of Insider Threat Assessment Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Shambhu Upadhyaya

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    Towards A Theory Of Insider Threat Assessment Ramkumar Chinchani, Anusha Iyer, Hung Q. Ngo, Shambhu}@cse.buffalo.edu Abstract Insider attacks are a well-known problem acknowl- edged as a threat as early as 1980s. The threat to the lack of tools and techniques, security analysts do not correctly perceive the threat, and hence

  20. Ionospheric Threat Model Methodology for Juan Blanch, Todd Walter, Per Enge. Stanford University

    E-Print Network [OSTI]

    Stanford University

    Ionospheric Threat Model Methodology for WAAS Juan Blanch, Todd Walter, Per Enge. Stanford of a threat model. The threat model is used to restrict the expected ionospheric behavior. It must not be too driving the ionosphere are not entirely known, a decision has been made to base the threat model

  1. Threat Assessment Using Evidential Networks A. Benavoli, B. Ristic, A. Farina, M. Oxenham, L. Chisci

    E-Print Network [OSTI]

    Chisci, Luigi

    Threat Assessment Using Evidential Networks A. Benavoli, B. Ristic, A. Farina§, M. Oxenham, L by providing a threat assessment, that is an estimate of the extent to which an enemy platform poses a threat based on evidence about its intent and capability. Threat is modelled by a network of entities

  2. Modeling System Threat Probabilities Using Mixed-Radix Multiple-Valued Logic Decision

    E-Print Network [OSTI]

    Thornton, Mitchell

    Modeling System Threat Probabilities Using Mixed-Radix Multiple-Valued Logic Decision Diagrams securing systems from both natural and intentional threats. Extremely large and complex systems can have an ac- cordingly large number of threat scenarios, thus simply listing the threats and devising

  3. Acceptable NSLS Safety Documentation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Acceptable NSLS Safety Documentation Print NSLS users who have completed NSLS Safety Module must present a copy of one of the following documents to receive ALS 1001: Safety at the...

  4. GTT Tranmission Workshop- Documents

    Broader source: Energy.gov [DOE]

    Use the links below to download documents from the GTT Transmission Workshop, held November 1-2, 2012.

  5. Classification Documents and Publications

    Broader source: Energy.gov [DOE]

    Certain documents and publications created or issued by the Office of Classification are available from this page.

  6. In this document: Freshmanadmissiondecisionoverview

    E-Print Network [OSTI]

    Blanchette, Robert A.

    In this document: · Freshmanadmissiondecisionoverview · Academicprofileoffall2012 and Human Development Liberal Arts Management (Carlson School of) Science and Engineering #12;Frequently

  7. In this document: Freshmanadmissiondecisionoverview

    E-Print Network [OSTI]

    Blanchette, Robert A.

    In this document: · Freshmanadmissiondecisionoverview · Academicprofileoffall2012, Agricultural and Natural Resource Sciences Education and Human Development Liberal Arts Management (Carlson

  8. Office Automation Document Preparation

    E-Print Network [OSTI]

    North Carolina at Chapel Hill, University of

    .2 Distinctions 1.3 Facilities 1.3.1 Document Preparation 1.3.2 Records Management 1.3.3 Communication 1 organizations contemplating the installation of document-preparation systems. * Administrative managersOffice Automation and Document Preparation for the v' University of North Carolina at Chapel Hill

  9. Office of Document Reviews

    Broader source: Energy.gov [DOE]

    The Office of Document Reviews ensures that all documents prepared at DOE Headquarters are properly marked to identify the level and category of protected information they contain (if any) and to ensure that all documents the Department prepares or is required to review under applicable statutes for public release contain no information requiring protection under law, regulations and Executive orders.

  10. Matching and fairness in threat-based mobile sensor coverage

    SciTech Connect (OSTI)

    Ma, Cheng-Yu {Jan} L [ORNL; Yau, King Y [ORNL; Chin, Jren-Chit [ORNL; Rao, Nageswara S [ORNL; Shankar, Mallikarjun [ORNL

    2009-12-01T23:59:59.000Z

    Mobile sensors can be used to effect complete coverage of a surveillance area for a given threat over time, thereby reducing the number of sensors necessary. The surveillance area may have a given threat profile as determined by the kind of threat, and accompanying meteorological, environmental, and human factors. In planning the movement of sensors, areas that are deemed higher threat should receive proportionately higher coverage. We propose a coverage algorithm for mobile sensors to achieve a coverage that will match - over the long term and as quantified by an RMSE metric - a given threat profile. Moreover, the algorithm has the following desirable properties: (1) stochastic, so that it is robust to contingencies and makes it hard for an adversary to anticipate the sensor's movement, (2) efficient, and (3) practical, by avoiding movement over inaccessible areas. Further to matching, we argue that a fairness measure of performance over the shorter time scale is also important. We show that the RMSE and fairness are, in general, antagonistic, and argue for the need of a combined measure of performance, which we call efficacy. We show how a pause time parameter of the coverage algorithm can be used to control the trade-off between the RMSE and fairness, and present an efficient offline algorithm to determine the optimal pause time maximizing the efficacy. Finally, we discuss the effects of multiple sensors, under both independent and coordinated operation. Extensive simulation results - under realistic coverage scenarios - are presented for performance evaluation.

  11. Sorghum Ergot: New Disease Threat to the Sorghum Industry

    E-Print Network [OSTI]

    Krausz, Joseph P.; Isakeit, Thomas

    1998-07-20T23:59:59.000Z

    of the sorghum ergot pathogen and likely serves as an overwintering source of ergot inoculum in south Texas. E-461 6-98 Sorghum Ergot New Disease Threat to the Sorghum Industry *Extension Plant Pathologists, The Texas A&M University System. Newly formed honeydew... dripping from an infected panicle. Joseph Krausz and Thomas Isakeit* Ho w is it a Threat to Texas? Each f_lo wer infected with ergot represents a direct loss of one seed. Additional losses occur because the stickiness of infected panicles inter- feres...

  12. Appendix 3 Document Scanning Guidelines Appendix 3 Document Scanning Guidelines

    E-Print Network [OSTI]

    Tsien, Roger Y.

    Appendix 3 Document Scanning Guidelines App.3-1 Appendix 3 ­ Document Scanning Guidelines 1. Turn. Note: Whenever possible, it is best to convert a Word document into a PDF than to scan a document and convert it to a PDF. A Word document that has been converted is searchable; a scanned document is not. 2

  13. WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President

    E-Print Network [OSTI]

    WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President Dr. Peter H. Gleick1 October 9, 2008 Safe and adequate fresh water resources are central to the economy, foreign policy domestic and international challenges related to fresh water. These challenges will require unilateral

  14. AMBASSADOR BONNIE D. JENKINS Coordinator, Threat Reduction Programs,

    E-Print Network [OSTI]

    to address these challenges? How can PNNL's capabilities--from basic science through technology development, deployment, and training--address emerging threats? For more information, please contact PNNL's Center for Global Security. Jana Fankhauser, Director, jana.fankhauser@pnl.gov · http://cgs.pnnl.gov PNNL-SA-78562

  15. Climate Threat to the Planet* Implications for Energy Policy

    E-Print Network [OSTI]

    Hansen, James E.

    Climate Threat to the Planet* Implications for Energy Policy Jim Hansen 4 July 2008 United Nations's Paleoclimate History 2. On-Going Climate Changes 3. Climate Models #12;#12;Green Triangle = Volcano; Red Box;#12;Observations: Domingues, C.M. et al., Nature 453, 1090-1093, 2008. Model: Hansen, J. et al., Science 308, 1431

  16. Secretarial Succession, Threat Level Notification, and Successor Tracking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-01-28T23:59:59.000Z

    This order establishes the Secretarial Order of Succession in the Department of Energy pursuant to section 202(a) of the Department of Energy Organization Act, 42 U.S.C. 7132(a) and establish a mechanism for tracking the locations of successors at the various threat levels. Admin Chg, dated 9-13-2013, cancels DOE O 100.1E.

  17. Secretarial Succession, Threat Level Notification and Successor Tracking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-01-28T23:59:59.000Z

    The Order establishes the Secretarial Order of Succession pursuant to section 202(a) of the Department of Energy Organization Act, 42 U.S.C. 7132(a) and establishes a mechanism for tracking the locations of successors at various threat levels. Cancels DOE O 100.1D.

  18. Secretarial Succession, Threat Level Notification, and Successor Tracking

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-04-20T23:59:59.000Z

    This Order establishes the Secretarial Order of Succession pursuant to section 202(a) of the Department of Energy Organization Act and establishes a mechanism for tracking the locations of successors at various threat levels. Cancels DOE O 100.1C. Canceled by DOE O 100.1E

  19. Threats from Climate Change to Terrestrial Vertebrate Hotspots in Europe

    E-Print Network [OSTI]

    Zimmermann, Niklaus E.

    Threats from Climate Change to Terrestrial Vertebrate Hotspots in Europe Luigi Maiorano1 to extreme climates. Our results outline that the Mediterranean basin represents both an important hotspot change projected to occur over the coming decades, especially in the Mediterranean bioregion, posing

  20. UNCLASSIFIHED DEFENSE DOCUMENTATION CENTER

    E-Print Network [OSTI]

    Block, Marco

    UNCLASSIFIHED AD 463473 DEFENSE DOCUMENTATION CENTER FOR SCIENTIFIC AND TECHNICAL INFORMATION .... John Barton Head OR Analysis Group R. H. Krolick Manager Applied Science Laboratory Prepared for the .J

  1. Geothermal: Hot Documents Search

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hot Documents Search Geothermal Technologies Legacy Collection HelpFAQ | Site Map | Contact Us HomeBasic Search About Publications Advanced Search New Hot Docs News Related Links...

  2. RMOTC - Library - Environmental Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Environmental Documents The U.S. Department of Energy National Environmental Policy Act (NEPA) requires careful consideration of the potential environmental consequences of all...

  3. Hazard Baseline Documentation

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-12-04T23:59:59.000Z

    This standard establishes uniform Office of Environmental Management (EM) guidance on hazard baseline documents that identify and control radiological and non-radiological hazards for all EM facilities.

  4. The Shanghai Six:The Shanghai Six: Milit Th t E i Alli ?Milit Th t E i Alli ?Military Threat or Economic Alliance?Military Threat or Economic Alliance?

    E-Print Network [OSTI]

    New Hampshire, University of

    The Shanghai Six:The Shanghai Six: Milit Th t E i Alli ?Milit Th t E i Alli ?Military Threat or Economic Alliance?Military Threat or Economic Alliance? Anna BrownAnna Brown #12;Maps courtesy of Google Maps. #12;Is the SCO a Military Threat?Is the SCO a Military Threat?Is the SCO a Military Threat

  5. Environmental Policy Document Ref

    E-Print Network [OSTI]

    Aickelin, Uwe

    Document Environmental Policy Document Ref EMS.POL.001 Last Revision March 2013 Revision No 5 Page 1 of 1 Environmental Policy Through teaching and research the University of the West of England should be managed so as to minimise environmental harm. This policy commits the University of the West

  6. IMPRESS CONNECT DOCUMENT ORDERING

    E-Print Network [OSTI]

    Asaithambi, Asai

    IMPRESS CONNECT DOCUMENT ORDERING USER GUIDE FOR UNF August 2010 #12;OFFICEMAX IMPRESS CONNECT USERMax (case sensitive) Click on "Create New Custom Print Order" under Print & Document Services #12;The first landing page. You will see 3 options across the top of the landing page: Order Jobs, Track Jobs, Manage

  7. IDC System Specification Document.

    SciTech Connect (OSTI)

    Clifford, David J.

    2014-12-01T23:59:59.000Z

    This document contains the system specifications derived to satisfy the system requirements found in the IDC System Requirements Document for the IDC Reengineering Phase 2 project. Revisions Version Date Author/Team Revision Description Authorized by V1.0 12/2014 IDC Reengineering Project Team Initial delivery M. Harris

  8. Presidential Documents Federal Register

    E-Print Network [OSTI]

    Presidential Documents 67249 Federal Register Vol. 65, No. 218 Thursday, November 9, 2000 Title 3 principles set forth in section 2, agencies shall adhere, to the extent permitted by law, to the following #12;67250 Federal Register / Vol. 65, No. 218 / Thursday, November 9, 2000 / Presidential Documents (a

  9. Notice of Intent to Develop DOE O 470.X, Insider Threat Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2013-10-17T23:59:59.000Z

    The Order establishes top-level responsibilities and requirements for DOE's Insider Threat Program, which is intended to deter, detect, and mitigate insider threat actions by all Federal and contractor employees.

  10. A threat taxonomy for mHealth privacy Institute for Security, Technology, and Society

    E-Print Network [OSTI]

    A threat taxonomy for mHealth privacy David Kotz Institute for Security, Technology, and SocietyHealth technologies. We develop a taxonomy of the privacy-related threats, and discuss some of the technologies

  11. MultiMulti--threat Containment withthreat Containment with Cooperative Autonomous AgentsCooperative Autonomous Agents

    E-Print Network [OSTI]

    Jay Yang, Shanchieh

    as Newtonian particles Quadratic APF (QAPF) · Simple yet does the job Three QAPFs · Moving toward the threats

  12. Content-Based Document Image Retrieval in Complex Document Collections

    E-Print Network [OSTI]

    Content-Based Document Image Retrieval in Complex Document Collections G. Agama, S. Argamona, O address the problem of content-based image retrieval in the context of complex document images. Complex document are documents that typically start out on paper and are then electronically scanned. These docu

  13. Q&A with Steven Spencer: Speaker in the Women and STEM Series Talks About How He Became Interested in Studying Psychology, Dissonance, and Stereotype Threat

    E-Print Network [OSTI]

    Hooker, Courtney

    2011-01-01T23:59:59.000Z

    dissonance, and stereotype threat A Spencer’s talk, “Athe field of stereotype threat, I was impressed by his kindthink about contents stereotype threat. Therefore, I had the

  14. View of software for HEP experiments

    SciTech Connect (OSTI)

    Johnstad, H.; Lebrun, P.; Lessner, E.S.; Montgomery, H.E.

    1986-05-01T23:59:59.000Z

    A view of the software structure typical of a High Energy Physics experiment is given and the availability of general software modules in most of the important regions is discussed. The aim is to provide a framework for discussion of capabilities and inadequecies and thereby define areas where effort should be assigned and perhaps also to serve as a useful source document for the newcomer to High Energy Physics. 74 refs.

  15. Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability

    E-Print Network [OSTI]

    How, Jonathan P.

    Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability by Georges;Threat Assessment for Safe Navigation in Environments with Uncertainty in Predictability by Georges Salim fulfillment of the requirements for the degree of Doctor of Philosophy Abstract This thesis develops threat

  16. Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial

    E-Print Network [OSTI]

    Wang, Hai

    Probabilistic Representation of the Threat and Consequences of Weapon Attacks on Commercial of the Threat and Consequences of Weapon Attacks on Commercial Aircraft CREATE Report 29 November 2005 John P Security has determined that external weapon threats due to surface-air missiles, as well as some

  17. Threat to the point: improving the value of comparative extinction risk analysis for conservation action

    E-Print Network [OSTI]

    Davidson, Ana

    Threat to the point: improving the value of comparative extinction risk analysis for conservation of such analyses for conservation practice has been questioned. One reason for underperformance may be that threats this problem by (i) reviewing the use of threats in this field and (ii) quanti- tatively investigating

  18. OPEN-FILE REPORT 2005-1164 An Assessment of Volcanic Threat and Monitoring

    E-Print Network [OSTI]

    OPEN-FILE REPORT 2005-1164 An Assessment of Volcanic Threat and Monitoring Capabilities Reawakens Volcanic Threat Assessment: Analysis of Hazard and Risk Factors......................... 14 · Table 2. List of hazard and exposure factors used in the NVEWS threat assessment · Figure 3

  19. Reducing the Wildland Fire Threat to Homes: Where and How Much?1

    E-Print Network [OSTI]

    Standiford, Richard B.

    Reducing the Wildland Fire Threat to Homes: Where and How Much?1 Jack D. Cohen2 Abstract. The threat of life and property losses during wildland fires is a significant issue for Federal, State such as hazard mapping and fuel management. The threat of life and property losses during wildland fires

  20. Ionospheric Threat Parameterization for Local Area Global-Positioning-System-Based Aircraft Landing Systems

    E-Print Network [OSTI]

    Stanford University

    Ionospheric Threat Parameterization for Local Area Global-Positioning-System-Based Aircraft Landing of user separation. The method of data analysis that produced these results is described, and a threat space that parameterizes these possible threats to user integrity is defined. Certain configurations

  1. DEFENSE THREAT REDUCTION AGENCY 8725 JOHN J . KINGMAN ROAD, STOP 620 1

    E-Print Network [OSTI]

    Spence, Harlan Ernest

    DEFENSE THREAT REDUCTION AGENCY 8725 JOHN J . KINGMAN ROAD, STOP 620 1 FORT BELVOIR, VA 22060-6201 February 28, 2013 Industry and Academia Partners of the Defense Threat Reduction Agency and U.S. Strategic of unceltainty for the entire Department of Defense. The Def1 ns Threat Reduction Agency and U. S. Strategic

  2. Title: Campus Violence and Threat Management Effective Date: September 1, 2012 Page: Page 1 of 4

    E-Print Network [OSTI]

    Swaddle, John

    Title: Campus Violence and Threat Management Effective Date: September 1, 2012 Page: Page 1 of 4 personal force or violence [and] threats of violence." The policy also fulfills the university's statutory obligations under Section 23-9.2:10 of the Code of Virginia, pursuant to which it has established a threat

  3. Journal of Experimental Psychology: Applied Seeing the Crowd for the Bomber: Spontaneous Threat

    E-Print Network [OSTI]

    Patel, Aniruddh D.

    Journal of Experimental Psychology: Applied Seeing the Crowd for the Bomber: Spontaneous Threat: Spontaneous Threat Perception From Static and Randomly Moving Crowd Simulations. Journal of Experimental for the Bomber: Spontaneous Threat Perception From Static and Randomly Moving Crowd Simulations Tad T. Brunyé U

  4. High-Level Information Fusion and Mission Planning in Highly Anisotropic Threat Spaces

    E-Print Network [OSTI]

    Witkowski, Mark

    High-Level Information Fusion and Mission Planning in Highly Anisotropic Threat Spaces Mark sharing and high-level information fusion to allow for the visualisation of highly anisotropic threat options. Keywords: Information Fusion, Threat Map, Tactical Planning. 1 Introduction We present a first

  5. Fast Threat Detection and Localization Using Super-Regenerative Transceiver in

    E-Print Network [OSTI]

    Zhang, Yan

    Fast Threat Detection and Localization Using Super-Regenerative Transceiver in Random Noise Radar-Regenerative (SRG) transceiver as a type of ultra-fast electronics platform for threat detection and localization the Angle-of-Arrival (AOA) information of the inbound threats. Simulations and detailed laboratory

  6. Stopping the Insider Threat: the case for implementing integrated autonomic defense mechanisms in computing systems

    E-Print Network [OSTI]

    Menascé, Daniel A.

    Stopping the Insider Threat: the case for implementing integrated autonomic defense mechanisms that are inseparable from the systems that are being defended. 1. Introduction Threats to the security of an information system may be initiated from either outside or from within an organization. Detecting such threats

  7. Behavioral/Systems/Cognitive Threat of Punishment Motivates Memory Encoding via

    E-Print Network [OSTI]

    Adcock, R. Alison

    Behavioral/Systems/Cognitive Threat of Punishment Motivates Memory Encoding via Amygdala circuits associated with motivated declarative encoding and active threat avoidance have both been an upcoming scene image. Items associated with the threat of shock were better recognized 24 h later

  8. Ionospheric Threat Mitigation by Geometry Screening in Ground-Based Augmentation Systems

    E-Print Network [OSTI]

    Stanford University

    Ionospheric Threat Mitigation by Geometry Screening in Ground-Based Augmentation Systems Jiyun Lee observed during severe ionospheric storms pose potential threats to the integrity of the Ground threats, because ionospheric gradients are not observable to the ground monitor if they impact

  9. On the Value of a Threat Advisory System for Managing Supply Chain Disruptions

    E-Print Network [OSTI]

    Snyder, Larry

    On the Value of a Threat Advisory System for Managing Supply Chain Disruptions Brian T. Tomlin "lean" otherwise. In this paper, we propose and investigate a threat advisory system in which the firm in the threat level. We consider a model in which the firm has a single unreliable supplier, for which inventory

  10. Moderate threat causes longer lasting disruption to processing in anxious individuals

    E-Print Network [OSTI]

    Bishop, Sonia

    Moderate threat causes longer lasting disruption to processing in anxious individuals Sophie: Forster S, Castle E, Nunez-elizalde AO and Bishop SJ(2014) Moderate threat causes longer lasting in anxiety1 Moderate threat causes longer lasting disruption to processing2 in anxious individuals.3 Sophie

  11. Threat Modeling as a Basis for Security Requirements Suvda Myagmar Adam J. Lee William Yurcik

    E-Print Network [OSTI]

    Threat Modeling as a Basis for Security Requirements Suvda Myagmar Adam J. Lee William Yurcik. Prior to claiming the security of a system, it is important to iden- tify the threats to the system in question. Enumerating the threats to a system helps system architects develop realis- tic and meaningful

  12. Subversion as a Threat in Information Warfare Emory A. Anderson1

    E-Print Network [OSTI]

    Irvine, Cynthia E.

    Subversion as a Threat in Information Warfare Emory A. Anderson1 , Cynthia E. Irvine2 , and Roger R-mail: Roger.Schell@aesec.com; ABSTRACT As adversaries develop Information Warfare capabilities, the threat for subversion, that this threat is real, and that it represents a significant vulnerability. Mitigation

  13. The Threat to the Planet: How Can We Avoid Dangerous Human-Made Climate Change?

    E-Print Network [OSTI]

    Hansen, James E.

    The Threat to the Planet: How Can We Avoid Dangerous Human-Made Climate Change? Remarks of James E to describe the threat to our planet posed by unbridled consumption of fossil fuels. I recognize the debt owed to the threat of climate change has been sudden and profound. Only in recent years has the extent and immediacy

  14. LAAS Ionosphere Spatial Gradient Threat Model and Impact of LGF and Airborne Monitoring

    E-Print Network [OSTI]

    Stanford University

    LAAS Ionosphere Spatial Gradient Threat Model and Impact of LGF and Airborne Monitoring Ming Luo of users for the current Category I LAAS architecture. In the ionosphere threat model used by previous-case ionosphere conditions. In this paper, the ionosphere threat model is reexamined based on WAAS and IGS data

  15. Enabling Automated Threat Response through the Use of a Dynamic Security Policy

    E-Print Network [OSTI]

    Boyer, Edmond

    Enabling Automated Threat Response through the Use of a Dynamic Security Policy Herv´e Debar1: Intrusion Detection, Threat Response, Reaction, Access Control Abstract Information systems security issues to provide countermea- sures to threats compromising the security policy. The response process is far from

  16. 8. SYNTHESIS OF RISK ASSESSMENTS: TAXONOMIC, REGIONAL, AND THREAT-BASED PATTERNS

    E-Print Network [OSTI]

    457 8. SYNTHESIS OF RISK ASSESSMENTS: TAXONOMIC, REGIONAL, AND THREAT-BASED PATTERNS Estimated specific or generic information indicating relatively high susceptibility to certain threats (e susceptibility to threats and/or known occurrence in diverse or marginal habitats. Many, if not most, species

  17. TITLE: RELEASING PROTECTED HEALTH INFORMATION TO PREVENT A SERIOUS THREAT TO HEALTH OR SAFETY

    E-Print Network [OSTI]

    Grishok, Alla

    TITLE: RELEASING PROTECTED HEALTH INFORMATION TO PREVENT A SERIOUS THREAT TO HEALTH OR SAFETY the patient's authorization in order to prevent a serious threat to health or safety. PURPOSE The purpose will release a patient's PHI without the patient's authorization to prevent a serious threat to health

  18. Worry Is Associated With Impaired Gating of Threat From Working Memory

    E-Print Network [OSTI]

    Larson, Christine L.

    Emotion Worry Is Associated With Impaired Gating of Threat From Working Memory Daniel M. Stout, C. L. (2014, August 25). Worry Is Associated With Impaired Gating of Threat From Working Memory Is Associated With Impaired Gating of Threat From Working Memory Daniel M. Stout University of Wisconsin

  19. University of Newcastle upon Tyne Threat Analysis of Cryptographic Election Schemes

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    University of Newcastle upon Tyne COMPUTING SCIENCE Threat Analysis of Cryptographic Election IVERSITY OF #12;TECHNICAL REPORT SERIES No. CS-TR-971 June, 2006 Threat Analysis of Cryptographic Election Schemes P. Y. A. Ryan and T. Peacock. Abstract We discuss some vulnerabilities, threats and counter

  20. THE GLOBALIzATION OF CHINESE SCIENCE: A THREAT OR AN

    E-Print Network [OSTI]

    Zhu, Chen

    THE GLOBALIzATION OF CHINESE SCIENCE: A THREAT OR AN OPPORTuNITy? recently, I attended the 50th?" and "Is China a threat to the power of the United states?" We have known the host and his family for years). are they a welcome expansion or a threat to the quality of programs? In some years, conferencegoers have expressed

  1. Behavioral/Systems/Cognitive Neural Correlates of the Automatic Processing of Threat

    E-Print Network [OSTI]

    Toronto, University of

    Behavioral/Systems/Cognitive Neural Correlates of the Automatic Processing of Threat Facial Signals threat. Attention was focused on either scenes or faces presented in a single overlapping display. Facial. These results suggest that automaticity is not funda- mental to the processing of all facial signals of threat

  2. Factoring species, non-species values and threats into biodiversity prioritisation across the ecoregions

    E-Print Network [OSTI]

    Vermont, University of

    population density, and the extinction risk of species. This threat index is positively correlated with allFactoring species, non-species values and threats into biodiversity prioritisation across Biodiversity Species Non-species biological values Threat A B S T R A C T Biodiversity in Africa, Madagascar

  3. SmartNotes: Application of Crowdsourcing to the Detection of Web Threats

    E-Print Network [OSTI]

    Fink, Eugene

    --Crowdsourcing, Machine Learning, Web Security. I. INTRODUCTION Cybersecurity threats can be broadly divided to two high such security threats is still an ongoing battle, but there is another critical type of cybersecurity threats at al., 2009] and other similar scams have emerged due to the increased popularity of on-line banking

  4. Document | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T,Office of Policy,Policy ActDetroit7471 Federal RegisterDocument DocumentDocument

  5. Document | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T,Office of Policy,Policy ActDetroit7471 Federal RegisterDocumentDocument Document

  6. Document | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO OverviewAttachments461-93Do-It-Yourself ProjectsDocument Document Extracted PagesDocument

  7. UESC Enabling Documents

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—discusses the enabling documents to help federal contract officers establish utility energy service contracts (UESCs).

  8. TUchem Documentation Introduction

    E-Print Network [OSTI]

    Wolfgang, Paul

    TUchem Documentation Introduction TUchem is an automated chemical inventory database system design, such as inventory import, report generation, location management, and a user-friendly look-and-feel. The motivation

  9. Presidential Documents Federal Register

    E-Print Network [OSTI]

    Presidential Documents 67249 Federal Register Vol. 65, No. 218 Thursday, November 9, 2000 Title 3 principles set forth in section 2, agencies shall adhere, to the extent permitted by law, to the following

  10. Document Type: Subject Terms

    E-Print Network [OSTI]

    Major, Arkady

    Title: Authors: Source: Document Type: Subject Terms: Abstract: Full Text Word Count: ISSN at creating team results. In fact, it's priceless. Managers in Western corporations have received a lifetime

  11. World Views From fragmentation

    E-Print Network [OSTI]

    .......................................................11 2. The Seven Components of a World View...................................................... 20 3. The Unity of the Seven Sub........................................... 25 5. The Purpose of the group `Worldviews

  12. Michigan Questionnaire Documentation System (MQDS)

    E-Print Network [OSTI]

    Cheung, Gina-Qian

    2013-04-03T23:59:59.000Z

    The Michigan Questionnaire Documentation System (MQDS) is a powerful tool used to help create questionnaire documentation, with or without summary statistics, and other documentation based on the Blaise data model for a study. MQDS works by: 1...

  13. PORTAL Aggregation Analysis and Documentation

    E-Print Network [OSTI]

    Bertini, Robert L.

    PORTAL Aggregation Analysis and Documentation Kristin A. Tufte Portland State University Introduction This document describes the aggregation procedures for PORTAL . Analysis of different aggregation system. Details on the status values and their descriptions can be found in the SWARM documentation

  14. Documentation Requirements for Sensory Impairments

    E-Print Network [OSTI]

    Documentation Requirements for Sensory Impairments Vision and Hearing Students, faculty, staff documentation requirements: 1. Requirements of the PRACTITIONER: A) Ophthalmologists and optometrists of interest. C) Documentation must be typed, dated and signed by the evaluator and submitted to ODR

  15. Published November, 1997 1997 Documentation

    E-Print Network [OSTI]

    Goldman, Steven A.

    Published November, 1997 1997 Documentation Guidelines for Evaluation and Management Services;2 1997 DOCUMENTATION GUIDELINES FOR EVALUATION AND MANAGEMENT SERVICES I. INTRODUCTION WHAT...............................................................................................................................2 What Is Documentation and Why Is it Important

  16. Document Imaging | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Imaging Converting Paper Documents into Electronic Files Converting paper documents into electronic files helps us manage, store, access and archive the organizational information...

  17. Important Trinity / NERSC-8 Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    RFP Important Trinity NERSC-8 Documents Important Trinity NERSC-8 Documents Trinity NERSC-8 Use Case Scenarios for Burst Buffer and Power Management PDF Facility Limits...

  18. DOCUMENTATION SPECIFIC TASK TRAINING PROGRAM

    E-Print Network [OSTI]

    Illinois at Urbana-Champaign, University of

    DOCUMENTATION APPENDIX SPECIFIC TASK TRAINING PROGRAM Conducted by the ILLINOIS CENTER ............................................................. Coordination of Contract Documents Art.105.05 Appendix Page 14

  19. NEWS & VIEWS Glass dynamics

    E-Print Network [OSTI]

    Weeks, Eric R.

    NEWS & VIEWS Glass dynamics Diverging views on glass transition Gregory B. mc.mckenna@ttu.edu T he glass transition is one of the most intriguing phenomena in the world of soft condensed matter. Despite decades of study, many aspects of the behaviour of glass-forming liquids remain elusive

  20. SHERPA Document SHERPA Document -Institutional Repositories: Staff and Skills Requirements

    E-Print Network [OSTI]

    Southampton, University of

    SHERPA Document SHERPA Document - Institutional Repositories: Staff and Skills Requirements Mary This document began in response to requests received by the core SHERPA team for examples of job descriptions and UKCORR members. This document will be revised annually (July/August) to reflect changing needs

  1. Madonne: Document Image Analysis Techniques for Cultural Heritage Documents

    E-Print Network [OSTI]

    Boyer, Edmond

    Madonne: Document Image Analysis Techniques for Cultural Heritage Documents Jean-Marc Ogier and Karl Tombre Abstract. This paper presents the Madonne project, a French initiative to use document image anal- ysis techniques for the purpose of preserving and exploiting heritage documents. 1

  2. Software documentation, Page 1, Printed 7/11/01 Documentation

    E-Print Network [OSTI]

    Sommerville, Ian

    Software documentation, Page 1, Printed 7/11/01 Software Documentation Ian Sommerville Lancaster University, UK #12;Software documentation, Page 2, Printed 7/11/01 Introduction All large software development projects, irrespective of application, generate a large amount of associated documentation

  3. SOFA 2 Documentation Table of contents

    E-Print Network [OSTI]

    SOFA 2 Documentation Table of contents 1 Overview...................................................................................................................... 2 2 Documentation............................................................................................................. 2 3 Other documentation and howtos

  4. Technology Innovation Program Guidelines and Documentation

    E-Print Network [OSTI]

    Magee, Joseph W.

    #12;Technology Innovation Program Guidelines and Documentation Requirements for Research Involving ............................................................................ 5 F. Required Documentation.............................................................................. 16 D. Required Documentation

  5. Hazard baseline documentation

    SciTech Connect (OSTI)

    Not Available

    1994-08-01T23:59:59.000Z

    This DOE limited technical standard establishes uniform Office of Environmental Management (EM) guidance on hazards baseline documents that identify and control radiological and nonradiological hazards for all EM facilities. It provides a road map to the safety and health hazard identification and control requirements contained in the Department`s orders and provides EM guidance on the applicability and integration of these requirements. This includes a definition of four classes of facilities (nuclear, non-nuclear, radiological, and other industrial); the thresholds for facility hazard classification; and applicable safety and health hazard identification, controls, and documentation. The standard applies to the classification, development, review, and approval of hazard identification and control documentation for EM facilities.

  6. Sandia Energy - SCADA Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol Home Distribution GridDocuments Home Stationary PowerResearchRiskRotorDocuments

  7. Document | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T,Office of Policy,Policy ActDetroit7471 Federal Register /Document Document

  8. Document | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T,Office of Policy,Policy ActDetroit7471 Federal Register /DocumentDocument

  9. Document | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T,Office of Policy,Policy ActDetroit7471 Federal Register /DocumentDocumentOHA

  10. Document | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T,Office of Policy,Policy ActDetroit7471 Federal RegisterDocument Document

  11. Document Control Program | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Training, Documents, & Records Document Control Program The Document Control (DC) Plan ensures that only approved, current versions of such documents are used in the workplace or...

  12. DOCUMENT MAPS FOR COMPETENCE MANAGEMENT

    E-Print Network [OSTI]

    Honkela, Timo

    DOCUMENT MAPS FOR COMPETENCE MANAGEMENT Timo Honkela Helsinki University of Technology Neural area of the document maps, i.e., competence management. The document map approach has approved The WEBSOM is a method for analyzing and visualizing large document col- lections. In the WEBSOM method

  13. RLJ/STAT/UPDATE 1-18-11 1 Situation Threat Assessment Policy and Protocol (Update 1/18/11)

    E-Print Network [OSTI]

    Rusu, Adrian

    RLJ/STAT/UPDATE 1-18-11 1 Situation Threat Assessment Policy and Protocol (Update 1/18/11) Rowan will use available resources within the Division of Student Affairs in responding to alleged threats or acts of violence by students. Definitions Threat: A threat is defined as any behavior that suggests

  14. Global Threat Reduction Initiative Fuel Thermo-Physical Characterization Project: Sample Management Plan

    SciTech Connect (OSTI)

    Casella, Amanda J.; Pereira, Mario M.; Steen, Franciska H.

    2013-01-01T23:59:59.000Z

    This sample management plan provides guidelines for sectioning, preparation, acceptance criteria, analytical path, and end-of-life disposal for the fuel element segments utilized in the Global Threat Reduction Initiative (GTRI), Fuel Thermo-Physical Characterization Project. The Fuel Thermo-Physical Characterization Project is tasked with analysis of irradiated Low Enriched Uranium (LEU) Molybdenum (U-Mo) fuel element samples to support the GTRI conversion program. Sample analysis may include optical microscopy (OM), scanning electron microscopy (SEM) fuel-surface interface analysis, gas pycnometry (density) measurements, laser flash analysis (LFA), differential scanning calorimetry (DSC), thermogravimetry and differential thermal analysis with mass spectroscopy (TG /DTA-MS), Inductively Coupled Plasma Spectrophotometry (ICP), alpha spectroscopy, and Thermal Ionization Mass Spectroscopy (TIMS). The project will utilize existing Radiochemical Processing Laboratory (RPL) operating, technical, and administrative procedures for sample receipt, processing, and analyses. Test instructions (TIs), which are documents used to provide specific details regarding the implementation of an existing RPL approved technical or operational procedure, will also be used to communicate to staff project specific parameters requested by the Principal Investigator (PI). TIs will be developed, reviewed, and issued in accordance with the latest revision of the RPL-PLN-700, RPL Operations Plan. Additionally, the PI must approve all project test instructions and red-line changes to test instructions.

  15. Topic/Threat Section Reviewer Comment Response Parameters of

    E-Print Network [OSTI]

    clarification in the document. Modified. Life History Tee Harbor June Pelican late June Modified. Pollution to light, night time acoustic surveys in PWS run with lights out to avoid altering herring behavior Noted

  16. Anomaly Detection in Multiple Scale for Insider Threat Analysis

    SciTech Connect (OSTI)

    Kim, Yoohwan [ORNL] [ORNL; Sheldon, Frederick T [ORNL] [ORNL; Hively, Lee M [ORNL] [ORNL

    2012-01-01T23:59:59.000Z

    We propose a method to quantify malicious insider activity with statistical and graph-based analysis aided with semantic scoring rules. Different types of personal activities or interactions are monitored to form a set of directed weighted graphs. The semantic scoring rules assign higher scores for the events more significant and suspicious. Then we build personal activity profiles in the form of score tables. Profiles are created in multiple scales where the low level profiles are aggregated toward more stable higherlevel profiles within the subject or object hierarchy. Further, the profiles are created in different time scales such as day, week, or month. During operation, the insider s current activity profile is compared to the historical profiles to produce an anomaly score. For each subject with a high anomaly score, a subgraph of connected subjects is extracted to look for any related score movement. Finally the subjects are ranked by their anomaly scores to help the analysts focus on high-scored subjects. The threat-ranking component supports the interaction between the User Dashboard and the Insider Threat Knowledge Base portal. The portal includes a repository for historical results, i.e., adjudicated cases containing all of the information first presented to the user and including any additional insights to help the analysts. In this paper we show the framework of the proposed system and the operational algorithms.

  17. Neutron Interrogation System For Underwater Threat Detection And Identification

    SciTech Connect (OSTI)

    Barzilov, Alexander P.; Novikov, Ivan S.; Womble, Phil C. [Department of Physics and Astronomy, Western Kentucky University, 1906 College Heights Blvd, 11077 Bowling Green, KY 42101 (United States)

    2009-03-10T23:59:59.000Z

    Wartime and terrorist activities, training and munitions testing, dumping and accidents have generated significant munitions contamination in the coastal and inland waters in the United States and abroad. Although current methods provide information about the existence of the anomaly (for instance, metal objects) in the sea bottom, they fail to identify the nature of the found objects. Field experience indicates that often in excess of 90% of objects excavated during the course of munitions clean up are found to be non-hazardous items (false alarm). The technology to detect and identify waterborne or underwater threats is also vital for protection of critical infrastructures (ports, dams, locks, refineries, and LNG/LPG). We are proposing a compact neutron interrogation system, which will be used to confirm possible threats by determining the chemical composition of the suspicious underwater object. The system consists of an electronic d-T 14-MeV neutron generator, a gamma detector to detect the gamma signal from the irradiated object and a data acquisition system. The detected signal then is analyzed to quantify the chemical elements of interest and to identify explosives or chemical warfare agents.

  18. Social/Ethical Issues in Predictive Insider Threat Monitoring

    SciTech Connect (OSTI)

    Greitzer, Frank L.; Frincke, Deborah A.; Zabriskie, Mariah

    2011-01-01T23:59:59.000Z

    Combining traditionally monitored cybersecurity data with other kinds of organizational data is one option for inferring the motivations of individuals, which may in turn allow early prediction and mitigation of insider threats. While unproven, some researchers believe that this combination of data may yield better results than either cybersecurity or organizational data would in isolation. However, this nontraditional approach creates a potential conflict between goals, such as conflicts between organizational security improvements and individual privacy considerations. There are many facets to debate. Should warning signs of a potential malicious insider be addressed before a malicious event has occurred to prevent harm to the organization and discourage the insider from violating the organization’s rules? Would intervention violate employee trust or legal guidelines? What about the possibilities of misuse? Predictive approaches cannot be validated a priori; false accusations can affect the career of the accused; and collection/monitoring of certain types of data may affect employee morale. In this chapter, we explore some of the social and ethical issues stemming from predictive insider threat monitoring and discuss ways that a predictive modeling approach brings to the forefront social and ethical issues that should be considered and resolved by stakeholders and communities of interest.

  19. CAPITAL ASSET DOCUMENT TRAINING

    E-Print Network [OSTI]

    KUALI CAPITAL ASSET MANAGEMENT DOCUMENT TRAINING Business and Financial Services, Property Management Presented by: Rachel Drenth #12;Sign On to the Training Site · CSU CAP (Campus Administration://padroni.is.colostate.edu:7778/portal/page/portal/CAPQA (THEN CHOOSE QUAL 2) · Non-production Applications: Training Kuali

  20. Virtual Gateway Network Documentation

    E-Print Network [OSTI]

    Segall, Adrian

    Virtual Gateway Network Documentation Composed By: Stiven Andre Nikolai Gukov #12;Table of contents.3) VGNET as a network manager 2) VGNET explained 2.1) One PC with multiple Internet access points. 2 both routers. 1.3) VGNET as a network manager Let's look at figure 3 again. The perfect scenario we may

  1. ENERGY REVIEW Consultation Document

    E-Print Network [OSTI]

    ENERGY REVIEW Consultation Document JANUARY 2006 Our Energy Challenge Securing clean, affordable energy for the long-term #12;Our Energy Challenge Securing clean, affordable energy for the long term #12;OUR ENERGY CHALLENGE ­ SECURING CLEAN, AFFORDABLE ENERGY FOR THE LONG TERM ii Why is the government

  2. Computer-aided documentation

    SciTech Connect (OSTI)

    Rosenberg, S.

    1982-01-01T23:59:59.000Z

    Current standards for high-quality documentation of complex computer systems include many criteria, based on the application and user levels. Important points common to many systems are: targeting to specific user groups; being complete, concise, and structured; containing both tutorials and reference material; being field-tested; and being timely in appearance relative to the software delivery. To achieve these goals, uniform quality standards should be more vigorously applied, the documentation development cycle should be shortened, more documentation/software help should be available on line, and more user interaction should be solicited. For future computer systems, the proposal is made that the documentation be machine comprehensible. This should be phased in, with the immediate goal being to facilitate user querying for information, and with an ultimate goal of providing a database for programmer apprentice artificial-intelligence programs that assist software development. This new functionality will be the result of several trends, including the drastically reduced cost of read-only online random-access storage via video optical disks, the ongoing successes of artificial-intelligence programs when applied to limited application areas, and the ever increasing cost of software programmers. 3 references.

  3. Presidential Documents Federal Register

    E-Print Network [OSTI]

    Presidential Documents 3821 Federal Register Vol. 76, No. 14 Friday, January 21, 2011 Title 3, 1993. As stated in that Executive Order and to the extent permitted by law, each agency must, among, such as user fees or marketable permits, or providing information upon which choices can be made by the public

  4. Technical approach document

    SciTech Connect (OSTI)

    Not Available

    1989-12-01T23:59:59.000Z

    The Uranium Mill Tailings Radiation Control Act (UMTRCA) of 1978, Public Law 95-604 (PL95-604), grants the Secretary of Energy the authority and responsibility to perform such actions as are necessary to minimize radiation health hazards and other environmental hazards caused by inactive uranium mill sites. This Technical Approach Document (TAD) describes the general technical approaches and design criteria adopted by the US Department of Energy (DOE) in order to implement remedial action plans (RAPS) and final designs that comply with EPA standards. It does not address the technical approaches necessary for aquifer restoration at processing sites; a guidance document, currently in preparation, will describe aquifer restoration concerns and technical protocols. This document is a second revision to the original document issued in May 1986; the revision has been made in response to changes to the groundwater standards of 40 CFR 192, Subparts A--C, proposed by EPA as draft standards. New sections were added to define the design approaches and designs necessary to comply with the groundwater standards. These new sections are in addition to changes made throughout the document to reflect current procedures, especially in cover design, water resources protection, and alternate site selection; only minor revisions were made to some of the sections. Sections 3.0 is a new section defining the approach taken in the design of disposal cells; Section 4.0 has been revised to include design of vegetated covers; Section 8.0 discusses design approaches necessary for compliance with the groundwater standards; and Section 9.0 is a new section dealing with nonradiological hazardous constituents. 203 refs., 18 figs., 26 tabs.

  5. NEWS AND VIEWS PERSPECTIVE

    E-Print Network [OSTI]

    Mahler, D. Luke

    NEWS AND VIEWS PERSPECTIVE Niche diversification follows key innovation in Antarctic fish radiation Oxford Street, Cambridge MA 02138, USA Antarctic notothenioid fishes provide a fascinating evolu- tionary diversification has occurred repeatedly and in parallel. Keywords: community ecology, fish, macroevolution, phylo

  6. Forward viewing OCT endomicroscopy

    E-Print Network [OSTI]

    Liang, Kaicheng

    2014-01-01T23:59:59.000Z

    A forward viewing fiber optic-based imaging probe device was designed and constructed for use with ultrahigh speed optical coherence tomography in the human gastrointestinal tract. The light source was a MEMS-VCSEL at 1300 ...

  7. Wilderness threats matrix: A framework for assessing impacts. Forest Service research paper

    SciTech Connect (OSTI)

    Cole, D.N.

    1994-04-01T23:59:59.000Z

    The report includes the framework represented as a matrix of potential threats and attributes of wilderness character. Cells in the matrix represent the impacts of threats on each attribute. Potential application of the matrix are described. An application of the matrix to the wildernesses in the Forest Service's Northern Region (northern Idaho and Montana) suggests that fire management is the most significant threat to those wildernesses and that aquatic systems are the most threatened wilderness attribute.

  8. Because It's Not There: Verbal Visuality and the Threat of Graphics in Interactive Fiction

    E-Print Network [OSTI]

    Kashtan, Aaron

    2009-01-01T23:59:59.000Z

    the Threat of Graphics in Interactive Fiction Aaron Kashtantwo contemporary works of interactive fiction (IF), NickHuman Factors Keywords Interactive fiction, ekphrasis, word-

  9. Because It's Not There: Verbal Visuality and the Threat of Graphics in Interactive Fiction

    E-Print Network [OSTI]

    Kashtan, Aaron

    2009-01-01T23:59:59.000Z

    of the power of computer graphics, text still has access tothat are unavailable in graphics – including visual effects.Visuality and the Threat of Graphics in Interactive Fiction

  10. Managing Multiversion Documents & Historical Databases: a Unified Solution Based on XML

    E-Print Network [OSTI]

    Zaniolo, Carlo

    - mentation architectures, one based on native XML DBMS, and the other on mapping the historical XML views back into a relational DBMS. 1. INTRODUCTION Preservation of digital artifacts represents a critical is with multiversion documents, users will want to pose queries on the evolution history of the documents

  11. Public views on multiple dimensions of security : nuclear waepons, terrorism, energy, and the environment : 2007.

    SciTech Connect (OSTI)

    Herron, Kerry Gale (University of Oklahoma, Norman, OK); Jenkins-Smith, Hank C. (University of Oklahoma, Norman, OK)

    2008-01-01T23:59:59.000Z

    We analyze and compare findings from identical national surveys of the US general public on nuclear security and terrorism administered by telephone and Internet in mid-2007. Key areas of investigation include assessments of threats to US security; valuations of US nuclear weapons and nuclear deterrence; perspectives on nuclear proliferation, including the specific cases of North Korea and Iran; and support for investments in nuclear weapons capabilities. Our analysis of public views on terrorism include assessments of the current threat, progress in the struggle against terrorism, preferences for responding to terrorist attacks at different levels of assumed casualties, and support for domestic policies intended to reduce the threat of terrorism. Also we report findings from an Internet survey conducted in mid 2007 that investigates public views of US energy security, to include: energy supplies and reliability; energy vulnerabilities and threats, and relationships among security, costs, energy dependence, alternative sources, and research and investment priorities. We analyze public assessments of nuclear energy risks and benefits, nuclear materials management issues, and preferences for the future of nuclear energy in the US. Additionally, we investigate environmental issues as they relate to energy security, to include expected implications of global climate change, and relationships among environmental issues and potential policy options.

  12. PCA, Continuous, & Epidural Narcotic Infusion Documentation (07.2013) Documentation

    E-Print Network [OSTI]

    Oliver, Douglas L.

    PCA, Continuous, & Epidural Narcotic Infusion Documentation (07.2013) Documentation Required Continuous Narcotic Infusions PCA Only PCA + Basal (Continuous) Infusion Epidural and Epidural PCA Continuous Verification AND Documentation of Dose / Rate of Infusion of · Every 4 hours (may be done as part of change

  13. Document title: Project Document Cover Sheet Last updated: April 2007

    E-Print Network [OSTI]

    Glasgow, University of

    Environment programme 2009-2011 Enhancement (A5) projects Programme Manager Andrew McGregor Document Name Document Title Project Plan Reporting Period N/A Author(s) & project role William J Nixon, Project Manager dissemination Document History Version Date Comments 1.0 30 Apr 09 Draft for JISC Programme Manager 1.1 21 May

  14. Electronic Travel Documents (VE5,

    E-Print Network [OSTI]

    Texas at Austin, University of

    Electronic Travel Documents (VE5, VE6, VP5) 512-471-8802 · askUS@austin.utexas.edu · www ................................................................................................. 10 III. ELECTRONIC RTA - CORRECTION DOCUMENT (VE6 ......................................................................................... 36 C. TRAVEL MANAGEMENT SERVICES

  15. Facility worker technical basis document

    SciTech Connect (OSTI)

    SHULTZ, M.V.

    2003-08-28T23:59:59.000Z

    This technical basis document was developed to support the Tank Farm Documented Safety Analysis (DSA). It describes the criteria and methodology for allocating controls to hazardous conditions with significant facility work consequence and presents the results of the allocation.

  16. Orbitmpi Documentation Lisa L. Lowe

    E-Print Network [OSTI]

    Orbitmpi Documentation Lisa L. Lowe Princeton Plasma Physics Laboratory (September 22, 2000) I. This document gives a general description of how the parallel sections of the code run. It discusses the changes

  17. DEPARTMENTAL EMERGENCY PLAN Guidance Document

    E-Print Network [OSTI]

    Johnston, Daniel

    DEPARTMENTAL EMERGENCY PLAN Guidance Document #12;1 TABLE OF CONTENTS TABLE OF CONTENTS .................................................................................................12 EMERGENCY MANAGEMENT TEAM ........................................................12 ............................................................................................25 ADDITIONAL INFORMATIONAL DOCUMENTS.........................................25 #12;2 THIS PAGE

  18. Documentation and Scanning Tips NUFinancials

    E-Print Network [OSTI]

    Shull, Kenneth R.

    Documentation and Scanning Tips NUFinancials Documentation and Scanning Tips 2/6/2014 - RB © 2014 of a transaction (expense reports, online vouchers, journals, or requisitions) that has been scanned and attached. · All relevant backup documentation that is not scanned and attached to the transaction record should

  19. Developing the Right Test Documentation

    E-Print Network [OSTI]

    and managing testing and test documentation. Over the past 17 years, we have criticized IEEE standard 829 (onDeveloping the Right Test Documentation Cem Kaner, J.D., Ph.D. Department of Computer Sciences Quality Conference #12;2Test Documentation Copyright © 2001 Cem Kaner and James Bach. All rights reserved

  20. RADIOLOGICAL & ENVIRONMENTAL MANAGEMENT GUIDANCE DOCUMENT

    E-Print Network [OSTI]

    Holland, Jeffrey

    RADIOLOGICAL & ENVIRONMENTAL MANAGEMENT GUIDANCE DOCUMENT: Minors in Research Laboratories or Animal Facilities Page 1 of 4 PURPOSE: The purpose of this document is to provide guidance for Purdue sponsored programs which are designed for youth under the age of 15 and which have documented

  1. Managing and Archiving Research Documents

    E-Print Network [OSTI]

    Johannesson, Henrik

    Managing and Archiving Research Documents Summary of "Hantering och arkivering av Documents ­ A Handbook for the Research Activity at the University of Gothenburg) #12;Managing and Archiving a method to manage and archive research documents1 . A project group of approximately 20 researchers formed

  2. EURECOM VPN SSL Documentation utilisateur

    E-Print Network [OSTI]

    Gesbert, David

    EURECOM VPN SSL Documentation utilisateur Valérie Loisel ­ Pascal Gros V 2 Octobre 2014 Table des)................................................................... 14 EURECOM VPN SSL ­ Documentation utilisateur Page 1 #12;Téléchargemetn des applications CEGID/SSH........................................................................................................................... 20 EURECOM VPN SSL ­ Documentation utilisateur Page 2 #12;Introduction Eurecom met à disposition du

  3. INTERNATIONAL STUDENT FINANCIAL DOCUMENTATION FORM

    E-Print Network [OSTI]

    Barrash, Warren

    INTERNATIONAL STUDENT FINANCIAL DOCUMENTATION FORM This form is not an application for financial assistance. This form is REQUIRED before we can provide immigration documents, even if your government, photocopied or faxed supporting financial documents. **List your name as it appears on your passport** Family

  4. INTERNATIONAL STUDENT FINANCIAL DOCUMENTATION FORM

    E-Print Network [OSTI]

    Barrash, Warren

    INTERNATIONAL STUDENT FINANCIAL DOCUMENTATION FORM Please complete this form if you this form and supporting financial documents after you have received your admissions decision. To receive will come from that source. Please attach supporting financial support documents that are less than six

  5. Documentation Requirements for Learning Disabilities

    E-Print Network [OSTI]

    Documentation Requirements for Learning Disabilities Students, faculty, staff, and campus guests wishing to request accommodations due to learning disabilities should refer to the following documentation of interest. C) Documentation must be typed, dated, signed by the evaluator and submitted to ODR

  6. INTERNATIONAL STUDENT FINANCIAL DOCUMENTATION FORM

    E-Print Network [OSTI]

    Barrash, Warren

    INTERNATIONAL STUDENT FINANCIAL DOCUMENTATION FORM Please complete this form if you this form and supporting financial documents after you have received your admissions decision. To receive will come from that source. Please attach original supporting financial support documents, issued in English

  7. Documents | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov. Are you sure you want toworldPowerHome | Documents Memorandum from Secretary Moniz

  8. Appendix A: Conceptual Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternative FuelsSanta3 TableimpurityAppeals byU.S.U.S.

  9. Archived Publications and Documents

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProductsAlternativeOperational Management » HistoryAugust 1,

  10. Document | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn't Your Destiny:Revised Finding of No53197E T ADRAFTJanuary 2004April279Microsoft WordDocument

  11. Document | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T,Office of Policy,Policy ActDetroit7471 Federal Register /Document

  12. Document | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33 1112011AT&T,Office of Policy,Policy ActDetroit7471 Federal RegisterDocument

  13. ARM - Data Documentation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy, science,SpeedingWu,IntelligenceYou are70ARMCommentsDocumentation

  14. GEOSPATIOTEMPORAL DATA MINING IN AN EARLY WARNING SYSTEM FOR FOREST THREATS IN THE UNITED STATES

    E-Print Network [OSTI]

    Mills, Richard

    GEOSPATIOTEMPORAL DATA MINING IN AN EARLY WARNING SYSTEM FOR FOREST THREATS IN THE UNITED STATES F) for the conterminous United States as part of an early warning system to identify threats to forest ecosystems. Cluster States (CONUS) as part of a two tier system: An early warning system that monitors continental-scale ar

  15. Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid

    E-Print Network [OSTI]

    Wang, Wenye

    Review and Evaluation of Security Threats on the Communication Networks in the Smart Grid Zhuo Lu Park, NC 27709 Email: cliff.wang@us.army.mil Abstract--The smart grid, generally referred in the smart grid. In this paper, we aim at classifying and evaluating the security threats

  16. Recommendations for the Next President Pacific Institute Fresh Water: Threats and Opportunities

    E-Print Network [OSTI]

    . Gleicki October 9, 2008 Lack of a National Water Policy As we enter the 21st century, pressures on waterRecommendations for the Next President Pacific Institute Fresh Water: Threats and Opportunities WATER: THREATS AND OPPORTUNITIES Recommendations for the Next President Background Material Dr. Peter H

  17. Climate change is one of the greatest threats facing us today. CICERO's mission

    E-Print Network [OSTI]

    Johansen, Tom Henning

    Climate change is one of the greatest threats facing us today. CICERO's mission is to provide reliable and comprehensive knowledge about all aspects of the climate change problem. Foto: Scanpix #12;Climate change is one of the greatest threats facing us today. CICERO's mission is to provide reliable

  18. Microsoft Word - Document1

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHighandSWPA / SPRA / USACE SWPAURTeC:8CO 2 FoamC M EBoard hiresplansViews:

  19. Document (523k)

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand Jump to:Ezfeedflag JumpID-fTriWildcat 1 Wind Projectsource History ViewZAPZinccellranking

  20. Engineering Aerial view of

    E-Print Network [OSTI]

    Yang, Junfeng

    -neutral Torus 2 Climate Change 4 Combustion and Catalysis Laboratory #12;4 5 1Engineering Revolution 5 #12;6 7Columbia Engineering Plus #12;1 1 2 3 4 5 6 Aerial view of Columbia campus with Columbia Engineering-a liated buildings highlighted in blue Columbia Engineering Plus Engineering Revolution 4

  1. Novel Threat-risk Index Using Probabilistic Risk Assessment and Human Reliability Analysis - Final Report

    SciTech Connect (OSTI)

    George A. Beitel

    2004-02-01T23:59:59.000Z

    In support of a national need to improve the current state-of-the-art in alerting decision makers to the risk of terrorist attack, a quantitative approach employing scientific and engineering concepts to develop a threat-risk index was undertaken at the Idaho National Engineering and Environmental Laboratory (INEEL). As a result of this effort, a set of models has been successfully integrated into a single comprehensive model known as Quantitative Threat-Risk Index Model (QTRIM), with the capability of computing a quantitative threat-risk index on a system level, as well as for the major components of the system. Such a threat-risk index could provide a quantitative variant or basis for either prioritizing security upgrades or updating the current qualitative national color-coded terrorist threat alert.

  2. Microsoft Word - Document7 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    - Document7 Microsoft Word - Document7 More Documents & Publications Excess Uranium Inventory Management Plan 2008 Microsoft Word - 25 May Vienna GTR Fact SheetFINAL 1 .doc...

  3. Documents and Publications | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Documents and Publications Documents and Publications Real Estate Documents Acquisition Guide for Federal Agencies Certified Reality Specialist Biography DOJ Title Standards for...

  4. Fermilab | Director's Policy Manual | Document Hierarchy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Document Hierarchy The Laboratorys document hierarchy ensures top flow down of policy requirements to all levels of documentation created at the Laboratory and to all levels of...

  5. Global threat reduction initiative Russian nuclear material removal progress

    SciTech Connect (OSTI)

    Cummins, Kelly [DOE/NNSA (United States); Bolshinsky, Igor [INL/NNSA (United States)

    2008-07-15T23:59:59.000Z

    In December 1999 representatives from the United States, the Russian Federation, and the International Atomic Energy Agency (IAEA) started discussing a program to return to Russia Soviet- or Russian-supplied highly enriched uranium (HEU) fuel stored at the Russian-designed research reactors outside Russia. Trilateral discussions among the United States, Russian Federation, and the International Atomic Energy Agency (IAEA) have identified more than 20 research reactors in 17 countries that have Soviet- or Russian-supplied HEU fuel. The Global Threat Reduction Initiative's Russian Research Reactor Fuel Return Program is an important aspect of the U.S. Government's commitment to cooperate with the other nations to prevent the proliferation of nuclear weapons and weapons-usable proliferation-attractive nuclear materials. To date, 496 kilograms of Russian-origin HEU have been shipped to Russia from Serbia, Latvia, Libya, Uzbekistan, Romania, Bulgaria, Poland, Germany, and the Czech Republic. The pilot spent fuel shipment from Uzbekistan to Russia was completed in April 2006. (author)

  6. Stereoscopic optical viewing system

    DOE Patents [OSTI]

    Tallman, Clifford S. (Walnut Creek, CA)

    1987-01-01T23:59:59.000Z

    An improved optical system which provides the operator a stereoscopic viewing field and depth of vision, particularly suitable for use in various machines such as electron or laser beam welding and drilling machines. The system features two separate but independently controlled optical viewing assemblies from the eyepiece to a spot directly above the working surface. Each optical assembly comprises a combination of eye pieces, turning prisms, telephoto lenses for providing magnification, achromatic imaging relay lenses and final stage pentagonal turning prisms. Adjustment for variations in distance from the turning prisms to the workpiece, necessitated by varying part sizes and configurations and by the operator's visual accuity, is provided separately for each optical assembly by means of separate manual controls at the operator console or within easy reach of the operator.

  7. Stereoscopic optical viewing system

    DOE Patents [OSTI]

    Tallman, C.S.

    1986-05-02T23:59:59.000Z

    An improved optical system which provides the operator with a stereoscopic viewing field and depth of vision, particularly suitable for use in various machines such as electron or laser beam welding and drilling machines. The system features two separate but independently controlled optical viewing assemblies from the eyepiece to a spot directly above the working surface. Each optical assembly comprises a combination of eye pieces, turning prisms, telephoto lenses for providing magnification, achromatic imaging relay lenses and final stage pentagonal turning prisms. Adjustment for variations in distance from the turning prisms to the workpiece, necessitated by varying part sizes and configurations and by the operator's visual accuity, is provided separately for each optical assembly by means of separate manual controls at the operator console or within easy reach of the operator.

  8. Assessing Effectiveness of Personality Style in Documentation

    E-Print Network [OSTI]

    Novick, David G.

    interfaces ­ Training, help and documentation, theory and methods. General Terms Documentation ManagementAssessing Effectiveness of Personality Style in Documentation Kenneth Sayles. Department conducted a similar experiment, but looking beyond preference to see if the personality of documentation

  9. 1995 DOCUMENTATION GUIDELINES FOR EVALUATION & MANAGEMENT SERVICES

    E-Print Network [OSTI]

    Goldman, Steven A.

    1 1995 DOCUMENTATION GUIDELINES FOR EVALUATION & MANAGEMENT SERVICES I. INTRODUCTION WHAT IS DOCUMENTATION AND WHY IS IT IMPORTANT? Medical record documentation is required to record pertinent facts, examinations, tests, treatments, and outcomes. The medical record chronologically documents the care

  10. 52293Federal Register / Vol. 79, No. 170 / Wednesday, September 3, 2014 / Proposed Rules that even if each threat individually

    E-Print Network [OSTI]

    if each threat individually does not result in population-level effects that may warrant protection). For the other six petitioned species, we have specifically considered whether two or more of the threats or in the foreseeable future. We have no information to suggest that the identified threats to the species will work

  11. 36284 Federal Register / Vol. 79, No. 123 / Thursday, June 26, 2014 / Proposed Rules threat (e.g., fishery interactions, ship

    E-Print Network [OSTI]

    36284 Federal Register / Vol. 79, No. 123 / Thursday, June 26, 2014 / Proposed Rules threat (e concludes that the recovering population in combination with the removal of previously identified threats- and long-term; (7) the effects of other threats, including whaling, disease and predation, contaminants

  12. Detecting Threat-Related Intentional Actions of Others: Effects of Image Quality, Response Mode, and Target Cuing on Vigilance

    E-Print Network [OSTI]

    Parasuraman, Raja

    Detecting Threat-Related Intentional Actions of Others: Effects of Image Quality, Response Mode to detect infrequent threat-related actions. Participants indicated detection of target actions either vigilance task. Irrespective of response mode, the detection rate of intentional threats declined over time

  13. Stereotype Threat Excerpt from Malcolm Gladwell's "The Art of Failure" in the New Yorker, August 21 & 28,

    E-Print Network [OSTI]

    McMains, Sara

    Stereotype Threat Excerpt from Malcolm Gladwell's "The Art of Failure" in the New Yorker, August 21 they call "stereotype threat": when black students are put into a situation where they are directly-- the resulting pressure causes their performance to suffer." "Steele and others have found stereotype threat

  14. Stereotype Threat Reinterpreted as a Regulatory Mismatch Lisa R. Grimm, Arthur B. Markman, W. Todd Maddox, and Grant C. Baldwin

    E-Print Network [OSTI]

    Maddox, W. Todd

    Stereotype Threat Reinterpreted as a Regulatory Mismatch Lisa R. Grimm, Arthur B. Markman, W. Todd of strands of work to identify causes of stereotype threat in a way that allows them to reverse the effects. This work suggests that stereotype threat effects emerge from a prevention focus combined with tasks

  15. Threat of Bodily Harm Has Opposing Effects on Cognition Kesong Hu, Andrew Bauer, Srikanth Padmala, and Luiz Pessoa

    E-Print Network [OSTI]

    Pessoa, Luiz

    Emotion Threat of Bodily Harm Has Opposing Effects on Cognition Kesong Hu, Andrew Bauer, Srikanth., Bauer, A., Padmala, S., & Pessoa, L. (2011, June 27). Threat of Bodily Harm Has Opposing Effects on Cognition. Emotion. Advance online publication. doi: 10.1037/a0024345 #12;Threat of Bodily Harm Has Opposing

  16. INFECTIOUS DISEASE OUTBREAKS Avian Flu, measles, Mumps, SARs, and other infectious diseases can pose a threat to the

    E-Print Network [OSTI]

    Meyers, Steven D.

    pose a threat to the University community as they do to communities worldwide. If there is an outbreak has extensive information on these and other health threats on their website (http are appropriate to the emerging threat and ready for implementation. Response team meets with increasing frequency

  17. 34.07.99.M0.02 Bomb Threat Procedures Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    34.07.99.M0.02 Bomb Threat Procedures Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 34.07.99.M0.02 Bomb Threat Procedures Approved September 25, 2001 Revised April 30, 2010 Next scheduled review: April 4, 2016 Standard Administrative Procedure Statement Any and all bomb threats are regarded seriously

  18. DownloadedBy:[NorthwesternUniversity]At:03:5419April2008 Conscious intrusion of threat information via

    E-Print Network [OSTI]

    Reber, Paul J.

    DownloadedBy:[NorthwesternUniversity]At:03:5419April2008 Conscious intrusion of threat information University, Chicago, IL, USA Preferential processing of threat has been implicated in the development and perpetuation of anxiety. We investigated threat processing and anxiety using a subliminal priming paradigm

  19. FACILITY WORKER TECHNICAL BASIS DOCUMENT

    SciTech Connect (OSTI)

    SHULTZ, M.V.

    2005-03-31T23:59:59.000Z

    This technical basis document was developed to support RPP-13033, ''Tank Farms Documented Safety Analysis (DSA). It describes the criteria and methodology for allocating controls to hazardous conditions with significant facility worker (FW) consequence and presents the results of the allocation. The criteria and methodology for identifying controls that address FW safety are in accordance with DOE-STD-3009-94, ''Preparation Guide for US Department of Energy Nonreactor Nuclear Facility Documented Safety Analyses''.

  20. Cryptographic Trust Management System Design Document

    SciTech Connect (OSTI)

    Edgar, Thomas W.; Clements, Samuel L.; Hadley, Mark D.; Maiden, Wendy M.; Manz, David O.; Zabriskie, Sean J.

    2010-08-04T23:59:59.000Z

    Deliverable for DOE NSTB Cryptographic Trust Management project. Design document to follow the Requirements document submitted in Sept 2009.

  1. Utility Energy Services Contracts: Enabling Documents Overview...

    Energy Savers [EERE]

    Utility Energy Services Contracts: Enabling Documents Overview Utility Energy Services Contracts: Enabling Documents Overview Presentation covers the utility energy service...

  2. Appendix B (Documentation of Consultation)

    E-Print Network [OSTI]

    Lee, Dongwon

    #12;#12;#12;#12;Appendix B (Documentation of Consultation) PSU and LCCC have entered this agreement Provost and Dean for Enrollment Management & Admissions Penn State University #12;

  3. Prism++ Documentation University of Erlangen

    E-Print Network [OSTI]

    Breu, Ruth

    ! "monk-it" Prism++ Documentation University of Erlangen Computer Networks and Communication.2.1. Correlation engine management . . . . . . . . . . . . . . . . . . . . 8 2.2.2. Analysis of collected events

  4. Appendix B: (Documentation of Consultation)

    E-Print Network [OSTI]

    Lee, Dongwon

    #12;#12;#12;#12;#12;#12;Appendix B: (Documentation of Consultation) PSU and NCC have entered Management & Admissions Penn State University #12;

  5. Multi-view kernel construction

    E-Print Network [OSTI]

    Sa, Virginia R.; Gallagher, Patrick W.; Lewis, Joshua M.; Malave, Vicente L.

    2010-01-01T23:59:59.000Z

    5157-z Multi-view kernel construction Virginia R. de Sa ·multiple different graph construction algorithms. The Ng et

  6. Darwin's Pangenesis and the Problem of Unconceived Alternatives P. Kyle Stanford has argued that the most substantial threat to scientific realism

    E-Print Network [OSTI]

    Barrett, Jeffrey A.

    argued that the most substantial threat to scientific realism arises from the problem of unconceived significant threat to scientific realism derives neither from traditional underdetermination arguments nor

  7. TotalView Training

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening a solidSynthesisAppliances » Top InnovativeTopoisomeraseTotalView

  8. Threat assessment for safe navigation in environments with uncertainty in predictability

    E-Print Network [OSTI]

    Aoudé, Georges Salim

    2011-01-01T23:59:59.000Z

    This thesis develops threat assessment algorithms to improve the safety of the decision making of autonomous and human-operated vehicles navigating in dynamic and uncertain environments, where the source of uncertainty is ...

  9. What Happens When Low Status Groups Start Moving Up? Prejudice and Threat to Group Position

    E-Print Network [OSTI]

    Nierman, Angela J.

    2007-11-20T23:59:59.000Z

    Does threat operate as a cause or a consequence of prejudice? Three studies investigated how high status groups respond to low status groups' advances. I hypothesized that gays' status gains are threatening to heterosexuals' privileged group...

  10. CERNA WORKING PAPER SERIES Spatial price homogeneity as a mechanism to reduce the threat of

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    district heating sector in 2007, confirms the theoretical predictions. Keywords: regulatory threat, district heating, Sweden JEL Classification: L12, L21, L51, L97 hal-00659458,version1-12Jan2012 #12;2 1

  11. A unified framework for trajectory planning, threat assessment, and semi-autonomous control of passenger vehicles

    E-Print Network [OSTI]

    Anderson, Sterling J., Ph. D. Massachusetts Institute of Technology

    2009-01-01T23:59:59.000Z

    This thesis describes the design of an active safety framework that performs trajectory planning, threat assessment, and semi-autonomous control of passenger vehicles in hazard avoidance scenarios. The vehicle navigation ...

  12. Tackling the Triple-Threat Genome of Miscanthus x giganteus (2010 JGI User Meeting)

    ScienceCinema (OSTI)

    Moose, Steve

    2011-04-25T23:59:59.000Z

    Steve Moose from the University of Illinois at Urbana-Champaign and the Energy Biosciences Institute on "Tackling the Triple-Threat Genome of Miscanthus x giganteus" on March 25, 2010 at the 5th Annual DOE JGI User Meeting

  13. Jack N. Summe Director, Navy Insider Threat to Cyber Security (ITCS)

    E-Print Network [OSTI]

    Jack N. Summe Director, Navy Insider Threat to Cyber Security (ITCS) Mr. Jack Summe currently Psychological Operations Group (Airborne) from 2003-2005. A native of Warsaw, Indiana, he holds a bachelor

  14. Anomaly metrics to differentiate threat sources from benign sources in primary vehicle screening.

    SciTech Connect (OSTI)

    Cohen, Israel Dov; Mengesha, Wondwosen

    2011-09-01T23:59:59.000Z

    Discrimination of benign sources from threat sources at Port of Entries (POE) is of a great importance in efficient screening of cargo and vehicles using Radiation Portal Monitors (RPM). Currently RPM's ability to distinguish these radiological sources is seriously hampered by the energy resolution of the deployed RPMs. As naturally occurring radioactive materials (NORM) are ubiquitous in commerce, false alarms are problematic as they require additional resources in secondary inspection in addition to impacts on commerce. To increase the sensitivity of such detection systems without increasing false alarm rates, alarm metrics need to incorporate the ability to distinguish benign and threat sources. Principal component analysis (PCA) and clustering technique were implemented in the present study. Such techniques were investigated for their potential to lower false alarm rates and/or increase sensitivity to weaker threat sources without loss of specificity. Results of the investigation demonstrated improved sensitivity and specificity in discriminating benign sources from threat sources.

  15. Reader-Friendly Environmental Documents

    E-Print Network [OSTI]

    Minnesota, University of

    the portions of the EIS that are useful to decision makers and the public 40 CFR 1502.8: Environmental impact and the public can readily understand them. 40 CFR 1502.2: Environmental impact statements shall be analyticReader-Friendly Environmental Documents Reader-Friendly Environmental Documents Improving the way

  16. Research documentation per participating group

    E-Print Network [OSTI]

    Franssen, Michael

    Research documentation per participating group #12;2. RESEARCH DOCUMENTATION OF THE GROUP SYSTEM Management Hybrid trucks StDy Steen, R. v.d. (PhD 3) FEM Tyre Modelling StDy 5.4 Mechanical Design Bedem, Ir

  17. Document: Outside Employment/ Consulting Form

    E-Print Network [OSTI]

    Quigg, Chris

    Document: Outside Employment/ Consulting Form Document #: SO-2 Issue date: 8/21/09 Revision #: 3 on the WDRS website. OUTSIDE EMPLOYMENT/CONSULTING Fermilab employees are entitled to the same rights and privileges with respect to outside employment as other citizens. Therefore, there is no general prohibition

  18. SRS ecology: Environmental information document

    SciTech Connect (OSTI)

    Wike, L.D.; Shipley, R.W.; Bowers, J.A. [and others

    1993-09-01T23:59:59.000Z

    The purpose of this Document is to provide a source of ecological information based on the exiting knowledge gained from research conducted at the Savannah River Site. This document provides a summary and synthesis of ecological research in the three main ecosystem types found at SRS and information on the threatened and endangered species residing there.

  19. Facility worker technical basis document

    SciTech Connect (OSTI)

    EVANS, C.B.

    2003-03-21T23:59:59.000Z

    This report documents the technical basis for facility worker safety to support the Tank Farms Documented Safety Analysis and described the criteria and methodology for allocating controls to hazardous conditions with significant facility worker consequences and presents the results of the allocation.

  20. Document6 April 2007 ENTERTAINMENT

    E-Print Network [OSTI]

    Gleeson, Joseph G.

    Document6 April 2007 ENTERTAINMENT Farewell Gatherings The Department of Medical Education would like to remind all managers and supervisors that, in accordance with UCSD Policy, entertainment that has been designated for graduate student recruitment #12;Document6 April 2007 Hosting prospective

  1. Protective laser beam viewing device

    DOE Patents [OSTI]

    Neil, George R.; Jordan, Kevin Carl

    2012-12-18T23:59:59.000Z

    A protective laser beam viewing system or device including a camera selectively sensitive to laser light wavelengths and a viewing screen receiving images from the laser sensitive camera. According to a preferred embodiment of the invention, the camera is worn on the head of the user or incorporated into a goggle-type viewing display so that it is always aimed at the area of viewing interest to the user and the viewing screen is incorporated into a video display worn as goggles over the eyes of the user.

  2. DISCLOSURE OF EDUCATION RECORDS IN HEALTH AND SAFETY EMERGENCIES If the university determines that there is an articulable and significant threat to the health or safety of a student or

    E-Print Network [OSTI]

    Duchowski, Andrew T.

    If the university determines that there is an articulable and significant threat individuals. · ``Articulable and significant threat'' means that if a school reasonably believes that a student poses a significant threat, such as a threat

  3. False color viewing device

    DOE Patents [OSTI]

    Kronberg, J.W.

    1991-05-08T23:59:59.000Z

    This invention consists of a viewing device for observing objects in near-infrared false-color comprising a pair of goggles with one or more filters in the apertures, and pads that engage the face for blocking stray light from the sides so that all light reaching, the user`s eyes come through the filters. The filters attenuate most visible light and pass near-infrared (having wavelengths longer than approximately 700 nm) and a small amount of blue-green and blue-violet (having wavelengths in the 500 to 520 nm and shorter than 435 nm, respectively). The goggles are useful for looking at vegetation to identify different species and for determining the health of the vegetation, and to detect some forms of camouflage.

  4. False color viewing device

    DOE Patents [OSTI]

    Kronberg, James W. (108 Independent Blvd., Aiken, SC 29801)

    1992-01-01T23:59:59.000Z

    A viewing device for observing objects in near-infrared false-color comprising a pair of goggles with one or more filters in the apertures, and pads that engage the face for blocking stray light from the sides so that all light reaching the user's eyes come through the filters. The filters attenuate most visible light and pass near-infrared (having wavelengths longer than approximately 700 nm) and a small amount of blue-green and blue-violet (having wavelengths in the 500 to 520 nm and shorter than 435 nm, respectively). The goggles are useful for looking at vegetation to identify different species and for determining the health of the vegetation, and to detect some forms of camouflage.

  5. False color viewing device

    DOE Patents [OSTI]

    Kronberg, J.W.

    1992-10-20T23:59:59.000Z

    A viewing device for observing objects in near-infrared false-color comprising a pair of goggles with one or more filters in the apertures, and pads that engage the face for blocking stray light from the sides so that all light reaching the user's eyes come through the filters. The filters attenuate most visible light and pass near-infrared (having wavelengths longer than approximately 700 nm) and a small amount of blue-green and blue-violet (having wavelengths in the 500 to 520 nm and shorter than 435 nm, respectively). The goggles are useful for looking at vegetation to identify different species and for determining the health of the vegetation, and to detect some forms of camouflage. 7 figs.

  6. The view from Kiev

    SciTech Connect (OSTI)

    Kiselyov, S.

    1993-11-01T23:59:59.000Z

    This article reports the observations of correspondents for the Bulletin (two Russian journalists, one based in Moscow, the other in Kiev) who investigated the status of the Soviet Union's Black Sea Fleet and Ukraine's status as a non-nuclear-weapons state. After two years of wrangling and two earlier failed settlements, Russian President Boris Yeltsin met with Ukrainian President Leonid Kravchuk at Massandra in Crimea. On September 3, the leaders announced that Russia would buy out Ukraine's interest in the fleet and lease the port at Sevastopol. The Massandra summit was also supposed to settle Ukraine's status as a non-nuclear-weapons state. Described here are the Kiev-based correspondent's views on the Massandra summit (and its major topics), which was to have been called off by the Russian foreign ministry when Ukrainian Prime Minister Leonid Kuchma resigned.

  7. The Laws of Documentation - Engineering Document Control for Telecommunication Systems

    E-Print Network [OSTI]

    Sullivan, Terrence E.

    2008-05-16T23:59:59.000Z

    The purpose of this field project is to create a documentation system that allows co-workers at a telecommunication company to store files on a shared LAN and retrieve that information quickly, easily and confidently when ...

  8. REQUIRED DOCUMENTATION AND APPROVAL FOR CASH DISBURSEMENTS Disbursements to: Documentation** Approval***

    E-Print Network [OSTI]

    Baltisberger, Jay H.

    REQUIRED DOCUMENTATION AND APPROVAL FOR CASH DISBURSEMENTS Disbursements to: Documentation, Invoices, Documents must be original. Requests for cash to pay for supplies, etc. before they are purchased

  9. Document creation, linking, and maintenance system

    DOE Patents [OSTI]

    Claghorn, Ronald (Pasco, WA)

    2011-02-15T23:59:59.000Z

    A document creation and citation system designed to maintain a database of reference documents. The content of a selected document may be automatically scanned and indexed by the system. The selected documents may also be manually indexed by a user prior to the upload. The indexed documents may be uploaded and stored within a database for later use. The system allows a user to generate new documents by selecting content within the reference documents stored within the database and inserting the selected content into a new document. The system allows the user to customize and augment the content of the new document. The system also generates citations to the selected content retrieved from the reference documents. The citations may be inserted into the new document in the appropriate location and format, as directed by the user. The new document may be uploaded into the database and included with the other reference documents. The system also maintains the database of reference documents so that when changes are made to a reference document, the author of a document referencing the changed document will be alerted to make appropriate changes to his document. The system also allows visual comparison of documents so that the user may see differences in the text of the documents.

  10. A Documentation Consortium Ted Habermann, NOAA

    E-Print Network [OSTI]

    A Documentation Consortium Ted Habermann, NOAA Documentation: It's not just discovery... 50% change this settles the issue.. #12;New Documentation Needs For skeptics, the 1,000 or so e-mails and documents hacked Communities - Users Documentation: communicating with the future #12;Geoffrey Moore has attributed the S

  11. DOCUMENTATION 04.22.13

    E-Print Network [OSTI]

    Stuart, Steven J.

    high-quality "snapshot" files per student. Process: Images showing the process by which the work was developed, put in appropriate sequence. This should illustrate how the work was produced. FORMAT _ Digital documentation

  12. Acceptable Documents for Identity Proofing

    Broader source: Energy.gov [DOE]

    It is a requirement that the identity of a DOE Digital Identity Subscriber be verified against acceptable identity source documents. A Subscriber must appear in person and present their Federal...

  13. Vermont Documentation University of Erlangen

    E-Print Network [OSTI]

    Breu, Ruth

    ! "monk-it" Vermont Documentation University of Erlangen Computer Networks and Communication . . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.2. Vermont Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 1.2.1. Controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 1.2.2. Manager

  14. Appendix B: (Documentation of Consultation)

    E-Print Network [OSTI]

    Lee, Dongwon

    #12;#12;#12;#12;Appendix B: (Documentation of Consultation) PSU and WCCC have entered John J. Romano 6/30/05 John J. Romano, Ph.D. Date Vice Provost and Dean for Enrollment Management

  15. Annotation persistence over dynamic documents

    E-Print Network [OSTI]

    Wang, Shaomin, 1969-

    2005-01-01T23:59:59.000Z

    Annotations, as a routine practice of actively engaging with reading materials, are heavily used in the paper world to augment the usefulness of documents. By annotation, we include a large variety of creative manipulations ...

  16. A Step Towards Automatic Documentation

    E-Print Network [OSTI]

    Frank, Claude

    This paper describes a system which automatically generates program documentation. Starting with a plan generated by analyzing the program, the system computes several kinds of summary information about the program. The ...

  17. Threat-aware Path Planning in Uncertain Urban Environments Georges S. Aoude, Brandon D. Luders, Daniel S. Levine, and Jonathan P. How

    E-Print Network [OSTI]

    How, Jonathan P.

    Threat-aware Path Planning in Uncertain Urban Environments Georges S. Aoude, Brandon D. Luders intents. We propose a novel threat assessment module, consisting of an intention predictor and a threat assessor, which augments the host vehicle's path planner with a real-time threat value representing

  18. Situation Threat Assessment Policy and Protocol (Updated 9/1/11) Rowan University is committed to promoting a safe and secure learning environment. It is

    E-Print Network [OSTI]

    Rusu, Adrian

    Situation Threat Assessment Policy and Protocol (Updated 9/1/11) Rowan University is committed resources within the Division of Student Life in responding to alleged threats or acts of violence by students. Definitions Threat: A threat is defined as any behavior that suggests intent to harm self

  19. Advanced control documentation for operators

    SciTech Connect (OSTI)

    Ayral, T.E. (Mobil Oil, Torrance, CA (US)); Conley, R.C. (Profimatics, Inc., Thousand Oaks, CA (US)); England, J.; Antis, K. (Ashland Oil, Ashland, KY (US))

    1988-09-01T23:59:59.000Z

    Advanced controls were implemented on Ashland Oil's Reduced Crude Conversion (RCC) and Metals Removal System (MRS) units, the RCC and MRS main fractionators and the unit gas plant. This article describes the format used for the operator documentation at Ashland. Also, a potential process unit problem is described which can be solved by good operator documentation. The situation presented in the paper is hypothetical, however,the type of unit upset described an occur if proper precautions are not taken.

  20. Radioactive and other environmental threats to the United States and the Arctic resulting from past Soviet activities

    SciTech Connect (OSTI)

    NONE

    1993-12-31T23:59:59.000Z

    Earlier this year the Senate Intelligence Committee began to receive reports from environmental and nuclear scientists in Russia detailing the reckless nuclear waste disposal practices, nuclear accidents and the use of nuclear detonations. We found that information disturbing to say the least. Also troubling is the fact that 15 Chernobyl style RBMK nuclear power reactors continue to operate in the former Soviet Union today. These reactors lack a containment structure and they`re designed in such a way that nuclear reaction can actually increase when the reactor overheats. As scientists here at the University of Alaska have documented, polar air masses and prevailing weather patterns provide a pathway for radioactive contaminants from Eastern Europe and Western Russia, where many of these reactors are located. The threats presented by those potential radioactive risks are just a part of a larger Arctic pollution problem. Every day, industrial activities of the former Soviet Union continue to create pollutants. I think we should face up to the reality that in a country struggling for economic survival, environment protection isn`t necessarily the high priority. And that could be very troubling news for the Arctic in the future.