Powered by Deep Web Technologies
Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Image upload with broken thumbnail image | OpenEI Community  

Open Energy Info (EERE)

Image upload with broken thumbnail image Image upload with broken thumbnail image Home > Groups > Developer Rmckeel's picture Submitted by Rmckeel(297) Contributor 20 July, 2012 - 07:55 bug images wiki OpenEI users can upload images to the wiki by typing a new file name http://en.openei.org/wiki/File:My_new_file.jpg However, due to a caching timing issue, right after upload, the 120px-wide thumbnail has not yet been created by the time the fetier cache goes after it. Thus, the thumbnail appears broken. Is anyone up for debugging? For users uploading images, this can be fixed by forcing a reload of the page: Windows: ctrl + F5 Mac/Apple: Apple + R or command + R Linux: F5 Thanks! DIAGNOSTIC INFORMATION: BROKEN THUMBNAIL IMAGE HEADERS (RIGHT IMAGE, BUT CACHED BEFORE THUMBNAIL CREATED): Request URL:http://prod-http-80-800498448.us-east-1.elb.amazonaws.com/w/images/thumb/4/44/Powered_by_OpenEI_196x49_sc.png/120px-Powered_by_OpenEI_196x49_sc.png

2

How can an external application get access to OpenEI images and thumbnails?  

Open Energy Info (EERE)

How can an external application get access to OpenEI images and thumbnails? How can an external application get access to OpenEI images and thumbnails? Home > Groups > Developer I'm building an external application in Simile Exhibit. Through an Ask query (http://en.openei.org/wiki/Special:Ask), I can get the name of a file. But how do I present an image of that file? Submitted by Rmckeel on 18 October, 2012 - 07:04 1 answer Points: 0 If you know the name of the file and want the original uploaded size, try the built-in function http://en.openei.org/wiki/Special:FilePath. If you want a specific size, try http://en.openei.org/wiki/Special:FilepathThumbnail. For instance, you can have the app go here: http://en.openei.org/wiki/Special:FilepathThumbnail?file=NREL.png&max-width=200 which will produce the NREL logo image with a max width of 200 pixels.

3

bug | OpenEI Community  

Open Energy Info (EERE)

bug bug Home Rmckeel's picture Submitted by Rmckeel(297) Contributor 20 July, 2012 - 07:55 Image upload with broken thumbnail image bug images wiki OpenEI users can upload images to the wiki by typing a new file name http://en.openei.org/wiki/File:My_new_file.jpg However, due to a caching timing issue, right after upload, the 120px-wide thumbnail has not yet been created by the time the fetier cache goes after it. Thus, the thumbnail appears broken. Is anyone up for debugging? For users uploading images, this can be fixed by forcing a reload of the page: Rmckeel's picture Submitted by Rmckeel(297) Contributor 19 June, 2012 - 08:04 "Ghost" entries bug utility rate There is an issue that Illinois State University has come across. From Nick B: Syndicate content 429 Throttled (bot load)

4

thumbnails for windows  

Science Conference Proceedings (OSTI)

... 4) Cut and paste the above text window into some text editor, and save into the ... Then, in Windows, open the write folder and use 'View / thumbnails'.

5

OpenEI Community - bug  

Open Energy Info (EERE)

Image upload with broken thumbnail image http:en.openei.orgcommunitydiscussionimage-upload-broken-thumbnail-image

OpenEI users can upload images to the wiki by typing a new...

6

Water Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Bugs Bugs Nature Bulletin No. 221-A March 12, 1966 Forest Preserve District of Cook County Seymour Simon, President Roland F. Eisenbeis, Supt. of Conservation WATER BUGS It is fascinating to lie in a boat or on a log at the edge of the water and watch the drama that unfolds among the small water animals. Among the star performers in small streams and ponds are the Water Bugs. These are aquatic members of that large group of insects called the "true bugs", most of which live on land. Moreover, unlike many other types of water insects, they do not have gills but get their oxygen directly from the air. Those that do go beneath the surface usually carry an oxygen supply with them in the form of a shiny glistening sheath of air imprisoned among a covering of fine waterproof hairs. The common water insect known to small boys at the "Whirligig Bug" is not a water bug but a beetle.

7

Automatic thumbnail extraction for DVR based on production technique estimation  

Science Conference Proceedings (OSTI)

The automatic recording function of DVR is a powerful tool for users. However, increase of the stored content makes it difficult to access desired content. To solve this issue, this paper proposes a new method of providing suitable thumbnails of TV programs ... Keywords: DVR, STB, Object detection, Production technique estimation

T. Takahashi; M. Sugano; S. Sakazsawa

2010-05-01T23:59:59.000Z

8

OpenEI Community - images  

Open Energy Info (EERE)

Image upload with broken thumbnail image http:en.openei.orgcommunitydiscussionimage-upload-broken-thumbnail-image

OpenEI users can upload images to the wiki by typing a new...

9

Bug Wars: a competitive exercise to find bugs in code  

Science Conference Proceedings (OSTI)

Software bugs are a common problem that students encounter in any Computer Science program. "Bug Wars" is a fun and competitive class exercise for student teams to identify bugs in code. To prepare for the competition, the instructor provides several ...

Renee Bryce

2011-12-01T23:59:59.000Z

10

Massive June Bug Emergence  

NLE Websites -- All DOE Office Websites (Extended Search)

Massive June Bug Emergence Massive June Bug Emergence Name: Cordell Location: N/A Country: N/A Date: N/A Question: We are infested with june bugs next to the street light near the end of my driveway. They have burrowed into the ground and underneath my driveway. Yesterday we shoveled 2/3 of a 33-gallon trash bag of just bugs. What can we spray or do to kill these june bugs? Replies: Not knowing which part of the country you are from and I could be wrong because of this fact buy this does not sound like June Bugs. This has to be a Circadia outbreak which are relatives to the June Bug. They run in 13, 17 or other year cycles and this depends upon the part of the country you are from. Ask a local garden center or naturalist and you'll probably see that this won't happen again for a number of years to come.

11

Trendy Bugs Topic Trends in the Android Bug Reports  

E-Print Network (OSTI)

Trendy Bugs Topic Trends in the Android Bug Reports Lee Martie, Vijay Krishna Palepu, Hitesh {lmartie, vpalepu, hsajnani, lopes}@ics.uci.edu Abstract--Studying vast volumes of bug and issue public issue tracker. This informs us of the features or parts of the project that are more problematic

Jones, James A.

12

Mining succinct predicated bug signatures  

Science Conference Proceedings (OSTI)

A bug signature is a set of program elements highlighting the cause or effect of a bug, and provides contextual information for debugging. In order to mine a signature for a buggy program, two sets of execution profiles of the program, one capturing ... Keywords: bug signature, feature selection, statistical debugging

Chengnian Sun; Siau-Cheng Khoo

2013-08-01T23:59:59.000Z

13

Efficient concurrency-bug detection across inputs  

Science Conference Proceedings (OSTI)

In the multi-core era, it is critical to efficiently test multi-threaded software and expose concurrency bugs before software release. Previous work has made significant progress in detecting and validating concurrency bugs under a given input. Unfortunately, ... Keywords: bug detection, concurrency bugs, multi-threaded software, software testing

Dongdong Deng, Wei Zhang, Shan Lu

2013-10-01T23:59:59.000Z

14

NIST Image Gallery: Browse: Results  

Science Conference Proceedings (OSTI)

... Browsing by topic/category -- Energy--Fuel Cells, ... Thumbnail, New Imaging Tool is Boon to Fuel Cell Research, created 8/15/2006, entered 8/15 ...

15

Team Bug Bag Biogas For Nicaragua  

E-Print Network (OSTI)

Team Bug Bag Biogas For Nicaragua Project Recap The task for Team Bug Bag was to create for under $100 (USD), and be able to produce biogas that could boil water for a thirty minute time period

Demirel, Melik C.

16

Scale Insects and Mealy Bugs  

NLE Websites -- All DOE Office Websites (Extended Search)

Scale Insects and Mealy Bugs Scale Insects and Mealy Bugs Nature Bulletin No. 404-A January 30, 1971 Forest Preserve District of Cook County George W. Dunne, President Roland F. Eisenbeis, Supt. of Conservation SCALE INSECTS AND MEALY BUGS The insect world contains an enormous number and variety of species but, of them all, the Scale Insects and Mealy Bugs come nearest to being vegetables. Most insects are active animals that fly, hop, scamper, crawl or burrow, but these queer creatures spend most of their lives merely sitting in one spot, sucking plant juices from a branch, twig, leaf, or fruit. Some of our most destructive pests are included among the several hundred kinds of these highly specialized insects. They are so small that the average person seldom realizes that they are responsible for the sickly or dying condition of a tree or shrub. Adult scale insects are extremely variable in shape, and range in size from that of a pinhead up to forms which are a quarter of an inch long. Each hides under a hard protective shell, or scale, of wax secreted by pores on its body, and are frequently so numerous that they form a dense crust. The females molt a few times, and usually discard their legs and wings, before they mature. She lays eggs under the scale and then dies. These hatch into young (called "crawlers") which move around for a period varying from a few hours to a day or two before they settle down and build scales. Unlike the female, the male -always the smaller of the two -- goes through a cocoon stage from which he emerges with a pair of wings but with no means of taking food. He merely mates and dies. Males are scarce In most kinds and in many species have never been seen.

17

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

18

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially...

19

Finding and understanding bugs in C compilers  

Science Conference Proceedings (OSTI)

Compilers should be correct. To improve the quality of C compilers, we created Csmith, a randomized test-case generation tool, and spent three years using it to find compiler bugs. During this period we reported more than 325 previously unknown bugs ... Keywords: automated testing, compiler defect, compiler testing, random program generation, random testing

Xuejun Yang; Yang Chen; Eric Eide; John Regehr

2011-06-01T23:59:59.000Z

20

NIST Image Gallery: Home  

Science Conference Proceedings (OSTI)

... thumbnail, Deborah Jin, created 2012. thumbnail, Energy; Solar; Roof Photovoltaic Test Facility , created 6/22/2006. thumbnail, ...

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Dynamically fighting bugs : prevention, detection and elimination  

E-Print Network (OSTI)

This dissertation presents three test-generation techniques that are used to improve software quality. Each of our techniques targets bugs that are found by different stake-holders: developers, testers, and maintainers. ...

Artzi, Shay

2009-01-01T23:59:59.000Z

22

U-153: EMC Data Protection Advisor Server and Collector Bugs...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service...

23

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis...

24

Mining Bug Databases for Unidentified Software Vulnerabilities  

SciTech Connect

Identifying software vulnerabilities is becoming more important as critical and sensitive systems increasingly rely on complex software systems. It has been suggested in previous work that some bugs are only identified as vulnerabilities long after the bug has been made public. These vulnerabilities are known as hidden impact vulnerabilities. This paper discusses the feasibility and necessity to mine common publicly available bug databases for vulnerabilities that are yet to be identified. We present bug database analysis of two well known and frequently used software packages, namely Linux kernel and MySQL. It is shown that for both Linux and MySQL, a significant portion of vulnerabilities that were discovered for the time period from January 2006 to April 2011 were hidden impact vulnerabilities. It is also shown that the percentage of hidden impact vulnerabilities has increased in the last two years, for both software packages. We then propose an improved hidden impact vulnerability identification methodology based on text mining bug databases, and conclude by discussing a few potential problems faced by such a classifier.

Dumidu Wijayasekara; Milos Manic; Jason Wright; Miles McQueen

2012-06-01T23:59:59.000Z

25

NIST Image Gallery: Browse: Results  

Science Conference Proceedings (OSTI)

... 2009. Thumbnail, Scanning tunneling microscope; Semiconductor; Spintronics, created 2009, entered 12/1/2009. Thumbnail, ...

26

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information...

27

An approach to detecting duplicate bug reports using natural language and execution information  

Science Conference Proceedings (OSTI)

An open source project typically maintains an open bug repository so that bug reports from all over the world can be gathered. When a new bug report is submitted to the repository, a person, called a triager, examines whether it is a duplicate of an ... Keywords: duplicate bug report, execution information, information retrieval

Xiaoyin Wang; Lu Zhang; Tao Xie; John Anvik; Jiasu Sun

2008-05-01T23:59:59.000Z

28

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

29

U-141: Sourcefire Defense Center Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Sourcefire Defense Center Bugs 1: Sourcefire Defense Center Bugs U-141: Sourcefire Defense Center Bugs April 5, 2012 - 8:30am Addthis PROBLEM: Sourcefire Defense Center Bugs Let Remote Users Traverse the Directory, Access the Database, and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 4.10.2.3 ABSTRACT: Several vulnerabilities were reported in Sourcefire Defense Center. A remote user can conduct cross-site scripting attacks. A remote user can access the database. A remote user can view files on the target system reference LINKS: Original Advisory Security Tracker ID 1026890 Secunia Advisory 48667 IMPACT ASSESSMENT: Medium Discussion: A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the Sourcefire Defense

30

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site...

31

V-016: HP Performance Insight Bugs with Sybase Database Let Remote...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let...

32

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let...

33

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am...

34

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site...

35

U-092: Sudo Format String Bug Lets Local Users Gain Elevated...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis...

36

Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final...  

NLE Websites -- All DOE Office Websites (Extended Search)

April 15, 2010 DOENETL-20101406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This...

37

NIST Image Gallery: Browse: Results  

Science Conference Proceedings (OSTI)

... 2007. Thumbnail, Nanoscale Blasting Adjusts Resistance in Magnetic Sensors, created 8/16/2007, entered 8/16/2007. Thumbnail, ...

38

NIST Image Gallery: Browse: Results  

Science Conference Proceedings (OSTI)

... » Hide Thumbnails. Thumbnail, Environment; Waste Processing; Drugs in Wastewater; Bedner, created 9/28/2004, entered 11/2/2004. ...

39

Bed bugs are blood-sucking insects in the family Cimicidae. Both nymphs  

E-Print Network (OSTI)

- trol this pest. IDENTIFICATION AND LIFE CYCLE Adult bed bugs (Figure 1) are oval, wing- less, about 1/5 inch long, and rusty red or mahogany. Their bodies are flattened, they have well-developed antennae, conenose bugs (also known as kissing bugs), by their smaller size, more rounded shape, and lack of wings

Hammock, Bruce D.

40

ConAir: featherweight concurrency bug recovery via single-threaded idempotent execution  

Science Conference Proceedings (OSTI)

Many concurrency bugs are hidden in deployed software and cause severe failures for end-users. When they finally manifest and become known by developers, they are difficult to fix correctly. To support end-users, we need techniques that ... Keywords: bug fixing, concurrency bugs, failure recovery, idempotency, static analysis

Wei Zhang; Marc de Kruijf; Ang Li; Shan Lu; Karthikeyan Sankaralingam

2013-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Microsoft Word - Final BUGS article final.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

October 18, 2010 DOE/NETL-2010/1435 BUGS: The Next Smart Grid Peak Resource? BUGS: The Next Smart Grid Peak Resource? 2 Prepared by: Booz Allen Hamilton (BAH) Steve Pullins Horizon Energy Group DOE Contract number: DE-FE000400 BUGS: The Next Smart Grid Peak Resource? 3 Acknowledgements This report was prepared by Booz Allen Hamilton, Inc. (BAH) for the United States Department of Energy's National Energy Technology Laboratory. This work was completed under DOE NETL Contract Number DE-FE000400, and performed under BAH Task 430.04. The authors wish to acknowledge the excellent guidance, contributions, and cooperation of the NETL staff, particularly: Steven Bossart, Integrated Electric Power Systems Division Director Keith Dodrill, Integrated Electric Power Systems Division NETL Technical Monitor

42

Brown Marmorated The brown marmorated stink bug (BMSB), Halyomorpha  

E-Print Network (OSTI)

abdominal edge extending beyond wings MATURE NYMPH Banded antennae Spines in front of eyes and on shoulder edges Banded legs Dark bands on wing tips Blue-green metallic depressions on head and shoulder,UC JACKKELLYCLARK,UC RED SHOULDERED STINK BUG Edgeofabdomenconcealed;antennal bands, if present, are not white; less

Ishida, Yuko

43

Is this a bug or an obsolete test?  

Science Conference Proceedings (OSTI)

In software evolution, developers typically need to identify whether the failure of a test is due to a bug in the source code under test or the obsoleteness of the test code when they execute a test suite. Only after finding the cause of a failure can ...

Dan Hao, Tian Lan, Hongyu Zhang, Chao Guo, Lu Zhang

2013-07-01T23:59:59.000Z

44

T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site 68: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code March 2, 2011 - 3:05pm Addthis PROBLEM: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code. PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code. reference LINKS:

45

OpenEI/URDB Bug? | OpenEI Community  

Open Energy Info (EERE)

OpenEI/URDB Bug? OpenEI/URDB Bug? Home > Groups > Utility Rate Clarknd's picture Submitted by Clarknd(20) Member 26 November, 2012 - 07:39 I ran into a problem today on the Utility Rate Database (URDB). Every time I select the "Assume net metering (buy = sell)" box and go to save the page for some reason it doesn't save that change and reverts back to "No" rather than "Yes". Groups: Utility Rate Login to post comments Latest discussions Rmckeel New page curation tool Posted: 7 May 2013 - 08:16 by Rmckeel Rmckeel Considering removing "Show Preview" button on utility rate form edit Posted: 22 Apr 2013 - 13:55 by Rmckeel 5 comment(s) 1 of 10 ›› Groups Menu You must login in order to post into this group. Latest discussion comments NickL

46

Metabolic engineering of microorganisms for biofuels production: from bugs to synthetic biology to fuels  

E-Print Network (OSTI)

DK, Weiss R: Synthetic biology: new engineering rules for anfrom bugs to synthetic biology to fuels Sung Kuk Lee, Howardengineering and synthetic biology will provide new tools for

Kuk Lee, Sung

2010-01-01T23:59:59.000Z

47

DON'T LET THE BED BUGS BITE We've all heard the saying, "sleep tight, don't let the bed bugs bite." Most of us have never  

E-Print Network (OSTI)

and appear bright red after feeding. The wings of bed bugs are vestigial, so they cannot fly. Bed bugs can. Small, flat, or raised bumps on the skin are the most common sign; redness, swelling, and itching

Bertini, Robert L.

48

Browsing and Placement of Multiresolution Images on Secondary Storage  

E-Print Network (OSTI)

With the rapid advances in computer and communication technologies, there is an increasing demand to build and maintain large image repositories. In order to reduce the demands on I/O and network resources, multiresolution representations of images are being proposed for the storage organization of images. Image decomposition techniques such as wavelets can be used to provide multiple resolution images. The image is represented by several coefficients, one of them with visual similarity to the original image but at a lower resolution. Thus, these visually similar coefficients can be thought of as the thumbnails or icons of the original image. This paper addresses the problem of storing these multiresolution coefficients on disk(s) so that thumbnail browsing as well as image reconstruction can be performed efficiently. Several strategies are evaluated to store the image coefficients on parallel disks. These strategies can be classified into two broad classes depending on whether the bro...

Sunil Prabhakar; Divyakant Agrawal; Amr El Abbadi; Ambuj Singh; Terence R. Smith

1996-01-01T23:59:59.000Z

49

WuKong: automatically detecting and localizing bugs that manifest at large system scales  

Science Conference Proceedings (OSTI)

A key challenge in developing large scale applications is finding bugs that are latent at the small scales of testing, but manifest themselves when the application is deployed at a large scale. Here, we ascribe a dual meaning to "large scale"---it could ... Keywords: feature reconstruction, program behavior prediction, scale-dependent bug

Bowen Zhou; Jonathan Too; Milind Kulkarni; Saurabh Bagchi

2013-06-01T23:59:59.000Z

50

Catch me if you can: performance bug detection in the wild  

Science Conference Proceedings (OSTI)

Profilers help developers to find and fix performance problems. But do they find performance bugs -- performance problems that real users actually notice? In this paper we argue that -- especially in the case of interactive applications -- traditional ... Keywords: latency bug, perceptible performance, profiling

Milan Jovic; Andrea Adamoli; Matthias Hauswirth

2011-10-01T23:59:59.000Z

51

T-700:Red Hat: kernel security, bug fix, and enhancement update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

700:Red Hat: kernel security, bug fix, and enhancement update 700:Red Hat: kernel security, bug fix, and enhancement update T-700:Red Hat: kernel security, bug fix, and enhancement update August 24, 2011 - 3:45pm Addthis PROBLEM: Updated kernel packages that fix several security issues, various bugs, and add two enhancements are now available for Red Hat Enterprise Linux 6. PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server EUS (v. 6.1.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Red Hat: kernel security, bug fix, and enhancement update. reference LINKS: RHSA-2011: 1189-1 Secunia Advisory: SA45746 Red Hat Download CVE-2011-1182 , CVE-2011-1576 CVE-2011-1593 , CVE-2011-1776 CVE-2011-1898 , CVE-2011-2183

52

V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache Tomcat Bug Lets Remote Users Bypass Security 0: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints V-040: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints December 5, 2012 - 1:00am Addthis PROBLEM: Apache Tomcat Bug Lets Remote Users Bypass Security Constraints PLATFORM: Version(s): 6.0.0 - 6.0.35, 7.0.0 - 7.0.29 ABSTRACT: A vulnerability was reported in Apache Tomcat. REFERENCE LINKS: Apache Tomcat Red Hat Bugzilla - Bug 883634 SecurityTracker Alert ID: 1027833 CVE-2012-3546 IMPACT ASSESSMENT: High DISCUSSION: When using FORM authentication it was possible to bypass the security constraint checks in the FORM authenticator by appending /j_security_check to the end of the URL if some other component (such as the Single-Sign-On valve) had called request.setUserPrincipal() before the call to

53

U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: RSA Key Manager Appliance Session Logout Bug Fails to 7: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions U-027: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions November 4, 2011 - 8:00am Addthis PROBLEM: RSA Key Manager Appliance Session Logout Bug Fails to Terminate Sessions. PLATFORM: RSA Key Manager Appliance 2.7 Service Pack 1 ABSTRACT: A remote authenticated user session may not terminate properly. reference LINKS: SecurityTracker Alert ID: 1026276 SecurityFocus Bug Traq Seclists: ESA-2011-035 CVE-2011-2740 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in RSA Key Manager Appliance. A remote authenticated user session may not terminate properly. When using Firefox 4 and 5, an authenticated user session is not terminated properly when logging out.

54

V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Linux Kernel Extended Verification Module Bug Lets Local 8: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service V-098: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service February 25, 2013 - 12:12am Addthis PROBLEM: Linux Kernel Extended Verification Module Bug Lets Local Users Deny Service PLATFORM: The Linux Kernel prior to 3.7.5 ABSTRACT: A vulnerability was reported in the Linux Kernel. REFERENCE LINKS: The Linux Kernel Archives Linux Kernel Red Hat Bugzilla - Bug 913266 SecurityTracker Alert ID: 1028196 CVE-2013-0313 IMPACT ASSESSMENT: Medium DISCUSSION: A local user can exploit a null pointer dereference in the evm_update_evmxattr() function in 'security/integrity/evm/evm_crypto.c' to cause the target system to crash. IMPACT: A local user can cause denial of service conditions.

55

U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated 8:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges U-068:Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges December 23, 2011 - 8:45am Addthis PROBLEM: Linux Kernel SG_IO ioctl Bug Lets Local Users Gain Elevated Privileges PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Server AUS (v. 6.2) Red Hat Enterprise Linux Server EUS (v. 6.2.z) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: A local privileged user on the guest operating system can obtain elevated privileges on the target system. reference LINKS: Red Hat kernel security and bug fix update SecurityTracker Alert ID: 1026453 SecurityTracker Alert ID: 1026454

56

History Images  

NLE Websites -- All DOE Office Websites (Extended Search)

History Images History Images Los Alamos History in Images Los Alamos has a proud history and heritage of almost 70 years of science and innovation. The people of the Laboratory work on advanced technologies to provide the best scientific and engineering solutions to many of the nation's most crucial security challenges. Click thumbnails to enlarge. Photos arranged by most recent first, horizontal formats before vertical. See Flickr for more sizes and details. Back in the day Back in the day LA bridge in Los Alamos LA bridge in Los Alamos 1945 Army-Navy "E" Award 1945 Army-Navy "E" Award Louis Rosen Louis Rosen Bob Van Ness Robert Kuckuck and Michael Anastasio Bob Van Ness Robert Kuckuck and Michael Anastasio TA-18 TA-18 Elmer Island TU-4 assembly area Elmer Island TU-4 assembly area

57

NIST Image Gallery: Browse: Results  

Science Conference Proceedings (OSTI)

... entered 2/19/2008. Thumbnail, Algae Toxin; Pfiesteria, created 1/19/2007, entered 1/23/2007. Thumbnail, Prozac Exposure ...

58

NIST Image Gallery: Browse: Results  

Science Conference Proceedings (OSTI)

... » Hide Thumbnails. Thumbnail, Energy; Fossil Fuels;Distillation Curves for Complex Fuel Mixtures, created 5/25/2006, entered 5/30/2006. ...

59

NIST Image Gallery: Browse: Results  

Science Conference Proceedings (OSTI)

... Thumbnail, Nanoparticles; Microscope Design, created 3/2008, entered 3/7 ... Thumbnail, 3-D Nanostructures, creation date unknown, entered 6/24 ...

60

NIST Image Gallery: Browse: Results  

Science Conference Proceedings (OSTI)

... Thumbnail, Honeycomb-based Nanostructure, created 2012 ... Thumbnail, Nanoparticles, created 2010, entered 5/25 ... is Boon to Fuel Cell Research ...

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

NIST Image Gallery: Browse: Results  

Science Conference Proceedings (OSTI)

... 9/8/2009. Thumbnail, Energy; Biofuels; Distillation curve, created 12/2008, entered 1/13/2009. Thumbnail, Energy; Fossil ...

62

NIST Image Gallery: Browse: Results  

Science Conference Proceedings (OSTI)

... 2009. Thumbnail, High-Rise Fire Test; Positive Pressure Ventilation Fans, created 3/2008, entered 3/18/2008. Thumbnail, ...

63

NIST Image Gallery: Browse: Results  

Science Conference Proceedings (OSTI)

... Thumbnail, Improved Ion Mobility is Key to New Hydrogen ... Thumbnail, Scanning Electron Microscope with Spin Polarization Analysis, created 1/2005 ...

64

U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service 10: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service U-210: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service July 11, 2012 - 7:00am Addthis PROBLEM: Linux Kernel epoll_ctl() Bug Lets Local Users Deny Service PLATFORM: Version(s): 2.6.x ABSTRACT: A vulnerability was reported in the Linux Kernel. A local user can cause denial of service conditions. reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027237 SecurityTracker Alert ID: 1027240 Red Hat advisory CVE-2012-3375 IMPACT ASSESSMENT: Medium Discussion: The Linux kernel's Event Poll (epoll) subsystem does not properly handle resource clean up when an ELOOP error code is returned. A local user can exploit this to cause the target system to crash. Impact: A local user can cause the target system to crash.

65

U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets 08: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service U-008: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service October 11, 2011 - 8:00am Addthis PROBLEM: Symantec Data Loss Prevention Bugs in KeyView Filter Lets Remote Users Deny Service PLATFORM: Symantec Data Loss Prevention Enforce/Detection Servers for Windows 10.x, 11.x ABSTRACT: A remote user can create a file that, when processed by the target filter, will cause partial denial of service conditions. reference LINKS: Symantec Security Advisory SYM11-013 SecurityTracker Alert ID: 1026157 IMPACT ASSESSMENT: Medium Discussion: Multiple vulnerabilities were reported in Symantec Data Loss Prevention. A remote user can cause denial of service conditions on the target system.A

66

U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Certificate System Bugs Let Remote Users Conduct 7: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks July 20, 2012 - 7:00am Addthis PROBLEM: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks PLATFORM: Red Hat Certificate System v8 ABSTRACT: Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate. reference LINKS: Advisory: RHSA-2012:1103-1 SecurityTracker Alert ID: 1027284 CVE-2012-2662 CVE-2012-3367 IMPACT ASSESSMENT: Medium Discussion: The Agent and End Entity pages do not properly filter HTML code from

67

U-168: EMC Documentum Information Rights Management Server Bugs Let Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

168: EMC Documentum Information Rights Management Server Bugs Let 168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service May 14, 2012 - 7:00am Addthis PROBLEM: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service PLATFORM: Information Rights Management Server 4.x, 5.x ABSTRACT: Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions. Reference links: SecurityTracker Alert ID: 1027058 CVE-2012-2276 CVE-2012-2277 IMPACT ASSESSMENT: High Discussion: A remote authenticated user can send specially crafted data to trigger a NULL pointer dereference and cause the target service to crash. A remote

68

U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: JBoss Operations Network LDAP Authentication Bug Lets Remote 0: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication March 21, 2012 - 7:00am Addthis PROBLEM: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication PLATFORM: JBoss Operations Network 2.x ABSTRACT: A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases. reference LINKS: SecurityTracker Alert ID: 1026826 Secunia Advisory SA48471 CVE-2012-1100 IMPACT ASSESSMENT: Medium Discussion: The vulnerability is caused due to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based

69

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 10: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

70

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary 4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users January 4, 2012 - 8:00am Addthis PROBLEM: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users . PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows Server 2003 with SP2 for Itanium-based Systems Windows Vista Service Pack 2 Windows Vista x64 Edition Service Pack 2 Windows Server 2008 for 32-bit Systems Service Pack 2 Windows Server 2008 for x64-based Systems Service Pack 2

71

U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain 9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication May 1, 2012 - 7:00am Addthis PROBLEM: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 6) ABSTRACT: A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration. reference LINKS: SecurityTracker Alert ID: 1026990 CVE-2011-3620 Red Hat advisory IMPACT ASSESSMENT: High Discussion: Qpid may accept arbitrary passwords and SASL mechanims. A remote user on the local private interconnect network with knowledge of a valid cluster

72

V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Performance Insight Bugs with Sybase Database Let Remote 6: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System V-016: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System November 5, 2012 - 6:00am Addthis PROBLEM: HP Performance Insight Bugs with Sybase Database Let Remote Users Deny Service and Take Full Control of the Target System PLATFORM: HP Performance Insight v5.31, v5.40 and v5.41 running on HP-UX, Solaris, Linux, and Windows and using Sybase as the database ABSTRACT: Two vulnerabilities were reported in HP Performance Insight. REFERENCE LINKS: HP Support Document ID: c03555488 SecurityTracker Alert ID: 1027719 CVE-2012-3269 CVE-2012-3270 IMPACT ASSESSMENT: High DISCUSSION:

73

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 57: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

74

V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: HP Service Manager Bugs Permit Cross-Site Scripting and 6: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks V-146: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks May 1, 2013 - 12:43am Addthis PROBLEM: HP Service Manager Bugs Permit Cross-Site Scripting and Information Disclosure Attacks PLATFORM: Service Manager v9.31 Web Tier ABSTRACT: Two vulnerabilities were reported in HP Service Manager REFERENCE LINKS: HP Document ID: c03748875 SecurityTracker Alert ID: 1028496 CVE-2012-5222 CVE-2013-2321 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can obtain potentially sensitive information [CVE-2012-5222]. Service Manager Web Tier does not properly filter HTML code from user-supplied input before displaying the input [CVE-2013-2321]. A remote

75

U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 79: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code January 11, 2012 - 8:00am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Acrobat/Reader Version(s): 9.x prior to 9.5, 10.x prior to 10.1.2 ABSTRACT: A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026496 Adobe Security Bulletin APSB12-01 CVE-2011-2462, CVE-2011-4369, CVE-2011-4370, CVE-2011-4371, CVE-2011-4372, CVE-2011-4373. IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Adobe Acrobat/Reader. A remote

76

U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 21: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-121: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information March 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Apple iOS Version(s): prior to 5.1 ABSTRACT: Multiple vulnerabilities were reported in Apple iOS. reference LINKS: SecurityTracker Alert ID: 1026774 Apple Security Updates About the security content of iOS 5.1 Software Update CVE-2012-0641, CVE-2012-0642, CVE-2012-0643, CVE-2011-3453, CVE-2012-0644,

77

U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote 3: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges August 13, 2012 - 7:00am Addthis PROBLEM: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges PLATFORM: Oracle Database Server versions 10.2.0.3, 10.2.0.4, 10.2.0.5, 11.1.0.7, 11.2.0.2, 11.2.0.3 ABSTRACT: A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system. Reference LINKS: Oracle Security Alert Oracle Security Alert - CVE-2012-3132 Risk Matrices SecurityTracker Alert ID: 1027367 CVE-2012-3132 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Oracle Database. This vulnerability is not

78

U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Small Business SRP500 Series Bug Lets Remote Users 6: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands November 3, 2011 - 8:15am Addthis PROBLEM: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands. PLATFORM: The following models are affected when running firmware prior to version 1.1.24: Cisco SRP521W Cisco SRP526W Cisco SRP527W The following models are affected when running firmware prior to version 1.2.1: Cisco SRP541W Cisco SRP546W Cisco SRP547W ABSTRACT: A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system. reference LINKS: Advisory ID: cisco-sa-20111102-srp500 SecurityTracker Alert ID: 1026266

79

U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: WebCalendar Access Control and File Inclusion Bugs Let 5: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code U-155: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code April 25, 2012 - 7:00am Addthis PROBLEM: WebCalendar Access Control and File Inclusion Bugs Let Remote Users Potentially Execute Arbitrary Code PLATFORM: 1.2.4 and prior versions ABSTRACT: Two vulnerabilities were reported in WebCalendar. A remote user may be able to execute arbitrary PHP code on the target system. reference links: SecurityTracker Alert ID: 1026966 CVE-2012-1495 CVE-2012-1496 IMPACT ASSESSMENT: Medium Discussion: A remote user can access '/install/index.php' to potentially modify '/includes/settings/' with arbitrary values or PHP code. A remote

80

T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information,  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain 3:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code September 22, 2011 - 8:00am Addthis PROBLEM: Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code. PLATFORM: Adobe Flash Player 10.3.183.7 and earlier versions for Windows, Macintosh, Linux and Solaris. Adobe Flash Player 10.3.186.6 and earlier versions for Android. ABSTRACT: An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website. reference LINKS: Adobe Security Bulletin

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

V-037: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Wireshark Multiple Bugs Let Remote Users Deny Service 7: Wireshark Multiple Bugs Let Remote Users Deny Service V-037: Wireshark Multiple Bugs Let Remote Users Deny Service November 30, 2012 - 3:30am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Version(s): prior to 1.6.12, 1.8.4 ABSTRACT: Several vulnerabilities were reported in Wireshark. REFERENCE LINKS: Wireshark Security Advisories Secunia Advisory SA51422 Seclists SecurityTracker Alert ID: 1027822 CVE-2012-5592 CVE-2012-5593 CVE-2012-5594 CVE-2012-5595 CVE-2012-5596 CVE-2012-5597 CVE-2012-5598 CVE-2012-5599 CVE-2012-5600 CVE-2012-5601 CVE-2012-5602 IMPACT ASSESSMENT: Medium DISCUSSION: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. A user can obtain potentially sensitive information.

82

U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: PHP Command Parameter Bug Lets Remote Users Obtain 3: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code May 7, 2012 - 7:00am Addthis PROBLEM: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code PLATFORM: Prior to 5.3.12 and 5.4.2 ABSTRACT: A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1027022 CVE-2012-1823 CVE-2012-2311 IMPACT ASSESSMENT: High Discussion: A remote user can submit a specially crafted request containing a command

83

V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 1: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks June 5, 2013 - 1:05am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Apple Safari prior to 6.0.5 ABSTRACT: Several vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple Article: HT5785 SecurityTracker Alert ID: 1028627 CVE-2013-0926 CVE-2013-1009 CVE-2013-1012 CVE-2013-1013 CVE-2013-1023 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary

84

U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

76: OpenSSL Bugs Let Remote Users Deny Service, Obtain 76: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code U-076: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code January 6, 2012 - 8:15am Addthis PROBLEM: OpenSSL Bugs Let Remote Users Deny Service, Obtain Information, and Potentially Execute Arbitrary Code PLATFORM: OpenSSL prior to 0.9.8s; 1.x prior to 1.0.0f ABSTRACT: A remote user may be able to execute arbitrary code on the target system. reference LINKS: SecurityTracker Alert ID: 1026485 OpenSSL Security Advisory IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in OpenSSL. A remote user can cause denial of service conditions. A remote user can obtain sensitive information. A remote user may be able to execute arbitrary code on the

85

V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Cisco ASA Multiple Bugs Let Remote Users Deny Service 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected versions of Cisco ASA Software will vary depending on the specific vulnerability. ABSTRACT: Several vulnerabilities were reported in Cisco ASA. REFERENCE LINKS: Cisco Security Advisory Secunia Advisory SA52989 SecurityTracker Alert ID: 1028415 CVE-2013-1149 CVE-2013-1150 CVE-2013-1151 CVE-2013-1152

86

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

87

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Citrix XenApp and Citrix Presentation Server Bug 9: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

88

U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10, 9.0.2, 9.0.1, 9.0, 8.0.1, and 8.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe ColdFusion is prone to a remote denial-of-service vulnerability. reference LINKS: Adobe Security bulletins and advisories Adobe Vulnerability identifier: APSB12-21 SecurityTracker Alert ID: 1027516 Bugtraq ID: 55499 CVE-2012-2048 IMPACT ASSESSMENT: Medium Discussion: Adobe has released a security hotfix for ColdFusion 10 and earlier versions for Windows, Macintosh and UNIX. This update resolves a vulnerability which

89

T-667: Red Hat Enterprise Linux kernel security and bug fix update |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Red Hat Enterprise Linux kernel security and bug fix update 7: Red Hat Enterprise Linux kernel security and bug fix update T-667: Red Hat Enterprise Linux kernel security and bug fix update July 13, 2011 - 7:24am Addthis PROBLEM: Red Hat Enterprise Linux kernel security and bug fix update PLATFORM: Vulnerable Linux Kernels; Red Hat Enterprise Linux Desktop (v. 6), Red Hat Enterprise Linux HPC Node (v. 6), Red Hat Enterprise Linux Server (v. 6), Red Hat Enterprise Linux Server EUS (v. 6.1.z), Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: It was found that the receive hook in the ipip_init() function in the ipip module, and in the ipgre_init() function in the ip_gre module, could be called before network namespaces setup is complete. If packets were received at the time the ipip or ip_gre module was still being loaded into

90

U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

075: Apache Struts Bug Lets Remote Users Overwrite Files and 075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code U-075: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code January 5, 2012 - 8:15am Addthis PROBLEM: Apache Struts Bug Lets Remote Users Overwrite Files and Execute Arbitrary Code PLATFORM: Version(s): 2.1.0 - 2.3.1 ABSTRACT: A remote user can execute arbitrary Java code on the target system. reference LINKS: SecurityTracker Alert ID: 1026484 Secunia Advisory SA47393 Bugtraq ID: 51257 Apache Struts 2 Documentation S2-008 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache Struts. A remote user can execute arbitrary Java code on the target system. A remote user can overwrite arbitrary files on the target system. A remote user can send specially

91

V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny 30: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service V-030: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service November 21, 2012 - 3:00am Addthis PROBLEM: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service PLATFORM: ColdFusion 10 Update 1 and above for Windows ABSTRACT: Adobe ColdFusion Denial of Service Vulnerability REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-25 SecurityTracker Alert ID: 1027787 Secunia Advisory SA51335 CVE-2012-5674 IMPACT ASSESSMENT: High DISCUSSION: A vulnerability was reported in Adobe ColdFusion. A remote user can cause denial of service conditions. A remote user can send specially crafted data to cause unspecified denial of service conditions on the target ColdFusion service on Windows Internet

92

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

93

U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service  

NLE Websites -- All DOE Office Websites (Extended Search)

5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny 5: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service U-045: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny Service November 25, 2011 - 9:00am Addthis PROBLEM: A vulnerability was reported in the Windows Kernel. A local user can cause denial of service conditions. PLATFORM: Windows Win32k.sys ABSTRACT: Windows Win32k.sys Keyboard Layout Bug Lets Local Users Deny reference LINKS: SecurityTracker Alert ID: 1026347 Secunia ID: SA46919 IMPACT ASSESSMENT: Low Discussion: A vulnerability has been discovered in Microsoft Windows, which can be exploited by malicious, local users to cause a DoS (Denial of Service). The vulnerability is caused due to an indexing error in the win32k.sys driver when loading a keyboard layout file. This can be exploited to access

94

V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary 1: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code V-091: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code February 14, 2013 - 12:22am Addthis PROBLEM: Adobe Acrobat/Reader Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Adobe Reader XI (11.0.01 and earlier) for Windows and Macintosh Adobe Reader X (10.1.5 and earlier) for Windows and Macintosh Adobe Reader 9.5.3 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat XI (11.0.01 and earlier) for Windows and Macintosh Adobe Acrobat X (10.1.5 and earlier) for Windows and Macintosh Adobe Acrobat 9.5.3 and earlier 9.x versions for Windows and Macintosh ABSTRACT: Adobe has identified critical vulnerabilities in Adobe Reader and Acrobat REFERENCE LINKS: Adobe Reader and Acrobat Vulnerability Report

95

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

96

T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Red Hat Directory Server Bugs Let Local Users Gain Elevated 3: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service T-563: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service February 23, 2011 - 7:00am Addthis PROBLEM: Red Hat Directory Server Bugs Let Local Users Gain Elevated Privileges and Remote and Local Users Deny Service. PLATFORM: Red Hat Directory Server v8 EL4, Red Hat Directory Server v8 EL5 ABSTRACT: Several vulnerabilities were reported in Red Hat Directory Server. A local user can obtain elevated privileges on the target system. A remote user can cause denial of service conditions. A local user can cause denial of service conditions. A remote user can send multiple simple paged search requests to cause the

97

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

98

U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53: Linux kexec Bugs Let Local and Remote Users Obtain 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat Enterprise Linux Workstation (v. 6) ABSTRACT: Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information. reference LINKS: Red Hat Security Advisory: RHSA-2011:1532-3 SecurityTracker Alert ID: 1026375 IMPACT ASSESSMENT: Medium Discussion: Kdump uses the SSH "StrictHostKeyChecking=no" option when dumping to SSH

99

U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary 208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code July 10, 2012 - 7:00am Addthis PROBLEM: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows prior to v11.03.12. ABSTRACT: Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027225 CVE-2012-2019 CVE-2012-2020 IMPACT ASSESSMENT: High Discussion: Potential security vulnerabilities have been identified with HP Operations Agent for AIX, HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in the execution of arbitrary code.

100

V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting 6: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA Data Protection Manager Appliance versions 2.7.x and 3.x ABSTRACT: Two vulnerabilities were reported in RSA Data Protection Manager. REFERENCE LINKS: SecurityTracker Alert ID: 1027781 EMC Identifier: ESA-2012-055 RSA Worldwide Customer Support CVE-2012-4612 CVE-2012-4613 IMPACT ASSESSMENT: Medium DISCUSSION: Two vulnerabilities were reported in RSA Data Protection Manager. A remote

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny 72:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service U-072:Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service December 30, 2011 - 9:15am Addthis PROBLEM: Apache Tomcat Hash Table Collision Bug Lets Remote Users Deny Service PLATFORM: apache Tomcat 5.5.34, 6.0.34, 7.0.22; and prior versions aBSTRACT: A remote user can cause performance to degrade on the target server. reference LINKS: Apache Tomcat Security Alert SecurityTracker Alert ID: 1026477 nruns Advisory SA-2011.004 Secunia Advisory SA47411 CVE-2011-4084 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can cause denial of service conditions. A remote user can send specially crafted POST request values to trigger hash collisions and cause significant performance

102

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-538: HP OpenView Storage Data Protector Bug Lets Remote Users T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code January 20, 2011 - 6:39am Addthis PROBLEM: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Storage Data Protector v6.11 ABSTRACT: A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system. reference LINKS: HP Security Bulletin SecurityTracker Alert ID: 1024983 CVE-2011-0273 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP OpenView Storage Data Protector. The vulnerability could be remotely exploited to execute arbitrary code.

103

U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco Firewall Services Module Bugs Let Remote Users Execute 9: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall Services Module. reference LINKS: Cisco Advisory ID: cisco-sa-20121010-fwsm SecurityTracker Alert ID: 1027640 CVE-2012-4661 CVE-2012-4662 CVE-2012-4663 IMPACT ASSESSMENT: High Discussion: A remote user can send specially crafted DCERPC data through the target device to trigger a stack overflow in the DCERPC inspection engine and execute arbitrary code on the target device or cause the target device to

104

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

42: HP Onboard Administrator Bugs Let Remote Users Gain Access, 42: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

105

V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users 9: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host V-189: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host July 1, 2013 - 12:48am Addthis PROBLEM: Oracle VirtualBox 'tracepath' Bug Lets Local Guest Users Deny Service on the Target Host PLATFORM: VirtualBox 4.2.12 ABSTRACT: A vulnerability was reported in Oracle VirtualBox. REFERENCE LINKS: VirtualBox ticket: 11863 SecurityTracker Alert ID: 1028712 IMPACT ASSESSMENT: Medium DISCUSSION: A local user on the guest operating system can issue a 'tracepath' command to cause the network on the target host system to become unavailable. IMPACT: A local user on a guest operating system can cause denial of service conditions on the target host system.

106

U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: HP Performance Manager Unspecified Bug Lets Remote Users 7: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes U-137: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes March 30, 2012 - 9:15am Addthis PROBLEM: HP Performance Manager Unspecified Bug Lets Remote Users Execute Arbitrary Codes PLATFORM: HP-UX B.11.31 HP-UX B.11.23 ABSTRACT: A remote user can execute arbitrary code on the target system. REFERENCE LINKS: HP Support Document ID: c03255321 SecurityTracker Alert ID: 1026869 CVE-2012-0127 IMPACT ASSESSMENT: High Discussion: A potential security vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute arbitrary code and to create a Denial of Service (DoS).

107

V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Adobe ColdFusion Bugs Let Remote Users Gain Access and 3: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information V-063: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information January 7, 2013 - 1:00am Addthis PROBLEM: Adobe ColdFusion Bugs Let Remote Users Gain Access and Obtain Information PLATFORM: ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX ABSTRACT: Adobe has identified three vulnerabilities affecting ColdFusion for Windows, Macintosh and UNIX REFERENCE LINKS: Adobe Security Bulletin APSA13-01 SecurityTracker Alert ID: 1027938 CVE-2013-0625 CVE-2013-0629 CVE-2013-0631 IMPACT ASSESSMENT: High DISCUSSION: A remote user can bypass authentication and take control of the target system [CVE-2013-0625]. Systems with password protection disabled or with no password set are affected.

108

U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Onboard Administrator Bugs Let Remote Users Gain Access, 2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks April 6, 2012 - 7:00am Addthis PROBLEM: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks PLATFORM: HP Onboard Administrator (OA) up to and including v3.32 ABSTRACT: A remote user can obtain potentially sensitive information. reference LINKS: HP Support Document ID: c03263573 SecurityTracker Alert ID: 1026889 CVE-2012-0128, CVE-2012-0129, CVE-2012-0130 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Onboard Administrator. A remote

109

U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: RSA enVision Bugs Permit Cross-Site Scripting, SQL 9: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks March 20, 2012 - 7:00am Addthis PROBLEM: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks PLATFORM: 4.x, prior to 4.1 Patch 4 ABSTRACT: Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system. Reference LINKS: SecurityTracker Alert ID: 1026819 CVE-2012-0403 IMPACT ASSESSMENT: High Discussion: The system does not properly filter HTML code from user-supplied input

110

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

111

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

112

U-203: HP Photosmart Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

03: HP Photosmart Bug Lets Remote Users Deny Service 03: HP Photosmart Bug Lets Remote Users Deny Service U-203: HP Photosmart Bug Lets Remote Users Deny Service July 2, 2012 - 8:00am Addthis PROBLEM: HP Photosmart Bug Lets Remote Users Deny Service PLATFORM: HP Photosmart Wireless e-All-in-One Printer series - B110 HP Photosmart e-All-in-One Printer series - D110 HP Photosmart Plus e-All-in-One Printer series - B210 HP Photosmart eStation All-in-One Printer series - C510 HP Photosmart Ink Advantage e-All-in-One Printer series - K510 HP Photosmart Premium Fax e-All-in-One Printer series - C410 ABSTRACT: A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions. Reference LINKS: The Vendor's Advisory SecurityTracker Alert ID: 1027213 CVE-2012-2017 IMPACT ASSESSMENT: High Discussion:

113

U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service 31: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service August 9, 2012 - 7:00am Addthis PROBLEM: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service PLATFORM: Version(s): ASA 5500 Series; 8.2 - 8.4 ABSTRACT: Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions. reference LINKS: Release Notes for the Cisco ASA 5500 Series, 8.4(x) SecurityTracker Alert ID: 1027355 CVE-2012-2472 CVE-2012-2474 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in Cisco ASA. 1. On systems with SIP inspection enabled, a remote user can send specially crafted SIP traffic to cause the target device to create many identical

114

U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, 2: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information U-222: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information July 27, 2012 - 7:00am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code, Spoof the URL Address Bar, Conduct Cross-Site Scripting Attacks, and Obtain Potentially Sensitive Information PLATFORM: Version(s):Apple Safari prior to 6.0 ABSTRACT: Multiple vulnerabilities were reported in Apple Safari. reference LINKS: The Vendor's Advisory Bugtraq ID: 54683 SecurityTracker Alert ID: 1027307 IMPACT ASSESSMENT:

115

V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site 0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information April 23, 2013 - 12:26am Addthis PROBLEM: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information PLATFORM: Apache ActiveMQ versions prior to 5.8.0 ABSTRACT: Several vulnerabilities were reported in Apache ActiveMQ. REFERENCE LINKS: Apache ActiveMQ SecurityTracker Alert ID: 1028457 CVE-2012-6092 CVE-2012-6551 CVE-2013-3060 IMPACT ASSESSMENT: High DISCUSSION: Several web demos do not properly filter HTML code from user-supplied input

116

U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 41: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information August 22, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 11.3.300.271 and earlier versions for Windows, Macintosh and Linux operating systems Adobe Flash Player 11.1.115.11 and earlier versions for Android 4.x Adobe Flash Player 11.1.111.10 and earlier versions for Android 3.x and 2.x Adobe AIR 3.3.0.3670 and earlier versions for Windows and Macintosh Adobe AIR 3.3.0.3690 SDK (includes AIR for iOS) and earlier versions Adobe AIR 3.3.0.3650 and earlier versions for Android ABSTRACT:

117

T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement  

NLE Websites -- All DOE Office Websites (Extended Search)

712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and 712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update T-712: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update September 8, 2011 - 10:30am Addthis PROBLEM: A flaw was discovered in Cumin where it would log broker authentication credentials to the Cumin log file. A vulnerability was reported in Red Hat Enterprise MRG Grid. A local user can access the broker password. PLATFORM: Red Hat Enterprise MRG v2 for Red Hat Enterprise Linux (version 5) ABSTRACT: Red Hat Enterprise MRG Grid 2.0 security, bug fix and enhancement update. reference LINKS: RHSA-2011:1249-1 SecurityTracker Alert ID: 1026021 CVE-2011-2925 IMPACT ASSESSMENT: Medium Discussion: A local user exploiting this flaw could connect to the broker outside of Cumin's control and perform certain operations such as scheduling jobs,

118

T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users 7: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information August 31, 2011 - 12:00pm Addthis PROBLEM: A vulnerability was reported in Apache Tomcat. A remote user can bypass authentication or obtain potentially sensitive information. PLATFORM: Apache Tomcat 5.5.0 to 5.5.33, 6.0.0 to 6.0.33, 7.0.0 to 7.0.20 ABSTRACT: Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information. reference LINKS: SecurityTracker Alert ID: 1025993 CVE-2011-3190 (under review) Apache Tomcat Security Updates IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Apache Tomcat. A remote user can bypass

119

T-589: Citrix XenApp and Citrix Presentation Server Bug | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

89: Citrix XenApp and Citrix Presentation Server Bug 89: Citrix XenApp and Citrix Presentation Server Bug T-589: Citrix XenApp and Citrix Presentation Server Bug March 28, 2011 - 3:05pm Addthis PROBLEM: Citrix XenApp and Citrix Presentation Server Bug in ActiveSync Lets Remote Users Execute Arbitrary Code. PLATFORM: Citrix XenApp Presentation versions 4.5, 5 ABSTRACT: A vulnerability was reported in Citrix XenApp (Presentation Server). A remote user can execute arbitrary code on the target system. -------------------------------------------------------------------------------- LINKS: DOE-CIRC BULLETIN: http://www.doecirc.energy.gov/bulletins/t-589.shtml OTHER LINKS: Citrix Document: CTX128366 SecurityTracker Alert ID: 1025254 Citrix Support Technical Support Downloads --------------------------------------------------------------------------------

120

U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 5: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code U-055: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 8, 2011 - 8:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code . PLATFORM: Adobe Flash Player 11.1.102.55 on Windows and Mac OS X and prior versions ABSTRACT: Two vulnerabilities exploited by the Intevydis vd_adobe_fp module in VulnDisco Step Ahead were reported in Adobe Flash Player. reference LINKS: Secunia Advisory: SA47161 SecurityTracker Alert ID: 1026392 CVE-2011-4693 CVE-2011-4694 IMPACT ASSESSMENT: High Discussion: A remote or local user can obtain potentially sensitive information. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can create a specially crafted SWF file that, when

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-025: HP OpenView Network Node Manager Bugs Let Remote Users U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code U-025: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code November 2, 2011 - 8:00am Addthis PROBLEM: HP OpenView Network Node Manager Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: HP OpenView Network Node Manager (OV NNM) v7.51, v7.53 running on HP-UX, Linux, Solaris, and Windows ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Support Center Document ID: c03054052 SecurityTracker Alert ID: 1026260 CVE-2011-1365 CVE-2011-1366 CVE-2011-1367 IMPACT ASSESSMENT: Medium Discussion: Several vulnerabilities were reported in HP OpenView Network Node Manager. A remote user can execute arbitrary code on the target system.

122

U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: HP Protect Tools Device Access Manager Unspecified Bug Lets 2: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code U-052: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code December 6, 2011 - 7:00am Addthis PROBLEM: HP Protect Tools Device Access Manager Unspecified Bug Lets Remote Users Deny Service and Execute Arbitrary Code. PLATFORM: HP Protect Tools Device Access Manager for Windows earlier than v.6.1.0.1 running on the following HP PCs: HP EliteBook 2560p Notebook PC HP EliteBook 2760p Notebook PC HP EliteBook 8460p Notebook PC HP EliteBook 8460w Mobile Workstation HP EliteBook 8560p Notebook PC HP EliteBook 8560w Mobile Workstation HP EliteBook 8760w Mobile Workstation HP ProBook 4230s Notebook PC

123

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

124

V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information V-015: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information November 2, 2012 - 6:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code, Local Users Bypass the Screen Lock, and Applications Obtain Kernel Address Information PLATFORM: Apple iOS prior to 6.0.1 ABSTRACT: Three vulnerabilities were reported in Apple iOS. REFERENCE LINKS: Apple Article: HT5567 SecurityTracker Alert ID: 1027716 Bugtraq ID: 56363 CVE-2012-3748 CVE-2012-3749 CVE-2012-3750 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the

125

U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: RSA Adaptive Authentication Bugs Let Remote Users Bypass 1: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls U-061: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls December 14, 2011 - 8:17am Addthis PROBLEM: RSA Adaptive Authentication Bugs Let Remote Users Bypass Certain Security Controls. PLATFORM: 6.0.2.1 SP1 Patch 2 and SP1 Patch 3 6.0.2.1 SP2 and SP2 Patch 1 6.0.2.1 SP3 ABSTRACT: A remote user may be able to bypass certain security controls. reference LINKS: SecurityTracker Alert ID: 1026420 Security Focus: ESA-2011-036 IMPACT ASSESSMENT: Medium Discussion: Two vulnerabilities were reported in RSA Adaptive Authentication (On-Premise). A remote user may be able to bypass certain security controls. A remote user can send specially crafted data elements to affect the Device

126

U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 18: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information March 6, 2012 - 7:00am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information PLATFORM: Adobe Flash Player 10.x, Adobe Flash Player 11.x ABSTRACT: Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information. reference LINKS: Secunia Advisory SA48281 CVE-2012-0769 IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error in Matrix3D and execute

127

V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning 8: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks V-078: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks January 28, 2013 - 12:32am Addthis PROBLEM: WordPress Bugs Permit Cross-Site Scripting and Port Scanning Attacks PLATFORM: WordPress all versions are affected prior to 3.5.1 ABSTRACT: WordPress 3.5.1 Maintenance and Security Release REFERENCE LINKS: WordPress News SecurityTracker Alert ID: 1028045 Secunia Advisory SA51967 IMPACT ASSESSMENT: Medium DISCUSSION: Several scripts do not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the WordPress software and will run in the security

128

V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Microsoft Internet Explorer Object Access Bug Lets Remote 9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code May 6, 2013 - 12:07am Addthis PROBLEM: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code PLATFORM: Internet Explorer 8 ABSTRACT: A vulnerability was reported in Microsoft Internet Explorer. REFERENCE LINKS: SecurityTracker Alert ID: 1028514 Microsoft Security Advisory (2847140) CVE-2013-1347 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will access and object that has been deleted or not properly allocated and execute arbitrary code on the target system. The code will run with the privileges of the target user.

129

U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Cisco IOS Intrusion Prevention System DNS Processing Bug 9: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service U-269: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service September 27, 2012 - 4:07am Addthis PROBLEM: Cisco IOS Intrusion Prevention System DNS Processing Bug Lets Remote Users Deny Service PLATFORM: Devices configured with Cisco IOS IPS are affected ABSTRACT: A vulnerability was reported in Cisco IOS. reference LINKS: SecurityTracker Alert ID: 1027580 Cisco Security Advisory CVE-2012-3950 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Cisco IOS. A remote user can cause denial of service conditions. A remote user can send specially crafted (but legitimate) DNS packets through the target device to cause the device to

130

V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code 3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 6.0.3 ABSTRACT: Two vulnerabilities were reported in Apple Safari. REFERENCE LINKS: Apple security update, Article: HT1222 SecurityTracker Alert ID: 1028292 CVE-2013-0960 CVE-2013-0961 IMPACT ASSESSMENT: Medium DISCUSSION: A remote user can create specially crafted HTML that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. IMPACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

131

V-160: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

60: Wireshark Multiple Bugs Let Remote Users Deny Service 60: Wireshark Multiple Bugs Let Remote Users Deny Service V-160: Wireshark Multiple Bugs Let Remote Users Deny Service May 21, 2013 - 12:09am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: Versions 1.8.0 to 1.8.6 ABSTRACT: Multiple vulnerabilities have been reported in Wireshark REFERENCE LINKS: Wireshark Docid: wnpa-sec-2013-23 Secunia Advisory SA53425 SecurityTracker Alert ID: 1028582 CVE-2013-2486 CVE-2013-2487 IMPACT ASSESSMENT: Medium DISCUSSION: Multiple vulnerabilities have been reported in Wireshark, which can be exploited by malicious people to cause a DoS (Denial of Service). 1) An error in the RELOAD dissector (dissectors/packet-reload.c) can be exploited to trigger infinite loops and consume CPU resources via specially

132

U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apache mod_proxy Pattern Matching Bug Lets Remote Users 5: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6, 2011 - 9:30am Addthis PROBLEM: Apache mod_proxy Pattern Matching Bug Lets Remote Users Access Internal Servers. PLATFORM: Apache HTTP Server 1.3.x, 2.2.21 and prior versions ABSTRACT: A remote user can access internal servers. reference LINKS: The Apache HTTP Server Project SecurityTracker Alert ID: 1026144 CVE-2011-3368 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Apache mod_proxy. A remote user can access internal servers. When this system is configured in reverse proxy mode and uses the RewriteRule or ProxyPassMatch directives with a pattern match, a remote user can send a specially crafted request to access internal

133

V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site 2: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code October 29, 2012 - 6:00am Addthis PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code PLATFORM: Firefox, Thunderbird, SeaMonkey ABSTRACT: Three vulnerabilities were reported in Mozilla Firefox. REFERENCE LINKS: Mozilla Foundation Security Advisory 2012-90 SecurityTracker Alert ID: 1027701 SecurityTracker Alert ID: 1027702 Advisory: RHSA-2012:1407-1 CVE-2012-4194 CVE-2012-4195 CVE-2012-4196 IMPACT ASSESSMENT: High DISCUSSION: A remote user can exploit the valueOf() method of window.location to, in

134

V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 1.6.602.171 and prior for Windows/Mac; other versions on other platforms ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB13-09 SecurityTracker Alert ID: 1028277 CVE-2013-0646 CVE-2013-0650 CVE-2013-1371 CVE-2013-1375 IMPACT ASSESSMENT: High DISCUSSION: A remote user can create specially crafted content that, when loaded by the target user, will execute arbitrary code on the target user's system. The code will run with the privileges of the target user.

135

U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

12: BlackBerry Enterprise Server Collaboration Service Bug Lets 12: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages U-012: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages October 17, 2011 - 9:45am Addthis PROBLEM: BlackBerry Enterprise Server Collaboration Service Bug Lets Remote Users Impersonate Intra-organization Messages. PLATFORM: Exchange and Domino 5.0.3 through 5.0.3 MR4 BlackBerry Client for use with Microsoft Office Communications Server 2007 R2 BlackBerry Client for use with Microsoft Lync Server 2010 ABSTRACT: A vulnerability was reported in BlackBerry Enterprise Server. A remote user can impersonate another messaging user within the same organization. reference LINKS: BlackBerry Security Advisory ID: KB28524

136

ConMem: detecting severe concurrency bugs through an effect-oriented approach  

Science Conference Proceedings (OSTI)

Multicore technology is making concurrent programs increasingly pervasive. Unfortunately, it is difficult to deliver reliable concurrent programs, because of the huge and non-deterministic interleaving space. In reality, without the resources to thoroughly ... Keywords: concurrency bugs, software testing

Wei Zhang; Chong Sun; Shan Lu

2010-03-01T23:59:59.000Z

137

U-201: HP System Management Homepage Bugs Let Remote Users Deny...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-051: Oracle Solaris Java Multiple Vulnerabilities...

138

V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary 46: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-046: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code December 13, 2012 - 3:30am Addthis PROBLEM: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): 11.5.502.110 and prior for Windows/Mac; 11.2.202.251 and prior for Linux ABSTRACT: Several vulnerabilities were reported in Adobe Flash Player. REFERENCE LINKS: Adobe Vulnerability identifier: APSB12-27 SecurityTracker Alert ID: 1027854 Secunia Advisory SA51560 RHSA-2012:1569-1 CVE-2012-5676 CVE-2012-5677 CVE-2012-5678 IMPACT ASSESSMENT: High DISCUSSION: A buffer overflow can trigger code execution [CVE-2012-5676]. An integer overflow can trigger code execution [CVE-2012-5677]. A memory corruption flaw can trigger code execution [CVE-2012-5678].

139

V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote  

NLE Websites -- All DOE Office Websites (Extended Search)

71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets 71: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall REFERENCE LINKS: Cisco Advisory ID: cisco-sa-20130116-asa1000v SecurityTracker Alert ID: 1028005 Secunia Advisory SA51897 CVE-2012-5419 IMPACT ASSESSMENT: Medium DISCUSSION: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall, which can be exploited by malicious people to cause a DoS (Denial of Service).

140

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code T-708:Pidgin Bugs Let Remote Users Deny Service and Potentially Execute Arbitrary Code September 1, 2011 - 12:00pm Addthis PROBLEM: gtkutils.c in Pidgin before 2.10.0 on Windows allows user-assisted remote attackers to execute arbitrary programs via a file: URL in a message. PLATFORM: Pidgin before 2.10.0 on Windows ABSTRACT: Pidgin bugs let remote users deny service and potentially execute arbitrary code. reference LINKS: CVE-2011-3185 CVE-2011-2943 CVE-2011-3184 SecurityTracker Alert ID: 1025961 Pidgin Security Advisories IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in Pidgin. A remote user can cause denial of service conditions. A remote user can cause arbitrary code to be

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

U-047: Siemens Automation License Manager Bugs Let Remote Users Deny  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Siemens Automation License Manager Bugs Let Remote Users 7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code November 29, 2011 - 9:00am Addthis PROBLEM: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code. PLATFORM: Siemens Automation License Manager 500.0.122.1 ABSTRACT: Several vulnerabilities were reported in Siemens Automation License Manager. reference LINKS: SecurityTracker Alert ID: 1026354 Bugtraq Siemens Advisory Services IMPACT ASSESSMENT: Medium Discussion: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. A remote user can send specially crafted *_licensekey commands to trigger a

142

U-071:HP Database Archiving Software Bugs Let Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1:HP Database Archiving Software Bugs Let Remote Users Execute 1:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code U-071:HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code December 29, 2011 - 8:15am Addthis PROBLEM: HP Database Archiving Software Bugs Let Remote Users Execute Arbitrary Code PLATFORM: HP Database Archiving Software v6.31 ABSTRACT: A remote user can execute arbitrary code on the target system. reference LINKS: HP Database Document ID: c03128302 SecurityTracker Alert ID: 1026467 CVE-2011-4163 CVE-2011-4164 CVE-2011-4165 IMPACT ASSESSMENT: High Discussion: Several vulnerabilities were reported in HP Database Archiving Software. A remote user can execute arbitrary code on the target system. Impact: A remote user can execute arbitrary code on the target system. Solution:

143

History's Worst Software Bugs By Simson Garfinkel Story location: http://www.wired.com/news/technology/bugs/0,2924,69355,00.html  

E-Print Network (OSTI)

,000 of its Prius hybrid vehicles following reports of vehicle warning lights illuminating for no reason, the root of the Prius issue wasn't a hardware problem -- it was a programming error in the smart car's embedded code. The Prius had a software bug. With that recall, the Pruis joined the ranks of the buggy

Overstreet, C. Michael

144

Backup Generators (BUGS): The Next Smart Grid Peak Resource? | Open Energy  

Open Energy Info (EERE)

Backup Generators (BUGS): The Next Smart Grid Peak Resource? Backup Generators (BUGS): The Next Smart Grid Peak Resource? Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Backup Generators (BUGS): The Next Smart Grid Peak Resource? Focus Area: Crosscutting Topics: Potentials & Scenarios Website: www.netl.doe.gov/smartgrid/referenceshelf/articles/10-18-2010_BUGS%20a Equivalent URI: cleanenergysolutions.org/content/backup-generators-bugs-next-smart-gri Language: English Policies: "Deployment Programs,Financial Incentives,Regulations" is not in the list of possible values (Deployment Programs, Financial Incentives, Regulations) for this property. DeploymentPrograms: Demonstration & Implementation Regulations: "Resource Integration Planning,Energy Standards" is not in the list of possible values (Agriculture Efficiency Requirements, Appliance & Equipment Standards and Required Labeling, Audit Requirements, Building Certification, Building Codes, Cost Recovery/Allocation, Emissions Mitigation Scheme, Emissions Standards, Enabling Legislation, Energy Standards, Feebates, Feed-in Tariffs, Fuel Efficiency Standards, Incandescent Phase-Out, Mandates/Targets, Net Metering & Interconnection, Resource Integration Planning, Safety Standards, Upgrade Requirements, Utility/Electricity Service Costs) for this property.

145

U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated 2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates February 28, 2012 - 8:45am Addthis PROBLEM: A vulnerability was reported in PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY DEFINER, a remote authenticated user can execute a trigger function and gain elevated privileges CVE-2012-0866.

146

V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service 3: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service and Execute Arbitrary Code July 26, 2013 - 3:31am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions. PLATFORM: HP LoadRunner prior to 11.52 ABSTRACT: Multiple vulnerabilities were reported in HP LoadRunner. REFERENCE LINKS: Security Tracker Alert ID: 1028833 CVE-2013-2368 CVE-2013-2369 CVE-2013-2370 CVE-2013-4797 CVE-2013-4798 CVE-2013-4799 CVE-2013-4800 CVE-2013-4801 IMPACT ASSESSMENT: Medium DISCUSSION: Potential security vulnerabilities have been identified with HP LoadRunner. The vulnerabilities could be remotely exploited to allow execution of code

147

U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Sudo Format String Bug Lets Local Users Gain Elevated 2: Sudo Format String Bug Lets Local Users Gain Elevated Privileges U-092: Sudo Format String Bug Lets Local Users Gain Elevated Privileges January 31, 2012 - 5:45am Addthis PROBLEM: A vulnerability was reported in Sudo. A local user can obtain elevated privileges on the target system. PLATFORM: Linux (Any) Version(s): 1.8.0 - 1.8.3p1 ABSTRACT: A local user can supply a specially crafted command line argument to trigger a format string flaw and execute arbitrary commands on the target system with root privileges. reference LINKS: CVE-2012-0809 SecurityTracker Alert ID: 1026600 Vendor Site IMPACT ASSESSMENT: Medium Discussion: The vulnerability resides in the sudo_debug() function in 'src/sudo.c'. This can be exploited by local users, regardless of whether they are listed

148

V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Xen Event Channel Tracking Pointer Bug Local Privilege 8: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation V-128: Xen Event Channel Tracking Pointer Bug Local Privilege Escalation April 8, 2013 - 12:28am Addthis PLATFORM: Version(s): 3.2 and later ABSTRACT: A vulnerability was reported in Xen. REFERENCE LINKS: SecurityTracker Alert ID: 1028388 CVE-2013-1920 IMPACT ASSESSMENT: Medium DISCUSSION: A local user with kernel level privileges on the guest operating system can exploit a memory pointer error when the hypervisor is under memory pressure and Xen Security Module (XSM) is enabled to execute arbitrary code on the target host system IMPACT: A local user on the guest operating system can obtain elevated privileges on the target host system. SOLUTION: The vendor has issued a fix (xsa47-4.1.patch, xsa47-4.2-unstable.patch).

149

U-110: Samba Bug Lets Remote Users Execute Arbitrary Code | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0: Samba Bug Lets Remote Users Execute Arbitrary Code 0: Samba Bug Lets Remote Users Execute Arbitrary Code U-110: Samba Bug Lets Remote Users Execute Arbitrary Code February 24, 2012 - 7:30am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: Version(s): prior to 3.4.0 ABSTRACT: A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. reference LINKS: Vendor Advisory Security Tracker ID 1026739 CVE-2012-0870 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in Samba. A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to the smbd service to trigger a flaw in chain_reply() and construct_reply() and execute arbitrary code on the target system. The code will run with the

150

U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny 6: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service February 6, 2012 - 7:00am Addthis PROBLEM: Vulnerability in AIX TCP stack PLATFORM: Version(s): 5.3, 6.1, 7.1 ABSTRACT: A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system. reference LINKS: SecurityTracker Alert ID: 1026640 IBM Security Advisory CVE-2012-0194 IMPACT ASSESSMENT: Medium Discussion: AIX could allow a remote attacker to cause a denial of service, caused by an error when the TCP large send offload option is enabled on a network interface. By sending a specially-crafted sequence of packets, an attacker could exploit this vulnerability to cause a kernel panic.

151

V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Barracuda SSL VPN Bug Lets Remote Users Bypass 7: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication V-077: Barracuda SSL VPN Bug Lets Remote Users Bypass Authentication January 25, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Barracuda SSL VPN. PLATFORM: The vulnerability has been verified to exist in Barracuda SSL VPN version 2.2.2.203 ABSTRACT: A remote user can gain administrative access to the target system. REFERENCE LINKS: SecurityTracker Alert ID: 1028039 Barracuda Networks Advisory IMPACT ASSESSMENT: High DISCUSSION: A remote user can set a specially crafted Java system property (via 'setSysProp.jsp') to bypass access restrictions and gain access to the API functionality. This can be exploited to download configuration files, download database dumps, shutdown the system, and set new administrative

152

T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4: Apple QuickTime Multiple Bugs Let Remote Users Execute 4: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary June 24, 2011 - 4:39am Addthis PROBLEM: A vulnerability was reported in QuickTime. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: Version(s): prior to QuickTime 7.6.8 ABSTRACT: A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user. reference LINKS: SecurityTracker Alert ID: 1025705 Apple Security Article: HT4339 Apple Security Article: HT4723 Apple Security Article: HT1222 CVE-2011-0213 Secunia Advisory: SA45054 IMPACT ASSESSMENT High Discussion:

153

V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Video Surveillance Manager Bugs Let Remote Users 2: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information July 25, 2013 - 2:52am Addthis PROBLEM: A remote user can obtain potentially sensitive information and modify some configuration settings. A remote user can exploit this to create, modify, and remove camera feeds, archives, logs, and users. PLATFORM: Cisco Video Surveillance Manager 7.1, 7.5 ABSTRACT: Two vulnerabilities were reported in Cisco Video Surveillance Manager REFERENCE LINKS: Security Tracker Alert ID: 1028827 CVE-2013-3429 CVE-2013-3430 CVE-2013-3431 IMPACT ASSESSMENT: Medium DISCUSSION: The vulnerability is due to an access control error that occurred. The

154

T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: PHP File Upload Bug May Let Remote Users Overwrite Files on 7: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System June 15, 2011 - 3:45pm Addthis PROBLEM: A vulnerability was reported in PHP. A remote user may be able to overwrite files on the target system. PLATFORM: PHP prior to 5.3.7 ABSTRACT: PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected. reference LINKS: PHP Security Notice PHP CVE-2011-2202 SecurityTracker Alert ID: 1025659 Secunia Advisory: SA44874 CVE-2011-2202 IMPACT ASSESSMENT: High Discussion: The vulnerability lies in the 'SAPI_POST_HANDLER_FUNC()' function in

155

U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

92: VMware Workstation/Player VM Remote Device Bug Lets Local or 92: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192: VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash.

156

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and 2: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code June 22, 2011 - 2:55pm Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases. A remote user can create specially crafted HTML that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2011-2364, CVE-2011-2374, CVE-2011-2375, CVE-2011-2376]. The code will run with the privileges of the target user. PLATFORM: Mozilla Thunderbird prior to 3.1.11

157

V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny 3: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access June 21, 2013 - 6:00am Addthis PROBLEM: Three vulnerabilities were reported in Cisco TelePresence TC and TE PLATFORM: The following product models are affected by the vulnerabilities: Cisco TelePresence MX Series Cisco TelePresence System EX Series Cisco TelePresence Integrator C Series Cisco TelePresence Profiles Series running Cisco TelePresence Quick Set Series Cisco IP Video Phone E20 ABSTRACT: Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an

158

U-201: HP System Management Homepage Bugs Let Remote Users Deny Service |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP System Management Homepage Bugs Let Remote Users Deny 1: HP System Management Homepage Bugs Let Remote Users Deny Service U-201: HP System Management Homepage Bugs Let Remote Users Deny Service June 28, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in HP System Management Homepage. PLATFORM: Version(s): prior to 7.1.1 ABSTRACT: The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code. Reference links: Original Advisory Security Tracker ID 1027209 CVE-2012-2012, CVE-2012-2013, CVE-2012-2014 CVE-2012-2015, CVE-2012-2016 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP System Management Homepage. A remote authenticated user can gain elevated privileges. A remote authenticated

159

U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary 8: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code January 25, 2012 - 6:00am Addthis PROBLEM: A remote user can execute arbitrary code on the target system. PLATFORM: Version(s): 12.5 SP3; pcAnywhere Solutions 7.1 GA, SP 1, and SP 2 ABSTRACT: Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system. reference LINKS: Symantec Advisory Secunia Advisory SecurityTracker Alert ID:102576 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted data to TCP port 5631 to trigger a but in the validation of authentication data and execute arbitrary code.

160

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code June 6, 2012 - 7:00am Addthis PROBLEM: Multiple vulnerabilities were reported in Mozilla Firefox. PLATFORM: Version(s): prior to 13.0 ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information. Reference Links: Security Tracker ID 1027120 CVE-2012-0441,CVE-2012-1937 Vendor URL IMPACT ASSESSMENT: High Discussion: A remote user can create specially crafted content that, when loaded by the target user, will trigger a memory corruption error and execute arbitrary code on the target system [CVE-2012-1937 , CVE-2012-1938, CVE-2012-1939 ].

162

V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

7: Samba Bug Lets Remote Authenticated Users Modify Files 7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was reported in Samba. PLATFORM: The vulnerabilities are reported in version(s): 3.6.0 - 3.6.5 ABSTRACT: A remote authenticated user can modify files on the target share REFERENCE LINKS: SecurityTracker Alert ID: 1028389 Samba Security Announcement CVE-2013-0454 IMPACT ASSESSMENT: Medium DISCUSSION: A remote authenticated user can perform operations on the target CIFS export that are not permitted by the CIFS share access control settings. This may include writing to read-only shares. IMPACT: Modification of user information SOLUTION: Update to 3.6.6 and higher or apply the following patch Addthis

163

U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

VMware Workstation/Player VM Remote Device Bug Lets Local or VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service U-192 VMware Workstation/Player VM Remote Device Bug Lets Local or Remote Users Deny Service June 15, 2012 - 7:00am Addthis PROBLEM: A vulnerability was reported in VMware Workstation/Player. PLATFORM: Version(s): Workstation 8.x, Player 4.x ABSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289 IMPACT ASSESSMENT: High Discussion: A user with the ability to modify communications data between a remote virtual device (e.g., CD-ROM, keyboard) located on a physically separate system and the target virtual machine can cause the target virtual machine to crash. Impact:

164

V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in Cisco Wireless LAN Controller. PLATFORM: The vulnerabilities are reported in: Cisco 2000 Series WLC Cisco 2100 Series WLC Cisco 2500 Series WLC Cisco 4100 Series WLC Cisco 4400 Series WLC Cisco 5500 Series WLC Cisco 7500 Series WLC Cisco 8500 Series WLC Cisco 500 Series Wireless Express Mobility Controllers Cisco Wireless Services Module (Cisco WiSM) Cisco Wireless Services Module version 2 (Cisco WiSM version 2)

165

V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Local Users Gain Elevated Privileges 5: Apple iOS Bugs Let Local Users Gain Elevated Privileges V-115: Apple iOS Bugs Let Local Users Gain Elevated Privileges March 20, 2013 - 12:08am Addthis PROBLEM: Apple iOS Bugs Let Local Users Gain Elevated Privileges PLATFORM: Version(s): prior to 6.1.3 ABSTRACT: Several vulnerabilities were reported in Apple iOS REFERENCE LINKS: Apple security Article: HT1222 SecurityTracker Alert ID: 1028314 CVE-2013-0977 CVE-2013-0978 CVE-2013-0979 CVE-2013-0981 IMPACT ASSESSMENT: High DISCUSSION: A local user can exploit a flaw in the handling of Mach-O executable files with overlapping segments to execute unsigned code on the target system [CVE-2013-0977]. A local user can exploit a flaw in the ARM prefetch abort handling to determine the address of structures in the kernel [CVE-2013-0978].

166

U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users 9: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code March 7, 2012 - 7:00am Addthis PROBLEM: Blackberry PlayBook Unspecified WebKit Bug Lets Remote Users Execute Arbitrary Code PLATFORM: BlackBerry 6, BlackBerry 7, BlackBerry 7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system. reference LINKS: SecurityTracker Alert ID: 1026769 BlackBerry Security Notice Article ID: KB30152 IMPACT ASSESSMENT: High Discussion: A vulnerability was reported in Blackberry PlayBook. A remote user can cause arbitrary code to be executed on the target user's system. A remote

167

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

168

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

169

T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

714:Wireshark OpenSafety and CSN.1 Dissector Bugs 714:Wireshark OpenSafety and CSN.1 Dissector Bugs T-714:Wireshark OpenSafety and CSN.1 Dissector Bugs September 12, 2011 - 9:00am Addthis PROBLEM: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. PLATFORM: Version(s): 1.4.0 to 1.4.8, 1.6.0 to 1.6.1 ABSTRACT: Wireshark OpenSafety and CSN.1 Dissector Bugs Lets Remote Users Deny Service. reference LINKS: Wireshark 1.6.2 Release Notes Wireshark 1.4.9 Release Notes Docid: wnpa-sec-2011-12 Docid: wnpa-sec-2011-14 Docid: wnpa-sec-2011-15 Docid: wnpa-sec-2011-16 SecurityTracker Alert ID: 1026030 IMPACT ASSESSMENT: High Discussion: A remote user can cause arbitrary scripting code to be executed on the target user's system. A large loop in the OpenSafety dissector could cause a crash. A remote user

170

T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

9: BlackBerry Device Software Bug in WebKit Lets Remote Users 9: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code T-579: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code March 15, 2011 - 5:05pm Addthis PROBLEM: A vulnerability was reported in BlackBerry Device Software. A remote user can cause arbitrary code to be executed on the target user's system. PLATFORM: BlackBerry Device Software version 6.0 and later. ABSTRACT: BlackBerry Device Software Bug in WebKit Lets Remote Users Execute Code. reference LINKS: BlackBerry Advisory: KB26132 CVE-2011-1290 BlackBerry Security Note BlackBerry Device Storage IMPACT ASSESSMENT: Moderate Discussion: A vulnerability exists in the open source WebKit browser engine provided in BlackBerry Device Software version 6.0 and later. The issue could result in

171

U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: OpenSSL DTLS Bug Lets Remote Users Deny Service 5: OpenSSL DTLS Bug Lets Remote Users Deny Service U-085: OpenSSL DTLS Bug Lets Remote Users Deny Service January 20, 2012 - 9:15am Addthis PROBLEM: OpenSSL DTLS Bug Lets Remote Users Deny Service PLATFORM: Only DTLS applications using OpenSSL 1.0.0f and 0.9.8s are affected. ABSTRACT: A flaw in the fix to CVE-2011-4108 can be exploited in a denial of service attack. REFERNCE LINKS: CVE-2012-0050 SecurityTracker Alert ID: 1026548 OpenSSL Security Advisory [18 Jan 2011] OpenSSL News IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in OpenSSL. The fix to correct the Datagram Transport Layer Security (DTLS) vulnerability referenced by CVE-2011-4108 introduced a flaw. A remote user can send specially crafted data to cause denial of service conditions on the target system.

172

V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: Mozilla Firefox Multiple Bugs Let Remote Users Execute 29: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-029: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks November 21, 2012 - 2:00am Addthis PROBLEM: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks PLATFORM: Version(s): prior to 17.0 ABSTRACT: Multiple vulnerabilities were reported in Mozilla Firefox REFERENCE LINKS: Mozilla Foundation Security Advisories Bugtraq ID: 55260 SecurityTracker Alert ID: 1027791 CVE-2012-4201, CVE-2012-4202, CVE-2012-4203, CVE-2012-4204, CVE-2012-4205, CVE-2012-4206, CVE-2012-4207,CVE-2012-4208, CVE-2012-4209, CVE-2012-4210, CVE-2012-4212, CVE-2012-4213, CVE-2012-4214, CVE-2012-4215, CVE-2012-4216,

173

U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: 1027028 CVE-2012-0672 CVE-2012-0674 IMPACT ASSESSMENT: Medium Discussion: A remote user can create a specially crafted file that, when loaded by the

174

T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute 8:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code September 15, 2011 - 8:45am Addthis PROBLEM: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code. PLATFORM: Adobe Reader X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Reader 9.4.5 and earlier 9.x versions for Windows, Macintosh and UNIX Adobe Reader 8.3 and earlier 8.x versions for Windows and Macintosh Adobe Acrobat X (10.1) and earlier 10.x versions for Windows and Macintosh Adobe Acrobat 9.4.5 and earlier 9.x versions for Windows and Macintosh Adobe Acrobat 8.3 and earlier 8.x versions for Windows and Macintosh ABSTRACT: A remote user can create a file that, when loaded by the target user, will

175

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service U-176: Wireshark Multiple Bugs Let Remote Users Deny Service May 24, 2012 - 7:00am Addthis PROBLEM: Wireshark Multiple Bugs Let Remote Users Deny Service PLATFORM: 1.4.0 to 1.4.12, 1.6.0 to 1.6.7 ABSTRACT: Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions. Reference Links: SecurityTracker Alert ID: 1027094 CVE-2012-2392 CVE-2012-2393 CVE-2012-2394 IMPACT ASSESSMENT: Medium Discussion: A remote user can send specially crafted ANSI MAP, ASF, BACapp, Bluetooth HCI, IEEE 802.11, IEEE 802.3, LTP, and R3 data to cause Wireshark to hang or enter an infinite loop. A remote user can cause the DIAMETER dissector to crash. A remote user can trigger a memory error on SPARC or Itanium processors and

176

U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code | Department  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code 6: Apple iOS Bugs Let Remote Users Execute Arbitrary Code U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code November 15, 2011 - 8:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Obtain Information and Let Local Users Bypass Authentication. PLATFORM: iOS 3.0 through 5.0 for iPhone 3GS iPhone 4 and iPhone 4S iOS 3.1 through 5.0 for iPod touch (3rd generation) and later iOS 3.2 through 5.0 for iPad, iOS 4.3 through 5.0 for iPad 2 ABSTRACT: A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system. reference LINKS: Apple Security Article: HT5052 Apple Product Security SecurityTracker Alert ID: 1026311 IMPACT ASSESSMENT:

177

U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote 11: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories July 12, 2012 - 7:00am Addthis PROBLEM: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories PLATFORM: EMC Celerra Network Server versions 6.0.36.4 through 6.0.60.2 EMC VNX versions 7.0.12.0 through 7.0.53.1 EMC VNXe 2.0 (including SP1, SP2, and SP3) EMC VNXe MR1 (including SP1, SP2, SP3, and SP3.1) EMC VNXe MR2 (including SP0.1) ABSTRACT: A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system. reference LINKS: The Vendor's Advisory

178

V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote 1: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service V-031: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service November 22, 2012 - 3:00am Addthis PROBLEM: IBM WebSphere DataPower XC10 Appliance Bugs Let Remote Authenticated Users Gain Elevated Privileges and Remote Users Deny Service PLATFORM: Version(s): XC10 2.0.0.0 - 2.0.0.3, 2.1.0.0 - 2.1.0.2 ABSTRACT: Several vulnerabilities were reported in IBM WebSphere DataPower. REFERENCE LINKS: IBM Security Bulletin SecurityTracker Alert ID: 1027798 CVE-2012-5758 CVE-2012-5759 CVE-2012-5756 IMPACT ASSESSMENT: High DISCUSSION: Several vulnerabilities were reported in IBM WebSphere DataPower. A remote

179

V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to 1: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems V-141: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems April 24, 2013 - 1:06am Addthis PROBLEM: HP ElitePad 900 Secure Boot Bug Lets Local Users Boot to Other Operating Systems PLATFORM: HP ElitePad 900 with BIOS version vF.00 ABSTRACT: A vulnerability was reported in HP ElitePad 900 REFERENCE LINKS: HP Document ID: c03727435 SecurityTracker Alert ID: 1028461 CVE-2012-5218 IMPACT ASSESSMENT: Medium DISCUSSION: The BIOS secure boot feature of the BIOS may not be enabled. A local user may be able to bypass the secure boot feature and boot an alternate operating system. IMPACT: A local user can may be able to boot to an alternate operating system. SOLUTION:

180

NIST Image Gallery: Browse: Results  

Science Conference Proceedings (OSTI)

... Thumbnail, Homeland Security; World Trade Center; Wind Load Modeling, created ... Trade Center; Steel from Collapsed WTC Towers; Banovic; Davis ...

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

NIST Image Gallery: Browse: Results  

Science Conference Proceedings (OSTI)

... 2007. Thumbnail, Nanotechnology; Biotechnology/Health; Nanocrystals; Hwang, created 6/21/2004, entered 11/5/2004. ...

182

NIST Image Gallery: Browse: Results  

Science Conference Proceedings (OSTI)

... 2008. Thumbnail, Iron-based and Copper-Oxide High-Temperature Superconductors, created 2007, entered 5/27/2008. ...

183

NIST Image Gallery: Browse: Results  

Science Conference Proceedings (OSTI)

... Thumbnail, Energy; Fossil Fuels;Distillation Curves for Complex Fuel Mixtures, created 5 ... Breast Cancer and Alcohol Consumption, created 2005 ...

184

Microsoft Word - BUGS_The Next Smart Grid Peak Resource Final 4_19.docx  

NLE Websites -- All DOE Office Websites (Extended Search)

April 15, 2010 April 15, 2010 DOE/NETL-2010/1406 Backup Generators (BUGS): The Next Smart Grid Peak Resource Backup Generators (BUGS): The Next Smart Grid Peak Resource v1.0 ii DISCLAIMER This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference therein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or

185

Image Gallery of the U.S. Global Change Research Program  

DOE Data Explorer (OSTI)

More than 700 non-copyrighted images related to global climate change are available for free download from the U.S. Global Change Research Program at globalchange.gov. The only requirement is to give a photo credit when using an image in your own publication or on your website. Thumbnails are grouped by year from 2003 to the present and are easy to scroll through, enlarge, and save to your own device.

186

T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets 3: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service T-633: BIND RRSIG RRsets Negative Caching Off-by-one Bug Lets Remote Users Deny Service May 31, 2011 - 3:35pm Addthis PROBLEM: A vulnerability was reported in BIND. A remote user can cause denial of service conditions. PLATFORM: BIND Version(s): 9.4-ESV-R3 and later, 9.6-ESV-R2 and later, 9.6.3, 9.7.1 and later, 9.8.0 and later; prior to 9.4-ESV-R4-P1, 9.6-ESV-R4-P1, 9.7.3-P1, 9.8.0-P2 ABSTRACT: A remote DNS server can supply very large RRSIG RRsets in a negative response to trigger an off-by-one error in a buffer size check and cause the target requesting named process to crash. A remote user can cause named to crash. reference LINKS: SecurityTracker Alert ID: 1025575 SecurityTracker Alert ID: 1025572

187

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data August 3, 2013 - 2:37am Addthis PROBLEM: A vulnerability was reported in HP Printers. A remote user can obtain potentially sensitive information. PLATFORM: HP LaserJet Pro products ABSTRACT: A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data. REFERENCE LINKS: SecurityTracker Alert ID 1028869 CVE-2013-4807 Vendor URL IMPACT ASSESSMENT: Medium DISCUSSION: The following models are affected: HP LaserJet Pro P1102w CE657A/CE658A HP LaserJet Pro P1606dn CE749A HP LaserJet Pro M1212nf MFP CE841A HP LaserJet Pro M1213nf MFP CE845A

188

3-Dimensional Imaging At Nanometer Resolutions  

NLE Websites -- All DOE Office Websites (Extended Search)

3-Dimensional Imaging At Nanometer Resolutions 3-Dimensional Imaging At Nanometer Resolutions 3-Dimensional Imaging At Nanometer Resolutions An apparatus and method for enabling precise, 3-dimensional, photoactivation localization microscopy (PALM). Available for thumbnail of Feynman Center (505) 665-9090 Email 3-Dimensional Imaging At Nanometer Resolutions An apparatus and method for enabling precise, 3-dimensional, photoactivation localization microscopy (PALM) using selective, two-photon activation of fluorophores in a single z-slice of a sample in cooperation with time-gated imaging for reducing the background radiation from other image planes to levels suitable for single-molecule detection and spatial location, are described. U.S. Patent No.: 7,675,045 (DOE S-112,966) Patent Application Filing Date: October 9, 2008

189

Imaging  

NLE Websites -- All DOE Office Websites (Extended Search)

Imaging Print Imaging Print The wavelengths of soft x-ray photons (1-15 nm) are very well matched to the creation of "nanoscopes" capable of probing the interior structure of biological cells and inorganic mesoscopic systems.Topics addressed by soft x-ray imaging techniques include cell biology, nanomagnetism, environmental science, and polymers. The tunability of synchrotron radiation is absolutely essential for the creation of contrast mechanisms. Cell biology CAT scans are performed in the "water window" (300-500 eV). Nanomagnetism studies require the energy range characteristic of iron, cobalt, and nickel (600-900 eV). Mid- and far-infrared (energies below 1 eV) microprobes using synchrotron radiation are being used to address problems such as chemistry in biological tissues, chemical identification and molecular conformation, environmental biodegradation, mineral phases in geological and astronomical specimens, and electronic properties of novel materials. Infrared synchrotron radiation is focused through, or reflected from, a small spot on the specimen and then analyzed using a spectrometer. Tuning to characteristic vibrational frequencies serves as a sensitive fingerprint for molecular species. Images of the various species are built up by raster scanning the specimen through the small illuminated spot.

190

70 Images for 70 Years  

NLE Websites -- All DOE Office Websites (Extended Search)

70 Images for 70 Years 70 Images for 70 Years 70 Images for 70 Years Los Alamos has a proud history and heritage of almost 70 years of science and innovation. The people of the Laboratory work on advanced technologies to provide the best scientific and engineering solutions to many of the nation's most crucial security challenges. Click thumbnails to enlarge. Photos arranged by most recent first, horizontal formats before vertical. See Flickr for more sizes and details. 1938 Hahn and Meitner Fission 1938 Hahn and Meitner Fission 1939 Einstein-Szilard 1939 Einstein-Szilard 1940s Main Guard Gate (671938) 1940s Main Guard Gate (671938) 1940s Security check 1940s Security check 1940 Boys Ranch School hockey on Ashley Pond 1940 Boys Ranch School hockey on Ashley Pond 1942 Fuller Lodge 1942 Fuller Lodge

191

Developer | OpenEI Community  

Open Energy Info (EERE)

bug bug Type Term Title Author Replies Last Post sort icon Discussion bug Image upload with broken thumbnail image Rmckeel 1 13 Aug 2012 - 08:22 Discussion bug "Ghost" entries Rmckeel 1 19 Jun 2012 - 08:05 Groups Menu You must login in order to post into this group. Recent content Thank you Jon, I know about th... Hi Yury-Thank you for your i... source code for OpenEI extensions Timo,My apologies for the ... Browse by region (RaphaelSVGMap) more Group members (19) Managers: Rmckeel Recent members: Yury Katkov Sangduen Timo.Kouwenhoven Jwkropf KingJahfy Graham7781 Ianjkalin Autumn1 Mvdv Sprzesmi Satish Cdonnelly Wzeng Twong Jayhuggins Jorn.aabakken Jweers NickL 429 Throttled (bot load) Error 429 Throttled (bot load) Throttled (bot load) Guru Meditation: XID: 2142253338

192

U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote 29: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access U-029: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access November 8, 2011 - 8:00am Addthis PROBLEM: TCP/IP Services for OpenVMS POP/IMAP Service Bug Lets Remote Users Gain Unauthorized Access. PLATFORM: HP TCP/IP Services for OpenVMS v5.6 and v5.7 on iTanium and ALPHA Servers. ABSTRACT: A remote user can gain unauthorized access reference LINKS: HP Support document ID: c01908983 SecurityTracker Alert ID: 1026279 CVE-2011-3168 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in TCP/IP Services for OpenVMS. A remote user can gain unauthorized access. On systems running POP or IMAP servers, a remote user can gain unauthorized access.

193

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

194

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

195

This Bug Man Is a Pest George Ledin teaches students how to write viruses, and it makes  

E-Print Network (OSTI)

's going on in Ledin's classroom. He has been likened to A.Q. Khan, the Pakistani scientist who sold--and the http://www.newsweek.com/2008/08/01/this-bug-man-is-a-pest.prin... 1 of 2 #12;hackers. "We've changed

Ravikumar, B.

196

U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users 5: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code U-265: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code September 21, 2012 - 6:00am Addthis PROBLEM: HP SiteScope Bugs in SiteScope SOAP Feature Let Remote Users Obtain Information and Execute Arbitrary Code PLATFORM: HP SiteScope v11.10, v11.11, v11.12 for Windows, Linux and Solaris ABSTRACT: A vulnerability was reported in HP SiteScope. reference LINKS: HP Security Bulletin Document ID: c03489683 SecurityTracker Alert ID: 1027547 CVE-2012-3259 CVE-2012-3260 CVE-2012-3261 CVE-2012-3262 CVE-2012-3263 CVE-2012-3264 IMPACT ASSESSMENT: Medium Discussion: A vulnerability was reported in HP SiteScope. A remote user can execute

197

U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny 32: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS U-232: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS August 10, 2012 - 7:00am Addthis PROBLEM: Xen p2m_teardown() Bug Lets Local Guest OS Users Deny Service on the Host OS PLATFORM: This vulnerability effects only Xen 4.0 and 4.1. Xen 3.4 and earlier and xen-unstable are not vulnerable. ABSTRACT: A vulnerability was reported in Xen. A local user on a guest operating system can cause denial of service conditions on the host. reference LINKS: Xen Security Announcements SecurityTracker Alert ID: 1027365 seclists.org CVE-2012-3433 IMPACT ASSESSMENT: Medium Discussion: An HVM guest is able to manipulate its physical address space such that tearing down the guest takes an extended period amount of time searching

198

NIST Image Gallery: Browse: Results  

Science Conference Proceedings (OSTI)

... Thumbnail, Gasoline-powered portable generators, created 3/2008, entered 3/4 ... Chemistry; Breast Cancer and Alcohol Consumption, created 2005 ...

199

NIST Image Gallery: Browse: Results  

Science Conference Proceedings (OSTI)

... Browsing by topic/category -- Energy--Solar, ... Thumbnail, Energy; Solar; Roof Photovoltaic Test Facility , created 6/22/2006, entered 6/22/2006. ...

200

NIST Image Gallery: Browse: Results  

Science Conference Proceedings (OSTI)

... Browsing by topic/category -- Quantum Physics--Biophysics, ... Thumbnail, Quantum Physics; Biophysics; Perkins, created 2002, entered 10/13/2004. ...

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

NIST Image Gallery: Browse: Results  

Science Conference Proceedings (OSTI)

... Browsing by topic/category -- Energy--Conservation, ... Thumbnail, Net Zero Energy Residential Test Facility, created 9/2012, entered 9/19/2012. ...

202

NIST Image Gallery: Browse: Results  

Science Conference Proceedings (OSTI)

... Thumbnail, Homeland Security; Emergency Response; Test Arena for Robots and Dogs; Millsaps, created 4/2005, entered 4/22/2005. ...

203

NIST Image Gallery: Browse: Results  

Science Conference Proceedings (OSTI)

... Thumbnail, Homeland Security; Chem, Bio, Other Threats; Gamma Ray Detector for Nuclear Inspections, created 3/16/2006, entered 3/22/2006. ...

204

NREL: Dynamic Maps, GIS Data, and Analysis Tools - Solar Maps  

NLE Websites -- All DOE Office Websites (Extended Search)

the Solar Maps Development - How the Maps Were Made page. Thumbnail image of the national solar photovoltaics (PV) resource potential in the United States map. Thumbnail image of...

205

Complete genome sequence of Coriobacterium glomerans type strain (PW2T) from the midgut of Pyrrhocoris apterus L. (red soldier bug)  

SciTech Connect

Coriobacterium glomerans Haas and Ko nig 1988, is the only species of the genus Coriobacterium, family Coriobacteriaceae, order Coriobacteriales, phylum Actinobacteria. The bacterium thrives as an endosymbiont of pyrrhocorid bugs, i.e. the red fire bug Pyrrhocoris apterus L. The rationale for sequencing the genome of strain PW2T is its endosymbiotic life style which is rare among members of Actinobacteria. Here we describe the features of this symbiont, together with the complete genome sequence and its annotation. This is the first complete genome sequence of a member of the genus Coriobacterium and the sixth member of the order Coriobacteriales for which complete genome sequences are now available. The 2,115,681 bp long single replicon genome with its 1,804 protein-coding and 54 RNA genes is part of the Genomic Encyclopedia of Bacteria and Archaea project.

Stackebrandt, Erko [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Zeytun, Ahmet [Los Alamos National Laboratory (LANL); Lapidus, Alla L. [U.S. Department of Energy, Joint Genome Institute; Nolan, Matt [U.S. Department of Energy, Joint Genome Institute; Lucas, Susan [U.S. Department of Energy, Joint Genome Institute; Hammon, Nancy [U.S. Department of Energy, Joint Genome Institute; Deshpande, Shweta [U.S. Department of Energy, Joint Genome Institute; Cheng, Jan-Fang [U.S. Department of Energy, Joint Genome Institute; Tapia, Roxanne [Los Alamos National Laboratory (LANL); Goodwin, Lynne A. [Los Alamos National Laboratory (LANL); Pitluck, Sam [U.S. Department of Energy, Joint Genome Institute; Liolios, Konstantinos [U.S. Department of Energy, Joint Genome Institute; Pagani, Ioanna [U.S. Department of Energy, Joint Genome Institute; Ivanova, N [U.S. Department of Energy, Joint Genome Institute; Mavromatis, K [U.S. Department of Energy, Joint Genome Institute; Mikhailova, Natalia [U.S. Department of Energy, Joint Genome Institute; Huntemann, Marcel [U.S. Department of Energy, Joint Genome Institute; Pati, Amrita [U.S. Department of Energy, Joint Genome Institute; Chen, Amy [U.S. Department of Energy, Joint Genome Institute; Palaniappan, Krishna [U.S. Department of Energy, Joint Genome Institute; Chang, Yun-Juan [ORNL; Land, Miriam L [ORNL; Hauser, Loren John [ORNL; Rohde, Manfred [HZI - Helmholtz Centre for Infection Research, Braunschweig, Germany; Pukall, Rudiger [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Goker, Markus [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany; Detter, J. Chris [U.S. Department of Energy, Joint Genome Institute; Woyke, Tanja [U.S. Department of Energy, Joint Genome Institute; Bristow, James [U.S. Department of Energy, Joint Genome Institute; Eisen, Jonathan [U.S. Department of Energy, Joint Genome Institute; Markowitz, Victor [U.S. Department of Energy, Joint Genome Institute; Hugenholtz, Philip [U.S. Department of Energy, Joint Genome Institute; Kyrpides, Nikos C [U.S. Department of Energy, Joint Genome Institute; Klenk, Hans-Peter [DSMZ - German Collection of Microorganisms and Cell Cultures GmbH, Braunschweig, Germany

2013-01-01T23:59:59.000Z

206

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... Image Gallery : Image Details. 72 DPI Image 150 DPI Image No 300 DPI Version. Title: Frequency Comb, Ultrafast Laser. ...

207

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... Image Gallery : Image Details. 72 DPI Image 150 DPI Image No 300 DPI Version. Title: Iron-Based Superconductors. Description ...

208

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... Image Gallery : Image Details. 72 DPI Image 150 DPI Image No 300 DPI Version. Title: Space Weather Forecasts. Description ...

209

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... Image Gallery : Image Details. 72 DPI Image 150 DPI Image No 300 DPI Version. Title: Organic Solar Power. Description ...

210

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... 72 DPI Image © 150 DPI Image © 300 DPI Image ©. Title: Nanotechnology; Biotechnology/Health; Nanocrystals; Hwang. ...

211

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... 72 DPI Image © 150 DPI Image © 300 DPI Image ©. Title: Quantum Physics; Quantum Communications; Ultrafast Photon Detector; Nam. ...

212

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... 72 DPI Image © 150 DPI Image © 300 DPI Image ©. Title: Scanning Electron Microscope with Spin Polarization Analysis. ...

213

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... 72 DPI Image © 150 DPI Image © 300 DPI Image ©. Title: Metrology, Basic Units; Mass; Electronic Kilogram. Description ...

214

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... 72 DPI Image © 150 DPI Image © 300 DPI Image ©. Title: Energy; Fossil Fuels;Distillation Curves for Complex Fuel Mixtures. ...

215

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... nist.gov. 72 DPI Image © 150 DPI Image © 300 DPI Image ©. Title: Public safety & Smart Grid. Description: Electrical engineer ...

216

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... Image Gallery : Image Details. 72 DPI Image No 150 DPI Version 300 DPI Image. Title: Ultrafast Laser Speeds Up Quest for Atomic Control. ...

217

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... 72 DPI Image © 150 DPI Image © 300 DPI Image ©. Title: New Imaging Tool is Boon to Fuel Cell Research. Description: NIST ...

218

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... Image Gallery : Image Details. 72 DPI Image 150 DPI Image No 300 DPI Version. Title: House; Trees. Description: *BFRL. Subjects (names): ...

219

Bugs, Drugs & Smoke  

E-Print Network (OSTI)

burden of drug-resistant TB, including four – China, India,on drug-resistant TB organized by WHO in Beijing, China, inChina, the Democratic Republic of the Congo, Estonia, Ethiopia, Georgia, India, Indonesia, in new drug-

WHO

2012-01-01T23:59:59.000Z

220

Bugs, Drugs & Smoke  

E-Print Network (OSTI)

27 such countries: Armenia, Azerbaijan, Bangladesh, Belarus,independent states, such as Azerbaijan, the Republic of49 avian influenza 126 Azerbaijan 114 B bacille Calmette–

WHO

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

What Did They Do in IEA 34/43? Or How to Diagnose and Repair Bugs in 500,000 Lines of Code: Preprint  

NLE Websites -- All DOE Office Websites (Extended Search)

4978 4978 June 2009 What Did They Do in IEA 34/43? Or How to Diagnose and Repair Bugs in 500,000 Lines of Code Preprint R. Judkoff National Renewable Energy Laboratory J. Neymark J. Neymark & Associates To be presented at the Building Simulation 2009 Conference Glasgow, Scotland 27-30 July 2009 NOTICE The submitted manuscript has been offered by an employee of the Alliance for Sustainable Energy, LLC (ASE), a contractor of the US Government under Contract No. DE-AC36-08-GO28308. Accordingly, the US Government and ASE retain a nonexclusive royalty-free license to publish or reproduce the published form of this contribution, or allow others to do so, for US Government purposes. This report was prepared as an account of work sponsored by an agency of the United States government.

222

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... 72 DPI Image © 150 DPI Image © 300 DPI Image ©. Title: Homeland Security; Chem., Bio, and Other Threats; Standards for Radiation Detection. ...

223

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... 72 DPI Image © 150 DPI Image © 300 DPI Image ©. Title: Iron-based and Copper-Oxide High-Temperature Superconductors. ...

224

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... Image Gallery : Image Details. No 72 DPI Version No 150 DPI Version 300 DPI Image. Title: Gold Nano Anchors Put Nanowires in Their Place. ...

225

NREL: Dynamic Maps, GIS Data, and Analysis Tools - Wind Maps  

NLE Websites -- All DOE Office Websites (Extended Search)

shore annual wind resource potential in the United States map. Thumbnail image of the 90m offshore wind resource potential in the United States. Thumbnail image of the national 50m...

226

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... 72 DPI Image 150 DPI Image No 300 DPI Version. Title: NIST Finds that Ethanol-Loving Bacteria Accelerate Cracking of Pipeline Steels. ...

227

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... Title: Scanning tunneling microscope; Semiconductor; Spintronics. Description: [Left] A high resolution STM image of a manganese ...

228

SPIE Medical Imaging Medical Imaging  

E-Print Network (OSTI)

1 SPIE Medical Imaging 2006 1 Medical Imaging Fundamentals Kenneth H. Wong, Ph.D. Division of Computer Assisted Interventions and Medical Robotics (CAIMR) Imaging Science and Information Systems (ISIS) Center Department of Radiology Georgetown University SPIE Medical Imaging 2006 2 Main Themes · Describe

Miga, Michael I.

229

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... Title: Nanotechnology--Nanomanufacturing; Optical Nano Vision. Description: A new optical imaging technology under ...

230

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... Title: Carbon Nanotube Measurements. Description: Scanning electron microscope image of 'cleaned' carbon nanotubes at NIST (color added for ...

231

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... Description: Engineering design image shows a cross-section of part of the planned ITER fusion reaction vessel. Diverter ...

232

Image Resources  

NLE Websites -- All DOE Office Websites (Extended Search)

Mosaic of earth and sky images Mosaic of earth and sky images Image Resources Free image resources covering energy, environment, and general science. Here are some links to energy- and environment-related photographic databases. Berkeley Lab Photo Archive Berkeley Lab's online digital image collection. National Science Digital Library (NSDL) NSDL is the Nation's online library for education and research in science, technology, engineering, and mathematics. The World Bank Group Photo Library A distinctive collection of over 11,000 images that illustrate development through topics such as Agriculture, Education, Environment, Health, Trade and more. Calisphere Compiles the digital collections of libraries, museums, and cultural heritage organizations across California, and organizes them by theme, such

233

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... on the availability of this image. Title: Tiny Tubes May Aid Pharmacuetical R&D. Description: NIST scientists used pairs of ...

234

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... Magneto-optical image of magnetic fields within a YBCO superconductor showing electrically ... PHY, High-Temp Superconductors See also http ...

235

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... Title: New Imaging Tool is Boon to Fuel Cell Research. ... water being produced and removed inside the maze-like solid housing of fuel cells under a ...

236

Nanometric Optical Imaging Frontiers in Chemical Imaging  

E-Print Network (OSTI)

Nanometric Optical Imaging Frontiers in Chemical Imaging Seminar Series Presented by... Professor thermal imaging, chemical delivery and other new horizons. Finally, as part of this lecture, Lewis

237

Images, Video, & More  

NLE Websites -- All DOE Office Websites (Extended Search)

Images, Video, & More Images BABAR Design drawings SLAC Image Gallery: BABAR SLAC Image Gallery: Aerial photos Videos Public lecture on "ANTIMATTER: What is it and where did it...

238

Symplectic Integrator Mercury: Bug Report  

E-Print Network (OSTI)

We report on a problem found in MERCURY, a hybrid symplectic integrator used for dynamical problems in Astronomy. The variable that keeps track of bodies' statuses is uninitialised, which can result in bodies disappearing from simulations in a non-physical manner. Some FORTRAN compilers implicitly initialise variables, preventing simulations from having this problem. With other compilers, simulations with a suitably large maximum number of bodies parameter value are also unaffected. Otherwise, the problem manifests at the first event after the integrator is started, whether from scratch or continuing a previously stopped simulation. Although the problem does not manifest in some conditions, explicitly initialising the variable solves the problem in a permanent and unconditional manner.

K. de Souza Torres; D. R. Anderson

2008-08-04T23:59:59.000Z

239

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... from the bright glare in the distance transmit images of a cat-like face at ... Though false color has been added to the cats faces, they are otherwise ...

240

NIST Image Gallery: Image Details  

Science Conference Proceedings (OSTI)

... a href http://www.nist.gov/public_affairs/images/Nanopore 20device.avi See video /a PHY, DARPA, spectroscopy See also http://www.nist.gov/pml ...

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Imaging bolometer  

DOE Patents (OSTI)

Radiation-hard, steady-state imaging bolometer. A bolometer employing infrared (IR) imaging of a segmented-matrix absorber of plasma radiation in a cooled-pinhole camera geometry is described. The bolometer design parameters are determined by modeling the temperature of the foils from which the absorbing matrix is fabricated by using a two-dimensional time-dependent solution of the heat conduction equation. The resulting design will give a steady-state bolometry capability, with approximately 100 Hz time resolution, while simultaneously providing hundreds of channels of spatial information. No wiring harnesses will be required, as the temperature-rise data will be measured via an IR camera. The resulting spatial data may be used to tomographically investigate the profile of plasmas.

Wurden, Glen A. (Los Alamos, NM)

1999-01-01T23:59:59.000Z

242

Imaging bolometer  

DOE Patents (OSTI)

Radiation-hard, steady-state imaging bolometer is disclosed. A bolometer employing infrared (IR) imaging of a segmented-matrix absorber of plasma radiation in a cooled-pinhole camera geometry is described. The bolometer design parameters are determined by modeling the temperature of the foils from which the absorbing matrix is fabricated by using a two-dimensional time-dependent solution of the heat conduction equation. The resulting design will give a steady-state bolometry capability, with approximately 100 Hz time resolution, while simultaneously providing hundreds of channels of spatial information. No wiring harnesses will be required, as the temperature-rise data will be measured via an IR camera. The resulting spatial data may be used to tomographically investigate the profile of plasmas. 2 figs.

Wurden, G.A.

1999-01-19T23:59:59.000Z

243

Energy Education & Workforce Development: Energy Literacy: Essential...  

NLE Websites -- All DOE Office Websites (Extended Search)

Literacy: Essential Principles and Fundamental Concepts for Energy Education A thumbnail image of the cover of the Energy Literacy booklet. Download the guide: High Resolution Low...

244

EERE Publication and Product Library  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

& Share View Related Latest Additions Product Thumbnail Image Low-Temperature Geothermal Projects Nationwide Poster of low-temperature and co-produced geothermal projects...

245

FM DANTE fast imaging and variations: emerging rf-based ultrafast imaging techniques  

Science Conference Proceedings (OSTI)

Keywords: DANTE fast imaging, NMR, burst imaging, fast chemical shift imaging, fast imaging, fast spectroscopic imaging, fast susceptibility imaging

Z. H. Cho; Y. M. Ro; I. K. Hong

1998-01-01T23:59:59.000Z

246

Split image optical display  

DOE Patents (OSTI)

A video image is displayed from an optical panel by splitting the image into a plurality of image components, and then projecting the image components through corresponding portions of the panel to collectively form the image. Depth of the display is correspondingly reduced.

Veligdan, James T. (Manorville, NY)

2007-05-29T23:59:59.000Z

247

Multicolor Underwater Imaging Techniques.  

E-Print Network (OSTI)

??Studies were conducted on multispectral polarimetric subtraction imaging techniques for underwater imaging that use a broadband light source. The main objective of this study was… (more)

Waggoner, Douglas Scott

2007-01-01T23:59:59.000Z

248

Mining partially annotated images  

Science Conference Proceedings (OSTI)

In this paper, we study the problem of mining partially annotated images. We first define what the problem of mining partially annotated images is, and argue that in many real-world applications annotated images are typically partially annotated and ... Keywords: image annotation completion and prediction, partially annotated training set, semi-supervised learning

Zhongang Qi; Ming Yang; Zhongfei (Mark) Zhang; Zhengyou Zhang

2011-08-01T23:59:59.000Z

249

Seismic Imaging and Monitoring  

SciTech Connect

I give an overview of LANL's capability in seismic imaging and monitoring. I present some seismic imaging and monitoring results, including imaging of complex structures, subsalt imaging of Gulf of Mexico, fault/fracture zone imaging for geothermal exploration at the Jemez pueblo, time-lapse imaging of a walkway vertical seismic profiling data for monitoring CO{sub 2} inject at SACROC, and microseismic event locations for monitoring CO{sub 2} injection at Aneth. These examples demonstrate LANL's high-resolution and high-fidelity seismic imaging and monitoring capabilities.

Huang, Lianjie [Los Alamos National Laboratory

2012-07-09T23:59:59.000Z

250

Seismic Imaging and Monitoring  

SciTech Connect

I give an overview of LANL's capability in seismic imaging and monitoring. I present some seismic imaging and monitoring results, including imaging of complex structures, subsalt imaging of Gulf of Mexico, fault/fracture zone imaging for geothermal exploration at the Jemez pueblo, time-lapse imaging of a walkway vertical seismic profiling data for monitoring CO{sub 2} inject at SACROC, and microseismic event locations for monitoring CO{sub 2} injection at Aneth. These examples demonstrate LANL's high-resolution and high-fidelity seismic imaging and monitoring capabilities.

Huang, Lianjie [Los Alamos National Laboratory

2012-07-09T23:59:59.000Z

251

Manhattan Project: Trinity Images  

Office of Scientific and Technical Information (OSTI)

IMAGES IMAGES Trinity Test Site (July 16, 1945) Resources > Photo Gallery The first 0.11 seconds of the Nuclear Age These seven photographs of the Trinity test were taken by time-lapse cameras. The last is 109 milliseconds, or 0.109 seconds, after detonation. Scroll down to view each individual image. The photographs are courtesy the Los Alamos National Laboratory, via the Federation of American Scientists web site. The animation is original to the Office of History and Heritage Resources. The dawn of the Nuclear Age (Trinity image #1) The dawn of the Nuclear Age Trinity image #2 Trinity image #3 Trinity image #4 Trinity image #5 Trinity, 0.09 seconds after detonation (Trinity image #6) Trinity, 0.09 seconds after detonation Trinity, 0.11 seconds after detonation (Trinity image #7)

252

Web accessible image similarity measurements  

Science Conference Proceedings (OSTI)

Web accessible image similarity measurements. Background: There ... messages). Web Access to Image Similarity Measurements. ...

2013-04-16T23:59:59.000Z

253

Image registration method for medical image sequences  

DOE Patents (OSTI)

Image registration of low contrast image sequences is provided. In one aspect, a desired region of an image is automatically segmented and only the desired region is registered. Active contours and adaptive thresholding of intensity or edge information may be used to segment the desired regions. A transform function is defined to register the segmented region, and sub-pixel information may be determined using one or more interpolation methods.

Gee, Timothy F.; Goddard, James S.

2013-03-26T23:59:59.000Z

254

Estimation theoretical image restoration  

E-Print Network (OSTI)

In this thesis, we have developed an extensive study to evaluate image restoration from a single image, colored or monochromatic. Using a mixture of Gaussian and Poisson noise process, we derived an objective function to ...

Dolne, Jean J

2008-01-01T23:59:59.000Z

255

Synthetic stereoscopic panoramic images  

Science Conference Proceedings (OSTI)

Presented here is a discussion of the techniques required to create stereoscopic panoramic images. Such images allow interactive exploration of 3D environments with stereoscopic depth cues. If projected in a surround display environment they can engage ...

Paul Bourke

2006-10-01T23:59:59.000Z

256

Nuclear Imaging instrumentation  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Imaging instrumentation Advances in gamma-ray detection and imaging have increased the pace of discovery in a broad cross-section of the sciences ranging from nuclear...

257

Spectrographic imaging system  

DOE Patents (OSTI)

An imaging system for providing spectrographically resolved images. The system incorporates a one-dimensional spatial encoding mask which enables an image to be projected onto a two-dimensional image detector after spectral dispersion of the image. The dimension of the image which is lost due to spectral dispersion on the two-dimensional detector is recovered through employing a reverse transform based on presenting a multiplicity of different spatial encoding patterns to the image. The system is especially adapted for detecting Raman scattering of monochromatic light transmitted through or reflected from physical samples. Preferably, spatial encoding is achieved through the use of Hadamard mask which selectively transmits or blocks portions of the image from the sample being evaluated.

Morris, Michael D. (Ann Arbor, MI); Treado, Patrick J. (Ann Arbor, MI)

1991-01-01T23:59:59.000Z

258

NIST Image Gallery: Search  

Science Conference Proceedings (OSTI)

... Search Tips - Search index includes image titles, descriptions, other text fields - Searches are case-insensitive - Keyword2 is optional. ...

259

Cell Image Visualization  

Science Conference Proceedings (OSTI)

... Biological cell image analysis projects include methods to measure cell segmentation accuracy and new segmentation methods to track live cells. ...

2011-06-17T23:59:59.000Z

260

Video image position determination  

DOE Patents (OSTI)

An optical beam position controller in which a video camera captures an image of the beam in its video frames, and conveys those images to a processing board which calculates the centroid coordinates for the image. The image coordinates are used by motor controllers and stepper motors to position the beam in a predetermined alignment. In one embodiment, system noise, used in conjunction with Bernoulli trials, yields higher resolution centroid coordinates.

Christensen, Wynn (Los Alamos, NM); Anderson, Forrest L. (Bernalillo, NM); Kortegaard, Birchard L. (Los Alamos, NM)

1991-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Imaging with Scattered Neutrons  

E-Print Network (OSTI)

We describe a novel experimental technique for neutron imaging with scattered neutrons. These scattered neutrons are of interest for condensed matter physics, because they permit to reveal the local distribution of incoherent and coherent scattering within a sample. In contrast to standard attenuation based imaging, scattered neutron imaging distinguishes between the scattering cross section and the total attenuation cross section including absorption. First successful low-noise millimeter-resolution images by scattered neutron radiography and tomography are presented.

H. Ballhausen; H. Abele; R. Gaehler; M. Trapp; A. Van Overberghe

2006-10-30T23:59:59.000Z

262

Document Imaging | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Document Imaging Document Imaging Employee Services Cafeterias Conferencing and Special Events Copy Services Document Imaging Exchange Visitors Program Facility Operations Food...

263

Medical imaging systems  

Science Conference Proceedings (OSTI)

A medical imaging system provides simultaneous rendering of visible light and diagnostic or functional images. The system may be portable, and may include adapters for connecting various light sources and cameras in open surgical environments or laparascopic or endoscopic environments. A user interface provides control over the functionality of the integrated imaging system. In one embodiment, the system provides a tool for surgical pathology.

Frangioni, John V

2013-06-25T23:59:59.000Z

264

Near-Electrode Imager  

DOE Patents (OSTI)

An apparatus, near-electrode imager, for employing nuclear magnetic resonance imaging to provide in situ measurements of electrochemical properties of a sample as a function of distance from a working electrode. The near-electrode imager use the radio frequency field gradient within a cylindrical toroid cavity resonator to provide high-resolution nuclear magnetic resonance spectral information on electrolyte materials.

Rathke, Jerome W.; Klingler, Robert J.; Woelk, Klaus; Gerald, Rex E.,II

1999-05-01T23:59:59.000Z

265

Acoustic Imaging Suite  

INL’s acoustic imaging technology improves methods of capturing moving images of a specified object by using a photorefractive effect to produce a full-field image of the object without using a probe to perform a full scan of the object. INL ...

266

Diagnostic Imaging Emergency Medicine  

E-Print Network (OSTI)

UC Davis Veterinary Diagnostic Imaging Symposium Emergency Medicine May 15, 2011 Gladys Valley Hall devoted to triage, assessment, and imaging diagnostics in emergency medicine. Speakers in this year's symposium include specialists in diagnostic imaging, and emergency and critical care. Sunday May 15, 2011 8

Hammock, Bruce D.

267

Shape-based image retrieval applied to trademark images  

Science Conference Proceedings (OSTI)

In this chapter, we propose a new shape-based, query-by-example, image database retrieval method that is able to match a query image to one of the images in the database, based on a whole or partial match. The proposed method has two key components: ... Keywords: image databases, shape analysis, shape representation, shape-based image retrieval, trademark image retrieval

Ossama El Badawy; Mohamed Kamel

2004-01-01T23:59:59.000Z

268

SNAP Image Gallery  

NLE Websites -- All DOE Office Websites (Extended Search)

Images Images Cutaway image of SNAP A cutaway illustration of SNAP showing some of the interior optics. Cutaway image of SNAP A computer generated cutaway illustration of SNAP Cutaway image of SNAP's primary mirror A computer generated cutaway illustration of SNAP's primary mirror image of SNAP spacecraft A computer generated illustration of the SNAP spacecraft computer generated image of SNAP A computer generated illustration of SNAP Before-and-after pictures (and Hubble Space Telescope picture) of a high-redshift supernovae discovered by the Supernova Cosmology Project in March, 1998. Before-and-after pictures (and Hubble Space Telescope picture) of a high-redshift supernovae discovered in March, 1998. This observaton showed that the expansion of the universe was accelerarting. Credit: High Redshift Supernova Search Supernova Cosmology Project

269

Similarity Retrieval of Trademark Images  

Science Conference Proceedings (OSTI)

The Artisan system retrieves abstract trademark images by shape similarity. It analyzes each image to characterize key shape components, grouping image regions into families that potentially mirror human image perception, and then derives characteristic ...

John P. Eakins; Jago M. Boardman; Margaret E. Graham

1998-04-01T23:59:59.000Z

270

ARM - Measurement - Hydrometeor image  

NLE Websites -- All DOE Office Websites (Extended Search)

image image ARM Data Discovery Browse Data Comments? We would love to hear from you! Send us a note below or call us at 1-888-ARM-DATA. Send Measurement : Hydrometeor image Images of hydrometeors from which one can derive characteristics such as size and shape. Categories Cloud Properties Instruments The above measurement is considered scientifically relevant for the following instruments. Refer to the datastream (netcdf) file headers of each instrument for a list of all available measurements, including those recorded for diagnostic or quality assurance purposes. Field Campaign Instruments LEARJET : Lear Jet PARTIMG : Particle imager UAV-PROTEUS-MICRO : Proteus Cloud Microphysics Instruments SPEC-CPI : Stratton Park Engineering Company - Cloud particle imager UAV-PROTEUS : UAV Proteus

271

Video Toroid Cavity Imager  

DOE Patents (OSTI)

A video toroid cavity imager for in situ measurement of electrochemical properties of an electrolytic material sample includes a cylindrical toroid cavity resonator containing the sample and employs NMR and video imaging for providing high-resolution spectral and visual information of molecular characteristics of the sample on a real-time basis. A large magnetic field is applied to the sample under controlled temperature and pressure conditions to simultaneously provide NMR spectroscopy and video imaging capabilities for investigating electrochemical transformations of materials or the evolution of long-range molecular aggregation during cooling of hydrocarbon melts. The video toroid cavity imager includes a miniature commercial video camera with an adjustable lens, a modified compression coin cell imager with a fiat circular principal detector element, and a sample mounted on a transparent circular glass disk, and provides NMR information as well as a video image of a sample, such as a polymer film, with micrometer resolution.

Gerald, Rex E. II; Sanchez, Jairo; Rathke, Jerome W.

2004-08-10T23:59:59.000Z

272

Video image position determination  

DOE Patents (OSTI)

The present invention generally relates to the control of video and optical information and, more specifically, to control systems utilizing video images to provide control. Accurate control of video images and laser beams is becoming increasingly important as the use of lasers for machine, medical and experimental processes escalates. In, AURORA, an installation at Los Alamos National Laboratory dedicated to laser fusion research, it is necessary to precisely control the path and angle of up to 96 lasers beams. This invention is comprised of an optical beam position controller in which a video camera captures an image of the beam in its video frames, and conveys those images to a processing board which calculates the centroid coordinates for the image. The image coordinates are used by motor controllers and stepper motors to position the beam in a predetermined alignment. In one embodiment, system noise, used in conjunction with Bernoulli trials, yields higher resolution centroid coordinates.

Christensen, W.; Anderson, F.L.; Kortegaard, B.L.

1990-01-01T23:59:59.000Z

273

Video image position determination  

DOE Patents (OSTI)

The present invention generally relates to the control of video and optical information and, more specifically, to control systems utilizing video images to provide control. Accurate control of video images and laser beams is becoming increasingly important as the use of lasers for machine, medical and experimental processes escalates. In, AURORA, an installation at Los Alamos National Laboratory dedicated to laser fusion research, it is necessary to precisely control the path and angle of up to 96 lasers beams. This invention is comprised of an optical beam position controller in which a video camera captures an image of the beam in its video frames, and conveys those images to a processing board which calculates the centroid coordinates for the image. The image coordinates are used by motor controllers and stepper motors to position the beam in a predetermined alignment. In one embodiment, system noise, used in conjunction with Bernoulli trials, yields higher resolution centroid coordinates.

Christensen, W.; Anderson, F.L.; Kortegaard, B.L.

1990-12-31T23:59:59.000Z

274

'Combinatorial' Approach Squashes Software Bugs Faster ...  

Science Conference Proceedings (OSTI)

... combinatorial testing.” The NIST-Texas tool, described at a recent conference,* could save software developers significant time and money when it ...

2013-09-26T23:59:59.000Z

275

'Bugs' used to treat FGD wastewater  

SciTech Connect

Tough regulation of heavy metals may justify a bioreactor approach in addition to chemical treatment of FGD wastewater. Two of Duke Energy' coal-fired plants, Belews Creek and Allen (in North Carolina) have installed new biological reactor systems to increase selenium removal to levels not achievable by existing scrubber waste water systems. The ABMet system removes nitrate and selenium in a single step. Progress Energy has installed the system at Roxboro and Mayo Stations, also in North Carolina. 1 fig., 2 photos.

Blankinship, S.

2009-09-15T23:59:59.000Z

276

Predicting software bugs using ARIMA model  

Science Conference Proceedings (OSTI)

The number of software products available in market is increasing rapidly. Many a time, multiple companies develop software products of similar functionalities. Thus the competition among those owning companies is becoming tougher every day. Moreover, ... Keywords: ARIMA models, evaluation approach, information theory, prediction models

Lisham L. Singh; Al Muhsen Abbas; Flaih Ahmad; Srinivasan Ramaswamy

2010-04-01T23:59:59.000Z

277

Ferroelectric optical image comparator  

DOE Patents (OSTI)

A ferroelectric optical image comparator has a lead lanthanum zirconate titanate thin-film device which is constructed with a semi-transparent or transparent conductive first electrode on one side of the thin film, a conductive metal second electrode on the other side of the thin film, and the second electrode is in contact with a nonconducting substrate. A photoinduced current in the device represents the dot product between a stored image and an image projected onto the first electrode. One-dimensional autocorrelations are performed by measuring this current while displacing the projected image. 7 figures.

Butler, M.A.; Land, C.E.; Martin, S.J.; Pfeifer, K.B.

1993-11-30T23:59:59.000Z

278

Ferroelectric optical image comparator  

DOE Patents (OSTI)

A ferroelectric optical image comparator has a lead lanthanum zirconate titanate thin-film device which is constructed with a semi-transparent or transparent conductive first electrode on one side of the thin film, a conductive metal second electrode on the other side of the thin film, and the second electrode is in contact with a nonconducting substrate. A photoinduced current in the device represents the dot product between a stored image and an image projected onto the first electrode. One-dimensional autocorrelations are performed by measuring this current while displacing the projected image.

Butler, Michael A. (Albuquerque, NM); Land, Cecil E. (Albuquerque, NM); Martin, Stephen J. (Albuquerque, NM); Pfeifer, Kent B. (Los Lunas, NM)

1993-01-01T23:59:59.000Z

279

Image Shift Measurement  

Science Conference Proceedings (OSTI)

... Set the write directory to a new folder for the cropped images. Use Process Folder / Text file / Template to make the boiler plate processing file. ...

280

Imaging Beyond Optics  

NLE Websites -- All DOE Office Websites (Extended Search)

Views" piece in that same issue. "Generations of astronomers have used interferometric tests to achieve the proper shape of their mirrors before using them to image the heavens....

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Quantitative luminescence imaging system  

DOE Patents (OSTI)

The QLIS images and quantifies low-level chemiluminescent reactions in an electromagnetic field. It is capable of real time nonperturbing measurement and simultaneous recording of many biochemical and chemical reactions such as luminescent immunoassays or enzyme assays. The system comprises image transfer optics, a low-light level digitizing camera with image intensifying microchannel plates, an image process or, and a control computer. The image transfer optics may be a fiber image guide with a bend, or a microscope, to take the light outside of the RF field. Output of the camera is transformed into a localized rate of cumulative digitalized data or enhanced video display or hard-copy images. The system may be used as a luminescent microdosimetry device for radiofrequency or microwave radiation, as a thermal dosimeter, or in the dosimetry of ultra-sound (sonoluminescence) or ionizing radiation. It provides a near-real-time system capable of measuring the extremely low light levels from luminescent reactions in electromagnetic fields in the areas of chemiluminescence assays and thermal microdosimetry, and is capable of near-real-time imaging of the sample to allow spatial distribution analysis of the reaction. It can be used to instrument three distinctly different irradiation configurations, comprising (1) RF waveguide irradiation of a small Petri-dish-shaped sample cell, (2) RF irradiation of samples in a microscope for the microscopie imaging and measurement, and (3) RF irradiation of small to human body-sized samples in an anechoic chamber.

Erwin, David N. (San Antonio, TX); Kiel, Johnathan L. (San Antonio, TX); Batishko, Charles R. (West Richland, WA); Stahl, Kurt A. (Richland, WA)

1990-01-01T23:59:59.000Z

282

Quantitative luminescence imaging system  

DOE Patents (OSTI)

The QLIS images and quantifies low-level chemiluminescent reactions in an electromagnetic field. It is capable of real time nonperturbing measurement and simultaneous recording of many biochemical and chemical reactions such as luminescent immunoassays or enzyme assays. The system comprises image transfer optics, a low-light level digitizing camera with image intensifying microchannel plates, an image process or, and a control computer. The image transfer optics may be a fiber image guide with a bend, or a microscope, to take the light outside of the RF field. Output of the camera is transformed into a localized rate of cumulative digitalized data or enhanced video display or hard-copy images. The system may be used as a luminescent microdosimetry device for radiofrequency or microwave radiation, as a thermal dosimeter, or in the dosimetry of ultra-sound (sonoluminescence) or ionizing radiation. It provides a near-real-time system capable of measuring the extremely low light levels from luminescent reactions in electromagnetic fields in the areas of chemiluminescence assays and thermal microdosimetry, and is capable of near-real-time imaging of the sample to allow spatial distribution analysis of the reaction. It can be used to instrument three distinctly different irradiation configurations, comprising (1) RF waveguide irradiation of a small Petri-dish-shaped sample cell, (2) RF irradiation of samples in a microscope for the microscopic imaging and measurement, and (3) RF irradiation of small to human body-sized samples in an anechoic chamber. 22 figs.

Erwin, D.N.; Kiel, J.L.; Batishko, C.R.; Stahl, K.A.

1990-08-14T23:59:59.000Z

283

Kursk Site Image #1  

NLE Websites -- All DOE Office Websites (Extended Search)

Graphs Image KRS-1: Clipping above-ground biomass at the Kursk grassland site, Russia. (Dr. Kira Khodashova and student Nina N., Moscow State University, are estimating monthly...

284

Manhattan Project: Places Images  

Office of Scientific and Technical Information (OSTI)

PLACES IMAGES PLACES IMAGES Resources > Photo Gallery Scroll down to see each of these images individually. The images are: 1. Remains of a Shinto Shrine, Nagasaki, October 1945 (courtesy the United States Marine Corps, Lieutenant R. J. Battersby, photographer, via the National Archives); 2. University of California, Berkeley, 1940 (courtesy the Lawrence Berkeley National Laboratory); 3. Aerial photograph of the Trinity Site after the test (courtesy the Federation of American Scientists); 4. Aerial photograph of Hiroshima before the bombing; 5. Columbia University, 1903 (courtesy the Library of Congress; this photograph originated from the Detroit Publishing Company; it was a 1949 gift to the Library of Congress from the State Historical Society of Colorado).

285

Automatic Image Orientation Determination with Natural Image Statistics  

E-Print Network (OSTI)

Automatic Image Orientation Determination with Natural Image Statistics Siwei Lyu Dept. of Computer a new method for automatically determining image orientations. This method is based on a set of natural image statistics collected from a multi- scale multi-orientation image decomposition (e.g., wavelets

Lyu, Siwei

286

Quantum Imaging: Enhanced Image Formation Using Quantum States of Light  

E-Print Network (OSTI)

Quantum Imaging: Enhanced Image Formation Using Quantum States of Light Robert W. Boyd, Kam Wai, University of Rochester, Rochester, NY 14627, USA ABSTRACT We review recent research in the field of quantum imaging. Quantum imaging deals with the formation of images that possess higher resolution or better

Boyd, Robert W.

287

Medical imaging systems  

DOE Patents (OSTI)

A medical imaging system provides simultaneous rendering of visible light and fluorescent images. The system may employ dyes in a small-molecule form that remains in a subject's blood stream for several minutes, allowing real-time imaging of the subject's circulatory system superimposed upon a conventional, visible light image of the subject. The system may also employ dyes or other fluorescent substances associated with antibodies, antibody fragments, or ligands that accumulate within a region of diagnostic significance. In one embodiment, the system provides an excitation light source to excite the fluorescent substance and a visible light source for general illumination within the same optical guide that is used to capture images. In another embodiment, the system is configured for use in open surgical procedures by providing an operating area that is closed to ambient light. More broadly, the systems described herein may be used in imaging applications where a visible light image may be usefully supplemented by an image formed from fluorescent emissions from a fluorescent substance that marks areas of functional interest.

Frangioni, John V. (Wayland, MA)

2012-07-24T23:59:59.000Z

288

DOUBLE MAJORS Imaging Science + ...  

E-Print Network (OSTI)

DOUBLE MAJORS Imaging Science + ... Applied Mathematics Biomedical Sciences Computer Science Undergraduate Research Internships and Cooperative Education (Co-op) (optional) Study Abroad WHY IMAGING SCIENCE Science: BS, MS, PhD Color Science: MS, PhD BS + MS/PhD Combos HUMAN VISION BIO- MEDICAL ASTRO- PHYSICS

Zanibbi, Richard

289

Heart imaging method  

DOE Patents (OSTI)

A method for providing an image of the human heart's electrical system derives time-of-flight data from an array of EKG electrodes and this data is transformed into phase information. The phase information, treated as a hologram, is reconstructed to provide an image in one or two dimensions of the electrical system of the functioning heart.

Collins, H. Dale (Richland, WA); Gribble, R. Parks (Richland, WA); Busse, Lawrence J. (Littleton, CO)

1991-01-01T23:59:59.000Z

290

User Science Images  

NLE Websites -- All DOE Office Websites (Extended Search)

User Science Images User Science Images User Science Images Sort by: Default | Name | Date (low-high) | Date (high-low) | Category NIMROD-1.png FES: NIMROD Simulation February 18, 2010 | Author(s): Dr. Charlson C. Kim (University of Washington) | Category: Fusion Energy | URL: https://nimrodteam.org/ Download Image: NIMROD-1.png | png | 1.5 MB Trajectory of an energetic ion in a Field Reverse Configuration (FRC) magnetic field. Magnetic separatrix denoted by green surface. Spheres are colored by azimuthal velocity. Image courtesy of Charlson Kim, University of Washington; NERSC repos m487, mp21, m1552 Scheibe.png BER: Pore-Scale Fluid Flow for Subsurface Reactive Transport January 1, 2008 | Author(s): Timothy D. Scheibe, PNNL | Category: Environmental Science | URL: http://http://subsurface.pnl.gov/

291

Manhattan Project: Image Retouching`  

Office of Scientific and Technical Information (OSTI)

Image Retouching Image Retouching Resources > Photo Gallery Smyth Report (original) Smyth Report (retouched) Images on this web site have sometimes been "retouched." In every case, however, the intention has been only to restore the image as much as possible to its original condition. Above is a rather extreme example-"before and after" versions of the cover of the Smyth Report (Henry DeWolf Smyth, Atomic Energy for Military Purposes: The Official Report on the Development of the Atomic Bomb under the Auspices of the United States Government, 1940-1945 (Princeton, NJ: Princeton University Press, 1945)). The Smyth Report was commissioned by Leslie Groves and originally issued by the Manhattan Engineer District. Princeton University Press reprinted it in book form as a "public service" with "reproduction in whole or in part authorized and permitted.") Larger versions of the same images are below.

292

GTL Image Gallery  

NLE Websites -- All DOE Office Websites (Extended Search)

Human Genome Project Information • Genomic Science • Microbial Genome Program • sitemap • home Human Genome Project Information • Genomic Science • Microbial Genome Program • sitemap • home Announcing the New Image Gallery Visit the new Image Gallery for an expanded suite of images Biofuels Browse the 2010 "Bioenergy Research Centers: An Overview of the Science" Brochure Gallery. Browse the 2006 "Breaking the Biological Barriers to Cellulosic Ethanol: A Joint Research Agenda" Report Gallery. Browse more biofuels images (includes the June 2006 "Understanding Biomass" Primer Gallery). Systems Biology Browse the August 2005 "Genomics:GTL Roadmap: Systems Biology for Energy and Environment" Gallery. Basic Genomics Browse the Human Chromosome Gallery. Browse more Basic Genomics images. Carbon Cycling

293

Efficient Graffiti Image Retrieval  

Science Conference Proceedings (OSTI)

Research of graffiti character recognition and retrieval, as a branch of traditional optical character recognition (OCR), has started to gain attention in recent years. We have investigated the special challenge of the graffiti image retrieval problem and propose a series of novel techniques to overcome the challenges. The proposed bounding box framework locates the character components in the graffiti images to construct meaningful character strings and conduct image-wise and semantic-wise retrieval on the strings rather than the entire image. Using real world data provided by the law enforcement community to the Pacific Northwest National Laboratory, we show that the proposed framework outperforms the traditional image retrieval framework with better retrieval results and improved computational efficiency.

Yang, Chunlei; Wong, Pak C.; Ribarsky, William; Fan, Jianping

2012-07-05T23:59:59.000Z

294

Adaptive wiener image restoration kernel  

DOE Patents (OSTI)

A method and device for restoration of electro-optical image data using an adaptive Wiener filter begins with constructing imaging system Optical Transfer Function, and the Fourier Transformations of the noise and the image. A spatial representation of the imaged object is restored by spatial convolution of the image using a Wiener restoration kernel.

Yuan, Ding (Henderson, NV)

2007-06-05T23:59:59.000Z

295

Edge structure preserving image denoising  

Science Conference Proceedings (OSTI)

Image denoising is important in image analysis. It is often used for pre-processing images so that subsequent image analysis is more reliable. Besides noise removal, one important requirement for image denoising procedures is that they should preserve ... Keywords: Angles, Curvature, Edges, Jump-preserving surface estimation, Local smoothing, Nonparametric regression, Surface estimation

Peihua Qiu; Partha Sarathi Mukherjee

2010-10-01T23:59:59.000Z

296

IMAGING: the Neutron Imaging Prototype Facility at HFIR | ORNL...  

NLE Websites -- All DOE Office Websites (Extended Search)

Neutron Imaging Prototype Facility CG-1D flight tubes Neutron imaging beam line CG-1D. The CG-1D beam is used for neutron imaging measurements and can be configured for white beam...

297

SSRL Web Requests  

NLE Websites -- All DOE Office Websites (Extended Search)

pagesite Change Fix existing form or application Develop new form or application Web-ImagesGraphics Web-Flash Webserver bug - error report Login Help Details of your...

298

Polarization transfer NMR imaging  

DOE Patents (OSTI)

A nuclear magnetic resonance (NMR) image is obtained with spatial information modulated by chemical information. The modulation is obtained through polarization transfer from a first element representing the desired chemical, or functional, information, which is covalently bonded and spin-spin coupled with a second element effective to provide the imaging data. First and second rf pulses are provided at first and second frequencies for exciting the imaging and functional elements, with imaging gradients applied therebetween to spatially separate the nuclei response for imaging. The second rf pulse is applied at a time after the first pulse which is the inverse of the spin coupling constant to select the transfer element nuclei which are spin coupled to the functional element nuclei for imaging. In a particular application, compounds such as glucose, lactate, or lactose, can be labeled with .sup.13 C and metabolic processes involving the compounds can be imaged with the sensitivity of .sup.1 H and the selectivity of .sup.13 C.

Sillerud, Laurel O. (Los Alamos, NM); van Hulsteyn, David B. (Santa Fe, NM)

1990-01-01T23:59:59.000Z

299

Image Windows - description of data types  

Science Conference Proceedings (OSTI)

... image, or RGB color image. cstack Stack of color (RGB) images. FRED (text) window; Dialog; (various) graphics windows.

300

Magnetic resonance imaging in Mexico  

Science Conference Proceedings (OSTI)

MR imaging has experienced an important growth worldwide and in particular in the USA and Japan. This imaging technique has also shown an important rise in the number of MR imagers in Mexico. However

A. O. Rodriguez; R. Rojas; F. A. Barrios

2001-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Scanning computed confocal imager  

DOE Patents (OSTI)

There is provided a confocal imager comprising a light source emitting a light, with a light modulator in optical communication with the light source for varying the spatial and temporal pattern of the light. A beam splitter receives the scanned light and direct the scanned light onto a target and pass light reflected from the target to a video capturing device for receiving the reflected light and transferring a digital image of the reflected light to a computer for creating a virtual aperture and outputting the digital image. In a transmissive mode of operation the invention omits the beam splitter means and captures light passed through the target.

George, John S. (Los Alamos, NM)

2000-03-14T23:59:59.000Z

302

Ghost Imaging with Blackbody Radiation  

E-Print Network (OSTI)

We present a theoretical study of ghost imaging by using blackbody radiation source. A Gaussian thin lens equation for the ghost imaging, which depends on both paths, is derived. The dependences of the visibility and quality of the image on the transverse size and temperature of the blackbody are studied. The main differences between the ghost imaging by using the blackbody radiation and by using the entangled photon pairs are image-forming equation, and the visibility and quality of the image

Yangjian Cai; Shiyao Zhu

2004-07-29T23:59:59.000Z

303

Quantitative Imaging in Cell Biology  

E-Print Network (OSTI)

Quantitative! imaging! in! biology! is! concerned! with!Quantitative! imaging! in! biology! is! concerned! with!advances! in! cell! biology! by! enabling! the! tracking!

Yassif, Jaime

2012-01-01T23:59:59.000Z

304

NIST Hyperspectral Image Projector (HIP)  

Science Conference Proceedings (OSTI)

... In DLP systems, the projected image is made from a composite of grayscale images representing each of the RGB colors (red, green, and blue). ...

2013-08-02T23:59:59.000Z

305

NERSC Image and Video Galleries  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive User Science Images Home News & Publications Galleries Galleries 18.jpg NERSC Systems In this gallery view images and videos of the systems that undergird all NERSC...

306

Manhattan Project: People Images  

Office of Scientific and Technical Information (OSTI)

PEOPLE IMAGES PEOPLE IMAGES Resources > Photo Gallery Scroll down to see each of these images individually. The images are: 1. J. Robert Oppenheimer, Enrico Fermi, and Ernest Lawrence (courtesy the Lawrence Berkeley National Laboratory); 2. Hanford, Washington, workers sending money home (reproduced from the photo insert in F. G. Gosling, The Manhattan Project: Making the Atomic Bomb (Washington: History Division, Department of Energy, October 2001)); 3. Oppenheimer and Leslie Groves at the Trinity Site, September 1945 (reproduced from the cover of the Office of History and Heritage Resources publication: The Signature Facilities of the Manhattan Project (Washington: History Division, Department of Energy, 2001)); 4. A WAC detachment marching at Oak Ridge, Tennessee, June 1945 (courtesy the Army Corps of Engineers; it is reprinted in Rachel Fermi and Esther Samra, Picturing the Bomb: Photographs from the Secret World of the Manhattan Project (New York: Harry N. Abrams, Inc., Publishers, 1995), 40);

307

Manhattan Project: Science Images  

Office of Scientific and Technical Information (OSTI)

SCIENCE IMAGES SCIENCE IMAGES Resources > Photo Gallery Scroll down to see each of these images individually. The images are: 1. Fission (this graphic is adapted from a graphic originally produced by the Washington State Department of Health; the modifications are original to the History Division, now Office of History and Heritage Resources, 2003); 2. Fat Man (plutonium bomb), August 1945 (courtesy the U.S. Army Corps of Engineers (via theNational Archives)); 3. F Reactor Plutonium Production Complex Hanford, Washington, 1945; 4. A Cockroft-Walton machine at Los Alamos, New Mexico (courtesy the Los Alamos National Laboratory; it is reprinted in John F. Hogerton, ed., "Cockroft-Walton Machine," The Atomic Energy Deskbook (New York: Reinhold Publishing Corporation, 1963, prepared under the auspices of the Division of Technical Information, U.S. Atomic Energy Commission), 102);

308

Ferroelectric optical image comparator  

DOE Patents (OSTI)

The property of ferroelectric ceramics such as lead lanthanum zirconate titanate (PLZT) to store information has been known for many years. This relates to the property of ferroelectric ceramic materials to become permanently polarized when an electric signal is applied to the material. A ferroelectric optical image comparator has a lead lanthanum zirconate titanate thin-film device which is constructed with a semi-transparent or transparent conductive first electrode on one side of the thin film, a conductive metal second electrode on the other side of the thin film, and the second electrode is in contact with a nonconducting substrate. A photoinduced current in the device represents the dot product between a stored image and an image projected onto the first electrode. One-dimensional autocorrelations are performed by measuring this current while displacing the projected image. 5 figs.

Butler, M.A.; Land, C.E.; Martin, S.J.; Pfeifer, K.B.

1989-08-30T23:59:59.000Z

309

Resilient Image Fusion  

Science Conference Proceedings (OSTI)

The paper describes a distributed spectral-screening PCT algorithm for fusing hyper-spectral images in remote sensing applications. The algorithm provides intrusion tolerance from information warfare attacks using the notion of computational resiliency. ...

Tiranee Achalakul; Joohan Lee; Stephen Taylor

2000-08-01T23:59:59.000Z

310

Hierarchical image processing  

SciTech Connect

Most problems in image processing have structural aspects which are difficult to resolve using general methods. Use of heuristic methods is limited to cases where structural aspects are easy to resolve. An approach for hierarchical processing of images is described whereby structural aspects are resolved simultaneously with the analysis of data values. An effective use of a hierarchical structure puts strong restrictions upon information representation and operations. Information is represented in terms of compatibility of events, combined with a measure of confidence. Operations are of type symmetry operations, which allow data compression, context control and have a good descriptive power. The usefulness of these methods in image analysis and image processing is illustrated. 14 references.

Granlund, G.H.

1983-01-01T23:59:59.000Z

311

Imaging Fourier transform spectrometer  

DOE Patents (OSTI)

This invention is comprised of an imaging Fourier transform spectrometer having a Fourier transform infrared spectrometer providing a series of images to a focal plane array camera. The focal plane array camera is clocked to a multiple of zero crossing occurrences as caused by a moving mirror of the Fourier transform infrared spectrometer and as detected by a laser detector such that the frame capture rate of the focal plane array camera corresponds to a multiple of the zero crossing rate of the Fourier transform infrared spectrometer. The images are transmitted to a computer for processing such that representations of the images as viewed in the light of an arbitrary spectral ``fingerprint`` pattern can be displayed on a monitor or otherwise stored and manipulated by the computer.

Bennett, C.L.

1993-09-13T23:59:59.000Z

312

Image Content Engine (ICE)  

SciTech Connect

The Image Content Engine (ICE) is being developed to provide cueing assistance to human image analysts faced with increasingly large and intractable amounts of image data. The ICE architecture includes user configurable feature extraction pipelines which produce intermediate feature vector and match surface files which can then be accessed by interactive relational queries. Application of the feature extraction algorithms to large collections of images may be extremely time consuming and is launched as a batch job on a Linux cluster. The query interface accesses only the intermediate files and returns candidate hits nearly instantaneously. Queries may be posed for individual objects or collections. The query interface prompts the user for feedback, and applies relevance feedback algorithms to revise the feature vector weighting and focus on relevant search results. Examples of feature extraction and both model-based and search-by-example queries are presented.

Brase, J M

2007-03-26T23:59:59.000Z

313

Nylsvley Site Image #1  

NLE Websites -- All DOE Office Websites (Extended Search)

Image NLS-1: Typical view of fine-leaved savanna at the Nylsvley study site, South Africa. (Dominant trees are Acacia tortilis. Photograph taken 1997 by Dr. R.J. Scholes, CSIR,...

314

Towoomba Site Image #1  

NLE Websites -- All DOE Office Websites (Extended Search)

Graphs Image TWM-1: General view of the Towoomba savanna grassland site, South Africa. (Photograph by Dr. R.J. Scholes, Forestek, CSIR, Pretoria, South Africa). Go to Site...

315

THERMAL NEUTRON BACKSCATTER IMAGING.  

DOE Green Energy (OSTI)

Objects of various shapes, with some appreciable hydrogen content, were exposed to fast neutrons from a pulsed D-T generator, resulting in a partially-moderated spectrum of backscattered neutrons. The thermal component of the backscatter was used to form images of the objects by means of a coded aperture thermal neutron imaging system. Timing signals from the neutron generator were used to gate the detection system so as to record only events consistent with thermal neutrons traveling the distance between the target and the detector. It was shown that this time-of-flight method provided a significant improvement in image contrast compared to counting all events detected by the position-sensitive {sup 3}He proportional chamber used in the imager. The technique may have application in the detection and shape-determination of land mines, particularly non-metallic types.

VANIER,P.; FORMAN,L.; HUNTER,S.; HARRIS,E.; SMITH,G.

2004-10-16T23:59:59.000Z

316

Image simulation using LOCUS  

SciTech Connect

The LOCUS data base program has been used to simulate images and to solve simple equations. This has been accomplished by making each record (which normally would represent a data entry)represent sequenced or random number pairs.

Strachan, J.D.; Roberts, J.A.

1989-09-01T23:59:59.000Z

317

Overview of image reconstruction  

SciTech Connect

Image reconstruction (or computerized tomography, etc.) is any process whereby a function, f, on R/sup n/ is estimated from empirical data pertaining to its integrals, ..integral..f(x) dx, for some collection of hyperplanes of dimension k < n. The paper begins with background information on how image reconstruction problems have arisen in practice, and describes some of the application areas of past or current interest; these include radioastronomy, optics, radiology and nuclear medicine, electron microscopy, acoustical imaging, geophysical tomography, nondestructive testing, and NMR zeugmatography. Then the various reconstruction algorithms are discussed in five classes: summation, or simple back-projection; convolution, or filtered back-projection; Fourier and other functional transforms; orthogonal function series expansion; and iterative methods. Certain more technical mathematical aspects of image reconstruction are considered from the standpoint of uniqueness, consistency, and stability of solution. The paper concludes by presenting certain open problems. 73 references. (RWR)

Marr, R.B.

1980-04-01T23:59:59.000Z

318

Multi-modality image correlation  

DOE Patents (OSTI)

This invention is comprised of an apparatus and method for location by location correlation of multiple images for Non-Destructive Evaluation (NDE) and other sources. Multiple images of a material specimen are displayed on one or more monitors of an interactive graphics system. Specimen landmarks are located in each image and mapping functions from a reference image to each other image are calculated using the landmark locations. A location selected by positioning a cursor in the reference image is mapped to the other images and location identifiers are simultaneously displayed in those images. Movement of the cursor in the references image causes simultaneous movement of the location identifiers in the other images to positions corresponding to the location of the reference image cursor.

Vaitekunas, J.J.; Roberts, R.A.

1988-08-25T23:59:59.000Z

319

MEDICAL IMAGE CONVERSION Peter Stanchev  

E-Print Network (OSTI)

MEDICAL IMAGE CONVERSION Peter Stanchev Institute of Mathematics, Bulgarian Academy of Sciences with the problem of converting medical images from one format to another. In solving it the structure of the most commonly used medical image formats are studied and analysed. A mechanism for medical image file conversion

Stanchev, Peter

320

Digital Image Authentication: A Review  

Science Conference Proceedings (OSTI)

Digital image authentication refers to all the techniques performing anti-falsification, digital image copyright protection, or access control. A large number of DIA techniques have been developed to authenticate digital images, including cryptography-based ... Keywords: Data Hiding, Digital Fingerprints, Forensic Science, Image Authentication, Watermarking

Chia-Hung Wei; Yue Li

2011-04-01T23:59:59.000Z

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Argonne TDC: Imaging Technology Portfolios  

Emergency Response. Engineering. Environmental Research. Fuel Cells. Imaging Technology. Material Science. Nanotechnology. Physical Sciences. Sensor ...

322

Manhattan Project: Events Images  

Office of Scientific and Technical Information (OSTI)

Resources Resources About this Site How to Navigate this Site Library Maps Note on Sources Nuclear Energy and the Public's Right to Know Photo Gallery Site Map Sources and Notes Suggested Readings EVENTS IMAGES Resources > Photo Gallery Page Content Here Scroll down to see each of these images individually. The images are: 1. Albert Einstein and Leo Szilard (courtesy the Federation of American Scientists); 2. Painting of CP-1 going critical (courtesy the National Archives); 3. An Alpha Racetrack inside the Y-12 Electromagnetic Plant, Clinton Engineer Works, Oak Ridge, Tennessee; 4. Eric Jette, Charles Critchfield, and J. Robert Oppenheimer, Los Alamos, New Mexico (this photograph is reprinted from Los Alamos Scientific Laboratory, Los Alamos: Beginning of an Era, 1943-1945 (Los Alamos: Public Relations Office, Los Alamos Scientific Laboratory, ca. 1967-1971), 20);

323

Multispectral thermal imaging  

SciTech Connect

Many remote sensing applications rely on imaging spectrometry. Here the authors use imaging spectrometry for thermal and multispectral signatures measured from a satellite platform enhanced with a combination of accurate calibrations and on-board data for correcting atmospheric distortions. The approach is supported by physics-based end-to-end modeling and analysis, which permits a cost-effective balance between various hardware and software aspects. The goal is to develop and demonstrate advanced technologies and analysis tools toward meeting the needs of the customer; at the same time, the attributes of this system can address other applications in such areas as environmental change, agriculture, and volcanology.

Weber, P.G.; Bender, S.C.; Borel, C.C.; Clodius, W.B.; Smith, B.W. [Los Alamos National Lab., NM (United States). Space and Remote Sensing Sciences Group; Garrett, A.; Pendergast, M.M. [Westinghouse Savannah River Corp., Aiken, SC (United States). Savannah River Technology Center; Kay, R.R. [Sandia National Lab., Albuquerque, NM (United States). Monitoring Systems and Technology Center

1998-12-01T23:59:59.000Z

324

Turbine Imaging Technology Assessment  

DOE Green Energy (OSTI)

The goal of this project was to identify and evaluate imaging alternatives for observing the behavior of juvenile fish within an operating Kaplan turbine unit with a focus on methods to quantify fish injury mechanisms inside an operating turbine unit. Imaging methods are particularly needed to observe the approach and interaction of fish with turbine structural elements. This evaluation documents both the opportunities and constraints for observing juvenile fish at specific locations during turbine passage. The information may be used to acquire the scientific knowledge to make structural improvements and create opportunities for industry to modify turbines and improve fish passage conditions.

Moursund, Russell A.; Carlson, Thomas J.

2004-12-31T23:59:59.000Z

325

Modern Imaging Technology: Recent Advances  

SciTech Connect

This 2-day conference is designed to bring scientist working in nuclear medicine, as well as nuclear medicine practitioners together to discuss the advances in four selected areas of imaging: Biochemical Parameters using Small Animal Imaging, Developments in Small Animal PET Imaging, Cell Labeling, and Imaging Angiogenesis Using Multiple Modality. The presentations will be on molecular imaging applications at the forefront of research, up to date on the status of molecular imaging in nuclear medicine as well as in related imaging areas. Experts will discuss the basic science of imaging techniques, and scheduled participants will engage in an exciting program that emphasizes the current status of molecular imaging as well as the role of DOE funded research in this area.

Welch, Michael J.; Eckelman, William C.

2004-06-18T23:59:59.000Z

326

Normalization method for video images  

DOE Patents (OSTI)

The present invention relates to a method and apparatus for automatically and adaptively normalizing analog signals representative of video images in object detection systems. Such normalization maximizes the average information content of the video images and, thereby, provides optimal digitized images for object detection and identification. The present invention manipulates two system control signals -- gain control signal and offset control signal -- to convert an analog image signal into a transformed analog image signal, such that the corresponding digitized image contains the maximum amount of information achievable with a conventional object detection system. In some embodiments of the present invention, information content is measured using parameters selected from image entropy, image mean, and image variance.

Donohoe, G.W.; Hush, D.R.

1992-12-31T23:59:59.000Z

327

Fundamentals of Image Processing  

E-Print Network (OSTI)

· Histogram processing #12;Digital images · Sample the 2D space on a regular grid · Quantize each sample. · Bigger numbers are (usually) brighter · Transfer function: function that maps input pixel value into a pixel? · LCD: backlight intensity, transmission efficiency (

Erdem, Erkut

328

Multidimensional image retargeting  

Science Conference Proceedings (OSTI)

Retargeting refers to the process by which an image or video is adapted from the display device for which it was meant (target display) to another one (retarget display). The retarget display has different features from the target one such as dynamic ...

Francesco Banterle; Alessandro Artusi; Tunç O. Aydin; Piotr Didyk; Elmar Eisemann; Diego Gutierrez; Rafal Mantiuk; Karol Myszkowski

2011-12-01T23:59:59.000Z

329

Image processing and reconstruction  

SciTech Connect

This talk will examine some mathematical methods for image processing and the solution of underdetermined, linear inverse problems. The talk will have a tutorial flavor, mostly accessible to undergraduates, while still presenting research results. The primary approach is the use of optimization problems. We will find that relaxing the usual assumption of convexity will give us much better results.

Chartrand, Rick [Los Alamos National Laboratory

2012-06-15T23:59:59.000Z

330

High dynamic range imaging  

Science Conference Proceedings (OSTI)

Current display devices can display only a limited range of contrast and colors, which is one of the main reasons that most image acquisition, processing, and display techniques use no more than eight bits per color channel. This course outlines recent ...

Paul Debevec; Erik Reinhard; Greg Ward; Sumanta Pattanaik

2004-08-01T23:59:59.000Z

331

Imaging agents for in vivo magnetic resonance and scintigraphic imaging  

DOE Patents (OSTI)

Methods are provided for in vivo magnetic resonance imaging and/or scintigraphic imaging of a subject using chelated transition metal and lanthanide metal complexes. Novel ligands for these complexes are provided.

Engelstad, Barry L. (Orinda, CA); Raymond, Kenneth N. (Berkeley, CA); Huberty, John P. (Corte Madera, CA); White, David L. (Oakland, CA)

1991-01-01T23:59:59.000Z

332

Application of the multiple image radiography method to breast imaging  

Science Conference Proceedings (OSTI)

The Multiple Image Radiography (MIR) method is new imaging modality that extends the capability of conventional absorption based radiography by adding the additional contrast mechanisms of x-ray refraction and ultra-small angle scatter. In order to design ...

Christopher Parham; Etta Pisano; Chad Livasy; Laura Faulconer; Miles Wernick; Jovan Brankov; Miklos Kiss; Dean Connor; Jeddy Chen; Ann Wu; Zhong Zhong; Dean Chapman

2006-06-01T23:59:59.000Z

333

Imaging agents for in vivo magnetic resonance and scintigraphic imaging  

DOE Patents (OSTI)

Methods are provided for in vivo magnetic resonance imaging and/or scintigraphic imaging of a subject using chelated transition metal and lanthanide metal complexes. Novel ligands for these complexes are provided. No Drawings

Engelstad, B.L.; Raymond, K.N.; Huberty, J.P.; White, D.L.

1991-04-23T23:59:59.000Z

334

No-Reference image quality assessment for facial images  

Science Conference Proceedings (OSTI)

Image quality assessment traditionally means the comparison of original image with its distorted version using conventional methods like Mean Square Error (MSE) or Peak Signal to Noise Ratio (PSNR). In case of Blind Quality Evaluation with no prior knowledge ... Keywords: contrast, eye visibility, image quality assessment, luminance, no-reference, noise, sharpness

Debalina Bhattacharjee; Surya Prakash; Phalguni Gupta

2011-08-01T23:59:59.000Z

335

Non local image denoising using image adapted neighborhoods  

Science Conference Proceedings (OSTI)

In recent years several non-local image denoising methods were proposed in the literature. These methods compute the denoised image as a weighted average of pixels across the whole image (in practice across a large area around the pixel to be denoised). ...

Álvaro Pardo

2010-11-01T23:59:59.000Z

336

Reply to comment | OSTI, US Dept of Energy, Office of Scientific...  

Office of Scientific and Technical Information (OSTI)

Slide20 Future Work - Data Types Enabling search on non-text information Numeric Data Video Images Audio Add new comment Original Thumbnail Mobile320x340 Icon64x64 Reply (If...

337

Slide20 | OSTI, US Dept of Energy, Office of Scientific and Technical...  

Office of Scientific and Technical Information (OSTI)

Future Work - Data Types Enabling search on non-text information Numeric Data Video Images Audio Add new comment Original Thumbnail Mobile320x340 Icon64x64 OSTI Homepage Mobile...

338

WIPP - Photo Gallery  

NLE Websites -- All DOE Office Websites (Extended Search)

Gallery Shortcuts WIPP Site Transportation Contact-Handled TRU Waste Remote-Handled TRU Waste Mining Photo Gallery Click on a thumbnail image to see a larger version of the...

339

DOE Solar Decathlon: Gallery of Canada (University of Calgary...  

NLE Websites -- All DOE Office Websites (Extended Search)

(University of Calgary) Photos of Canada's TRTL are shown in the gallery below. Click on any of the thumbnails to view a larger image. Media are welcome to download these photos...

340

Imaging (XSD) | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

Real Time Radiography, Phase Contrast Imaging, Transmission X-ray Microscopy and nano-CT, and X-ray Micro-tomography. The Imaging group is also responsible for the design...

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Filtering in SPECT image reconstruction  

Science Conference Proceedings (OSTI)

Single photon emission computed tomography (SPECT) imaging is widely implemented in nuclear medicine as its clinical role in the diagnosis and management of several diseases is, many times, very helpful (e.g., myocardium perfusion imaging). The quality ...

Maria Lyra; Agapi Ploussi

2011-01-01T23:59:59.000Z

342

Advanced Measurement Laboratory Image Gallery  

Science Conference Proceedings (OSTI)

... This NIST-developed instrument, a scanning electron microscope with spin polarization analysis, is the highest resolution magnetization imaging ...

2010-10-05T23:59:59.000Z

343

Full Size Image - Energy Innovation Portal  

Bookmark Full Size Image - Energy Innovation Portal on Google; Bookmark Full Size Image - Energy Innovation Portal on Delicious; Rank Full Size Image ...

344

WIPP - Passive Institutional Controls (PICs) Images  

NLE Websites -- All DOE Office Websites (Extended Search)

PICs Images Passive Institutional Controls PICs Images Permanent Markers | Images from Monument Survey Permanent Markers Earthen Berm The "big picture" Repository footprint Buried...

345

User Science Images  

NLE Websites -- All DOE Office Websites (Extended Search)

PorousMedia3medres.png PorousMedia3medres.png ASCR: Carbon Dioxide Sequestration September 14, 2009 | Author(s): G. S. H. Pau, J. B. Bell, K. Pruess, A. S. Almgren, M. J. Lijewski, and K. Zhang | Category: Environmental Science | URL: http://esd.lbl.gov/research/projects/tough/documentation/proceedings/ Download Image: PorousMedia3medres.png | png | 159 KB Simulation of density-driven flow for CO2 storage in saline aquifers. Shown is a snapshot of the CO2 concentration after onset of convection overlayed on the AMR grid. Image courtesy of George Pau and John Bell (LBNL). Repo mp111 marcdayhydrogenflame.jpg ASCR: Lab-scale Flame Simulation September 1, 2009 | Author(s): M.S.Day, J.B. Bell, R.K. Cheng, S. Tachibana, V.E. Beckner and M.J. Lijewski (LBNL) | Category: Combustion | URL: https://apdec.org/APDEC_Progress_Fall09.shtml

346

Dynamic Radiographic Imaging  

Science Conference Proceedings (OSTI)

A radiographic system recently developed by American and Russian collaborators is designed to capture multiple images of a dynamic event lasting less than 10 microseconds. Various optical and electro-optical components were considered and their performance compared. The final system employed a solid crystal of lutetium oxyorthosilicate doped with cerium (LSO:Ce or LSO) for X-ray-to-light conversion with a coherent fiber optic bundle to relay the scintillator image to a streak camera with charge coupled device (CCD) readout. Resolution and sensitivity studies were carried out for this system on two different sources of X-rays: a 20 MeV microtron and a 70 MeV betatron.

Volkov, A.; Turley, D.; Veeser, L.; Lukyanov, N.; Yegorov, N.; Baker, S.A.; Mirenko, V.; Lewis, W.; Kuropatkin, Y.

1999-06-01T23:59:59.000Z

347

Imaging alpha particle detector  

DOE Patents (OSTI)

A method and apparatus for detecting and imaging alpha particles sources is described. A conducting coated high voltage electrode (1) and a tungsten wire grid (2) constitute a diode configuration discharge generator for electrons dislodged from atoms or molecules located in between these electrodes when struck by alpha particles from a source (3) to be quantitatively or qualitatively analyzed. A thin polyester film window (4) allows the alpha particles to pass into the gas enclosure and the combination of the glass electrode, grid and window is light transparent such that the details of the source which is imaged with high resolution and sensitivity by the sparks produced can be observed visually as well. The source can be viewed directly, electronically counted or integrated over time using photographic methods. A significant increase in sensitivity over other alpha particle detectors is observed, and the device has very low sensitivity to gamma or beta emissions which might otherwise appear as noise on the alpha particle signal.

Anderson, David F. (Los Alamos, NM)

1985-01-01T23:59:59.000Z

348

Image search by concept map  

Science Conference Proceedings (OSTI)

In this paper, we present a novel image search system, image search by concept map. This system enables users to indicate not only what semantic concepts are expected to appear but also how these concepts are spatially distributed in the desired ... Keywords: concept map, image search

Hao Xu; Jingdong Wang; Xian-Sheng Hua; Shipeng Li

2010-07-01T23:59:59.000Z

349

Novel polarization interference imaging spectroscope  

Science Conference Proceedings (OSTI)

A novel principle and scheme of Polarization Interferometer Imaging Spectroscope has been proposed. A wide-field-of-view polarization Interference imaging spectrometer (WPIIS) based on a Savart polariscope, without moving parts, and with a narrow slit ... Keywords: SNR, modulation depth, polarization interference imaging spectrometer, savart polariscope, throughput

Chunmin Zhang; Baochang Zhao; Yingcai Li; Zhilin Yuan; Xiaohua Jian; Lanyan Zhu

2008-07-01T23:59:59.000Z

350

Spatial codebooks for image categorization  

Science Conference Proceedings (OSTI)

Currently, bag-of-words approaches for image categorization are very popular due to their relative simplicity, robustness and high efficiency. However, they lack the ability to represent the spatial composition of an image. This drawback has been addressed ... Keywords: bag of words, feature extraction, image classification

Eugene Mbanya; Sebastian Gerke; Patrick Ndjiki-Nya

2011-04-01T23:59:59.000Z

351

Fast segmentation of large images  

Science Conference Proceedings (OSTI)

The processing of large images is a generic problem in wide area surveillance. An important difficulty is that many image processing algorithms are global rather than local and hence can be infeasible due to the required computing time or memory resources ... Keywords: algorithm, image, segmentation

David J. Crisp; Peter Perry; Nicholas J. Redding

2003-02-01T23:59:59.000Z

352

Direct current slice imaging  

Science Conference Proceedings (OSTI)

We report a new variation of the velocity map ion imaging method that allows the central section of the photofragment ion cloud to be recorded exclusively. The relevant speed and angular distributions for a molecular photodissociation or scattering event may therefore be obtained without need to utilize inversion methods such as the inverse Abel transform. In contrast to the recently reported “slicing” technique of Kitsopoulos and co-workers [C. R. Gebhardt et al.

Dave Townsend; Michael P. Minitti; Arthur G. Suits

2003-01-01T23:59:59.000Z

353

Medical gamma ray imaging  

DOE Patents (OSTI)

A method and apparatus for determining the distribution of a position-emitting radioisotope into an object, the apparatus consisting of a wire mesh radiation converter, an ionizable gas for propagating ionization events caused by electrodes released by the converter, a drift field, a spatial position detector and signal processing circuitry for correlating near-simultaneous ionization events and determining their time differences, whereby the position sources of back-to-back collinear radiation can be located and a distribution image constructed.

Osborne, Louis S. (Lexington, MA); Lanza, Richard C. (Brookline, MA)

1984-01-01T23:59:59.000Z

354

Quantitative Luminescence Imaging System  

SciTech Connect

The goal of the MEASUREMENT OF CHEMILUMINESCENCE project is to develop and deliver a suite of imaging radiometric instruments for measuring spatial distributions of chemiluminescence. Envisioned deliverables include instruments working at the microscopic, macroscopic, and life-sized scales. Both laboratory and field portable instruments are envisioned. The project also includes development of phantoms as enclosures for the diazoluminomelanin (DALM) chemiluminescent chemistry. A suite of either phantoms in a variety of typical poses, or phantoms that could be adjusted to a variety of poses, is envisioned. These are to include small mammals (rats), mid-sized mammals (monkeys), and human body parts. A complete human phantom that can be posed is a long-term goal of the development. Taken together, the chemistry and instrumentation provide a means for imaging rf dosimetry based on chemiluminescence induced by the heat resulting from rf energy absorption. The first delivered instrument, the Quantitative Luminescence Imaging System (QLIS), resulted in a patent, and an R&D Magazine 1991 R&D 100 award, recognizing it as one of the 100 most significant technological developments of 1991. The current status of the project is that three systems have been delivered, several related studies have been conducted, two preliminary human hand phantoms have been delivered, system upgrades have been implemented, and calibrations have been maintained. Current development includes sensitivity improvements to the microscope-based system; extension of the large-scale (potentially life-sized targets) system to field portable applications; extension of the 2-D large-scale system to 3-D measurement; imminent delivery of a more refined human hand phantom and a rat phantom; rf, thermal and imaging subsystem integration; and continued calibration and upgrade support.

Batishko, C.R.; Stahl, K.A.; Fecht, B.A.

1992-12-31T23:59:59.000Z

355

Practical image based lighting  

E-Print Network (OSTI)

In this thesis, we present a user-friendly and practical method for seamless integration of computer-generated images (CG) with real photographs and video. In general such seamless integration is extremely hard and requires recovery of real world information to simulate the same environment for both CG and real objects. This real world information includes camera positions and parameters, and shapes, material properties, and motion of real objects. Among these one of the most important real world information is lighting. Image based lighting that is developed to recover illumination information of the real world from photographs has recently been popular in computer graphics. In this thesis we present a practical image based lighting method. Our method is based on a simple and easily constructible device: a square plate with a cylindrical stick. We have developed a user-guided system to approximately recover illumination information (i.e. orientations, colors, and intensities of light sources) from a photograph of this device. Our approach also helps to recover surface colors of real objects based on reconstructed lighting information. In addition, we will address our observation on shadows with multi-color lights in a compositing aspect and will present a solution to handle the addressed issue.

Lee, Jaemin

2003-01-01T23:59:59.000Z

356

Image registration with uncertainty analysis  

DOE Patents (OSTI)

In an image registration method, edges are detected in a first image and a second image. A percentage of edge pixels in a subset of the second image that are also edges in the first image shifted by a translation is calculated. A best registration point is calculated based on a maximum percentage of edges matched. In a predefined search region, all registration points other than the best registration point are identified that are not significantly worse than the best registration point according to a predetermined statistical criterion.

Simonson, Katherine M. (Cedar Crest, NM)

2011-03-22T23:59:59.000Z

357

Ghost Imaging with Blackbody Radiation  

E-Print Network (OSTI)

We present a theoretical study of ghost imaging by using blackbody radiation source. A Gaussian thin lens equation for the ghost imaging, which depends on both paths, is derived. The dependences of the visibility and quality of the image on the transverse size and temperature of the blackbody are studied. The main differences between the ghost imaging by using the blackbody radiation and by using the entangled photon pairs are image-forming equation, and the visibility and quality of the image. PACS numbers: 42.30.Va, 42.25.Kb, 42.50.Ar, 42.25.Hz Ghost imaging were firstly realized by using entangled photon pairs generated in spontaneous parametric down conversion in 1995 [1,2]. The name ghost comes from the facts that an object in one path produces an image in another path in the measurement of coincident counting rates, and the image depends on both paths. Since then, many theoretical and experimental studies on this subject have been published [3-10]. Recently, there were discussions about whether quantum entanglement is necessary in the ghost imaging and whether a ghost imaging experiment can be realized with classical source [11-14]. Bennink et

Yangjian Cai; Shi-yao Zhu

2004-01-01T23:59:59.000Z

358

Fiducial marker for correlating images  

DOE Patents (OSTI)

The invention relates to a fiducial marker having a marking grid that is used to correlate and view images produced by different imaging modalities or different imaging and viewing modalities. More specifically, the invention relates to the fiducial marking grid that has a grid pattern for producing either a viewing image and/or a first analytical image that can be overlaid with at least one other second analytical image in order to view a light path or to image different imaging modalities. Depending on the analysis, the grid pattern has a single layer of a certain thickness or at least two layers of certain thicknesses. In either case, the grid pattern is imageable by each imaging or viewing modality used in the analysis. Further, when viewing a light path, the light path of the analytical modality cannot be visualized by viewing modality (e.g., a light microscope objective). By correlating these images, the ability to analyze a thin sample that is, for example, biological in nature but yet contains trace metal ions is enhanced. Specifically, it is desired to analyze both the organic matter of the biological sample and the trace metal ions contained within the biological sample without adding or using extrinsic labels or stains.

Miller, Lisa Marie (Rocky Point, NY); Smith, Randy J. (Wading River, NY); Warren, John B. (Port Jefferson, NY); Elliott, Donald (Hampton Bays, NY)

2011-06-21T23:59:59.000Z

359

Backscatter absorption gas imaging system  

DOE Patents (OSTI)

A video imaging system for detecting hazardous gas leaks. Visual displays of invisible gas clouds are produced by radiation augmentation of the field of view of an imaging device by radiation corresponding to an absorption line of the gas to be detected. The field of view of an imager is irradiated by a laser. The imager receives both backscattered laser light and background radiation. When a detectable gas is present, the backscattered laser light is highly attenuated, producing a region of contrast or shadow on the image. A flying spot imaging system is utilized to synchronously irradiate and scan the area to lower laser power requirements. The imager signal is processed to produce a video display.

McRae, Jr., Thomas G. (Livermore, CA)

1985-01-01T23:59:59.000Z

360

Speckle-free laser imaging  

E-Print Network (OSTI)

Many imaging applications require increasingly bright illumination sources, motivating the replacement of conventional thermal light sources with light emitting diodes (LEDs), superluminescent diodes (SLDs) and lasers. Despite their brightness, lasers and SLDs are poorly suited for full-field imaging applications because their high spatial coherence leads to coherent artifacts known as speckle that corrupt image formation. We recently demonstrated that random lasers can be engineered to provide low spatial coherence. Here, we exploit the low spatial coherence of specifically-designed random lasers to perform speckle-free full-field imaging in the setting of significant optical scattering. We quantitatively demonstrate that images generated with random laser illumination exhibit higher resolution than images generated with spatially coherent illumination. By providing intense laser illumination without the drawback of coherent artifacts, random lasers are well suited for a host of full-field imaging applicatio...

Redding, Brandon; Cao, Hui

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Computational Biology: Comparison of Cell Image ...  

Science Conference Proceedings (OSTI)

... The cells were image by fluorescent microscopy. ... The image data was processed to differentiate between the 2 cell lines. ...

2012-07-10T23:59:59.000Z

362

Superconductive imaging surface magnetometer  

DOE Patents (OSTI)

An improved pick-up coil system for use with Superconducting Quantum Interference Device gradiometers and magnetometers involving the use of superconducting plates near conventional pick-up coil arrangements to provide imaging of nearby dipole sources and to deflect environmental magnetic noise away from the pick-up coils. This allows the practice of gradiometry and magnetometry in magnetically unshielded environments. One embodiment uses a hemispherically shaped superconducting plate with interior pick-up coils, allowing brain wave measurements to be made on human patients. another embodiment using flat superconducting plates could be used in non-destructive evaluation of materials.

Overton, Jr., William C. (Los Alamos, NM); van Hulsteyn, David B. (Santa Fe, NM); Flynn, Edward R. (Los Alamos, NM)

1991-01-01T23:59:59.000Z

363

3D ultrasound imaging for prosthesis fabrication and diagnostic imaging  

SciTech Connect

The fabrication of a prosthetic socket for a below-the-knee amputee requires knowledge of the underlying bone structure in order to provide pressure relief for sensitive areas and support for load bearing areas. The goal is to enable the residual limb to bear pressure with greater ease and utility. Conventional methods of prosthesis fabrication are based on limited knowledge about the patient`s underlying bone structure. A 3D ultrasound imaging system was developed at Sandia National Laboratories. The imaging system provides information about the location of the bones in the residual limb along with the shape of the skin surface. Computer assisted design (CAD) software can use this data to design prosthetic sockets for amputees. Ultrasound was selected as the imaging modality. A computer model was developed to analyze the effect of the various scanning parameters and to assist in the design of the overall system. The 3D ultrasound imaging system combines off-the-shelf technology for image capturing, custom hardware, and control and image processing software to generate two types of image data -- volumetric and planar. Both volumetric and planar images reveal definition of skin and bone geometry with planar images providing details on muscle fascial planes, muscle/fat interfaces, and blood vessel definition. The 3D ultrasound imaging system was tested on 9 unilateral below-the- knee amputees. Image data was acquired from both the sound limb and the residual limb. The imaging system was operated in both volumetric and planar formats. An x-ray CT (Computed Tomography) scan was performed on each amputee for comparison. Results of the test indicate beneficial use of ultrasound to generate databases for fabrication of prostheses at a lower cost and with better initial fit as compared to manually fabricated prostheses.

Morimoto, A.K.; Bow, W.J.; Strong, D.S. [and others

1995-06-01T23:59:59.000Z

364

Device for wavelength-selective imaging  

DOE Patents (OSTI)

An imaging device captures both a visible light image and a diagnostic image, the diagnostic image corresponding to emissions from an imaging medium within the object. The visible light image (which may be color or grayscale) and the diagnostic image may be superimposed to display regions of diagnostic significance within a visible light image. A number of imaging media may be used according to an intended application for the imaging device, and an imaging medium may have wavelengths above, below, or within the visible light spectrum. The devices described herein may be advantageously packaged within a single integrated device or other solid state device, and/or employed in an integrated, single-camera medical imaging system, as well as many non-medical imaging systems that would benefit from simultaneous capture of visible-light wavelength images along with images at other wavelengths.

Frangioni, John V. (Wayland, MA)

2010-09-14T23:59:59.000Z

365

User Science Images  

NLE Websites -- All DOE Office Websites (Extended Search)

KChenCastroHiRes2013.png KChenCastroHiRes2013.png HEP: CASTRO (Eulerian Radiation Hydrodynamics) Simulation February 6, 2013 | Author(s): Ke-Jung Chen | Category: Astrophysics | URL: http://www.nature.com/nature/journal/v494/n7435/full/494046a.html Download Image: KChenCastroHiRes2013.png | png | 3.6 MB Collision between two shells of matter ejected by a massive star in two pair-instability supernova eruptions, only years apart, just before the star dies, showing a slice through a corner of the event. Shell radius (red knots) is about 500 times the Earth-Sun distance. Colors represent gas density (red is highest, dark blue is lowest). Image courtesy of Ke-Jung Chen, School of Physics and Astronomy, Univ. Minnesota. Repo m1400 Otts271115snap.png NP: Core-Collapse Supernova October 24, 2012 | Author(s): C. D. OTT1 , E. ABDIKAMALOV , P. MÖSTA1 , R.

366

Fourier plane image amplifier  

DOE Patents (OSTI)

A solid state laser is frequency tripled to 0.3 {micro}m. A small portion of the laser is split off and generates a Stokes seed in a low power oscillator. The low power output passes through a mask with the appropriate hole pattern. Meanwhile, the bulk of the laser output is focused into a larger stimulated Brillouin scattering (SBS) amplifier. The low power beam is directed through the same cell in the opposite direction. The majority of the amplification takes place at the focus which is the fourier transform plane of the mask image. The small holes occupy large area at the focus and thus are preferentially amplified. The amplified output is now imaged onto the multichip module where the holes are drilled. Because of the fourier plane amplifier, only about 1/10th the power of a competitive system is needed. This concept allows less expensive masks to be used in the process and requires much less laser power. 1 fig.

Hackel, L.A.; Hermann, M.R.; Dane, C.B.; Tiszauer, D.H.

1995-12-12T23:59:59.000Z

367

Heuristic optimization in penumbral image for high resolution reconstructed image  

SciTech Connect

Penumbral imaging is a technique which uses the fact that spatial information can be recovered from the shadow or penumbra that an unknown source casts through a simple large circular aperture. The size of the penumbral image on the detector can be mathematically determined as its aperture size, object size, and magnification. Conventional reconstruction methods are very sensitive to noise. On the other hand, the heuristic reconstruction method is very tolerant of noise. However, the aperture size influences the accuracy and resolution of the reconstructed image. In this article, we propose the optimization of the aperture size for the neutron penumbral imaging.

Azuma, R.; Nozaki, S. [Transdisciplinary Research Organization for Subtropics and Island Studies, University of the Ryukyus, Okinawa 903-0213 (Japan); Fujioka, S. [Institute of Laser Engineering, Osaka University, Osaka 565-0871 (Japan); Chen, Y. W. [College of Information Science and Engineering, Ritsumeikan University, Shiga 525-8577 (Japan); Namihira, Y. [Faculty of Engineering, University of the Ryukyus, Okinawa 903-0213 (Japan)

2010-10-15T23:59:59.000Z

368

Advantages of Dual Mode Imaging for Managing Sensitive Imaging Information  

Science Conference Proceedings (OSTI)

Paper addressing information security management of sensitive images in an Arms Control regime, to be presented at the 2010 INMM Meeting.

Pitts, W. Karl; Jarman, Kenneth D.; Miller, Erin A.; McDonald, Benjamin S.; Misner, Alex C.; Myjak, Mitchell J.; Robinson, Sean M.; Seifert, Allen; Seifert, Carolyn E.; Woodring, Mitchell L.

2010-08-11T23:59:59.000Z

369

Reflective ghost imaging through turbulence  

SciTech Connect

Recent work has indicated that ghost imaging may have applications in standoff sensing. However, most theoretical work has addressed transmission-based ghost imaging. To be a viable remote-sensing system, the ghost imager needs to image rough-surfaced targets in reflection through long, turbulent optical paths. We develop, within a Gaussian-state framework, expressions for the spatial resolution, image contrast, and signal-to-noise ratio of such a system. We consider rough-surfaced targets that create fully developed speckle in their returns and Kolmogorov-spectrum turbulence that is uniformly distributed along all propagation paths. We address both classical and nonclassical optical sources, as well as a computational ghost imager.

Hardy, Nicholas D.; Shapiro, Jeffrey H. [Research Laboratory of Electronics, Massachusetts Institute of Technology, Cambridge, Massachusetts 02139 (United States)

2011-12-15T23:59:59.000Z

370

X-ray Imaging Workshop  

NLE Websites -- All DOE Office Websites (Extended Search)

Imaging and Spectro-microscopy: Imaging and Spectro-microscopy: the Present and the Future Stanford Synchrotron Radiation Laboratory October 8-9, 2002 Organizers: John Miao & Keith Hodgson A workshop on "X-ray Imaging and Spectro-microscopy: the Present and the Future" was held on October 8-9, 2002. This workshop, organized by John Miao (SSRL) and Keith Hodgson (SSRL) provided a forum to discuss the scientific applications of a variety of imaging and spectro-microscopic techniques, including photoemission electron microscopy (PEEM), angle resolved photoemission spectroscopy (ARPES), coherent diffraction imaging, x-ray microscopy, micro-tomography, holographic imaging, and x-ray micro-probe. Twelve invited speakers discussed the important scientific applications of these techniques, and also predicted the future scientific directions with the advance of instrumentation and x-ray sources. The workshop was well attended with over fifty registered attendees.

371

NIST: NIF - Neutron Imaging Facility  

Science Conference Proceedings (OSTI)

... 1 above) is located at Beam Tube 2 (BT-2 ... Figure 2. Plan view of the neutron imaging facility ... still a significant amount of high energy neutrons and ...

372

Identifying structural damage from images  

E-Print Network (OSTI)

Photographs of damaged buildings in Bam, Iran. . . . . . . .patches of Bam, Iran. . . . . . . . . Photo pictures ofBitemporal images of an urban region of Bam, Iran. . . . .

Chen, ZhiQiang

2009-01-01T23:59:59.000Z

373

Energy harvesting CMOS image sensor.  

E-Print Network (OSTI)

??xv, 101 p. : ill. ; 30 cm HKUST Call Number: Thesis ECED 2009 Shi Modern portable imaging systems are expected to consume higher power… (more)

Shi, Chao

2009-01-01T23:59:59.000Z

374

Imaging Highlights | Neutron Science | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

(3-D) neutron images have been taken of rare archaeological artifacts. Bronze and brass artifacts excavated at the ancient city of Petra, in present day Jordan, were recently...

375

Archeological Imaging | ORNL Neutron Sciences  

NLE Websites -- All DOE Office Websites (Extended Search)

(3-D) neutron images have been taken of rare archaeological artifacts. Bronze and brass artifacts excavated at the ancient city of Petra, in present day Jordan, were recently...

376

Physics of Regularized Image Processing  

Science Conference Proceedings (OSTI)

Because the Ising Model reproduces surface physics, regularized image processing also reproduces these effects, either as restorations of lost information or as ...

377

Search Our Online Image Database  

NLE Websites -- All DOE Office Websites (Extended Search)

Accelerator and Components Detectors and Computing People and Events Environment Graphics and Illustrations The images included in this database are the property of the U.S....

378

Lensless Imaging of Magnetic Nanostructures  

NLE Websites -- All DOE Office Websites (Extended Search)

Magnetic Nanostructures Print Magnetism is useful for many devices and techniques, from electric motors and computer hard drives to magnetic resonance imaging used in medicine....

379

Acoustic imaging system  

DOE Patents (OSTI)

An acoustic imaging system for displaying an object viewed by a moving array of transducers as the array is pivoted about a fixed point within a given plane. A plurality of transducers are fixedly positioned and equally spaced within a laterally extending array and operatively directed to transmit and receive acoustic signals along substantially parallel transmission paths. The transducers are sequentially activated along the array to transmit and receive acoustic signals according to a preestablished sequence. Means are provided for generating output voltages for each reception of an acoustic signal, corresponding to the coordinate position of the object viewed as the array is pivoted. Receptions from each of the transducers are presented on the same display at coordinates corresponding to the actual position of the object viewed to form a plane view of the object scanned.

Smith, Richard W. (Richland, WA)

1979-01-01T23:59:59.000Z

380

Personnel Change Notification ImagIng: GRSF/T  

E-Print Network (OSTI)

Personnel Change Notification OGS Form 3 ImagIng: GRSF/T Admit Year/Term: GS Web Front Desk: Office., reviewers, coordinators and chairs) Update: View all AIM Graduate Studies pages and enter decisions on GS02: Search for and view applicants; edit emails Connect: Add, search for and communicate with prospects

Hart, Gus

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Image separation using particle filters  

Science Conference Proceedings (OSTI)

In this work, we will analyze the problem of source separation in the case of superpositions of different source images, which need to be extracted from a set of noisy observations. This problem occurs, for example, in the field of astrophysics, where ... Keywords: Bayesian source separation, Image separation, Non-stationary noise, Particle filtering, Sequential Monte Carlo

Mauro Costagli; Ercan Engin Kuruo?lu

2007-09-01T23:59:59.000Z

382

Image Processing Mar. 19, 2013  

E-Print Network (OSTI)

on a regular grid · Quantize each sample (round to nearest integer) · Image thus represented as a matrix function: function that maps input pixel value to luminance of displayed image · What determines intensity, Imax ­ how much power can be channeled into a pixel? · LCD: backlight intensity, transmission

Erdem, Erkut

383

Content-based image retrieval  

Science Conference Proceedings (OSTI)

In order to retrieve images it is much more sophisticated and usual for human beings to use natural language concepts, e.g. mountainlake, than syntactical features, e.g. red region left up. This leads to a content-based image retrieval. ...

Th. Hermes; Ch. Klauck; J. Kreyß; J. Zhang

1995-11-01T23:59:59.000Z

384

Image capture system colors transforms  

Science Conference Proceedings (OSTI)

The goal of this paper is to simulate the colors transforms of the reflected light from an illuminated object that passes trough an image capture system. We are interested to see the colors differences at the output of each component from which the light ... Keywords: CIE standards, human eye response, lenses and filters transmittance, spectral images

Toadere Florin

2010-02-01T23:59:59.000Z

385

Video surveillance with speckle imaging  

DOE Patents (OSTI)

A surveillance system looks through the atmosphere along a horizontal or slant path. Turbulence along the path causes blurring. The blurring is corrected by speckle processing short exposure images recorded with a camera. The exposures are short enough to effectively freeze the atmospheric turbulence. Speckle processing is used to recover a better quality image of the scene.

Carrano, Carmen J. (Livermore, CA); Brase, James M. (Pleasanton, CA)

2007-07-17T23:59:59.000Z

386

Feature Recognition in Solar Images  

Science Conference Proceedings (OSTI)

Despite several decades of research and development in the field of pattern recognition, the general problem of recognizing complex patterns with arbitrary orientations, locations, and scales remains unsolved and normally is applied using iterative manual ... Keywords: Bayesian inference, artificial neural network, digital solar image, edge detection, image segmentation, morphological operations, noise smoothing, pattern recognition, region growing, shape correction

Valentina Zharkova; Stanley Ipson; Ali Benkhalil; Sergei Zharkov

2005-05-01T23:59:59.000Z

387

Automatic image segmentation optimized by bilateral filtering  

Science Conference Proceedings (OSTI)

The object-based methodology is one of the most commonly used strategies for processing high spatial resolution images. A prerequisite to object-based image analysis is image segmentation, which is normally defined as the subdivision of an image into ... Keywords: bilateral filter, image segmentation, self-calibrating framework

Javier Sanchez; Estibaliz Martinez; Agueda Arquero; Diego Renza

2010-11-01T23:59:59.000Z

388

Coronal loop detection from solar images  

Science Conference Proceedings (OSTI)

In this paper, we make an overview of a methodology for the automatic retrieval of images with coronal loops from the solar image data captured by the extreme-ultraviolet imaging telescope (EIT) onboard the spacecraft SOHO (Solar and Heliospheric Observatory). ... Keywords: Classification techniques, Coronal loop, Curvature feature, Data mining, Feature extraction, Image retrieval, Solar images

Nurcan Durak; Olfa Nasraoui; Joan Schmelz

2009-11-01T23:59:59.000Z

389

Computing depth maps from descent images  

Science Conference Proceedings (OSTI)

In the exploration of the planets of our solar system, images taken during a lander's descent to the surface of a planet provide a critical link between orbital images and surface images. The descent images not only allow us to locate the landing site ... Keywords: Descent images, Motion estimation, Planetary exploration, Structure from motion, Terrain mapping

Yalin Xiong, Clark F. Olson, Larry H. Matthies

2005-05-01T23:59:59.000Z

390

Mutual information aspects of scale space images  

Science Conference Proceedings (OSTI)

In image registration, mutual information is a well-performing measure based on principles of uncertainty. Similarly, in image analysis the Gaussian scale space, based on minimal assumptions of the image, is used to derive intrinsic properties of an ... Keywords: Entropy, Image analysis, Image structure, Multiresolution, Mutual information, Registration, Scale space

A. Kuijper

2004-12-01T23:59:59.000Z

391

Edge structure preserving 3-D image denoising  

Science Conference Proceedings (OSTI)

In various applications, including magnetic resonance imaging (MRI) and functional MRI (fMRI), 3- D images get increasingly popular. To improve reliability of subsequent image analyses, 3-D image denoising is often a necessary pre-processing step, which ... Keywords: edge-preserving image restoration, jump regression analysis, surface estimation

Peihua Qiu; Partha Sarathi Mukherjee

2011-01-01T23:59:59.000Z

392

Application of Parallel Imaging to Murine Magnetic Resonance Imaging  

E-Print Network (OSTI)

The use of parallel imaging techniques for image acceleration is now common in clinical magnetic resonance imaging (MRI). There has been limited work, however, in translating the parallel imaging techniques to routine animal imaging. This dissertation describes foundational level work to enable parallel imaging of mice on a 4.7 Tesla/40 cm bore research scanner. Reducing the size of the hardware setup associated with typical parallel imaging was an integral part of achieving the work, as animal scanners are typically small-bore systems. To that end, an array element design is described that inherently decouples from a homogenous transmit field, potentially allowing for elimination of typically necessary active detuning switches. The unbalanced feed of this "dual-plane pair" element also eliminates the need for baluns in this case. The use of the element design in a 10-channel adjustable array coil for mouse imaging is presented, styled as a human cardiac top-bottom half-rack design. The design and construction of the homogenous transmit birdcage coil used is also described, one of the necessary components to eliminating the active detuning networks on the array elements. In addition, the design of a compact, modular multi-channel isolation preamplifier board is described, removing the preamplifiers from the elements and saving space in the bore. Several additions/improvements to existing laboratory infrastructure needed for parallel imaging of live mice are also described, including readying an animal preparation area and developing the ability to maintain isoflurane anesthesia delivery during scanning. In addition, the ability to trigger the MRI scanner to the ECG and respiratory signals from the mouse in order to achieve images free from physiological motion artifacts is described. The imaging results from the compact 10-channel mouse array coils are presented, and the challenges associated with the work are described, including difficulty achieving sample-loss dominance and signal-to-noise ratio (SNR) limitations. In conclusion, in vivo imaging of mice with cardiac and respiratory gating has been demonstrated. Compact array coils tailored for mice have been studied and potential future work and design improvements for our lab in this area are discussed.

Chang, Chieh-Wei 1980-

2012-12-01T23:59:59.000Z

393

Image Source Separation using Color Channel Dependencies  

E-Print Network (OSTI)

problem. For astrophysical images, Bedini et al. [2] proposed a method for cor- related component of transmitted and reflected images. Int. J. Imaging Science Tech- nology, 15, 84­91, (2005) 2. Bedini, L

394

Multimedia Semantic Features and Image Content Description  

Science Conference Proceedings (OSTI)

Content-based indexing and retrieval of images and video requires a proper semantic description for image content. This paper discusses the mapping of high-level, application-specific, features to the visual primitives that are accessible through image ...

M. Cavazza; R. J. Green; I. J. Palmer

1998-10-01T23:59:59.000Z

395

Stripe: image feature based on a new grid method and its application in ImageCLEF  

Science Conference Proceedings (OSTI)

There have been many features developed for images, like Blob, image patches, Gabor filters, etc. But generally the calculation cost is too high. When facing a large image database, their responding speed can hardly satisfy users’ demand in real ... Keywords: image annotation, image feature, image retrieval, stripe

Bo Qiu; Daniel Racoceanu; Chang Sheng Xu; Qi Tian

2006-10-01T23:59:59.000Z

396

Image Logs | Open Energy Information  

Open Energy Info (EERE)

Image Logs Image Logs Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Technique: Image Logs Details Activities (2) Areas (1) Regions (0) NEPA(0) Exploration Technique Information Exploration Group: Downhole Techniques Exploration Sub Group: Well Log Techniques Parent Exploration Technique: Well Log Techniques Information Provided by Technique Lithology: Identify different lithological layers, rock composition, grain size, mineral, and clay content Stratigraphic/Structural: -Fault and fracture identification -Rock texture, porosity, and stress analysis -determine dip, thickness, and geometry of rock strata in vicinity of borehole -Detection of permeable pathways, fracture zones, faults Hydrological: Locate zones of aquifer inflow/outflow Thermal:

397

Imaging radiation detector with gain  

DOE Patents (OSTI)

A radiation imaging device which has application in x-ray imaging. The device can be utilized in CAT scanners and other devices which require high sensitivity and low x-ray fluxes. The device utilizes cumulative multiplication of charge carriers on the anode plane and the collection of positive ion charges to image the radiation intensity on the cathode plane. Parallel and orthogonal cathode wire arrays are disclosed as well as a two-dimensional grid pattern for collecting the positive ions on the cathode.

Morris, C.L.; Idzorek, G.C.; Atencio, L.G.

1982-07-21T23:59:59.000Z

398

Imaging radiation detector with gain  

DOE Patents (OSTI)

A radiation imaging device which has application in x-ray imaging. The device can be utilized in CAT scanners and other devices which require high sensitivity and low x-ray fluxes. The device utilizes cumulative multiplication of charge carriers on the anode plane and the collection of positive ion charges to image the radiation intensity on the cathode plane. Parallel and orthogonal cathode wire arrays are disclosed as well as a two-dimensional grid pattern for collecting the positive ions on the cathode.

Morris, Christopher L. (Los Alamos, NM); Idzorek, George C. (Los Alamos, NM); Atencio, Leroy G. (Espanola, NM)

1984-01-01T23:59:59.000Z

399

Image Storage in Hot Vapors  

E-Print Network (OSTI)

We theoretically investigate image propagation and storage in hot atomic vapor. A $4f$ system is adopted for imaging and an atomic vapor cell is placed over the transform plane. The Fraunhofer diffraction pattern of an object in the object plane can thus be transformed into atomic Raman coherence according to the idea of ``light storage''. We investigate how the stored diffraction pattern evolves under diffusion. Our result indicates, under appropriate conditions, that an image can be reconstructed with high fidelity. The main reason for this procedure to work is the fact that diffusion of opposite-phase components of the diffraction pattern interfere destructively.

Zhao, L; Xiao, Y; Yelin, S F

2007-01-01T23:59:59.000Z

400

Image Storage in Hot Vapors  

E-Print Network (OSTI)

We theoretically investigate image propagation and storage in hot atomic vapor. A $4f$ system is adopted for imaging and an atomic vapor cell is placed over the transform plane. The Fraunhofer diffraction pattern of an object in the object plane can thus be transformed into atomic Raman coherence according to the idea of ``light storage''. We investigate how the stored diffraction pattern evolves under diffusion. Our result indicates, under appropriate conditions, that an image can be reconstructed with high fidelity. The main reason for this procedure to work is the fact that diffusion of opposite-phase components of the diffraction pattern interfere destructively.

L. Zhao; T. Wang; Y. Xiao; S. F. Yelin

2007-10-22T23:59:59.000Z

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Full Size Image - Energy Innovation Portal  

Site Map; Printable Version; Share this resource. Send a link to Full Size Image - Energy Innovation Portalto someone by E-mail; Share Full Size Image - Energy ...

402

3-Dimensional Imaging At Nanometer Resolutions  

NLE Websites -- All DOE Office Websites (Extended Search)

Information Technology & Communications 3-Dimensional Imaging At Nanometer Resolutions 3-Dimensional Imaging At Nanometer Resolutions An apparatus and method for enabling...

403

Index of /images/whole.frog/data  

NLE Websites -- All DOE Office Websites (Extended Search)

data Parent Directory Copyright.Notice FROG.IMAGES.tar MRI color.images.zip frog.data.Z frog.hd masks...

404

Electron Beam Imaging - Programmaster.org  

Science Conference Proceedings (OSTI)

Sep 14, 2009 ... 13th International Conference on Defects--Recognition, Imaging and Physics in Semiconductors: Electron Beam Imaging Program Organizers: ...

405

Physicists Produce Quantum-Entangled Images -- Convenient ...  

Science Conference Proceedings (OSTI)

... image, rotated by 180 degrees with respect to the pump beam and ... light; such slowed images could be used in information storage and processing ...

2010-10-05T23:59:59.000Z

406

Full Size Image - Energy Innovation Portal  

Site Map; Printable Version; Share this resource. Send a link to Full Size Image - Energy Innovation Portalto someone by E-mail; Share Full Size Image ...

407

Breast Tissue Imaging | ORNL Neutron Sciences  

NLE Websites -- All DOE Office Websites (Extended Search)

the hydrogen-sensitive neutron imaging capabilities at the High Flux Isotope Reactor (HFIR) to image healthy and cancerous breast tissue specimens. Working with Hassina Bilheux,...

408

Property:Facility Image | Open Energy Information  

Open Energy Info (EERE)

Facility Image Jump to: navigation, search This is a property of type String. Retrieved from "http:en.openei.orgwindex.php?titleProperty:FacilityImage&oldid606817" What...

409

Fluid Imaging | Open Energy Information  

Open Energy Info (EERE)

Page Page Edit History Facebook icon Twitter icon » Fluid Imaging Jump to: navigation, search Contents 1 Geothermal Lab Call Projects for Fluid Imaging 2 Geothermal ARRA Funded Projects for Fluid Imaging Geothermal Lab Call Projects for Fluid Imaging Loading map... {"format":"googlemaps3","type":"ROADMAP","types":["ROADMAP","SATELLITE","HYBRID","TERRAIN"],"limit":200,"offset":0,"link":"all","sort":[""],"order":[],"headers":"show","mainlabel":"","intro":"","outro":"","searchlabel":"\u2026 further results","default":"","geoservice":"google","zoom":14,"width":"600px","height":"350px","centre":false,"layers":[],"controls":["pan","zoom","type","scale","streetview"],"zoomstyle":"DEFAULT","typestyle":"DEFAULT","autoinfowindows":false,"kml":[],"gkml":[],"fusiontables":[],"resizable":false,"tilt":0,"kmlrezoom":false,"poi":true,"imageoverlays":[],"markercluster":false,"searchmarkers":"","icon":"","visitedicon":"","forceshow":true,"showtitle":true,"hidenamespace":false,"template":false,"title":"","label":"","lines":[],"polygons":[],"circles":[],"rectangles":[],"locations":[{"text":"

410

High speed imaging television system  

DOE Patents (OSTI)

A television system for observing an event which provides a composite video output comprising the serially interlaced images the system is greater than the time resolution of any of the individual cameras.

Wilkinson, William O. (Silver Spring, MD); Rabenhorst, David W. (Silver Spring, MD)

1984-01-01T23:59:59.000Z

411

Feature-guided image stippling  

Science Conference Proceedings (OSTI)

This paper presents an automatic method for producing stipple renderings from photographs, following the style of professional hedcut illustrations. For effective depiction of image features, we introduce a novel dot placement algorithm which adapts ...

Dongyeon Kim; Minjung Son; Yunjin Lee; Henry Kang; Seungyong Lee

2008-06-01T23:59:59.000Z

412

High Speed Particle Image Velocimetry  

This patent application discloses a novel method to simultaneously track the motion of high numbers of object images under extreme, high concen-tration conditions. Although the software is designed to simultaneously track large numbers of particle ...

413

Lensless Imaging of Magnetic Nanostructures  

NLE Websites -- All DOE Office Websites (Extended Search)

Wednesday, 28 March 2012 00:00 Magnetism is useful for many devices and techniques, from electric motors and computer hard drives to magnetic resonance imaging used in medicine....

414

Methods for functional brain imaging  

E-Print Network (OSTI)

Magnetic resonance imaging (MRI) has demonstrated the potential for non-invasive mapping of structure and function (fMRI) in the human brain. In this thesis, we propose a series of methodological developments towards ...

Witzel, Thomas, Ph. D. Massachusetts Institute of Technology

2011-01-01T23:59:59.000Z

415

Radiopharmaceuticals for imaging the heart  

DOE Patents (OSTI)

Radiopharmaceuticals for imaging myocardial tissues are prepared by forming lipophilic, cationic complexes of radioactive metal ions with metal chelating ligands comprising the Schiff base adducts of triamines and tetraamines with optionally substituted salicylaldehydes. The lipophilic, cationic, radioactive complexes of the invention exhibit high uptake and retention in myocardial tissues. Preferred gallium-68(III) complexes in accordance with this invention can be used to image the heart using positron emission tomography.

Green, Mark A. (West Lafayette, IN); Tsang, Brenda W. (Lafayette, IN)

1994-01-01T23:59:59.000Z

416

Radiopharmaceuticals for imaging the heart  

DOE Patents (OSTI)

Radiopharmaceuticals for imaging myocardial tissues are prepared by forming lipophilic, cationic complexes of radioactive metal ions with metal chelating ligands comprising the Schiff base adducts of triamines and tetraamines with optionally substituted salicylaldehydes. The lipophilic, cationic, radioactive complexes of the invention exhibit high uptake and retention in myocardial tissues. Preferred gallium-68(III) complexes in accordance with this invention can be used to image the heart using positron emission tomography. 6 figures.

Green, M.A.; Tsang, B.W.

1994-06-28T23:59:59.000Z

417

Neutron Imaging of Archaeological Bronzes  

Science Conference Proceedings (OSTI)

This article presents the initial results of 2-D and 3-D neutron imaging of bronze artifacts using the CG-1D prototype beamline at the High Flux Isotope Reactor (HFIR) located at the Oak Ridge National Laboratory (ORNL). Neutron imaging is a non-destructive technique capable of producing unprecedented three-dimensional information on archaeomaterials, including qualitative, quantitative, and visual data on impurities, composition change, voids, and c

Ryzewski, Krysta [Wayne State University, Detroit; Herringer, Susan [Brown University; Bilheux, Hassina Z [ORNL; Walker, Lakeisha MH [ORNL; Sheldon, Brian [Brown University; Voisin, Sophie [ORNL; Bilheux, Jean-Christophe [ORNL; Finocchiaro, Vincenzo [University of Messina, Messina, Italy

2013-01-01T23:59:59.000Z

418

High speed imager test station  

DOE Patents (OSTI)

A test station enables the performance of a solid state imager (herein called a focal plane array or FPA) to be determined at high image frame rates. A programmable waveform generator is adapted to generate clock pulses at determinable rates for clock light-induced charges from a FPA. The FPA is mounted on an imager header board for placing the imager in operable proximity to level shifters for receiving the clock pulses and outputting pulses effective to clock charge from the pixels forming the FPA. Each of the clock level shifters is driven by leading and trailing edge portions of the clock pulses to reduce power dissipation in the FPA. Analog circuits receive output charge pulses clocked from the FPA pixels. The analog circuits condition the charge pulses to cancel noise in the pulses and to determine and hold a peak value of the charge for digitizing. A high speed digitizer receives the peak signal value and outputs a digital representation of each one of the charge pulses. A video system then displays an image associated with the digital representation of the output charge pulses clocked from the FPA. In one embodiment, the FPA image is formatted to a standard video format for display on conventional video equipment. 12 figs.

Yates, G.J.; Albright, K.L.; Turko, B.T.

1995-11-14T23:59:59.000Z

419

High speed imager test station  

DOE Patents (OSTI)

A test station enables the performance of a solid state imager (herein called a focal plane array or FPA) to be determined at high image frame rates. A programmable waveform generator is adapted to generate clock pulses at determinable rates for clock light-induced charges from a FPA. The FPA is mounted on an imager header board for placing the imager in operable proximity to level shifters for receiving the clock pulses and outputting pulses effective to clock charge from the pixels forming the FPA. Each of the clock level shifters is driven by leading and trailing edge portions of the clock pulses to reduce power dissipation in the FPA. Analog circuits receive output charge pulses clocked from the FPA pixels. The analog circuits condition the charge pulses to cancel noise in the pulses and to determine and hold a peak value of the charge for digitizing. A high speed digitizer receives the peak signal value and outputs a digital representation of each one of the charge pulses. A video system then displays an image associated with the digital representation of the output charge pulses clocked from the FPA. In one embodiment, the FPA image is formatted to a standard video format for display on conventional video equipment.

Yates, George J. (Santa Fe, NM); Albright, Kevin L. (Los Alamos, NM); Turko, Bojan T. (Moraga, CA)

1995-01-01T23:59:59.000Z

420

PhytoBeta imager: a positron imager for plant biology  

SciTech Connect

Several positron emitting radioisotopes such as 11C and 13N can be used in plant biology research. The 11CO2 tracer is used to facilitate plant biology research toward optimization of plant productivity, biofuel development and carbon sequestration in biomass. Positron emission tomography (PET) imaging has been used to study carbon transport in live plants using 11CO2. Because plants typically have very thin leaves, little medium is present for the emitted positrons to undergo an annihilation event. The emitted positrons from 11C (maximum energy 960 keV) could require up to approximately 4 mm of water equivalent material for positron annihilation. Thus many of the positrons do not annihilate inside the leaf, resulting in limited sensitivity for PET imaging. To address this problem we have developed a compact beta-positive, beta-minus particle imager (PhytoBeta imager) for 11CO2 leaf imaging. The detector is based on a Hamamatsu H8500 position sensitive photomultiplier tube optically coupled via optical grease to a 0.5 mm thick Eljen EJ-212 plastic scintillator. The detector is equipped with a flexible arm to allow its placement and orientation over or under the leaf to be studied while maintaining the leaf's original orientation. To test the utility of the system the detector was used to measure carbon translocation in a leaf of the spicebush (Lindera benzoin) under two transient light conditions.

Weisenberger, Andrew G; Lee, Seungjoon; McKisson, John; McKisson, J E; Xi, Wenze; Zorn, Carl; Reid, Chantal D; Howell, Calvin R; Crowell, Alexander S; Cumberbatch, Laurie; Fallin, Brent; Stolin, Alexander

2012-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Bio-Imaging Technology Transfer and Commercialization ...  

Science Conference Proceedings (OSTI)

Bio-Imaging Technology Transfer and Commercialization Showcase. For Immediate Release: August 25, 2009. ...

2010-12-29T23:59:59.000Z

422

On the focusing of thermal images  

Science Conference Proceedings (OSTI)

In this paper we present a new thermographic image database, suitable for the analysis of automatic focusing measures. This database contains the images of 10 scenes, each of which is represented once for each of 96 different focus positions. Using this ... Keywords: Database, Focus, Image quality, Thermal image

Marcos Faundez-Zanuy; Ji?í Mekyska; Virginia Espinosa-Duró

2011-08-01T23:59:59.000Z

423

BNG5122 Medical Imaging Analysis REGISTRATION  

E-Print Network (OSTI)

16.04.2013 1 BNG5122 Medical Imaging Analysis Project REGISTRATION Gökhan Gökay Istanbul Bahçeehir University Advisor: Asst. Prof. Dr. Devrim �nay Outline 16 April 2013 2 BNG5122 Medical Imaging Analysis 2013 3 BNG5122 Medical Imaging Analysis Registration is technique for medical image analysis To combine

Ã?nay, Devrim

424

Unsupervised multiscale segmentation of color images  

Science Conference Proceedings (OSTI)

This paper proposes a new multiresolution technique for color image representation and segmentation, particularly suited for noisy images. A decimated wavelet transform is initially applied to each color channel of the image, and a multiresolution representation ... Keywords: Color images, Multiresolution, Region merging, Segmentation, Watersheds, Wavelets

Cláudio Rosito Jung

2007-03-01T23:59:59.000Z

425

Skew estimation of document images using bagging  

Science Conference Proceedings (OSTI)

This paper proposes a general-purpose method for estimating the skew angles of document images. Rather than to derive a skew angle merely from text lines, the proposed method exploits various types of visual cues of image skew available in local image ... Keywords: bagging estimator, document image analysis, floating cascade, radon transform, skew estimation

Gaofeng Meng; Chunhong Pan; Nanning Zheng; Chen Sun

2010-07-01T23:59:59.000Z

426

Game-Theoretic Integration for Image Segmentation  

Science Conference Proceedings (OSTI)

Abstract¿Robust segmentation of structures from an image is essential for a variety of image analysis problems. However, the conventional methods of region-based segmentation and gradient-based boundary finding are often frustrated by poor image quality. ... Keywords: Image segmentation, integration, game theory, boundary finding, region-based segmentation, MRF.

Amit Chakraborty; James S. Duncan

1999-01-01T23:59:59.000Z

427

Vectorized image segmentation via trixel agglomeration  

Science Conference Proceedings (OSTI)

We present a broad algorithmic framework for transforming an image comprised of pixels into a vectorized image segmented into polygons that can be subsequently used in image analysis, understanding, and high-level representation. We introduce a new entity-the ... Keywords: Delaunay triangulation, Image segmentation, Perceptual grouping, Polygonal decomposition, Region and boundary duality, Trixel, Vectorization

Lakshman Prasad; Alexei N. Skourikhine

2006-04-01T23:59:59.000Z

428

Lensless Imaging of Magnetic Nanostructures  

NLE Websites -- All DOE Office Websites (Extended Search)

Lensless Imaging of Magnetic Lensless Imaging of Magnetic Nanostructures Lensless Imaging of Magnetic Nanostructures Print Wednesday, 28 March 2012 00:00 Magnetism is useful for many devices and techniques, from electric motors and computer hard drives to magnetic resonance imaging used in medicine. By studying the basics of magnetism, scientists aim to better understand the fundamental physical principles that govern magnetic systems, perhaps leading to important new technologies. The high brightness and coherence of the ALS's soft x-rays have enabled scientists to apply lensless x-ray imaging for the first time to nanometer-scale magnetic structures in an alloy. Many Ways To See You open your eyes and detect the light rays streaming through your bedroom window (transmission), illuminating your socks on the floor (scattering). You put on your glasses (refraction) to detect the state of your image in the mirror (reflection). If you are an ALS scientist, perhaps you go to work and shine some x-ray light on a crystal to detect the arrangement of the atoms in the crystal (diffraction). Now, thanks to Turner et al., you can also shine some x-ray light on a magnetic sample to detect the arrangement of its electron spins through a method known as lensless imaging. This last example is an equally valid way to "see," but instead of using windows, lenses, or mirrors to manipulate light and construct an image, mathematical formulas are used to describe the effects that particles and fields in the sample have on the light. These formulas have always contained terms that relate to the electron spin of magnetic atoms, but they were previously ignored. Using the full formula allows for the determination of not only crystal structure, but magnetic spin distribution and orientation as well, with a spatial resolution limited only by the wavelength of x-rays used. This promising method can be used at any coherent light source, including modern x-ray free-electron lasers, where ultrashort pulses would freeze-frame magnetic changes, offering the potential for imaging in unprecedented detail the structure and motion of boundaries between regions with different magnetic orientation.

429

STAR Images: Image gallery from the Solenoidal Tracker at RHIC  

DOE Data Explorer (OSTI)

The primary physics task of STAR is to study the formation and characteristics of the quark-gluon plasma (QGP), a state of matter believed to exist at sufficiently high energy densities. STAR consists of several types of detectors, each specializing in detecting certain types of particles or characterizing their motion. These detectors allow final statements to be made about the collision. The gallery of STAR images makes available a small collection of event-generated images from Gold-Beam experiments, a simulation of TCP Drift, and a library of STAR instrument and construction photos. [See also DDE00093

The STAR Collaboration

430

Three-dimensional medical imaging: algorithms and computer systems  

Science Conference Proceedings (OSTI)

Keywords: Computer graphics, medical imaging, surface rendering, three-dimensional imaging, volume rendering

M. R. Stytz; G. Frieder; O. Frieder

1991-12-01T23:59:59.000Z

431

PatchNet: a patch-based image representation for interactive library-driven image editing  

Science Conference Proceedings (OSTI)

We introduce PatchNets, a compact, hierarchical representation describing structural and appearance characteristics of image regions, for use in image editing. In a PatchNet, an image region with coherent appearance is summarized by a graph node, ... Keywords: PatchNet, contextual features, image representation, interactive image editing, patch synthesis

Shi-Min Hu, Fang-Lue Zhang, Miao Wang, Ralph R. Martin, Jue Wang

2013-11-01T23:59:59.000Z

432

Multispectral Imaging | Open Energy Information  

Open Energy Info (EERE)

Multispectral Imaging Multispectral Imaging Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Technique: Multispectral Imaging Details Activities (35) Areas (22) Regions (1) NEPA(0) Exploration Technique Information Exploration Group: Remote Sensing Techniques Exploration Sub Group: Passive Sensors Parent Exploration Technique: Passive Sensors Information Provided by Technique Lithology: relative mineral maps Stratigraphic/Structural: aerial photographs can show structures Hydrological: delineate locations of surface water features Thermal: vegetation maps can show plants stressed due to nearby thermal activity Cost Information Low-End Estimate (USD): 10.001,000 centUSD 0.01 kUSD 1.0e-5 MUSD 1.0e-8 TUSD / sq. mile Median Estimate (USD): 370.2337,023 centUSD

433

HAWC Observatory captures first image  

NLE Websites -- All DOE Office Websites (Extended Search)

April » April » HAWC Observatory captures first image HAWC Observatory captures first image The facility is designed to detect cosmic rays and the highest energy gamma rays ever observed from astrophysical sources. April 30, 2013 The High-Altitude Water Cherenkov (HAWC) Observatory is under construction. The High-Altitude Water Cherenkov (HAWC) Observatory is under construction. HAWC is under construction inside the Parque Nacional Pico de Orizaba, a Mexican national park. An international team of researchers, including scientists from Los Alamos, has taken the first image of the High-Altitude Water Cherenkov Observatory, or HAWC. The facility is designed to detect cosmic rays and the highest energy gamma rays ever observed from astrophysical sources. HAWC is under

434

Hyperspectral Imaging | Open Energy Information  

Open Energy Info (EERE)

Hyperspectral Imaging Hyperspectral Imaging Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Exploration Technique: Hyperspectral Imaging Details Activities (4) Areas (4) Regions (1) NEPA(1) Exploration Technique Information Exploration Group: Remote Sensing Techniques Exploration Sub Group: Passive Sensors Parent Exploration Technique: Passive Sensors Information Provided by Technique Lithology: mineral maps can be used to show the presence of hydrothermal minerals and mineral assemblages Stratigraphic/Structural: aerial photographs can show structures Hydrological: delineate locations of surface water features Thermal: vegetation maps can show plants stressed due to nearby thermal activity Cost Information Low-End Estimate (USD): 8.63863 centUSD 0.00863 kUSD 8.63e-6 MUSD

435

Miniature hybrid optical imaging lens  

DOE Patents (OSTI)

A miniature lens system that corrects for imaging and chromatic aberrations, the lens system being fabricated from primarily commercially-available components. A first element at the input to a lens housing is an aperture stop. A second optical element is a refractive element with a diffractive element closely coupled to, or formed a part of, the rear surface of the refractive element. Spaced closely to the diffractive element is a baffle to limit the area of the image, and this is closely followed by a second refractive lens element to provide the final correction. The image, corrected for aberrations exits the last lens element to impinge upon a detector plane were is positioned any desired detector array. The diffractive element is fabricated according to an equation that includes, as variables, the design wavelength, the index of refraction and the radius from an optical axis of the lens system components.

Sitter, Jr., David N. (Knoxville, TN); Simpson, Marc L. (Knoxville, TN)

1997-01-01T23:59:59.000Z

436

Miniature hybrid optical imaging lens  

DOE Patents (OSTI)

A miniature lens system that corrects for imaging and chromatic aberrations is disclosed, the lens system being fabricated from primarily commercially-available components. A first element at the input to a lens housing is an aperture stop. A second optical element is a refractive element with a diffractive element closely coupled to, or formed a part of, the rear surface of the refractive element. Spaced closely to the diffractive element is a baffle to limit the area of the image, and this is closely followed by a second refractive lens element to provide the final correction. The image, corrected for aberrations exits the last lens element to impinge upon a detector plane were is positioned any desired detector array. The diffractive element is fabricated according to an equation that includes, as variables, the design wavelength, the index of refraction and the radius from an optical axis of the lens system components. 2 figs.

Sitter, D.N. Jr.; Simpson, M.L.

1997-10-21T23:59:59.000Z

437

Chapter 17. Biomedical Optical Imaging Biomedical Optical Imaging  

E-Print Network (OSTI)

. Figure 1.2 shows the schematic diagram of a spectral / Fourier-domain OCT system. A broadband light imaging. The system consists of an interferometer with a spectrometer and line scan camera. Light. The incident light power on the eye is 750 W, the same exposure used in commercial ophthalmic OCT systems

438

Image reconstruction for two-color microgrid polarimetric imagers  

Science Conference Proceedings (OSTI)

A Fourier domain method for reconstructing passive Stokes imagery from a two-color microgrid polarization imager is presented in this paper. This new filter-based technique is designed to avoid aliased spectrum content caused by sampling in a checkerboard ...

Daniel A. LeMaster

2011-03-01T23:59:59.000Z

439

Lensless Imaging of Magnetic Nanostructures  

NLE Websites -- All DOE Office Websites (Extended Search)

Lensless Imaging of Magnetic Nanostructures Print Lensless Imaging of Magnetic Nanostructures Print Magnetism is useful for many devices and techniques, from electric motors and computer hard drives to magnetic resonance imaging used in medicine. By studying the basics of magnetism, scientists aim to better understand the fundamental physical principles that govern magnetic systems, perhaps leading to important new technologies. The high brightness and coherence of the ALS's soft x-rays have enabled scientists to apply lensless x-ray imaging for the first time to nanometer-scale magnetic structures in an alloy. Many Ways To See You open your eyes and detect the light rays streaming through your bedroom window (transmission), illuminating your socks on the floor (scattering). You put on your glasses (refraction) to detect the state of your image in the mirror (reflection). If you are an ALS scientist, perhaps you go to work and shine some x-ray light on a crystal to detect the arrangement of the atoms in the crystal (diffraction). Now, thanks to Turner et al., you can also shine some x-ray light on a magnetic sample to detect the arrangement of its electron spins through a method known as lensless imaging. This last example is an equally valid way to "see," but instead of using windows, lenses, or mirrors to manipulate light and construct an image, mathematical formulas are used to describe the effects that particles and fields in the sample have on the light. These formulas have always contained terms that relate to the electron spin of magnetic atoms, but they were previously ignored. Using the full formula allows for the determination of not only crystal structure, but magnetic spin distribution and orientation as well, with a spatial resolution limited only by the wavelength of x-rays used. This promising method can be used at any coherent light source, including modern x-ray free-electron lasers, where ultrashort pulses would freeze-frame magnetic changes, offering the potential for imaging in unprecedented detail the structure and motion of boundaries between regions with different magnetic orientation.

440

Lensless Imaging of Magnetic Nanostructures  

NLE Websites -- All DOE Office Websites (Extended Search)

Lensless Imaging of Magnetic Nanostructures Print Lensless Imaging of Magnetic Nanostructures Print Magnetism is useful for many devices and techniques, from electric motors and computer hard drives to magnetic resonance imaging used in medicine. By studying the basics of magnetism, scientists aim to better understand the fundamental physical principles that govern magnetic systems, perhaps leading to important new technologies. The high brightness and coherence of the ALS's soft x-rays have enabled scientists to apply lensless x-ray imaging for the first time to nanometer-scale magnetic structures in an alloy. Many Ways To See You open your eyes and detect the light rays streaming through your bedroom window (transmission), illuminating your socks on the floor (scattering). You put on your glasses (refraction) to detect the state of your image in the mirror (reflection). If you are an ALS scientist, perhaps you go to work and shine some x-ray light on a crystal to detect the arrangement of the atoms in the crystal (diffraction). Now, thanks to Turner et al., you can also shine some x-ray light on a magnetic sample to detect the arrangement of its electron spins through a method known as lensless imaging. This last example is an equally valid way to "see," but instead of using windows, lenses, or mirrors to manipulate light and construct an image, mathematical formulas are used to describe the effects that particles and fields in the sample have on the light. These formulas have always contained terms that relate to the electron spin of magnetic atoms, but they were previously ignored. Using the full formula allows for the determination of not only crystal structure, but magnetic spin distribution and orientation as well, with a spatial resolution limited only by the wavelength of x-rays used. This promising method can be used at any coherent light source, including modern x-ray free-electron lasers, where ultrashort pulses would freeze-frame magnetic changes, offering the potential for imaging in unprecedented detail the structure and motion of boundaries between regions with different magnetic orientation.

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Image-Based Lighting Design  

E-Print Network (OSTI)

In this paper, we present a lighting design framework for neardiffuse real objects, starting from a set of prerecorded photographs of an object under various lighting conditions. Light sources are placed at fixed positions around an object, for which the intensities are to be determined. Using existing digital imaging software, the lighting designer paints the desired illumination distribution on a photograph of an object. This painted-on illumination is used to determine the light intensities which produce a shading of the real object matching the desired illumination distribution. Certain areas in the painted image can be favored among others by weighting their importance in the optimization algorithm.

F. Anrys; P. Dutré

2004-01-01T23:59:59.000Z

442

Electronic imaging system and technique  

DOE Patents (OSTI)

A method and system for viewing objects obscurred by intense plasmas or flames (such as a welding arc) includes a pulsed light source to illuminate the object, the peak brightness of the light reflected from the object being greater than the brightness of the intense plasma or flame; an electronic image sensor for detecting a pulsed image of the illuminated object, the sensor being operated as a high-speed shutter; and electronic means for synchronizing the shutter operation with the pulsed light source.

Bolstad, J.O.

1984-06-12T23:59:59.000Z

443

Electronic imaging system and technique  

SciTech Connect

A method and system for viewing objects obscurred by intense plasmas or flames (such as a welding arc) includes a pulsed light source to illuminate the object, the peak brightness of the light reflected from the object being greater than the brightness of the intense plasma or flame; an electronic image sensor for detecting a pulsed image of the illuminated object, the sensor being operated as a high-speed shutter; and electronic means for synchronizing the shutter operation with the pulsed light source.

Bolstad, Jon O. (Idaho Falls, ID)

1987-01-01T23:59:59.000Z

444

Multispectral imaging method and apparatus  

DOE Patents (OSTI)

A multispectral imaging method and apparatus are described which are adapted for use in determining material properties, especially properties characteristic of abnormal non-dermal cells. A target is illuminated with a narrow band light beam. The target expresses light in response to the excitation. The expressed light is collected and the target's response at specific response wavelengths to specific excitation wavelengths is measured. From the measured multispectral response the target's properties can be determined. A sealed, remote probe and robust components can be used for cervical imaging. 5 figs.

Sandison, D.R.; Platzbecker, M.R.; Vargo, T.D.; Lockhart, R.R.; Descour, M.R.; Richards-Kortum, R.

1999-07-06T23:59:59.000Z

445

NEUTRON IMAGING, RADIOGRAPHY AND TOMOGRAPHY.  

SciTech Connect

Neutrons are an invaluable probe in a wide range of scientific, medical and commercial endeavors. Many of these applications require the recording of an image of the neutron signal, either in one-dimension or in two-dimensions. We summarize the reactions of neutrons with the most important elements that are used for their detection. A description is then given of the major techniques used in neutron imaging, with emphasis on the detection media and position readout principle. Important characteristics such as position resolution, linearity, counting rate capability and sensitivity to gamma-background are discussed. Finally, the application of a subset of these instruments in radiology and tomography is described.

SMITH,G.C.

2002-03-01T23:59:59.000Z

446

Lensless Imaging of Magnetic Nanostructures  

NLE Websites -- All DOE Office Websites (Extended Search)

Lensless Imaging of Magnetic Nanostructures Print Lensless Imaging of Magnetic Nanostructures Print Magnetism is useful for many devices and techniques, from electric motors and computer hard drives to magnetic resonance imaging used in medicine. By studying the basics of magnetism, scientists aim to better understand the fundamental physical principles that govern magnetic systems, perhaps leading to important new technologies. The high brightness and coherence of the ALS's soft x-rays have enabled scientists to apply lensless x-ray imaging for the first time to nanometer-scale magnetic structures in an alloy. Many Ways To See You open your eyes and detect the light rays streaming through your bedroom window (transmission), illuminating your socks on the floor (scattering). You put on your glasses (refraction) to detect the state of your image in the mirror (reflection). If you are an ALS scientist, perhaps you go to work and shine some x-ray light on a crystal to detect the arrangement of the atoms in the crystal (diffraction). Now, thanks to Turner et al., you can also shine some x-ray light on a magnetic sample to detect the arrangement of its electron spins through a method known as lensless imaging. This last example is an equally valid way to "see," but instead of using windows, lenses, or mirrors to manipulate light and construct an image, mathematical formulas are used to describe the effects that particles and fields in the sample have on the light. These formulas have always contained terms that relate to the electron spin of magnetic atoms, but they were previously ignored. Using the full formula allows for the determination of not only crystal structure, but magnetic spin distribution and orientation as well, with a spatial resolution limited only by the wavelength of x-rays used. This promising method can be used at any coherent light source, including modern x-ray free-electron lasers, where ultrashort pulses would freeze-frame magnetic changes, offering the potential for imaging in unprecedented detail the structure and motion of boundaries between regions with different magnetic orientation.

447

Lensless Imaging of Magnetic Nanostructures  

NLE Websites -- All DOE Office Websites (Extended Search)

Lensless Imaging of Magnetic Nanostructures Print Lensless Imaging of Magnetic Nanostructures Print Magnetism is useful for many devices and techniques, from electric motors and computer hard drives to magnetic resonance imaging used in medicine. By studying the basics of magnetism, scientists aim to better understand the fundamental physical principles that govern magnetic systems, perhaps leading to important new technologies. The high brightness and coherence of the ALS's soft x-rays have enabled scientists to apply lensless x-ray imaging for the first time to nanometer-scale magnetic structures in an alloy. Many Ways To See You open your eyes and detect the light rays streaming through your bedroom window (transmission), illuminating your socks on the floor (scattering). You put on your glasses (refraction) to detect the state of your image in the mirror (reflection). If you are an ALS scientist, perhaps you go to work and shine some x-ray light on a crystal to detect the arrangement of the atoms in the crystal (diffraction). Now, thanks to Turner et al., you can also shine some x-ray light on a magnetic sample to detect the arrangement of its electron spins through a method known as lensless imaging. This last example is an equally valid way to "see," but instead of using windows, lenses, or mirrors to manipulate light and construct an image, mathematical formulas are used to describe the effects that particles and fields in the sample have on the light. These formulas have always contained terms that relate to the electron spin of magnetic atoms, but they were previously ignored. Using the full formula allows for the determination of not only crystal structure, but magnetic spin distribution and orientation as well, with a spatial resolution limited only by the wavelength of x-rays used. This promising method can be used at any coherent light source, including modern x-ray free-electron lasers, where ultrashort pulses would freeze-frame magnetic changes, offering the potential for imaging in unprecedented detail the structure and motion of boundaries between regions with different magnetic orientation.

448

Definition: Hyperspectral Imaging | Open Energy Information  

Open Energy Info (EERE)

Imaging Imaging Jump to: navigation, search Dictionary.png Hyperspectral Imaging Hyperspectral sensors collect data across a wide range of the spectrum (VNIR-LWIR, plus TIR) at small spectral resolution (5-15 nm) and high spatial resolution (1-5 m). This allows detailed spectral signatures to be identified for different imaged materials - for example hyperspectral imaging can be used to identify specific clay minerals; multispectral imaging can identify only the presence of clay minerals in general. View on Wikipedia Wikipedia Definition Hyperspectral imaging, like other spectral imaging, collects and processes information from across the electromagnetic spectrum. Much as the human eye sees visible light in three bands (red, green, and blue), spectral imaging divides the spectrum into many more bands. This technique

449

Multi-channel medical imaging system  

Science Conference Proceedings (OSTI)

A medical imaging system provides simultaneous rendering of visible light and fluorescent images. The system may employ dyes in a small-molecule form that remain in the subject's blood stream for several minutes, allowing real-time imaging of the subject's circulatory system superimposed upon a conventional, visible light image of the subject. The system may provide an excitation light source to excite the fluorescent substance and a visible light source for general illumination within the same optical guide used to capture images. The system may be configured for use in open surgical procedures by providing an operating area that is closed to ambient light. The systems described herein provide two or more diagnostic imaging channels for capture of multiple, concurrent diagnostic images and may be used where a visible light image may be usefully supplemented by two or more images that are independently marked for functional interest.

Frangioni, John V

2013-12-31T23:59:59.000Z

450

Multi-channel medical imaging system  

DOE Patents (OSTI)

A medical imaging system provides simultaneous rendering of visible light and fluorescent images. The system may employ dyes in a small-molecule form that remain in the subject's blood stream for several minutes, allowing real-time imaging of the subject's circulatory system superimposed upon a conventional, visible light image of the subject. The system may provide an excitation light source to excite the fluorescent substance and a visible light source for general illumination within the same optical guide used to capture images. The system may be configured for use in open surgical procedures by providing an operating area that is closed to ambient light. The systems described herein provide two or more diagnostic imaging channels for capture of multiple, concurrent diagnostic images and may be used where a visible light image may be usefully supplemented by two or more images that are independently marked for functional interest.

Frangioni, John V

2013-12-31T23:59:59.000Z

451

Imaging the Surface of Altair  

E-Print Network (OSTI)

Spatially resolving the surfaces of nearby stars promises to advance our knowledge of stellar physics. Using optical long-baseline interferometry, we present here a near-infrared image of the rapidly rotating hot star Altair with results, requiring differential rotation, alternative gravity darkening laws, or both.

John D. Monnier; M. Zhao; E. Pedretti; N. Thureau; M. Ireland; P. Muirhead; J. -P. Berger; R. Millan-Gabet; G. Van Belle; T. ten Brummelaar; H. McAlister; S. Ridgway; N. Turner; L. Sturmann; J. Sturmann; D. Berger

2007-06-06T23:59:59.000Z

452

Hadamard multimode optical imaging transceiver  

SciTech Connect

Disclosed is a method and system for simultaneously acquiring and producing results for multiple image modes using a common sensor without optical filtering, scanning, or other moving parts. The system and method utilize the Walsh-Hadamard correlation detection process (e.g., functions/matrix) to provide an all-binary structure that permits seamless bridging between analog and digital domains. An embodiment may capture an incoming optical signal at an optical aperture, convert the optical signal to an electrical signal, pass the electrical signal through a Low-Noise Amplifier (LNA) to create an LNA signal, pass the LNA signal through one or more correlators where each correlator has a corresponding Walsh-Hadamard (WH) binary basis function, calculate a correlation output coefficient for each correlator as a function of the corresponding WH binary basis function in accordance with Walsh-Hadamard mathematical principles, digitize each of the correlation output coefficient by passing each correlation output coefficient through an Analog-to-Digital Converter (ADC), and performing image mode processing on the digitized correlation output coefficients as desired to produce one or more image modes. Some, but not all, potential image modes include: multi-channel access, temporal, range, three-dimensional, and synthetic aperture.

Cooke, Bradly J; Guenther, David C; Tiee, Joe J; Kellum, Mervyn J; Olivas, Nicholas L; Weisse-Bernstein, Nina R; Judd, Stephen L; Braun, Thomas R

2012-10-30T23:59:59.000Z

453

Low field magnetic resonance imaging  

DOE Patents (OSTI)

A method and system of magnetic resonance imaging does not need a large homogenous field to truncate a gradient field. Spatial information is encoded into the spin magnetization by allowing the magnetization to evolve in a non-truncated gradient field and inducing a set of 180 degree rotations prior to signal acquisition.

Pines, Alexander (Berkeley, CA); Sakellariou, Dimitrios (Billancourt, FR); Meriles, Carlos A. (Fort Lee, NJ); Trabesinger, Andreas H. (London, GB)

2010-07-13T23:59:59.000Z

454

Image enhancement by digital computer  

Science Conference Proceedings (OSTI)

In the past 15 years digital computers have been used to greatly improve from images. In this paper we review and discuss a number of techniques for the enhancement of imagery by digital computer. The implications of this technology to verification of arms control treaties is left to the reader.

B. R. Hunt

1983-01-01T23:59:59.000Z

455

Image change detection systems, methods, and articles of manufacture  

DOE Patents (OSTI)

Aspects of the invention relate to image change detection systems, methods, and articles of manufacture. According to one aspect, a method of identifying differences between a plurality of images is described. The method includes loading a source image and a target image into memory of a computer, constructing source and target edge images from the source and target images to enable processing of multiband images, displaying the source and target images on a display device of the computer, aligning the source and target edge images, switching displaying of the source image and the target image on the display device, to enable identification of differences between the source image and the target image.

Jones, James L. (Idaho Falls, ID); Lassahn, Gordon D. (Idaho Falls, ID); Lancaster, Gregory D. (Idaho Falls, ID)

2010-01-05T23:59:59.000Z

456

U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

file CVE-2012-1942. Version 12 on Windows is affected. The Content Security Policy's (CSP) inline-script blocking feature may not protect against some inline event handlers...

457

Got bugs? We've got a Goanna The Features  

E-Print Network (OSTI)

timetables on track. Working much like a sophisticated spell-checker for software, Goanna detects issues / Bldg 193 (Dept. of Electrical and Electronic Engineering) The University of Melbourne VIC 3010 Tel: +61 research. NICTA drives innovation through high-quality research, research training and technology transfer

458

What Keeps Bugs from Being Bigger? | Advanced Photon Source  

NLE Websites -- All DOE Office Websites (Extended Search)

effect is most pronounced in the orifices leading to the legs, where more and more of the space is taken up by tracheal tubes in larger species." The team then examined the...

459

Tracking system bugs: why are buffer overruns still around?  

Science Conference Proceedings (OSTI)

A buffer overrun is caused by the limited size of a string variable's allocated space and the unlimited size of the actual string that is stored in the space. In the C programming language, it is the programmer's responsibility to make sure the actual ... Keywords: buffer overrun, c programming, string overwrite

Cherry Keahey Owen

2007-10-01T23:59:59.000Z

460

CTrigger: Exposing Atomicity Violation Bugs from Their Hiding Places  

E-Print Network (OSTI)

of the two molecules, broken down by atom, helps the user to understand which atoms of the drug and protein

Lu, Shan

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

that, when loaded by the target user, will access deleted memory (while JavaScript is disabled) and potentially execute arbitrary code on the target system CVE-2011-2373. A...

462

U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

an authentication flaw and gain access to the target user's account CVE-2011-3416. A remote user can exploit a flaw in the handling of cached content when Forms Authentication...

463

U-130: JBoss Operations Network LDAP Authentication Bug Lets...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

to an error within the Lightweight Directory Access Protocol (LDAP) authentication when handling invalid bind account credentials, which can be exploited to log-in to LDAP-based...

464

Imaging a laser pulse propagation trough an image acquisition system  

Science Conference Proceedings (OSTI)

The goal of this paper is to generate a laser pulse and to capture it by an image acquisition system. We use a confocal resonator to generate a laser pulse; then the generate light is focused in to an optical fiber using an achromatic doublet; the light ... Keywords: Hermite Gaussian polynomial, Laplacian filter, MTF, PSF, achromatic doublet, amplitude filter, bilateral filter, fixed pattern noise, photon shot noise

Toadere Florin; Nikos E. Mastorakis

2009-12-01T23:59:59.000Z

465

Image Source Separation Using Color Channel Dependencies  

Science Conference Proceedings (OSTI)

We investigate the problem of source separation in images in the Bayesian framework using the color channel dependencies. As a case in point we consider the source separation of color images which have dependence between its components. A Markov Random ...

Koray Kayabol; Ercan E. Kuruoglu; Bulent Sankur

2009-03-01T23:59:59.000Z

466

Image fusion for a nighttime driving display  

E-Print Network (OSTI)

An investigation into image fusion for a nighttime driving display application was performed. Most of the image fusion techniques being investigated in this application were developed for other purposes. When comparing the ...

Herrington, William Frederick

2005-01-01T23:59:59.000Z

467

Real web community based automatic image annotation  

Science Conference Proceedings (OSTI)

Automatic image annotation is a challenging problem in pattern recognition. Large annotation databases are difficult to build, and the existing models can only label small scale of image sets. In order to solve the problems with the annotation of large ...

Xiao Ke, Shaozi Li, Guolong Chen

2013-04-01T23:59:59.000Z

468

Northwest National Laboratory's Chemical Imaging Initiative is...  

NLE Websites -- All DOE Office Websites (Extended Search)

generated. CHEMICAL IMAgINg Main particle Pt (110) Pt (111) Pt (pores) g-Al 2 O 3 pores gamma-alumina particles contain pores and have a corrugated surface according to a chemical...

469

Unsupervised image segmentation using markov random fields  

Science Conference Proceedings (OSTI)

In this study, we carried out an unsupervised gray level image segmentation based on Markov Random Fields (MRF) model. First, we use the Expectation Maximization (EM) algorithm to estimate the distribution of the input image and the number of ...

Abdulkadir ?engür; ?brahim Türko?lu; M. Cevdet ?nce

2005-06-01T23:59:59.000Z

470

SIP : a smart digital image processing library  

E-Print Network (OSTI)

The Smart Image Processing (SIP) library was developed to provide automated real-time digital image processing functions on camera phones with integer microprocessors. Many of the functions are not available on commercial ...

Zhou, Mengyao

2005-01-01T23:59:59.000Z

471

Water Surface Topography Retrieved from Color Images  

Science Conference Proceedings (OSTI)

Submerged objects viewed through wavy water surfaces appear distorted by refraction. An imaging system exploiting this effect is implemented using a submerged planar light source designed so that color images reveal features of small-amplitude ...

Jeffrey Koskulics; Steven Englehardt; Steven Long; Yongxiang Hu; Matteo Ottaviani; Knut Stamnes

2013-04-01T23:59:59.000Z

472

Frontiers in Chemical Imaging Seminar Series  

E-Print Network (OSTI)

Frontiers in Chemical Imaging Seminar Series X-ray Imaging at the Nanoscale Presented by Ian Mc and exquisite sensitivity to elemental, chemical and magnetic states in buried structures. The advent

473

Frontiers in Chemical Imaging Seminar Series  

E-Print Network (OSTI)

Frontiers in Chemical Imaging Seminar Series Advancing Methods for Labeling, Staining, Imaging is to understand how the interplay of structural, chemical and electrical signals in and between cells of nervous

474

Intercalibration of Broadband Geostationary Imagers Using AIRS  

Science Conference Proceedings (OSTI)

Geostationary simultaneous nadir observations (GSNOs) are collected for Earth Observing System (EOS) Atmospheric Infrared Sounder (AIRS) on board Aqua and a global array of geostationary imagers. The imagers compared in this study are on (...

Mathew M. Gunshor; Timothy J. Schmit; W. Paul Menzel; David C. Tobin

2009-04-01T23:59:59.000Z

475

Fiftieth Anniversary of First Digital Image Marked  

Science Conference Proceedings (OSTI)

... It was a grainy image of a baby—just 5 centimeters by 5 centimeters—but it turned out to be the well from which satellite imaging, CAT scans, bar ...

2010-10-05T23:59:59.000Z

476

Image Gallery from Sandia National Laboratory  

DOE Data Explorer (OSTI)

Sandia makes 300-dpi images available from 2000 through the present. Each of these photographs was originally released with a news article; a link to the original article and photo caption is listed with each image.

477

Neutron Imaging @ SNS (NI@SNS 2008)  

NLE Websites -- All DOE Office Websites (Extended Search)

Neutron Imaging at SNS Workshop (NI@SNS 2008) November 3, 2008 * Building 8600, Central Laboratory & Office Building * Oak Ridge, TN 37831 NI@SNS2008 home Neutron Imaging Agenda...

478

Imaging and Microscopy at the NSLS  

NLE Websites -- All DOE Office Websites (Extended Search)

Images: Upper Left: CMT image of basaltic rock, X27A. Courtesy K. Jones Upper Right: Thorium XRF composition map of fossil fish, X26A. Courtesy J. Cole. Center:...

479

Image Based Rendering Using Algebraic Techniques  

E-Print Network (OSTI)

This paper presents an image-based rendering system using algebraic relations between different views of an object. The system uses pictures of an object taken from known positions. Given three such images it can ...

Evgeniou, Theodoros

1996-11-01T23:59:59.000Z

480

A Bayesian Approach to Hybrid Image Retrieval  

Science Conference Proceedings (OSTI)

Content based image retrieval (CBIR) has been well studied in the computer vision and multimedia community. Content free image retrieval (CFIR) methods, and their complementary characteristics to CBIR has not received enough attention in the literature. ...

Pradhee Tandon; C. V. Jawahar

2009-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "thumbnail image bug" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Measuring the Objectness of Image Windows  

Science Conference Proceedings (OSTI)

We present a generic objectness measure, quantifying how likely it is for an image window to contain an object of any class. We explicitly train it to distinguish objects with a well-defined boundary in space, such as cows and telephones, from amorphous ... Keywords: Detectors,Image edge detection,Image segmentation,Kernel,Image color analysis,Training,Area measurement,object recognition,Objectness measure,object detection

Bogdan Alexe; Thomas Deselaers; Vittorio Ferrari

2012-11-01T23:59:59.000Z

482

Unifying biological image formats with HDF5  

Science Conference Proceedings (OSTI)

The biosciences need an image format capable of high performance and long-term maintenance. Is HDF5 the answer?

Matthew T. Dougherty; Michael J. Folk; Erez Zadok; Herbert J. Bernstein; Frances C. Bernstein; Kevin W. Eliceiri; Werner Benger; Christoph Best

2009-10-01T23:59:59.000Z

483

Globally Optimal Estimation of Nonrigid Image Distortion  

Science Conference Proceedings (OSTI)

Image alignment in the presence of non-rigid distortions is a challenging task. Typically, this involves estimating the parameters of a dense deformation field that warps a distorted image back to its undistorted template. Generative approaches based ... Keywords: Combine generative and discriminative approaches, Computer vision, Distortion estimation, Feature correspondence, Global optimum, Image alignment, Image registration, Iterative approach, Motion and tracking, Nonrigid deformation, Physics-based vision, Water distortion

Yuandong Tian; Srinivasa G. Narasimhan

2012-07-01T23:59:59.000Z

484

Method for imaging a concealed object  

DOE Patents (OSTI)

A method for imaging a concealed object is described and which includes a step of providing a heat radiating body, and wherein an object to be detected is concealed on the heat radiating body; imaging the heat radiating body to provide a visibly discernible infrared image of the heat radiating body; and determining if the visibly discernible infrared image of the heat radiating body is masked by the presence of the concealed object.

Davidson, James R [Idaho Falls, ID; Partin, Judy K [Idaho Falls, ID; Sawyers, Robert J [Idaho Falls, ID

2007-07-03T23:59:59.000Z

485

The Versatile Neutron Imaging Instrument at SNS | ORNL Neutron...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Versatile Neutron Imaging Instrument at SNS VENUS: Neutron imaging to advance energy efficiency VENUS: Neutron imaging to advance energy efficiency. As its name indicates,...

486

Bayesian parallel Imaging with edge-preserving priors  

E-Print Network (OSTI)

Gibbs distributions, and the Bayesian restoration of images.NIH-PA Author Manuscript Bayesian Parallel Imaging WithSociety; MRIs for MRFs: Bayesian reconstruction of MR images

2007-01-01T23:59:59.000Z

487

COMPARISON OF ACOUSTIC AND ELECTRICAL IMAGE LOGS FROM THE COSO...  

Open Energy Info (EERE)

fractures are difficult to identify in electrical image logs because of the low percentage of the borehole wall imaged. Analysis of induced structures in acoustic image logs...

488

The Terminological Image Retrieval Model  

E-Print Network (OSTI)

We present a model for image retrieval in which images are represented both at the form level, as sets of physical features of the representing objects, and at the content level, as sets of logical assertions about the represented entities as well as about facts of the subject matter that are deemed as relevant for retrieval. A uniform and powerful query language allows queries to be issued that transparently combine features pertaining to form and content. Queries are expressions of a fuzzy logical language. While that part of the query that pertains to (medium-independent) content is "directly" processed by an inferential engine, that part that pertains to (medium-dependent) form is entrusted to specialised signal processing procedures linked to the logical language by a procedural attachment mechanism.

Carlo Meghini; Fabrizio Sebastiani; Umberto Straccia

1997-01-01T23:59:59.000Z

489

Laplacian optimal design for image retrieval  

Science Conference Proceedings (OSTI)

Relevance feedback is a powerful technique to enhance Content-Based Image Retrieval (CBIR) performance. It solicits the user's relevance judgments on the retrieved images returned by the CBIR systems. The user's labeling is then used to learn a classifier ... Keywords: active learning, experimental design, image retrieval, regression, relevance feedback

Xiaofei He; Wanli Min; Deng Cai; Kun Zhou

2007-07-01T23:59:59.000Z

490

MEDICAL IMAGE ARCHIVE, RETRIEVAL AND COMMUNICATION  

E-Print Network (OSTI)

15.03.2013 1 MEDICAL IMAGE ARCHIVE, RETRIEVAL AND COMMUNICATION BNG 5122 Medical Image Analysis Advisor: Assist. Prof. Dr. Devrim �NAY S. Ahsen YILDIRIM INTRODUCTION Archiving medical images for future in · clinical review · diagnosis to compare with patients' current examinations · as a resource in medical

Ã?nay, Devrim

491

Remote Sensing Ayman F. Habib Image Classification  

E-Print Network (OSTI)

1 Remote Sensing Ayman F. Habib 1 Chapter 6 Image Classification Remote Sensing Ayman F. Habib 2. ­ Unsupervised classification. · Accuracy assessment. #12;2 Remote Sensing Ayman F. Habib 3 Image Classification of image pixels is based on their digital numbers/grey values in one or more spectral bands. Remote Sensing

Habib, Ayman

492

Chemical Imaging Initiative Delivering New Capabilities for  

E-Print Network (OSTI)

Chemical Imaging Initiative Delivering New Capabilities for In Situ, Molecular-Scale Imaging A complete, precise and realistic view of chemical, materials and biochemical processes and an understanding sources and mathematical models. At Pacific Northwest National Laboratory, the Chemical Imaging Initiative

493

Quantification of neural images using grey difference  

Science Conference Proceedings (OSTI)

We present new algorithms for segmenting neuron images which are taken from cells being grown in culture with oxidative agents. Information from changing images can be used to compare changes in neurons from the Zellweger mice to those from normal mice. ... Keywords: distance difference, filtering window, grey difference, neuron cell imaging, segmentation

Donggang Yu; Tuan D. Pham; Hong Yan; Denis I Crane

2006-12-01T23:59:59.000Z

494

Dynamic shading enhancement for reflectance transformation imaging  

Science Conference Proceedings (OSTI)

We propose a set of dynamic shading enhancement techniques for improving the perception of details, features, and overall shape characteristics from images created with Reflectance Transformation Imaging (RTI) techniques. Selection of these perceptual ... Keywords: Visualization, cultural heritage shading enhancement, illumination, image processing

Gianpaolo Palma; Massimiliano Corsini; Paolo Cignoni; Roberto Scopigno; Mark Mudge

2010-09-01T23:59:59.000Z

495

Composite ultrasound imaging apparatus and method  

DOE Patents (OSTI)

An imaging apparatus and method for use in presenting composite two dimensional and three dimensional images from individual ultrasonic frames. A cross-sectional reconstruction is applied by using digital ultrasound frames, transducer orientation and a known center. Motion compensation, rank value filtering, noise suppression and tissue classification are utilized to optimize the composite image. 37 figs.

Morimoto, A.K.; Bow, W.J. Jr.; Strong, D.S.; Dickey, F.M.

1998-09-15T23:59:59.000Z

496

Neural maps in remote sensing image analysis  

Science Conference Proceedings (OSTI)

We study the application of self-organizing maps (SOMs) for the analyses of remote sensing spectral images. Advanced airborne and satellite-based imaging spectrometers produce very high-dimensional spectral signatures that provide key information to ... Keywords: generalized relevance learning vector quantization, image analysis, remote sensing, self-organizing map

Thomas Villmann; Erzsébet Merényi; Barbara Hammer

2003-04-01T23:59:59.000Z

497

Scale selection for supervised image segmentation  

Science Conference Proceedings (OSTI)

Finding the right scales for feature extraction is crucial for supervised image segmentation based on pixel classification. There are many scale selection methods in the literature; among them the one proposed by Lindeberg is widely used for image structures ... Keywords: Image segmentation, Max rule, Scale selection, Scale space theory, Supervised learning

Yan Li; David M. J. Tax; Marco Loog

2012-12-01T23:59:59.000Z

498

The Tibetan Image of Confucius  

E-Print Network (OSTI)

history? Are there differences in interpreting the characteristics of the personage in different disciplines of religion or sciences? Since little research has been conducted which focuses on these issues, it may be worth investigating the image... shes rab (1059-1109) also used this term to designate lha bla ma Zhi ba ’od (b. eleventh cent.).27 Besides referring to Tibetan kings, ’phrul gyi rgyal po applies to special figures as well. For example, in the above mentioned manuscript preserved...

Lin, Shen-yu

2007-01-01T23:59:59.000Z

499

Regional imaging with oxygen-14  

SciTech Connect

The metabolic significance of the distribution of labeled oxygen was studied in the dog by inhalation of gas mixtures labeled with oxygen-14 (T/sub /sup 1///sub 2// = 71 seconds) maintained at a constant level of activity. Under steady-state conditions, whole-body images were developed by detection of the positron annihilation emissions with a dual head rectilinear scanner in the coincidence mode. (auth)

Russ, G.A.; Bigler, R.E.; Dahl, J.R.; Kostick, J.; McDonald, J.M.; Tilbury, R.S.; Laughlin, J.S.

1975-01-01T23:59:59.000Z

500

Coherent Communications, Imaging and Targeting  

SciTech Connect

Laboratory and field demonstration results obtained as part of the DARPA-sponsored Coherent Communications, Imaging and Targeting (CCIT) program are reviewed. The CCIT concept uses a Phase Conjugation Engine based on a quadrature receiver array, a hologram processor and a spatial light modulator (SLM) for high-speed, digital beam control. Progress on the enabling MEMS SLM, being developed by a consortium consisting of LLNL, academic institutions and small businesses, is presented.

Stappaerts, E; Baker, K; Gavel, D; Wilks, S; Olivier, S; Brase, J; Olivier, S; Brase, J

2003-10-03T23:59:59.000Z