Powered by Deep Web Technologies
Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Image upload with broken thumbnail image | OpenEI Community  

Open Energy Info (EERE)

Image upload with broken thumbnail image Image upload with broken thumbnail image Home > Groups > Developer Rmckeel's picture Submitted by Rmckeel(297) Contributor 20 July, 2012 - 07:55 bug images wiki OpenEI users can upload images to the wiki by typing a new file name http://en.openei.org/wiki/File:My_new_file.jpg However, due to a caching timing issue, right after upload, the 120px-wide thumbnail has not yet been created by the time the fetier cache goes after it. Thus, the thumbnail appears broken. Is anyone up for debugging? For users uploading images, this can be fixed by forcing a reload of the page: Windows: ctrl + F5 Mac/Apple: Apple + R or command + R Linux: F5 Thanks! DIAGNOSTIC INFORMATION: BROKEN THUMBNAIL IMAGE HEADERS (RIGHT IMAGE, BUT CACHED BEFORE THUMBNAIL CREATED): Request URL:http://prod-http-80-800498448.us-east-1.elb.amazonaws.com/w/images/thumb/4/44/Powered_by_OpenEI_196x49_sc.png/120px-Powered_by_OpenEI_196x49_sc.png

2

How can an external application get access to OpenEI images and thumbnails?  

Open Energy Info (EERE)

How can an external application get access to OpenEI images and thumbnails? How can an external application get access to OpenEI images and thumbnails? Home > Groups > Developer I'm building an external application in Simile Exhibit. Through an Ask query (http://en.openei.org/wiki/Special:Ask), I can get the name of a file. But how do I present an image of that file? Submitted by Rmckeel on 18 October, 2012 - 07:04 1 answer Points: 0 If you know the name of the file and want the original uploaded size, try the built-in function http://en.openei.org/wiki/Special:FilePath. If you want a specific size, try http://en.openei.org/wiki/Special:FilepathThumbnail. For instance, you can have the app go here: http://en.openei.org/wiki/Special:FilepathThumbnail?file=NREL.png&max-width=200 which will produce the NREL logo image with a max width of 200 pixels.

3

bug | OpenEI Community  

Open Energy Info (EERE)

bug bug Home Rmckeel's picture Submitted by Rmckeel(297) Contributor 20 July, 2012 - 07:55 Image upload with broken thumbnail image bug images wiki OpenEI users can upload images to the wiki by typing a new file name http://en.openei.org/wiki/File:My_new_file.jpg However, due to a caching timing issue, right after upload, the 120px-wide thumbnail has not yet been created by the time the fetier cache goes after it. Thus, the thumbnail appears broken. Is anyone up for debugging? For users uploading images, this can be fixed by forcing a reload of the page: Rmckeel's picture Submitted by Rmckeel(297) Contributor 19 June, 2012 - 08:04 "Ghost" entries bug utility rate There is an issue that Illinois State University has come across. From Nick B: Syndicate content 429 Throttled (bot load)

4

Document Icons and Page Thumbnails: Issues in Construction of Document  

E-Print Network (OSTI)

Document Icons and Page Thumbnails: Issues in Construction of Document Thumbnails for Page appropriately. #12;Document Icons and Page Thumbnails: Issues in Construction of Document Thumbnails for Page, called doc- ument icons, are discussed; one algorithm, called log-area, seems most effective. 1

Janssen, Bill

5

Water Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Bugs Bugs Nature Bulletin No. 221-A March 12, 1966 Forest Preserve District of Cook County Seymour Simon, President Roland F. Eisenbeis, Supt. of Conservation WATER BUGS It is fascinating to lie in a boat or on a log at the edge of the water and watch the drama that unfolds among the small water animals. Among the star performers in small streams and ponds are the Water Bugs. These are aquatic members of that large group of insects called the "true bugs", most of which live on land. Moreover, unlike many other types of water insects, they do not have gills but get their oxygen directly from the air. Those that do go beneath the surface usually carry an oxygen supply with them in the form of a shiny glistening sheath of air imprisoned among a covering of fine waterproof hairs. The common water insect known to small boys at the "Whirligig Bug" is not a water bug but a beetle.

6

Faster document navigation with space-filling thumbnails  

Science Journals Connector (OSTI)

Scrolling is the standard way to navigate through many types of digital documents. However, moving more than a few pages can be slow because all scrolling techniques constrain visual search to only a small document region. To improve document navigation, ... Keywords: document navigation, scrolling, thumbnails, zooming

Andy Cockburn; Carl Gutwin; Jason Alexander

2006-04-01T23:59:59.000Z

7

A bug's leaf | EMSL  

NLE Websites -- All DOE Office Websites (Extended Search)

A bug's leaf A bug's leaf Leaf-cutter ant fungus gardens give bioenergy-relevant information Leafcutter ants cultivate gardens of fungi and bacteria. Photo courtesy of Alejandro...

8

Massive June Bug Emergence  

NLE Websites -- All DOE Office Websites (Extended Search)

Massive June Bug Emergence Massive June Bug Emergence Name: Cordell Location: N/A Country: N/A Date: N/A Question: We are infested with june bugs next to the street light near the end of my driveway. They have burrowed into the ground and underneath my driveway. Yesterday we shoveled 2/3 of a 33-gallon trash bag of just bugs. What can we spray or do to kill these june bugs? Replies: Not knowing which part of the country you are from and I could be wrong because of this fact buy this does not sound like June Bugs. This has to be a Circadia outbreak which are relatives to the June Bug. They run in 13, 17 or other year cycles and this depends upon the part of the country you are from. Ask a local garden center or naturalist and you'll probably see that this won't happen again for a number of years to come.

9

Method-level bug prediction  

Science Journals Connector (OSTI)

Researchers proposed a wide range of approaches to build effective bug prediction models that take into account multiple aspects of the software development process. Such models achieved good prediction performance, guiding developers towards those parts ... Keywords: code metrics, fine-grained source code changes, method-level bug prediction

Emanuel Giger; Marco D'Ambros; Martin Pinzger; Harald C. Gall

2012-09-01T23:59:59.000Z

10

Chinch Bugs in St. Augustine Lawns  

E-Print Network (OSTI)

Chinch bugs can be extremely damaging to home lawns. Their feeding causes small yellow or brown areas in lawns. Chinch bugs can usually be seen on careful inspection of the soil surface. Insecticides provide effective control....

Merchant, Michael E.; Mott, Dale

2006-10-17T23:59:59.000Z

11

Team Bug Bag Biogas For Nicaragua  

E-Print Network (OSTI)

Team Bug Bag Biogas For Nicaragua Project Recap The task for Team Bug Bag was to create for under $100 (USD), and be able to produce biogas that could boil water for a thirty minute time period

Demirel, Melik C.

12

Summary of Bugs Database Jeremy Kepner  

E-Print Network (OSTI)

written to create the current version of the bugs database. 1.2 Brief Project History Development1 Summary of Bugs Database Jeremy Kepner September, 1993 1. Introduction 1.1 Document Purpose of the Bugs database began in May of 1992. Initially, a very simple database model was used. By July

Kepner, Jeremy

13

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially...

14

U-047: Siemens Automation License Manager Bugs Let Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

15

U-012: BlackBerry Enterprise Server Collaboration Service Bug...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug...

16

Scale Insects and Mealy Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Scale Insects and Mealy Bugs Scale Insects and Mealy Bugs Nature Bulletin No. 404-A January 30, 1971 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation SCALE INSECTS AND MEALY BUGS The insect world contains an enormous number and variety of species but, of them all, the Scale Insects and Mealy Bugs come nearest to being vegetables. Most insects are active animals that fly, hop, scamper, crawl or burrow, but these queer creatures spend most of their lives merely sitting in one spot, sucking plant juices from a branch, twig, leaf, or fruit. Some of our most destructive pests are included among the several hundred kinds of these highly specialized insects. They are so small that the average person seldom realizes that they are responsible for the sickly or dying condition of a tree or shrub. Adult scale insects are extremely variable in shape, and range in size from that of a pinhead up to forms which are a quarter of an inch long. Each hides under a hard protective shell, or scale, of wax secreted by pores on its body, and are frequently so numerous that they form a dense crust. The females molt a few times, and usually discard their legs and wings, before they mature. She lays eggs under the scale and then dies. These hatch into young (called "crawlers") which move around for a period varying from a few hours to a day or two before they settle down and build scales. Unlike the female, the male -always the smaller of the two -- goes through a cocoon stage from which he emerges with a pair of wings but with no means of taking food. He merely mates and dies. Males are scarce In most kinds and in many species have never been seen.

17

Dynamically fighting bugs : prevention, detection and elimination  

E-Print Network (OSTI)

This dissertation presents three test-generation techniques that are used to improve software quality. Each of our techniques targets bugs that are found by different stake-holders: developers, testers, and maintainers. ...

Artzi, Shay

2009-01-01T23:59:59.000Z

18

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...most do not come with quality efficacy data; an industry standard can review these...Anonymous. 2010. Bedbug bites becoming bigger battle. CMAJ 182 : 1606. 19. Anonymous...bug (Hemiptera: Cimicidae) by static electricity and air currents. J. Entomol. Sci...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peñas; Richard C. Russell

2012-01-01T23:59:59.000Z

19

U-153: EMC Data Protection Advisor Server and Collector Bugs...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service...

20

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...assist those who cannot pay the high price of control, bed bugs are set to...antigen and bronchial asthma in Egypt. J. Egypt. Soc. Parasitol. 21 : 735-746...Doggett, SL . 2009. Identification natural history, p 13-22. InSL Doggett...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peñas; Richard C. Russell

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

22

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

23

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

63: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain...

24

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy Savers (EERE)

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit...

25

Microsoft Word - Final BUGS article final.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

of a good peak resource (Figure 1). Characteristics of a Good Peak Resource Demand Response Program Central- Station Peaker BUGS for Peaks Close to the Load ...

26

U-052: HP Protect Tools Device Access Manager Unspecified Bug...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Flaw Lets Remote Users Update Firmware with Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-049:...

27

History's Worst Software Bugs By Simson Garfinkel Story location: http://www.wired.com/news/technology/bugs/0,2924,69355,00.html  

E-Print Network (OSTI)

they lurk within our cell phones and our pacemakers, our power plants and medical equipment. And now, in our working for the U.S. Central Intelligence Agency allegedly (.pdf) plant a bug in a Canadian computer: "first actual case of a bug being found." Sixty years later, computer bugs are still with us, and show

Overstreet, C. Michael

28

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

29

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

30

V-098: Linux Kernel Extended Verification Module Bug Lets Local...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT...

31

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

CDwnBindInfo Object Reuse Flaw Lets Remote Users Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code...

32

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch). Addthis Related Articles U-232: Xen p2mteardown() Bug...

33

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

33: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31,...

34

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm...

35

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated...  

Office of Environmental Management (EM)

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain...

36

U-201: HP System Management Homepage Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

01: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM:...

37

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...  

Energy Savers (EERE)

and enhancement update U-068:Linux Kernel SGIO ioctl Bug Lets Local Users Gain Elevated Privileges T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update...

38

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets...  

Office of Environmental Management (EM)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service...

39

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote...

40

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

system. SOLUTION: The vendor has issued a fix(11.52) Addthis Related Articles V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-171: Apple Safari Bugs Let...

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote...

42

Microsoft Word - Final BUGS article final.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

October 18, 2010 DOE/NETL-2010/1435 BUGS: The Next Smart Grid Peak Resource? BUGS: The Next Smart Grid Peak Resource? 2 Prepared by: Booz Allen Hamilton (BAH) Steve Pullins Horizon Energy Group DOE Contract number: DE-FE000400 BUGS: The Next Smart Grid Peak Resource? 3 Acknowledgements This report was prepared by Booz Allen Hamilton, Inc. (BAH) for the United States Department of Energy's National Energy Technology Laboratory. This work was completed under DOE NETL Contract Number DE-FE000400, and performed under BAH Task 430.04. The authors wish to acknowledge the excellent guidance, contributions, and cooperation of the NETL staff, particularly: Steven Bossart, Integrated Electric Power Systems Division Director Keith Dodrill, Integrated Electric Power Systems Division NETL Technical Monitor

43

Lockout: Efficient Testing for Deadlock Bugs Ali Kheradmand  

E-Print Network (OSTI)

Lockout: Efficient Testing for Deadlock Bugs Ali Kheradmand School of Computer and Communication introduce Lockout, a technique and a tool that increases the proba- bility of deadlock manifestation and the testing infrastructure. Lockout produces binaries that are more prone to deadlock compared to native

Candea, George

44

Foiling the Flu Bug Global Partnerships for Nuclear Energy  

E-Print Network (OSTI)

1 1663 Foiling the Flu Bug Global Partnerships for Nuclear Energy Dark Universe Mysteries WILL NOT NEED TESTING Expanding Nuclear Energy the Right Way GLOBAL PARTNERSHIPS AND AN ADVANCED FUEL CYCLE sense.The Laboratory is operated by Los Alamos National Security, LLC, for the Department of Energy

45

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may...

46

History Images  

NLE Websites -- All DOE Office Websites (Extended Search)

History Images History Images Los Alamos History in Images Los Alamos has a proud history and heritage of almost 70 years of science and innovation. The people of the Laboratory work on advanced technologies to provide the best scientific and engineering solutions to many of the nation's most crucial security challenges. Click thumbnails to enlarge. Photos arranged by most recent first, horizontal formats before vertical. See Flickr for more sizes and details. Back in the day Back in the day LA bridge in Los Alamos LA bridge in Los Alamos 1945 Army-Navy "E" Award 1945 Army-Navy "E" Award Louis Rosen Louis Rosen Bob Van Ness Robert Kuckuck and Michael Anastasio Bob Van Ness Robert Kuckuck and Michael Anastasio TA-18 TA-18 Elmer Island TU-4 assembly area Elmer Island TU-4 assembly area

47

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site 68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code March 2, 2011 - 3:05pm Addthis PROBLEM: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code. PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code. reference LINKS:

48

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct...

49

U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...  

Energy Savers (EERE)

Netcool Reporter Support and Downloads . Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-048:...

50

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Restrict access to trusted users only. Addthis Related Articles U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-046:...

51

OpenEI/URDB Bug? | OpenEI Community  

Open Energy Info (EERE)

OpenEI/URDB Bug? OpenEI/URDB Bug? Home > Groups > Utility Rate Clarknd's picture Submitted by Clarknd(20) Member 26 November, 2012 - 07:39 I ran into a problem today on the Utility Rate Database (URDB). Every time I select the "Assume net metering (buy = sell)" box and go to save the page for some reason it doesn't save that change and reverts back to "No" rather than "Yes". Groups: Utility Rate Login to post comments Latest discussions Rmckeel New page curation tool Posted: 7 May 2013 - 08:16 by Rmckeel Rmckeel Considering removing "Show Preview" button on utility rate form edit Posted: 22 Apr 2013 - 13:55 by Rmckeel 5 comment(s) 1 of 10 ›› Groups Menu You must login in order to post into this group. Latest discussion comments NickL

52

Entrapment of bed bugs by leaf trichomes inspires microfabrication of biomimetic surfaces  

Science Journals Connector (OSTI)

...18 h; the total area impacted by 60 bug feet with eight locomotory cycles per minute...generally occurred on the underside of the foot. The same legs that appeared irreversibly...potential to harness the bed bug-entrapping power of natural leaf surfaces using purely physical...

2013-01-01T23:59:59.000Z

53

Using Combinatorial Benchmark Construction to Improve the Assessment of Concurrency Bug Detection Tools  

E-Print Network (OSTI)

of performance measures. The inclusion of performance measures ensure that we can assess the fitnessUsing Combinatorial Benchmark Construction to Improve the Assessment of Concurrency Bug Detection, it is difficult to assess the fitness of a particular con- currency bug detection method and to compare

Bradbury, Jeremy S.

54

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

55

V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Linux Kernel Extended Verification Module Bug Lets Local 8: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service February 25, 2013 - 12:12am Addthis PROBLEM: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service PLATFORM: The Linux Kernel prior to 3.7.5 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can exploit a null pointer dereference in the evm_update_evmxattr() function in 'security/integrity/evm/evm_crypto.c' to cause the target system to crash. IMPACT: A local user can cause denial of service conditions.

56

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated 8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges December 23, 2011 - 8:45am Addthis PROBLEM: Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server EUS (v. 6.2.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A local privileged user on the guest operating system can obtain elevated privileges on the target system. reference LINKS: Red Hat kernel security and bug fix update SecurityTracker Alert ID: 1026453 SecurityTracker Alert ID: 1026454

57

T-700:Red Hat: kernel security, bug fix, and enhancement update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

700:Red Hat: kernel security, bug fix, and enhancement update 700:Red Hat: kernel security, bug fix, and enhancement update T-700:Red Hat: kernel security, bug fix, and enhancement update August 24, 2011 - 3:45pm Addthis PROBLEM: Updated kernel packages that fix several security issues, various bugs, and add two enhancements are now available for Red Hat Enterprise Linux 6. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat: kernel security, bug fix, and enhancement update. reference LINKS: RHSA-2011: 1189-1 Secunia Advisory: SA45746 Red Hat Download CVE-2011-1182 , CVE-2011-1576 CVE-2011-1593 , CVE-2011-1776 CVE-2011-1898 , CVE-2011-2183

58

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

59

U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service 10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service July 11, 2012 - 7:00am Addthis PROBLEM: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service PLATFORM: Version(s): 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027237 SecurityTracker Alert ID: 1027240 Red Hat advisory CVE-2012-3375 IMPACT ASSESSMENT: Medium Discussion: The Linux kernel's Event Poll (epoll) subsystem does not properly handle resource clean up when an ELOOP error code is returned. A local user can exploit this to cause the target system to crash. Impact: A local user can cause the target system to crash.

60

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets 08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service October 11, 2011 - 8:00am Addthis PROBLEM: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service PLATFORM: Symantec Data Loss Prevention Enforce/Detection Servers for Windows 10.x, 11.x ABSTRACT: A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions. reference LINKS: Symantec Security Advisory SYM11-013 SecurityTracker Alert ID: 1026157 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities were reported in Symantec Data Loss Prevention. A remote user can cause denial of service conditions on the target system.A

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

62

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

63

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

64

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

65

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

66

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

67

V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Performance Insight Bugs with Sybase Database Let Remote 6: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System November 5, 2012 - 6:00am Addthis PROBLEM: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System PLATFORM: HP Performance Insight v5.31, v5.40 and v5.41 running on HP-UX, Solaris, Linux, and Windows and using Sybase as the database ABSTRACT: Two vulnerabilities were reported in HP Performance Insight. REFERENCE LINKS: HP Support Document ID: c03555488 SecurityTracker Alert ID: 1027719 CVE-2012-3269 CVE-2012-3270 IMPACT ASSESSMENT: High DISCUSSION:

68

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

69

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

70

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

71

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

72

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote 3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges August 13, 2012 - 7:00am Addthis PROBLEM: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system. Reference LINKS: Oracle Security Alert Oracle Security Alert - CVE-2012-3132 Risk Matrices SecurityTracker Alert ID: 1027367 CVE-2012-3132 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not

73

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

74

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

75

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

76

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

77

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: PHP Command Parameter Bug Lets Remote Users Obtain 3: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code May 7, 2012 - 7:00am Addthis PROBLEM: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code PLATFORM: Prior to 5.3.12 and 5.4.2 ABSTRACT: A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027022 CVE-2012-1823 CVE-2012-2311 IMPACT ASSESSMENT: High Discussion: A remote user can submit a specially crafted request containing a command

78

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

79

U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: OpenSSL Bugs Let Remote Users Deny Service, Obtain 76: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code January 6, 2012 - 8:15am Addthis PROBLEM: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code PLATFORM: OpenSSL prior to 0.9.8s; 1.x prior to 1.0.0f ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1026485 OpenSSL Security Advisory IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can obtain sensitive information. A remote user may be able to execute arbitrary code on the

80

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

82

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Citrix XenApp and Citrix Presentation Server Bug 9: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

83

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

84

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

85

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote  

NLE Websites -- All DOE Office Websites (Extended Search)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets 71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20130116-asa1000v SecurityTracker Alert ID: 1028005 Secunia Advisory SA51897 CVE-2012-5419 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).

86

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

87

U-047: Siemens Automation License Manager Bugs Let Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Siemens Automation License Manager Bugs Let Remote Users 7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code November 29, 2011 - 9:00am Addthis PROBLEM: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code. PLATFORM: Siemens Automation License Manager 500.0.122.1 ABSTRACT: Several vulnerabilities were reported in Siemens Automation License Manager. reference LINKS: SecurityTracker Alert ID: 1026354 Bugtraq Siemens Advisory Services IMPACT ASSESSMENT: Medium Discussion: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A remote user can send specially crafted *_licensekey commands to trigger a

88

T-667: Red Hat Enterprise Linux kernel security and bug fix update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Enterprise Linux kernel security and bug fix update 7: Red Hat Enterprise Linux kernel security and bug fix update T-667: Red Hat Enterprise Linux kernel security and bug fix update July 13, 2011 - 7:24am Addthis PROBLEM: Red Hat Enterprise Linux kernel security and bug fix update PLATFORM: Vulnerable Linux Kernels; Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux HPC Node (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Server EUS (v. 6.1.z), Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: It was found that the receive hook in the ipip_init() function in the ipip module, and in the ipgre_init() function in the ip_gre module, could be called before network namespaces setup is complete. If packets were received at the time the ipip or ip_gre module was still being loaded into

89

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

90

V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service November 21, 2012 - 3:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10 Update 1 and above for Windows ABSTRACT: Adobe ColdFusion Denial of Service Vulnerability REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-25 SecurityTracker Alert ID: 1027787 Secunia Advisory SA51335 CVE-2012-5674 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in Adobe ColdFusion. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause unspecified denial of service conditions on the target ColdFusion service on Windows Internet

91

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

92

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service  

NLE Websites -- All DOE Office Websites (Extended Search)

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny 5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am Addthis PROBLEM: A vulnerability was reported in the Windows Kernel. A local user can cause denial of service conditions. PLATFORM: Windows Win32k.sys ABSTRACT: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny reference LINKS: SecurityTracker Alert ID: 1026347 Secunia ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an indexing error in the win32k.sys driver when loading a keyboard layout file. This can be exploited to access

93

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

94

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

95

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Red Hat Directory Server Bugs Let Local Users Gain Elevated 3: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service February 23, 2011 - 7:00am Addthis PROBLEM: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service. PLATFORM: Red Hat Directory Server v8 EL4, Red Hat Directory Server v8 EL5 ABSTRACT: Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send multiple simple paged search requests to cause the

96

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

97

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Linux kexec Bugs Let Local and Remote Users Obtain 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information. reference LINKS: Red Hat Security Advisory: RHSA-2011:1532-3 SecurityTracker Alert ID: 1026375 IMPACT ASSESSMENT: Medium Discussion: Kdump uses the SSH "StrictHostKeyChecking=no" option when dumping to SSH

98

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

99

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

100

U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny 72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service December 30, 2011 - 9:15am Addthis PROBLEM: Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service PLATFORM: apache Tomcat 5.5.34, 6.0.34, 7.0.22; and prior versions aBSTRACT: A remote user can cause performance to degrade on the target server. reference LINKS: Apache Tomcat Security Alert SecurityTracker Alert ID: 1026477 nruns Advisory SA-2011.004 Secunia Advisory SA47411 CVE-2011-4084 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can cause denial of service conditions. A remote user can send specially crafted POST request values to trigger hash collisions and cause significant performance

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code January 20, 2011 - 6:39am Addthis PROBLEM: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Storage Data Protector v6.11 ABSTRACT: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Bulletin SecurityTracker Alert ID: 1024983 CVE-2011-0273 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code.

102

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

103

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

104

V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users 9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host July 1, 2013 - 12:48am Addthis PROBLEM: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host PLATFORM: VirtualBox 4.2.12 ABSTRACT: A vulnerability was reported in Oracle VirtualBox. REFERENCE LINKS: VirtualBox ticket: 11863 SecurityTracker Alert ID: 1028712 IMPACT ASSESSMENT: Medium DISCUSSION: A local user on the guest operating system can issue a 'tracepath' command to cause the network on the target host system to become unavailable. IMPACT: A local user on a guest operating system can cause denial of service conditions on the target host system.

105

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

106

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Adobe ColdFusion Bugs Let Remote Users Gain Access and 3: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information January 7, 2013 - 1:00am Addthis PROBLEM: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting ColdFusion for Windows, Macintosh and UNIX REFERENCE LINKS: Adobe Security Bulletin APSA13-01 SecurityTracker Alert ID: 1027938 CVE-2013-0625 CVE-2013-0629 CVE-2013-0631 IMPACT ASSESSMENT: High DISCUSSION: A remote user can bypass authentication and take control of the target system [CVE-2013-0625]. Systems with password protection disabled or with no password set are affected.

107

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

108

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

109

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

110

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

111

U-203: HP Photosmart Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03: HP Photosmart Bug Lets Remote Users Deny Service 03: HP Photosmart Bug Lets Remote Users Deny Service U-203: HP Photosmart Bug Lets Remote Users Deny Service July 2, 2012 - 8:00am Addthis PROBLEM: HP Photosmart Bug Lets Remote Users Deny Service PLATFORM: HP Photosmart Wireless e-All-in-One Printer series - B110 HP Photosmart e-All-in-One Printer series - D110 HP Photosmart Plus e-All-in-One Printer series - B210 HP Photosmart eStation All-in-One Printer series - C510 HP Photosmart Ink Advantage e-All-in-One Printer series - K510 HP Photosmart Premium Fax e-All-in-One Printer series - C410 ABSTRACT: A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions. Reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027213 CVE-2012-2017 IMPACT ASSESSMENT: High Discussion:

112

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

113

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

114

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

115

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

116

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement  

NLE Websites -- All DOE Office Websites (Extended Search)

712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and 712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5) ABSTRACT: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. reference LINKS: RHSA-2011:1249-1 SecurityTracker Alert ID: 1026021 CVE-2011-2925 IMPACT ASSESSMENT: Medium Discussion: A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs,

117

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

118

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

89: Citrix XenApp and Citrix Presentation Server Bug 89: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

119

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

120

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

122

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

123

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

124

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

125

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

126

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

127

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks...

128

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users...

129

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

information. Solution: The vendor has issued a fix. Addthis Related Articles U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

130

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

the update from The HP Software Support Online (SSO). Addthis Related Articles V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting...

131

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-255: Apache Wicket Input Validation Flaw Permits Cross-Site Scripting Attacks U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting...

132

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

133

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

134

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

135

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

136

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache mod_proxy Pattern Matching Bug Lets Remote Users 5: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6, 2011 - 9:30am Addthis PROBLEM: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers. reference LINKS: The Apache HTTP Server Project SecurityTracker Alert ID: 1026144 CVE-2011-3368 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache mod_proxy. A remote user can access internal servers. When this system is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access internal

137

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

138

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

139

U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12: BlackBerry Enterprise Server Collaboration Service Bug Lets 12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages October 17, 2011 - 9:45am Addthis PROBLEM: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages. PLATFORM: Exchange and Domino 5.0.3 through 5.0.3 MR4 BlackBerry Client for use with Microsoft Office Communications Server 2007 R2 BlackBerry Client for use with Microsoft Lync Server 2010 ABSTRACT: A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization. reference LINKS: BlackBerry Security Advisory ID: KB28524

140

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Species composition and seasonal abundance of stink bugs in cotton in the Lower Texas Gulf Coast and the virulence of Euschistus species to cotton  

E-Print Network (OSTI)

with the drop cloth. ........................................................................................................... 26 2.2. Distribution of most common pest stink bugs by county, 2004. ........................ 31 2.3. Distribution... Page 2.1. Mean number of stink bug species collected per six row-feet, by date. Lower Texas Gulf Coast region, 2004.............................................................. 30 2.2. Mean number of stink bug species...

Hopkins, Bradley Wayne

2006-04-12T23:59:59.000Z

142

Backup Generators (BUGS): The Next Smart Grid Peak Resource? | Open Energy  

Open Energy Info (EERE)

Backup Generators (BUGS): The Next Smart Grid Peak Resource? Backup Generators (BUGS): The Next Smart Grid Peak Resource? Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Backup Generators (BUGS): The Next Smart Grid Peak Resource? Focus Area: Crosscutting Topics: Potentials & Scenarios Website: www.netl.doe.gov/smartgrid/referenceshelf/articles/10-18-2010_BUGS%20a Equivalent URI: cleanenergysolutions.org/content/backup-generators-bugs-next-smart-gri Language: English Policies: "Deployment Programs,Financial Incentives,Regulations" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property. DeploymentPrograms: Demonstration & Implementation Regulations: "Resource Integration Planning,Energy Standards" is not in the list of possible values (Agriculture Efficiency Requirements, Appliance & Equipment Standards and Required Labeling, Audit Requirements, Building Certification, Building Codes, Cost Recovery/Allocation, Emissions Mitigation Scheme, Emissions Standards, Enabling Legislation, Energy Standards, Feebates, Feed-in Tariffs, Fuel Efficiency Standards, Incandescent Phase-Out, Mandates/Targets, Net Metering & Interconnection, Resource Integration Planning, Safety Standards, Upgrade Requirements, Utility/Electricity Service Costs) for this property.

143

The Insect's Christmas Podcast Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network (OSTI)

Bug Bytes The Insect's Christmas Podcast **Music Up Welcome to Bug Bytes, a bimonthly podcast from didn't cooperate under the bright film lights. So when they died, Starevitch decided to make them. Starevitch has inspired contemporary greats like Tim Burton and Henry Selick of Nightmare before Christmas

Behmer, Spencer T.

144

Queen of the Sun Transcript Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network (OSTI)

Bug Bytes Queen of the Sun Transcript **Music Up Welcome to Bug Bytes, a bimonthly podcast from beekeepers of the world. Why? We recently screened a documentary called Queen of the Sun. The film explores in the face of almost certain impending disaster. We were prepared for this, as we thought Queen of the Sun

Behmer, Spencer T.

145

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

146

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

147

U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Sudo Format String Bug Lets Local Users Gain Elevated 2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis PROBLEM: A vulnerability was reported in Sudo. A local user can obtain elevated privileges on the target system. PLATFORM: Linux (Any) Version(s): 1.8.0 - 1.8.3p1 ABSTRACT: A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. reference LINKS: CVE-2012-0809 SecurityTracker Alert ID: 1026600 Vendor Site IMPACT ASSESSMENT: Medium Discussion: The vulnerability resides in the sudo_debug() function in 'src/sudo.c'. This can be exploited by local users, regardless of whether they are listed

148

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Xen Event Channel Tracking Pointer Bug Local Privilege 8: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis PLATFORM: Version(s): 3.2 and later ABSTRACT: A vulnerability was reported in Xen. REFERENCE LINKS: SecurityTracker Alert ID: 1028388 CVE-2013-1920 IMPACT ASSESSMENT: Medium DISCUSSION: A local user with kernel level privileges on the guest operating system can exploit a memory pointer error when the hypervisor is under memory pressure and Xen Security Module (XSM) is enabled to execute arbitrary code on the target host system IMPACT: A local user on the guest operating system can obtain elevated privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch).

149

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

150

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

151

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

152

U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VMware Workstation/Player VM Remote Device Bug Lets Local or VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x ABSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash. Impact:

153

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

154

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny 6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service February 6, 2012 - 7:00am Addthis PROBLEM: Vulnerability in AIX TCP stack PLATFORM: Version(s): 5.3, 6.1, 7.1 ABSTRACT: A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. reference LINKS: SecurityTracker Alert ID: 1026640 IBM Security Advisory CVE-2012-0194 IMPACT ASSESSMENT: Medium Discussion: AIX could allow a remote attacker to cause a denial of service, caused by an error when the TCP large send offload option is enabled on a network interface. By sending a specially-crafted sequence of packets, an attacker could exploit this vulnerability to cause a kernel panic.

155

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

156

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

157

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users 2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information July 25, 2013 - 2:52am Addthis PROBLEM: A remote user can obtain potentially sensitive information and modify some configuration settings. A remote user can exploit this to create, modify, and remove camera feeds, archives, logs, and users. PLATFORM: Cisco Video Surveillance Manager 7.1, 7.5 ABSTRACT: Two vulnerabilities were reported in Cisco Video Surveillance Manager REFERENCE LINKS: Security Tracker Alert ID: 1028827 CVE-2013-3429 CVE-2013-3430 CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The

158

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: PHP File Upload Bug May Let Remote Users Overwrite Files on 7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in PHP. A remote user may be able to overwrite files on the target system. PLATFORM: PHP prior to 5.3.7 ABSTRACT: PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected. reference LINKS: PHP Security Notice PHP CVE-2011-2202 SecurityTracker Alert ID: 1025659 Secunia Advisory: SA44874 CVE-2011-2202 IMPACT ASSESSMENT: High Discussion: The vulnerability lies in the 'SAPI_POST_HANDLER_FUNC()' function in

159

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: VMware Workstation/Player VM Remote Device Bug Lets Local or 92: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash.

160

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

162

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

163

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

164

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

165

V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Local Users Gain Elevated Privileges 5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs Let Local Users Gain Elevated Privileges PLATFORM: Version(s): prior to 6.1.3 ABSTRACT: Several vulnerabilities were reported in Apple iOS REFERENCE LINKS: Apple security Article: HT1222 SecurityTracker Alert ID: 1028314 CVE-2013-0977 CVE-2013-0978 CVE-2013-0979 CVE-2013-0981 IMPACT ASSESSMENT: High DISCUSSION: A local user can exploit a flaw in the handling of Mach-O executable files with overlapping segments to execute unsigned code on the target system [CVE-2013-0977]. A local user can exploit a flaw in the ARM prefetch abort handling to determine the address of structures in the kernel [CVE-2013-0978].

166

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

167

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

168

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

169

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

170

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users 9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code March 7, 2012 - 7:00am Addthis PROBLEM: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code PLATFORM: BlackBerry 6, BlackBerry 7, BlackBerry 7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026769 BlackBerry Security Notice Article ID: KB30152 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A remote user can cause arbitrary code to be executed on the target user's system. A remote

171

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

172

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

173

T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

714:Wireshark OpenSafety and CSN.1 Dissector Bugs 714:Wireshark OpenSafety and CSN.1 Dissector Bugs T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs September 12, 2011 - 9:00am Addthis PROBLEM: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. PLATFORM: Version(s): 1.4.0 to 1.4.8, 1.6.0 to 1.6.1 ABSTRACT: Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. reference LINKS: Wireshark 1.6.2 Release Notes Wireshark 1.4.9 Release Notes Docid: wnpa-sec-2011-12 Docid: wnpa-sec-2011-14 Docid: wnpa-sec-2011-15 Docid: wnpa-sec-2011-16 SecurityTracker Alert ID: 1026030 IMPACT ASSESSMENT: High Discussion: A remote user can cause arbitrary scripting code to be executed on the target user's system. A large loop in the OpenSafety dissector could cause a crash. A remote user

174

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: BlackBerry Device Software Bug in WebKit Lets Remote Users 9: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in BlackBerry Device Software. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: BlackBerry Device Software version 6.0 and later. ABSTRACT: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code. reference LINKS: BlackBerry Advisory: KB26132 CVE-2011-1290 BlackBerry Security Note BlackBerry Device Storage IMPACT ASSESSMENT: Moderate Discussion: A vulnerability exists in the open source WebKit browser engine provided in BlackBerry Device Software version 6.0 and later. The issue could result in

175

U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: OpenSSL DTLS Bug Lets Remote Users Deny Service 5: OpenSSL DTLS Bug Lets Remote Users Deny Service U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service January 20, 2012 - 9:15am Addthis PROBLEM: OpenSSL DTLS Bug Lets Remote Users Deny Service PLATFORM: Only DTLS applications using OpenSSL 1.0.0f and 0.9.8s are affected. ABSTRACT: A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. REFERNCE LINKS: CVE-2012-0050 SecurityTracker Alert ID: 1026548 OpenSSL Security Advisory [18 Jan 2011] OpenSSL News IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in OpenSSL. The fix to correct the Datagram Transport Layer Security (DTLS) vulnerability referenced by CVE-2011-4108 introduced a flaw. A remote user can send specially crafted data to cause denial of service conditions on the target system.

176

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

177

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

178

Control of the chinch bug, Blissus leucopterous (say) on corn and grain sorghum  

E-Print Network (OSTI)

) ~ Painter et ~a. (19$$) azui SnellinS, azzi ~ (ling'p), ore mn~ ztuymoekeC bg other meieOLes an@ strains oF oem. 'tests moro ccn8uctcS Surinam lg6$-3. 966 to evaluate the toxicity cf s~2. imscotici@cs to thc chinch bug. both in the laboratory exxon...

Todd, Larry Leland

2012-06-07T23:59:59.000Z

179

Static Detection of API Error-Handling Bugs via Mining Source Code  

E-Print Network (OSTI)

Static Detection of API Error-Handling Bugs via Mining Source Code Mithun Acharya and Tao Xie}@csc.ncsu.edu Abstract Incorrect handling of errors incurred after API invoca- tions (in short, API errors) can lead to security and robust- ness problems, two primary threats to software reliability. Correct handling of API

Young, R. Michael

180

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service May 24, 2012 - 7:00am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7 ABSTRACT: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. Reference Links: SecurityTracker Alert ID: 1027094 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 data to cause Wireshark to hang or enter an infinite loop. A remote user can cause the DIAMETER dissector to crash. A remote user can trigger a memory error on SPARC or Itanium processors and

182

3-Dimensional Imaging At Nanometer Resolutions  

NLE Websites -- All DOE Office Websites (Extended Search)

3-Dimensional Imaging At Nanometer Resolutions 3-Dimensional Imaging At Nanometer Resolutions 3-Dimensional Imaging At Nanometer Resolutions An apparatus and method for enabling precise, 3-dimensional, photoactivation localization microscopy (PALM). Available for thumbnail of Feynman Center (505) 665-9090 Email 3-Dimensional Imaging At Nanometer Resolutions An apparatus and method for enabling precise, 3-dimensional, photoactivation localization microscopy (PALM) using selective, two-photon activation of fluorophores in a single z-slice of a sample in cooperation with time-gated imaging for reducing the background radiation from other image planes to levels suitable for single-molecule detection and spatial location, are described. U.S. Patent No.: 7,675,045 (DOE S-112,966) Patent Application Filing Date: October 9, 2008

183

70 Images for 70 Years  

NLE Websites -- All DOE Office Websites (Extended Search)

70 Images for 70 Years 70 Images for 70 Years 70 Images for 70 Years Los Alamos has a proud history and heritage of almost 70 years of science and innovation. The people of the Laboratory work on advanced technologies to provide the best scientific and engineering solutions to many of the nation's most crucial security challenges. Click thumbnails to enlarge. Photos arranged by most recent first, horizontal formats before vertical. See Flickr for more sizes and details. 1938 Hahn and Meitner Fission 1938 Hahn and Meitner Fission 1939 Einstein-Szilard 1939 Einstein-Szilard 1940s Main Guard Gate (671938) 1940s Main Guard Gate (671938) 1940s Security check 1940s Security check 1940 Boys Ranch School hockey on Ashley Pond 1940 Boys Ranch School hockey on Ashley Pond 1942 Fuller Lodge 1942 Fuller Lodge

184

Developer | OpenEI Community  

Open Energy Info (EERE)

bug bug Type Term Title Author Replies Last Post sort icon Discussion bug Image upload with broken thumbnail image Rmckeel 1 13 Aug 2012 - 08:22 Discussion bug "Ghost" entries Rmckeel 1 19 Jun 2012 - 08:05 Groups Menu You must login in order to post into this group. Recent content Thank you Jon, I know about th... Hi Yury-Thank you for your i... source code for OpenEI extensions Timo,My apologies for the ... Browse by region (RaphaelSVGMap) more Group members (19) Managers: Rmckeel Recent members: Yury Katkov Sangduen Timo.Kouwenhoven Jwkropf KingJahfy Graham7781 Ianjkalin Autumn1 Mvdv Sprzesmi Satish Cdonnelly Wzeng Twong Jayhuggins Jorn.aabakken Jweers NickL 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 2142253338

185

Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final 4_19.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

April 15, 2010 April 15, 2010 DOE/NETL-2010/1406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference therein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or

186

Imaging  

NLE Websites -- All DOE Office Websites (Extended Search)

Imaging Print Imaging Print The wavelengths of soft x-ray photons (1-15 nm) are very well matched to the creation of "nanoscopes" capable of probing the interior structure of biological cells and inorganic mesoscopic systems.Topics addressed by soft x-ray imaging techniques include cell biology, nanomagnetism, environmental science, and polymers. The tunability of synchrotron radiation is absolutely essential for the creation of contrast mechanisms. Cell biology CAT scans are performed in the "water window" (300-500 eV). Nanomagnetism studies require the energy range characteristic of iron, cobalt, and nickel (600-900 eV). Mid- and far-infrared (energies below 1 eV) microprobes using synchrotron radiation are being used to address problems such as chemistry in biological tissues, chemical identification and molecular conformation, environmental biodegradation, mineral phases in geological and astronomical specimens, and electronic properties of novel materials. Infrared synchrotron radiation is focused through, or reflected from, a small spot on the specimen and then analyzed using a spectrometer. Tuning to characteristic vibrational frequencies serves as a sensitive fingerprint for molecular species. Images of the various species are built up by raster scanning the specimen through the small illuminated spot.

187

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets 3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in BIND. A remote user can cause denial of service conditions. PLATFORM: BIND Version(s): 9.4-ESV-R3 and later, 9.6-ESV-R2 and later, 9.6.3, 9.7.1 and later, 9.8.0 and later; prior to 9.4-ESV-R4-P1, 9.6-ESV-R4-P1, 9.7.3-P1, 9.8.0-P2 ABSTRACT: A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash. reference LINKS: SecurityTracker Alert ID: 1025575 SecurityTracker Alert ID: 1025572

188

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data August 3, 2013 - 2:37am Addthis PROBLEM: A vulnerability was reported in HP Printers. A remote user can obtain potentially sensitive information. PLATFORM: HP LaserJet Pro products ABSTRACT: A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data. REFERENCE LINKS: SecurityTracker Alert ID 1028869 CVE-2013-4807 Vendor URL IMPACT ASSESSMENT: Medium DISCUSSION: The following models are affected: HP LaserJet Pro P1102w CE657A/CE658A HP LaserJet Pro P1606dn CE749A HP LaserJet Pro M1212nf MFP CE841A HP LaserJet Pro M1213nf MFP CE845A

189

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

190

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

191

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote 29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access November 8, 2011 - 8:00am Addthis PROBLEM: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access. PLATFORM: HP TCP/IP Services for OpenVMS v5.6 and v5.7 on iTanium and ALPHA Servers. ABSTRACT: A remote user can gain unauthorized access reference LINKS: HP Support document ID: c01908983 SecurityTracker Alert ID: 1026279 CVE-2011-3168 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in TCP/IP Services for OpenVMS. A remote user can gain unauthorized access. On systems running POP or IMAP servers, a remote user can gain unauthorized access.

192

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

193

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

194

Year of Biodiversity Podcast Welcome to Bug Bytes, a bimonthly podcast from Texas A&M University's  

E-Print Network (OSTI)

are affected. Biodiversity encompasses humans, plants, animals, fungi, bacteria, food, and water at the scale that we don't! Join us on this excursion as we learn from the bugs that share in every aspect of our lives the human element, the diversity of cultures and how we impact the world around us. How, in turn we

Behmer, Spencer T.

195

Bugs boost Cold War clean-up: Bacteria could scrub uranium from sites contaminated decades ago. updated at midnight GMTtoday is friday, november 14  

E-Print Network (OSTI)

in the study was contaminated by low levels of uranium from mining residue. The team hopes that the techniqueBugs boost Cold War clean-up: Bacteria could scrub uranium from sites contaminated decades ago boost Cold War clean-up Bacteria could scrub uranium from sites contaminated decades ago. 13 October

Lovley, Derek

196

Got the "Buy Local" bug? Here are some resources for you! From farmers markets to grocery stores to university cafeterias, more retailers are showcasing food  

E-Print Network (OSTI)

the feasibility of new marketing opportunities; expand capacity for locally and regionallygrown productsGot the "Buy Local" bug? Here are some resources for you! From farmers markets to grocery stores for local fresh markets. Interested producers should contact their local FSA office at www

Debinski, Diane M.

197

Solution Structure of Ptu1, a Toxin from the Assassin Bug Peirates turpis That Blocks the Voltage-Sensitive Calcium Channel N-Type  

Science Journals Connector (OSTI)

Ptu1 is a toxin from the assassin bug Peirates turpis which has been demonstrated to bind reversibly the N-type calcium channels and to have lower affinity than the ?-conotoxin MVIIA. We have determined the solution structure of Ptu1 by use of ...

Cédric Bernard; Gerardo Corzo; Amor Mosbah; Terumi Nakajima; Hervé Darbon

2001-10-02T23:59:59.000Z

198

Does fundamental host range match ecological host range? A retrospective case study of a Lygus plant bug parasitoid  

Science Journals Connector (OSTI)

Using the retrospective case study of Peristenus digoneutis (Hymenoptera: Braconidae) introduced in the United States for biological control of native Lygus plant bugs (Hemiptera: Miridae), laboratory and field studies were conducted in the area of origin to evaluate whether the fundamental host range of P. digoneutis matches its ecological host range. Furthermore, it was determined whether these approaches would have been indicative of the post-introduction host range of P. digoneutis in North America [Day, W.H., 1999. Host preference of introduced and native parasites (Hymenoptera: Braconidae) of phytophagous plant bugs (Hemiptera: Miridae) in alfalfa-grass fields in the north-eastern USA, BioControl 44, 249–261.]. Seven non-target mirid species were selected to define the fundamental host range of P. digoneutis in the area of origin in Europe. Laboratory choice and no-choice tests demonstrated that all selected non-target species were attacked by P. digoneutis and were largely suitable for parasitoid development. To confirm the validity of the fundamental host range, the ecological host range of P. digoneutis in the area of origin was investigated. Peristenus digoneutis was reared from 10 hosts, including three Lygus species and seven non-target hosts from the subfamily Mirinae. Despite the fact that laboratory tests demonstrated a high parasitism level in non-targets, ecological assessments in both North America (Day, 1999) and Europe suggest a much lower impact of P. digoneutis on non-target mirids, with low levels of parasitism (below 1% in Europe). Therefore, ecological host range studies in the area of origin provide useful supplementary data for interpreting pre-release laboratory host range testing.

T. Haye; H. Goulet; P.G. Mason; U. Kuhlmann

2005-01-01T23:59:59.000Z

199

Complete genome sequence of Coriobacterium glomerans type strain (PW2T) from the midgut of Pyrrhocoris apterus L. (red soldier bug)  

SciTech Connect

Coriobacterium glomerans Haas and Ko nig 1988, is the only species of the genus Coriobacterium, family Coriobacteriaceae, order Coriobacteriales, phylum Actinobacteria. The bacterium thrives as an endosymbiont of pyrrhocorid bugs, i.e. the red fire bug Pyrrhocoris apterus L. The rationale for sequencing the genome of strain PW2T is its endosymbiotic life style which is rare among members of Actinobacteria. Here we describe the features of this symbiont, together with the complete genome sequence and its annotation. This is the first complete genome sequence of a member of the genus Coriobacterium and the sixth member of the order Coriobacteriales for which complete genome sequences are now available. The 2,115,681 bp long single replicon genome with its 1,804 protein-coding and 54 RNA genes is part of the Genomic Encyclopedia of Bacteria and Archaea project.

Stackebrandt, Erko [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Zeytun, Ahmet [Los Alamos National Laboratory (LANL); Lapidus, Alla L. [U.S. Department of Energy, Joint Genome Institute; Nolan, Matt [U.S. Department of Energy, Joint Genome Institute; Lucas, Susan [U.S. Department of Energy, Joint Genome Institute; Hammon, Nancy [U.S. Department of Energy, Joint Genome Institute; Deshpande, Shweta [U.S. Department of Energy, Joint Genome Institute; Cheng, Jan-Fang [U.S. Department of Energy, Joint Genome Institute; Tapia, Roxanne [Los Alamos National Laboratory (LANL); Goodwin, Lynne A. [Los Alamos National Laboratory (LANL); Pitluck, Sam [U.S. Department of Energy, Joint Genome Institute; Liolios, Konstantinos [U.S. Department of Energy, Joint Genome Institute; Pagani, Ioanna [U.S. Department of Energy, Joint Genome Institute; Ivanova, N [U.S. Department of Energy, Joint Genome Institute; Mavromatis, K [U.S. Department of Energy, Joint Genome Institute; Mikhailova, Natalia [U.S. Department of Energy, Joint Genome Institute; Huntemann, Marcel [U.S. Department of Energy, Joint Genome Institute; Pati, Amrita [U.S. Department of Energy, Joint Genome Institute; Chen, Amy [U.S. Department of Energy, Joint Genome Institute; Palaniappan, Krishna [U.S. Department of Energy, Joint Genome Institute; Chang, Yun-Juan [ORNL; Land, Miriam L [ORNL; Hauser, Loren John [ORNL; Rohde, Manfred [HZI - Helmholtz Centre for Infection Research, Braunschweig, Germany; Pukall, Rudiger [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Goker, Markus [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Detter, J. Chris [U.S. Department of Energy, Joint Genome Institute; Woyke, Tanja [U.S. Department of Energy, Joint Genome Institute; Bristow, James [U.S. Department of Energy, Joint Genome Institute; Eisen, Jonathan [U.S. Department of Energy, Joint Genome Institute; Markowitz, Victor [U.S. Department of Energy, Joint Genome Institute; Hugenholtz, Philip [U.S. Department of Energy, Joint Genome Institute; Kyrpides, Nikos C [U.S. Department of Energy, Joint Genome Institute; Klenk, Hans-Peter [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany

2013-01-01T23:59:59.000Z

200

What Did They Do in IEA 34/43? Or How to Diagnose and Repair Bugs in 500,000 Lines of Code: Preprint  

NLE Websites -- All DOE Office Websites (Extended Search)

4978 4978 June 2009 What Did They Do in IEA 34/43? Or How to Diagnose and Repair Bugs in 500,000 Lines of Code Preprint R. Judkoff National Renewable Energy Laboratory J. Neymark J. Neymark & Associates To be presented at the Building Simulation 2009 Conference Glasgow, Scotland 27-30 July 2009 NOTICE The submitted manuscript has been offered by an employee of the Alliance for Sustainable Energy, LLC (ASE), a contractor of the US Government under Contract No. DE-AC36-08-GO28308. Accordingly, the US Government and ASE retain a nonexclusive royalty-free license to publish or reproduce the published form of this contribution, or allow others to do so, for US Government purposes. This report was prepared as an account of work sponsored by an agency of the United States government.

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Bugs, Drugs & Smoke  

E-Print Network (OSTI)

Panic in Surat Then came Ebola Change in awareness Ready tonew diseases (e.g. Ebola and Marburg) have appeared. Thissomething far more serious. Ebola first appeared in 1976 in

WHO

2012-01-01T23:59:59.000Z

202

Bugs, Drugs & Smoke  

E-Print Network (OSTI)

in saving lives, poor sanitation, unclean water (Photo 2.9)and food due to poor hygiene and sanitation. administered by

WHO

2012-01-01T23:59:59.000Z

203

Tiny images  

E-Print Network (OSTI)

The human visual system is remarkably tolerant to degradations in image resolution: in a scene recognition task, human performance is similar whether $32 \\times 32$ color images or multi-mega pixel images are used. With ...

Torralba, Antonio

2007-04-23T23:59:59.000Z

204

Street Light View: Enriching Navigable Panoramic Street View Maps with Informative Illumination Thumbnails  

E-Print Network (OSTI)

1 Street Light View: Enriching Navigable Panoramic Street View Maps with Informative Illumination, Stony Brook University ABSTRACT Google Street View is a technology featured in Google Maps and Google Earth that provides panoramic and immersive views of street scenes in many cities around the world

Mueller, Klaus

205

People Images  

NLE Websites -- All DOE Office Websites (Extended Search)

Images People Images Several hundred of the 1700 U.S. scientists contributing to the LHC accelerator and experiments gathered in June 2008 in CERN's building 40 CE0252 Joel...

206

Image Resources  

NLE Websites -- All DOE Office Websites (Extended Search)

Mosaic of earth and sky images Mosaic of earth and sky images Image Resources Free image resources covering energy, environment, and general science. Here are some links to energy- and environment-related photographic databases. Berkeley Lab Photo Archive Berkeley Lab's online digital image collection. National Science Digital Library (NSDL) NSDL is the Nation's online library for education and research in science, technology, engineering, and mathematics. The World Bank Group Photo Library A distinctive collection of over 11,000 images that illustrate development through topics such as Agriculture, Education, Environment, Health, Trade and more. Calisphere Compiles the digital collections of libraries, museums, and cultural heritage organizations across California, and organizes them by theme, such

207

EMSL - Imaging  

NLE Websites -- All DOE Office Websites (Extended Search)

imaging en Diffusional Motion of Redox Centers in Carbonate Electrolytes . http:www.emsl.pnl.govemslwebpublicationsdiffusional-motion-redox-centers-carbonate-electrolytes

208

Data Image  

Science Journals Connector (OSTI)

Data image refers to the sum of all information 74/100,000 available in all datasets linked to a specific name; to all those who have access to databases that name is actually the data image of the real person...

2008-01-01T23:59:59.000Z

209

Wind Program: Publications  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

pres Details Bookmark & Share View Related Product Thumbnail Image 2014 Offshore Wind Market and Economic Analysis The objective of this report is to provide a...

210

Publications | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Combined Heat & Power Deployment Publications Publications Thumbnail image of the cover for the Combined Heat and Power (CHP): A Decade of Progress, A Vision for the Future,...

211

Symplectic Integrator Mercury: Bug Report  

E-Print Network (OSTI)

We report on a problem found in MERCURY, a hybrid symplectic integrator used for dynamical problems in Astronomy. The variable that keeps track of bodies' statuses is uninitialised, which can result in bodies disappearing from simulations in a non-physical manner. Some FORTRAN compilers implicitly initialise variables, preventing simulations from having this problem. With other compilers, simulations with a suitably large maximum number of bodies parameter value are also unaffected. Otherwise, the problem manifests at the first event after the integrator is started, whether from scratch or continuing a previously stopped simulation. Although the problem does not manifest in some conditions, explicitly initialising the variable solves the problem in a permanent and unconditional manner.

K. de Souza Torres; D. R. Anderson

2008-08-04T23:59:59.000Z

212

The Harlequin Cabbage-bug.  

E-Print Network (OSTI)

SUBSTATIONS P. L. DOWNS, President, Temple .................................................................................. Term expires 1919 CHARLES ROGAN, Vzce Preszdent, Austin ...................................................................... Term.... V. M., .Veterinarian SUBSTATION NO. 1: Beeville, Bee Connty DIVISION OF CHEMISTRY E. E. BINFORD, B. S., Superintendent G. S. FRAPS,.~~. D., Chemist in Charge; SUBSTATION NO. 2: Troup, Smith State Chemlst R H RIDGELL B. S Assistant Chemist W. S...

Paddock, F.B. (Floyd B.)

1915-01-01T23:59:59.000Z

213

OpenEI Community - bug  

Open Energy Info (EERE)

Ghost" entries http:en.openei.orgcommunitydiscussionghost-entries

There is an issue that Illinois State University has come across.  From Nick B:

214

Imaging bolometer  

DOE Patents (OSTI)

Radiation-hard, steady-state imaging bolometer. A bolometer employing infrared (IR) imaging of a segmented-matrix absorber of plasma radiation in a cooled-pinhole camera geometry is described. The bolometer design parameters are determined by modeling the temperature of the foils from which the absorbing matrix is fabricated by using a two-dimensional time-dependent solution of the heat conduction equation. The resulting design will give a steady-state bolometry capability, with approximately 100 Hz time resolution, while simultaneously providing hundreds of channels of spatial information. No wiring harnesses will be required, as the temperature-rise data will be measured via an IR camera. The resulting spatial data may be used to tomographically investigate the profile of plasmas.

Wurden, Glen A. (Los Alamos, NM)

1999-01-01T23:59:59.000Z

215

Imaging bolometer  

DOE Patents (OSTI)

Radiation-hard, steady-state imaging bolometer is disclosed. A bolometer employing infrared (IR) imaging of a segmented-matrix absorber of plasma radiation in a cooled-pinhole camera geometry is described. The bolometer design parameters are determined by modeling the temperature of the foils from which the absorbing matrix is fabricated by using a two-dimensional time-dependent solution of the heat conduction equation. The resulting design will give a steady-state bolometry capability, with approximately 100 Hz time resolution, while simultaneously providing hundreds of channels of spatial information. No wiring harnesses will be required, as the temperature-rise data will be measured via an IR camera. The resulting spatial data may be used to tomographically investigate the profile of plasmas. 2 figs.

Wurden, G.A.

1999-01-19T23:59:59.000Z

216

RSNA 2002: Image Fusion Image Fusion  

E-Print Network (OSTI)

of anatomical feature #12;RSNA 2002: Image Fusion Types of Data to be Registered Anatomic CT, MRI, US DigitizedRSNA 2002: Image Fusion Image Fusion: Introduction to the Technology Charles A. Pelizzari, Ph.D. Department of Radiation and Cellular Oncology The University of Chicago #12;RSNA 2002: Image Fusion "Fusion

Pelizzari, Charles A.

217

Nanometric Optical Imaging Frontiers in Chemical Imaging  

E-Print Network (OSTI)

Nanometric Optical Imaging Frontiers in Chemical Imaging Seminar Series Presented by... Professor growing field which has provided for nanometric optical imaging in the near-field. Even though a variety of techniques are being developed with nanometric optical imaging potential, near-field optics remains the most

218

Split image optical display  

DOE Patents (OSTI)

A video image is displayed from an optical panel by splitting the image into a plurality of image components, and then projecting the image components through corresponding portions of the panel to collectively form the image. Depth of the display is correspondingly reduced.

Veligdan, James T. (Manorville, NY)

2007-05-29T23:59:59.000Z

219

millionImaging research infrastructure  

E-Print Network (OSTI)

Centre for Imaging Technology Commercialization, led by Aaron Fenster $34 million Hybrid imaging infrastructureimaging #12;IMAGING Investment $100 millionImaging research infrastructure Formation

Denham, Graham

220

Nuclear magnetic resonance imaging  

Science Journals Connector (OSTI)

Nuclear magnetic resonance imaging (NMRI) is a powerful imaging modality having a range of important applications to medicine and industry. The basic principles of NMRI are reviewed in...

Rothwell, William P

1985-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Quantum-secured imaging  

E-Print Network (OSTI)

We have built an imaging system that uses a photon's position or time-of-flight information to image an object, while using the photon's polarization for security. This ability allows us to obtain an image which is secure against an attack in which the object being imaged intercepts and resends the imaging photons with modified information. Popularly known as "jamming," this type of attack is commonly directed at active imaging systems such as radar. In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity.

Mehul Malik; Omar S. Magaña-Loaiza; Robert W. Boyd

2012-12-11T23:59:59.000Z

222

NMR imaging of materials  

SciTech Connect

Interest in the area of NMR imaging has been driven by the widespread success of medical imaging. John M. Listerud of the Pendergrass Diagnostic Research Laboratories, Steven W. Sinton of Lockheed, and Gary P. Drobny of the University of Washington describe the principal image reconstruction methods, factors limiting spatial resolution, and applications of imaging to the study of materials.

Listerud, J.M.; Sinton, S.W.; Drobny, G.P.

1989-01-01T23:59:59.000Z

223

Seismic Imaging and Monitoring  

SciTech Connect

I give an overview of LANL's capability in seismic imaging and monitoring. I present some seismic imaging and monitoring results, including imaging of complex structures, subsalt imaging of Gulf of Mexico, fault/fracture zone imaging for geothermal exploration at the Jemez pueblo, time-lapse imaging of a walkway vertical seismic profiling data for monitoring CO{sub 2} inject at SACROC, and microseismic event locations for monitoring CO{sub 2} injection at Aneth. These examples demonstrate LANL's high-resolution and high-fidelity seismic imaging and monitoring capabilities.

Huang, Lianjie [Los Alamos National Laboratory

2012-07-09T23:59:59.000Z

224

Manhattan Project: Trinity Images  

Office of Scientific and Technical Information (OSTI)

IMAGES IMAGES Trinity Test Site (July 16, 1945) Resources > Photo Gallery The first 0.11 seconds of the Nuclear Age These seven photographs of the Trinity test were taken by time-lapse cameras. The last is 109 milliseconds, or 0.109 seconds, after detonation. Scroll down to view each individual image. The photographs are courtesy the Los Alamos National Laboratory, via the Federation of American Scientists web site. The animation is original to the Office of History and Heritage Resources. The dawn of the Nuclear Age (Trinity image #1) The dawn of the Nuclear Age Trinity image #2 Trinity image #3 Trinity image #4 Trinity image #5 Trinity, 0.09 seconds after detonation (Trinity image #6) Trinity, 0.09 seconds after detonation Trinity, 0.11 seconds after detonation (Trinity image #7)

225

Image registration method for medical image sequences  

DOE Patents (OSTI)

Image registration of low contrast image sequences is provided. In one aspect, a desired region of an image is automatically segmented and only the desired region is registered. Active contours and adaptive thresholding of intensity or edge information may be used to segment the desired regions. A transform function is defined to register the segmented region, and sub-pixel information may be determined using one or more interpolation methods.

Gee, Timothy F.; Goddard, James S.

2013-03-26T23:59:59.000Z

226

ICORE: Image Co-addition with Optional Resolution Enhancement  

E-Print Network (OSTI)

Masci * Implemented QA plot files. * Included ­wf option to control inverse variance weighting. When on. There is no warranty that the software described herein is free of bugs. This includes proper graceful program WCS and distortion keys). * Implemented auto-tiling option to support memory management for outlier

Masci, Frank

227

Image Segmentation and Uncertainty  

Science Journals Connector (OSTI)

From the Publisher:Presents the first unified theory of image segmentation, written by the winners of the 1985 Pattern Recognition Society medal. Until now, image processing algorithms have always been beset by uncertainties, no one method proving completely ...

Roland 1949- Wilson; Michael Spann

1988-02-01T23:59:59.000Z

228

Estimation theoretical image restoration  

E-Print Network (OSTI)

In this thesis, we have developed an extensive study to evaluate image restoration from a single image, colored or monochromatic. Using a mixture of Gaussian and Poisson noise process, we derived an objective function to ...

Dolne, Jean J

2008-01-01T23:59:59.000Z

229

Video image position determination  

DOE Patents (OSTI)

An optical beam position controller in which a video camera captures an image of the beam in its video frames, and conveys those images to a processing board which calculates the centroid coordinates for the image. The image coordinates are used by motor controllers and stepper motors to position the beam in a predetermined alignment. In one embodiment, system noise, used in conjunction with Bernoulli trials, yields higher resolution centroid coordinates.

Christensen, Wynn (Los Alamos, NM); Anderson, Forrest L. (Bernalillo, NM); Kortegaard, Birchard L. (Los Alamos, NM)

1991-01-01T23:59:59.000Z

230

Dual Plane Imaging  

E-Print Network (OSTI)

We outline a technique called Dual Plane Imaging which should significantly improve images which would otherwise be blurred due to atmospheric turbulence. The technique involves capturing all the spatial, directional and temporal information about the arriving photons and processing the data afterwards to produce the sharpened images. The technique has particular relevance for imaging at around 400-1000nm on extremely large telescopes (ELTs).

Parry, Ian

2015-01-01T23:59:59.000Z

231

Magnetic Imaging Wolfgang Kuch  

E-Print Network (OSTI)

Magnetic Imaging Wolfgang Kuch Freie Universit¨at Berlin, Institut f¨ur Experimentalphysik, Arnimallee 14, 14195 Berlin, Germany kuch@physik.fu-berlin.de Abstract. Imaging of magnetic domains has- ern techniques is used nowadays routinely for magnetic imaging of magnetic ma- terials

Kuch, Wolfgang

232

Human Functional Brain Imaging  

E-Print Network (OSTI)

Human Functional Brain Imaging 1990­2009 September 2011 Portfolio Review #12;2 | Portfolio Review: Human Functional Brain ImagingThe Wellcome Trust is a charity registered in England and Wales, no's role in supporting human functional brain imaging and have informed `our' speculations for the future

Rambaut, Andrew

233

Human Functional Brain Imaging  

E-Print Network (OSTI)

Human Functional Brain Imaging 1990­2009 September 2011 Portfolio Review Summary Brain Imaging #12 Dale ­ one of our first Trustees. Understanding the brain remains one of our key strategic aims today three-fold: · to identify the key landmarks and influences on the human functional brain imaging

Rambaut, Andrew

234

Near-electrode imager  

DOE Patents (OSTI)

An apparatus, near-electrode imager, for employing nuclear magnetic resonance imaging to provide in situ measurements of electrochemical properties of a sample as a function of distance from a working electrode. The near-electrode imager uses the radio frequency field gradient within a cylindrical toroid cavity resonator to provide high-resolution nuclear magnetic resonance spectral information on electrolyte materials.

Rathke, Jerome W. (Lockport, IL); Klingler, Robert J. (Westmont, IL); Woelk, Klaus (Wachtberg, DE); Gerald, II, Rex E. (Brookfield, IL)

2000-01-01T23:59:59.000Z

235

Medical imaging systems  

DOE Patents (OSTI)

A medical imaging system provides simultaneous rendering of visible light and diagnostic or functional images. The system may be portable, and may include adapters for connecting various light sources and cameras in open surgical environments or laparascopic or endoscopic environments. A user interface provides control over the functionality of the integrated imaging system. In one embodiment, the system provides a tool for surgical pathology.

Frangioni, John V

2013-06-25T23:59:59.000Z

236

Nanotechnology for Molecular Imaging and Image-Guided Surgery  

Science Journals Connector (OSTI)

Recent development in bioconjugated nanoparticles opens new opportunities for in-vivo molecular imaging and image-guided cancer surgery.

Nie, Shuming

237

Automation in image cytometry : continuous HCS and kinetic image cytometry  

E-Print Network (OSTI)

OF CALIFORNIA, SAN DIEGO Automation in Image Cytometry:xiv Abstract of Dissertation Automation in Image Cytometry:

Charlot, David J.

2012-01-01T23:59:59.000Z

238

SNAP Image Gallery  

NLE Websites -- All DOE Office Websites (Extended Search)

Images Images Cutaway image of SNAP A cutaway illustration of SNAP showing some of the interior optics. Cutaway image of SNAP A computer generated cutaway illustration of SNAP Cutaway image of SNAP's primary mirror A computer generated cutaway illustration of SNAP's primary mirror image of SNAP spacecraft A computer generated illustration of the SNAP spacecraft computer generated image of SNAP A computer generated illustration of SNAP Before-and-after pictures (and Hubble Space Telescope picture) of a high-redshift supernovae discovered by the Supernova Cosmology Project in March, 1998. Before-and-after pictures (and Hubble Space Telescope picture) of a high-redshift supernovae discovered in March, 1998. This observaton showed that the expansion of the universe was accelerarting. Credit: High Redshift Supernova Search Supernova Cosmology Project

239

ARM - Measurement - Hydrometeor image  

NLE Websites -- All DOE Office Websites (Extended Search)

image image ARM Data Discovery Browse Data Comments? We would love to hear from you! Send us a note below or call us at 1-888-ARM-DATA. Send Measurement : Hydrometeor image Images of hydrometeors from which one can derive characteristics such as size and shape. Categories Cloud Properties Instruments The above measurement is considered scientifically relevant for the following instruments. Refer to the datastream (netcdf) file headers of each instrument for a list of all available measurements, including those recorded for diagnostic or quality assurance purposes. Field Campaign Instruments LEARJET : Lear Jet PARTIMG : Particle imager UAV-PROTEUS-MICRO : Proteus Cloud Microphysics Instruments SPEC-CPI : Stratton Park Engineering Company - Cloud particle imager UAV-PROTEUS : UAV Proteus

240

Video Toroid Cavity Imager  

DOE Patents (OSTI)

A video toroid cavity imager for in situ measurement of electrochemical properties of an electrolytic material sample includes a cylindrical toroid cavity resonator containing the sample and employs NMR and video imaging for providing high-resolution spectral and visual information of molecular characteristics of the sample on a real-time basis. A large magnetic field is applied to the sample under controlled temperature and pressure conditions to simultaneously provide NMR spectroscopy and video imaging capabilities for investigating electrochemical transformations of materials or the evolution of long-range molecular aggregation during cooling of hydrocarbon melts. The video toroid cavity imager includes a miniature commercial video camera with an adjustable lens, a modified compression coin cell imager with a fiat circular principal detector element, and a sample mounted on a transparent circular glass disk, and provides NMR information as well as a video image of a sample, such as a polymer film, with micrometer resolution.

Gerald, Rex E. II; Sanchez, Jairo; Rathke, Jerome W.

2004-08-10T23:59:59.000Z

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Manhattan Project: Places Images  

Office of Scientific and Technical Information (OSTI)

PLACES IMAGES PLACES IMAGES Resources > Photo Gallery Scroll down to see each of these images individually. The images are: 1. Remains of a Shinto Shrine, Nagasaki, October 1945 (courtesy the United States Marine Corps, Lieutenant R. J. Battersby, photographer, via the National Archives); 2. University of California, Berkeley, 1940 (courtesy the Lawrence Berkeley National Laboratory); 3. Aerial photograph of the Trinity Site after the test (courtesy the Federation of American Scientists); 4. Aerial photograph of Hiroshima before the bombing; 5. Columbia University, 1903 (courtesy the Library of Congress; this photograph originated from the Detroit Publishing Company; it was a 1949 gift to the Library of Congress from the State Historical Society of Colorado).

242

Quantitative luminescence imaging system  

DOE Patents (OSTI)

The QLIS images and quantifies low-level chemiluminescent reactions in an electromagnetic field. It is capable of real time nonperturbing measurement and simultaneous recording of many biochemical and chemical reactions such as luminescent immunoassays or enzyme assays. The system comprises image transfer optics, a low-light level digitizing camera with image intensifying microchannel plates, an image process or, and a control computer. The image transfer optics may be a fiber image guide with a bend, or a microscope, to take the light outside of the RF field. Output of the camera is transformed into a localized rate of cumulative digitalized data or enhanced video display or hard-copy images. The system may be used as a luminescent microdosimetry device for radiofrequency or microwave radiation, as a thermal dosimeter, or in the dosimetry of ultra-sound (sonoluminescence) or ionizing radiation. It provides a near-real-time system capable of measuring the extremely low light levels from luminescent reactions in electromagnetic fields in the areas of chemiluminescence assays and thermal microdosimetry, and is capable of near-real-time imaging of the sample to allow spatial distribution analysis of the reaction. It can be used to instrument three distinctly different irradiation configurations, comprising (1) RF waveguide irradiation of a small Petri-dish-shaped sample cell, (2) RF irradiation of samples in a microscope for the microscopie imaging and measurement, and (3) RF irradiation of small to human body-sized samples in an anechoic chamber.

Erwin, David N. (San Antonio, TX); Kiel, Johnathan L. (San Antonio, TX); Batishko, Charles R. (West Richland, WA); Stahl, Kurt A. (Richland, WA)

1990-01-01T23:59:59.000Z

243

Quantitative luminescence imaging system  

DOE Patents (OSTI)

The QLIS images and quantifies low-level chemiluminescent reactions in an electromagnetic field. It is capable of real time nonperturbing measurement and simultaneous recording of many biochemical and chemical reactions such as luminescent immunoassays or enzyme assays. The system comprises image transfer optics, a low-light level digitizing camera with image intensifying microchannel plates, an image process or, and a control computer. The image transfer optics may be a fiber image guide with a bend, or a microscope, to take the light outside of the RF field. Output of the camera is transformed into a localized rate of cumulative digitalized data or enhanced video display or hard-copy images. The system may be used as a luminescent microdosimetry device for radiofrequency or microwave radiation, as a thermal dosimeter, or in the dosimetry of ultra-sound (sonoluminescence) or ionizing radiation. It provides a near-real-time system capable of measuring the extremely low light levels from luminescent reactions in electromagnetic fields in the areas of chemiluminescence assays and thermal microdosimetry, and is capable of near-real-time imaging of the sample to allow spatial distribution analysis of the reaction. It can be used to instrument three distinctly different irradiation configurations, comprising (1) RF waveguide irradiation of a small Petri-dish-shaped sample cell, (2) RF irradiation of samples in a microscope for the microscopic imaging and measurement, and (3) RF irradiation of small to human body-sized samples in an anechoic chamber. 22 figs.

Erwin, D.N.; Kiel, J.L.; Batishko, C.R.; Stahl, K.A.

1990-08-14T23:59:59.000Z

244

EMSL - image superimposition  

NLE Websites -- All DOE Office Websites (Extended Search)

image-superimposition en Magnesium behavior and structural defects in Mg+ ion implanted silicon carbide. http:www.emsl.pnl.govemslwebpublicationsmagnesium-behavior-and-structu...

245

image superimposition | EMSL  

NLE Websites -- All DOE Office Websites (Extended Search)

superimposition image superimposition Leads No leads are available at this time. Magnesium behavior and structural defects in Mg+ ion implanted silicon carbide. Abstract: As a...

246

Edge-based correlation image registration for multispectral imaging  

DOE Patents (OSTI)

Registration information for images of a common target obtained from a plurality of different spectral bands can be obtained by combining edge detection and phase correlation. The images are edge-filtered, and pairs of the edge-filtered images are then phase correlated to produce phase correlation images. The registration information can be determined based on these phase correlation images.

Nandy, Prabal (Albuquerque, NM)

2009-11-17T23:59:59.000Z

247

Visual Speech Recognition Using Image Moments and Multiresolution Wavelet Images  

Science Journals Connector (OSTI)

This paper describes a new technique for recognizing speech using visual speech information. The video data of the speaker's mouth is represented using grayscale images named as motion history image (MHI). MHI is generated by applying accumulative image ... Keywords: visual speech recognition, motion history image, image moments, discrete stationary wavelet transform

Wai C. Yau; Dinesh K. Kumar; Sridhar P. Arjunan; Sanjay Kumar

2006-07-01T23:59:59.000Z

248

Directional Multiresolution Image Representations  

E-Print Network (OSTI)

) are not necessarily best suited for images. Thus, there is a strong motivation to search for more powerful schemes consid´er´ees comme de bonnes repr´esentations des images na- turelles. Le lien entre les courbelettes et

Do, Minh N.

249

Medical imaging systems  

DOE Patents (OSTI)

A medical imaging system provides simultaneous rendering of visible light and fluorescent images. The system may employ dyes in a small-molecule form that remains in a subject's blood stream for several minutes, allowing real-time imaging of the subject's circulatory system superimposed upon a conventional, visible light image of the subject. The system may also employ dyes or other fluorescent substances associated with antibodies, antibody fragments, or ligands that accumulate within a region of diagnostic significance. In one embodiment, the system provides an excitation light source to excite the fluorescent substance and a visible light source for general illumination within the same optical guide that is used to capture images. In another embodiment, the system is configured for use in open surgical procedures by providing an operating area that is closed to ambient light. More broadly, the systems described herein may be used in imaging applications where a visible light image may be usefully supplemented by an image formed from fluorescent emissions from a fluorescent substance that marks areas of functional interest.

Frangioni, John V. (Wayland, MA)

2012-07-24T23:59:59.000Z

250

DOUBLE MAJORS Imaging Science + ...  

E-Print Network (OSTI)

DOUBLE MAJORS Imaging Science + ... Applied Mathematics Biomedical Sciences Computer Science Undergraduate Research Internships and Cooperative Education (Co-op) (optional) Study Abroad WHY IMAGING SCIENCE Science: BS, MS, PhD Color Science: MS, PhD BS + MS/PhD Combos HUMAN VISION BIO- MEDICAL ASTRO- PHYSICS

Zanibbi, Richard

251

Heart imaging method  

DOE Patents (OSTI)

A method for providing an image of the human heart's electrical system derives time-of-flight data from an array of EKG electrodes and this data is transformed into phase information. The phase information, treated as a hologram, is reconstructed to provide an image in one or two dimensions of the electrical system of the functioning heart.

Collins, H. Dale (Richland, WA); Gribble, R. Parks (Richland, WA); Busse, Lawrence J. (Littleton, CO)

1991-01-01T23:59:59.000Z

252

Seismic image waves  

Science Journals Connector (OSTI)

......involved in the seismic imaging process, for example the migration...revisited, 60th Ann. Int. Mtg., Soc. Expl. Geophys...involved in the seismic imaging process, for example the migration...revisited, 60th Ann. Int. Mtg., SOC. Expl. Geophys......

Peter Hubral; Martin Tygel; Jörg Schleicher

1996-05-01T23:59:59.000Z

253

Adaptive wiener image restoration kernel  

DOE Patents (OSTI)

A method and device for restoration of electro-optical image data using an adaptive Wiener filter begins with constructing imaging system Optical Transfer Function, and the Fourier Transformations of the noise and the image. A spatial representation of the imaged object is restored by spatial convolution of the image using a Wiener restoration kernel.

Yuan, Ding (Henderson, NV)

2007-06-05T23:59:59.000Z

254

A Short Summary of Digital Watermarking Techniques for Multimedia Data  

E-Print Network (OSTI)

with the required key, (2) site security methods{the use of rewalls to restrict access, (3) using publicly. Site Security -Firewalls. -Access issues. -Use of publicly available low quality 'thumbnail images

King, Kuo Chin Irwin

255

Wyoming Wind Power Project (generation/wind)  

NLE Websites -- All DOE Office Websites (Extended Search)

Wind Power > Generation Hydro Power Wind Power Monthly GSP BPA White Book Dry Year Tools Firstgov Wyoming Wind Power Project (Foote Creek Rim I and II) Thumbnail image of wind...

256

Generation Planning (pbl/generation)  

NLE Websites -- All DOE Office Websites (Extended Search)

Generation Hydro Power Wind Power Monthly GSP BPA White Book Dry Year Tools Firstgov Generation Planning Thumbnail image of BPA White Book BPA White Book (1998 - 2011) Draft Dry...

257

User Science Images  

NLE Websites -- All DOE Office Websites (Extended Search)

User Science Images User Science Images User Science Images Sort by: Default | Name | Date (low-high) | Date (high-low) | Category NIMROD-1.png FES: NIMROD Simulation February 18, 2010 | Author(s): Dr. Charlson C. Kim (University of Washington) | Category: Fusion Energy | URL: https://nimrodteam.org/ Download Image: NIMROD-1.png | png | 1.5 MB Trajectory of an energetic ion in a Field Reverse Configuration (FRC) magnetic field. Magnetic separatrix denoted by green surface. Spheres are colored by azimuthal velocity. Image courtesy of Charlson Kim, University of Washington; NERSC repos m487, mp21, m1552 Scheibe.png BER: Pore-Scale Fluid Flow for Subsurface Reactive Transport January 1, 2008 | Author(s): Timothy D. Scheibe, PNNL | Category: Environmental Science | URL: http://http://subsurface.pnl.gov/

258

Manhattan Project: Image Retouching`  

Office of Scientific and Technical Information (OSTI)

Image Retouching Image Retouching Resources > Photo Gallery Smyth Report (original) Smyth Report (retouched) Images on this web site have sometimes been "retouched." In every case, however, the intention has been only to restore the image as much as possible to its original condition. Above is a rather extreme example-"before and after" versions of the cover of the Smyth Report (Henry DeWolf Smyth, Atomic Energy for Military Purposes: The Official Report on the Development of the Atomic Bomb under the Auspices of the United States Government, 1940-1945 (Princeton, NJ: Princeton University Press, 1945)). The Smyth Report was commissioned by Leslie Groves and originally issued by the Manhattan Engineer District. Princeton University Press reprinted it in book form as a "public service" with "reproduction in whole or in part authorized and permitted.") Larger versions of the same images are below.

259

GTL Image Gallery  

NLE Websites -- All DOE Office Websites (Extended Search)

Human Genome Project Information • Genomic Science • Microbial Genome Program • sitemap • home Human Genome Project Information • Genomic Science • Microbial Genome Program • sitemap • home Announcing the New Image Gallery Visit the new Image Gallery for an expanded suite of images Biofuels Browse the 2010 "Bioenergy Research Centers: An Overview of the Science" Brochure Gallery. Browse the 2006 "Breaking the Biological Barriers to Cellulosic Ethanol: A Joint Research Agenda" Report Gallery. Browse more biofuels images (includes the June 2006 "Understanding Biomass" Primer Gallery). Systems Biology Browse the August 2005 "Genomics:GTL Roadmap: Systems Biology for Energy and Environment" Gallery. Basic Genomics Browse the Human Chromosome Gallery. Browse more Basic Genomics images. Carbon Cycling

260

Time encoded radiation imaging  

DOE Patents (OSTI)

The various technologies presented herein relate to detecting nuclear material at a large stand-off distance. An imaging system is presented which can detect nuclear material by utilizing time encoded imaging relating to maximum and minimum radiation particle counts rates. The imaging system is integrated with a data acquisition system that can utilize variations in photon pulse shape to discriminate between neutron and gamma-ray interactions. Modulation in the detected neutron count rates as a function of the angular orientation of the detector due to attenuation of neighboring detectors is utilized to reconstruct the neutron source distribution over 360 degrees around the imaging system. Neutrons (e.g., fast neutrons) and/or gamma-rays are incident upon scintillation material in the imager, the photons generated by the scintillation material are converted to electrical energy from which the respective neutrons/gamma rays can be determined and, accordingly, a direction to, and the location of, a radiation source identified.

Marleau, Peter; Brubaker, Erik; Kiff, Scott

2014-10-21T23:59:59.000Z

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

SSRL Web Requests  

NLE Websites -- All DOE Office Websites (Extended Search)

pagesite Change Fix existing form or application Develop new form or application Web-ImagesGraphics Web-Flash Webserver bug - error report Login Help Details of your...

262

Polarization transfer NMR imaging  

DOE Patents (OSTI)

A nuclear magnetic resonance (NMR) image is obtained with spatial information modulated by chemical information. The modulation is obtained through polarization transfer from a first element representing the desired chemical, or functional, information, which is covalently bonded and spin-spin coupled with a second element effective to provide the imaging data. First and second rf pulses are provided at first and second frequencies for exciting the imaging and functional elements, with imaging gradients applied therebetween to spatially separate the nuclei response for imaging. The second rf pulse is applied at a time after the first pulse which is the inverse of the spin coupling constant to select the transfer element nuclei which are spin coupled to the functional element nuclei for imaging. In a particular application, compounds such as glucose, lactate, or lactose, can be labeled with .sup.13 C and metabolic processes involving the compounds can be imaged with the sensitivity of .sup.1 H and the selectivity of .sup.13 C.

Sillerud, Laurel O. (Los Alamos, NM); van Hulsteyn, David B. (Santa Fe, NM)

1990-01-01T23:59:59.000Z

263

Quantum ghost imaging through turbulence  

SciTech Connect

We investigate the effect of turbulence on quantum ghost imaging. We use entangled photons and demonstrate that for a specific experimental configuration the effect of turbulence can be greatly diminished. By decoupling the entangled photon source from the ghost-imaging central image plane, we are able to dramatically increase the ghost-image quality. When imaging a test pattern through turbulence, this method increases the imaged pattern visibility from V=0.15{+-}0.04 to 0.42{+-}0.04.

Dixon, P. Ben; Howland, Gregory A.; Howell, John C. [Department of Physics and Astronomy, University of Rochester, Rochester, New York 14627 (United States); Chan, Kam Wai Clifford [Rochester Optical Manufacturing Company, Rochester, New York 14606 (United States); O'Sullivan-Hale, Colin; Rodenburg, Brandon [Institute of Optics, University of Rochester, Rochester, New York 14627 (United States); Hardy, Nicholas D.; Shapiro, Jeffrey H. [Research Laboratory of Electronics, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139 (United States); Simon, D. S.; Sergienko, A. V. [Department of Electrical and Computer Engineering, Boston University, Boston, Massachusetts 02215 (United States); Boyd, R. W. [Department of Physics and Astronomy, University of Rochester, Rochester, New York 14627 (United States); Institute of Optics, University of Rochester, Rochester, New York 14627 (United States)

2011-05-15T23:59:59.000Z

264

Scanning computed confocal imager  

DOE Patents (OSTI)

There is provided a confocal imager comprising a light source emitting a light, with a light modulator in optical communication with the light source for varying the spatial and temporal pattern of the light. A beam splitter receives the scanned light and direct the scanned light onto a target and pass light reflected from the target to a video capturing device for receiving the reflected light and transferring a digital image of the reflected light to a computer for creating a virtual aperture and outputting the digital image. In a transmissive mode of operation the invention omits the beam splitter means and captures light passed through the target.

George, John S. (Los Alamos, NM)

2000-03-14T23:59:59.000Z

265

Metamaterial microwave holographic imaging system  

Science Journals Connector (OSTI)

We demonstrate a microwave imaging system that combines advances in metamaterial aperture design with emerging computational imaging techniques. The flexibility inherent to...

Hunt, John; Gollub, Jonah; Driscoll, Tom; Lipworth, Guy; Mrozack, Alex; Reynolds, Matthew S; Brady, David J; Smith, David R

2014-01-01T23:59:59.000Z

266

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...in the accommodation sector, the key to reducing...consisted of a hemispherical construction that insects could climb...233, 234). The heating of whole rooms comes...insecticides to open spaces via aerosols), space sprays, and incendiary...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peñas; Richard C. Russell

2012-01-01T23:59:59.000Z

267

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...the treatment of field infestations...95) and cedar oil. The modes of...Best Yet cedar oil can kill all bed...the control of field infestations...complexes, as the gas cannot be tightly...Insecticides The cost to develop and...insects during spray operations. In laboratory...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peñas; Richard C. Russell

2012-01-01T23:59:59.000Z

268

DOODLE-BUGS AND LAW-MAKERS  

Science Journals Connector (OSTI)

...through adolescence. A research group has been assembled. The fund...This committee is conducting a group of studies, of bio-logical...turned south and east via the Klamath lakes to north-western Nevada...some day a wandering ant will fall into the pit and thus keep alive...

J. F. McClendon

1932-07-22T23:59:59.000Z

269

'Bugs' used to treat FGD wastewater  

SciTech Connect

Tough regulation of heavy metals may justify a bioreactor approach in addition to chemical treatment of FGD wastewater. Two of Duke Energy' coal-fired plants, Belews Creek and Allen (in North Carolina) have installed new biological reactor systems to increase selenium removal to levels not achievable by existing scrubber waste water systems. The ABMet system removes nitrate and selenium in a single step. Progress Energy has installed the system at Roxboro and Mayo Stations, also in North Carolina. 1 fig., 2 photos.

Blankinship, S.

2009-09-15T23:59:59.000Z

270

noBugs - project tracking system.  

E-Print Network (OSTI)

??Testing has become a major part of any project in IT industry. Testing is done at every phase of SDLC because the cost and risk… (more)

Kankanawadi, Jyoti Manjunath

2011-01-01T23:59:59.000Z

271

Bed Bugs: Clinical Relevance and Control Options  

Science Journals Connector (OSTI)

...of Prurigo of Hebra in Egypt. J. Egypt. Soc. Parasitol. 15...saw a bedbug. New York Daily News. http://articles...Bedbugs not back by popular demand. Dimens. Crit. Care...at Seaport. New York Daily News. http://articles...

Stephen L. Doggett; Dominic E. Dwyer; Pablo F. Peñas; Richard C. Russell

2012-01-01T23:59:59.000Z

272

Image portion identification methods, image parsing methods, image parsing systems, and articles of manufacture  

DOE Patents (OSTI)

Image portion identification methods, image parsing methods, image parsing systems, and articles of manufacture are described. According to one embodiment, an image portion identification method includes accessing data regarding an image depicting a plurality of biological substrates corresponding to at least one biological sample and indicating presence of at least one biological indicator within the biological sample and, using processing circuitry, automatically identifying a portion of the image depicting one of the biological substrates but not others of the biological substrates.

Lassahn, Gordon D.; Lancaster, Gregory D.; Apel, William A.; Thompson, Vicki S.

2013-01-08T23:59:59.000Z

273

Manhattan Project: People Images  

Office of Scientific and Technical Information (OSTI)

PEOPLE IMAGES PEOPLE IMAGES Resources > Photo Gallery Scroll down to see each of these images individually. The images are: 1. J. Robert Oppenheimer, Enrico Fermi, and Ernest Lawrence (courtesy the Lawrence Berkeley National Laboratory); 2. Hanford, Washington, workers sending money home (reproduced from the photo insert in F. G. Gosling, The Manhattan Project: Making the Atomic Bomb (Washington: History Division, Department of Energy, October 2001)); 3. Oppenheimer and Leslie Groves at the Trinity Site, September 1945 (reproduced from the cover of the Office of History and Heritage Resources publication: The Signature Facilities of the Manhattan Project (Washington: History Division, Department of Energy, 2001)); 4. A WAC detachment marching at Oak Ridge, Tennessee, June 1945 (courtesy the Army Corps of Engineers; it is reprinted in Rachel Fermi and Esther Samra, Picturing the Bomb: Photographs from the Secret World of the Manhattan Project (New York: Harry N. Abrams, Inc., Publishers, 1995), 40);

274

Manhattan Project: Science Images  

Office of Scientific and Technical Information (OSTI)

SCIENCE IMAGES SCIENCE IMAGES Resources > Photo Gallery Scroll down to see each of these images individually. The images are: 1. Fission (this graphic is adapted from a graphic originally produced by the Washington State Department of Health; the modifications are original to the History Division, now Office of History and Heritage Resources, 2003); 2. Fat Man (plutonium bomb), August 1945 (courtesy the U.S. Army Corps of Engineers (via theNational Archives)); 3. F Reactor Plutonium Production Complex Hanford, Washington, 1945; 4. A Cockroft-Walton machine at Los Alamos, New Mexico (courtesy the Los Alamos National Laboratory; it is reprinted in John F. Hogerton, ed., "Cockroft-Walton Machine," The Atomic Energy Deskbook (New York: Reinhold Publishing Corporation, 1963, prepared under the auspices of the Division of Technical Information, U.S. Atomic Energy Commission), 102);

275

Practical image based lighting  

E-Print Network (OSTI)

In this thesis, we present a user-friendly and practical method for seamless integration of computer-generated images (CG) with real photographs and video. In general such seamless integration is extremely hard and requires recovery of real world...

Lee, Jaemin

2012-06-07T23:59:59.000Z

276

Photothermal imaging scanning microscopy  

DOE Patents (OSTI)

Photothermal Imaging Scanning Microscopy produces a rapid, thermal-based, non-destructive characterization apparatus. Also, a photothermal characterization method of surface and subsurface features includes micron and nanoscale spatial resolution of meter-sized optical materials.

Chinn, Diane (Pleasanton, CA); Stolz, Christopher J. (Lathrop, CA); Wu, Zhouling (Pleasanton, CA); Huber, Robert (Discovery Bay, CA); Weinzapfel, Carolyn (Tracy, CA)

2006-07-11T23:59:59.000Z

277

Overview of Image Reconstruction  

SciTech Connect

Image reconstruction (or computerized tomography, etc.) is any process whereby a function, f, on Rn is estimated from empirical data pertaining to its integrals, ∫f(x) dx, for some collection of hyperplanes of dimension k < n. The paper begins with background information on how image reconstruction problems have arisen in practice, and describes some of the application areas of past or current interest; these include radioastronomy, optics, radiology and nuclear medicine, electron microscopy, acoustical imaging, geophysical tomography, nondestructive testing, and NMR zeugmatography. Then the various reconstruction algorithms are discussed in five classes: summation, or simple back-projection; convolution, or filtered back-projection; Fourier and other functional transforms; orthogonal function series expansion; and iterative methods. Certain more technical mathematical aspects of image reconstruction are considered from the standpoint of uniqueness, consistency, and stability of solution. The paper concludes by presenting certain open problems. 73 references. (RWR)

Marr, R.B.

1980-04-01T23:59:59.000Z

278

Image Content Engine (ICE)  

SciTech Connect

The Image Content Engine (ICE) is being developed to provide cueing assistance to human image analysts faced with increasingly large and intractable amounts of image data. The ICE architecture includes user configurable feature extraction pipelines which produce intermediate feature vector and match surface files which can then be accessed by interactive relational queries. Application of the feature extraction algorithms to large collections of images may be extremely time consuming and is launched as a batch job on a Linux cluster. The query interface accesses only the intermediate files and returns candidate hits nearly instantaneously. Queries may be posed for individual objects or collections. The query interface prompts the user for feedback, and applies relevance feedback algorithms to revise the feature vector weighting and focus on relevant search results. Examples of feature extraction and both model-based and search-by-example queries are presented.

Brase, J M

2007-03-26T23:59:59.000Z

279

JOB OPPORTUNITIES Breast imaging  

E-Print Network (OSTI)

Genitourinary Radiology Head and Neck Radiology Musculoskeletal Radiology Neuroradiology Pediatric RadiologyJOB OPPORTUNITIES Breast imaging Chest Radiology Emergency Radiology Gastrointestinal Radiology Interventional Radiology Nuclear Radiology Radiation Oncology What Can I Do With a Major in... Radiological

Jiang, Huiqiang

280

THERMAL NEUTRON BACKSCATTER IMAGING.  

SciTech Connect

Objects of various shapes, with some appreciable hydrogen content, were exposed to fast neutrons from a pulsed D-T generator, resulting in a partially-moderated spectrum of backscattered neutrons. The thermal component of the backscatter was used to form images of the objects by means of a coded aperture thermal neutron imaging system. Timing signals from the neutron generator were used to gate the detection system so as to record only events consistent with thermal neutrons traveling the distance between the target and the detector. It was shown that this time-of-flight method provided a significant improvement in image contrast compared to counting all events detected by the position-sensitive {sup 3}He proportional chamber used in the imager. The technique may have application in the detection and shape-determination of land mines, particularly non-metallic types.

VANIER,P.; FORMAN,L.; HUNTER,S.; HARRIS,E.; SMITH,G.

2004-10-16T23:59:59.000Z

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Quantum Imaging Technologies  

E-Print Network (OSTI)

Over the past three decades, quantum mechanics has allowed the development of technologies that provide unconditionally secure communication. In parallel, the quantum nature of the transverse electromagnetic field has spawned the field of quantum imaging that encompasses technologies such as quantum ghost imaging and high-dimensional quantum key distribution (QKD). The emergence of such quantum technologies also highlights the need for the development of methods for characterizing the elusive quantum state itself. In this document, we describe new technologies that use the quantum properties of light for security. The first is a technique that extends the principles behind QKD to the field of imaging. By applying the polarization-based BB84 protocol to individual photons in an active imaging system, we obtained images that are secure against intercept-resend jamming attacks. The second technology presented in this article is based on an extension of quantum ghost imaging. We used a holographic filtering technique to build a quantum ghost image identification system that uses a few pairs of photons to identify an object from a set of known objects. The third technology addressed in this document is a high-dimensional QKD system that uses orbital-angular-momentum (OAM) modes of light for encoding. Moving to a high-dimensional state space in QKD allows one to impress more information on each photon, as well as introduce higher levels of security. We discuss the development of two OAM-QKD protocols based on the BB84 and Ekert QKD protocols. The fourth and final technology presented in this article is a relatively new technique called direct measurement that uses sequential weak and strong measurements to characterize a quantum state. We use this technique to characterize the quantum state of a photon with a dimensionality of d=27, and measure its rotation in the natural basis of OAM.

Mehul Malik; Robert W. Boyd

2014-06-06T23:59:59.000Z

282

Manhattan Project: Events Images  

Office of Scientific and Technical Information (OSTI)

Resources Resources About this Site How to Navigate this Site Library Maps Note on Sources Nuclear Energy and the Public's Right to Know Photo Gallery Site Map Sources and Notes Suggested Readings EVENTS IMAGES Resources > Photo Gallery Page Content Here Scroll down to see each of these images individually. The images are: 1. Albert Einstein and Leo Szilard (courtesy the Federation of American Scientists); 2. Painting of CP-1 going critical (courtesy the National Archives); 3. An Alpha Racetrack inside the Y-12 Electromagnetic Plant, Clinton Engineer Works, Oak Ridge, Tennessee; 4. Eric Jette, Charles Critchfield, and J. Robert Oppenheimer, Los Alamos, New Mexico (this photograph is reprinted from Los Alamos Scientific Laboratory, Los Alamos: Beginning of an Era, 1943-1945 (Los Alamos: Public Relations Office, Los Alamos Scientific Laboratory, ca. 1967-1971), 20);

283

Multispectral imaging probe  

DOE Patents (OSTI)

A multispectral imaging probe delivers a range of wavelengths of excitation light to a target and collects a range of expressed light wavelengths. The multispectral imaging probe is adapted for mobile use and use in confined spaces, and is sealed against the effects of hostile environments. The multispectral imaging probe comprises a housing that defines a sealed volume that is substantially sealed from the surrounding environment. A beam splitting device mounts within the sealed volume. Excitation light is directed to the beam splitting device, which directs the excitation light to a target. Expressed light from the target reaches the beam splitting device along a path coaxial with the path traveled by the excitation light from the beam splitting device to the target. The beam splitting device directs expressed light to a collection subsystem for delivery to a detector. 8 figs.

Sandison, D.R.; Platzbecker, M.R.; Descour, M.R.; Armour, D.L.; Craig, M.J.; Richards-Kortum, R.

1999-07-27T23:59:59.000Z

284

Multispectral imaging probe  

DOE Patents (OSTI)

A multispectral imaging probe delivers a range of wavelengths of excitation light to a target and collects a range of expressed light wavelengths. The multispectral imaging probe is adapted for mobile use and use in confined spaces, and is sealed against the effects of hostile environments. The multispectral imaging probe comprises a housing that defines a sealed volume that is substantially sealed from the surrounding environment. A beam splitting device mounts within the sealed volume. Excitation light is directed to the beam splitting device, which directs the excitation light to a target. Expressed light from the target reaches the beam splitting device along a path coaxial with the path traveled by the excitation light from the beam splitting device to the target. The beam splitting device directs expressed light to a collection subsystem for delivery to a detector.

Sandison, David R. (Moriarty, NM); Platzbecker, Mark R. (Albuquerque, NM); Descour, Michael R. (Tucson, AZ); Armour, David L. (Albuquerque, NM); Craig, Marcus J. (Albuquerque, NM); Richards-Kortum, Rebecca (Austin, TX)

1999-01-01T23:59:59.000Z

285

Variable waveband infrared imager  

DOE Patents (OSTI)

A waveband imager includes an imaging pixel that utilizes photon tunneling with a thermally actuated bimorph structure to convert infrared radiation to visible radiation. Infrared radiation passes through a transparent substrate and is absorbed by a bimorph structure formed with a pixel plate. The absorption generates heat which deflects the bimorph structure and pixel plate towards the substrate and into an evanescent electric field generated by light propagating through the substrate. Penetration of the bimorph structure and pixel plate into the evanescent electric field allows a portion of the visible wavelengths propagating through the substrate to tunnel through the substrate, bimorph structure, and/or pixel plate as visible radiation that is proportional to the intensity of the incident infrared radiation. This converted visible radiation may be superimposed over visible wavelengths passed through the imaging pixel.

Hunter, Scott R.

2013-06-11T23:59:59.000Z

286

Modern Imaging Technology: Recent Advances  

SciTech Connect

This 2-day conference is designed to bring scientist working in nuclear medicine, as well as nuclear medicine practitioners together to discuss the advances in four selected areas of imaging: Biochemical Parameters using Small Animal Imaging, Developments in Small Animal PET Imaging, Cell Labeling, and Imaging Angiogenesis Using Multiple Modality. The presentations will be on molecular imaging applications at the forefront of research, up to date on the status of molecular imaging in nuclear medicine as well as in related imaging areas. Experts will discuss the basic science of imaging techniques, and scheduled participants will engage in an exciting program that emphasizes the current status of molecular imaging as well as the role of DOE funded research in this area.

Welch, Michael J.; Eckelman, William C.

2004-06-18T23:59:59.000Z

287

Image Charge Differential  

E-Print Network (OSTI)

Image Charge Differential Amplifier FT 0 Crude Oil Time (s) 543210 Frequency (kHz) m/z m q B f Fourier transform ion cyclotron resonance mass spectrometry (FT-ICR MS) uses the frequency of cyclotron motion of the ions in a static magnetic field to determine the mass-to-charge ratio, which is then used

Weston, Ken

288

EBSD Images Theoretical Background  

E-Print Network (OSTI)

Motivation EBSD Images Theoretical Background Defects in the Weld Grain Growth Low Speed Welding High Speed Welding Conclusion Heat-Affected Zone Observations Welding Experiments The low density in the transportation industries. Reproducibility and the low cost make welding a major large scale assembly process

Candea, George

289

Time-Encoded Imagers.  

SciTech Connect

This report provides a short overview of the DNN R&D funded project, Time-Encoded Imagers. The project began in FY11 and concluded in FY14. The Project Description below provides the overall motivation and objectives for the project as well as a summary of programmatic direction. It is followed by a short description of each task and the resulting deliverables.

Marleau, Peter; Brubaker, Erik

2014-11-01T23:59:59.000Z

290

Image Reconstruction for Prostate Specific Nuclear Medicine imagers  

SciTech Connect

There is increasing interest in the design and construction of nuclear medicine detectors for dedicated prostate imaging. These include detectors designed for imaging the biodistribution of radiopharmaceuticals labeled with single gamma as well as positron-emitting radionuclides. New detectors and acquisition geometries present challenges and opportunities for image reconstruction. In this contribution various strategies for image reconstruction for these special purpose imagers are reviewed. Iterative statistical algorithms provide a framework for reconstructing prostate images from a wide variety of detectors and acquisition geometries for PET and SPECT. The key to their success is modeling the physics of photon transport and data acquisition and the Poisson statistics of nuclear decay. Analytic image reconstruction methods can be fast and are useful for favorable acquisition geometries. Future perspectives on algorithm development and data analysis for prostate imaging are presented.

Mark Smith

2007-01-11T23:59:59.000Z

291

Devices, systems, and methods for imaging  

DOE Patents (OSTI)

Certain exemplary embodiments comprise a system, which can comprise an imaging plate. The imaging plate can be exposable by an x-ray source. The imaging plate can be configured to be used in digital radiographic imaging. The imaging plate can comprise a phosphor-based image storage device configured to convert an image stored therein into light.

Appleby, David (North Garden, VA); Fraser, Iain (Ruckersville, VA); Watson, Scott (Jemez Springs, NM)

2008-04-15T23:59:59.000Z

292

Image Utility Assessment and a Relationship with Image Quality Assessment  

E-Print Network (OSTI)

Image Utility Assessment and a Relationship with Image Quality Assessment David M. Rouse , Romuald information to humans, and this paper investigates the utility assessment task, where human observers evaluate the usefulness of a natural image as a surrogate for a reference. Current QA algorithms implicitly assess utility

Hemami, Sheila S.

293

Comprehensive Study of Image Restoration Algorithms.  

E-Print Network (OSTI)

??Abstract Comprehensive Study of Image Restoration Algorithms By Lize Zong Master of Science in Electrical Engineering Image restoration is an important part of digital image-processing.… (more)

Zong, Lize

2015-01-01T23:59:59.000Z

294

Fundamentals of Medical Image Processing  

Science Journals Connector (OSTI)

After some remarks to the background and terminology used, Sect. 62.3 deals with low-level image processing as far as necessary to understand the following chapters. Subsequently, the core steps of image analy...

Thomas M. Deserno

2011-01-01T23:59:59.000Z

295

Image-based building modeling.  

E-Print Network (OSTI)

??Image-based modeling is the process of converting 2D images of the real world into digital 3D models in computer. Among myriad kinds of objects in… (more)

Xiao, Jianxiong

2009-01-01T23:59:59.000Z

296

Total Sky Imager (TSI) Handbook  

SciTech Connect

The total sky imager (TSI) provides time series of hemispheric sky images during daylight hours and retrievals of fractional sky cover for periods when the solar elevation is greater than 10 degrees.

Morris, VR

2005-06-01T23:59:59.000Z

297

Ultrasonic Maximum Aperture Saft Imaging  

Science Journals Connector (OSTI)

The focused transducer combined with C-scan imaging is currently the workhorse of ultrasonic nondestructive evaluation (NDE) [1]. Its strength lies in its simplicity and high quality images. There is room for imp...

P. J. Howard; R. Y. Chiao

1995-01-01T23:59:59.000Z

298

Automating Shallow Seismic Imaging  

SciTech Connect

This seven-year, shallow-seismic reflection research project had the aim of improving geophysical imaging of possible contaminant flow paths. Thousands of chemically contaminated sites exist in the United States, including at least 3,700 at Department of Energy (DOE) facilities. Imaging technologies such as shallow seismic reflection (SSR) and ground-penetrating radar (GPR) sometimes are capable of identifying geologic conditions that might indicate preferential contaminant-flow paths. Historically, SSR has been used very little at depths shallower than 30 m, and even more rarely at depths of 10 m or less. Conversely, GPR is rarely useful at depths greater than 10 m, especially in areas where clay or other electrically conductive materials are present near the surface. Efforts to image the cone of depression around a pumping well using seismic methods were only partially successful (for complete references of all research results, see the full Final Technical Report, DOE/ER/14826-F), but peripheral results included development of SSR methods for depths shallower than one meter, a depth range that had not been achieved before. Imaging at such shallow depths, however, requires geophone intervals of the order of 10 cm or less, which makes such surveys very expensive in terms of human time and effort. We also showed that SSR and GPR could be used in a complementary fashion to image the same volume of earth at very shallow depths. The primary research focus of the second three-year period of funding was to develop and demonstrate an automated method of conducting two-dimensional (2D) shallow-seismic surveys with the goal of saving time, effort, and money. Tests involving the second generation of the hydraulic geophone-planting device dubbed the ''Autojuggie'' showed that large numbers of geophones can be placed quickly and automatically and can acquire high-quality data, although not under rough topographic conditions. In some easy-access environments, this device could make SSR surveying considerably more efficient and less expensive, particularly when geophone intervals of 25 cm or less are required. The most recent research analyzed the difference in seismic response of the geophones with variable geophone spike length and geophones attached to various steel media. Experiments investigated the azimuthal dependence of the quality of data relative to the orientation of the rigidly attached geophones. Other experiments designed to test the hypothesis that the data are being amplified in much the same way that an organ pipe amplifies sound have so far proved inconclusive. Taken together, the positive results show that SSR imaging within a few meters of the earth's surface is possible if the geology is suitable, that SSR imaging can complement GPR imaging, and that SSR imaging could be made significantly more cost effective, at least in areas where the topography and the geology are favorable. Increased knowledge of the Earth's shallow subsurface through non-intrusive techniques is of potential benefit to management of DOE facilities. Among the most significant problems facing hydrologists today is the delineation of preferential permeability paths in sufficient detail to make a quantitative analysis possible. Aquifer systems dominated by fracture flow have a reputation of being particularly difficult to characterize and model. At chemically contaminated sites, including U.S. Department of Energy (DOE) facilities and others at Department of Defense (DOD) installations worldwide, establishing the spatial extent of the contamination, along with the fate of the contaminants and their transport-flow directions, is essential to the development of effective cleanup strategies. Detailed characterization of the shallow subsurface is important not only in environmental, groundwater, and geotechnical engineering applications, but also in neotectonics, mining geology, and the analysis of petroleum reservoir analogs. Near-surface seismology is in the vanguard of non-intrusive approaches to increase knowledge of the shallow subsurface; our

Steeples, Don W.

2004-12-09T23:59:59.000Z

299

Unsupervised Image Ranking Eva Hrster  

E-Print Network (OSTI)

these are the most interesting and relevant shots. For instance, if there are many images of the Golden Gate Bridge

Weinberger, Kilian

300

Medical Image on the Go!  

Science Journals Connector (OSTI)

The idea for softcopy viewing of medical image outside the radiology reading room spread among the scientists in various fields for several years. An image could be read on workstation of all types, from desktop across movable to handheld. ... Keywords: DICOM, Imaging informatics, JPEG2000, Pervasive healthcare, Ubiquitous healthcare

Dragan Ivetic; Dinu Dragan

2011-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

User Science Images  

NLE Websites -- All DOE Office Websites (Extended Search)

PorousMedia3medres.png PorousMedia3medres.png ASCR: Carbon Dioxide Sequestration September 14, 2009 | Author(s): G. S. H. Pau, J. B. Bell, K. Pruess, A. S. Almgren, M. J. Lijewski, and K. Zhang | Category: Environmental Science | URL: http://esd.lbl.gov/research/projects/tough/documentation/proceedings/ Download Image: PorousMedia3medres.png | png | 159 KB Simulation of density-driven flow for CO2 storage in saline aquifers. Shown is a snapshot of the CO2 concentration after onset of convection overlayed on the AMR grid. Image courtesy of George Pau and John Bell (LBNL). Repo mp111 marcdayhydrogenflame.jpg ASCR: Lab-scale Flame Simulation September 1, 2009 | Author(s): M.S.Day, J.B. Bell, R.K. Cheng, S. Tachibana, V.E. Beckner and M.J. Lijewski (LBNL) | Category: Combustion | URL: https://apdec.org/APDEC_Progress_Fall09.shtml

302

Imaging alpha particle detector  

DOE Patents (OSTI)

A method and apparatus for detecting and imaging alpha particles sources is described. A dielectric coated high voltage electrode and a tungsten wire grid constitute a diode configuration discharge generator for electrons dislodged from atoms or molecules located in between these electrodes when struck by alpha particles from a source to be quantitatively or qualitatively analyzed. A thin polyester film window allows the alpha particles to pass into the gas enclosure and the combination of the glass electrode, grid and window is light transparent such that the details of the source which is imaged with high resolution and sensitivity by the sparks produced can be observed visually as well. The source can be viewed directly, electronically counted or integrated over time using photographic methods. A significant increase in sensitivity over other alpha particle detectors is observed, and the device has very low sensitivity to gamma or beta emissions which might otherwise appear as noise on the alpha particle signal.

Anderson, D.F.

1980-10-29T23:59:59.000Z

303

Imaging alpha particle detector  

DOE Patents (OSTI)

A method and apparatus for detecting and imaging alpha particles sources is described. A conducting coated high voltage electrode (1) and a tungsten wire grid (2) constitute a diode configuration discharge generator for electrons dislodged from atoms or molecules located in between these electrodes when struck by alpha particles from a source (3) to be quantitatively or qualitatively analyzed. A thin polyester film window (4) allows the alpha particles to pass into the gas enclosure and the combination of the glass electrode, grid and window is light transparent such that the details of the source which is imaged with high resolution and sensitivity by the sparks produced can be observed visually as well. The source can be viewed directly, electronically counted or integrated over time using photographic methods. A significant increase in sensitivity over other alpha particle detectors is observed, and the device has very low sensitivity to gamma or beta emissions which might otherwise appear as noise on the alpha particle signal.

Anderson, David F. (Los Alamos, NM)

1985-01-01T23:59:59.000Z

304

The Cosmic Background Imager  

E-Print Network (OSTI)

The Cosmic Background Imager (CBI) is an instrument designed to make images of the cosmic microwave background radiation and to measure its statistical properties on angular scales from about 3 arc minutes to one degree (spherical harmonic scales from l ~ 4250 down to l ~ 400). The CBI is a 13-element interferometer mounted on a 6 meter platform operating in ten 1-GHz frequency bands from 26 GHz to 36 GHz. The instantaneous field of view of the instrument is 45 arcmin (FWHM) and its resolution ranges from 3 to 10 arcmin; larger fields can be imaged by mosaicing. At this frequency and resolution, the primary foreground is due to discrete extragalactic sources, which are monitored at the Owens Valley Radio Observatory and subtracted from the CBI visibility measurements. The instrument has been making observations since late 1999 of both primordial CMB fluctuations and the Sunyaev-Zeldovich effect in clusters of galaxies from its site at an altitude of 5080 meters near San Pedro de Atacama, in northern Chile. Observations will continue until August 2001 or later. We present preliminary results from the first few months of observations.

T. J. Pearson; B. S. Mason; S. Padin; A. C. S. Readhead; M. C. Shepherd; J. Sievers; P. S. Udomprasert; J. K. Cartwright

2000-12-11T23:59:59.000Z

305

Fiducial marker for correlating images  

DOE Patents (OSTI)

The invention relates to a fiducial marker having a marking grid that is used to correlate and view images produced by different imaging modalities or different imaging and viewing modalities. More specifically, the invention relates to the fiducial marking grid that has a grid pattern for producing either a viewing image and/or a first analytical image that can be overlaid with at least one other second analytical image in order to view a light path or to image different imaging modalities. Depending on the analysis, the grid pattern has a single layer of a certain thickness or at least two layers of certain thicknesses. In either case, the grid pattern is imageable by each imaging or viewing modality used in the analysis. Further, when viewing a light path, the light path of the analytical modality cannot be visualized by viewing modality (e.g., a light microscope objective). By correlating these images, the ability to analyze a thin sample that is, for example, biological in nature but yet contains trace metal ions is enhanced. Specifically, it is desired to analyze both the organic matter of the biological sample and the trace metal ions contained within the biological sample without adding or using extrinsic labels or stains.

Miller, Lisa Marie (Rocky Point, NY); Smith, Randy J. (Wading River, NY); Warren, John B. (Port Jefferson, NY); Elliott, Donald (Hampton Bays, NY)

2011-06-21T23:59:59.000Z

306

Backscatter absorption gas imaging system  

DOE Patents (OSTI)

A video imaging system for detecting hazardous gas leaks. Visual displays of invisible gas clouds are produced by radiation augmentation of the field of view of an imaging device by radiation corresponding to an absorption line of the gas to be detected. The field of view of an imager is irradiated by a laser. The imager receives both backscattered laser light and background radiation. When a detectable gas is present, the backscattered laser light is highly attenuated, producing a region of contrast or shadow on the image. A flying spot imaging system is utilized to synchronously irradiate and scan the area to lower laser power requirements. The imager signal is processed to produce a video display.

McRae, Jr., Thomas G. (Livermore, CA)

1985-01-01T23:59:59.000Z

307

Bistatic SAR: Imagery & Image Products.  

SciTech Connect

While typical SAR imaging employs a co-located (monostatic) RADAR transmitter and receiver, bistatic SAR imaging separates the transmitter and receiver locations. The transmitter and receiver geometry determines if the scattered signal is back scatter, forward scatter, or side scatter. The monostatic SAR image is backscatter. Therefore, depending on the transmitter/receiver collection geometry, the captured imagery may be quite different that that sensed at the monostatic SAR. This document presents imagery and image products formed from captured signals during the validation stage of the bistatic SAR research. Image quality and image characteristics are discussed first. Then image products such as two-color multi-view (2CMV) and coherent change detection (CCD) are presented.

Yocky, David A.; Wahl, Daniel E.; Jakowatz, Charles V,

2014-10-01T23:59:59.000Z

308

Bug Bytes,Summer 2008 1 W elcome to Bug Bytes, our newly  

E-Print Network (OSTI)

was named the best in the country by the Chronicle of Higher Education, considered the top news and job for that perfect entomological t-shirts, books, insect art prints, insect candy, and posters of California drag- insect. You can see what's available at www. bohartmuseum.com. Purchases at the Education Programs

Ishida, Yuko

309

What is a bed bug? Bed bugs are small, oval, reddish brown, non-  

E-Print Network (OSTI)

zippers. Thus, experts recommend using hard luggage that closes tight. ·Protectyourclothes. Seal your clothes inside air-tight bags. ·Protectyourluggage. Never set your luggage on the bed or on a couch. Put. ·Treatyourluggagebeforeyoustoreit. After you have unpacked, vacuum your luggage thoroughly. Also, if it is hot outside, you can seal

Almor, Amit

310

Towards indexing representative images on the web  

Science Journals Connector (OSTI)

Even after 20 years of research on real-world image retrieval, there is still a big gap between what search engines can provide and what users expect to see. To bridge this gap, we present an image knowledge base, ImageKB, a graph representation of structured ... Keywords: image understanding, large-scale text to image translation, image knowledge base

Xin-Jing Wang; Zheng Xu; Lei Zhang; Ce Liu; Yong Rui

2012-10-01T23:59:59.000Z

311

Medical image classification with multiple kernel learning  

Science Journals Connector (OSTI)

Nowadays, medical images are generated by hospitals and medical centers rapidly. The large volume of medical image data produces a strong need to effective medical image retrieval. The visual characteristic of medical image, such as modality, anatomical ... Keywords: feature fusion, image classification, medical imaging, multiple kernel learning

Hong Wu; Hao Zhang; Chao Li

2010-12-01T23:59:59.000Z

312

Photogrammetry & Machine Vision 1. Image sensors  

E-Print Network (OSTI)

Photogrammetry & Machine Vision 1. Image sensors (a) Fundamentals of image sensors (b) CCD image. Remondino, N. D'Apuzzo Photogrammetry and Machine Vision ­ 1. Measurement in images (b) Camera calibration of Photogrammetry and Machine Vision Fully understand: 1. Image based 3D and 4D measurement 2. Image based 3D

Giger, Christine

313

ON THE CONTINUITY OF IMAGES BY TRANSMISSION IMAGING Abstract. Transmission imaging is an important imaging technique which is widely used in  

E-Print Network (OSTI)

ON THE CONTINUITY OF IMAGES BY TRANSMISSION IMAGING CHUNLIN WU Abstract. Transmission imaging imaging principle is quite different from that of reflection imaging used in our everyday life. As well scholars studied the application of TV regularization to processing images generated by transmission

Soatto, Stefano

314

Staring 2-D hadamard transform spectral imager  

DOE Patents (OSTI)

A staring imaging system inputs a 2D spatial image containing multi-frequency spectral information. This image is encoded in one dimension of the image with a cyclic Hadamarid S-matrix. The resulting image is detecting with a spatial 2D detector; and a computer applies a Hadamard transform to recover the encoded image.

Gentry, Stephen M. (Albuquerque, NM); Wehlburg, Christine M. (Albuquerque, NM); Wehlburg, Joseph C. (Albuquerque, NM); Smith, Mark W. (Albuquerque, NM); Smith, Jody L. (Albuquerque, NM)

2006-02-07T23:59:59.000Z

315

Fluorescent microthermographic imaging  

SciTech Connect

In the early days of microelectronics, design rules and feature sizes were large enough that sub-micron spatial resolution was not needed. Infrared or IR thermal techniques were available that calculated the object`s temperature from infrared emission. There is a fundamental spatial resolution limitation dependent on the wavelengths of light being used in the image formation process. As the integrated circuit feature sizes began to shrink toward the one micron level, the limitations imposed on IR thermal systems became more pronounced. Something else was needed to overcome this limitation. Liquid crystals have been used with great success, but they lack the temperature measurement capabilities of other techniques. The fluorescent microthermographic imaging technique (FMI) was developed to meet this need. This technique offers better than 0.01{degrees}C temperature resolution and is diffraction limited to 0.3 {mu}m spatial resolution. While the temperature resolution is comparable to that available on IR systems, the spatial resolution is much better. The FMI technique provides better spatial resolution by using a temperature dependent fluorescent film that emits light at 612 nm instead of the 1.5 {mu}m to 12 {mu}m range used by IR techniques. This tutorial starts with a review of blackbody radiation physics, the process by which all heated objects emit radiation to their surroundings, in order to understand the sources of information that are available to characterize an object`s surface temperature. The processes used in infrared thermal imaging are then detailed to point out the limitations of the technique but also to contrast it with the FMI process. The FMI technique is then described in detail, starting with the fluorescent film physics and ending with a series of examples of past applications of FMI.

Barton, D.L.

1993-09-01T23:59:59.000Z

316

Radiation imaging apparatus  

DOE Patents (OSTI)

A radiation imaging system using a charge multiplier and a position sensitive anode in the form of periodically arranged sets of interconnected anode regions for detecting the position of the centroid of a charge cloud arriving thereat from the charge multiplier. Various forms of improved position sensitive anodes having single plane electrode connections are disclosed. Various analog and digital signal processing systems are disclosed, including systems which use the fast response of microchannel plates, anodes and preamps to perform scintillation pulse height analysis digitally. 15 figs.

Anger, H.O.; Martin, D.C.; Lampton, M.L.

1983-07-26T23:59:59.000Z

317

Radiation imaging apparatus  

DOE Patents (OSTI)

A radiation imaging system using a charge multiplier and a position sensitive anode in the form of periodically arranged sets of interconnected anode regions for detecting the position of the centroid of a charge cloud arriving thereat from the charge multiplier. Various forms of improved position sensitive anodes having single plane electrode connections are disclosed. Various analog and digital signal processing systems are disclosed, including systems which use the fast response of microchannel plates, anodes and preamps to perform scintillation pulse height analysis digitally.

Anger, Hal O. (Berkeley, CA); Martin, Donn C. (Berkeley, CA); Lampton, Michael L. (Berkeley, CA)

1983-01-01T23:59:59.000Z

318

Neutron imaging with bent perfect crystals. I. Imaging conditions  

Science Journals Connector (OSTI)

Neutron imaging with bent crystals is considered in the linear approximation of neutron optics. A matrix formalism analogous to that of conventional lens optics is developed.

Stoica, A.D.

2001-05-22T23:59:59.000Z

319

User Science Images  

NLE Websites -- All DOE Office Websites (Extended Search)

KChenCastroHiRes2013.png KChenCastroHiRes2013.png HEP: CASTRO (Eulerian Radiation Hydrodynamics) Simulation February 6, 2013 | Author(s): Ke-Jung Chen | Category: Astrophysics | URL: http://www.nature.com/nature/journal/v494/n7435/full/494046a.html Download Image: KChenCastroHiRes2013.png | png | 3.6 MB Collision between two shells of matter ejected by a massive star in two pair-instability supernova eruptions, only years apart, just before the star dies, showing a slice through a corner of the event. Shell radius (red knots) is about 500 times the Earth-Sun distance. Colors represent gas density (red is highest, dark blue is lowest). Image courtesy of Ke-Jung Chen, School of Physics and Astronomy, Univ. Minnesota. Repo m1400 Otts271115snap.png NP: Core-Collapse Supernova October 24, 2012 | Author(s): C. D. OTT1 , E. ABDIKAMALOV , P. MÖSTA1 , R.

320

X-ray Imaging Workshop  

NLE Websites -- All DOE Office Websites (Extended Search)

Imaging and Spectro-microscopy: Imaging and Spectro-microscopy: the Present and the Future Stanford Synchrotron Radiation Laboratory October 8-9, 2002 Organizers: John Miao & Keith Hodgson A workshop on "X-ray Imaging and Spectro-microscopy: the Present and the Future" was held on October 8-9, 2002. This workshop, organized by John Miao (SSRL) and Keith Hodgson (SSRL) provided a forum to discuss the scientific applications of a variety of imaging and spectro-microscopic techniques, including photoemission electron microscopy (PEEM), angle resolved photoemission spectroscopy (ARPES), coherent diffraction imaging, x-ray microscopy, micro-tomography, holographic imaging, and x-ray micro-probe. Twelve invited speakers discussed the important scientific applications of these techniques, and also predicted the future scientific directions with the advance of instrumentation and x-ray sources. The workshop was well attended with over fifty registered attendees.

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Reflective ghost imaging through turbulence  

SciTech Connect

Recent work has indicated that ghost imaging may have applications in standoff sensing. However, most theoretical work has addressed transmission-based ghost imaging. To be a viable remote-sensing system, the ghost imager needs to image rough-surfaced targets in reflection through long, turbulent optical paths. We develop, within a Gaussian-state framework, expressions for the spatial resolution, image contrast, and signal-to-noise ratio of such a system. We consider rough-surfaced targets that create fully developed speckle in their returns and Kolmogorov-spectrum turbulence that is uniformly distributed along all propagation paths. We address both classical and nonclassical optical sources, as well as a computational ghost imager.

Hardy, Nicholas D.; Shapiro, Jeffrey H. [Research Laboratory of Electronics, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139 (United States)

2011-12-15T23:59:59.000Z

322

EMSL - atomic-resolution imaging  

NLE Websites -- All DOE Office Websites (Extended Search)

atomic-resolution-imaging en Molecular Hydrogen Formation from Proximal Glycol Pairs on TiO2(110). http:www.emsl.pnl.govemslwebpublicationsmolecular-hydrogen-formation-proxima...

323

Image retrieval using Markov Random Fields and global image features  

Science Journals Connector (OSTI)

In this paper, we propose a direct image retrieval framework based on Markov Random Fields (MRFs) that exploits the semantic context dependencies of the image. The novelty of our approach lies in the use of different kernels in our non-parametric density ... Keywords: Markov processes, nonparametric statistics

Ainhoa Llorente; R. Manmatha; Stefan Rüger

2010-07-01T23:59:59.000Z

324

Descriptive image feature for object detection in medical images  

Science Journals Connector (OSTI)

Algorithms based on the local description of interest regions are well adapted to the task of detecting and matching equivalent points between two images. Classical descriptors such as SIFT or SURF are efficient when applied to regular images with rich ... Keywords: SURF, detection, feature, keypoint, vertebra

Fabian Lecron; Mohammed Benjelloun; Saïd Mahmoudi

2012-06-01T23:59:59.000Z

325

Processing Visual Images  

SciTech Connect

The back of the eye is lined by an extraordinary biological pixel detector, the retina. This neural network is able to extract vital information about the external visual world, and transmit this information in a timely manner to the brain. In this talk, Professor Litke will describe a system that has been implemented to study how the retina processes and encodes dynamic visual images. Based on techniques and expertise acquired in the development of silicon microstrip detectors for high energy physics experiments, this system can simultaneously record the extracellular electrical activity of hundreds of retinal output neurons. After presenting first results obtained with this system, Professor Litke will describe additional applications of this incredible technology.

Litke, Alan (UC Santa Cruz) [UC Santa Cruz

2006-03-27T23:59:59.000Z

326

Video surveillance with speckle imaging  

DOE Patents (OSTI)

A surveillance system looks through the atmosphere along a horizontal or slant path. Turbulence along the path causes blurring. The blurring is corrected by speckle processing short exposure images recorded with a camera. The exposures are short enough to effectively freeze the atmospheric turbulence. Speckle processing is used to recover a better quality image of the scene.

Carrano, Carmen J. (Livermore, CA); Brase, James M. (Pleasanton, CA)

2007-07-17T23:59:59.000Z

327

Medical Image Segmentation Xiaolei Huang  

E-Print Network (OSTI)

(CAT), Magnetic Resonance Imaging (MRI), Ultrasound, and X-Ray, in standard DICOM formats are often for searching and mining in medical image archives. A chal- lenging problem is to segment regions with boundary-based classification approaches. We first review these two categories of methods and discuss the potential

Huang, Xiaolei

328

Image texture analysis of elastograms  

E-Print Network (OSTI)

generated elastograms to obtain effective texture features. Four image analysis techniques, co-occurrence statistics, wavelet decomposition, fractal analysis and granulomeay are used to extract a number of features from each image. The inclusions...-RESOLUTION FRACTAL ANALYSIS . . . . . . E. GRANULOMETRIC FEATURES . . F. DATA NORMALIZATION . G. SEPARABILITY MEASURE 13 13 . . . . . 14 . . . . . 20 . . . . . 29 33 36 36 IV TEXTURE ANALYSIS OF SIMULATED ELASTOGRAMS. . . . . . . . . . . 38 A. SIMULATION...

Hussain, Fasahat

2012-06-07T23:59:59.000Z

329

Spatial Sampling for Image Segmentation  

E-Print Network (OSTI)

AND ALONSO RAMIREZ­MANZANARES3 1 Centro de Investigacion en Matematicas A.C, Guanajuato GTO 36000, Mexico 2 Matematicas, Guanajuato GTO 36000, Mexico Email: mrivera@cimat.mx We present a novel framework for image­ processing in order to obtain a desired solution. On the other hand, the image segmentation is commonly

Rivera, Mariano

330

Dynamic Spectral Imaging: Improving Colposcopy  

Science Journals Connector (OSTI)

...image pixel of the cervix. The optical head provides uniform illumination with a focused and collimated white light-emitting diode, and imaging with magnification optics coupled to a 1,024 768, 8-bit/channel digital color CCD camera...

William P. Soutter; Emmanuel Diakomanolis; Deirdre Lyons; Sadaf Ghaem-Maghami; Tosin Ajala; Dimitrios Haidopoulos; Dimitrios Doumplis; Costas Kalpaktsoglou; Gerasimos Sakellaropoulos; Suzan Soliman; Karen Perryman; Vicky Hird; C. Hilary Buckley; Kitty Pavlakis; Sofia Markaki; Roberto Dina; Vourneen Healy; Costas Balas

2009-03-01T23:59:59.000Z

331

Nested Images Qiang Tong#1  

E-Print Network (OSTI)

Nested Images Qiang Tong#1 , Song-Hai Zhang#2 , Ralph R. Martin*3 , Paul L. Rosin*4 # Tsinghua.Rosin@cs.cardiff.ac.uk Abstract--A nested image is a form of artistic expression in which one or more secondary figures detects the enclosed outer contour of the figure to be nested, and then finds a place in the outer figure

Martin, Ralph R.

332

Contemporary Mathematics Wavelet Image Compression  

E-Print Network (OSTI)

fundamental problems in science and engineering, such as audio de-noising, signal compression, object in a way to fit the engineering model of image compression. 1. Introduction Wavelets are functions which and engineering. This thesis focuses on the processing of color images with the use of custom designed wavelet

Song, Myung-Sin

333

Image capture system colors transforms  

Science Journals Connector (OSTI)

The goal of this paper is to simulate the colors transforms of the reflected light from an illuminated object that passes trough an image capture system. We are interested to see the colors differences at the output of each component from which the light ... Keywords: CIE standards, human eye response, lenses and filters transmittance, spectral images

Toadere Florin

2010-02-01T23:59:59.000Z

334

Simultaneous acquisition of differing image types  

DOE Patents (OSTI)

A system in one embodiment includes an image forming device for forming an image from an area of interest containing different image components; an illumination device for illuminating the area of interest with light containing multiple components; at least one light source coupled to the illumination device, the at least one light source providing light to the illumination device containing different components, each component having distinct spectral characteristics and relative intensity; an image analyzer coupled to the image forming device, the image analyzer decomposing the image formed by the image forming device into multiple component parts based on type of imaging; and multiple image capture devices, each image capture device receiving one of the component parts of the image. A method in one embodiment includes receiving an image from an image forming device; decomposing the image formed by the image forming device into multiple component parts based on type of imaging; receiving the component parts of the image; and outputting image information based on the component parts of the image. Additional systems and methods are presented.

Demos, Stavros G

2012-10-09T23:59:59.000Z

335

Fluid Imaging of Enhanced Geothermal Systems | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Imaging of Enhanced Geothermal Systems Project objectives: Attempting to Image EGS Fracture & Fluid Networks; Employing joint Geophysical Imaging Technologies....

336

Digital holographic imaging of aquatic species  

E-Print Network (OSTI)

The aim of this thesis is to design, develop and implement a digital holographic imaging (DHI) system, capable of capturing three-dimensional (3D) images of aquatic species. The images produced by this system are used in ...

Domínguez-Caballero, José Antonio

2006-01-01T23:59:59.000Z

337

Imaging Oxygen Molecules Up Close | EMSL  

NLE Websites -- All DOE Office Websites (Extended Search)

Imaging Oxygen Molecules Up Close Imaging Oxygen Molecules Up Close ARRA-enabled upgrades enhance research capabilities STM images of the same TiO2(110) area upon O2 chemisorption...

338

SMB, X-Ray Spectroscopy & Imaging  

NLE Websites -- All DOE Office Websites (Extended Search)

Home X-Ray Spectroscopy & Imaging X-Ray Spectroscopy & Imaging SSRL has five hard X-ray Spectroscopy beamlines and three Microfocus Imaging beamlines dedicated to Biological and...

339

SMB, X-ray Fluorescence Imaging  

NLE Websites -- All DOE Office Websites (Extended Search)

Fluorescence Imaging X-ray Fluorescence Imaging X-ray fluorescence imaging utilizes the high brightness of SPEAR3 and focused beam generated by the uses of K-B optics, capillaries...

340

Semantic image representation for visual recognition  

E-Print Network (OSTI)

Flickr Images (F18) . . . . . . . . . . . . . . . A.1.5A.1.3. Flickr Images (F18) consists of 1, 800 images fromset. A detailed description of F18 is provided in Appendix.

Rasiwasia, Nikhil

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

The Cosmic Background Imager  

E-Print Network (OSTI)

Design and performance details are given for the Cosmic Background Imager (CBI), an interferometer array that is measuring the power spectrum of fluctuations in the cosmic microwave background radiation (CMBR) for multipoles in the range 400 < l < 3500. The CBI is located at an altitude of 5000 m in the Atacama Desert in northern Chile. It is a planar synthesis array with 13 0.9-m diameter antennas on a 6-m diameter tracking platform. Each antenna has a cooled, low-noise receiver operating in the 26-36 GHz band. Signals are cross-correlated in an analog filterbank correlator with ten 1 GHz bands. This allows spectral index measurements which can be used to distinguish CMBR signals from diffuse galactic foregrounds. A 1.2 kHz 180-deg phase switching scheme is used to reject cross-talk and low-frequency pick-up in the signal processing system. The CBI has a 3-axis mount which allows the tracking platform to be rotated about the optical axis, providing improved (u,v) coverage and a powerful discriminant against false signals generated in the receiving electronics. Rotating the tracking platform also permits polarization measurements when some of the antennas are configured for the orthogonal polarization.

S. Padin; M. C. Shepherd; J. K. Cartwright; R. G. Keeney; B. S. Mason; T. J. Pearson; A. C. S. Readhead; W. L. Schaal; J. Sievers; P. S. Udomprasert; J. K. Yamasaki; W. L. Holzapfel; J. E. Carlstrom; M. Joy; S. T. Myers; A. Otarola

2001-10-05T23:59:59.000Z

342

Reaction product imaging  

SciTech Connect

Over the past few years the author has investigated the photochemistry of small molecules using the photofragment imaging technique. Bond energies, spectroscopy of radicals, dissociation dynamics and branching ratios are examples of information obtained by this technique. Along with extending the technique to the study of bimolecular reactions, efforts to make the technique as quantitative as possible have been the focus of the research effort. To this end, the author has measured the bond energy of the C-H bond in acetylene, branching ratios in the dissociation of HI, the energetics of CH{sub 3}Br, CD{sub 3}Br, C{sub 2}H{sub 5}Br and C{sub 2}H{sub 5}OBr dissociation, and the alignment of the CD{sub 3} fragment from CD{sub 3}I photolysis. In an effort to extend the technique to bimolecular reactions the author has studied the reaction of H with HI and the isotopic exchange reaction between H and D{sub 2}.

Chandler, D.W. [Sandia National Laboratories, Livermore, CA (United States)

1993-12-01T23:59:59.000Z

343

Image Logs | Open Energy Information  

Open Energy Info (EERE)

Image Logs Image Logs Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Technique: Image Logs Details Activities (2) Areas (1) Regions (0) NEPA(0) Exploration Technique Information Exploration Group: Downhole Techniques Exploration Sub Group: Well Log Techniques Parent Exploration Technique: Well Log Techniques Information Provided by Technique Lithology: Identify different lithological layers, rock composition, grain size, mineral, and clay content Stratigraphic/Structural: -Fault and fracture identification -Rock texture, porosity, and stress analysis -determine dip, thickness, and geometry of rock strata in vicinity of borehole -Detection of permeable pathways, fracture zones, faults Hydrological: Locate zones of aquifer inflow/outflow Thermal:

344

Category:Hyperspectral Imaging | Open Energy Information  

Open Energy Info (EERE)

following page. H Hyperspectral Imaging Retrieved from "http:en.openei.orgwindex.php?titleCategory:HyperspectralImaging&oldid794160" Categories: Geothermal Passive Sensors...

345

Geothermal Ultrasonic Fracture Imager | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Geothermal Ultrasonic Fracture Imager Geothermal Ultrasonic Fracture Imager Development of a downhole wireline tool to characterize fractures in EGS wells in temperatures up to...

346

Nanometer Resolution Imaging by SIngle Molecule Switching. |...  

NLE Websites -- All DOE Office Websites (Extended Search)

Nanometer Resolution Imaging by SIngle Molecule Switching. Nanometer Resolution Imaging by SIngle Molecule Switching. Abstract: The fluorescence intensity of single molecules can...

347

Promises and Challenges of Ghost Imaging  

Science Journals Connector (OSTI)

In this contribution we review research on the imaging protocol known as ghost (or coincidence) imaging. We also describe some current research directions within this topical area.

Boyd, Robert

348

Fluid Imaging | Open Energy Information  

Open Energy Info (EERE)

Page Page Edit History Facebook icon Twitter icon » Fluid Imaging Jump to: navigation, search Contents 1 Geothermal Lab Call Projects for Fluid Imaging 2 Geothermal ARRA Funded Projects for Fluid Imaging Geothermal Lab Call Projects for Fluid Imaging Loading map... {"format":"googlemaps3","type":"ROADMAP","types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"limit":200,"offset":0,"link":"all","sort":[""],"order":[],"headers":"show","mainlabel":"","intro":"","outro":"","searchlabel":"\u2026 further results","default":"","geoservice":"google","zoom":14,"width":"600px","height":"350px","centre":false,"layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","icon":"","visitedicon":"","forceshow":true,"showtitle":true,"hidenamespace":false,"template":false,"title":"","label":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"locations":[{"text":"

349

Molecular Imaging Applications in Nanomedicine  

Science Journals Connector (OSTI)

The purpose of this article is to explore how molecular imaging techniques can be used as useful adjunts in the development of “nanomedicine” and in personalizing treatment of patients....

King C.P. Li; Sunil D. Pandit; Samira Guccione…

2004-06-01T23:59:59.000Z

350

Spinning disk for compressive imaging  

Science Journals Connector (OSTI)

We report the first, to the best of our knowledge, experimental implementation of a spinning-disk configuration for high-speed compressive image acquisition. A single rotating mask...

Shen, H; Gan, L; Newman, N; Dong, Y; Li, C; Huang, Y; Shen, Y C

2012-01-01T23:59:59.000Z

351

High speed imaging television system  

DOE Patents (OSTI)

A television system for observing an event which provides a composite video output comprising the serially interlaced images the system is greater than the time resolution of any of the individual cameras.

Wilkinson, William O. (Silver Spring, MD); Rabenhorst, David W. (Silver Spring, MD)

1984-01-01T23:59:59.000Z

352

Imaging atoms in 3-D  

ScienceCinema (OSTI)

Berkeley Lab's Peter Ercius discusses "Imaging atoms in 3-D" in this Oct. 28, 2013 talk, which is part of a Science at the Theater event entitled Eight Big Ideas

Ercius, Peter

2014-06-27T23:59:59.000Z

353

Methods for functional brain imaging  

E-Print Network (OSTI)

Magnetic resonance imaging (MRI) has demonstrated the potential for non-invasive mapping of structure and function (fMRI) in the human brain. In this thesis, we propose a series of methodological developments towards ...

Witzel, Thomas, Ph. D. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

354

Imaging sunspots using helioseismic methods  

Science Journals Connector (OSTI)

...poorly understood areas in solar physics. Imaging local anomalous...sunspots and the surrounding solar active regions. By highlighting...Interpretation, Computer-Assisted methods Oscillometry methods Rheology methods Solar Activity Solar System Vibration

2005-01-01T23:59:59.000Z

355

Fast Progressive Lossless Image Compression  

E-Print Network (OSTI)

We present a method for progressive lossless compression of still grayscale images that combines the speed of our earlier FELICS method with the progressivity of our earlier MLP method We use MLP s pyramid based pixel ...

Howard, Paul G.; Vitter, Jeffrey Scott

1994-02-01T23:59:59.000Z

356

SMB 2014 - Imaging Summer School  

NLE Websites -- All DOE Office Websites (Extended Search)

users' guide to planning and conducting microXAS imaging experiments at SSRL beam lines. Students will participate in hands-on sessions at the beam lines, including on the...

357

Learning from local image regions  

E-Print Network (OSTI)

of-plane rotation of a teapot (data from [77], sub-sampledof-plane rotation of a teapot (data from [23], sub-sampledsampled from of physical a teapot the ground truth images;

Dollár, Piotr

2007-01-01T23:59:59.000Z

358

Electronic imaging fundamentals: Basic theory  

Science Journals Connector (OSTI)

Introduction of the computer into the field of medical imaging, as typified by the extensive use of digital subtraction angiography (DSA), created an important need for a basic understanding of the principles ...

Kalman N. Vizy P.E.

1983-11-01T23:59:59.000Z

359

Radiopharmaceuticals for imaging the heart  

DOE Patents (OSTI)

Radiopharmaceuticals for imaging myocardial tissues are prepared by forming lipophilic, cationic complexes of radioactive metal ions with metal chelating ligands comprising the Schiff base adducts of triamines and tetraamines with optionally substituted salicylaldehydes. The lipophilic, cationic, radioactive complexes of the invention exhibit high uptake and retention in myocardial tissues. Preferred gallium-68(III) complexes in accordance with this invention can be used to image the heart using positron emission tomography. 6 figures.

Green, M.A.; Tsang, B.W.

1994-06-28T23:59:59.000Z

360

Radiopharmaceuticals for imaging the heart  

DOE Patents (OSTI)

Radiopharmaceuticals for imaging myocardial tissues are prepared by forming lipophilic, cationic complexes of radioactive metal ions with metal chelating ligands comprising the Schiff base adducts of triamines and tetraamines with optionally substituted salicylaldehydes. The lipophilic, cationic, radioactive complexes of the invention exhibit high uptake and retention in myocardial tissues. Preferred gallium-68(III) complexes in accordance with this invention can be used to image the heart using positron emission tomography.

Green, Mark A. (West Lafayette, IN); Tsang, Brenda W. (Lafayette, IN)

1994-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Soviet image pattern recognition research  

SciTech Connect

This report is an assessment of the published Soviet image pattern recognition (IPR) research and was written by a panel of six US academic experts in that research field. Image pattern recognition is a set of technological research topics involving automatic or interactive computer processing of pictorial information, utilizing optical, electronic, and computer technologies. This report focuses on IPR system configuration (optical, hybrid, digital), and current research. The topical chapter headings are Image Processing Hardware and Software Preprocessing, Statistical Pattern Recognition, Computer Vision, and Optical Techniques and Systems. Soviet research in all areas of IPR is strong in theory, but limited by poor availability of equipment for generating and handling digital images, and digital computer hardware and software. Nevertheless, some Soviet IPR achievements compare favorably with those of the West. There is strong Soviet research in statistical pattern recognition, where fundamental relationships related to the factors determining error rates in classification of images are being developed. There has been good Soviet work in enhancement and restoration of images (visible and radar) of the surface of Venus. There is a strong Soviet development program in optics and optical processing related to IPR. Nevertheless, the state of Soviet research in computer vision is ten to fifteen years behind the West, because of the lack of adequate hardware and software. The Soviet scientists in the area appear competent and knowledgeable of Western work, so that any improvement in their research output would be derived from access to more capable equipment. 402 refs., 4 figs., 4 tabs.

McKenney, B.L.; McGrain, M. (eds.) (Science Applications International Corp., McLean, VA (USA). Foreign Applied Sciences Assessment Center); Klinger, A. (California Univ., Los Angeles, CA (USA). Dept. of Computer Science); Aggarwal, J.K. (Texas Univ., Austin, TX (USA)); George, N.J. (Rochester Univ., NY (USA). Inst. of Optics); Haralick, R.M. (Washington Univ., Seattle, WA (USA). Dept. of Electric

1989-12-01T23:59:59.000Z

362

High speed imager test station  

DOE Patents (OSTI)

A test station enables the performance of a solid state imager (herein called a focal plane array or FPA) to be determined at high image frame rates. A programmable waveform generator is adapted to generate clock pulses at determinable rates for clock light-induced charges from a FPA. The FPA is mounted on an imager header board for placing the imager in operable proximity to level shifters for receiving the clock pulses and outputting pulses effective to clock charge from the pixels forming the FPA. Each of the clock level shifters is driven by leading and trailing edge portions of the clock pulses to reduce power dissipation in the FPA. Analog circuits receive output charge pulses clocked from the FPA pixels. The analog circuits condition the charge pulses to cancel noise in the pulses and to determine and hold a peak value of the charge for digitizing. A high speed digitizer receives the peak signal value and outputs a digital representation of each one of the charge pulses. A video system then displays an image associated with the digital representation of the output charge pulses clocked from the FPA. In one embodiment, the FPA image is formatted to a standard video format for display on conventional video equipment. 12 figs.

Yates, G.J.; Albright, K.L.; Turko, B.T.

1995-11-14T23:59:59.000Z

363

High speed imager test station  

DOE Patents (OSTI)

A test station enables the performance of a solid state imager (herein called a focal plane array or FPA) to be determined at high image frame rates. A programmable waveform generator is adapted to generate clock pulses at determinable rates for clock light-induced charges from a FPA. The FPA is mounted on an imager header board for placing the imager in operable proximity to level shifters for receiving the clock pulses and outputting pulses effective to clock charge from the pixels forming the FPA. Each of the clock level shifters is driven by leading and trailing edge portions of the clock pulses to reduce power dissipation in the FPA. Analog circuits receive output charge pulses clocked from the FPA pixels. The analog circuits condition the charge pulses to cancel noise in the pulses and to determine and hold a peak value of the charge for digitizing. A high speed digitizer receives the peak signal value and outputs a digital representation of each one of the charge pulses. A video system then displays an image associated with the digital representation of the output charge pulses clocked from the FPA. In one embodiment, the FPA image is formatted to a standard video format for display on conventional video equipment.

Yates, George J. (Santa Fe, NM); Albright, Kevin L. (Los Alamos, NM); Turko, Bojan T. (Moraga, CA)

1995-01-01T23:59:59.000Z

364

Image Based Gisting in CLIR Mark Sanderson  

E-Print Network (OSTI)

from the Rosch [1] paper. These search terms were entered into the Google Image search engine in order the ability of subjects to derive the search term that might have been used to return a set of images from on subjects' abilities in this respect. Search terms were defined and images found using an online image

Sanderson, Mark

365

Nuclear Imaging Probes: from Bench to Bedside  

Science Journals Connector (OSTI)

...specific imaging probes is the nuclear fuel for molecular imaging by positron emission...cancer. Cancer Res 2001;61:110-7. 24 Price DT, Coleman RE, Liao RP, Robertson CN...specific imaging probes is the nuclear fuel for molecular imaging by positron emission...

Hans-Jürgen Wester

2007-06-15T23:59:59.000Z

366

Forensic Imaging and Art Herbert Buckley  

E-Print Network (OSTI)

Forensic Imaging and Art Herbert Buckley Director, Forensic Imaging, New York State Police 4pm, Wed by the Forensic Imaging Office of the New York State Police are physiognomical (facial) reconstruction of skeletal of Forensic Imaging. Mr. Buckley has been a guest lecturer before the annual conclave of the New York State

Zanibbi, Richard

367

Understanding User Intentions in Vertical Image Search  

E-Print Network (OSTI)

proposed for solving the image matching problem and object location problem in crowded scenes. Such method was further developed in [Stricker and Orengo, 1995] with improved indexing techniques to color information in dig- ital images. In [Huang et al...-tree, R-tree and its variant R+-tree and R?-tree, are usually not scalable to dimensions higher than 20 [White and Jain, 1996]. 2.2 Image annotation Image annotation or image tagging is an area closely related to image retrieval. Image anno- tation...

Chen, Yuxin

368

Lensless Imaging of Magnetic Nanostructures  

NLE Websites -- All DOE Office Websites (Extended Search)

Lensless Imaging of Magnetic Lensless Imaging of Magnetic Nanostructures Lensless Imaging of Magnetic Nanostructures Print Wednesday, 28 March 2012 00:00 Magnetism is useful for many devices and techniques, from electric motors and computer hard drives to magnetic resonance imaging used in medicine. By studying the basics of magnetism, scientists aim to better understand the fundamental physical principles that govern magnetic systems, perhaps leading to important new technologies. The high brightness and coherence of the ALS's soft x-rays have enabled scientists to apply lensless x-ray imaging for the first time to nanometer-scale magnetic structures in an alloy. Many Ways To See You open your eyes and detect the light rays streaming through your bedroom window (transmission), illuminating your socks on the floor (scattering). You put on your glasses (refraction) to detect the state of your image in the mirror (reflection). If you are an ALS scientist, perhaps you go to work and shine some x-ray light on a crystal to detect the arrangement of the atoms in the crystal (diffraction). Now, thanks to Turner et al., you can also shine some x-ray light on a magnetic sample to detect the arrangement of its electron spins through a method known as lensless imaging. This last example is an equally valid way to "see," but instead of using windows, lenses, or mirrors to manipulate light and construct an image, mathematical formulas are used to describe the effects that particles and fields in the sample have on the light. These formulas have always contained terms that relate to the electron spin of magnetic atoms, but they were previously ignored. Using the full formula allows for the determination of not only crystal structure, but magnetic spin distribution and orientation as well, with a spatial resolution limited only by the wavelength of x-rays used. This promising method can be used at any coherent light source, including modern x-ray free-electron lasers, where ultrashort pulses would freeze-frame magnetic changes, offering the potential for imaging in unprecedented detail the structure and motion of boundaries between regions with different magnetic orientation.

369

Reduced-Reference Image Quality Assessment Using A Wavelet-Domain Natural Image Statistic Model  

E-Print Network (OSTI)

Reduced-Reference Image Quality Assessment Using A Wavelet-Domain Natural Image Statistic Model information about the reference images. In this paper, we propose an RR image quality assessment method based on a natural image statistic model in the wavelet transform domain. We use the Kullback-Leibler distance

Wang, Zhou

370

Image Forensic of Glare Feature for Improving Image Retrieval Using Benford's Law  

E-Print Network (OSTI)

Image Forensic of Glare Feature for Improving Image Retrieval Using Benford's Law Ghulam Qadir proposed technique is novel and has a potential to be an image forensic tool for quick image analysis. I. INTRODUCTION The field of digital image forensics is striving hard to restore the lost trust in digital content

Doran, Simon J.

371

STAR Images: Image gallery from the Solenoidal Tracker at RHIC  

DOE Data Explorer (OSTI)

The primary physics task of STAR is to study the formation and characteristics of the quark-gluon plasma (QGP), a state of matter believed to exist at sufficiently high energy densities. STAR consists of several types of detectors, each specializing in detecting certain types of particles or characterizing their motion. These detectors allow final statements to be made about the collision. The gallery of STAR images makes available a small collection of event-generated images from Gold-Beam experiments, a simulation of TCP Drift, and a library of STAR instrument and construction photos. [See also DDE00093

372

Multispectral Imaging | Open Energy Information  

Open Energy Info (EERE)

Multispectral Imaging Multispectral Imaging Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Technique: Multispectral Imaging Details Activities (35) Areas (22) Regions (1) NEPA(0) Exploration Technique Information Exploration Group: Remote Sensing Techniques Exploration Sub Group: Passive Sensors Parent Exploration Technique: Passive Sensors Information Provided by Technique Lithology: relative mineral maps Stratigraphic/Structural: aerial photographs can show structures Hydrological: delineate locations of surface water features Thermal: vegetation maps can show plants stressed due to nearby thermal activity Cost Information Low-End Estimate (USD): 10.001,000 centUSD 0.01 kUSD 1.0e-5 MUSD 1.0e-8 TUSD / sq. mile Median Estimate (USD): 370.2337,023 centUSD

373

HAWC Observatory captures first image  

NLE Websites -- All DOE Office Websites (Extended Search)

April » April » HAWC Observatory captures first image HAWC Observatory captures first image The facility is designed to detect cosmic rays and the highest energy gamma rays ever observed from astrophysical sources. April 30, 2013 The High-Altitude Water Cherenkov (HAWC) Observatory is under construction. The High-Altitude Water Cherenkov (HAWC) Observatory is under construction. HAWC is under construction inside the Parque Nacional Pico de Orizaba, a Mexican national park. An international team of researchers, including scientists from Los Alamos, has taken the first image of the High-Altitude Water Cherenkov Observatory, or HAWC. The facility is designed to detect cosmic rays and the highest energy gamma rays ever observed from astrophysical sources. HAWC is under

374

Hyperspectral Imaging | Open Energy Information  

Open Energy Info (EERE)

Hyperspectral Imaging Hyperspectral Imaging Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Technique: Hyperspectral Imaging Details Activities (4) Areas (4) Regions (1) NEPA(1) Exploration Technique Information Exploration Group: Remote Sensing Techniques Exploration Sub Group: Passive Sensors Parent Exploration Technique: Passive Sensors Information Provided by Technique Lithology: mineral maps can be used to show the presence of hydrothermal minerals and mineral assemblages Stratigraphic/Structural: aerial photographs can show structures Hydrological: delineate locations of surface water features Thermal: vegetation maps can show plants stressed due to nearby thermal activity Cost Information Low-End Estimate (USD): 8.63863 centUSD 0.00863 kUSD 8.63e-6 MUSD

375

Lensless Imaging of Magnetic Nanostructures  

NLE Websites -- All DOE Office Websites (Extended Search)

Lensless Imaging of Magnetic Nanostructures Print Lensless Imaging of Magnetic Nanostructures Print Magnetism is useful for many devices and techniques, from electric motors and computer hard drives to magnetic resonance imaging used in medicine. By studying the basics of magnetism, scientists aim to better understand the fundamental physical principles that govern magnetic systems, perhaps leading to important new technologies. The high brightness and coherence of the ALS's soft x-rays have enabled scientists to apply lensless x-ray imaging for the first time to nanometer-scale magnetic structures in an alloy. Many Ways To See You open your eyes and detect the light rays streaming through your bedroom window (transmission), illuminating your socks on the floor (scattering). You put on your glasses (refraction) to detect the state of your image in the mirror (reflection). If you are an ALS scientist, perhaps you go to work and shine some x-ray light on a crystal to detect the arrangement of the atoms in the crystal (diffraction). Now, thanks to Turner et al., you can also shine some x-ray light on a magnetic sample to detect the arrangement of its electron spins through a method known as lensless imaging. This last example is an equally valid way to "see," but instead of using windows, lenses, or mirrors to manipulate light and construct an image, mathematical formulas are used to describe the effects that particles and fields in the sample have on the light. These formulas have always contained terms that relate to the electron spin of magnetic atoms, but they were previously ignored. Using the full formula allows for the determination of not only crystal structure, but magnetic spin distribution and orientation as well, with a spatial resolution limited only by the wavelength of x-rays used. This promising method can be used at any coherent light source, including modern x-ray free-electron lasers, where ultrashort pulses would freeze-frame magnetic changes, offering the potential for imaging in unprecedented detail the structure and motion of boundaries between regions with different magnetic orientation.

376

Lensless Imaging of Magnetic Nanostructures  

NLE Websites -- All DOE Office Websites (Extended Search)

Lensless Imaging of Magnetic Nanostructures Print Lensless Imaging of Magnetic Nanostructures Print Magnetism is useful for many devices and techniques, from electric motors and computer hard drives to magnetic resonance imaging used in medicine. By studying the basics of magnetism, scientists aim to better understand the fundamental physical principles that govern magnetic systems, perhaps leading to important new technologies. The high brightness and coherence of the ALS's soft x-rays have enabled scientists to apply lensless x-ray imaging for the first time to nanometer-scale magnetic structures in an alloy. Many Ways To See You open your eyes and detect the light rays streaming through your bedroom window (transmission), illuminating your socks on the floor (scattering). You put on your glasses (refraction) to detect the state of your image in the mirror (reflection). If you are an ALS scientist, perhaps you go to work and shine some x-ray light on a crystal to detect the arrangement of the atoms in the crystal (diffraction). Now, thanks to Turner et al., you can also shine some x-ray light on a magnetic sample to detect the arrangement of its electron spins through a method known as lensless imaging. This last example is an equally valid way to "see," but instead of using windows, lenses, or mirrors to manipulate light and construct an image, mathematical formulas are used to describe the effects that particles and fields in the sample have on the light. These formulas have always contained terms that relate to the electron spin of magnetic atoms, but they were previously ignored. Using the full formula allows for the determination of not only crystal structure, but magnetic spin distribution and orientation as well, with a spatial resolution limited only by the wavelength of x-rays used. This promising method can be used at any coherent light source, including modern x-ray free-electron lasers, where ultrashort pulses would freeze-frame magnetic changes, offering the potential for imaging in unprecedented detail the structure and motion of boundaries between regions with different magnetic orientation.

377

Lensless Imaging of Magnetic Nanostructures  

NLE Websites -- All DOE Office Websites (Extended Search)

Lensless Imaging of Magnetic Nanostructures Print Lensless Imaging of Magnetic Nanostructures Print Magnetism is useful for many devices and techniques, from electric motors and computer hard drives to magnetic resonance imaging used in medicine. By studying the basics of magnetism, scientists aim to better understand the fundamental physical principles that govern magnetic systems, perhaps leading to important new technologies. The high brightness and coherence of the ALS's soft x-rays have enabled scientists to apply lensless x-ray imaging for the first time to nanometer-scale magnetic structures in an alloy. Many Ways To See You open your eyes and detect the light rays streaming through your bedroom window (transmission), illuminating your socks on the floor (scattering). You put on your glasses (refraction) to detect the state of your image in the mirror (reflection). If you are an ALS scientist, perhaps you go to work and shine some x-ray light on a crystal to detect the arrangement of the atoms in the crystal (diffraction). Now, thanks to Turner et al., you can also shine some x-ray light on a magnetic sample to detect the arrangement of its electron spins through a method known as lensless imaging. This last example is an equally valid way to "see," but instead of using windows, lenses, or mirrors to manipulate light and construct an image, mathematical formulas are used to describe the effects that particles and fields in the sample have on the light. These formulas have always contained terms that relate to the electron spin of magnetic atoms, but they were previously ignored. Using the full formula allows for the determination of not only crystal structure, but magnetic spin distribution and orientation as well, with a spatial resolution limited only by the wavelength of x-rays used. This promising method can be used at any coherent light source, including modern x-ray free-electron lasers, where ultrashort pulses would freeze-frame magnetic changes, offering the potential for imaging in unprecedented detail the structure and motion of boundaries between regions with different magnetic orientation.

378

Lensless Imaging of Magnetic Nanostructures  

NLE Websites -- All DOE Office Websites (Extended Search)

Lensless Imaging of Magnetic Nanostructures Print Lensless Imaging of Magnetic Nanostructures Print Magnetism is useful for many devices and techniques, from electric motors and computer hard drives to magnetic resonance imaging used in medicine. By studying the basics of magnetism, scientists aim to better understand the fundamental physical principles that govern magnetic systems, perhaps leading to important new technologies. The high brightness and coherence of the ALS's soft x-rays have enabled scientists to apply lensless x-ray imaging for the first time to nanometer-scale magnetic structures in an alloy. Many Ways To See You open your eyes and detect the light rays streaming through your bedroom window (transmission), illuminating your socks on the floor (scattering). You put on your glasses (refraction) to detect the state of your image in the mirror (reflection). If you are an ALS scientist, perhaps you go to work and shine some x-ray light on a crystal to detect the arrangement of the atoms in the crystal (diffraction). Now, thanks to Turner et al., you can also shine some x-ray light on a magnetic sample to detect the arrangement of its electron spins through a method known as lensless imaging. This last example is an equally valid way to "see," but instead of using windows, lenses, or mirrors to manipulate light and construct an image, mathematical formulas are used to describe the effects that particles and fields in the sample have on the light. These formulas have always contained terms that relate to the electron spin of magnetic atoms, but they were previously ignored. Using the full formula allows for the determination of not only crystal structure, but magnetic spin distribution and orientation as well, with a spatial resolution limited only by the wavelength of x-rays used. This promising method can be used at any coherent light source, including modern x-ray free-electron lasers, where ultrashort pulses would freeze-frame magnetic changes, offering the potential for imaging in unprecedented detail the structure and motion of boundaries between regions with different magnetic orientation.

379

Imaging with the invisible light  

E-Print Network (OSTI)

We describe a UV photo-detector with single photon(electron) counting and imaging capability. It is based on a CsI photocathode, a GEM charge multiplier and a self triggering CMOS analog pixel chip with 105k pixels at 50 micron pitch. The single photoelectron produced by the absorption of a UV photon is drifted to and multiplied inside a single GEM hole. The coordinates of the GEM avalanche are reconstructed with high accuracy (4 micron rms) by the pixel chip. As a result the map of the GEM holes, arranged on a triangular pattern at 50micron pitch, is finely imaged.

R. Bellazzini; G. Spandre; A. Brez; M. Minuti; L. Baldini; L. Latronico; M. M. Massai; N. Omodei; M. Pesce-Rollins; C Sgró; M. Razzano; M. Pinchera; J. Bregeon; M. Kuss; A. Braem

2007-03-19T23:59:59.000Z

380

Gamma-ray Imaging Methods  

SciTech Connect

In this document we discuss specific implementations for gamma-ray imaging instruments including the principle of operation and describe systems which have been built and demonstrated as well as systems currently under development. There are several fundamentally different technologies each with specific operational requirements and performance trade offs. We provide an overview of the different gamma-ray imaging techniques and briefly discuss challenges and limitations associated with each modality (in the appendix we give detailed descriptions of specific implementations for many of these technologies). In Section 3 we summarize the performance and operational aspects in tabular form as an aid for comparing technologies and mapping technologies to potential applications.

Vetter, K; Mihailescu, L; Nelson, K; Valentine, J; Wright, D

2006-10-05T23:59:59.000Z

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Electronic imaging system and technique  

DOE Patents (OSTI)

A method and system for viewing objects obscurred by intense plasmas or flames (such as a welding arc) includes a pulsed light source to illuminate the object, the peak brightness of the light reflected from the object being greater than the brightness of the intense plasma or flame; an electronic image sensor for detecting a pulsed image of the illuminated object, the sensor being operated as a high-speed shutter; and electronic means for synchronizing the shutter operation with the pulsed light source.

Bolstad, Jon O. (Idaho Falls, ID)

1987-01-01T23:59:59.000Z

382

Functional magnetic resonance imaging: imaging techniques and contrast mechanisms  

Science Journals Connector (OSTI)

...Furthermore, in a study of motor recovery, fMRI activation...focal lesion. The future should also see further...able to harness this quantum physics phenomenon...Functional imaging of the motor system. Curr. Opin...assessment with a graded motor activation procedure...past, present, and future. Proc. Natl Acad...

1999-01-01T23:59:59.000Z

383

Definition: Hyperspectral Imaging | Open Energy Information  

Open Energy Info (EERE)

Imaging Imaging Jump to: navigation, search Dictionary.png Hyperspectral Imaging Hyperspectral sensors collect data across a wide range of the spectrum (VNIR-LWIR, plus TIR) at small spectral resolution (5-15 nm) and high spatial resolution (1-5 m). This allows detailed spectral signatures to be identified for different imaged materials - for example hyperspectral imaging can be used to identify specific clay minerals; multispectral imaging can identify only the presence of clay minerals in general. View on Wikipedia Wikipedia Definition Hyperspectral imaging, like other spectral imaging, collects and processes information from across the electromagnetic spectrum. Much as the human eye sees visible light in three bands (red, green, and blue), spectral imaging divides the spectrum into many more bands. This technique

384

Method for the efficient incoherent analysis of particle image velocimetry images  

SciTech Connect

A method for the efficient analysis of PIV images is discussed that leads torapid image processing with the maximum extraction of data.

Grant, I.; Liu, A.

1989-05-15T23:59:59.000Z

385

Hadamard multimode optical imaging transceiver  

DOE Patents (OSTI)

Disclosed is a method and system for simultaneously acquiring and producing results for multiple image modes using a common sensor without optical filtering, scanning, or other moving parts. The system and method utilize the Walsh-Hadamard correlation detection process (e.g., functions/matrix) to provide an all-binary structure that permits seamless bridging between analog and digital domains. An embodiment may capture an incoming optical signal at an optical aperture, convert the optical signal to an electrical signal, pass the electrical signal through a Low-Noise Amplifier (LNA) to create an LNA signal, pass the LNA signal through one or more correlators where each correlator has a corresponding Walsh-Hadamard (WH) binary basis function, calculate a correlation output coefficient for each correlator as a function of the corresponding WH binary basis function in accordance with Walsh-Hadamard mathematical principles, digitize each of the correlation output coefficient by passing each correlation output coefficient through an Analog-to-Digital Converter (ADC), and performing image mode processing on the digitized correlation output coefficients as desired to produce one or more image modes. Some, but not all, potential image modes include: multi-channel access, temporal, range, three-dimensional, and synthetic aperture.

Cooke, Bradly J; Guenther, David C; Tiee, Joe J; Kellum, Mervyn J; Olivas, Nicholas L; Weisse-Bernstein, Nina R; Judd, Stephen L; Braun, Thomas R

2012-10-30T23:59:59.000Z

386

Low field magnetic resonance imaging  

DOE Patents (OSTI)

A method and system of magnetic resonance imaging does not need a large homogenous field to truncate a gradient field. Spatial information is encoded into the spin magnetization by allowing the magnetization to evolve in a non-truncated gradient field and inducing a set of 180 degree rotations prior to signal acquisition.

Pines, Alexander (Berkeley, CA); Sakellariou, Dimitrios (Billancourt, FR); Meriles, Carlos A. (Fort Lee, NJ); Trabesinger, Andreas H. (London, GB)

2010-07-13T23:59:59.000Z

387

Imaging Robot Jonathan Dyssel Stets  

E-Print Network (OSTI)

with a Command File, a file that contains the coordinates and directions of the robot arm. One of the interfaces and an attached camera. The other interface, programmed in Matlab, controls the calculations of the robot armImaging Robot Jonathan Dyssel Stets Kongens Lyngby 2010 IMM-B.Sc-2010-42 #12;Technical University

388

Imaging Genetics --Towards Discovery Neuroscience  

E-Print Network (OSTI)

variants that influence measures derived from anatomical or functional brain im- ages, which are in turn related to brain-related illnesses or fundamental cognitive, emotional and behavioral processes a tremendous growth in brain imaging as well as an enor- mous explosion of interest and success in genomics

Feng, Jianfeng

389

Covered Product Category: Imaging Equipment  

Energy.gov (U.S. Department of Energy (DOE))

FEMP provides acquisition guidance and Federal efficiency requirements across a variety of product categories, including imaging equipment, which is covered by the ENERGY STAR® program. Federal laws and requirements mandate that agencies meet these efficiency requirements in all procurement and acquisition actions that are not specifically exempted by law.

390

Deformation correction in ultrasound imaging in an elastography framework  

E-Print Network (OSTI)

Tissue deformation in ultrasound imaging is an inevitable phenomenon and poses challenges to the development of many techniques related to ultrasound image registration, including multimodal image fusion, freehand ...

Sun, Shih-Yu

2010-01-01T23:59:59.000Z

391

Non-Destructive Neutron Imaging to Analyze Particulate Filters...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Neutron Imaging to Analyze Particulate Filters Non-Destructive Neutron Imaging to Analyze Particulate Filters Non-destructive, non-invasive imaging is being employed in the...

392

Iterative synthetic aperture radar imaging algorithms   

E-Print Network (OSTI)

Synthetic aperture radar is an important tool in a wide range of civilian and military imaging applications. This is primarily due to its ability to image in all weather conditions, during both the day and the night, ...

Kelly, Shaun Innes

2014-06-30T23:59:59.000Z

393

Fusion of images on affine sampling grids  

Science Journals Connector (OSTI)

We present a method for combining multiple images of a common object assuming two-dimensional (2D) affine transformations between the image sampling grids. Our method is based upon the...

Granrath, Douglas; Lersch, James

1998-01-01T23:59:59.000Z

394

Image fusion for a nighttime driving display  

E-Print Network (OSTI)

An investigation into image fusion for a nighttime driving display application was performed. Most of the image fusion techniques being investigated in this application were developed for other purposes. When comparing the ...

Herrington, William Frederick

2005-01-01T23:59:59.000Z

395

Lensless X-Ray Imaging in Reflection  

NLE Websites -- All DOE Office Websites (Extended Search)

X-Ray Imaging in Reflection Print The advent of x-ray free-electron laser (XFEL) light sources has led to an outburst of research activities in the field of lensless imaging. XFELs...

396

Single-Molecule Imaging in Live Cells  

Science Journals Connector (OSTI)

This chapter provides a comprehensive overview of how single-molecule imaging is achieved in live cells. The ... with a particular focus on how they influence single-molecule imaging in live cells. A few fluoresc...

Jie Xiao

2009-01-01T23:59:59.000Z

397

Surface Imaging Using UHV-CTEM  

Science Journals Connector (OSTI)

......review-article Review Surface Imaging Using UHV-CTEM Katsumichi Yagi Physics Department...conventional transmission electron microscopies (UHV-CTEM) is reviewed. Techniques for routine...surface dynamic processes. surface imaging|UHV-CTEM|surface structure| Review / Electron......

Katsumichi Yagi

1995-10-01T23:59:59.000Z

398

Lensless X-Ray Imaging in Reflection  

NLE Websites -- All DOE Office Websites (Extended Search)

Lensless X-Ray Imaging in Reflection Lensless X-Ray Imaging in Reflection Print Wednesday, 26 October 2011 00:00 The advent of x-ray free-electron laser (XFEL) light sources has...

399

BIOMEDICAL MATHEMATICS: Promising Directions in Imaging,  

E-Print Network (OSTI)

BIOMEDICAL MATHEMATICS: Promising Directions in Imaging, Therapy Planning, and Inverse Problems #12;BIOMEDICAL MATHEMATICS: Promising Directions in Imaging, Therapy Planning, and Inverse Problems Yair Censor, Ming Jiang, Ge Wang Editors The Huangguoshu International Interdisciplinary Conference on Biomedical

Censor, Yair

400

Automated Microarray Image Analysis Toolbox for MATLAB  

SciTech Connect

The Automated Microarray Image Analysis (AMIA) Toolbox for MATLAB is a flexible, open-source microarray image analysis tool that allows the user to customize analysis of sets of microarray images. This tool provides several methods of identifying and quantify spot statistics, as well as extensive diagnostic statistics and images to identify poor data quality or processing. The open nature of this software allows researchers to understand the algorithms used to provide intensity estimates and to modify them easily if desired.

White, Amanda M.; Daly, Don S.; Willse, Alan R.; Protic, Miroslava; Chandler, Darrell P.

2005-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Method for imaging a concealed object  

DOE Patents (OSTI)

A method for imaging a concealed object is described and which includes a step of providing a heat radiating body, and wherein an object to be detected is concealed on the heat radiating body; imaging the heat radiating body to provide a visibly discernible infrared image of the heat radiating body; and determining if the visibly discernible infrared image of the heat radiating body is masked by the presence of the concealed object.

Davidson, James R [Idaho Falls, ID; Partin, Judy K [Idaho Falls, ID; Sawyers, Robert J [Idaho Falls, ID

2007-07-03T23:59:59.000Z

402

Composite ultrasound imaging apparatus and method  

DOE Patents (OSTI)

An imaging apparatus and method for use in presenting composite two dimensional and three dimensional images from individual ultrasonic frames. A cross-sectional reconstruction is applied by using digital ultrasound frames, transducer orientation and a known center. Motion compensation, rank value filtering, noise suppression and tissue classification are utilized to optimize the composite image. 37 figs.

Morimoto, A.K.; Bow, W.J. Jr.; Strong, D.S.; Dickey, F.M.

1998-09-15T23:59:59.000Z

403

Composite ultrasound imaging apparatus and method  

DOE Patents (OSTI)

An imaging apparatus and method for use in presenting composite two dimensional and three dimensional images from individual ultrasonic frames. A cross-sectional reconstruction is applied by using digital ultrasound frames, transducer orientation and a known center. Motion compensation, rank value filtering, noise suppression and tissue classification are utilized to optimize the composite image.

Morimoto, Alan K. (Albuquerque, NM); Bow, Jr., Wallace J. (Albuquerque, NM); Strong, David Scott (Albuquerque, NM); Dickey, Fred M. (Albuquerque, NM)

1998-01-01T23:59:59.000Z

404

Improved Image Fusion Using Balanced Multiwavelets  

E-Print Network (OSTI)

Improved Image Fusion Using Balanced Multiwavelets Lahouari Ghouti, Ahmed Bouridane and Mohammad K. Ibrahim Abstract-- This paper presents the use of balanced multi- wavelets for image fusion. The proposed image fusion scheme incorporates the use of balanced multiwavelets transform, which uses multiple

Ghouti, Lahouari

405

Fast neutron imaging device and method  

DOE Patents (OSTI)

A fast neutron imaging apparatus and method of constructing fast neutron radiography images, the apparatus including a neutron source and a detector that provides event-by-event acquisition of position and energy deposition, and optionally timing and pulse shape for each individual neutron event detected by the detector. The method for constructing fast neutron radiography images utilizes the apparatus of the invention.

Popov, Vladimir; Degtiarenko, Pavel; Musatov, Igor V.

2014-02-11T23:59:59.000Z

406

Photogrammetry & Machine Vision 1. Image sensors  

E-Print Network (OSTI)

Photogrammetry & Machine Vision 1. Image sensors (a) Fundamentals of image sensors (b) CCD image'Apuzzo Photogrammetry and Machine Vision - 3 Point cloud processing, surface generation, texturing (b) Camera, noise) 2N. D'Apuzzo Photogrammetry and Machine Vision - 3 Point cloud processing, surface generation

Giger, Christine

407

Photogrammetry & Machine Vision 1. Image sensors  

E-Print Network (OSTI)

Photogrammetry & Machine Vision 1. Image sensors (a) Fundamentals of image sensors (b) CCD image. Remondino, N. D'Apuzzo Photogrammetry and Machine Vision ­ 2. Camera calibration and orientation (b) Camera and Machine Vision ­ 2. Camera calibration and orientation (b) Calibration methods (reference object, point

Giger, Christine

408

On simulating 3D fluorescent microscope images  

Science Journals Connector (OSTI)

In recent years many various biomedical image segmentation methods have appeared. Though typically presented to be successful the majority of them was not properly tested against ground truth images. The obvious way of testing the quality of new segmentation ... Keywords: convolution, fluorescent optical microscope, procedural texture, simulator, synthetic image

David Svoboda; Marek Kašík; Martin Maška; Jan Hubeny; Stanislav Stejskal; Michal Zimmermann

2007-08-01T23:59:59.000Z

409

Mosaicing of Camera-captured Document Images  

E-Print Network (OSTI)

Mosaicing of Camera-captured Document Images Jian Liang a , Daniel DeMenthon b , David Doermann b 1 In this paper we present a method for composing document mosaics from camera-6 captured images. We decompose flows on the document surface. First, perspective distortion and rotation are10 removed from images

DeMenthon, Daniel

410

Geometry and Color in Natural Images  

Science Journals Connector (OSTI)

Most image analysis algorithms are defined for the grey level channel, particularly when geometric information is looked for in the digital image. We propose an experimental procedure in order to decide whether this attitude is sound or not. We test ... Keywords: color images, level sets, luminance constraint, morphological filtering

Vicent Caselles; Bartomeu Coll; Jean-Michel Morel

2002-03-01T23:59:59.000Z

411

Directional projection based image fusion quality metric  

Science Journals Connector (OSTI)

In the past few decades, image fusion and its performance evaluation have attracted considerable research attention. However, it is still hard to objectively evaluate the fusion performance due to the diversity of image sources and the motivations for ... Keywords: Image fusion, Local sensitive intensity, Radon transform

Richang Hong, Wenyi Cao, Jianxin Pang, Jianguo Jiang

2014-10-01T23:59:59.000Z

412

3D Imaging Of Wet Granular Matter  

E-Print Network (OSTI)

3D Imaging Of Wet Granular Matter Leonard Goff Advisor: Dr. Wolfgang Losert With Application to Penetrometer Insertion #12;3D Imaging Of Wet Granular Matter Leonard Goff, Advisor: Dr. Wolfgang Losert CoffeeSand Gravel Oops! #12;3D Imaging Of Wet Granular Matter Leonard Goff, Advisor: Dr. Wolfgang Losert

Anlage, Steven

413

COMPUTATIONAL IMAGING Berthold K.P. Horn  

E-Print Network (OSTI)

Ziock, and Lorenzo Fabris. #12;Coded Aperture Imaging · Can't refract or reflect gamma rays · Pinhole Principle #12;Decoding Method Rationale #12;Coded Aperture Imaging · Can't refract or reflect gamma rays Squares Match in FT #12;Polystyrene Micro Beads (1µm) #12;#12;(2) CODED APERTURE IMAGING · Can't refract

Treuille, Adrien

414

NATURAL IMAGE UTILITY ASSESSMENT USING IMAGE CONTOURS David M. Rouse and Sheila S. Hemami  

E-Print Network (OSTI)

NATURAL IMAGE UTILITY ASSESSMENT USING IMAGE CONTOURS David M. Rouse and Sheila S. Hemami Visual In the quality assessment task, observers evaluate a natural image based on its perceptual resemblance to a reference. For the utility assessment task, observers evaluate the usefulness of a natural image

Hemami, Sheila S.

415

Dynamic imaging with electron microscopy  

ScienceCinema (OSTI)

Livermore researchers have perfected an electron microscope to study fast-evolving material processes and chemical reactions. By applying engineering, microscopy, and laser expertise to the decades-old technology of electron microscopy, the dynamic transmission electron microscope (DTEM) team has developed a technique that can capture images of phenomena that are both very small and very fast. DTEM uses a precisely timed laser pulse to achieve a short but intense electron beam for imaging. When synchronized with a dynamic event in the microscope's field of view, DTEM allows scientists to record and measure material changes in action. A new movie-mode capability, which earned a 2013 R&D 100 Award from R&D Magazine, uses up to nine laser pulses to sequentially capture fast, irreversible, even one-of-a-kind material changes at the nanometer scale. DTEM projects are advancing basic and applied materials research, including such areas as nanostructure growth, phase transformations, and chemical reactions.

Campbell, Geoffrey; McKeown, Joe; Santala, Melissa

2014-05-30T23:59:59.000Z

416

Dynamic imaging with electron microscopy  

SciTech Connect

Livermore researchers have perfected an electron microscope to study fast-evolving material processes and chemical reactions. By applying engineering, microscopy, and laser expertise to the decades-old technology of electron microscopy, the dynamic transmission electron microscope (DTEM) team has developed a technique that can capture images of phenomena that are both very small and very fast. DTEM uses a precisely timed laser pulse to achieve a short but intense electron beam for imaging. When synchronized with a dynamic event in the microscope's field of view, DTEM allows scientists to record and measure material changes in action. A new movie-mode capability, which earned a 2013 R&D 100 Award from R&D Magazine, uses up to nine laser pulses to sequentially capture fast, irreversible, even one-of-a-kind material changes at the nanometer scale. DTEM projects are advancing basic and applied materials research, including such areas as nanostructure growth, phase transformations, and chemical reactions.

Campbell, Geoffrey; McKeown, Joe; Santala, Melissa

2014-02-20T23:59:59.000Z

417

Interpreting atomic resolution spectroscopic images  

SciTech Connect

Core-loss electron energy loss spectroscopy is a powerful experimental tool providing information about electronic structure essential for understanding the properties of new and emerging materials. Here we show that the shape and width of spectroscopic images do not show a simple variation with binding energy, as commonly assumed. Rather they exhibit a complex dependence on the effective nonlocal scattering potential, and also on the dynamical channeling and absorption of the incident probe through the specimen. Consequently, in LaMnO$_3$, the low lying La N$_{4,5}$ edge at 99 eV can produce images of similar width to higher lying edges such as the O $K$ edge at 532 eV.

Oxley, Mark P [ORNL; Varela del Arco, Maria [ORNL; Pennycook, Timothy J [ORNL; van Benthem, Klaus [ORNL; Findlay, Scott D. [University of Melbourne, Australia; Allen, L. J. [University of Melbourne, Australia; Pennycook, Stephen J [ORNL

2007-01-01T23:59:59.000Z

418

High-contrast imaging testbed  

SciTech Connect

Several high-contrast imaging systems are currently under construction to enable the detection of extra-solar planets. In order for these systems to achieve their objectives, however, there is considerable developmental work and testing which must take place. Given the need to perform these tests, a spatially-filtered Shack-Hartmann adaptive optics system has been assembled to evaluate new algorithms and hardware configurations which will be implemented in these future high-contrast imaging systems. In this article, construction and phase measurements of a membrane 'woofer' mirror are presented. In addition, results from closed-loop operation of the assembled testbed with static phase plates are presented. The testbed is currently being upgraded to enable operation at speeds approaching 500 hz and to enable studies of the interactions between the woofer and tweeter deformable mirrors.

Baker, K; Silva, D; Poyneer, L; Macintosh, B; Bauman, B; Palmer, D; Remington, T; Delgadillo-Lariz, M

2008-01-23T23:59:59.000Z

419

Medical imaging with coded apertures  

SciTech Connect

Now algorithms were investigated for image reconstruction in emission tomography which could incorporate complex instrumental effects such as might be obtained with a coded aperture system. The investigation focused on possible uses of the wavelet transform to handle non-stationary instrumental effects and analytic continuation of the Radon transform to handle self-absorption. Neither investigation was completed during the funding period and whether such algorithms will be useful remains an open question.

Keto, E.; Libby, S.

1995-06-16T23:59:59.000Z

420

Radiation-tolerant imaging device  

DOE Patents (OSTI)

A barrier at a uniform depth for an entire wafer is used to produce imaging devices less susceptible to noise pulses produced by the passage of ionizing radiation. The barrier prevents charge created in the bulk silicon of a CCD detector or a semiconductor logic or memory device from entering the collection volume of each pixel in the imaging device. The charge barrier is a physical barrier, a potential barrier, or a combination of both. The physical barrier is formed by an SiO{sub 2} insulator. The potential barrier is formed by increasing the concentration of majority carriers (holes) to combine with the electron`s generated by the ionizing radiation. A manufacturer of CCD imaging devices can produce radiation-tolerant devices by merely changing the wafer type fed into his process stream from a standard wafer to one possessing a barrier beneath its surface, thus introducing a very small added cost to his production cost. An effective barrier type is an SiO{sub 2} layer. 7 figs.

Colella, N.J.; Kimbrough, J.R.

1996-11-19T23:59:59.000Z

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Lens-array PDV Probe Using a Pyramid Prism  

SciTech Connect

A bug eye probe is shown using a pyramid prism, and its advantages and disadvantages are enumerated. Also shown is abug eye imaging probe, with its advantages and disadvantages enumerated.

Malone, R. M., Kaufman, M. I., Cox, B., Romero, V., Cata B., Sorenson, D. Pazuchanics, P.

2011-11-01T23:59:59.000Z

422

Definition: Multispectral Imaging | Open Energy Information  

Open Energy Info (EERE)

Imaging Imaging Jump to: navigation, search Dictionary.png Multispectral Imaging Multispectral surveys image the earth in an average of ten wide bands over a wide spectral range. Multispectral sensors measure the electromagnetic spectrum in discrete, discontinuous bands (unlike the continuous hyperspectral image). Multispectral sensors are capable of relative material delineation. The thermal wavelength range of the multispectral survey senses heat energy from the Earth's surface. It can be used to sense surface temperature, including anomalies associated with active geothermal or volcanic systems. Both multispectral and hyperspectral remote sensing observations are available. This range can also be used to map mineralogy associate with common rock-forming silicates.[1]

423

EERE: VTO - UPS Truck PNG Image | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

UPS Truck PNG Image EERE: VTO - UPS Truck PNG Image upstruck18187.png More Documents & Publications EERE: VTO - Red Leaf PNG Image EERE: VTO - Hybrid Bus PNG Image Research Site...

424

EERE: VTO - Hybrid Bus PNG Image | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Hybrid Bus PNG Image EERE: VTO - Hybrid Bus PNG Image hybridbus17144.png More Documents & Publications EERE: VTO - Red Leaf PNG Image EERE: VTO - UPS Truck PNG Image Research...

425

EERE: VTO - Red Leaf PNG Image | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Red Leaf PNG Image EERE: VTO - Red Leaf PNG Image redleaf18215.png More Documents & Publications EERE: VTO - Hybrid Bus PNG Image EERE: VTO - UPS Truck PNG Image RedLeaf...

426

Guest Editorial: Special issue on medical image computing and systems  

Science Journals Connector (OSTI)

This special issue provides a collection of papers that focus on information fusion in medical imaging to improve the quality of images, applications of image fusion in medical diagnostics, and different models/approaches for achieving image fusion. ...

Alex Pappachen James, Sheshadri Thiruvenkadam, Joseph Suresh Paul, Michael Braun

2014-09-01T23:59:59.000Z

427

Collaborative Initiative in Biomedical Imaging to Study Complex Diseases  

SciTech Connect

The work reported addressed these topics: Fluorescence imaging; Optical coherence tomography; X-ray interferometer/phase imaging system; Quantitative imaging from scattered fields, Terahertz imaging and spectroscopy; and Multiphoton and Raman microscopy.

Lin, Weili [The University of North Carolina at Chapel Hill; Fiddy, Michael A. [The University of North Carolina at Charlotte

2012-03-31T23:59:59.000Z

428

Image  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ENVIRONMENTAL POLICY ACT (NEPAl ENVIRONMENTAL POLICY ACT (NEPAl RECORD OF CATEGORICAL EXCLUSION DETERMINATION A. Brief Description of Proposed Action: The proposed activities would demolish Cottages formerly utilized as summer housing identified as Building 368, Units 1 - 30, and dispose of materials according to classification as hazardous or clean construction debris. Each cottage is approximately 1,000 square feet. These structures were constructed in 1968 and are beyond their useful life. The scope of work for this project would include characterization, packaging and disposal of all debris according to current practices. B. Number and Title of the Categorical Exclusion Being Applied: B 1.23 Demolition/disposal of buildings C. Regulatory Reguirements in 10 CFR 1021.410 (b): (See full text in regulation.)

429

Image  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Ms. Sophia Angelini Ms. Sophia Angelini November 30, 2010 Page 2 of 5 2 force and was ratified by many countries. Further, we believe that by encouraging countries to adopt laws that meet the minimum standards set forth in the CSC, the CSC will ensure victims are adequately compensated in the event of an incident without the need for recourse to unpredictable and burdensome litigation in multiple fora. USEC is a member of the Contractors International Group for Nuclear Liability (CIGNL) and the Nuclear Energy Institute (NEI) and joins in their comments. Our purpose in submitting this response is not to repeat what either CIGNL or NEI set out in their responses, both rather to clarify our company position with respect to two key points: First, it is essential that any rule promulgated by DOE to implement Section 934

430

Image  

NLE Websites -- All DOE Office Websites (Extended Search)

AM!;NDMENT OFSOI.ICFl'ATlONlMPDIFICATION OF CONTRACT AM!;NDMENT OFSOI.ICFl'ATlONlMPDIFICATION OF CONTRACT 2. AMt;N.DMENT/MOD!FICATION' NO, S', EFFECTIVE DAlE 179 See Bl'ock 16C 6.ISSUEUBY COPE 00518 Oak Ridge U~S. Departmerit of Erergy P,Q. Box. 2001 Oak Ridge TN 37831 8. NAME ANDADOR6S$ OF CONTRACTOR (No" Wrw/. ;JOWl/y. stllffl IiWJ ZIP Code) AK RIDGE ASSOCIA'rED UNIVERSITIES, o p .0. BOX 117 o 11K RIDGE TN 37830-6.218 INC. j 1. CONTRACT 10 CqDE I PAGE Of PAGES 11 5 ' 4, HEQUlSrTlONIPURCHASE ,REO:. NO. r PROJECT NO, flf applfcabla) lCSCOO8480 7. ADMINISTEREO BY (If QllletlharJ ltein 6) CODE 100518 Oak Ridg", U.S. ~partment of Energy P.O. Box 200;1. Oak Ridge 'l'N 37831 1:2 GA. AMENDMENT OHlOLICjTAT10N NO. 98. DATED '(SEE ITEM 11) x H}A, \l400IFICATION {)FCO>":'lu,AC,TrORDER NQ,

431

Image  

NLE Websites -- All DOE Office Websites (Extended Search)

JOH JOH N A. SANCHEZ Lieutenant Governor NEW MEXICO ENVIRONMENT DEPARTMENT Hazardous Waste Bureau 2905 Rodeo Park Drive East, Building 1 Santa Fe, New Mexico 87505·6303 Phone (505) 476·6000 Fax (505) 476·6030 WWW. lUneIl V.state.llnt.us CERTIFI ED MAIL· RETURN RECEIPT R EQUESTED August 24, 20 12 Jose R. Franco, M anager Carl sbad Field Office Departmen t of Energy P.O. Box 3090 Carl sbad, New M ex ico 8822 1 ·3090 M. Farok Sharif Washington TRU Solutions LLC P.O. Box 2078 Carlsbad, New Mexico 88221 ·3090 DAV E MARTIN Secretary BUTCH TONG ATE Deputy Secretary JAMES H. DAVIS , Ph.D. Director Resource Proteclion Di vision R E : ADMINISTRATIVE COMPLETENESS AND FINAL DETERMI NATION, CLASS F MODIFICATION R EQUESTS WIPP HAZARDOUS WASTE FACILITY PERMIT EPA I.D. NUMBER NM4890139088·TSDF

432

Image  

NLE Websites -- All DOE Office Websites (Extended Search)

SOLICWfATION/MODIFICATlON OF CONTRACT SOLICWfATION/MODIFICATlON OF CONTRACT 2< AMENDMt;NT/MODIFfCAnON NO, 3.'EFFEC1fVE DArE 202 See Block 16C 6. ISSUED BY CODE 00518 Oak Ridge U.S. Department of Energy P.O. Box 2001 Oak Ridge 'l'N 37831 8. N~MEAND ADDRE~ OF CONTRACTOR INc..,~, emmly, SUlf9andljpCode} AK RIDGE Q P Q .0. BOX AKRIDGE ASSOCIATED UNIVERSITIES, INC. 117 TN 37830-6218 1" CONlRACTIP WDE I PAG!±: OF PAGES 1 I 1 4. Re:aUiS!ilON:!PURCHASE REQ. NQ. IS. PROJECT NO. (lfspp/kJabfe) 10SCQ0874 7 Itt0tl'\ 5 7. ADMINlSTEf{EO BY (If otn"!f th$tf Item 6) COOE 100518 Oak Ridge U.S. Department of Energy P.O. Box 2001 Oak Ridge TN 37831 .\'Q ';SA. AMENDMENT OF SOUq.ITATION NO . 9S~ DATED (SEE ITEM tt) x fOA. MQD1F1CAT)ON 'OF cemMer/ORDER NO, DE-AC05-

433

Image  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Domestic Source Recovery- Domestic Source Recovery- FY 2013 Program or Field Office: Los Alamos Site Office (DOE/NNSA) Locationls) ICity/County/State): Los Alamos, NM Proposed Action Description: Submit by E-mail J The DOE/NNSA's Off-Site Source Recovery Project (OSRP), managed at Los Alamos National Laboratory (LANL), proposes to recover up to 4000 domestic actinide and non-actinide sealed sources in Fiscal Year (FY) 2013 as it continues to implement NNSA's Global Threat Reduction Initiative (GTRI). Based on performance planning for FY 2013, LANL has identified that sufficient handling and storage facilities exist at LANL to support OSRP operations. The OSRP Program is the same as that described in the 2008 LANL SWEIS (DOE/EIS-0380; May 2008). Program and activities must comply with the LANL Hazardous Waste Permit (issued December 2010 and subsequent revisions). The Permit has specific

434

Image  

NLE Websites -- All DOE Office Websites (Extended Search)

MA MA RTINEZ Governor JOHN A. SANCHEZ Lieutenant Governor NEW MEXICO ENVIRONMENT DEPARTMENT Hazardous Waste Bureau 2905 Rodeo Park Drive East, Building 1 Santa Fe, New Mexico 87505-6303 Phone (505) 476-6000 Fax (505) 476-6030 www.llmellv.Sfale.IlIll.1I s CERTIFIED MAIL - RETURN REC EIPT REQUESTED DAVE MARTIN Secretary BUTCH TONOATE Deputy Secretary May 30, 2012 RECEIVED JUN 1 lOll General M QU. anager's '1tce Jose R. Franco, Manager Carlsbad Field Office Department of Energy P.O. Box 3090 Carl sbad, New Mexico 88221-3090 M. Farok Sharif Washington TRU Solutions LLC P.O. Box 2078 Carl sbad, New Mexico 88221-5608 RE: NOTICE OF COMPLETENESS DETERMINATION AND FEE ASSESSMENT WIPP HAZARDOUS WASTE FACILITY PERMIT EPA LD. NUMBER NM4890139088 HWB-WIPP-12-004

435

Image  

NLE Websites -- All DOE Office Websites (Extended Search)

SliSANA MARTINEZ SliSANA MARTINEZ Governol' JOHN A. SANCHEZ Lieutenant Governor September 28, 2012 Jose Franco, Manager Carlsbad Field Office Department of Energy P.O. Box 3090 NEW MEXICO ENVIRONMENT DEPARTMENT Resource Protection Division Harold Runnels Building 1190 Saint Francis Drive (87505) P.O. Box 5469, Santa Fe, NM 87502-5469 Phone (505) 827-0419 Fax (505) 827-0310 W\V~V. nnl~X~Y".B!il t C .1}111.1I.::>. CERTIFIED MAIL - RETURN RECEIPT REQUESTED M. Farok Sharif Washington TRU Solutions LLC P.O. Box 2078 Carlsbad, New Mexico 88221-5608 Carlsbad, New Mexico 88221-3090 RE: NOTICE OF EXTENSION FOR CLASS 2 PERMIT MODIFICATION DECISION WIPP HAZARDOUS WASTE FACILITY PERMIT EPA LD. NUMBER NM4890139088 Dear Messrs. Franco and Sharif:

436

Image  

NLE Websites -- All DOE Office Websites (Extended Search)

CONTRACT!D CODE IPAU!£ 0, PAGeS 1 10 Z, AMENOMENT/MOO[PICATIQN NO, 3, EFI'tECT!Va DATE 4. REQU!SmoNtPuRCHASE'REQ. NO. 15, PROJECT NO. ("appllen!)I,,) 178. See BIQC¥ 16C 1080008480 6: I$SueD- BY COOE 00518 7. ADMINJSTERED ay lffothOrffum Item 6) CODE 100518 Oak Rl.

437

Image  

NLE Websites -- All DOE Office Websites (Extended Search)

MARTINI:'!, MARTINI:'!, Governor JOHN A SANCHI":Z Lieutenant Governor NEW MEXICO ENVIRONMENT DEPARTMENT Hazardous Waste Bureau 2905 Rodeo Park Drive East, Building 1 Santa Fe, New Mexico 87505-6303 Phone (505) 476-6000 Fax (505) 476-6030 www.nmenv.state.nm.us CERTIFIED MAIL - RETURN RECEIPT REQUESTED October 13,2013 Jose R. Franco, Manager Carlsbad Field Office Department of Energy P.O. Box 3090 Carlsbad, New Mexico 88221-3090 M. Farok Sharif, Project Manager Nuclear Waste Partnership LLC P.O. Box 2078 Carlsbad, New Mexico 88221-5608 RE: CLASS 1 MODIFICATION, AUGUST 29, 2013 WIPP HAZARDOUS WASTE FACILITY PERMIT EPA I.D. NUMBER NM4890139088 Dear Messrs. Franco and Sharif: RYAN rLYNN Cabinet Secretary Designate BUTCH TON(iATI: Deputy Secretary TOM BLAINE, P.E.

438

Image  

NLE Websites -- All DOE Office Websites (Extended Search)

MA!n!NEZ MA!n!NEZ Governor JOHN A, SANCHEZ Lieutenant Governor July 29, 2013 Jose Franco, Manager Carlsbad Field Office Department of Energy P.O. Box 3090 NEW MEXICO ENVIRONMENT DEPARTMENT Hazardous Waste Bureau 2905 Rodeo Park Drive East, Building 1 Santa Fe, New Mexico 87505·6303 Phone (505) 476·6000 Fax (505) 476·6030 www.nmenv.state.nm.us CERTIFIED MAIL' RETURN RECEIPT REQUESTED M. Farok Sharif, Project Manager Nuclear Waste Partnership LLC P.O. Box 2078 Carlsbad, New Mexico 88221·5608 Carlsbad, New Mexico 88221·3090 RE: NOTICE OF ADMINISTRATIVE COMPLETENESS CLASS 3 PERMIT MODIFICATION REQUEST WIPP HAZARDOUS WASTE FACILITY PERMIT EPA 1.0. NUMBER NM4890139088 Dear Messrs. Franco and Sharif: !{ Y AN FI,YNN Cabinet Secrel,lry-De.sigllate BUTCH TONGAn:

439

Image  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Assessment, Assessment, 404(b) (1) Evaluation, and Finding of No Significant Impact Granite Reliable Power Permit Application #NAE 2008-410 Table of Contents 1. Executive Summary ........................................................................................................................ 4 1.1 Introduction .............................................................................................................. 4 1.2 Overview of Proposed Action and Alternatives ...................................................... 6 1.3 Affected Environment/Function and Value of Resources Impacted ....................... 8 1.4 Environmental Consequences/Public Interest Impacts ............................................ 9 2. Purpose and Need for Action ........................................................................................................ 11

440

Image  

NLE Websites -- All DOE Office Websites (Extended Search)

... 17 L-4e Statistical Analysis of Laboratory Analytical Data ... 17 L-4e(1) Temporal and Spatial...

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Image  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

s. Department of Energy s. Department of Energy Categorical Exclusion Determination Form ELQJ)Oscd Action 'rille: Construction of Interagency Fire Center at TAA9 Program or Field Office: Los Alamos Site Office (DOE/NNSA) Location(s) (City/County/State): Los Alamos, NM Proposed Action Description: Submit by E-mail The Los Alamos Site Office proposes to approve construction of a new, 5ingle"5tory multipurpose interagency fire center at Technical Area (TA)-49. The National Park Service (NPS) would be the primary building occupant, under an agreement with NNSA and the US Forest Service. The purpose of the facility is to support interagency operations for wildfire response. The building would contain about 6,400 square feet of offices, training and conference rooms and about 200 square feet of storage for fire protection/suppression equipment. Habitat disturbance would

442

Low Dose Radiation Research Program: Image Gallery  

NLE Websites -- All DOE Office Websites (Extended Search)

Image Gallery Image Gallery These are images, photographs, and charts presented or developed for Low Dose Radiation Research Investigators’ Meetings. They may be used for presentations or reports. To save, right click on the picture, then choose "Save picture as." U.S. annual per-capita effective radiation dose from various sources for 1980. various sources 1980 Enlarge Image. U.S. annual per-capita effective radiation dose from various sources for 2006. various sources 2006 Enlarge Image. U.S. annual per-capita effective radiation dose from man-made sources in the United States for 2006. man-made 2006 Enlarge Image. Ionizing Radiation Dose Ranges showing the wide range of radiation doses that humans experience (Rem) Enlarge Image. Ionizing Radiation Dose Ranges showing the wide range of radiation doses that humans experience

443

Help:Images | Open Energy Information  

Open Energy Info (EERE)

source source History View New Pages Recent Changes All Special Pages Semantic Search/Querying Get Involved Help Apps Datasets Community Login | Sign Up Search Help page Edit History Facebook icon Twitter icon » Help:Images Jump to: navigation, search This page explains the image syntax when editing the wiki. You or another user must usually upload an image before you can use it on a page. Contents 1 Syntax 2 Format 3 Alignment 3.1 Vertical alignment 4 Size and Frame 5 Stopping text flow 6 Gallery of images 6.1 Parameters 7 Links 7.1 Link to description page 7.2 Link directly to file 8 Requisites 9 Files at other websites Syntax The full syntax for displaying an image is: [[Image:{file_name}|{options}]] Where options can be zero or more of the following, separated by pipes: border, frame, thumb, or frameless: Controls how the image is

444

ARM - Evaluation Product - Multispectral Thermal Imager (MTI)  

NLE Websites -- All DOE Office Websites (Extended Search)

ProductsMultispectral Thermal Imager (MTI) ProductsMultispectral Thermal Imager (MTI) Comments? We would love to hear from you! Send us a note below or call us at 1-888-ARM-DATA. Send Evaluation Product : Multispectral Thermal Imager (MTI) 2000.10.01 - 2003.05.02 Site(s) NSA SGP General Description The Multispectral Thermal Imager is a space-based research and development project sponsored by the U.S. Department of Energy (DOE), Office of Nonproliferation and National Security. MTI's primary objective is to demonstrate advanced multispectral and thermal imaging, image processing, and associated technologies that could be used in future systems for detecting and characterizing facilities producing weapons of mass destruction. However, ARM and the MTI have an arrangement that allows ARM to receive MTI images.

445

Search Log Analysis of the ARTstor Cultural Heritage Image Database  

E-Print Network (OSTI)

Image downloaded Advanced search Records when an image ispages Records when an advanced search function is used The

Lowe, Heather Ann

2013-01-01T23:59:59.000Z

446

PRODUCTION ANALYSIS: CHEROKEE AND BUG FIELDS, SAN JUAN COUNTY, UTAH  

SciTech Connect

Over 400 million barrels (64 million m{sup 3}) of oil have been produced from the shallow-shelf carbonate reservoirs in the Pennsylvanian (Desmoinesian) Paradox Formation in the Paradox Basin, Utah and Colorado. With the exception of the giant Greater Aneth field, the other 100 plus oil fields in the basin typically contain 2 to 10 million barrels (0.3-1.6 million m{sup 3}) of original oil in place. Most of these fields are characterized by high initial production rates followed by a very short productive life (primary), and hence premature abandonment. Only 15 to 25 percent of the original oil in place is recoverable during primary production from conventional vertical wells. An extensive and successful horizontal drilling program has been conducted in the giant Greater Aneth field. However, to date, only two horizontal wells have been drilled in small Ismay and Desert Creek fields. The results from these wells were disappointing due to poor understanding of the carbonate facies and diagenetic fabrics that create reservoir heterogeneity. These small fields, and similar fields in the basin, are at high risk of premature abandonment. At least 200 million barrels (31.8 million m{sup 3}) of oil will be left behind in these small fields because current development practices leave compartments of the heterogeneous reservoirs undrained. Through proper geological evaluation of the reservoirs, production may be increased by 20 to 50 percent through the drilling of low-cost single or multilateral horizontal legs from existing vertical development wells. In addition, horizontal drilling from existing wells minimizes surface disturbances and costs for field development, particularly in the environmentally sensitive areas of southeastern Utah and southwestern Colorado.

Thomas C. Chidsey Jr.

2003-12-01T23:59:59.000Z

447

The baron of bugs: Researcher keeps waterborne pathogens at bay  

E-Print Network (OSTI)

of organisms in the environment, except instead of working with soil now I was working with water,? he said. ?Since it was a drinking water company, the focus was detecting pathogens in source water used for drinking water production, as well as finished... drinking water itself.? Though he believed great advancements in basic and applied waterborne pathogen research were being made, he foresaw limited research opportunities at the water company. At this time, Di Giovanni said, the water indus- try...

Swyden, Courtney

2010-01-01T23:59:59.000Z

448

Phoenix: Detecting and Recovering from Permanent Processor Design Bugs  

E-Print Network (OSTI)

approaches are ineffective Micro-code patching Compiler workarounds OS hacks Firmware #12;http Condition L1, ALU, Memory, etc. Hang, data corruption IO failure, wrong data A (BCD) Signal Snoop L1 hit IO

Torrellas, Josep

449

UMass builds bugs to eat MTBE ByAuriaCimino  

E-Print Network (OSTI)

a toxic gasoline component might be just what the doctor ordered for Maine's con- taminated groundwater with methyl tertiary butyl ether (MTBE), which is found in gasoline. Once the first field trial is complete out of the reformulated gasoline pro- gram (RFG) .The gasoline, which con- tains 11 percent MTBE

Lovley, Derek

450

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

target system. A remote user can obtain potentially sensitive information. Solution: A patch matrix is available in the vendor's advisory. Addthis Related Articles V-076: Cisco...

451

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

user can redirect users to arbitrary sites. Solution: The vendor has issued a fix. A patch matrix is available in the vendor's advisory. Microsoft Security Bulletin MS11-100...

452

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

that, when loaded by the target user, will trigger a buffer overflow, use-after-free memory error, or memory corruption error and execute arbitrary code on the target system. The...

453

Assassin bug uses aggressive mimicry to lure spider prey  

Science Journals Connector (OSTI)

...vibrometer (Polytec PDV100, Germany). The AES (Audio Engineering Society) output of the laser vibrometer was converted to EBU (CO3, Midiman, M-Audio, USA) and synchronized to the audio track of the video recording. Vibrations...

2011-01-01T23:59:59.000Z

454

Relativistic approach to electromagnetic imaging  

E-Print Network (OSTI)

A novel imaging principle based on the interaction of electromagnetic waves with a beam of relativistic electrons is proposed. Wave-particle interaction is assumed to take place in a small spatial domain, so that each electron is only briefly accelerated by the incident field. In the one-dimensional case the spatial distribution of the source density can be directly observed in the temporal spectrum of the scattered field. Whereas, in the two-dimensional case the relation between the source and the spectrum is shown to be approximately the Radon transform.

Budko, N

2004-01-01T23:59:59.000Z

455

Relativistic approach to electromagnetic imaging  

E-Print Network (OSTI)

A novel imaging principle based on the interaction of electromagnetic waves with a beam of relativistic electrons is proposed. Wave-particle interaction is assumed to take place in a small spatial domain, so that each electron is only briefly accelerated by the incident field. In the one-dimensional case the spatial distribution of the source density can be directly observed in the temporal spectrum of the scattered field. Whereas, in the two-dimensional case the relation between the source and the spectrum is shown to be approximately the Radon transform.

Neil Budko

2004-03-11T23:59:59.000Z

456

Quantitative imaging of turbulent and reacting flows  

SciTech Connect

Quantitative digital imaging, using planar laser light scattering techniques is being developed for the analysis of turbulent and reacting flows. Quantitative image data, implying both a direct relation to flowfield variables as well as sufficient signal and spatial dynamic range, can be readily processed to yield two-dimensional distributions of flowfield scalars and in turn two-dimensional images of gradients and turbulence scales. Much of the development of imaging techniques to date has concentrated on understanding the requisite molecular spectroscopy and collision dynamics to be able to determine how flowfield variable information is encoded into the measured signal. From this standpoint the image is seen as a collection of single point measurements. The present effort aims at realizing necessary improvements in signal and spatial dynamic range, signal-to-noise ratio and spatial resolution in the imaging system as well as developing excitation/detection strategies which provide for a quantitative measure of particular flowfield scalars. The standard camera used for the study is an intensified CCD array operated in a conventional video format. The design of the system was based on detailed modeling of signal and image transfer properties of fast UV imaging lenses, image intensifiers and CCD detector arrays. While this system is suitable for direct scalar imaging, derived quantities (e.g. temperature or velocity images) require an exceptionally wide dynamic range imaging detector. To apply these diagnostics to reacting flows also requires a very fast shuttered camera. The authors have developed and successfully tested a new type of gated low-light level detector. This system relies on fast switching of proximity focused image-diode which is direct fiber-optic coupled to a cooled CCD array. Tests on this new detector show significant improvements in detection limit, dynamic range and spatial resolution as compared to microchannel plate intensified arrays.

Paul, P.H. [Sandia National Laboratories, Livermore, CA (United States)

1993-12-01T23:59:59.000Z

457

Selective document image data compression technique  

DOE Patents (OSTI)

A method of storing information from filled-in form-documents comprises extracting the unique user information in the foreground from the document form information in the background. The contrast of the pixels is enhanced by a gamma correction on an image array, and then the color value of each of pixel is enhanced. The color pixels lying on edges of an image are converted to black and an adjacent pixel is converted to white. The distance between black pixels and other pixels in the array is determined, and a filled-edge array of pixels is created. User information is then converted to a two-color format by creating a first two-color image of the scanned image by converting all pixels darker than a threshold color value to black. All the pixels that are lighter than the threshold color value to white. Then a second two-color image of the filled-edge file is generated by converting all pixels darker than a second threshold value to black and all pixels lighter than the second threshold color value to white. The first two-color image and the second two-color image are then combined and filtered to smooth the edges of the image. The image may be compressed with a unique Huffman coding table for that image. The image file is also decimated to create a decimated-image file which can later be interpolated back to produce a reconstructed image file using a bilinear interpolation kernel.--(235 words)

Fu, Chi-Yung (29 Cameo Way, San Francisco, CA 94131); Petrich, Loren I. (1674 Cordoba St., #4, Livermore, CA 94550)

1998-01-01T23:59:59.000Z

458

Selective document image data compression technique  

DOE Patents (OSTI)

A method of storing information from filled-in form-documents comprises extracting the unique user information in the foreground from the document form information in the background. The contrast of the pixels is enhanced by a gamma correction on an image array, and then the color value of each of pixel is enhanced. The color pixels lying on edges of an image are converted to black and an adjacent pixel is converted to white. The distance between black pixels and other pixels in the array is determined, and a filled-edge array of pixels is created. User information is then converted to a two-color format by creating a first two-color image of the scanned image by converting all pixels darker than a threshold color value to black. All the pixels that are lighter than the threshold color value to white. Then a second two-color image of the filled-edge file is generated by converting all pixels darker than a second threshold value to black and all pixels lighter than the second threshold color value to white. The first two-color image and the second two-color image are then combined and filtered to smooth the edges of the image. The image may be compressed with a unique Huffman coding table for that image. The image file is also decimated to create a decimated-image file which can later be interpolated back to produce a reconstructed image file using a bilinear interpolation kernel. 10 figs.

Fu, C.Y.; Petrich, L.I.

1998-05-19T23:59:59.000Z

459

Coherent hybrid electromagnetic field imaging  

DOE Patents (OSTI)

An apparatus and corresponding method for coherent hybrid electromagnetic field imaging of a target, where an energy source is used to generate a propagating electromagnetic beam, an electromagnetic beam splitting means to split the beam into two or more coherently matched beams of about equal amplitude, and where the spatial and temporal self-coherence between each two or more coherently matched beams is preserved. Two or more differential modulation means are employed to modulate each two or more coherently matched beams with a time-varying polarization, frequency, phase, and amplitude signal. An electromagnetic beam combining means is used to coherently combine said two or more coherently matched beams into a coherent electromagnetic beam. One or more electromagnetic beam controlling means are used for collimating, guiding, or focusing the coherent electromagnetic beam. One or more apertures are used for transmitting and receiving the coherent electromagnetic beam to and from the target. A receiver is used that is capable of square-law detection of the coherent electromagnetic beam. A waveform generator is used that is capable of generation and control of time-varying polarization, frequency, phase, or amplitude modulation waveforms and sequences. A means of synchronizing time varying waveform is used between the energy source and the receiver. Finally, a means of displaying the images created by the interaction of the coherent electromagnetic beam with target is employed.

Cooke, Bradly J. (Jemez Springs, NM); Guenther, David C. (Los Alamos, NM)

2008-08-26T23:59:59.000Z

460

Scannerless loss modulated flash color range imaging  

DOE Patents (OSTI)

Scannerless loss modulated flash color range imaging methods and apparatus are disclosed for producing three dimensional (3D) images of a target within a scene. Apparatus and methods according to the present invention comprise a light source providing at least three wavelengths (passbands) of illumination that are each loss modulated, phase delayed and simultaneously directed to illuminate the target. Phase delayed light backscattered from the target is spectrally filtered, demodulated and imaged by a planar detector array. Images of the intensity distributions for the selected wavelengths are obtained under modulated and unmodulated (dc) illumination of the target, and the information contained in the images combined to produce a 3D image of the target.

Sandusky, John V. (Albuquerque, NM); Pitts, Todd Alan (Rio Rancho, NM)

2008-09-02T23:59:59.000Z

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Scannerless loss modulated flash color range imaging  

DOE Patents (OSTI)

Scannerless loss modulated flash color range imaging methods and apparatus are disclosed for producing three dimensional (3D) images of a target within a scene. Apparatus and methods according to the present invention comprise a light source providing at least three wavelengths (passbands) of illumination that are each loss modulated, phase delayed and simultaneously directed to illuminate the target. Phase delayed light backscattered from the target is spectrally filtered, demodulated and imaged by a planar detector array. Images of the intensity distributions for the selected wavelengths are obtained under modulated and unmodulated (dc) illumination of the target, and the information contained in the images combined to produce a 3D image of the target.

Sandusky, John V. (Albuquerque, NM); Pitts, Todd Alan (Rio Rancho, NM)

2009-02-24T23:59:59.000Z

462

Calibration method for video and radiation imagers  

DOE Patents (OSTI)

The relationship between the high energy radiation imager pixel (HERIP) coordinate and real-world x-coordinate is determined by a least square fit between the HERIP x-coordinate and the measured real-world x-coordinates of calibration markers that emit high energy radiation imager and reflect visible light. Upon calibration, a high energy radiation imager pixel position may be determined based on a real-world coordinate of a moving vehicle. Further, a scale parameter for said high energy radiation imager may be determined based on the real-world coordinate. The scale parameter depends on the y-coordinate of the moving vehicle as provided by a visible light camera. The high energy radiation imager may be employed to detect radiation from moving vehicles in multiple lanes, which correspondingly have different distances to the high energy radiation imager.

Cunningham, Mark F. (Oak Ridge, TN); Fabris, Lorenzo (Knoxville, TN); Gee, Timothy F. (Oak Ridge, TN); Goddard, Jr., James S. (Knoxville, TN); Karnowski, Thomas P. (Knoxville, TN); Ziock, Klaus-peter (Clinton, TN)

2011-07-05T23:59:59.000Z

463

SCP06J50  

NLE Websites -- All DOE Office Websites (Extended Search)

0 0 See Barbary et al. (2011) for details. Aperture photometry on this page is for diagnostic purposes only. See Suzuki et al. (2011) for photometry and cosmology analysis. Data Lightcurve Local Environment : Stacked color image Pixel Position ( 753.34 , 3967.62) Gaussian fit RA,DEC (14:34:56.673 , +35:20:31.22) Cluster Offset 127.0 arcsec Redshift Unknown Redshift from Cluster Redshift 1.37 Found with uniform selection Yes Lightcurve Cut 1, 2, 3 PASS, PASS, PASS Classification star Typing based on Discovery 1 ep = 06 ( 753.34,3967.62) mag = 24.299 apsig = 6.443 Flux in a 3 pixel radius aperture, including host galaxy light. Hover-over shows: MAG_AUTO z850 ( aperture i775 - z850 ) z850 Thumbnail overview (see below for all thumbnails) Spectroscopy All thumbnails Ep z850 z850 subtraction

464

SCP06T54  

NLE Websites -- All DOE Office Websites (Extended Search)

4 4 See Barbary et al. (2011) for details. Aperture photometry on this page is for diagnostic purposes only. See Suzuki et al. (2011) for photometry and cosmology analysis. Data Lightcurve Local Environment : Stacked color image Pixel Position (3945.78 , 3927.16) Gaussian fit RA,DEC (15:11:01.443 , + 9:04:04.20) Cluster Offset 62.5 arcsec Redshift Unknown Redshift from Cluster Redshift 0.97 Found with uniform selection Yes Lightcurve Cut 1, 2, 3 PASS, PASS, PASS Classification star Typing based on Discovery 1 ep = 02 (3945.78,3927.16) mag = 24.236 apsig = 7.196 Flux in a 3 pixel radius aperture, including host galaxy light. Hover-over shows: MAG_AUTO z850 ( aperture i775 - z850 ) z850 Thumbnail overview (see below for all thumbnails) Spectroscopy All thumbnails Ep z850 z850 subtraction

465

Preliminary Results from the Cosmic Background Imager  

E-Print Network (OSTI)

The Cosmic Background Imager (CBI) is a 13-element interferometer designed to image intrinsic anisotropies in the cosmic microwave background (CMB) on arcminute scales. A review of the capabilities of the instrument is presented, together with a discussion of observations which have been taken over the past 9 months from the Atacama desert of Chile. We present preliminary high-resolution mosaiced images of the CMB obtained from recent CBI data and discuss topics which the CBI will address in the near future.

B. S. Mason; J. K. Cartwright; S. Padin; T. J. Pearson; A. C. S. Readhead; M. Shepherd; J. Sievers; P. Udomprasert

2001-01-11T23:59:59.000Z

466

Simplified image processing system for softcopy presentation  

E-Print Network (OSTI)

-based i, echniques for its particular application. In the field of astronomy, digital image processing techniques are used to process images acquired through earth-based telescopes as well as earth orbiting outward- looking satellites jfij, I7j, j8... and analysis is being used to support computerized axial tomography and ultrasound scanning systems ]9]. Typical digital techniques used in biomedical applications include image enhancement, geometric transformation, edge detection, color and pseudo color...

Corleto-Mena, Jose Gilberto

1984-01-01T23:59:59.000Z

467

Atomic resolution images of graphite in air  

SciTech Connect

One sample used for proof of operation for atomic resolution in STM is highly oriented pyrolytic graphite (HOPG). This sample has been imaged with many different STM`s obtaining similar results. Atomic resolution images of HOPG have now been obtained using an STM designed and built at the Precision Engineering Center. This paper discusses the theoretical predictions and experimental results obtained in imaging of HOPG.

Grigg, D.A.; Shedd, G.M.; Griffis, D.; Russell, P.E.

1988-12-01T23:59:59.000Z

468

Precursors to radiopharmaceutical agents for tissue imaging  

DOE Patents (OSTI)

A class of radiolabeled compounds to be used in tissue imaging that exhibits rapid brain uptake, good brain:blood radioactivity ratios, and long retention times. The imaging agents are more specifically radioiodinated aromatic amines attached to dihydropyridine carriers, that exhibit heart as well as brain specificity. In addition to the radiolabeled compounds, classes of compounds are also described that are used as precursors and intermediates in the preparation of the imaging agents.

Srivastava, Prem C. (Oak Ridge, TN); Knapp, Jr., Furn F. (Oak Ridge, TN)

1988-01-01T23:59:59.000Z

469

Compact reflective imaging spectrometer utilizing immersed gratings  

DOE Patents (OSTI)

A compact imaging spectrometer comprising an entrance slit for directing light, a first mirror that receives said light and reflects said light, an immersive diffraction grating that diffracts said light, a second mirror that focuses said light, and a detector array that receives said focused light. The compact imaging spectrometer can be utilized for remote sensing imaging spectrometers where size and weight are of primary importance.

Chrisp, Michael P. (Danville, CA)

2006-05-09T23:59:59.000Z

470

Crosswell Electromagnetic Resistivity Imaging: Illuminating the Reservior |  

Open Energy Info (EERE)

Page Page Edit with form History Facebook icon Twitter icon » Crosswell Electromagnetic Resistivity Imaging: Illuminating the Reservior Jump to: navigation, search OpenEI Reference LibraryAdd to library Web Site: Crosswell Electromagnetic Resistivity Imaging: Illuminating the Reservior Published Middle East Asia Reservior Reviiew, 2006 DOI Not Provided Check for DOI availability: http://crossref.org Online Internet link for Crosswell Electromagnetic Resistivity Imaging: Illuminating the Reservior Citation Crosswell Electromagnetic Resistivity Imaging: Illuminating the Reservior [Internet]. 2006. Middle East Asia Reservior Reviiew. [cited 2013/10/22]. Available from: http://www.slb.com/~/media/Files/resources/mearr/num7/illuminating_reservoir.pdf Retrieved from

471

NASA High Contrast Imaging for Exoplanets  

Science Journals Connector (OSTI)

Described is NASA's ongoing program for detection and characterization of exo-solar planets via high-contrast imaging. Some of the more promising proposed techniques under assessment...

Lyon, Richard

472

Polarization imaging apparatus with auto-calibration  

DOE Patents (OSTI)

A polarization imaging apparatus measures the Stokes image of a sample. The apparatus consists of an optical lens set, a first variable phase retarder (VPR) with its optical axis aligned 22.5.degree., a second variable phase retarder with its optical axis aligned 45.degree., a linear polarizer, a imaging sensor for sensing the intensity images of the sample, a controller and a computer. Two variable phase retarders were controlled independently by a computer through a controller unit which generates a sequential of voltages to control the phase retardations of the first and second variable phase retarders. A auto-calibration procedure was incorporated into the polarization imaging apparatus to correct the misalignment of first and second VPRs, as well as the half-wave voltage of the VPRs. A set of four intensity images, I.sub.0, I.sub.1, I.sub.2 and I.sub.3 of the sample were captured by imaging sensor when the phase retardations of VPRs were set at (0,0), (.pi.,0), (.pi.,.pi.) and (.pi./2,.pi.), respectively. Then four Stokes components of a Stokes image, S.sub.0, S.sub.1, S.sub.2 and S.sub.3 were calculated using the four intensity images.

Zou, Yingyin Kevin; Zhao, Hongzhi; Chen, Qiushui

2013-08-20T23:59:59.000Z

473

Ultrasonic flow imaging system: A feasibility study  

SciTech Connect

This report examines the feasibility and potential problems in developing a real-time ultrasonic flow imaging instrument for on-line monitoring of mixed-phased flows such as coal slurries. State-of-the-art ultrasonic imaging techniques are assessed for this application. Reflection and diffraction tomographies are proposed for further development, including image-reconstruction algorithms and parallel processing systems. A conventional ultrasonic C-scan technique is used to demonstrate the feasibility of imaging the particle motion in a solid/water flow. 13 refs., 11 figs.

Sheen, S.H.; Lawrence, W.P.; Chien, H.T.; Raptis, A.C.

1991-09-01T23:59:59.000Z

474

Local Linear Learned Image Processing Pipeline  

Science Journals Connector (OSTI)

The local linear learned (L3) algorithm is presented that simultaneously performs the demosaicking, denoising, and color transform calculations of an image processing pipeline for a...

Lansel, Steven; Wandell, Brian

475

Neutron Imaging of Advanced Engine Technologies  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

during a series of partial regenerations (9302012). - Achieved * Determine temporal and spatial resolution of neutron imaging with respect to fluid density and flow in fuel...

476

Neutron Imaging of Advanced Engine Technologies  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

diesel injector: Filled reservoir Void in reservoir 6 Milestones * Determine temporal and spatial resolution of neutron imaging with respect to fluid density and flow in fuel...

477

Imaging - Clearer brain scans ... | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Imaging - Clearer brain scans ... A clever signal noise reduction strategy developed by a team that includes Oak Ridge National Laboratory's Ben Lawrie could dramatically improve...

478

Science, Optics and You: Mirror and Images  

NLE Websites -- All DOE Office Websites (Extended Search)

opticstutorialsindex.html INTRODUCTION MIRRORS AND IMAGES MODULE m3 SCIENCE, OPTICS & YOU GUIDEBOOK - 44 - SCIENCE, OPTICS & YOU GUIDEBOOK - 45 - m3: Mirrors and...

479

Help:Linked images | Open Energy Information  

Open Energy Info (EERE)

Redirect page Jump to: navigation, search REDIRECT Manual:Linked images Retrieved from "http:en.openei.orgwindex.php?titleHelp:Linkedimages&oldid58478"...

480

Imaging Gene Expression | The Ames Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Imaging Gene Expression FWPProject Description: Project Leader(s): Marit Nilsen-Hamilton Principal Investigators: George Kraus We are developing apatmers to use as cellular...

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Frontiers in Chemical Imaging Seminar Series  

E-Print Network (OSTI)

on diagnostics, imaging and therapy, with appropriate translational research and commercialization activities information (storage, processing and logic) and energy technologies. Prof. Krishnan is highly recognized

482

Multichannel image regularization using anisotropic geodesic filtering  

SciTech Connect

This paper extends a recent image-dependent regularization approach introduced in aiming at edge-preserving smoothing. For that purpose, geodesic distances equipped with a Riemannian metric need to be estimated in local neighbourhoods. By deriving an appropriate metric from the gradient structure tensor, the associated geodesic paths are constrained to follow salient features in images. Following, we design a generalized anisotropic geodesic filter; incorporating not only a measure of the edge strength, like in the original method, but also further directional information about the image structures. The proposed filter is particularly efficient at smoothing heterogeneous areas while preserving relevant structures in multichannel images.

Grazzini, Jacopo A [Los Alamos National Laboratory

2010-01-01T23:59:59.000Z

483

On Modelling and Understanding Image Manifolds .  

E-Print Network (OSTI)

??Images of objects (e.g. a rotating teapot, views from a camera mounted on a robot, an actor illuminated from different positions on a hemisphere, etc.)… (more)

Woodland, Alan

2010-01-01T23:59:59.000Z

484

Plasmonic nano lens for nano-imaging  

Science Journals Connector (OSTI)

Plamonic nanolens is a suggestion of unconventional imaging lens, which, instead of glass, is made of stacked arrays of silver nanorods. It is capable of producing colored and...

Kawata, Satoshi

485

Imaging and sensing based on muon tomography  

DOE Patents (OSTI)

Techniques, apparatus and systems for detecting particles such as muons for imaging applications. Subtraction techniques are described to enhance the processing of the muon tomography data.

Morris, Christopher L; Saunders, Alexander; Sossong, Michael James; Schultz, Larry Joe; Green, J. Andrew; Borozdin, Konstantin N; Hengartner, Nicolas W; Smith, Richard A; Colthart, James M; Klugh, David C; Scoggins, Gary E; Vineyard, David C

2012-10-16T23:59:59.000Z

486

Entangled-photon compressive ghost imaging  

SciTech Connect

We have experimentally demonstrated high-resolution compressive ghost imaging at the single-photon level using entangled photons produced by a spontaneous parametric down-conversion source and using single-pixel detectors. For a given mean-squared error, the number of photons needed to reconstruct a two-dimensional image is found to be much smaller than that in quantum ghost imaging experiments employing a raster scan. This procedure not only shortens the data acquisition time, but also suggests a more economical use of photons for low-light-level and quantum image formation.

Zerom, Petros [Institute of Optics, University of Rochester, Rochester, New York 14627 (United States); Chan, Kam Wai Clifford [Rochester Optical Manufacturing Company, 1260 Lyell Avenue, Rochester, New York 14606 (United States); Howell, John C. [Department of Physics and Astronomy, University of Rochester, 500 Wilson Boulevard, Rochester, New York 14627 (United States); Boyd, Robert W. [Institute of Optics, University of Rochester, Rochester, New York 14627 (United States); Department of Physics and Astronomy, University of Rochester, 500 Wilson Boulevard, Rochester, New York 14627 (United States); Department of Physics, University of Ottawa, Ottawa, Ontario, Canada K1N 6N5 (Canada)

2011-12-15T23:59:59.000Z

487

Modeling gated neutron images of THD capsules  

SciTech Connect

Time gating a neutron detector 28m from a NIF implosion can produce images at different energies. The brighter image near 14 MeV reflects the size and symmetry of the capsule 'hot spot'. Scattered neutrons, {approx}9.5-13 MeV, reflect the size and symmetry of colder, denser fuel, but with only {approx}1-7% of the neutrons. The gated detector records both the scattered neutron image, and, to a good approximation, an attenuated copy of the primary image left by scintillator decay. By modeling the imaging system the energy band for the scattered neutron image (10-12 MeV) can be chosen, trading off the decayed primary image and the decrease of scattered image brightness with energy. Modeling light decay from EJ399, BC422, BCF99-55, Xylene, DPAC-30, and Liquid A leads to a preference from BCF99-55 for the first NIF detector, but DPAC 30 and Liquid A would be preferred if incorporated into a system. Measurement of the delayed light from the NIF scintillator using implosions at the Omega laser shows BCF99-55 to be a good choice for down-scattered imaging at 28m.

Wilson, Douglas Carl [Los Alamos National Laboratory; Grim, Gary P [Los Alamos National Laboratory; Tregillis, Ian L [Los Alamos National Laboratory; Wilke, Mark D [Los Alamos National Laboratory; Morgan, George L [Los Alamos National Laboratory; Loomis, Eric N [Los Alamos National Laboratory; Wilde, Carl H [Los Alamos National Laboratory; Oertel, John A [Los Alamos National Laboratory; Fatherley, Valerie E [Los Alamos National Laboratory; Clark, David D [Los Alamos National Laboratory; Schmitt, Mark J [Los Alamos National Laboratory; Merrill, Frank E [Los Alamos National Laboratory; Wang, Tai - Sen F [Los Alamos National Laboratory; Danly, Christopher R [Los Alamos National Laboratory; Batha, Steven H [Los Alamos National Laboratory; Patel, M [LLNL; Sepke, S [LLNL; Hatarik, R [LLNL; Fittinghoff, D [LLNL; Bower, D [LLNL; Marinak, M [LLNL; Munro, D [LLNL; Moran, M [LLNL; Hilko, R [NSTEC; Frank, M [LLNL; Buckles, R [NSTEC

2010-01-01T23:59:59.000Z

488

Video rate spectral imaging using a coded aperture snapshot spectral imager  

Science Journals Connector (OSTI)

We have previously reported on coded aperture snapshot spectral imagers (CASSI) that can capture a full frame spectral image in a snapshot. Here we describe the use of CASSI for...

Wagadarikar, Ashwin A; Pitsianis, Nikos P; Sun, Xiaobai; Brady, David J

2009-01-01T23:59:59.000Z

489

A Comparison of Human and Machine Assessments of Image Similarity for the Organization of Image Databases  

E-Print Network (OSTI)

Databases Scandinavian Conference on Image Analysis June 9--11, 1997, Lappeenranta, Finland David Mc. #12; Scandinavian Conference on Image Analysis June 9--11, 1997, Lappeenranta, Finland David Mc

Genève, Université de

490

Image contrast range for detection of enamel defects using a digital dental imaging system  

Science Journals Connector (OSTI)

The purpose of this study was to quantitatively assess the acceptable range of image contrast for the detection of enamel defects by adjusting the contrast and brightness of a digital dental imaging system. Ex...

Hiromi Kitagawa D.D.S.; Ph.D.; Mamoru Wakoh D.D.S.; Ph.D.…

1999-12-01T23:59:59.000Z

491

Automatic image analysis for detecting and quantifying gamma-ray sources in coded-aperture images  

SciTech Connect

The authors report the development of an automatic image analysis system that detects gamma-ray source regions in images obtained from a coded aperture, gamma-ray imager. The number of gamma sources in the image is not known prior to analysis. The system counts the number (K) of gamma sources detected in the image and estimates the lower bound for the probability that the number of sources in the image is K. The system consists of a two-stage pattern classification scheme in which the probabilistic neural network is used in the supervised learning mode. The algorithms were developed and tested using real gamma-ray images from controlled experiments in which the number and location of depleted uranium source disks in the scene are known. The novelty of the work lies in the creative combination of algorithms and the successful application of the algorithms to real images of gamma-ray sources.

Schaich, P.C.; Sengupta, S.K.; Ziock, K.P. [Lawrence Livermore National Lab., CA (United States)] [Lawrence Livermore National Lab., CA (United States); Clark, G.A. [Lawrence Livermore National Lab., CA (United States)] [Lawrence Livermore National Lab., CA (United States); [Univ. of California, Davis, CA (United States). Center for Image Processing and Integrated Computing

1996-08-01T23:59:59.000Z

492

Method to Remedy Image Degradations Due to Facet Braiding in 3D Integral-Imaging Monitors  

Science Journals Connector (OSTI)

One of the main challenges in 3D integral imaging (InI) is to overcome the limited depth of field of displayed 3D images. Although this limitation can ...

Navarro, Héctor; Martínez-Cuenca, Raúl; Molina-Martín, Ainhoa; Martínez-Corral, Manuel; Saavedra, Genaro; Javidi, Bahram

2010-01-01T23:59:59.000Z

493

Supporting video library exploratory search: when storyboards are not enough  

Science Journals Connector (OSTI)

Storyboards, a grid layout of thumbnail images as surrogates representing video, have received much attention in video retrieval interfaces and published studies through the years, and work quite well as navigation aids and as facilitators for shot-based ... Keywords: digital video library, exploratory search, interactive video retrieval, video information views

Michael G. Christel

2008-07-01T23:59:59.000Z

494

Roadmap: Radiologic Imaging Sciences Magnetic Resonance Imaging (with certification and ATS Radiologic Technology) -  

E-Print Network (OSTI)

Roadmap: Radiologic Imaging Sciences ­ Magnetic Resonance Imaging (with certification and ATS Radiologic Technology) - Bachelor of Radiologic Imaging Sciences Technology [RE-BRIT-RIS-MRHA] Regional College Catalog Year: 2013-2014 Page 1 of 2 | Last Updated: 1-May-13/LNHD This roadmap is a recommended

Sheridan, Scott

495

Roadmap: Radiologic Imaging Sciences -Magnetic Resonance Imaging (with AAS Radiologic Technology) -  

E-Print Network (OSTI)

Roadmap: Radiologic Imaging Sciences - Magnetic Resonance Imaging (with AAS Radiologic Technology) - Bachelor of Radiologic and Imaging Sciences Technology [RE-BRIT-RIS-MRRT] Regional College Catalog Year: 2013-2014 Page 1 of 2 | Last Updated: 1-May-13/LNHD This roadmap is a recommended semester

Sheridan, Scott

496

Roadmap: Radiologic Imaging Sciences Magnetic Resonance Imaging (with certification and ATS Radiologic Technology) -  

E-Print Network (OSTI)

Roadmap: Radiologic Imaging Sciences ­ Magnetic Resonance Imaging (with certification and ATS Radiologic Technology) - Bachelor of Radiologic Imaging Sciences Technology [RE-BRIT-RIS-MRHA] Regional College Catalog Year: 2012-2013 Page 1 of 2 | Last Updated: 11-Apr-12/LNHD This roadmap is a recommended

Sheridan, Scott

497

Roadmap: Radiologic Imaging Sciences -Magnetic Resonance Imaging (with AAS Radiologic Technology) -  

E-Print Network (OSTI)

Roadmap: Radiologic Imaging Sciences - Magnetic Resonance Imaging (with AAS Radiologic Technology) - Bachelor of Radiologic and Imaging Sciences Technology [RE-BRIT-RIS-MRRT] Regional College Catalog Year: 2012-2013 Page 1 of 2 | Last Updated: 21-May-12/LNHD This roadmap is a recommended semester

Sheridan, Scott

498

Imaging system for cardiac planar imaging using a dedicated dual-head gamma camera  

DOE Patents (OSTI)

A cardiac imaging system employing dual gamma imaging heads co-registered with one another to provide two dynamic simultaneous views of the heart sector of a patient torso. A first gamma imaging head is positioned in a first orientation with respect to the heart sector and a second gamma imaging head is positioned in a second orientation with respect to the heart sector. An adjustment arrangement is capable of adjusting the distance between the separate imaging heads and the angle between the heads. With the angle between the imaging heads set to 180 degrees and operating in a range of 140-159 keV and at a rate of up to 500kHz, the imaging heads are co-registered to produce simultaneous dynamic recording of two stereotactic views of the heart. The use of co-registered imaging heads maximizes the uniformity of detection sensitivity of blood flow in and around the heart over the whole heart volume and minimizes radiation absorption effects. A normalization/image fusion technique is implemented pixel-by-corresponding pixel to increase signal for any cardiac region viewed in two images obtained from the two opposed detector heads for the same time bin. The imaging system is capable of producing enhanced first pass studies, bloodpool studies including planar, gated and non-gated EKG studies, planar EKG perfusion studies, and planar hot spot imaging.

Majewski, Stanislaw (Morgantown, VA); Umeno, Marc M. (Woodinville, WA)

2011-09-13T23:59:59.000Z

499

Fast Image Drift Compensation in Scanning Electron Microscope Using Image Registration  

E-Print Network (OSTI)

Fast Image Drift Compensation in Scanning Electron Microscope Using Image Registration Naresh Marturi, Sounkalo Demb´el´e and Nadine Piat Abstract-- Scanning Electron Microscope (SEM) image ac analysis and characterization of materials to recover their structural, mechanical, electrical and optical

Boyer, Edmond

500

Image Analysis of Defocused Single-Molecule Images for Three-Dimensional Molecule Orientation Studies  

E-Print Network (OSTI)

Image Analysis of Defocused Single-Molecule Images for Three-Dimensional Molecule Orientation applied to determine three- dimensional molecule orientations in defocused single-molecule images. The developed algorithm exploits the excellent agreement between electrodynamic calculations of single-molecule

Enderlein, Jörg