Powered by Deep Web Technologies
Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

California ISO Real-Time Voltage Security Assessment (VSA) Summary Report  

NLE Websites -- All DOE Office Websites (Extended Search)

Real-Time Real-Time Voltage Security Assessment (VSA) Summary Report Prepared For: California Energy Commission Public Interest Energy Research Program Prepared By: Lawrence Berkeley National Laboratory Consortium for Electric Reliability Technology Solutions APPENDIX B October 2008 CEC-500-2008-049-APB Prepared By: Lawrence Berkeley National Laboratory Joe Eto, Manu Parashar, Bernard Lesieutre, and Nancy Jo Lewis Berkeley, CA Administered by University of California, California Institute for Energy and Environment under 500-99-013, BOA-138. Jim Cole, Larry Miller Oakland, California 94612 Commission Contract No. 500-02-004 Commission Work Authorization No: MR-036 Prepared For: Public Interest Energy Research (PIER) California Energy Commission

2

High voltage electrical amplifier having a short rise time  

DOE Patents (OSTI)

A circuit, comprising an amplifier and a transformer is disclosed that produces a high power pulse having a fast response time, and that responds to a digital control signal applied through a digital-to-analog converter. The present invention is suitable for driving a component such as an electro-optic modulator with a voltage in the kilovolt range. The circuit is stable at high frequencies and during pulse transients, and its impedance matching circuit matches the load impedance with the output impedance. The preferred embodiment comprises an input stage compatible with high-speed semiconductor components for amplifying the voltage of the input control signal, a buffer for isolating the input stage from the output stage; and a plurality of current amplifiers connected to the buffer. Each current amplifier is connected to a field effect transistor (FET), which switches a high voltage power supply to a transformer which then provides an output terminal for driving a load. The transformer comprises a plurality of transmission lines connected to the FETs and the load. The transformer changes the impedance and voltage of the output. The preferred embodiment also comprises a low voltage power supply for biasing the FETs at or near an operational voltage.

Christie, David J. (Pleasanton, CA); Dallum, Gregory E. (Livermore, CA)

1991-01-01T23:59:59.000Z

3

An Open Question about Dependency of Life Time of Hardware Components and Dynamic Voltage Scaling  

E-Print Network (OSTI)

Open question about Dependency of Life Time of Hardware Components and Dynamic Voltage Scaling (A primary idea)

Jaberi, Nasrin

2012-01-01T23:59:59.000Z

4

Statistical Estimation of Circuit Timing Vulnerability Due to Leakage-Induced Power Grid Voltage Drop  

E-Print Network (OSTI)

Statistical Estimation of Circuit Timing Vulnerability Due to Leakage-Induced Power Grid Voltage voltage drops on the power grid that can affect circuit timing. We propose a statistical analysis supply voltage to circuit devices is referred to as the power grid. The consequences of power grid

Najm, Farid N.

5

Real time voltage control using emergency demand response in distribution system by integrating advanced metering infrastructure  

Science Journals Connector (OSTI)

In this paper an analytical study is reported to demonstrate the effects of demand response on distribution network voltages profile. Also a new approach for real time voltage control is proposed which uses emergency demand response program aiming at maintaining voltage profile in an acceptable range with minimum cost. This approach will be active in emergency conditions where in real time the voltages in some nodes leave their permissible ranges. These emergency conditions are Distributed Generation (DG) units and lines outage and unpredictable demand and renewable generations' fluctuations. The proposed approach does not need the load and renewable generation forecast data to regulate voltage. To verify the effectiveness and robustness of the proposed control scheme the proposed voltage control scheme is tested on a typical distribution network. The simulation results show the effectiveness and capability of the proposed real time voltage control model to maintain smart distribution network voltage in specified ranges in both normal and emergency conditions.

Alireza Zakariazadeh; Shahram Jadid

2014-01-01T23:59:59.000Z

6

Energy Aware Dynamic Voltage and Frequency Selection for Real-Time Systems with Energy Harvesting  

E-Print Network (OSTI)

Energy Aware Dynamic Voltage and Frequency Selection for Real-Time Systems with Energy Harvesting}@binghamton.edu Abstract In this paper, an energy aware dynamic voltage and frequency selection (EA-DVFS) algorithm energy and the harvested energy in a future duration. Specifically, if the system has sufficient energy

Qiu, Qinru

7

Z .Bioelectrochemistry and Bioenergetics 45 1998 316 Time course of transmembrane voltage induced by time-varying electric  

E-Print Network (OSTI)

Z .Bioelectrochemistry and Bioenergetics 45 1998 3­16 Time course of transmembrane voltage induced.rBioelectrochemistry and Bioenergetics 45 1998 3­164 Fig. 1. The model on which the calculations were based. The cell is a sphere

Ljubljana, University of

8

Privacy Act Fees and Time Limits | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Fees and Time Limits | National Nuclear Security Administration Fees and Time Limits | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Privacy Act Fees and Time Limits Home > About Us > Our Operations > NNSA Office of General Counsel > Privacy Act (PA) of 1974 > Privacy Act Fees and Time Limits Privacy Act Fees and Time Limits The Act provides agencies to assess fees only for the cost of reproducing

9

Enhancing Security of Real-Time Applications on Grids through Dynamic Scheduling  

E-Print Network (OSTI)

Enhancing Security of Real-Time Applications on Grids through Dynamic Scheduling Tao Xie Xiao Qin on Grids require security protections to completely fulfill their security-critical needs. Unfortunately to seamlessly integrate security into real-time scheduling for applications running on Grids. In this paper we

Feitelson, Dror

10

Security  

Energy.gov (U.S. Department of Energy (DOE))

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

11

The Effect of Working Gas Admixture, Applied Voltage and Pressure on Focusing Time Parameter in the APF Plasma Focus Device  

Science Journals Connector (OSTI)

In the present research the effects of key parameters, applied voltage, working gas composition and pressure, on the focusing time in the APF plasma focus device are investigated. Pure nitrogen (N2) and three vol...

A. Roomi; M. Habibi

2012-06-01T23:59:59.000Z

12

Pseudonymous Secure Computation from Time-Lock Puzzles  

E-Print Network (OSTI)

. Taking inspiration from Bitcoin, we show that precise bounds on computational power can be used in place or other forms of setup? Taking inspiration from Bitcoin [31] we show that, indeed, nontrivial security can

13

Abstract --When a real time digital simulator, emulating a switched circuit such as a voltage source converter, is interfaced  

E-Print Network (OSTI)

1 Abstract -- When a real time digital simulator, emulating a switched circuit such as a voltage source converter, is interfaced with a digital controller, the controller's firing signals may. Incorrect power flow due to inaccurate firing times and controller errors. 2. Switching jitter due

Lehn, Peter W.

14

Weight-balanced security-aware scheduling for real-time computational grid  

Science Journals Connector (OSTI)

Security-aware scheduling for real-time grid applications is an important task and a little work has been done to accomplish this. In this paper, we propose two scheduling algorithms for real-time grid applications with stringent security requirements, and the proposed algorithms are compared with a few existing scheduling algorithms, i.e. MinMin, MaxMin, EDF/ECT, SPMinMin and SPMaxMin. Security overhead computation for existing and proposed models is done on the basis of security level demand of the tasks. Performance of WB-EDFMin on success rate performance metric is considered to be the best among all the contemporary scheduling algorithms. SFWB-EDFMin compromises on the overall success rate of the grid application but its task scheduling is uniformly spread over the tasks of all security levels.

Rekha Kashyap; Deo Prakash Vidyarthi

2011-01-01T23:59:59.000Z

15

CERTS 2012 Program Review - New Security Tools for Real-Time Operations - Jim McCalley, Iowa State  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Tools for Real-Time Operation: Security Tools for Real-Time Operation: Risk-based security-constrained economic dispatch (RB-SCED) James D. McCalley Iowa State University jdm@iastate.edu June 13, 2012 Acknowledgement: Qin Wang, Siddhartha Khaitan 1. Project Objective: Develop Risk-based Security Assessment and Market functions Provide new control-room software capabilities through: BETTER SECURITY & ECONOMIC PERFORMANCE: Identify a more secure operating condition at lower production costs Risk-based security- constrained economic dispatch (RB-SCED) * more secure operating conditions * lower costs Achieve economic objective while managing system security +circuit security instead of only the latter. Function Concept Outcome Risk Index       n k n k j j k j

16

Weekly Address: Time to Create the Energy Security Trust | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Weekly Address: Time to Create the Energy Security Trust Weekly Address: Time to Create the Energy Security Trust Weekly Address: Time to Create the Energy Security Trust March 18, 2013 - 3:23pm Addthis Matt Compton Deputy Director of Online Content for the Office of Digital Strategy at the White House. Editor's Note: This blog is cross-posted from WhiteHouse.gov. President Obama discusses the need to harness American energy in order to reduce our dependence on oil and make the United States a magnet for new jobs. He highlights his all-of-the-above approach to American energy -- including a proposal to establish an Energy Security Trust, which invests in research that will help shift our cars and trucks off of oil. Addthis Related Articles National Energy Action Month Photo courtesy of the Pacific Northwest National Laboratory.

17

SRS employees devote time to 'Days of Caring' | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

employees devote time to 'Days of Caring' | National Nuclear Security employees devote time to 'Days of Caring' | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > SRS employees devote time to 'Days of Caring' SRS employees devote time to 'Days of Caring' Posted By Office of Public Affairs SRS employees devote time to 'Days of Caring' Dozens of Savannah River Site employees recently spent time off

18

The expressivity of universal timed CCP: undecidability of Monadic FLTL and closure operators for security  

Science Journals Connector (OSTI)

The timed concurrent constraint programing model (tcc) is a declarative framework, closely related to First-Order Linear Temporal Logic (FLTL), for modeling reactive systems. The universal tcc formalism (utcc) is an extension of tcc with ... Keywords: closure operators, concurrent constraint programming, first-order linear temporal logic, security protocols

Carlos Olarte; Frank D. Valencia

2008-07-01T23:59:59.000Z

19

Voltage and Timing Adaptation for Variation and Aging Tolerance in Nanometer VLSI Circuits  

E-Print Network (OSTI)

Process variations and circuit aging continue to be main challenges to the power-efficiency of VLSI circuits, as considerable power budget must be allocated at design time to mitigate timing variations. Modern designs incorporate adaptive techniques...

Shim, Kyu-Nam 1978-

2012-09-10T23:59:59.000Z

20

Integrating Preemption Threshold Scheduling and Dynamic Voltage Scaling for Energy Efficient Real-Time  

E-Print Network (OSTI)

scheduling (PTS) enables designing scalable real-time systems. PTS not only decreases the run-time overhead by the Earliest Dead- line First (EDF) policy. We present an algorithm to compute threshold preemption levels- tion is an important aspect of embedded systems design. Generally speaking, the pro- cessor consumes

Gupta, Rajesh

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Y-12 Times, A newsletter for employees and friends of the Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

9 9 September 2010 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 2 Career planning: advice from the president Page 4 They've got the power Page 5 Y-12's waterworks Page 6 Meet the LIFE force Page 6 Former plant manager makes the schoolhouse rock B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout Lisa Harris Contributors Ellen Boatner Mary Bryant Ashley Craig-Watkins Beth Eckerman Ryn Etter Kathy Fahey John Holbrook Dave Keim Kathryn King

22

Field and polarity dependence of time-to-resistance increase in Fe-O films studied by constant voltage stress method  

SciTech Connect

Constant voltage stress (CVS) was applied to Fe-O films prepared by a sputtering process to investigate a stress-induced resistance increase leading to a fundamental mechanism for switching behaviors. Under the CVS, an abrupt resistance increase was found for both stress polarities. A conduction mechanism after the resistance increase exhibited non-Ohmic transport. The time-to-resistance increase (t{sub r}) under the CVS was revealed to strongly depend on stress voltage as well as the polarity. From a polarity-dependent resistance increase determined by a time-zero measurement, the voltage and polarity-dependent t{sub r} were discussed on the basis of field- and structure-enhanced thermochemical reaction mechanisms.

Eriguchi, Koji; Ohta, Hiroaki; Ono, Kouichi [Graduate School of Engineering, Kyoto University, Yoshida-Honmachi, Sakyo-ku, Kyoto 606-8501 (Japan); Wei Zhiqiang; Takagi, Takeshi [Advanced Device Development Center, Matsushita Electric Ind. Co., Ltd., 3-1-1 Yagumo-Nakamachi, Moriguchi, Osaka 570-8501 (Japan)

2009-01-05T23:59:59.000Z

23

Wide Area Security Region Final Report  

SciTech Connect

This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of system parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed technology. Recommendations for the future work have also been formulated.

Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin; Gronquist, James; Du, Pengwei; Nguyen, Tony B.; Burns, J. W.

2010-03-31T23:59:59.000Z

24

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

0 0 October 2010 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 2 Air Force visits Y-12's 'White Castle' Page 3 Family ties Pages 4 and 5 Safeguards, Security and Emergency Services Sentinel Page 6 Readiness workshop celebrates a decade of sharing lessons learned Page 8 Extra! Extra! Read about the past B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout Lisa Harris Contributors Ellen Boatner Susan Butefi sh Amanda Byrge Mary Bryant Ryn Etter

25

the Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, September 2012  

NLE Websites -- All DOE Office Websites (Extended Search)

Operations resume Operations resume (pg. 2) Y-12 resumes nuclear operations Aug. 15. Phased Array (pg. 5) A Y-12 project brings sweet success to weld inspections. September 2012 Visit us! Whether you've been a Y-12 employee for one year or 40 years, the events of July 28 had an effect on your time here. Y-12ers have always considered themselves a family, and like family, we must work together to regain the confidence of interested groups. We know three people cut through fences and vandalized the Highly Enriched Uranium Materials Facility July 28. As a result, B&W Y-12 ordered a temporary security stand-down. The National Nuclear Security Administration fully supported this step to ensure continued confidence in safe and secure operations. Nuclear operations resumed Aug. 15 (see pg. 2).

26

Y-12 Times, newsletter for employees and friends of the Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Ideas spark Ideas spark inventions (pages 4 and 5) Y-12 inventors were awarded 11 patents in fi scal 2012. These guys have totally lost it! (page 6) Three Y-12ers share their advice for getting fi t. October 2012 Visit us! Following the July 28 trespassing inci- dent at the Y-12 National Security Complex, B&W Y-12 has moved quickly to improve security and maintenance. "All of us at B&W Y-12 appreciate the Inspector General's work in assessing the event of July 28 and making recommen- dations for security operations improve- ment. We've taken dramatic actions and are making major security improvements at the site," said Charles (Chuck) G. Spencer, pres- ident and general manager for B&W Y-12. In an Aug. 23 address to Y-12 managers and supervisors, Spencer encouraged staff

27

Virtual real-time inspection of nuclear material via VRML and secure web pages  

SciTech Connect

Sandia National Laboratories` Straight Line project is working to provide the right sensor information to the right user to enhance the safety, security, and international accountability of nuclear material. One of Straight Line`s efforts is to create a system to securely disseminate this data on the Internet`s World-Wide-Web. To make the user interface more intuitive, Sandia has generated a three dimensional VRML (virtual reality modeling language) interface for a secure web page. This paper will discuss the implementation of the Straight Line secure 3-D web page. A discussion of the ``pros and cons`` of a 3-D web page is also presented. The public VRML demonstration described in this paper can be found on the Internet at the following address: http://www.ca.sandia.gov/NMM/. A Netscape browser, version 3 is strongly recommended.

Nilsen, C.; Jortner, J.; Damico, J.; Friesen, J.; Schwegel, J.

1997-04-01T23:59:59.000Z

28

Low-voltage gyrotrons  

SciTech Connect

For a long time, the gyrotrons were primarily developed for electron cyclotron heating and current drive of plasmas in controlled fusion reactors where a multi-megawatt, quasi-continuous millimeter-wave power is required. In addition to this important application, there are other applications (and their number increases with time) which do not require a very high power level, but such issues as the ability to operate at low voltages and have compact devices are very important. For example, gyrotrons are of interest for a dynamic nuclear polarization, which improves the sensitivity of the nuclear magnetic resonance spectroscopy. In this paper, some issues important for operation of gyrotrons driven by low-voltage electron beams are analyzed. An emphasis is made on the efficiency of low-voltage gyrotron operation at the fundamental and higher cyclotron harmonics. These efficiencies calculated with the account for ohmic losses were, first, determined in the framework of the generalized gyrotron theory based on the cold-cavity approximation. Then, more accurate, self-consistent calculations for the fundamental and second harmonic low-voltage sub-THz gyrotron designs were carried out. Results of these calculations are presented and discussed. It is shown that operation of the fundamental and second harmonic gyrotrons with noticeable efficiencies is possible even at voltages as low as 5-10 kV. Even the third harmonic gyrotrons can operate at voltages about 15 kV, albeit with rather low efficiency (1%-2% in the submillimeter wavelength region).

Glyavin, M. Yu.; Zavolskiy, N. A.; Sedov, A. S. [Institute of Applied Physics RAS, N. Novgorod 603600 (Russian Federation); Nusinovich, G. S. [IREAP, University of Maryland, College Park, Maryland 20742-3511 (United States)

2013-03-15T23:59:59.000Z

29

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

7 7 August 2011 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 2 Getting the big picture Page 3 Going digital saves times and money Page 4 Machinist invents lockout device Page 4 Green cleaning Page 5 Retiree combines love of math and teaching B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout Lisa Harris Contributors Ellen Boatner Mary Bryant Ashley Douglas Kathy Fahey Scott Fraker David Keim Brett Pate Eric Swanson Brian Wagner Donna Waston

30

No-Arbitrage Pricing for Dividend-Paying Securities in Discrete-Time Markets with Transaction Costs  

E-Print Network (OSTI)

We prove a version of First Fundamental Theorem of Asset Pricing under transaction costs for discrete-time markets with dividend-paying securities. Specifically, we show that the no-arbitrage condition under the efficient friction assumption is equivalent to the existence of a risk-neutral measure. We derive dual representations for the superhedging ask and subhedging bid price processes of a derivative contract. Our results are illustrated with a vanilla credit default swap contract.

Bielecki, Tomasz R; Rodriguez, Rodrigo

2012-01-01T23:59:59.000Z

31

770 IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 A Resilient Real-Time System Design for a Secure  

E-Print Network (OSTI)

Design for a Secure and Reconfigurable Power Grid Hairong Qi, Senior Member, IEEE, Xiaorui Wang, Member architecture design that can help assure the security and reliability of the power grid. In this paper, we770 IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 A Resilient Real-Time System

Tolbert, Leon M.

32

Voltage controlled current source  

DOE Patents (OSTI)

A seven decade, voltage controlled current source is described for use in testing intermediate range nuclear instruments that covers the entire test current range of from 10 picoamperes to 100 microamperes. High accuracy is obtained throughout the entire seven decades of output current with circuitry that includes a coordinated switching scheme responsive to the input signal from a hybrid computer to control the input voltage to an antilog amplifier, and to selectively connect a resistance to the antilog amplifier output to provide a continuous output current source as a function of a preset range of input voltage. An operator controlled switch provides current adjustment for operation in either a real-time simulation test mode or a time response test mode.

Casne, Gregory M. (Pittsburgh, PA)

1992-01-01T23:59:59.000Z

33

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, July 2009  

NLE Websites -- All DOE Office Websites (Extended Search)

7 7 July 2009 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E W H A T ' S I N S I D E Page 2 Page 2 Fly me to the moon Page 3 Page 3 The calibrating crew Page 4 Page 4 Having the time of their lives Page 6 Page 6 Y-12's faces in Washington Page 8 Page 8 Y-12 reaches new heights B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex The Y-12 National Security Complex recently received several national awards for its pollution prevention (P2) efforts to create a greener environment and become a more sustainable site. Y-12 won a White House Closing the Circle Award in the waste/P2 category, three

34

The Y-12 Times, Nov 2009, a newsletter for employees and friends of the Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

1 1 November 2009 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 2 Y-12 employee teams honored by NNSA Page 4 Working safely day after day Page 5 Social networking comes to government agencies Page 7 Extra money in your pocket B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout/Design Lisa Harris Contributors Ellen Boatner Bridget Correll Ken Davis Beth Eckerman Kathy Fahey Tom Fisher Vicki Hinkel John Holbrook Dave Keim Jamie Loveday Abe Mathews

35

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

9 9 October 2011 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 2 Y-12: A winning team at the Super Bowl Page 3 Members of tomorrow's work force are Y-12 ambassadors Page 4 Reconnect with retiree Charlie Montgomery Page 8 Live a better life B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout Lisa Harris Contributors Ellen Boatner Ashley Douglas Kathy Fahey Scott Fraker John Holbrook David Keim Terry Marlar Jill McNutt Cindy Moffett

36

the Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

6 6 July 2011 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 2 Y-12 submits Voluntary Protection Program application Page 3 Preparing for the big freeze while temperatures soar Page 4 Quitters setting an example Page 5 Meet the YES board Page 8 Apprentices compete in Nashville B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout Lisa Harris Contributors Ellen Boatner Ashley Douglas Kathy Fahey Scott Fraker David Keim Jill McNutt Brett Pate

37

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, March 2011  

NLE Websites -- All DOE Office Websites (Extended Search)

2 2 March 2011 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 2 Governance Transformation and lightbulbs: What's the connection? Page 3 Improving things...rapidly Page 4 Retiree builds school from A to Z Page 5 Zirconium to Zucker, the booming 1950s Page 8 "All of those complaints you have with safety can be summed up here." B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout Lisa Harris Contributors Ellen Boatner Mary Bryant

38

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, April 2012  

NLE Websites -- All DOE Office Websites (Extended Search)

4 4 April 2012 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 2 Y-12 technologies licensed Page 3 Sharing nuclear criticality safety expertise Pages 4 and 5 Y-12's education partnerships Page 6 Y-12's jewel in Project Sapphire Page 8 Historic photos create lasting memories B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout Lisa Harris Contributors Carolyn Andrews Mary Bryant Ellen Boatner Kathy Fahey Scott Fraker John Holbrook David Keim

39

High voltage pulse conditioning  

DOE Patents (OSTI)

Apparatus for conditioning high voltage pulses from particle accelerators in order to shorten the rise times of the pulses. Flashover switches in the cathode stalk of the transmission line hold off conduction for a determinable period of time, reflecting the early portion of the pulses. Diodes upstream of the switches divert energy into the magnetic and electrostatic storage of the capacitance and inductance inherent to the transmission line until the switches close.

Springfield, Ray M. (Sante Fe, NM); Wheat, Jr., Robert M. (Los Alamos, NM)

1990-01-01T23:59:59.000Z

40

What is Security? A perspective on achieving security  

SciTech Connect

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Personnel Security  

Directives, Delegations, and Requirements

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

42

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, April 2010  

NLE Websites -- All DOE Office Websites (Extended Search)

4 4 April 2010 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Pages 2 and 3 HEUMF dedication: Getting the job done Page 4 Math whiz sums up his job Page 6 On-site fi tness centers to open Page 6 Doing the right thing Page 8 Measuring performance: Yes, we can B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout Lisa Harris Contributors Ellen Boatner Ken Davis Beth Eckerman Ryn Etter Kathy Fahey John Holbrook Dave Keim Jamie Loveday Jill McNutt Brett Pate

43

Database Security Issues for RealTime Electronic Commerce Systems Sang H. Son  

E-Print Network (OSTI)

Science University of Virginia Charlottesville, VA 22903, USA son@virginia.edu Abstract Data management and transaction processing are essential in supporting advanced time­critical appli­ cations. In many for advanced data management functionalities in real­ time systems poses intellectual and engineering

Son, Sang H.

44

The Y-12 Times 70th Anniversary, a newsletter for employees and friends of the Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

After meeting or exceeding several of its fiscal After meeting or exceeding several of its fiscal 2012 Defense Program goals, Y-12 is now engaged in activities to meet this year's life extension, surveillance and dismantle- ment goals. For fiscal 2013, the W78/88-1 Life Extension Program is funded at Y-12 for the first time. "The W78/88 1 LEP will secure work for the 2020s, so Y-12 can continue its major mission work after completion of the W76-1 and B61-12," said Tom Thrasher, program manager. Y-12 has begun working with Lawrence Livermore and Los Alamos national laboratories on the manufacturability of the units. The conceptual designs include reuse technologies geared toward reducing the cost of LEPs. Defense Program funding this year also supports a major phase in the B61-12 LEP. This phase involves establishing manufacturing processes for the evaluation hardware

45

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

46

Transmission Line Security Monitor  

SciTech Connect

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2011-01-01T23:59:59.000Z

47

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

48

Langmuir probe measurements in a time-fluctuating-highly ionized non-equilibrium cutting arc: Analysis of the electron retarding part of the time-averaged current-voltage characteristic of the probe  

SciTech Connect

This work describes the application of Langmuir probe diagnostics to the measurement of the electron temperature in a time-fluctuating-highly ionized, non-equilibrium cutting arc. The electron retarding part of the time-averaged current-voltage characteristic of the probe was analysed, assuming that the standard exponential expression describing the electron current to the probe in collision-free plasmas can be applied under the investigated conditions. A procedure is described which allows the determination of the errors introduced in time-averaged probe data due to small-amplitude plasma fluctuations. It was found that the experimental points can be gathered into two well defined groups allowing defining two quite different averaged electron temperature values. In the low-current region the averaged characteristic was not significantly disturbed by the fluctuations and can reliably be used to obtain the actual value of the averaged electron temperature. In particular, an averaged electron temperature of 0.98 0.07 eV (= 11400 800 K) was found for the central core of the arc (30 A) at 3.5 mm downstream from the nozzle exit. This average included not only a time-average over the time fluctuations but also a spatial-average along the probe collecting length. The fitting of the high-current region of the characteristic using such electron temperature value together with the corrections given by the fluctuation analysis showed a relevant departure of local thermal equilibrium in the arc core.

Prevosto, L.; Mancinelli, B. [Grupo de Descargas Elctricas, Departamento Ing. Electromecnica, Facultad Regional Venado Tuerto (UTN), Laprida 651, Venado Tuerto (2600) Santa Fe (Argentina)] [Grupo de Descargas Elctricas, Departamento Ing. Electromecnica, Facultad Regional Venado Tuerto (UTN), Laprida 651, Venado Tuerto (2600) Santa Fe (Argentina); Kelly, H. [Grupo de Descargas Elctricas, Departamento Ing. Electromecnica, Facultad Regional Venado Tuerto (UTN), Laprida 651, Venado Tuerto (2600) Santa Fe (Argentina) [Grupo de Descargas Elctricas, Departamento Ing. Electromecnica, Facultad Regional Venado Tuerto (UTN), Laprida 651, Venado Tuerto (2600) Santa Fe (Argentina); Instituto de Fsica del Plasma (CONICET), Departamento de Fsica, Facultad de Ciencias Exactas y Naturales (UBA) Ciudad Universitaria Pab. I, 1428 Buenos Aires (Argentina)

2013-12-15T23:59:59.000Z

49

Security rethink  

Science Journals Connector (OSTI)

......breaches or heightening the risks. One of my clients...business to the socio-political situation of particular...based on the return on investment in keeping a high standard...times that security risks are at their highest...lay-offs. The return on investment must consider the positive......

Michael Chua

2002-09-01T23:59:59.000Z

50

Personnel Security  

Directives, Delegations, and Requirements

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

51

Dielectric-wall linear accelerator with a high voltage fast rise time switch that includes a pair of electrodes between which are laminated alternating layers of isolated conductors and insulators  

DOE Patents (OSTI)

A dielectric-wall linear accelerator is improved by a high-voltage, fast rise-time switch that includes a pair of electrodes between which are laminated alternating layers of isolated conductors and insulators. A high voltage is placed between the electrodes sufficient to stress the voltage breakdown of the insulator on command. A light trigger, such as a laser, is focused along at least one line along the edge surface of the laminated alternating layers of isolated conductors and insulators extending between the electrodes. The laser is energized to initiate a surface breakdown by a fluence of photons, thus causing the electrical switch to close very promptly. Such insulators and lasers are incorporated in a dielectric wall linear accelerator with Blumlein modules, and phasing is controlled by adjusting the length of fiber optic cables that carry the laser light to the insulator surface. 12 figs.

Caporaso, G.J.; Sampayan, S.E.; Kirbie, H.C.

1998-10-13T23:59:59.000Z

52

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Applications Global Security science-innovationassetsimagesicon-science.jpg Global Security National security depends on science and technology. The United States relies on...

53

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

4 4 April 2009 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout/Design Lisa Harris Contributors Ellen Boatner Ken Davis Beth Eckerman Kathy Fahey Stuart Hames Jamie Loveday W H A T ' S I N S I D E W H A T ' S I N S I D E Page 2 Page 2 Strategic objectives redefi ned Page 3 Page 3 Support the Y-12 team at Relay for Life Page 4 Page 4 Y-12 and the environment Page 5 Page 5 Hopping to fi nd eggs Page 7 Page 7 A picture IS worth a thousand words Mary Murray Brett Pate Ray Smith Donna Watson Lisa Xiques B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. the times

54

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

55

Facility Security Checklist U.S. Department of Transportation  

E-Print Network (OSTI)

was the last time security logs and/or incident reports were reviewed? 25. Is there a current security plan

Goodman, Robert M.

56

Automatic voltage imbalance detector  

DOE Patents (OSTI)

A device for indicating and preventing damage to voltage cells such as galvanic cells and fuel cells connected in series by detecting sequential voltages and comparing these voltages to adjacent voltage cells. The device is implemented by using operational amplifiers and switching circuitry is provided by transistors. The device can be utilized in battery powered electric vehicles to prevent galvanic cell damage and also in series connected fuel cells to prevent fuel cell damage.

Bobbett, Ronald E. (Los Alamos, NM); McCormick, J. Byron (Los Alamos, NM); Kerwin, William J. (Tucson, AZ)

1984-01-01T23:59:59.000Z

57

Security Rulemaking | Department of Energy  

Office of Environmental Management (EM)

Security Rulemaking Security Rulemaking Transportation Security Rulemaking Activities Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

58

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

59

Limitations of High-Voltage Insulation  

Science Journals Connector (OSTI)

... materials such as impregnated paper. The important electrical properties of the materials used for the insulation of high-voltage circuits are conductivity and electric strength. The conductivity measures the ability ... a million times between themselves, but they are all classified as available for high-voltage insulation.

1938-01-08T23:59:59.000Z

60

Cyber Security  

Office of Environmental Management (EM)

Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Paul Cunningham Incident Management Division (IM-32) Rob Ciochon Director Policy,...

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, Vol. 10, No. 6, June 2010  

NLE Websites -- All DOE Office Websites (Extended Search)

6 6 June 2010 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 2 Kohlhorst answers employees' questions Page 3 The ultimate cutting-edge technology Pages 4 and 5 Y-12 volunteers hit area communities Page 6 Catch up with Y-12 retiree Jack Rider Page 8 Alpha 3 gets a makeover B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout Lisa Harris Contributors Ellen Boatner Beth Eckerman Ryn Etter Kathy Fahey Scott Hackler Vicki Hinkel John Holbrook

62

Optical voltage reference  

DOE Patents (OSTI)

An optical voltage reference for providing an alternative to a battery source is described. The optical reference apparatus provides a temperature stable, high precision, isolated voltage reference through the use of optical isolation techniques to eliminate current and impedance coupling errors. Pulse rate frequency modulation is employed to eliminate errors in the optical transmission link while phase-lock feedback is employed to stabilize the frequency to voltage transfer function. 2 figures.

Rankin, R.; Kotter, D.

1994-04-26T23:59:59.000Z

63

Adaptive Infrastructures Toward a Secure and  

E-Print Network (OSTI)

Economic load dispatch 10 seconds to 1 hour; ongoing Thermodynamic changes from boiler control action (slow network, secure communications and intelligent software agents; 3) active-control of high-voltage devices stability, reliability, robustness, security and efficiency in a competitive marketplace and carbon

Amin, S. Massoud

64

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

65

Information Security: Coordination of Federal Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

66

Constant voltage ultracapacitor  

Science Journals Connector (OSTI)

Ultracapacitors have attracted lots of attention recently due to their growing use in hybrid vehicles and in energy storage applications for the smart grid. A very undesirable feature of ultracapacitors is the fact that the voltage drops as the capacitor is discharged. DC-DC converters are employed at present to convert the voltage of the ultracapacitor to constant voltage; however these converters typically do not operate if the voltage of the ultracapacitor drops below 1?V. In addition DC-DC converters suffer from well-known size/efficiency tradeoffs. This paper introduces a novel new ultracapacitor that is characterized by constant voltage. The new ultracapacitor does not utilize familiar energy conversion principles. Rather operation depends on an embedded electromechanical system that actually alters the capacitance of the ultracapacitor as the device is discharged. Due to a simple proportionality relationship between charge capacitance and voltage the voltage remains constant. Theoretical and experimental investigations have shown that the embedded mechanism for altering the capacitance has an efficiency of 99% or higher.

Ezzat G. Bakhoum

2012-01-01T23:59:59.000Z

67

Voltage balanced multilevel voltage source converter system  

DOE Patents (OSTI)

A voltage balanced multilevel converter for high power AC applications such as adjustable speed motor drives and back-to-back DC intertie of adjacent power systems. This converter provides a multilevel rectifier, a multilevel inverter, and a DC link between the rectifier and the inverter allowing voltage balancing between each of the voltage levels within the multilevel converter. The rectifier is equipped with at least one phase leg and a source input node for each of the phases. The rectifier is further equipped with a plurality of rectifier DC output nodes. The inverter is equipped with at least one phase leg and a load output node for each of the phases. The inverter is further equipped with a plurality of inverter DC input nodes. The DC link is equipped with a plurality of rectifier charging means and a plurality of inverter discharging means. The plurality of rectifier charging means are connected in series with one of the rectifier charging means disposed between and connected in an operable relationship with each adjacent pair of rectifier DC output nodes. The plurality of inverter discharging means are connected in series with one of the inverter discharging means disposed between and connected in an operable relationship with each adjacent pair of inverter DC input nodes. Each of said rectifier DC output nodes are individually electrically connected to the respective inverter DC input nodes. By this means, each of the rectifier DC output nodes and each of the inverter DC input nodes are voltage balanced by the respective charging and discharging of the rectifier charging means and the inverter discharging means.

Peng, Fang Zheng (Oak Ridge, TN); Lai, Jih-Sheng (Knoxville, TN)

1997-01-01T23:59:59.000Z

68

Voltage balanced multilevel voltage source converter system  

DOE Patents (OSTI)

Disclosed is a voltage balanced multilevel converter for high power AC applications such as adjustable speed motor drives and back-to-back DC intertie of adjacent power systems. This converter provides a multilevel rectifier, a multilevel inverter, and a DC link between the rectifier and the inverter allowing voltage balancing between each of the voltage levels within the multilevel converter. The rectifier is equipped with at least one phase leg and a source input node for each of the phases. The rectifier is further equipped with a plurality of rectifier DC output nodes. The inverter is equipped with at least one phase leg and a load output node for each of the phases. The inverter is further equipped with a plurality of inverter DC input nodes. The DC link is equipped with a plurality of rectifier charging means and a plurality of inverter discharging means. The plurality of rectifier charging means are connected in series with one of the rectifier charging means disposed between and connected in an operable relationship with each adjacent pair of rectifier DC output nodes. The plurality of inverter discharging means are connected in series with one of the inverter discharging means disposed between and connected in an operable relationship with each adjacent pair of inverter DC input nodes. Each of said rectifier DC output nodes are individually electrically connected to the respective inverter DC input nodes. By this means, each of the rectifier DC output nodes and each of the inverter DC input nodes are voltage balanced by the respective charging and discharging of the rectifier charging means and the inverter discharging means. 15 figs.

Peng, F.Z.; Lai, J.S.

1997-07-01T23:59:59.000Z

69

Substation voltage upgrading  

SciTech Connect

Substation voltage uprating, i.e., conversion of a substation from a lower rated voltage to a higher rated voltage without a complete substation rebuild, can lead to excellent economic benefits. Utilization of the old substation layout and/or the existing equipment, to some extent, is the practical objective of such an uprating. The objective of this project was to assess the opportunities for substation uprating in the industry, to establish feasibility for such uprating and to study methods for accomplishing it. The final aim of the project was to provide guidance to utilities interested in uprating. 56 refs., 41 figs., 18 tabs.

Panek, J.; Elahi, H.; Sublich, M. (General Electric Co., Schenectady, NY (USA). Systems Development and Engineering Dept.)

1989-08-01T23:59:59.000Z

70

Safety, Security & Fire Report  

E-Print Network (OSTI)

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

71

High voltage DC power supply  

DOE Patents (OSTI)

A high voltage DC power supply having a first series resistor at the output for limiting current in the event of a short-circuited output, a second series resistor for sensing the magnitude of output current, and a voltage divider circuit for providing a source of feedback voltage for use in voltage regulation is disclosed. The voltage divider circuit is coupled to the second series resistor so as to compensate the feedback voltage for a voltage drop across the first series resistor. The power supply also includes a pulse-width modulated control circuit, having dual clock signals, which is responsive to both the feedback voltage and a command voltage, and also includes voltage and current measuring circuits responsive to the feedback voltage and the voltage developed across the second series resistor respectively. 7 figs.

Droege, T.F.

1989-12-19T23:59:59.000Z

72

High voltage DC power supply  

DOE Patents (OSTI)

A high voltage DC power supply having a first series resistor at the output for limiting current in the event of a short-circuited output, a second series resistor for sensing the magnitude of output current, and a voltage divider circuit for providing a source of feedback voltage for use in voltage regulation is disclosed. The voltage divider circuit is coupled to the second series resistor so as to compensate the feedback voltage for a voltage drop across the first series resistor. The power supply also includes a pulse-width modulated control circuit, having dual clock signals, which is responsive to both the feedback voltage and a command voltage, and also includes voltage and current measuring circuits responsive to the feedback voltage and the voltage developed across the second series resistor respectively.

Droege, Thomas F. (Batavia, IL)

1989-01-01T23:59:59.000Z

73

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

74

Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity...

75

the Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Buttons, Buttons, pg. 2 Buttons aren't only for the clothing industry. STEM, pg. 8 Y-12's contributions to Knoxville's L&N STEM Academy are a sound investment. Film crews from national television stations don't usually go on classified missions. How- ever, MSNBC's Rachel Maddow was granted special access to report on the successful removal of highly enriched uranium from Mexico's National Institute for Nuclear Research in February. Y-12 was tasked by the National Nuclear Security Administration's Office of Global Threat Reduction (more commonly known as the Global Threat Reduction Initiative or GTRI) to support the packaging and removal of fresh HEU from Mexico's Training, Research, Isotopes, General Atomics (or TRIGA) II Research Reactor, located south of Mexico City. This

76

High Temperature, High Voltage Fully Integrated Gate Driver Circuit  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

driver circuit, 5-V on- chip voltage regulator, short-circuit protection, undervoltage lockout, bootstrap capacitor, dead time controller and temperature sensor * 0.8-micron,...

77

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

78

High-voltage engineering  

E-Print Network (OSTI)

High-voltage engineering covers the application, the useful use and proper working of high voltages and high fields. Here we give some introductory examples, i.e., septa and kicker at the Large Hadron Collider (14 TeV), the Super Proton Synchrotron (450 GeV) and the Proton Synchrotron (26 GeV) accelerators as found at the European Orginization for Nuclear Research (CERN) today. We briefly cover the theoretical foundation (Maxwell equations) and aspects of numerical field simulation methods. Concepts relating to electrical fields, insulation geometry and medium and breakdown are introduced. We discuss ways of generating high voltages with examples of AC sources (50/60 Hz), DC sources, and pulse sources. Insulation and breakdown in gases, liquids, solids and vacuum are presented, including Paschens law (breakdown field and streamer breakdown). Applications of the above are discussed, in particular the general application of a transformer. We briefly discuss measurement techniques of partial disch...

Gaxiola, E

2006-01-01T23:59:59.000Z

79

Incidents of Security Concern  

Directives, Delegations, and Requirements

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

80

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

82

Security Specialist  

Energy.gov (U.S. Department of Energy (DOE))

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

83

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

nonpartisan organization with a mission to strengthen global security by reducing the risk of use and preventing the spread of nuclear, biological, and chemical weapons and to...

84

Global security  

SciTech Connect

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

85

Cyber Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

86

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

87

Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision...

88

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

89

IMPACT OF DYNAMIC VOLTAGE SCALING (DVS) ON CIRCUIT OPTIMIZATION  

E-Print Network (OSTI)

and dynamic power, respectively. Both gate sizing and Dual-VT are design-time techniques, which are applied to the circuit at a fixed voltage. On the other hand, DVS is a run-time technique and implies that the circuit will be operating at a different voltage...

Esquit Hernandez, Carlos A.

2010-01-16T23:59:59.000Z

90

Lowering of the firing voltage and reducing of the discharge delay time in alternating current plasma display panels by a discontinuous spin-coated LaB{sub 6} film on the MgO protective layer  

SciTech Connect

A spin coated LaB{sub 6} discontinuous film is covered on MgO protective layer to improve the discharge performance of alternating current plasma display panels. Under the premise of high transmittance of more than 90%, a very small amount of polycrystal LaB{sub 6} powders added in an organic solvent are chosen as the coating solution. The discharge characteristics results show that with 250 torr 5% Xe-Ne pressure, the firing voltage and discharge delay time of the test panel with LaB{sub 6}/MgO double protective layer are decreased by 13.4% and 36.5%, respectively, compared with that of conventional MgO protective layer, likely owing to the low work function of LaB{sub 6.} Furthermore, the aging time of the proposed structure is comparable to that of pure MgO protective layer. Therefore, it will not increase the production costs and is highly suitable to be applied for alternating current plasma display panels with low electrical power consumption.

Deng, Jiang, E-mail: dj78291@163.com [School of Physical Electronic, University of Electronic Science and Technology of China, No.4, Section 2, Jianshe North Road, 610054 Chengdu (China)] [School of Physical Electronic, University of Electronic Science and Technology of China, No.4, Section 2, Jianshe North Road, 610054 Chengdu (China); Zeng, Baoqing [School of Physical Electronic, University of Electronic Science and Technology of China, No.4, Section 2, Jianshe North Road, 610054 Chengdu (China) [School of Physical Electronic, University of Electronic Science and Technology of China, No.4, Section 2, Jianshe North Road, 610054 Chengdu (China); Zhongshan Institute, University of Electronic Science and Technology of China, 528402 zhongshan (China); Wang, Xiaoju; Lin, Zulun; Qi, Kangcheng; Cao, Guichuan [School of Opto-electronic Information, University of Electronic Science and Technology of China, No.4, Section 2, Jianshe North Road, 610054 Chengdu (China)] [School of Opto-electronic Information, University of Electronic Science and Technology of China, No.4, Section 2, Jianshe North Road, 610054 Chengdu (China)

2014-03-15T23:59:59.000Z

91

Requirements for security signalling  

SciTech Connect

There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

Pierson, L.G.; Tarman, T.D.

1995-02-05T23:59:59.000Z

92

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

93

defense nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

nuclear security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response...

94

nuclear security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

security | National Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our...

95

Security In Information Systems  

E-Print Network (OSTI)

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

96

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

97

Charge-pump voltage converter  

DOE Patents (OSTI)

A charge-pump voltage converter for converting a low voltage provided by a low-voltage source to a higher voltage. Charge is inductively generated on a transfer rotor electrode during its transit past an inductor stator electrode and subsequently transferred by the rotating rotor to a collector stator electrode for storage or use. Repetition of the charge transfer process leads to a build-up of voltage on a charge-receiving device. Connection of multiple charge-pump voltage converters in series can generate higher voltages, and connection of multiple charge-pump voltage converters in parallel can generate higher currents. Microelectromechanical (MEMS) embodiments of this invention provide a small and compact high-voltage (several hundred V) voltage source starting with a few-V initial voltage source. The microscale size of many embodiments of this invention make it ideally suited for MEMS- and other micro-applications where integration of the voltage or charge source in a small package is highly desirable.

Brainard, John P. (Albuquerque, NM); Christenson, Todd R. (Albuquerque, NM)

2009-11-03T23:59:59.000Z

98

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

99

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

100

Personnel Security  

Directives, Delegations, and Requirements

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

102

Secure control systems with application to cyber-physical systems  

SciTech Connect

Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

Dong, Jin [ORNL] [ORNL; Djouadi, Seddik M [ORNL] [ORNL; Nutaro, James J [ORNL] [ORNL; Kuruganti, Phani Teja [ORNL] [ORNL

2014-01-01T23:59:59.000Z

103

Ignition distributor voltage generator  

SciTech Connect

This patent describes a voltage pulse generator and ignition distributor comprising, a base, a shaft rotatably supported by the base, a distributor cap supported by the base having a center electrode and circumferentially spaced outer electrodes. The pulse generator and ignition distribution also include a first rotor driven by the shaft formed of electrical insulating material having electrically conductive means connected to the center terminal and a portion that rotates past the outer electrodes. The portion of the electrically conductive means that rotates past the outer electrodes is spaced from the outer electrodes to form a gap therebetween. A voltage pulse generator comprises a second rotor driven by the shaft, at least one permanent magnet and an annular pickup coil supported by the base. The pickup coil has inner turns and outer turns, the beginning turn of the inner turns connected to a first lead and the last turn of the outer turns connected to a second lead, the outer turns enclosing the inner turns. The pickup coil also has a circuit connected directly between the second lead and ground which is operative to provide a direct conductive path to ground for high frequency energy capacitively coupled to the outer turns from the gap discharge between the electrically conductive means of the first rotor and an outer electrode, the outer turns forming a grounded shield for the inner turns.

Boyer, J.A.

1986-11-04T23:59:59.000Z

104

REFINED RFP LOOP VOLTAGE CALCULATION J.C. Sprott  

E-Print Network (OSTI)

is the stored magnetic energy, Up is the plasma energy, and 'E is the global energy confinement time, which-of-merit for RFP devices is the loop voltage. Low loop voltage implies high plasma temperature and long energy is smallest if the loop is as close to the outside of the shell and as far from the primary windings

Sprott, Julien Clinton

105

Low voltage ride-through capability improvement of DFIG-based wind turbines under unbalanced voltage dips  

Science Journals Connector (OSTI)

Abstract This paper proposes a competent and effective scheme to enhance the ride-through capability of DFIG-based wind turbines under unbalanced voltage dip conditions. The proposed method is realized through joint use of the rotor-side converter control and a three-phase stator damping resistor (SDR) placed in series with the stator windings. By means of an asymmetrical SDR idea, during the unbalanced voltage dip the SDR resistors are activated only in phase(s) experiencing low voltage. Then, the rotor current is controlled such that no unbalance voltage appears on the stator voltage. The proposed ride-through approach limits the peak values of the rotor inrush current, electromagnetic torque and DFIG transient response at the times of occurrence and clearing the fault. It also suppresses fluctuation of the electromagnetic torque and DFIG transient response appeared during unbalanced voltage dips due to negative sequence component.

Mohsen Rahimi; Mostafa Parniani

2014-01-01T23:59:59.000Z

106

Mac Security Bible  

Science Journals Connector (OSTI)

Your essential, no-holds-barred guide to Mac security threats and solutions Myth number one: Macs are safer than PCs. Not really, says author Joe Kissell, named one of MacTech's "25 Most Influential People" in the Mac community for 2008. In this timely ...

Joe Kissell

2010-01-01T23:59:59.000Z

107

Planning of distribution networks for medium voltage and low voltage.  

E-Print Network (OSTI)

??Determination of the placement and rating of transformers and feeders are the main objective of the basic distribution network planning. The bus voltage and the (more)

Ziari, Iman

2011-01-01T23:59:59.000Z

108

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

109

Securing Distributed Storage: Challenges, Techniques, and Systems  

E-Print Network (OSTI)

important security issues related to storage and present a comprehensive survey of the security services, present a critical review of the existing solutions, compare them, and highlight potential research issues time, recent trends in data outsourcing have raised many new privacy issues making security a crucial

Kim, Dae-Shik

110

Energy Security Council  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Council Energy Security Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Watkins...

111

Quantum-secured imaging  

E-Print Network (OSTI)

We have built an imaging system that uses a photon's position or time-of-flight information to image an object, while using the photon's polarization for security. This ability allows us to obtain an image which is secure against an attack in which the object being imaged intercepts and resends the imaging photons with modified information. Popularly known as "jamming," this type of attack is commonly directed at active imaging systems such as radar. In order to jam our imaging system, the object must disturb the delicate quantum state of the imaging photons, thus introducing statistical errors that reveal its activity.

Mehul Malik; Omar S. Magaa-Loaiza; Robert W. Boyd

2012-12-11T23:59:59.000Z

112

Substation voltage upgrading  

SciTech Connect

This report addresses specific issues to support sound yet not unduly conservative uprating practices for substations. The main parts of the report cover the insulation withstand and overvoltage protection aspects, environmental measurements, reliability criteria, and industry experience. First the insulation design concerns are addressed. Substation stress by a backflashover of the line insulation due to lightning in the vicinity of the substation is recognized as a critical stress. A representative part of a 550 kV BIL substation was erected at the EPRI High Voltage Transmission Research Center, where also a special test circuit was assembled to produce a fast front, slow tail (0.2/200 {mu}s) wave. The substation as well as some special configurations were tested for line-to-ground and line-to-line withstand. Computer studies were performed to complement the test results. A number of important conclusions was reached. The most prominent result in that the high frequency oscillations, as caused by reflections within the substation, do not effect the Critical Flashover Voltage (CFO). The present practice, based on the highest peak is therefore very conservative. The slow tail of the wave appears to dictate the CFO. An arrester model for computer studies to represent very fast as well as slow phenomena was derived. It is based on full scale arrester test data, made available in this project. The computer program to calculate arrester model parameters is also a part of the report. The electric environmental measurements are reported for the tested substation at the HVTRC and for the uprated substation of Public Service Company of Colorado, both before and after the uprating. The performance is satisfactory when corona free hardware is used. Insulation design criteria are analyzed based on substation reliability, the system viewpoint and consequences of the failure. Utility experience with uprated substations is reviewed.

Panek, J.; Elahi, H.; Lux, A.; Imece, A.F. (General Electric Co., Schenectady, NY (United States). Power Systems Engineering Dept.); LaPanse, R.A.; Stewart, J.R. (Public Service Co. of Colorado, Denver, CO (United States))

1992-04-01T23:59:59.000Z

113

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

114

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

115

Information Security  

Directives, Delegations, and Requirements

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

116

Information Security  

Directives, Delegations, and Requirements

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

117

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network (OSTI)

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

118

Tag: Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Search Tags Tag: Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website,...

119

Security Conditions  

Directives, Delegations, and Requirements

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

120

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

122

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

NMMSS Information, Reports & Forms Security Forms Security Forms U.S. Department of Energy U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards...

123

Fast Pulsing Neutron Generators for Security Application  

E-Print Network (OSTI)

FAST PULSING NEUTRON GENERATORS FOR SECURITY APPLICATION* Q.time/fast pulsing neutron generator is needed primarily forA compact neutron generator, currently being developed in

Ji, Q.

2010-01-01T23:59:59.000Z

124

ABBGroup-1-High voltage lab  

E-Print Network (OSTI)

;©ABBGroup-3- 3-Sep-07 Where does one use circuit breakers? High voltage (HV) circuit breakers are keyA DISTRIBUTION MEDIUM AND LOW VOLTAGE HV circuit breakers #12;©ABBGroup-4- 3-Sep-07 When a breaker fails to interrupt the current... Fault arc at a disconnector Fault arc in a substation #12;©ABBGroup-5- 3-Sep-07

Basse, Nils Plesner

125

Temperature controlled high voltage regulator  

DOE Patents (OSTI)

A temperature controlled high voltage regulator for automatically adjusting the high voltage applied to a radiation detector is described. The regulator is a solid state device that is independent of the attached radiation detector, enabling the regulator to be used by various models of radiation detectors, such as gas flow proportional radiation detectors.

Chiaro, Jr., Peter J. (Clinton, TN); Schulze, Gerald K. (Knoxville, TN)

2004-04-20T23:59:59.000Z

126

Innovations for a secure nation  

NLE Websites -- All DOE Office Websites (Extended Search)

Innovations for a Secure Nation Innovations for a Secure Nation /about/_assets/images/icon-70th.jpg Innovations for a Secure Nation LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. image description Plasma technology for textile finishing applications gets a boost from LANL APJeT received a $100,000 Venture Acceleration Fund award from LANS helping to complete design and engineering of a commercial-scale production unit. - 4/3/12 One of several active projects, LANL and Chevron co-developed INFICOMM(tm), a wireless technology used to collect real-time temperature and pressure information from sensors in oil and gas wells, including very deep wells already producing oil and gas and drilling operations for new wells.

127

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

128

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

129

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

130

2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

131

Low voltage nonprimary explosive detonator  

DOE Patents (OSTI)

A low voltage, electrically actuated, nonprimary explosive detonator is disclosed wherein said detonation is achieved by means of an explosive train in which a deflagration-to-detonation transition is made to occur. The explosive train is confined within a cylindrical body and positioned adjacent to low voltage ignition means have electrical leads extending outwardly from the cylindrical confining body. Application of a low voltage current to the electrical leads ignites a self-sustained deflagration in a donor portion of the explosive train which then is made to undergo a transition to detonation further down the train.

Dinegar, Robert H. (Los Alamos, NM); Kirkham, John (Newbury, GB2)

1982-01-01T23:59:59.000Z

132

Method of Controlling Corona Effects and Breakdown Voltage of Small Air Gaps Stressed by Impulse Voltages  

E-Print Network (OSTI)

This paper investigates the influence of a resistor on the dielectric behavior of an air gap. The resistor is connected in series with the air gap and the latter is stressed by impulse voltage. Air gap arrangements of different geometry with either the rod or the plate grounded are stressed with impulse voltages of both positive and negative polarity. The resistor is connected in series with the air gap in the return circuit connecting the gap with the impulse generator. The method followed involves the investigation of the graphs of the charging time concerning the air gaps capacitances, in connection to the value of the resistor, the geometry of the gap, the effect of grounding and the polarity effect. It is determined that the charging time of the air gap increases, as the value of the resistor increases. It is also determined that the peak voltage value of the fully charged air gap decreases as the value of the resistor increases. The results of the mathematical and simulation analysis are compared with the results of the oscillograms taken from experimental work. In addition and consequently to the above results it is concluded from the experimental work that the in series connection of the resistor in the circuit has significant influence on corona pulses (partial discharges) occurring in the gap and on the breakdown voltage of the gap. A new method of controlling the corona effects and consequently the breakdown voltage of small air gaps stressed by impulse voltage of short duration in connection to the ground effect and the polarity effect has arisen. Furthermore through mathematical analysis of the charging graphs obtained from simulation and experimental oscillograms there was a calculation of the values of the capacitance of the air gaps in relation to their geometry and the results were compared to the values calculated with mathematical analysis.

Athanasios Maglaras; Trifon Kousiouris; Frangiskos Topalis; Dimitrios Katsaros; Leandros A. Maglaras; Konstantina Giannakopoulou

2014-10-15T23:59:59.000Z

133

Cyberspace security system  

SciTech Connect

A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

2014-06-24T23:59:59.000Z

134

Model checking grid security  

Science Journals Connector (OSTI)

Grid computing is one of the leading forms of high performance computing. Security in the grid environment is a challenging issue that can be characterized as a complex system involving many subtleties that may lead designers into error. This is similar to what happens with security protocols where automatic verification techniques (specially model checking) have been proved to be very useful at design time. This paper proposes a formal verification methodology based on model checking that can be applied to host security verification for grid systems. The proposed methodology must take into account that a grid system can be described as a parameterized model, and security requirements can be described as hyperproperties. Unfortunately, both parameterized model checking and hyperproperty verification are, in general, undecidable. However, it has been proved that this problem becomes decidable when jobs have some regularities in their organization. Therefore, this paper presents a verification methodology that reduces a given grid system model to a model to which it is possible to apply a cutoff theorem (i.e., a requirement is satisfied by a system with an arbitrary number of jobs if and only if it is satisfied by a system with a finite number of jobs up to a cutoff size). This methodology is supported by a set of theorems, whose proofs are presented in this paper. The methodology is explained by means of a case study: the Condor system.

F. Pagliarecci; L. Spalazzi; F. Spegni

2013-01-01T23:59:59.000Z

135

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

136

Definition: Automated Voltage Regulators | Open Energy Information  

Open Energy Info (EERE)

Regulators Regulators Jump to: navigation, search Dictionary.png Automated Voltage Regulators Voltage regulators are transformers that can increase or decrease the voltage on a distribution circuit to help keep the voltage within a pre-determined band. Unlike capacitor banks, voltage regulators cannot adjust power factor. These devices typically monitor the voltage at the location where they are connected, and compare it to a programmed set point. If the voltage deviates too far from the set point, the voltage regulator can increase or decrease its output voltage by moving the tap on the secondary side up or down. An automated voltage regulator can operate with remote control signals, or in concert with other area voltage control devices, to help regulate distribution voltage in a coordinated fashion.

137

Transportation Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Transportation Security Transportation Security Transportation Security More Documents & Publications Overview for Newcomers West Valley Demonstration Project Low-Level Waste...

138

Saving Megawatts with Voltage Optimization  

E-Print Network (OSTI)

that had been installed at several electric utility distribution substations in the U.S. and Canada. These systems, being operated in Conservation Voltage Regulation mode, have provided significant energy conservation where they have been installed...

Wilson, T.; Bell, D.

2010-01-01T23:59:59.000Z

139

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

140

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Security for grids  

SciTech Connect

Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-08-14T23:59:59.000Z

142

Nuclear Security Conference 2010 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Conference 2010 Nuclear Security Conference 2010 Nuclear Security Conference 2010 April 14, 2010 - 12:00am Addthis The Role of the Private Sector in Securing Nuclear Materials U.S. Secretary of Energy Steven Chu Wednesday, April 14, 2010 Secretary Steven Chu spoke this morning at the Nuclear Security Conference 2010: the Role of the Private Sector in Securing Nuclear Materials. Below are his remarks as prepared for delivery: I would like to thank the Nuclear Energy Institute for hosting this important conference on the role of the private sector in securing nuclear materials. I would also like to thank all of you for your participation today. Your industry lies at the intersection of two of the most pressing issues of our time: the energy challenge and the threat of nuclear proliferation.

143

Nuclear Security Conference 2010 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Conference 2010 Nuclear Security Conference 2010 Nuclear Security Conference 2010 April 14, 2010 - 12:00am Addthis The Role of the Private Sector in Securing Nuclear Materials U.S. Secretary of Energy Steven Chu Wednesday, April 14, 2010 Secretary Steven Chu spoke this morning at the Nuclear Security Conference 2010: the Role of the Private Sector in Securing Nuclear Materials. Below are his remarks as prepared for delivery: I would like to thank the Nuclear Energy Institute for hosting this important conference on the role of the private sector in securing nuclear materials. I would also like to thank all of you for your participation today. Your industry lies at the intersection of two of the most pressing issues of our time: the energy challenge and the threat of nuclear proliferation.

144

Protocol, Security Assistance - January 2007 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 January 2007 Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security. The Assistance Program is comprised of technologists and subject matter experts from all the S&S disciplines and technical areas including Program Planning Management and Support, Advanced Security Technologies, Protective Force, Physical Security, Information Protection, Safeguards and Security Construction Projects, Vulnerability Assessments, and Nuclear Materials Control and Accountability. Our commitment is to continue to build an assistance program dedicated to serving the interests of the Department and our customers' S&S programs. Our emphasis remains

145

LM111/LM211/LM311 Voltage Comparator  

E-Print Network (OSTI)

LM111/LM211/LM311 Voltage Comparator 1.0 General Description The LM111, LM211 and LM311 are voltage comparators that have input currents nearly a thousand times lower than devices like the LM106 or LM710A. Both the inputs and the outputs of the LM111, LM211 or the LM311 can be isolated from system ground

Lanterman, Aaron

146

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

147

Review: Intranet Security  

Science Journals Connector (OSTI)

......Review Review: Intranet Security Reviewed by John Williamson Intranet Security John Vacca...Advanced Computer Technology and the Law Curtis...that in advanced technology the legal system...Wolverhampton University Intranet Security ?? Intranet......

John Williamson

1998-05-01T23:59:59.000Z

148

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

149

Personnel Security Activities  

Directives, Delegations, and Requirements

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

150

Security | Department of Energy  

Energy Savers (EERE)

Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

151

Security & Privacy | EMSL  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

152

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

153

Voltage, energy and power in electric circuits  

E-Print Network (OSTI)

Voltage, energy and power in electric circuits Science teaching unit #12;Disclaimer The Department-2008DVD-EN Voltage, energy and power in electric circuits #12;#12;© Crown copyright 2008 1The National Strategies | Secondary Voltage, energy and power in electric circuits 00094-2008DVD-EN Contents Voltage

Berzins, M.

154

Safeguards & Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

155

Barriers to creating a secure MPI  

SciTech Connect

This paper explores some of the many issues in developing security enhanced MPI for embedded real-time systems supporting the Department of Defense`s Multi-level Security policy (DoD MLS) are presented along with the preliminary design for such an MPI variant. In addition some of the many issues that need to be addressed in creating security enhanced versions of MPI for other domains are discussed. 19 refs.

Brightwell, R.; Greenberg, D.S.; Matt, B.J. [Sandia National Labs., Albuquerque, NM (United States); Davida, G.I. [Univ. of Wisconsin, Milwaukee, WI (United States). Dept. of Computer Sciences

1997-08-01T23:59:59.000Z

156

Ancillary service details: Voltage control  

SciTech Connect

Voltage control is accomplished by managing reactive power on an alternating-current power system. Reactive power can be produced and absorbed by both generation and transmission equipment. Reactive-power devices differ substantially in the magnitude and speed of response and in their capital costs. System operators, transmission owners, generators, customers, power marketers, and government regulators need to pay close attention to voltage control as they restructure the U.S. electricity industry. Voltage control can affect reliability and commerce in three ways: (1) Voltages must be maintained within an acceptable range for both customer and power-system equipment to function properly. (2) The movement of reactive power consumes transmission resources, which limits the ability to move real power and worsens congestion. (3) The movement of reactive power results in real-power losses. When generators are required to supply excessive amounts of reactive power, their real-power production must be curtailed. These opportunity costs are not currently compensated for in most regions. Current tariffs are based on embedded costs. These embedded-cost tariffs average about $0.51/MWh, equivalent to $1.5 billion annually for the United States as a whole. Although this cost is low when compared with the cost of energy, it still aggregates to a significant amount of money. This report takes a basic look at why the power system requires reactive power (an appendix explains the fundamentals of real and reactive power). The report then examines the various types of generation and transmission resources used to supply reactive power and to control voltage. Finally it discusses how these resources are deployed and paid for in several reliability regions around the country. As the U.S. electricity industry is restructured, the generation, transmission, and system-control equipment and functions that maintain voltages within the appropriate ranges are being deintegrated.

Kirby, B.; Hirst, E.

1997-12-01T23:59:59.000Z

157

Optical crystal based devices for current and voltage measurement  

SciTech Connect

A prerequisite for safe, stable operation of an electric power system is accurate, reliable measurement of the system parameters, in particular, current and voltage. Traditionally this has been achieved on High Voltage (HV) systems by expensive, bulky iron-cored current transformers (CTs) and capacitor voltage transformers (VTs). Both these devices are increasingly coming under review in modern power systems due to their cost, safety implications for personnel and surrounding plant if failure occurs, installation time and indeed substation land requirements. This paper describes novel designs for magneto-optic and electro-optic crystal sensors providing potentially separate and combined current and voltage measurement. The results of testing programs are presented and details of the work associated with field trials given.

Cruden, A.; Richardson, Z.J.; McDonald, J.R.; Andonovic, I. [Univ. of Strathclyde (United Kingdom)] [Univ. of Strathclyde (United Kingdom)

1995-07-01T23:59:59.000Z

158

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

159

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

160

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

162

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

163

Better Security Through Discussion | Department of Energy  

Office of Environmental Management (EM)

Better Security Through Discussion Better Security Through Discussion Better Security Through Discussion More Documents & Publications Indiana Department of Homeland Security -...

164

ABBGroup-1-High voltage lab  

E-Print Network (OSTI)

A DISTRIBUTION MEDIUM AND LOW VOLTAGE HV circuit breakers #12;©ABBGroup-4- 3-Sep-07 When a breaker fails to interrupt the current... Fault arc at a disconnector Fault arc in a substation #12;©ABBGroup-5- 3-Sep-07/costs A detailed understanding of arc physics and fluid dynamics is necessary for the development of HV circuit

Basse, Nils Plesner

165

Current vs. Voltage Feedback Amplifiers  

E-Print Network (OSTI)

?' In most applications, the differences between current feedback (CFB) and voltage feedback (VFB) are not apparent. Today's CFB and VFB amplifiers have comparable performance, but there are cer- tain unique Performance · Feedback Freedom Aside from the well-known attribute of CFB amplifiers, gain

Lanterman, Aaron

166

Modulated voltage metastable ionization detector  

SciTech Connect

Metastable ionization detectors used for chromatographic analysis usually employa fixed high voltage for the ionization potential. For this reason, the operating range is limited to about three orders of magnitude. By use of the technique disclosed in the instant invention, operating ranges of about nine orders of magnitude are obtained. The output current from a metastable ionization detector (MID) is applied to a modulation voltage circuit. An adjustment is made to balance out the background current, and an output current, above background, is applied to an input of a strip chart recorder. For low level concentrations, i.e., low detected output current, the ionization potential will be at a maximum and the metastable ionization detector will operate at its most sensitive level. When the detected current from the metastable ionization detector increases above a predetermined threshold level, a voltage control circuit is activated which turns on a high voltage transistor which acts to reduce the ionization potential. The ionization potential applied to the metastable ionization detector is then varied so as to maintain the detected signal level constant. The variation in ionization potential is now related to the concentration fo the constituent and a representative amplitude is applied to another input of said strip chart recorder.

Carle, G. C.; Humphry, D. E.; Kojiro, D. R.

1985-08-27T23:59:59.000Z

167

Personnel Security Program Manual  

Directives, Delegations, and Requirements

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

168

Personnel Security Manual  

Directives, Delegations, and Requirements

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

169

Office of Security Assistance  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

170

REAL TIME SYSTEM OPERATIONS 2006-2007  

SciTech Connect

The Real Time System Operations (RTSO) 2006-2007 project focused on two parallel technical tasks: (1) Real-Time Applications of Phasors for Monitoring, Alarming and Control; and (2) Real-Time Voltage Security Assessment (RTVSA) Prototype Tool. The overall goal of the phasor applications project was to accelerate adoption and foster greater use of new, more accurate, time-synchronized phasor measurements by conducting research and prototyping applications on California ISO's phasor platform - Real-Time Dynamics Monitoring System (RTDMS) -- that provide previously unavailable information on the dynamic stability of the grid. Feasibility assessment studies were conducted on potential application of this technology for small-signal stability monitoring, validating/improving existing stability nomograms, conducting frequency response analysis, and obtaining real-time sensitivity information on key metrics to assess grid stress. Based on study findings, prototype applications for real-time visualization and alarming, small-signal stability monitoring, measurement based sensitivity analysis and frequency response assessment were developed, factory- and field-tested at the California ISO and at BPA. The goal of the RTVSA project was to provide California ISO with a prototype voltage security assessment tool that runs in real time within California ISO?s new reliability and congestion management system. CERTS conducted a technical assessment of appropriate algorithms, developed a prototype incorporating state-of-art algorithms (such as the continuation power flow, direct method, boundary orbiting method, and hyperplanes) into a framework most suitable for an operations environment. Based on study findings, a functional specification was prepared, which the California ISO has since used to procure a production-quality tool that is now a part of a suite of advanced computational tools that is used by California ISO for reliability and congestion management.

Eto, Joseph H.; Parashar, Manu; Lewis, Nancy Jo

2008-08-15T23:59:59.000Z

171

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

172

Cyber Security & Smart Grid  

E-Print Network (OSTI)

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

173

Voltage Control Devices on the IEEE 8500 Node Test Feeder  

SciTech Connect

The IEEE Test Cases provide researchers with distribution system models that can be used to validate new analytic methods. The newest of these models is the 8500-node test feeder which contains multiple devices for voltage control. In addition to a substation regulator there are multiple inline regulators as well as capacitor banks. This paper will discuss the detail in which voltage control devises should be modeled when examining large distribution systems. This discussion will include issues associated with power flow analysis for a single time step as well as for time series analysis.

Schneider, Kevin P.; Fuller, Jason C.

2010-01-06T23:59:59.000Z

174

T-560: Cisco Security Advisory: Management Center for Cisco Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code...

175

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

176

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

177

Security & Sustainability College of Charleston  

E-Print Network (OSTI)

Security & Sustainability POLI 399 College of Charleston Fall 2013 Day/Time: T/H; 10@cofc.edu Office: 284 King Street, #206 (Office of Sustainability) Office Hours: by appt or virtual apt Instructor is that if sustained well-being and prosperity of human and ecological systems is the goal of sustainability

Young, Paul Thomas

178

Automatic Voltage Control of Electrical Systems  

Science Journals Connector (OSTI)

... to have complete automatic voltage regulation and it also has supervisory control for its main substations. By a careful application of automatically controlled regulators it is shown that the voltage ...

1934-01-20T23:59:59.000Z

179

Implications of Pulser Voltage Ripple  

SciTech Connect

In a recent set of measurements obtained by G. Kamin, W. Manning, A. Molvik, and J. Sullivan, the voltage waveform of the diode pulser had a ripple of approximately {+-}1.3% of the 65 kV flattop voltage, and the beam current had a larger corresponding ripple of approximately {+-}8.4% of the 1.5 mA average current at the location of the second Faraday cup, approximately 1.9 m downstream from the ion source. The period of the ripple was about 1 {mu}s. It was initially unclear whether this large current ripple was in fact a true measurement of the current or a spurious measurement of noise produced by the pulser electronics. The purpose of this note is to provide simulations which closely match the experimental results and thereby corroborate the physical nature of those measurements, and to provide predictions of the amplitude of the current ripples as they propagate to the end of linear transport section. Additionally analytic estimates are obtained which lend some insight into the nature of the current fluctuations and to provide an estimate of what the maximum amplitude of the current fluctuations are expected to be, and conversely what initial ripple in the voltage source is allowed, given a smaller acceptable tolerance on the line charge density.

Barnard, J J

2011-12-21T23:59:59.000Z

180

Onset voltage of corona on coated conductors  

SciTech Connect

This paper is aimed for investigating the effect of surface coating on the positive and negative onset voltages of corona from stressed conductor as a pre-requisite for onset-voltage calculation. The electric field is accurately calculated by the charge simulation technique. The calculated onset voltages agreed satisfactorily with those measured experimentally for bare conductors. The effect of coating-layer thickness and permittivity as well as conductor radius and height on the onset-voltage values is discussed.

Abdel-Salam, M. [Assiut Univ. (Egypt). Electrical Engineering Dept.; Abo-Shal, Y. [SCECO-East, Dammam (Saudi Arabia). Electrical Engineering Div.

1995-12-31T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

182

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

183

Security Policy, Guidance & Reports  

Energy.gov (U.S. Department of Energy (DOE))

Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top priority of the Department of Energys corporate security programs. All Secretarial objectives are supported by a tailored level of security requirements for a wide range of Departmental scientific, research, and national security objectives based on the security significance of their national assets. DOE ensures that Departmental personnel security programs (including the National Nuclear Security Administration [NNSA]) are consistent and effectively implemented.

184

Climate-derived tensions in Arctic security.  

SciTech Connect

Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

Backus, George A.; Strickland, James Hassler

2008-09-01T23:59:59.000Z

185

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 1, 2013 November 1, 2013 PSH-13-0092 - In the Matter of Personnel Security On November 1, 2013, a Hearing Officer issued a Decision in which he determined that an individual's access authorization should not be restored. In reaching this determination, the Hearing Officer found that the individual had not resolved security concerns regarding the Criterion L concerns arising from his lengthy history of financial irresponsibility and his failure to timely comply with an information request regarding his financial status. October 29, 2013 PSH-13-0086 - In the Matter of Personnel Security Hearing On October 29, 2013, an OHA Hearing Officer issued a decision in which he determined that an individual's DOE access authorization should be restored. The Record showed that the individual had two DUIs and that a

186

Information Security Policy Policy Title Information Security Policy  

E-Print Network (OSTI)

Information Security Policy Policy Title Information Security Policy Responsible Executive Vice President of Information Technology and CIO Jay Dominick Responsible Office Office of Information Technology, Operations and Planning Endorsed by Information Security Policy Committee Contact Chief Information Security

Rowley, Clarence W.

187

Deployment-Based security for grid applications  

Science Journals Connector (OSTI)

Increasing complexity of distributed applications and commodity of resources through grids are making harder the task of deploying those applications. There is a clear need for a versatile deployment of distributed applications. In the same time, a security ...

Isabelle Attali; Denis Caromel; Arnaud Contes

2005-05-01T23:59:59.000Z

188

Deployment-Based Security for Grid Applications  

Science Journals Connector (OSTI)

Increasing complexity of distributed applications and commodity of resources through grids are making harder the task of deploying ... distributed applications. In the same time, a security architecture must be a...

Isabelle Attali; Denis Caromel; Arnaud Contes

2005-01-01T23:59:59.000Z

189

Personal Security Assistance for Secure Internet Commerce  

E-Print Network (OSTI)

Jansson Swedish Institute of Computer Science Box 1263, S-164 28 Kista, Sweden ara@sics.se, sverker visiting your computer. Current agent security approaches are often based on trust in an ex- ternal assigned correct access-restrictions. We argue that a more rewarding security policy is to grant

Janson, Sverker

190

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

191

Office of Security Policy  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

192

Office of Information Security  

Energy.gov (U.S. Department of Energy (DOE))

The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

193

Data Security ROCKVILLE, MD  

E-Print Network (OSTI)

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

194

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

195

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

196

Security Scheme in Wireless Grid  

Science Journals Connector (OSTI)

In this paper, we considered the two security services of authorization and data security in wireless Grid. The security issues is related to authorization and security, specific to Grid, the characteristics of t...

Yue Hong Zhang; Li Hao; Zhong Shan Yang

2011-01-01T23:59:59.000Z

197

Personnel Security Program Manual  

Directives, Delegations, and Requirements

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

198

High voltage RF feedthrough bushing  

DOE Patents (OSTI)

Described is a multi-element, high voltage radio frequency bushing for trmitting RF energy to an antenna located in a vacuum container. The bushing includes a center conductor of complex geometrical shape, an outer coaxial shield conductor, and a thin-walled hollow truncated cone insulator disposed between central and outer conductors. The shape of the center conductor, which includes a reverse curvature portion formed of a radially inwardly directed shoulder and a convex portion, controls the uniformity of the axial surface gradient on the insulator cone. The outer shield has a first substantially cylindrical portion and a second radially inwardly extending truncated cone portion.

Grotz, Glenn F. (Huntington Station, NY)

1984-01-01T23:59:59.000Z

199

Control of Analyte Electrolysis in Electrospray Ionization Mass Spectrometry Using Repetitively Pulsed High Voltage  

SciTech Connect

Analyte electrolysis using a repetitively pulsed high voltage ion source was investigated and compared to that using a regular, continuously operating direct current high voltage ion source in electrospray ionization mass spectrometry. The extent of analyte electrolysis was explored as a function of the length and frequency of the high voltage pulse using the model compound reserpine in positive ion mode. Using +5 kV as the maximum high voltage amplitude, reserpine was oxidized to its 2, 4, 6 and 8-electron oxidation products when direct current high voltage was employed. In contrast, when using a pulsed high voltage, oxidation of reserpine was eliminated by employing the appropriate high voltage pulse length and frequency. This effect was caused by inefficient mass transport of the analyte to the electrode surface during the duration of the high voltage pulse and the subsequent relaxation of the emitter electrode/ electrolyte interface during the time period when the high voltage was turned off. This mode of ESI source operation allows for analyte electrolysis to be quickly and simply switched on or off electronically via a change in voltage pulse variables.

Kertesz, Vilmos [ORNL; Van Berkel, Gary J [ORNL

2011-01-01T23:59:59.000Z

200

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Safety, security and safeguard  

Science Journals Connector (OSTI)

Abstract A physical protection system (PPS) integrates people, procedures, and equipment for the protection of assets or facilities against theft, sabotage and terrorist attacks. Therefore, this paper proposes the use of a systematic and measurable approach to the design of PPS and its emphases on the concept of detection, delay and response. The proposed performance based PPS has the capability of defeating adversaries thereby achieving its targets. Therefore, timely detection of intrusion based on the use of sensors, signal lines and alarm systems is a major principle in the proposed system. Also the need for deterrence such as barriers in form of guards, access control, close circuit television (CCTV), strong policy and procedures, then the security culture amongst the facility workers was appropriately discussed. Since nuclear power is considered the only source that can provide large scale electricity with comparatively minimal impact on the environment, the paper also considered base guidelines for the application of PPS in any nuclear and radioactive facilities, followed with the necessity to incorporate inherent safety, security and safeguard (3S) synergy innovation in the physical protection system design and other characteristics that will enhance to reduce the vulnerability of nuclear facilities and materials to theft sabotage and terrorist attacks.

Nasiru Imam Zakariya; M.T.E. Kahn

2015-01-01T23:59:59.000Z

202

Dynamic voltage-current characteristics for a water jet plasma arc  

SciTech Connect

A virtual instrument technology is used to measure arc current, arc voltage, dynamic V-I characteristics, and nonlinear conductance for a cone-shaped water jet plasma arc under ac voltage. Experimental results show that ac arc discharge mainly happens in water vapor evaporated from water when heated. However, due to water's cooling effect and its conductance, arc conductance, reignition voltage, extinguish voltage, and current zero time are very different from those for ac arc discharge in gas work fluid. These can be valuable to further studies on mechanism and characteristics of plasma ac discharge in water, and even in gas work fluid.

Yang Jiaxiang; Lan Sheng; Xu Zuoming [College of Electrical and Electronic Engineering, Harbin University of Science and Technology, Harbin, Heilongjiang 150040 (China)

2008-05-05T23:59:59.000Z

203

NNSA Contributions to the IAEA | National Nuclear Security Administrat...  

National Nuclear Security Administration (NNSA)

of Energy's National Nuclear Security Administration (NNSA) provided a one-time infusion of nearly 50 million to the IAEA for the establishment of an international nuclear...

204

Alarm Response Training | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

On Time: 4:04 min. View an introduction to our Alarm Response Training, which prepares and trains personnel responding to civilian nuclear and radiological security alarms...

205

Securing America's Future Energy April 8, 2011 | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

America's Future Energy an e-mail with attachments of a New York Times article on oil prices. Securing America's Future Energy April 8, 2011 More Documents & Publications...

206

Bright and fast voltage reporters across the visible spectrum via electrochromic FRET (eFRET)  

E-Print Network (OSTI)

We present a palette of brightly fluorescent genetically encoded voltage indicators (GEVIs) with excitation and emission peaks spanning the visible spectrum, sensitivities from 6 - 10% Delta F/F per 100 mV, and half-maximal response times from 1 - 7 ms. A fluorescent protein is fused to an Archaerhodopsin-derived voltage sensor. Voltage-induced shifts in the absorption spectrum of the rhodopsin lead to voltage-dependent nonradiative quenching of the appended fluorescent protein. Through a library screen, we identified linkers and fluorescent protein combinations which reported neuronal action potentials in cultured rat hippocampal neurons with a single-trial signal-to-noise ratio from 6.6 to 11.6 in a 1 kHz imaging bandwidth at modest illumination intensity. The freedom to choose a voltage indicator from an array of colors facilitates multicolor voltage imaging, as well as combination with other optical reporters and optogenetic actuators.

Zou, Peng; Douglass, Adam D; Hochbaum, Daniel R; Brinks, Daan; Werley, Christopher A; Harrison, D Jed; Campbell, Robert E; Cohen, Adam E

2014-01-01T23:59:59.000Z

207

DECENTRALIZED VOLTAGE CONTROL TO MINIMIZE DISTRIBUTION LOSSES IN AN ISLANDED MICROGRID  

E-Print Network (OSTI)

power sources and energy storage systems such as batteries requires new power and voltage control-time voltage control algorithm that minimizes power losses for a microgrid supported by inverter based Microgrids can bring electricity power to rural communities or isolated military forward operation bases

Peng, Huei

208

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

209

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

210

Lockout device for high voltage circuit breaker  

SciTech Connect

An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the respective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.

Kozlowski, L.J.; Shirey, L.A.

1993-01-26T23:59:59.000Z

211

Lockout device for high voltage circuit breaker  

DOE Patents (OSTI)

An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the repsective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.

Kozlowski, Lawrence J. (New Kensington, PA); Shirey, Lawrence A. (North Huntingdon, PA)

1993-01-01T23:59:59.000Z

212

Lookout device for high voltage circuit breaker  

SciTech Connect

An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the respective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.

Kozlowski, L.J.; Shirey, L.A.

1991-12-31T23:59:59.000Z

213

Electrical aging of stator insulation of low voltage rotating machines supplied by inverters  

SciTech Connect

Nowadays, use of inverters for speed variation of low voltage motors becomes more and more usual. The most common technology for this kind of apparatus uses the Pulse Width Modulation (PWM). It is characterized by a square voltage shape with short rise and fall times. In order to insure the quality of turn to ground insulation submitted to these constraints, a study on the aging of Polyethylene terephthalate (Mylar{trademark}) has been undertaken. Influence of rise and fall times, frequency and voltage magnitude has been investigated for time duration up to 1,000 hours. To realize a good voltage application, samples were previously metalized. Two different behaviors according to the rise time and magnitude are observed. For long rise and fall times, changes in the capacity values are obtained although, for smaller rise or fall times, a degradation of the metalized electrode appears. A surface charge generation process is discussed to explain this phenomena.

Bellomo, J.P.; Lebey, T. [Lab. Genie Electrique de Toulouse (France); Oraison, J.M.; Peltier, F. [Leroy-Somer, Angouleme (France)

1996-12-31T23:59:59.000Z

214

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

215

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

216

Definition: Operating Voltage | Open Energy Information  

Open Energy Info (EERE)

Voltage Voltage Jump to: navigation, search Dictionary.png Operating Voltage The voltage level by which an electrical system is designated and to which certain operating characteristics of the system are related; also, the effective (root-mean-square) potential difference between any two conductors or between a conductor and the ground. The actual voltage of the circuit may vary somewhat above or below this value.[1] Related Terms system References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Operating_Voltage&oldid=480559" Categories: Definitions ISGAN Definitions What links here Related changes

217

Wind Power Plant Voltage Stability Evaluation: Preprint  

SciTech Connect

Voltage stability refers to the ability of a power system to maintain steady voltages at all buses in the system after being subjected to a disturbance from a given initial operating condition. Voltage stability depends on a power system's ability to maintain and/or restore equilibrium between load demand and supply. Instability that may result occurs in the form of a progressive fall or rise of voltages of some buses. Possible outcomes of voltage instability are the loss of load in an area or tripped transmission lines and other elements by their protective systems, which may lead to cascading outages. The loss of synchronism of some generators may result from these outages or from operating conditions that violate a synchronous generator's field current limit, or in the case of variable speed wind turbine generator, the current limits of power switches. This paper investigates the impact of wind power plants on power system voltage stability by using synchrophasor measurements.

Muljadi, E.; Zhang, Y. C.

2014-09-01T23:59:59.000Z

218

High voltage load resistor array  

DOE Patents (OSTI)

A high voltage resistor comprising an array of a plurality of parallel electrically connected resistor elements each containing a resistive solution, attached at each end thereof to an end plate, and about the circumference of each of the end plates, a corona reduction ring. Each of the resistor elements comprises an insulating tube having an electrode inserted into each end thereof and held in position by one or more hose clamps about the outer periphery of the insulating tube. According to a preferred embodiment, the electrode is fabricated from stainless steel and has a mushroom shape at one end, that inserted into the tube, and a flat end for engagement with the end plates that provides connection of the resistor array and with a load.

Lehmann, Monty Ray (Smithfield, VA)

2005-01-18T23:59:59.000Z

219

Security problem on arbitrated quantum signature schemes  

SciTech Connect

Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

2011-12-15T23:59:59.000Z

220

Fiber-optic voltage sensor with cladded fiber and evanescent wave variation detection  

DOE Patents (OSTI)

A fiber optic voltage sensor is described which includes a source of light, a reference fiber for receiving a known percentage of the light and an electrostrictive element having terminals across which is applied, a voltage to be measured. The electrostrictive element is responsive to the applied voltage to assume an altered physical state. A measuring fiber also receives a known percentage of light from the light source and is secured about the electrostrictive element. The measuring fiber is provided with a cladding and exhibits an evanescent wave in the cladding. The measuring fiber has a known length which is altered when the electrostrictive element assumes its altered physical state. A differential sensor is provided which senses the intensity of light in both the reference fiber and the measuring fiber and provides an output indicative of the difference between the intensities. 3 figs.

Wood, C.B.

1992-12-15T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Fiber-optic voltage sensor with cladded fiber and evanescent wave variation detection  

DOE Patents (OSTI)

A fiber optic voltage sensor is described which includes a source of light, a reference fiber for receiving a known percentage of the light and an electrostrictive element having terminals across which is applied, a voltage to be measured. The electrostrictive element is responsive to the applied voltage to assume an altered physical state. A measuring fiber also receives a known percentage of light from the light source and is secured about the electrostrictive element. The measuring fiber is provided with a cladding and exhibits an evanescent wave in the cladding. The measuring fiber has a known length which is altered when the electrostrictive element assumes its altered physical state. A differential sensor is provided which senses the intensity of light in both the reference fiber and the measuring fiber and provides an output indicative of the difference between the intensities.

Wood, Charles B. (Lakewood, CO)

1992-01-01T23:59:59.000Z

222

Group 3: Humidity, Temperature, and Voltage (Presentation)  

SciTech Connect

Group 3 is chartered to develop accelerated stress tests that can be used as comparative predictors of module lifetime versus stresses associated with humidity, temperature and voltage.

Wohlgemuth, J.

2013-05-01T23:59:59.000Z

223

High Voltage Electrolyte for Lithium Batteries  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

battery using high voltage high energy cathode materials to enable large-scale, cost competitive production of the next generation of electric-drive vehicles. To...

224

Secure upgrade of hardware security modules in bank networks  

Science Journals Connector (OSTI)

We study the secure upgrade of critical components in wide networked systems, focussing on the case study of PIN processing Hardware Security Modules (HSMs). These tamper-resistant devices, used by banks to securely transmit and verify the PIN typed ... Keywords: PIN processing, hardware security modules, security APIs, upgrade strategies

Riccardo Focardi; Flaminia L. Luccio

2010-03-01T23:59:59.000Z

225

National Nuclear Security Administration | Department of Energy  

Office of Environmental Management (EM)

National Nuclear Security Administration National Nuclear Security Administration National Nuclear Security Administration More Documents & Publications Global Threat Reduction...

226

Waste Isolation Pilot Plant Transportation Security | Department...  

Office of Environmental Management (EM)

Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security Waste Isolation Pilot Plant Transportation Security More Documents &...

227

SECURITY TERMINATION STATEMENT | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

228

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

229

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

230

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

231

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

232

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

233

Operational Security (OPSEC) Reminder | Department of Energy  

Office of Environmental Management (EM)

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

234

US, UK, Kazakhstan Secure Radiological Transportation Vehicles...  

National Nuclear Security Administration (NNSA)

place them in secure storage, and improve radiological transportation security and site security. The United Kingdom-funded projects provide an immediate security and safety...

235

College of Safety & Security | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Safety & Security College of Safety & Security College of Safety & Security Mission Through the National Training Center (NTC), the Office of Health, Safety and Security (HSS)...

236

Office of Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Office of Security Mission The Office of Security maintains the Department of Energy's security integrity through the development and promulgation of safeguards and...

237

Safeguards and Security Program - DOE Directives, Delegations...  

NLE Websites -- All DOE Office Websites (Extended Search)

70.1A, Safeguards and Security Program by jcowden Functional areas: Safeguards, Security, and Emergency Management, Safety and Security The Safeguards and Security Program ensures...

238

Office of Security Enforcement | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Enforcement Office of Security Enforcement MISSION The Office of Security Enforcement implements the Department's classified information security enforcement program in...

239

Industrial Security Specialst  

Energy.gov (U.S. Department of Energy (DOE))

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

240

Energy Security Initiatives Update  

Energy.gov (U.S. Department of Energy (DOE))

Presentationgiven at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meetinglists Federal government energy security initiatives.

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Industrial and Grid Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Industrial and Grid Security Establishing resilient infrastructures that operate when sensors and physical assets are perturbed is an important national objective. Two related LDRD...

242

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

University of California Extend Management Contracts For Defense Labs The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of...

243

Securing Cloud Storage Service.  

E-Print Network (OSTI)

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

244

Cyber Security Architecture Guidelines  

Directives, Delegations, and Requirements

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

245

TEC Information Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

246

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

247

Fuzzy Control on Voltage/Reactive Power in Electric Power Substation  

Science Journals Connector (OSTI)

A fuzzy method using in voltage and reactive power control in electric substation is proposed based on the improved 17 ... times at the tap positions of transformers in substation are much less than usual. So,...

Xiu-hua Wu; Jun-cheng Wang; Ping Yang

2009-01-01T23:59:59.000Z

248

Current mode integrators and their applications in low-voltage high frequency CMOS signal processing  

E-Print Network (OSTI)

Low voltage CMOS fully differential integrators for high frequency continuous-time filters using current-mode techniques are presented.. Current mode techniques are employed to avoid the use of the floating differential pair, in order to achieve...

Smith, Sterling Lane

2012-06-07T23:59:59.000Z

249

DESIGN AND IMPLEMENTATION OF A FUZZY LOGIC-BASED VOLTAGE CONTROLLER FOR VOLTAGE REGULATION  

E-Print Network (OSTI)

1 DESIGN AND IMPLEMENTATION OF A FUZZY LOGIC-BASED VOLTAGE CONTROLLER FOR VOLTAGE REGULATION In this paper the design and implementation of a fuzzy logic-based controller is described for regulating the output voltage of a synchronous generator. An automated fuzzy logic-based control strategy is presented

LaMeres, Brock J.

250

Development of High Voltage Electron Microscope  

Science Journals Connector (OSTI)

......Cockcroft Walton Type High Voltage Generator. O Power Line O Fig. 4...pressure in the tank to the atmospheric pressure by removing freon...pump using liquid nitrogen. Water buffer and liquid nitrogen...base plate of high voltage generator. Four poles stand on this......

Shinjiro KATAGIRI; Hirokazu KIMURA; Susumu OZASA; Kazumi SHIRAISHI

1969-01-01T23:59:59.000Z

251

Voltage regulation in linear induction accelerators  

DOE Patents (OSTI)

Improvement in voltage regulation in a Linear Induction Accelerator wherein a varistor, such as a metal oxide varistor, is placed in parallel with the beam accelerating cavity and the magnetic core. The non-linear properties of the varistor result in a more stable voltage across the beam accelerating cavity than with a conventional compensating resistance.

Parsons, William M. (Santa Fe, NM)

1992-01-01T23:59:59.000Z

252

Voltage regulation in linear induction accelerators  

DOE Patents (OSTI)

Improvement in voltage regulation in a linear induction accelerator wherein a varistor, such as a metal oxide varistor, is placed in parallel with the beam accelerating cavity and the magnetic core is disclosed. The non-linear properties of the varistor result in a more stable voltage across the beam accelerating cavity than with a conventional compensating resistance. 4 figs.

Parsons, W.M.

1992-12-29T23:59:59.000Z

253

2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

254

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

255

NREL: Measurements and Characterization - Current Versus Voltage  

NLE Websites -- All DOE Office Websites (Extended Search)

Current Versus Voltage Current Versus Voltage The National Renewable Energy Laboratory (NREL) Device Performance group uses current versus voltage (I-V) measurement systems to assess the main performance parameters for photovoltaic (PV) cells and modules. I-V measurement systems determine the output performance of devices, including: open-circuit voltage (Voc), short-circuit current (Isc), fill factor (FF), maximum power output of the device (Pmax), voltage at maximum power (Vmax), current at maximum power (Imax), and conversion efficiency of the device (η). Some I-V systems may also be used to perform dark I-V measurements to determine diode properties and series and shunt resistances. We use three I-V systems to measure performance of individual PV cells; and four for modules - two for measurements under simulated conditions; and

256

High Voltage Safety Act | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Voltage Safety Act High Voltage Safety Act High Voltage Safety Act < Back Eligibility Commercial Construction Developer General Public/Consumer Industrial Installer/Contractor Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Georgia Program Type Safety and Operational Guidelines Siting and Permitting The purpose of the High Voltage Safety Act is to prevent injury to persons and property and interruptions of utility service resulting from accidental or inadvertent contact with high-voltage electric lines by providing that no work shall be done in the vicinity of such lines unless and until the owner or operator thereof has been notified of such work and has taken the appropriate safety measures. The Georgia Public Service Commission requires

257

Non-contact current and voltage sensor  

DOE Patents (OSTI)

A detachable current and voltage sensor provides an isolated and convenient device to measure current passing through a conductor such as an AC branch circuit wire, as well as providing an indication of an electrostatic potential on the wire, which can be used to indicate the phase of the voltage on the wire, and optionally a magnitude of the voltage. The device includes a housing that contains the current and voltage sensors, which may be a ferrite cylinder with a hall effect sensor disposed in a gap along the circumference to measure current, or alternative a winding provided through the cylinder along its axis and a capacitive plate or wire disposed adjacent to, or within, the ferrite cylinder to provide the indication of the voltage.

Carpenter, Gary D; El-Essawy, Wael; Ferreira, Alexandre Peixoto; Keller, Thomas Walter; Rubio, Juan C; Schappert, Michael A

2014-03-25T23:59:59.000Z

258

Low Beam Voltage, 10 MW, L-Band Cluster Klystron  

SciTech Connect

Conceptual design of a multi-beam klystron (MBK) for possible ILC and Project X applications is presented. The chief distinction between this MBK design and existing 10-MW MBK's is the low operating voltage of 60 kV. There are at least four compelling reasons that justify development at this time of a low-voltage MBK, namely (1) no pulse transformer; (2) no oil tank for high-voltage components and for the tube socket; (3) no high-voltage cables; and (4) modulator would be a compact 60-kV IGBT switching circuit. The proposed klystron consists of four clusters containing six beams each. The tube has common input and output cavities for all 24 beams, and individual gain cavities for each cluster. A closely related optional configuration, also for a 10 MW tube, would involve four totally independent cavity clusters with four independent input cavities and four 2.5 MW output ports, all within a common magnetic circuit. This option has appeal because the output waveguides would not require a controlled atmosphere, and because it would be easier to achieve phase and amplitude stability as required in individual SC accelerator cavities.

Teryaev, V.; /Novosibirsk, IYF; Yakovlev, V.P.; /Fermilab; Kazakov, S.; /KEK, Tsukuba; Hirshfield, J.L.; /Yale U. /Omega-P, New Haven

2009-05-01T23:59:59.000Z

259

Analysis of Lightning-induced Voltages in Overhead Transmission Lines  

Science Journals Connector (OSTI)

Abstract In this work we study the coupling of lightning induced voltages in Overhead Transmission Lines .The study is led directly in the time domain with hold in account the effect of a finite conductivity of the soil. After discretization by the method so-called FDTD (Finite Difference Time Domain) of the lines equations excited by a lightning wave and the application in every node of the network in current and voltage, we deduct a equations system, of which the resolution permits us to deduct the induced electric quantities in every node of the network. In order to confirm our theoretical work, we present a set of applications that allows validating this study.

Mostefa. Boumaiza; Djamel. Labed

2014-01-01T23:59:59.000Z

260

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Departmental Cyber Security Management Policy  

Directives, Delegations, and Requirements

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

262

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

OVERVIEW OVERVIEW SPECIAL MESSAGE Please refer to this website each time you need to generate a required form. This will ensure that you are using the most recent version of the form. Do not download the form and save on place it on your hard drive. Proper Completion of Security Termination Statements: When completing Security Termination Statements for submittal to DOE, please ensure the reason for termination is clear and provides the reason(s) for termination. This will allow DOE to make any necessary determinations that may affect clearance eligibility. For example, simply including "terminated" or "for cause" does not provide enough information to DOE for processing. Please direct questions to Joanne Trujillo at 284-2554 or jmtruji@sandia.gov in NM and Carol James 294-2061or cdjames@sandia.gov in CA.

263

Safeguards and Security Program  

Directives, Delegations, and Requirements

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

264

Information Security Program  

Directives, Delegations, and Requirements

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

265

Incidents of Security Concern  

SciTech Connect

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

266

Information Security Program  

Directives, Delegations, and Requirements

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

267

Determination of the inductance of imploding wire array Z-pinches using measurements of load voltage  

SciTech Connect

The inductance of imploding cylindrical wire array z-pinches has been determined from measurements of load voltage and current. A thorough analysis method is presented that explains how the load voltage of interest is found from raw signals obtained using a resistive voltage divider. This method is applied to voltage data obtained during z-pinch experiments carried out on the MAGPIE facility (1.4 MA, 240 ns rise-time) in order to calculate the load inductance and thereafter the radial trajectory of the effective current sheath during the snowplough implosion. Voltage and current are monitored very close to the load, allowing these calculations to be carried out without the need for circuit modelling. Measurements give a convergence ratio for the current of between 3.1 and 5.7 at stagnation of the pinch.

Burdiak, G. C.; Lebedev, S. V.; Hall, G. N.; Harvey-Thompson, A. J.; Suzuki-Vidal, F.; Swadling, G. F.; Khoory, E.; Pickworth, L.; Bland, S. N.; Grouchy, P. de; Skidmore, J. [Blackett Laboratory, Imperial College, London SW7 2BW (United Kingdom)

2013-03-15T23:59:59.000Z

268

Variable Voltage Substation Electric Fire and Emergency Response  

Energy.gov (U.S. Department of Energy (DOE))

Variable Voltage Substation Electric Fire and Emergency Response My question is from an emergency response perspective. You stated that it took ~ for electricians to de-energize the electrical components before firefighters were allowed in to fight the fire. This delay causes more damage to equipment and potential propagation of the fire. Is there not a master breaker or switch? Youve brought up a very good point. It gave me a good opportunity to discuss this with our Facilities Department and get a better understanding of the infrastructure upgrade plans. The direct answer to your question is Yes, but Yes, there are master breakers and switches, but we cant control them remotely. SLACs AC electrical distribution system at present is manual breakers we have not installed the infrastructure to remotely control them (except see below). We recently underwent an upgrade to our Master Substation that will allow us to remotely control some high voltage breakers in the future, but we arent there yet. We do recognize the value in having this capability (and more importantly, our vulnerability in NOT having it), and have begun the preliminary planning to make this happen. One issue were are working on is cyber security for the power distribution networked infrastructure. Before we install the capability to remotely control the main electrical breakers, we are planning the infrastructure with our Information Technologies organization to ensure we have a robust secure network that is protected from unauthorized access. Once the cyber security issues are addressed and funded, were probably 5-10 years out from having remote operation capability due to limited resources to fund and install the infrastructure. Having said the above, we do have the capability of remotely opening the VVS Secondary Main Breakers the ones that send power to the modulator distribution breakers - from our control room. Those breakers are integral parts of our safety systems in that interlock violation causes the breakers to open and remove power to the klystrons. But everything else is manual only. That remote operation capability would not have helped us in this case, as the VVS Secondary Main Breaker was the one that fried. We needed to open the breaker upstream of the VVS. Thanks for your interest. Let me know if I can provide further information.

269

Standards for secure data sharing across organizations  

Science Journals Connector (OSTI)

This paper discusses standards-based approaches for secure data sharing across organizations. In particular, current standards as well as standardization trends for data integration, multimedia data management, active real-time data management, data ... Keywords: Data sharing, Real-time data management, Standards-based approaches

Douglas Harris; Latifur Khan; Raymond Paul; Bhavani Thuraisingham

2007-01-01T23:59:59.000Z

270

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

271

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

272

International Nuclear Security  

SciTech Connect

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

273

Fiber optic current monitor for high-voltage applications  

DOE Patents (OSTI)

A current monitor which derives its power from the conductor being measured for bidirectionally measuring the magnitude of current (from DC to above 50 khz) flowing through a conductor across which a relatively high level DC voltage is applied, includes a pair of identical transmitter modules connected in opposite polarity to one another in series with the conductor being monitored, for producing from one module a first light signal having an intensity directly proportional to the magnitude of current flowing in one direction through the conductor during one period of time, and from the other module a second light signal having an intensity directly proportional to the magnitude of current flowing in the opposite direction through the conductor during another period of time, and a receiver located in a safe area remote from the high voltage area for receiving the first and second light signals, and converting the same to first and second voltage signals having levels indicative of the magnitude of current being measured at a given time.

Renda, George F. (Plainsboro, NJ)

1992-01-01T23:59:59.000Z

274

Office of Security Operations: Headquarters Security Officers (HSO) Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

275

Electro-optical voltage sensor head  

DOE Patents (OSTI)

A miniature electro-optic voltage sensor system capable of accurate operation at high voltages. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam's polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured.

Woods, Gregory K. (Idaho Falls, ID)

1998-01-01T23:59:59.000Z

276

Detecting and Mitigating Security Risks  

E-Print Network (OSTI)

______________________________________________________________________________________________________ 2 Introduction IT security threats are multiplying quickly. One reason is that sophisticated hacking. Second, while hacking once largely constituted an intellectual exercise for security enthusiasts, hacking

Fisher, Kathleen

277

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network (OSTI)

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

278

Energy Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

279

January 2007 SECURITY CONTROLS FOR  

E-Print Network (OSTI)

for their information systems. Security controls are the management, operational, and technical safeguards for their information systems. Security controls are the management, operational, and technical safeguards

280

Headquarters Facilities Master Security Plan  

Office of Environmental Management (EM)

Chapter 10-1 Chapter 10 Security Awareness Program This chapter describes the DOE HQ Security Awareness Program. It implements the requirements of: Title 32, CFR, Part 2001,...

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Security and Privacy Notices | NREL  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notices Security Notice This Web site is part of a Federal computer system used to accomplish Federal functions. The National Renewable Energy Laboratory...

282

Security Suites | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

283

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

SNL SECURITY CONTACTS SNLNM Contacts SNLCA Contacts Function Contact Email Telephone Badge Office 505-284-3626 - Escorting security@sandia.gov 505-845-1321 Classification...

284

Chapter_14_Cyber_Security  

Office of Environmental Management (EM)

4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain...

285

Best Practices for the Security of Radioactive Materials  

SciTech Connect

This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.

Coulter, D.T.; Musolino, S.

2009-05-01T23:59:59.000Z

286

Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systems  

Science Journals Connector (OSTI)

The specification of security requirements for systems of systems is often an activity that is forced upon non-security experts and performed under time pressure. This paper describes how we have addressed this p...

Albin Zuccato; Nils Daniels; Cheevarat Jampathom

2010-01-01T23:59:59.000Z

287

Technical and Economic Potentials of Biomass until 2050: Regional Relevance for Energy Security  

Science Journals Connector (OSTI)

Rapidly developing international bio energy trade may develop over time into a commodity market which can secure supply and demand in a sustainable way; sustainability being a key factor for long-term security.

Andr P.C. Faaij

2009-01-01T23:59:59.000Z

288

Security Driven Scheduling Model for Computational Grid Using NSGA-II  

Science Journals Connector (OSTI)

Number of software applications demands various levels of security at the time of scheduling in Computational Grid. Grid may offer these securities but may result in the performance degradation due to overhead in...

Rekha Kashyap; Deo Prakash Vidyarthi

2013-12-01T23:59:59.000Z

289

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

290

Researchers map atomic movements that trigger voltage fade in...  

NLE Websites -- All DOE Office Websites (Extended Search)

map atomic movements that trigger voltage fade in high-energy-density batteries January 22, 2015 Voltage and capacity curves from an LMR-NMC high-energy cathode show voltage fade...

291

Property:Nominal Voltage | Open Energy Information  

Open Energy Info (EERE)

Nominal Voltage Nominal Voltage Jump to: navigation, search Property Name Nominal Voltage Property Type Number This is a property of type Number. Pages using the property "Nominal Voltage" Showing 22 pages using this property. D Distributed Generation Study/10 West 66th Street Corp + 480 + Distributed Generation Study/615 kW Waukesha Packaged System + 480 + Distributed Generation Study/Aisin Seiki G60 at Hooligans Bar and Grille + 240 + Distributed Generation Study/Arrow Linen + 480 + Distributed Generation Study/Dakota Station (Minnegasco) + 0 + Distributed Generation Study/Elgin Community College + 4,160 + Distributed Generation Study/Emerling Farm + 480 + Distributed Generation Study/Floyd Bennett + 480 + Distributed Generation Study/Harbec Plastics + 480 +

292

Low voltage arc formation in railguns  

DOE Patents (OSTI)

A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile.

Hawke, R.S.

1985-08-05T23:59:59.000Z

293

Low voltage arc formation in railguns  

DOE Patents (OSTI)

A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile. 2 figs.

Hawke, R.S.

1987-11-17T23:59:59.000Z

294

Low voltage arc formation in railguns  

DOE Patents (OSTI)

A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile.

Hawke, Ronald S. (Livermore, CA)

1987-01-01T23:59:59.000Z

295

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

296

Modular high voltage power supply for chemical analysis  

DOE Patents (OSTI)

A high voltage power supply for use in a system such as a microfluidics system, uses a DC-DC converter in parallel with a voltage-controlled resistor. A feedback circuit provides a control signal for the DC-DC converter and voltage-controlled resistor so as to regulate the output voltage of the high voltage power supply, as well as, to sink or source current from the high voltage supply.

Stamps, James F. (Livermore, CA); Yee, Daniel D. (Dublin, CA)

2010-05-04T23:59:59.000Z

297

2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

298

2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

299

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

300

Constant voltage electro-slag remelting control  

DOE Patents (OSTI)

A system for controlling electrode gap in an electro-slag remelt furnace has a constant regulated voltage and an electrode which is fed into the slag pool at a constant rate. The impedance of the circuit through the slag pool is directly proportional to the gap distance. Because of the constant voltage, the system current changes are inversely proportional to changes in gap. This negative feedback causes the gap to remain stable. 1 fig.

Schlienger, M.E.

1996-10-22T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Transmission Line Security Monitor: Final Report  

SciTech Connect

The Electric Power Transmission Line Security Monitor System Operational Test is a project funded by the Technical Support Working Group (TSWG). TSWG operates under the Combating Terrorism Technical Support Office that functions under the Department of Defense. The Transmission Line Security Monitor System is based on technology developed by Idaho National Laboratory. The technology provides a means for real-time monitoring of physical threats and/or damage to electrical transmission line towers and conductors as well as providing operational parameters to transmission line operators to optimize transmission line operation. The end use is for monitoring long stretches of transmission lines that deliver electrical power from remote generating stations to cities and industry. These transmission lines are generally located in remote transmission line corridors where security infrastructure may not exist. Security and operational sensors in the sensor platform on the conductors take power from the transmission line and relay security and operational information to operations personnel hundreds of miles away without relying on existing infrastructure. Initiated on May 25, 2007, this project resulted in pre-production units tested in realistic operational environments during 2010. A technology licensee, Lindsey Manufacturing of Azusa California, is assisting in design, testing, and ultimately production. The platform was originally designed for a security monitoring mission, but it has been enhanced to include important operational features desired by electrical utilities.

John Svoboda

2011-04-01T23:59:59.000Z

302

Vehicle Technologies Office Merit Review 2014: High-Voltage Solid...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High-Voltage Solid Polymer Batteries for Electric Drive Vehicles Vehicle Technologies Office Merit Review 2014: High-Voltage Solid Polymer Batteries for Electric Drive Vehicles...

303

High-Voltage Solid Polymer Batteries for Electric Drive Vehicles...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High-Voltage Solid Polymer Batteries for Electric Drive Vehicles High-Voltage Solid Polymer Batteries for Electric Drive Vehicles 2013 DOE Hydrogen and Fuel Cells Program and...

304

High-Voltage Solid Polymer Batteries for Electric Drive Vehicles...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

High-Voltage Solid Polymer Batteries for Electric Drive Vehicles High-Voltage Solid Polymer Batteries for Electric Drive Vehicles 2012 DOE Hydrogen and Fuel Cells Program and...

305

Cathode Synthesis and Voltage Fade: Designed Solutions Based...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Cathode Synthesis and Voltage Fade: Designed Solutions Based on Theory Cathode Synthesis and Voltage Fade: Designed Solutions Based on Theory 2013 DOE Hydrogen and Fuel Cells...

306

Optimal Voltage Control of the Southern Norwegian Power Grid.  

E-Print Network (OSTI)

??This thesis contains the synthesis, analysis and simulation results of an automatic optimal voltage controller for the Southern Norwegian power grid. Currently the high voltage (more)

Hannisdal, Erik Lundegaard

2011-01-01T23:59:59.000Z

307

Addressing the Voltage Fade Issue with Lithium-Manganese-Rich...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Addressing the Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials Addressing the Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials 2013 DOE...

308

High voltage overhead long transmission line design and fault analysis.  

E-Print Network (OSTI)

??The goal of this project is to design a reliable high voltage overhead long transmission line that satisfies specific design criteria including voltage regulation, efficiency, (more)

Elzain, Mohamed Ali

2011-01-01T23:59:59.000Z

309

Office of Headquarters Security Operations | Department of Energy  

Office of Environmental Management (EM)

Headquarters Security Operations Office of Headquarters Security Operations Mission The Office of Headquarters Security Operations strengthens national security by protecting...

310

Headquarters Security Quick Reference Book  

Energy.gov (U.S. Department of Energy (DOE))

This quick reference book provides an overview of Department of Energy (DOE) Headquarters (HQ) security programs.

311

November 2003 NETWORK SECURITY TESTING  

E-Print Network (OSTI)

November 2003 NETWORK SECURITY TESTING Shirley M. Radack, Editor, Computer Security Division be tempted to neglect or insufficiently develop a comprehensive and systematic opera tional security testing program. This guide stresses the need for an effective security testing program within federal agencies

312

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network (OSTI)

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

313

National Security, Weapons Science  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

314

Safeguards and Security Program  

Directives, Delegations, and Requirements

The order establishes responsibilities and program planning and management requirements for the Safeguards and Security Program. Admin Chg 1, dated 2-15-13, cancels DOE O 470.4B.

2011-07-21T23:59:59.000Z

315

Safeguards and Security Program  

Directives, Delegations, and Requirements

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

316

Operations Security Program  

Directives, Delegations, and Requirements

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

317

Energy Security Through Hydrogen  

Science Journals Connector (OSTI)

Energy and environmental security are major problems facing our global economy. Fossil fuels, particularly crude oil, are ... energy sources. In the long term, a hydrogen-based economy will have an impact on all ...

Professor John W. Sheffield

2007-01-01T23:59:59.000Z

318

GRID Security Review  

Science Journals Connector (OSTI)

A Computational GRID is a collection of heterogeneous computing resources ... computational power of current micro-processors, Computational GRIDs or meta-systems have gradually become more ... a secure environme...

Lazaros Gymnopoulos; Stelios Dritsas; Stefanos Gritzalis

2003-01-01T23:59:59.000Z

319

Safeguards and Security Program  

Directives, Delegations, and Requirements

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

320

defense nuclear security  

National Nuclear Security Administration (NNSA)

3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

Page...

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Nuclear Energy & Energy Security  

Science Journals Connector (OSTI)

Safety issues related to use of nuclear energy and secure operation of nuclear installations are mail stones of great importance. Although none of technologies producing energy are absolutely safe it is obvious t...

Jumber Mamasakhlisi

2010-01-01T23:59:59.000Z

322

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

323

Principal Associate Director - Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

324

Nevada National Security Site - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

325

National Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

326

Framework for SCADA Security Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

327

Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

328

Securing Infrastructure from High Explosive Threats  

SciTech Connect

Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

2009-03-20T23:59:59.000Z

329

V-196: Microsoft Security Bulletin Advance Notification for July 2013  

Energy.gov (U.S. Department of Energy (DOE))

Microsoft Security Bulletin Advance Notification for July 2013. Microsoft has posted 6 Critical Bulletin and 1 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" July allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on July 10, 2013, at 11:00 AM Pacific Time (US & Canada).

330

Security systems engineering overview  

SciTech Connect

Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

Steele, B.J.

1996-12-31T23:59:59.000Z

331

U-078: Microsoft Security Bulletin Advance Notification for January 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

78: Microsoft Security Bulletin Advance Notification for January 78: Microsoft Security Bulletin Advance Notification for January 2012 U-078: Microsoft Security Bulletin Advance Notification for January 2012 January 10, 2012 - 8:15am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for January 2012. PLATFORM: Windows Server 2008 R2, Windows 7, Windows Server 2008, Windows Vista, Windows Server 2003, Windows XP ABSTRACT: Microsoft Security Bulletin Advance Notification for January 2012. Microsoft has posted 1 Critical Bulletins and 6 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow propagation of Internet worm without user action. Microsoft will host a webcast to address customer questions on the security bulletins on January 11, 2012, at 11:00 AM Pacific Time (US & Canada).

332

National Strategy to Secure Cyberspace (February 2003) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strategy to Secure Cyberspace (February 2003) Strategy to Secure Cyberspace (February 2003) National Strategy to Secure Cyberspace (February 2003) The National Strategy to Secure Cyberspace outlines an initial framework for both organizing and prioritizing efforts. It provides direction to the federal government departments and agencies that have roles in cyberspace security. It also identifies steps that state and local governments, private companies and organizations, and individual Americans can take to improve our collective cybersecurity. The Strategy highlights the role of public-private engagement. The document provides a framework for the contributions that we all can make to secure our parts of cyberspace. The dynamics of cyberspace will require adjustments and amendments to the Strategy over time.

333

U-057: Microsoft Security Bulletin Advance Notification for December 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Microsoft Security Bulletin Advance Notification for 57: Microsoft Security Bulletin Advance Notification for December 2011 U-057: Microsoft Security Bulletin Advance Notification for December 2011 December 9, 2011 - 12:00pm Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for December 2011. PLATFORM: Windows Server 2008 R2, Windows 7, Windows Server 2008, Windows Vista, Windows Server 2003, Windows XP ABSTRACT: Microsoft Security Bulletin Advance Notification for December 2011. Microsoft has posted 3 Critical Bulletins and 11 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow propagation of Internet worm without user action. Microsoft will host a webcast to address customer questions on the security bulletins on December 14, 2011, at 11:00 AM Pacific Time (US & Canada).

334

Argonne Team Challenges Physical Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

335

Lemnos Interoperable Security Program  

SciTech Connect

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

336

Sacramento Area Voltage Support Draft Environmental Impact Statement  

SciTech Connect

The Western Area Power Administration's Central Valley Project transmission system forms an integral part of the interconnected Sacramento area transmission grid. Western is contractually responsible to oversee that the system is operated in accordance with strict reliability standards. Growth in the greater Sacramento, California area and power imported from generation outside the region, have increased the demand on the interconnected electric transmission system, leading to transmission system overloads and reducing the reliability and security of the area power system. Western has prepared this Sacramento Area Voltage Support (SVS) Draft Environmental Impact Statement (EIS) in compliance with Federal laws, regulations and guidelines, principally the ''National Environmental Policy Act'' (NEPA). This Draft EIS evaluates the potential environmental effects of physical improvements to the area's power system. Enhancements are needed to improve system reliability and provide voltage support for the Sacramento area. The results of public scoping meetings, workshops, meetings with agencies, and earlier studies by Western and area utilities helped to develop a range of alternatives for analysis. The Proposed Action involves: Constructing a new double-circuit, 230-kV transmission line paralleling the existing double-circuit, 230-kV line from the O'Banion Substation to the Elverta Substation; Realigning a portion of the existing Cottonwood-Roseville single-circuit, 230-kV transmission line north of Elverta Substation; and Reconductoring the existing double-circuit, 230-kV transmission line from the Elverta Substation to the Tracy Substation. Public Hearings on the Draft EIS will be held between December 9-12, 2002. Comments on this Draft EIS are encouraged and should be sent to Ms. Loreen McMahon (above). Comments must be received by December 30, 2002.

N /A

2002-11-15T23:59:59.000Z

337

Sacramento Area Voltage Support Final Environmental Impact Statement  

SciTech Connect

The Western Area Power Administration's Central Valley Project transmission system forms an integral part of the interconnected Sacramento area transmission grid. Western is contractually responsible to oversee that the system is operated in accordance with strict reliability standards. Growth in the greater Sacramento, California area and power imported from generation outside the region, have increased the demand on the interconnected electric transmission system, leading to transmission system overloads and reducing the reliability and security of the area power system. Western has prepared this Sacramento Area Voltage Support (SVS) Draft Environmental Impact Statement (EIS) in compliance with Federal laws, regulations and guidelines, principally the National Environmental Policy Act (NEPA). This Draft EIS evaluates the potential environmental effects of physical improvements to the area's power system. Enhancements are needed to improve system reliability and provide voltage support for the Sacramento area. The results of public scoping meetings, workshops, meetings with agencies, and earlier studies by Western and area utilities helped to develop a range of alternatives for analysis. The Proposed Action involves: (1) Constructing a new double-circuit, 230-kV transmission line paralleling the existing double-circuit, 230-kV line from the O'Banion Substation to the Elverta Substation; (2) Realigning a portion of the existing Cottonwood-Roseville single-circuit, 230-kV transmission line north of Elverta Substation; and (3) Reconductoring the existing double-circuit, 230-kV transmission line from the Elverta Substation to the Tracy Substation. Public Hearings on the Draft EIS will be held between December 9-12, 2002. Comments on this Draft EIS are encouraged and should be sent to Ms. Loreen McMahon (above). Comments must be received by December 30, 2002.

N /A

2003-09-19T23:59:59.000Z

338

Security, trust, and QoS in next-generation control and communication for large power systems  

Science Journals Connector (OSTI)

The present communication architecture supporting control of the electric power grid makes it difficult to use the wealth of data collected at high rates in substations, retarding their use in new applications for controlling the grid. A flexible, real-time data network would make it possible to use these data for many more control and protection applications, potentially increasing the grid's reliability and increasing its operating efficiency. Applications that could use these data include: decentralised load frequency control; closed-loop voltage control; transient and small-signal stabilisation; and special protection schemes using data gathered over a wide area. Such applications and the flexibility of the underlying communication network imply greater data sharing between utilities, leading to new performance, availability and reliability requirements. This paper examines the security, trust and Quality of Service (QoS) requirements imposed by these applications and shows how they are met by mechanisms included in the GridStat middleware framework that we are developing.

Carl H. Hauser; David E. Bakken; Ioanna Dionysiou; K. Harald Gjermundrod; Venkata S. Irava; Joel Helkey; Anjan Bose

2008-01-01T23:59:59.000Z

339

Thermally-induced voltage alteration for integrated circuit analysis  

DOE Patents (OSTI)

A thermally-induced voltage alteration (TIVA) apparatus and method are disclosed for analyzing an integrated circuit (IC) either from a device side of the IC or through the IC substrate to locate any open-circuit or short-circuit defects therein. The TIVA apparatus uses constant-current biasing of the IC while scanning a focused laser beam over electrical conductors (i.e. a patterned metallization) in the IC to produce localized heating of the conductors. This localized heating produces a thermoelectric potential due to the Seebeck effect in any conductors with open-circuit defects and a resistance change in any conductors with short-circuit defects, both of which alter the power demand by the IC and thereby change the voltage of a source or power supply providing the constant-current biasing. By measuring the change in the supply voltage and the position of the focused and scanned laser beam over time, any open-circuit or short-circuit defects in the IC can be located and imaged. The TIVA apparatus can be formed in part from a scanning optical microscope, and has applications for qualification testing or failure analysis of ICs.

Cole, Jr., Edward I. (Albuquerque, NM)

2000-01-01T23:59:59.000Z

340

A systematic review of security requirements engineering  

Science Journals Connector (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Snchez; Eduardo Fernndez-Medina

2010-06-01T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

342

Distribution capacitor automation that controls voltage and saves energy  

SciTech Connect

The Electric Distribution Business Line of Southern California Edison Company (SCE) has begun a program to improve the distribution system operations and electrical efficiency. The program, called the Distribution System Efficiency Enhancement Program (DSEEP), consists of five principal projects: Automated Switching, Circuit Lock-Out Alarming, Substation Monitoring and Control, Outage Management, and Distribution Capacitor Automation Project (DCAP). DCAP is the largest and most sophisticated of the projects being implemented. The project takes advantage of fine-tuning customer voltages for conservation voltage regulation (CVR) benefits as well as minimizes line losses by reducing unnecessary reactive power flow. DCAP can also help to increase transmission line and substation capacity by improving system power factor. The DCAP system takes advantage of the distributed processing capability of meters, capacitor controllers, radios, and substation processors. DCAP uses two-way packet radios and new electronic meters that read real-time customer voltages as well as energy consumption. The radios transmit customer meter voltage information and capacitor status to substation processors, where a control algorithm runs to determine which capacitors should be turned on or off. The objective of DCAP is to reduce over-all net energy transfer from the substation to the customer and meet system VAR requirements. SCE has tested the system on 66 circuit capacitors (including 3 substation capacitors) on 18 circuits served from two substations. The positive results of the DCAP demonstrations has led to an aggressive roll-out plan for system-wide implementation of automating over 7600 switched capacitors by year-end 1995.

Williams, B.R.

1994-12-31T23:59:59.000Z

343

Distribution System Voltage Performance Analysis for High-Penetration Photovoltaics  

SciTech Connect

This report examines the performance of commonly used distribution voltage regulation methods under reverse power flow.

Liu, E.; Bebic, J.

2008-02-01T23:59:59.000Z

344

A Kerberos security architecture for web services based instrumentation grids  

Science Journals Connector (OSTI)

Instrumentation Grids aim at controlling and managing heterogeneous resources & instruments securely, reliably and in near real-time. Within this context, we present a Web Services based Security Architecture that aims at improving security performance maintaining at the same time interoperability with legacy Grid Security Infrastructure (GSI). Our architecture utilizes GSI X.509 Certificates or Proxy Certificates (RFC3820) for the initial authentication of a user. However, it subsequently maps this identity to a Kerberos one and utilizes WS Security Kerberos Token Profile for embedding user credentials within WS exchange mechanisms. It then provides user authorization, thus realizing a complete AAI (Authentication & Authorization Infrastructure). In order to demonstrate and quantify the performance improvement achieved by our approach over a message exchange using X.509 Certificate Token Profile, we present comparative measurements on implementations of the two options. Our results demonstrate that the Kerberos message exchange schema exhibits up to 50% message throughput improvement, under high CPU load on the server.

Athanasios Moralis; Vassiliki Pouli; Symeon Papavassiliou; Vasilis Maglaris

2009-01-01T23:59:59.000Z

345

The 5 Waves of Information Security From Kristian Beckman to the Present  

E-Print Network (OSTI)

The 5 Waves of Information Security ­ From Kristian Beckman to the Present Prof SH (Basie) von to the present time. The paper makes use of two papers by the author, Information Security ­ the Third Wave (von Solms, 2000) and Information Security ­ the Fourth Wave (von Solms, 2006), as well as a paper

Boyer, Edmond

346

Tag: GTRI | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the...

347

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

348

April 2014 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Y-12 Press Release Apr 6, 2014 Security Improvements Project Completed Ahead of Schedule, 20 Million Under Budget The National Nuclear Security Administration's (NNSA) Security...

349

Sandia National Laboratories: Water Security Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Water Security Program Water Security CustomersPartners Awards Key Publications Staff Biographies Water Security In many areas of the United States and multiple regions of...

350

Integrated safeguards and security management plan  

E-Print Network (OSTI)

LBNL/PUB-3151 INTEGRATED SAFEGUARDS AND SECURITY MANAGEMENT76SF00098 iv Integrated Safeguards and Security Managementprovided. Appendix A. Safeguards and Security Plan http://

Bowen editor, Sue

2001-01-01T23:59:59.000Z

351

Sandia National Laboratories: National Security Missions: Internationa...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security casks We reduce proliferation and terrorism threats to U.S. national security through global technical engagement. Enhance security of vulnerable nuclear weapons...

352

INFORMATION SECURITY GUIDELINES TABLE OF CONTENTS  

E-Print Network (OSTI)

INFORMATION SECURITY GUIDELINES #12;CONSISTENT, EFFECTIVE INFORMATION SECURITY To respond to societal-to-date information security standards. Should we fail to do so, in the event

Prodiæ, Aleksandar

353

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES Form is used to document travel to sensitive countries. SECURITY...

354

Security, Emergency Planning & Safety Records | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security, Emergency Planning & Safety Records Security, Emergency Planning & Safety Records ADM 180.pdf More Documents & Publications ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY,...

355

Personnel Security - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

472.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

356

Personnel Security - DOE Directives, Delegations, and Requirements  

NLE Websites -- All DOE Office Websites (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

357

Reusable tamper-indicating security seal  

SciTech Connect

A reusable tamper-indicating mechanical security seal for use in safeguarding nuclear material has been developed. The high-security seal displays an unpredictable, randomly selected, five-digit code each time it is used. This five digit code serves the same purpose that the serial number does for conventional non-reusable seals - a unique identifier for each use or application. The newly developed reusable seal is completely enclosed within a seamless, tamper-indicating, plastic jacket. The jacket is designed to reveal any attempts to penetrate, section or to chemically remove and replace with a counterfeit for surreptitious purposes.

Ryan, M.J.

1981-01-01T23:59:59.000Z

358

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

359

Cyber Security Issues and Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

360

Physical simulation study of dynamic voltage instability  

SciTech Connect

This paper presents a physical simulation of the dynamic behavior of voltage instability in an interconnected multimachine environment. The dynamic evolving process leading to eventual voltage collapse, the scenario of the progressive reactive support reduction resulting from the MXL protection relays, the OLTC operation, and the effect of switched-in capacitor banks are examined using physical facilities in the laboratory. The physical simulation results are also compared with digital simulation results. This physical investigation provides a reliable foundation for the effective development of assessment approaches and countermeasures.

Tso, S.K.; Zhu, T.X. [Univ. of Hong Kong (Hong Kong); Zeng, Q.Y. [Electric Power Research Inst., Beijing (China); Lo, K.L. [Univ. of Strathclyde, Glasgow (United Kingdom). Dept. of Electrical and Electrical Engineering

1995-12-31T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites

National Nuclear Security Administration National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog US, UK, France Discuss Stockpile Stewardship, Arms Control and Nonproliferation and Visit the Nevada National Security Site Learn More NNSA DOE removes all remaining HEU from Hungary Learn More DOE removes all remaining HEU from Hungary Tiffany A. Blanchard-Case receives 2013 Linton Brooks Medal

362

Energy Security Initiatives Update  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

363

Security Clearances; Limitations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

364

New Security Challenges in the Global Era: Environmental Security  

NLE Websites -- All DOE Office Websites (Extended Search)

New Security Challenges in the Global Era: Environmental Security New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Mithra Moezzi The environment is the planetary support system on which all other human enterprises depend. If political, social, cultural, religious, and most importantly economic systems are to remain secure and viable, the environment must also remain secure and viable. This makes global environmental conditions a legitimate U.S. national security concern. The security of individuals, communities, nations, and the entire global community is increasingly jeopardized by unpremeditated, non-military environmental threats. These threats are self-generated: we perpetrate them on ourselves, by fouling our air and water, and over-harvesting our land.

365

The security fallacy: Seven myths about physical security | Argonne  

NLE Websites -- All DOE Office Websites (Extended Search)

Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. The security fallacy: Seven myths about physical security By Louise Lerner * October 26, 2010 Tweet EmailPrint The high-tech access control device was secure, sophisticated, and complex;

366

Security Science: The Theory and Practice of Security  

Science Journals Connector (OSTI)

Security Science integrates the multi-disciplined practice areas of security into a single structured body of knowledge, where each chapter takes an evidence-based approach to one of the core knowledge categories. The authors give practitioners ...

Clifton Smith; David J Brooks

2012-12-01T23:59:59.000Z

367

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Office of Environmental Management (EM)

can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4, and 5; 5.2; 5.2 patch 1 and 2 ABSTRACT: Cisco Secure ACS operates as a...

368

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

369

Outdoor PV Module Degradation of Current-Voltage Parameters: Preprint  

SciTech Connect

Photovoltaic (PV) module degradation rate analysis quantifies the loss of PV power output over time and is useful for estimating the impact of degradation on the cost of energy. An understanding of the degradation of all current-voltage (I-V) parameters helps to determine the cause of the degradation and also gives useful information for the design of the system. This study reports on data collected from 12 distinct mono- and poly-crystalline modules deployed at the National Renewable Energy Laboratory (NREL) in Golden, Colorado. Most modules investigated showed < 0.5%/year decrease in maximum power due to short-circuit current decline.

Smith, R. M.; Jordan, D. C.; Kurtz, S. R.

2012-04-01T23:59:59.000Z

370

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

371

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

372

Engineering secure software  

E-Print Network (OSTI)

Irratitnte Incidents Reported to CFRT/CC 2D ODD 15000 10000 5DOO 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 o = wi cor rwe toter tarte" tr Fig. 1: CERT security incident growth from 1988-2000 IZ] This thesis follows the style... Irratitnte Incidents Reported to CFRT/CC 2D ODD 15000 10000 5DOO 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 o = wi cor rwe toter tarte" tr Fig. 1: CERT security incident growth from 1988-2000 IZ] This thesis follows the style...

Jetly, Prateek

2012-06-07T23:59:59.000Z

373

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network (OSTI)

of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...? ? Advanced security methods ? Power analysis for key discovery ? Hardware attacks such as ?decapping? chips ? Developing vulnerability exploits ? Security analysis of smart grid systems & communications ? Reverse engineering ? Penetration testing ? Threat...

Ragsdale, G.

374

Access Rate Control System | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

by this browser. Download video Captions: On Time: 4:03 min Developed to support safeguards and security, the Access Rate Control System (ARCS) controls the speed of entry...

375

Securing Internet Freedom Security, Privacy and Global Governance  

E-Print Network (OSTI)

once again. People use the Internet responsibly and don't abuse each other. The dream involves nothing1 Securing Internet Freedom Security, Privacy and Global Governance Milton Mueller #12;2 #12;3 #12 Internet Freedom Security, Privacy and Global Governance #12;6 #12;7 1. TheDream I want to begin by killing

Mueller, Milton

376

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network (OSTI)

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

377

Safety and Security What do Safety/Security work with?  

E-Print Network (OSTI)

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

378

Electro-optic voltage sensor for sensing voltage in an E-field  

DOE Patents (OSTI)

A miniature electro-optic voltage sensor system capable of accurate operation at high voltages. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam's polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured.

Woods, Gregory K. (Idaho Falls, ID); Renak, Todd W. (Idaho Falls, ID)

1999-01-01T23:59:59.000Z

379

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

31, 2012 31, 2012 PSH-11-0029 - In the Matter of Personnel Security Hearing The individual is employed by a Department of Energy (DOE) contractor, and was granted a security clearance in connection with that employment. A routine reinvestigation of the individual revealed information concerning his finances that raised security concerns, and the local security office (LSO)summoned the individual for an interview with a personnel security specialist in August 2011. March 30, 2012 PSH-12-0002 - In the Matter of Personnel Security Hearing The individual has been employed by a Department of Energy (DOE) contractor since 1997, and has held a DOE access authorization for over 10 years. In October 2011, the individual tested positive for marijuana on a random drug test. The local security office (LSO) conducted a personnel security

380

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Cases Security Cases Security Cases RSS December 23, 2013 PSH-13-0103 - In the Matter of Personnel Security On January 29, 2013, the Individual completed and submitted a Questionnaire for National Security Positions (QNSP) to a Local Security Office (LSO). In this QNSP, the Individual admitted that he had used a neighbor's internet connection without permission on several occasions in 2010 and 2011, and had downloaded copyrighted software and media to his computer without permission from the copyright holders from 2000 through 2006. Exhibit 7 at 18-19. December 20, 2013 PSH-13-0102 - In the Matter of Personnel Security On December 20, 2013, a Hearing Officer determined that an individual's security clearance should be restored. In reaching this determination, the

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Departmental Personnel Security- Clearance Automation  

Energy.gov (U.S. Department of Energy (DOE))

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

382

Automated analysis of security APIs  

E-Print Network (OSTI)

Attacks on security systems within the past decade have revealed that security Application Programming Interfaces (APIs) expose a large and real attack surface but remain to be a relatively unexplored problem. In 2000, ...

Lin, Amerson H

2005-01-01T23:59:59.000Z

383

Real Time Grid Reliability Management 2005  

SciTech Connect

The increased need to manage California?s electricity grid in real time is a result of the ongoing transition from a system operated by vertically-integrated utilities serving native loads to one operated by an independent system operator supporting competitive energy markets. During this transition period, the traditional approach to reliability management -- construction of new transmission lines -- has not been pursued due to unresolved issues related to the financing and recovery of transmission project costs. In the absence of investments in new transmission infrastructure, the best strategy for managing reliability is to equip system operators with better real-time information about actual operating margins so that they can better understand and manage the risk of operating closer to the edge. A companion strategy is to address known deficiencies in offline modeling tools that are needed to ground the use of improved real-time tools. This project: (1) developed and conducted first-ever demonstrations of two prototype real-time software tools for voltage security assessment and phasor monitoring; and (2) prepared a scoping study on improving load and generator response models. Additional funding through two separate subsequent work authorizations has already been provided to build upon the work initiated in this project.

Eto, Joe; Eto, Joe; Lesieutre, Bernard; Lewis, Nancy Jo; Parashar, Manu

2008-07-07T23:59:59.000Z

384

INFORMATION SECURITY University Policy No: IM7800  

E-Print Network (OSTI)

Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

Herwig, Falk

385

Architectural support for enhancing security in clusters  

E-Print Network (OSTI)

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on rewalls for their security, but the rewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

386

East Asian Security in 2025  

E-Print Network (OSTI)

East Asian Security in 2025 Who We Are Reagan Heavin Energy Adam Hudson State Capacity Brandon Krueger Military Sean ONeil Demographics Griffin Rozell Balance of Power Matt Suma Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean ONeil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda Conclusions Projections Drivers Four Outcomes Questions East Asian Security in 2025...

Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

2008-01-01T23:59:59.000Z

387

About SRNL - Directorates - National Security  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Technical Partnerships Global...

388

Safeguard Security and Awareness Program  

Directives, Delegations, and Requirements

Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

2002-10-02T23:59:59.000Z

389

Cyber Security Process Requirements Manual  

Directives, Delegations, and Requirements

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

390

Safeguards and Security Program References  

Directives, Delegations, and Requirements

The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

2005-08-26T23:59:59.000Z

391

Electro-optic high voltage sensor  

DOE Patents (OSTI)

A small sized electro-optic voltage sensor capable of accurate measurement of high levels of voltages without contact with a conductor or voltage source is provided. When placed in the presence of an electric field, the sensor receives an input beam of electromagnetic radiation into the sensor. A polarization beam displacer serves as a filter to separate the input beam into two beams with orthogonal linear polarizations. The beam displacer is oriented in such a way as to rotate the linearly polarized beams such that they enter a Pockels crystal having at a preferred angle of 45 degrees. The beam displacer is therefore capable of causing a linearly polarized beam to impinge a crystal at a desired angle independent of temperature. The Pockels electro-optic effect induces a differential phase shift on the major and minor axes of the input beam as it travels through the Pockels crystal, which causes the input beam to be elliptically polarized. A reflecting prism redirects the beam back through the crystal and the beam displacer. On the return path, the polarization beam displacer separates the elliptically polarized beam into two output beams of orthogonal linear polarization representing the major and minor axes. The system may include a detector for converting the output beams into electrical signals, and a signal processor for determining the voltage based on an analysis of the output beams. The output beams are amplitude modulated by the frequency of the electric field and the amplitude of the output beams is proportional to the magnitude of the electric field, which is related to the voltage being measured.

Davidson, James R. (Idaho Falls, ID); Seifert, Gary D. (Idaho Falls, ID)

2002-01-01T23:59:59.000Z

392

Safeguards and Security Program  

Directives, Delegations, and Requirements

To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

2011-07-21T23:59:59.000Z

393

Information Security Manual  

Directives, Delegations, and Requirements

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

394

Information Security Manual  

Directives, Delegations, and Requirements

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

395

Information Security Program  

Directives, Delegations, and Requirements

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

396

National Security System Manual  

Directives, Delegations, and Requirements

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

397

Headquarters Security Operations  

Energy.gov (U.S. Department of Energy (DOE))

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

398

Security Science & Technology | Nuclear Science | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Research Areas Fuel Cycle Science & Technology Fusion Nuclear Science Isotope Development and Production Nuclear Security Science & Technology Border Security Comprehensive...

399

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

Home Centers & Programs Department of Defense Programs DARPA Programs Department of Homeland Security Programs Nonproliferation, Safeguards, and Security Programs Back...

400

Security Control Assessor | Department of Energy  

Energy Savers (EERE)

Training Worksheet More Documents & Publications Information System Security Manager (ISSM) Cybersecurity Program Manager (CSPM) Information System Security Officer (ISSO)...

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

402

Nuclear dependence| The Russian Federation's future reliance on nuclear weapons for national security.  

E-Print Network (OSTI)

?? The Russian Federation's reliance on nuclear weapons for national security will steadily increase over time. Based on current evidence and historical data, the Russian (more)

Lukszo, Adam J.

2011-01-01T23:59:59.000Z

403

NNSA: Securing Domestic Radioactive Material | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

NNSA: Securing Domestic Radioactive Material | National Nuclear Security NNSA: Securing Domestic Radioactive Material | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > NNSA: Securing Domestic Radioactive Material Fact Sheet NNSA: Securing Domestic Radioactive Material Apr 12, 2013 The Department of Energy's National Nuclear Security Administration (NNSA),

404

Y-12 National Security Complex | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Home > About Us > Our Locations > Y-12 National Security Complex Home > About Us > Our Locations > Y-12 National Security Complex Y-12 National Security Complex http://www.y12.doe.gov/ Field Office: The NNSA Production Office is responsible for contract management and oversight of the Pantex Plant in Amarillo, Texas and the Y-12 National Security Complex in Oak Ridge, Tenn. Y-12 supports the Nuclear Security Enterprise through nuclear material processing, manufacturing and storage operations and nuclear nonproliferation activities and provides enriched uranium feedstock for the U.S. Navy. National Security Complex: The Y-12 National Security Complex (Y-12) serves as the nation's only source of enriched uranium nuclear weapons components and provides enriched uranium for the U.S. Navy. Y-12 is a leader in materials science and precision manufacturing and serves as the

405

11 - Security Issues and Global Warming  

Science Journals Connector (OSTI)

Abstract This chapter begins with a discussion of the increasing empowerment of nonstate actors to challenge nation-states for commerce and security. One of the central trends is the operational coordination of organized crime and terrorist entities. They tend to share the same pipelines and at times some of the same personnel since both have a need for similar specialized skills. We witness the emergence of the third generation of guerillas, described as leaderless or horizontal in structure, global, and highly adaptable to urban areas. Crevalds position on guerilla wars is discussedhe asserted that states can never effectively combat guerilla wars. We then discuss the many ways in which transnational criminal organizations and terrorists are working together in the current era. From there, we assess the roles of criminalized states and black holes, geographical areas not controlled by state-based security entities. We discuss how global warming works to enhance the strengths of nonstate actors, while at the same time undermining or limiting state security. This chapter closes with a discussion of the security changes likely to be associated with an ice-free Arctic Ocean. We look at changes already occurring, and assess the roles played by the United States, Canada, Russia, and China. All are in exploration stages for previously inaccessible resources, and most are increasing their military presence across the region.

John P. Crank; Linda S. Jacoby

2015-01-01T23:59:59.000Z

406

High Voltage Testing of a 5-meter Prototype Triaxial HTS Cable  

SciTech Connect

High voltage tests were performed on a 5-m long prototype triaxial HTS cable (supplied by Ultera) at ORNL in preparation for installation of a 200-m HTS cable of the same design at the AEP utility substation in Columbus, Ohio. The triaxial design comprises three concentric phases and shield around a common former with the phase to phase dielectric at cryogenic temperature. Advantages of this design include increased current density, a reduced amount of HTS tape needed, and reduced heat load. The phase to phase voltage will be 13.2 kVrms (7.6 kVrms to ground). Preliminary testing was done on half-scale and full-scale terminations which successfully passed AC withstand, partial discharge, and impulse tests. High voltage tests conducted on the 5-m cable with the cable straight and after bending 90 degrees were ac withstand to 39 kVrms, partial discharge inception, and a minimum of 10 positive and 10 negative lightning waveform impulses at 110 kV. Phase to phase insulation was tested by applying high voltage to each phase one at a time with all the other phases grounded. Partial discharge data will be presented. The 5-m prototype triaxial HTS cable passed all the HV tests performed, with a PD inception voltage significantly above the required voltage.

Sauers, Isidor [ORNL; James, David Randy [ORNL; Ellis, Alvin R [ORNL; Tuncer, Enis [ORNL; Pace, Marshall O [ORNL; Gouge, Michael J [ORNL; Demko, Jonathan A [ORNL; Lindsay, David T [ORNL

2007-01-01T23:59:59.000Z

407

Developing Secure Power Systems Professional Competence: Alignment and Gaps  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Developing Secure Power Systems Professional Competence: Alignment Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (July/August 2013) Developing Secure Power Systems Professional Competence: Alignment and Gaps in Workforce Development Programs - Phase 2 (July/August 2013) DOE has recognized that the electricity industry needs workforce development resources that can aid in the accelerating need for Secure Power Systems Professionals, while at the same time identifying capabilities and competencies to protect and enable the modernized grid currently being built. In the spring of 2011 a project was initiated to identify those capabilities and competencies along with assessing the need and qualifications for a certification program for Secure Power Systems

408

DOE Selects Lawrence Livermore National Security, LLC to Manage its  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lawrence Livermore National Security, LLC to Manage its Lawrence Livermore National Security, LLC to Manage its Lawrence Livermore National Laboratory DOE Selects Lawrence Livermore National Security, LLC to Manage its Lawrence Livermore National Laboratory May 8, 2007 - 12:45pm Addthis WASHINGTON, DC - The U.S. Department of Energy (DOE) today announced that Lawrence Livermore National Security, LLC (LLNS) has been selected to be the management and operating contractor for DOE's National Nuclear Security Administration's (NNSA) Lawrence Livermore National Laboratory in California. "Livermore National Laboratory is a critical part of our nuclear weapons complex and has been for the last 55 years," Secretary Bodman said. "For the first time since the beginning of the laboratory a new contractor is

409

Secure password-based authenticated key exchange for web services  

SciTech Connect

This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

2004-11-22T23:59:59.000Z

410

Distribution System Voltage Regulation by Distributed Energy Resources  

SciTech Connect

This paper proposes a control method to regulate voltages in 3 phase unbalanced electrical distribution systems. A constrained optimization problem to minimize voltage deviations and maximize distributed energy resource (DER) active power output is solved by harmony search algorithm. IEEE 13 Bus Distribution Test System was modified to test three different cases: a) only voltage regulator controlled system b) only DER controlled system and c) both voltage regulator and DER controlled system. The simulation results show that systems with both voltage regulators and DER control provide better voltage profile.

Ceylan, Oguzhan [ORNL; Liu, Guodong [ORNL; Xu, Yan [ORNL; Tomsovic, Kevin [University of Tennessee, Knoxville (UTK)

2014-01-01T23:59:59.000Z

411

PSH-12-0074 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 - In the Matter of Personnel Security Hearing 4 - In the Matter of Personnel Security Hearing PSH-12-0074 - In the Matter of Personnel Security Hearing On November 1, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's financial irresponsibility. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that the individual's recent efforts to resolve his debt have not yet withstood the test of time. Given the

412

PSH-12-0053 - In the Matter of Personnel Security Hearing | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

53 - In the Matter of Personnel Security Hearing 53 - In the Matter of Personnel Security Hearing PSH-12-0053 - In the Matter of Personnel Security Hearing The Individual is employed by a DOE contractor and has held a DOE access authorization since 1980. DOE Exhibit (Ex.) 6. In October 2006, after reviewing the Individual's credit report during a routine reinvestigation in connection with her security clearance, the Local Security Office (LSO) requested that the Individual participate in a Personnel Security Interview (PSI) in order to discuss concerns raised by the Individual's finances. DOE Ex. 14. The Individual's security clearance was continued at that time. DOE Ex. 6. During a subsequent routine reinvestigation of the Individual's security clearance in 2011, concerns regarding the Individual's delinquent accounts and outstanding judgments surfaced. The

413

Physical and Logical Security Convergence: Powered By Enterprise Security Management: Powered By Enterprise Security Management  

Science Journals Connector (OSTI)

Government and companies have already invested hundreds of millions of dollars in the convergence of physical and logical security solutions, but there are no books on the topic.This book begins with an overall explanation of information security, ... Keywords: Computer Science, Security

Brian T. Contos; Steve Hunt; Colby Derodeff

2007-04-01T23:59:59.000Z

414

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

U.S. DOE SECURITY CLEARANCES U.S. DOE SECURITY CLEARANCES Clearnce Home Initial Clearance Clearance Reinstate Clearance Upgrade Clearance Downgrade Clearance Extension Clearance Reciprocity Clearance Reinvestigation Clearance Termination Clearance Transfer Sandia National Laboratories sponsors and processes U.S. DOE Security Clearances for contractor personnel working on an authorized contract requiring access to classified information. Clearance Office Functions Contractor Pre-Process Background Review Certification Clearance File Change Drug Testing e-Fingerprinting Enrollment Process Maintaining a DOE Security Clearance During an Extended Absence DOE Personnel Security Reporting Requirements Data Report on Spouse/Cohabitant Name Change Change in Citizenship Contractor Clearance Tools Clearance Action Status Inquiries

415

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

OPSEC OPSEC What is OPSEC? Millitary term for Operations Security Five-step process / Simplified Two-step Supplements formal security disciplines Industry wide (private and govt.) Goals of OPSEC To raise security awareness Make intelligence or information gathering difficult To attempt to stop adversaries from obtaining classified or sensitive information Basic OPSEC Practices Properly handle and destroy classified and sensitive unclassified information Phones, Cell phones, faxes, and radios are subject to interception Be security minded when doing these activities Use the most secure means of communicating Guard against unsolicited inquiries to obtain sensitive information (by person, phone, email, or social sites) Ensure sensitive information is not put in recycling or trash

416

Headquarters Facilities Master Security Plan  

Energy.gov (U.S. Department of Energy (DOE))

The purpose of the Headquarters Facilities Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures in place at Department of Energy (DOE) Headquarters (HQ) facilities in the Washington, DC area. The HQFMSP does not establish new security requirements; security requirements are established by various Federal laws and regulations, Executive Orders, and DOE directives. This plan explains how these requirements are implemented at HQ and gives HQ personnel and visitors access to the security policies and procedures that affect them regularly. The HQFMSP does not apply to DOE sites or facilities outside the Washington, DC area.

417

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 11, 2012 October 11, 2012 PSH-12-0081 - In the Matter of Personnel Security Hearing On October 11, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should be restored. A Local Security Office suspended the individual's security clearance for providing false information on a Questionnaire for National Security Positions and failing to comply with rules regarding the handling of classified information and conduct within simited access areas. This behavior raised security concerns under Criteria F, G, and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer fo October 2, 2012 PSH-12-0052 - In the Matter of Personnel Security Hearing On October 2, 2012, an OHA Hearing Officer issued a decision in which he

418

Chapter_14_Cyber_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4 4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters Program Cyber Security Plan (HQ PCSP) HQ Implementation Procedures The head of each HQ element is responsible for implementing a cyber security program within his or her element that conforms to the policies and procedures set forth in the HQ PCSP. Each Head of Element must appoint, in writing, an

419

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

March 5, 2013 March 5, 2013 PSH-12-0133 - In the Matter of Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be granted. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about his misrepresentations and misuse of information technology. The individual's behavior raised security concerns under Criteria F and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual presented sufficient evidence to resolve the security concerns associated March 5, 2013 PSH-12-0131 - In the Matter of: Personnel Security Hearing On March 5, 2013, an OHA Hearing Officer issued a decision in which he

420

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

January 11, 2012 January 11, 2012 TSO-01113 - In the Matter of Personnel Security Hearing The individual currently is employed by a DOE contractor, and that contractor has requested that he receive a DOE security clearance. Based on financial issues contained in the individual's security file, the Local Security Office (LSO) conducted a Personnel Security Interview (PSI) with the individual in July 2011. PSI, DOE Ex. 13 In August 2011, the LSO issued the individual a Notification Letter, together with a statement (Enclosure 2) setting forth the information that created a substantial doubt about his eligibility to hold a DOE security clearance. (DOE Ex. 1). December 21, 2011 TSO-1106 - In the Matter of Personnel Security Hearing The Individual is an applicant for a DOE access authorization in connection

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Chapter_3_Personnel_Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Personnel Security Personnel Security This chapter covers the security procedures adopted by DOE HQ to implement the requirements of the following DOE directives: * Privacy Act of 1974 * Title 10, Code of Federal Regulations, Part 707 * Title 10, Code of Federal Regulations, Part 710 * Title 48, Code of Federal Regulations, Part 952.204-2 * DOE Order 470.4B, Safeguards and Security Program * DOE Order 472.2, Personnel Security * DOE Order 475.1, Counterintelligence Program The DOE Personnel Security Program is designed to ensure that individuals authorized to access classified information and Special Nuclear Material (SNM) do not pose a threat to national security interests. This assurance is provided by the process for issuing initial and continuing

422

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 1, 2012 November 1, 2012 PSH-12-0074 - In the Matter of Personnel Security Hearing On November 1, 2012, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should not be restored. A Local Security Office conducted a Personnel Security Interview of the individual to address concerns about the individual's financial irresponsibility. His behavior raised security concerns under Criterion L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had not presented sufficient evidence to resolve these security concerns. Specifically, she found that October 26, 2012 PSH-12-0076 - Personnel Security Hearing On October 26, 2012, an OHA Hearing Officer issued a decision in which she

423

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

RESPONSIBILITIES RESPONSIBILITIES FSO Overview FSO Reporting Responsibilities Questions an FSOs at a Non-Possesssing Site Could Be Asked During an Audit Non-Possessing Contractor Security Requirements Plan Training for Facility Security Officers (FSOs) PHY-210DE Facility Security Officer Overview PHY-210DB, Introduction to Facility Security Officer (Self-Study Course ) Duration: 3 days Description: This correspondence course provides an overview of the roles and responsibilities of the DOE or DOE-contractor FSO. The course emphasizes facility clearance requirements, personnel security, information security, incident reporting, and other related programs. The course references the National Industrial Security Program Operating Manual (NISPOM) (DoD 5220.22-M) and a comprehensive listing of DOE orders, manuals, guides, forms, and notices.

424

Laser Telecommunication timeLaser beam  

E-Print Network (OSTI)

Laser Telecommunication Experiment Laser time Laser beam intensity timeLaser beam Laser battery Laser connected to a circuit without a modulator. Bottom graph illustrates what happen when a modulating signal is superimposed to the DC voltage driving the laser Laser beam intensity DC Input voltage DC

La Rosa, Andres H.

425

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

2 2 FSO News For SNL Facility Security Officers FSO Workshop 2012-CANCELLED This year's FSO Workshop has been cancelled due to lack of interest (less than 18% of our FSOs indicated they would attend this year). Instead, we will spend some serious time improving existing tools and developing new tools for you. This includes upgrading the FSO toolcart, developing SNL-specific FSO training, and looking into offering teleconferences or webinars. Here's some of your feedback that we will use for upcoming topics and improvements: Keep up with form revisions on the FSO website. Consider separate training for non-possessing (construction) versus possessing sites. Provide training on: Changes to DOE directives and upcoming changes to the complex. Where to report different things.

426

Arms control and European security  

SciTech Connect

In October 1987 on the eve of the Washington summit, the Committee on Atlantic Studies, a group of European and North American scholars established in 1964 to promote transatlantic dialogue, met in Toronto to discuss the implications of the new arms control for European security. This book is the fruit of that meeting. Incorporating subsequent developments, up to Grobachev's December 1988 speech to the U.N., it provides a timely assessment of arms control issues from a variety of European and North American perspectives. The contributors to this volume council caution, suggesting that while progress is possible, it will probably be slow. This volume stresses the interplay of strategic and regional arms control. It includes analyses of nuclear, conventional, and naval arms control questions and embodies a broader a broader conception of arms control. The book links arms control to such political measures as confidence-building, conflict avoidance and superpower agreement to the neutrality of particular states.

Auton, G.P.

1989-01-01T23:59:59.000Z

427

Sacramento Area Voltage Support Environmental Impact Statement  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

E E R R A N E V A D A R E G I O N Sacramento Area Voltage Support DRAFT ENVIRONMENTAL IMPACT STATEMENT DRAFT ENVIRONMENTAL IMPACT STATEMENT DOE/EIS-0323 NOVEMBER 2002 COVER SHEET Title: Sacramento Area Voltage Support Draft Environmental Impact Statement (EIS) Lead Agency: Western Area Power Administration (Western) Location: Alameda, Contra Costa, Placer, Sacramento, San Joaquin, and Sutter Counties, State of California. EIS Number: DOE/EIS-0323 Contact: Ms. Loreen McMahon, Environmental Project Manager Western Area Power Administration Sierra Nevada Region 114 Parkshore Drive Folsom, CA 95630 (916) 353-4460 (916) 985-1936 fax email: mcmahon@wapa.gov Website: Information is also available on our website: www.wapa.gov Hotline: 1-877-913-4440 (toll-free) Abstract The Western Area Power Administration's Central Valley Project transmission system forms an integral part of

428

High voltage electric substation performance in earthquakes  

SciTech Connect

This paper examines the performance of several types of high voltage substation equipment in past earthquakes. Damage data is provided in chart form. This data is then developed into a tool for estimating the performance of a substation subjected to an earthquake. First, suggests are made about the development of equipment class fragility curves that represent the expected earthquake performance of different voltages and types of equipment. Second, suggestions are made about how damage to individual pieces of equipment at a substation likely affects the post-earthquake performance of the substation as a whole. Finally, estimates are provided as to how quickly a substation, at various levels of damage, can be restored to operational service after the earthquake.

Eidinger, J. [G and E Engineering Systems, Oakland, CA (United States); Ostrom, D. [Southern California Edison, Rosemead, CA (United States); Matsuda, E. [Pacific Gas and Electric, San Francisco, CA (United States)

1995-12-31T23:59:59.000Z

429

Superconducting Fault Current Limiter for Transmission Voltage  

Science Journals Connector (OSTI)

Within a collaboration of American Superconductor, Siemens, Nexans and Southern California Edison one electrical phase of a resistive superconducting fault current limiter for the 115kV transmission voltage level has been designed and manufactured. The active part of the limiter consists of 63 bifilar coils made of 12mm wide steel-stabilized YBCO conductor and is housed in a cryostat operated at 5bar and 74K. The first phase was completely assembled and successfully subjected to power switching tests and high voltage tests. The basic design of the system and the test results are reported. The work was funded in part by US-DOE under Contract Number DE-FC26-07NT43243.

Hans-Peter Kraemer; Wolfgang Schmidt; Hong Cai; Bruce Gamble; David Madura; Tim MacDonald; Joe McNamara; Walther Romanosky; Greg Snitchler; Nicolas Lallouet; Frank Schmidt; Syed Ahmed

2012-01-01T23:59:59.000Z

430

Electrical system architecture having high voltage bus  

DOE Patents (OSTI)

An electrical system architecture is disclosed. The architecture has a power source configured to generate a first power, and a first bus configured to receive the first power from the power source. The architecture also has a converter configured to receive the first power from the first bus and convert the first power to a second power, wherein a voltage of the second power is greater than a voltage of the first power, and a second bus configured to receive the second power from the converter. The architecture further has a power storage device configured to receive the second power from the second bus and deliver the second power to the second bus, a propulsion motor configured to receive the second power from the second bus, and an accessory motor configured to receive the second power from the second bus.

Hoff, Brian Douglas (East Peoria, IL); Akasam, Sivaprasad (Peoria, IL)

2011-03-22T23:59:59.000Z

431

A Method to Improve Voltage Holding Across Vacuum Electrical Gaps to  

NLE Websites -- All DOE Office Websites (Extended Search)

A Method to Improve Voltage Holding Across Vacuum Electrical Gaps to A Method to Improve Voltage Holding Across Vacuum Electrical Gaps to Improve the Performance and Reduce the Conditioning Time by Removing Bacteria, Fungi, and Other Microbial Organisms and Their Spores. -- . Inventor Larry Grisham. Disclosed is a method to potentially increase the performance of devices which employ electric field within a vacuum by increasing the magnitude of the electric field gradient which can be sustained, the reliability of the devices, and by reducing the conditioning time of devices such as charged particle accelerators when they are brought into operation. The disclosed method can be employed, for example, for devices requiring voltages across vacuum gaps, such as, but not limited to, charged particle accelerators, X-ray machines, vacuum tubes, and vacuum electrical breakers.

432

Efficient Computation of Sensitivity Coefficients of Node Voltages and Line Currents in Unbalanced Electrical Networks  

E-Print Network (OSTI)

The problem of optimal control of power distribution systems is becoming increasingly compelling due to the progressive penetration of distributed energy resources in this specific layer of the electrical infrastructure. Distribution systems are, indeed, experiencing significant changes in terms of operation philosophies that are often based on optimal control strategies relying on the computation of linearized dependencies between controlled (e.g. voltages) and control variables (e.g. power injections). As the implementation of these strategies in real-time controllers imposes stringent time constraints, the derivation of analytical dependency between controlled and control variables becomes a non-trivial task to be solved. With reference to optimal voltage and power flow controls, this paper aims at providing an analytical derivation of node voltage and line current flows as a function of the nodal power injections. Compared to other approaches presented in the literature, the one proposed here is based on ...

Christakou, Konstantina; Paolone, Mario; Tomozei, Dan-Cristian

2012-01-01T23:59:59.000Z

433

Low Voltage White Phosphorescent OLED Achievements  

Energy.gov (U.S. Department of Energy (DOE))

Universal Display Corporation (UDC) and its research partners at Princeton University and the University of Southern California have succeeded in developing a white phosphorescent OLED (PHOLED) that achieved a record efficiency of 20 lumens per watt. This achievement is the result of the team's collaborative efforts to increase the efficiency of PHOLED lighting by focusing on two critical factors: lowering the drive voltages and increasing the amount of light extracted.

434

Security, Safety and Health  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, Fourth Quarter, 2012 8, Fourth Quarter, 2012 www.fossil.energy.gov/news/energytoday.html HigHligHts inside 2 Security and Sustainability A Column from the FE Director of Health, Security, Safety and Health 4 Training Goes 3-D NETL's AVESTAR Center Deploys New Virtual Training System 5 Secretary Achievement Awards Two FE Teams Earn Secretary of Energy Recognition 7 Vast Energy Resource Identified FE Study Says Billions of Barrels of Oil in Residual Oil Zones 8 Presidential Award NETL-RUA Engineer Earns Highest Government Honor in Science & Engineering This September marked a major mile- stone for one of the Office of Fossil Energy's largest carbon capture, utili- zation and storage projects: the opening

435

Security Administration Production Office,  

NLE Websites -- All DOE Office Websites (Extended Search)

JUNE/JULY 2013 JUNE/JULY 2013 inside this issue ... Reaching the summit - Big hitters talk economic development Page 3 Saving yesterday's knowledge today Page 5 What's a fellow to do? Page 6 ... and other Y-12 news On June 3 newly appointed Secretary of Energy Ernest Moniz (right) made Oak Ridge the site of his first official visit since being sworn in as head of the U.S. Department of Energy. Secretary Moniz met earlier in the day with national lab directors at Oak Ridge National Laboratory, then came to Y-12 for tours and a meeting with the National Nuclear Security Administration Production Office, B&W Y-12 and ORNL employees. He was joined by Rep. Chuck Fleischmann. The Secretary described Oak Ridge as a place where DOE's chief missions of nuclear security, environmental

436

HEADQUARTERS SECURITY OFFICERS  

NLE Websites -- All DOE Office Websites (Extended Search)

HEADQUARTERS SECURITY OFFICERS Revision Date: December 16, 2013 ELEMENT Office of Security Operations AR AR-1 AR-1 AR-1 CF CF-40 CF-40 CI CI-3 ED ED-2 EE EE-3A EE-3A NAME LOCATION PHONE FAX NUMBER WAYNE E. BERKEBILE E-325/GTN 301-903-1163 301-903-8108 Advanced Research Projects Agency - Energy MATTHEW TARDUOGNO L'N !NT 950/Rm. 8014 202-586-2892 202-287-5450 NICHOLE CLAGETT (ALT) L'N !NT 950/Rm. 8025 202-287-6409 202-287-5450 SARA DWYER (REP) L'N !NT 950/Rm. B-2 202-287-6411 202-287-5450 Office of the Chief Financial Officer PHILIP A. KNOPP Rm. 1310 CLV. 301-903-0364 301-903-1863 KIMBERLY J. LUCAS (ALT) Rm. 1310 CLV. 301-903-2485 301-903-6877 Assistant Secretary for Congressional and Intergovernmental Affairs

437

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration Finding of No Significant Impact for the Construction and Operation of a New Office Building and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area Office 528 35th Street Los Alamos, N M 8 7 5 4 4 DEPARTMENT OF ENERGY. NATIONAL NUCLEAR SECUIRTY ADMINISTRATION FINDING OF NO SIGNIFICANT INIPACT Construction and Operation of a New Office Building and Related Structures withinTA-3 at Los Alarnos National Laboratory, Los Alamos. New Mexico FINAL ENVIRONMENTAL ASSESSMENT: The Environmental Assessment (EA) for Construction and Operation of a New Office Building and Related Structures within TA-3 at L os Alamos National Laboratory, Los Alamos, New Mexico (DOE/EA- 7 375)

438

The Cyber Security Crisis  

SciTech Connect

Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

Spafford, Eugene (Purdue University) [Purdue University

2006-05-10T23:59:59.000Z

439

Classification of Voltage Sags Based on MPCA Models  

Science Journals Connector (OSTI)

In this paper, we introduce a new framework for classification of short duration voltage reductions in the area of Power Quality Monitoring using Multiway Principal Component Analysis (MPCA). Firstly, we recast the sags occurred in High Voltage (HV) ...

Abbas Khosravi; Joaquim Melendez; Joan Colomer

2007-06-01T23:59:59.000Z

440

A BIST Technique for RF Voltage-Controlled Oscillators  

Science Journals Connector (OSTI)

A built-in self-test (BIST) architecture is proposed for voltage-controlled oscillators (VCO) operating at multigigahertz frequencies. By utilizing a frequency divider and a frequency-to-voltage converter (FVC), the output frequency and tuning range ...

Hsieh-Hung Hsieh; Yen-Chih Huang; Liang-Hung Lu; Guo-Wei Huang

2007-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Low voltage amplifier architecture for high speed switched capacitor circuits  

E-Print Network (OSTI)

This work concentrates on circuit realization of high speed and low voltage switched capacitor circuits, with emphasis on the operational transconductance amplifier (OTA). An overview of switched capacitor circuits is given. Speed and voltage...

Shankar, Asit

2012-06-07T23:59:59.000Z

442

Electro-optic voltage sensor head  

DOE Patents (OSTI)

The invention is an electro-optic voltage sensor head designed for integration with existing types of high voltage transmission and distribution apparatus. The sensor head contains a transducer, which comprises a transducing material in which the Pockels electro-optic effect is observed. In the practice of the invention at least one beam of electromagnetic radiation is routed into the transducing material of the transducer in the sensor head. The beam undergoes an electro-optic effect in the sensor head when the transducing material is subjected to an E-field. The electro-optic effect is observed as a differential phase a shift, also called differential phase modulation, of the beam components in orthogonal planes of the electromagnetic radiation. In the preferred embodiment the beam is routed through the transducer along an initial axis and then reflected by a retro-reflector back substantially parallel to the initial axis, making a double pass through the transducer for increased measurement sensitivity. The preferred embodiment of the sensor head also includes a polarization state rotator and at least one beam splitter for orienting the beam along major and minor axes and for splitting the beam components into two signals which are independent converse amplitude-modulated signals carrying E-field magnitude and hence voltage information from the sensor head by way of optic fibers.

Crawford, Thomas M. (Idaho Falls, ID); Davidson, James R. (Idaho Falls, ID); Woods, Gregory K. (Cornelius, OR)

1999-01-01T23:59:59.000Z

443

Nickel-hydrogen voltage-efficiency model  

SciTech Connect

A model for providing voltage vs. current relationships and coulombic efficiency has been developed applicable to Nickel-Hydrogen (NiH{sub 2}) batteries. The performance relationships can be used directly in dynamic electrical energy storage system models or customized by predicting the particular case of voltage as a function of applied current. The algorithm utilizes electrochemical models for competing cell reactions: a single Butler-Volmer equation for the main NiH{sub 2} reaction, and a Tafel relationship for oxygen generation. For the main NiH{sub 2} reaction, the dependence on state-of-charge is introduced via a Nerstian term containing concentrations of active materials present. Oxygen recombination and self-discharge are modeled as first order reactions. Model parameters are determined by a modified Marquardt algorithm to provide a best-fit of both voltage and pressure data to the physical model. The data fit is from electrical characterization tests which may include capacity measurements or repeated electrical cycling at specified depths-of-discharge or with particular regimens. It has been found that test performance data covering a wide domain of the independent variables (temperature, current, and state-of-charge) will produce a well-behaved model.

Hafen, D.P.; Armantrout, J.D. [Lockheed Martin Missiles and Space, Sunnyvale, CA (United States)

1996-12-31T23:59:59.000Z

444

Analysis and design of an electronic voltage ratchet  

E-Print Network (OSTI)

and decay. Impulse voltages are produced through the discharging of 0, capacitor into a shaping network consisting of resistors and a. capacitor as is shown in Figure 2. 9. The operation of the impulse generator is as follows. Capacitor Ci is charged from... voltage shaping network. as possible in order to reduce oscillations in the wavefront and wavetail portions of the impulse voltage [1). The impulse voltage generator requires a, highly charged capacitor or bank of capacitors. Capacitors may be charged...

Menendez, Jorge Carlos

2012-06-07T23:59:59.000Z

445

2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE))

2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

446

LM2907LM2917FrequencytoVoltageConverter February 1995  

E-Print Network (OSTI)

TL H 7942 LM2907LM2917FrequencytoVoltageConverter February 1995 LM2907 LM2917 Frequency to Voltage Converter General Description The LM2907 LM2917 series are monolithic frequency to voltage converters doubling for low ripple full input protection in two versions (LM2907-8 LM2917-8) and its output swings

Wedeward, Kevin

447

Low voltage vertical recording preamplifier for hard disk drives  

E-Print Network (OSTI)

. . . . . . . . . . . . . . . . . 4 2 Input drivers of the preamplifier along with the decoupling caps and parasitics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 3 Voltage bias voltage sensing scheme . . . . . . . . . . . . . . . . . . . 8 4 Current bias current... sensing scheme . . . . . . . . . . . . . . . . . . 9 5 Current bias scheme which common mode sense voltage to DE . . . . 10 6 Decoupling the inputs of the differential pair using feedback . . . . . 11 7 Barkhausen noise...

Mellachervu, Ramachandra Murthy

2004-11-15T23:59:59.000Z

448

The Matrix Converter Drive Performance Under Abnormal Input Voltage Conditions  

E-Print Network (OSTI)

that generates variable magnitude variable frequency output voltage from the ac utility line. It has high power voltage disturbance related performance issues of the MC drive. Since the MC is a direct frequencyThe Matrix Converter Drive Performance Under Abnormal Input Voltage Conditions Jun-Koo Kang

Hava, Ahmet

449

Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security Italy Nuclear Security Summit: Fact Sheet | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Italy Nuclear Security Summit: Fact Sheet Fact Sheet Italy Nuclear Security Summit: Fact Sheet Mar 26, 2012 Between the 1960s and mid-1980s, Italy had an ambitious nuclear power

450

Office of Secure Transportation History | National Nuclear Security  

National Nuclear Security Administration (NNSA)

History | National Nuclear Security History | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Office of Secure Transportation History Home > About Us > Our Programs > Defense Programs > Office of Secure Transportation > Office of Secure Transportation History Office of Secure Transportation History Since 1947, NNSA and its predecessor agencies have moved nuclear weapons,

451

PAPER ACCEPTED TO THE IEEE TRANSACTIONS ON POWER SYSTEMS 1 Sensitivity-based Security-constrained OPF Market  

E-Print Network (OSTI)

PAPER ACCEPTED TO THE IEEE TRANSACTIONS ON POWER SYSTEMS 1 Sensitivity-based Security-constrained OPF Market Clearing Model F. Milano, Member, IEEE, C. A. Ca~nizares, Senior Member, IEEE, and A. J constraints that properly include voltage stability limits in the operation of competitive electricity markets

Cañizares, Claudio A.

452

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

453

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

454

Voltage-dependent calcium channels and currents in native neurons and other cells have been divided into high voltage  

E-Print Network (OSTI)

Voltage-dependent calcium channels and currents in native neurons and other cells have been divided than one subtype of channel. A new subfamily of voltage-dependent calcium channel á1 subunit genes. 1999), having four domains, each with a voltage sensor and a pore-forming P loop. However

Dolphin, Annette C.

455

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL), which is an indoor/outdoor facility designed to support testing and evaluation of a wide range of intrusion detection, assessment, surveillance, and peripheral physical security equipment including sensors, cameras, power generation, access control, remote communication, unmanned aerial, and activated delay systems. At the heart of SSFL is a simulated border region of varied terrain including open grassy fields, hilly wooded areas, sand pits, and lakes and streams which approximate the actual challenges of border and facility applications. A critical facet of this facility is the ability to test systems year-round under the seasonal

456

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 30, 2013 August 30, 2013 PSH-13-0049 - In the Matter of Personnel Security On August 30, 2013, a Hearing Officer issued a Decision in which he determined that an individual's access authorization should not be granted. In reaching this determination, the Hearing Officer found that the individual had not resolved security concerns under Criterion L regarding the Individual's failure to report an arrest for failure to appear at an arraignment concerning traffic tickets and a citation for failing to have a controlled prescription medication in its proper container. August 29, 2013 PSH-13-0057 - In the Matter of Personnel Security On August 28, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. A Local Security Office suspended the individual's security

457

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

August 22, 2012 August 22, 2012 PSH-12-0065 - In the Matter of Personnel Security Hearing The Individual is a contractor employee at a DOE facility. Exhibit (Ex.) 10 at 3. The Local Security Office (LSO) discovered that the Individual failed to list a 2004 Driving Under the Influence (DUI) arrest in a Questionnaire for National Security Positions form completed in October 2011. Ex. 10 at 10. August 22, 2012 PSH-12-0045 - In the Matter of Personnel Security Hearing OHA Hearing Officer issued a decision in which he determined that an Individual's DOE security clearance should be restored. The Individual had been caught viewing pornography on a DOE workplace computer. August 17, 2012 PSH-12-0048 - In the Matter of Personnel Security Hearing OHA Hearing Officer issued a decision in which he concluded that an

458

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 20, 2012 June 20, 2012 PSH-12-0044 - In the Matter of Personnel Security Hearing The Individual is a contractor employee at a DOE facility and has possessed a security clearance on various occasions since 1978. Exhibit (Ex.) 8 at 2. In December 2011, the Individual reported to the Local Security Office (LSO) that his wages were being garnished for back federal taxes. Ex. 13 at 1. Consequently, the LSO conducted a personnel security interview (PSI) with the Individual in January 2012. Ex. 15. June 13, 2012 PSH-12-0010 - In the Matter of Personnel Security Hearing The individual works for a Department of Energy (DOE) contractor and is an applicant for DOE access authorization. In August 2010, the individual completed a Questionnaire for National Security Positions (QNSP) and was

459

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

14, 2012 14, 2012 PSH-12-0083 - In the Matter of In the Matter of Personnel Security Hearing On November 14, 2012, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should be restored. A Local Security Office suspended the individual's security clearance for failing to comply with rules regarding the handling of classified information and conduct within limited access areas and for failing to report such non-compliance. This behavior raised security concerns under Criteria G and L. After conducting a hearing and evaluating the documentary and testimonial evidence, the Hearing Officer found that the individual had presented su November 13, 2012 PSH-12-0092 - In the Matter of Personnel Security Hearing On September 24, 2012, an OHA Hearing Officer issued a decision in which he

460

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

June 13, 2013 June 13, 2013 PSH-13-0034 - In the Matter of Personnel Security Hearing On June 13, 2013, a Hearing Officer determined that an individual's security clearance should not be restored. In reaching this determination, the Hearing Officer found that the individual had not successfully addressed the DOE's security concerns regarding her finances under criterion (l). June 11, 2013 PSH-13-0019 - In the Matter of Personnel Security On June 11, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's authorization access should be restored. A Local Security Office suspended the individual's security clearance following the individual contemplating suicide and, subsequently, being diagnosed by a DOE consulting psychologist as meeting the criteria for

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

October 10, 2013 October 10, 2013 PSH-13-0071 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which she concluded that an individual's security clearance should be restored. In March 2013, as part of a background investigation, the local security office (LSO) conducted a Personnel Security Interview (PSI) of the individual to address concerns about his alcohol use and alcohol-related incidents. October 10, 2013 PSH-13-0070 - In the Matter of Personnel Security Hearing On October 10, 2013, an OHA Hearing Officer issued a decision in which he concluded that an individual's security clearance should not be restored. Following the individual's employer receiving garnishment notices from both federal and state tax authorities in January 2013, the

462

Dual-decay converter for switched reluctance motor drives in low-voltage applications  

SciTech Connect

A modified converter topology for star-connected switched reluctance motors suitable for low-voltage applications is proposed in this paper. A dual time constant freewheeling circuit has been designed to improve the drive performance and efficiency over a wide range of speeds. The different modes of operation of the converter are discussed, and a comparison is made with other converter configurations.

Ehsani, Mehrdad; Husain, Iqbal; Ramani, K.R. (Texas A and M Univ., College Station, TX (United States). Dept. of Electrical Engineering); Galloway, J.H. (J.H. Galloway and Associates, Brookfield, CT (United States))

1993-04-01T23:59:59.000Z

463

Strongly nonlinear dynamics of electrolytes in large ac voltages Laurits Hjgaard Olesen,1,2  

E-Print Network (OSTI)

the results have been developed for over a century 1 . Current applications include energy storage; published 2 July 2010 We study the response of a model microelectrochemical cell to a large ac voltage of frequency comparable to the inverse cell relaxation time. To bring out the basic physics, we consider

464

Relationship Between Anode Spots and Onset Voltage Hash in Magnetoplasmadynamic Thrusters  

E-Print Network (OSTI)

Relationship Between Anode Spots and Onset Voltage Hash in Magnetoplasmadynamic Thrusters Luke in magnetoplasmadynamic thrusters operating above onset and the time-resolved appearance of destructively released anode material in the thruster plume. Such a relationship gives support to previously discussed anode spotting

Choueiri, Edgar

465

Title of Thesis: RTOS-BASED DYNAMIC VOLTAGE SCALING Degree candidate: Nuengwong Tuaycharoen  

E-Print Network (OSTI)

of Electrical and Computer Engineering Energy consumption of real-time embedded systems becomes more important. The experimental results show that the technique can reduce significantly energy consumption by consuming only 5 of the total energy. Dynamic voltage scaling (DVS) is accepted as the key technique to reduce energy

Jacob, Bruce

466

Photoemission currentspacecraft voltage relation: Key to routine, quantitative low-energy plasma measurements  

E-Print Network (OSTI)

Photoemission current�spacecraft voltage relation: Key to routine, quantitative low-energy plasma measurements J. D. Scudder and Xuejun Cao Department of Physics and Astronomy, University of Iowa, Iowa City F/C. The photoemission current function is found to be time independent using nearly 10 months of GGS-Polar data from

California at Berkeley, University of

467

Capacitively coupled RF voltage probe having optimized flux linkage  

DOE Patents (OSTI)

An RF sensor having a novel current sensing probe and a voltage sensing probe to measure voltage and current. The current sensor is disposed in a transmission line to link all of the flux generated by the flowing current in order to obtain an accurate measurement. The voltage sensor is a flat plate which operates as a capacitive plate to sense voltage on a center conductor of the transmission line, in which the measured voltage is obtained across a resistance leg of a R-C differentiator circuit formed by the characteristic impedance of a connecting transmission line and a capacitance of the plate, which is positioned proximal to the center conductor.

Moore, James A. (Powell, TN); Sparks, Dennis O. (Maryville, TN)

1999-02-02T23:59:59.000Z

468

Hedge-algebra-based voltage controller for a self-excited induction generator  

Science Journals Connector (OSTI)

Abstract This paper presents an indirect rotor-flux-oriented (IRFO) control system of the self-excited induction generator (SEIG) in which excitation is achieved by means of a current-controlled voltage source inverter (CC-VSI) and a single electrolytic capacitor. In the proposed control scheme, both the iron losses and the magnetic saturation are taken into account and calculated online. The main objective is to keep the DC voltage across the capacitor constant and equal to the reference value, regardless of changes in the rotor speed and load. The study is mainly focused on the DC voltage control and, more specifically, on selection of the appropriate DC voltage controller. Besides considering widely accepted types of controllers, i.e., the classical PI controller and the fuzzy logic (FL) controller, this paper proposes an alternative solution a new type of DC voltage controller based on hedge algebra. To our best knowledge, this is the first time that such a controller is considered for application in electrical engineering. The performance of the developed hedge algebra (HA) controller is evaluated through comparison with the optimal-tuned classical PI controller and the Sugeno-type FL controller. The simulation and experimental analysis are carried out in reasonably wide ranges of the DC voltage, load and rotor speed, including the case of a variable rotor speed. It is shown that the proposed HA controller provides superior performance in terms of tracking the reference DC voltage value as well as robustness to speed and load disturbances in the system.

Dinko Vukadinovi?; Mateo Bai?; Cat Ho Nguyen; Nhu Lan Vu; Tien Duy Nguyen

2014-01-01T23:59:59.000Z

469

2014 Headquarters Facilities Master Security Plan - Chapter 3...  

Energy Savers (EERE)

3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

470

2014 Headquarters Facilities Master Security Plan - Chapter 14...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

471

2014 Headquarters Facilities Master Security Plan - Chapter 8...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

472

2014 Headquarters Facilities Master Security Plan - Chapter 10...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

473

PIA - WEB Physical Security Major Application | Department of...  

Energy Savers (EERE)

Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application PIA - WEB Physical Security Major Application More...

474

ETTP Security Access Control System (ESACS) | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) ETTP Security Access Control System (ESACS) More...

475

Security Enforcement Reporting Criteria | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Security Enforcement Reporting Criteria Classified information security noncompliances are categorized according to the disclosure or potential disclosure of DOE classified information placed at risk. There are two categories of noncompliances that are based on the relative severity of a classified information security incident. The categories are identified by an event category and type. Each of the two categories is further subdivided into three types based on the type of interest (security interest, management interest, and procedural interest). Security Enforcement Reporting Criteria More Documents & Publications Safety and Security Enforcement Coordinator Handbook DOE-STD-1210-2012 HQFMSP Chapter 11, Incidents of Security Concern

476

Room-temperature atmospheric argon plasma jet sustained with submicrosecond high-voltage pulses  

SciTech Connect

In this letter, an experimental study is presented to characterize a room-temperature plasma jet in atmospheric argon generated with submicrosecond voltage pulses at 4 kHz. Distinct from sinusoidally produced argon discharges that are prone to thermal runaway instabilities, the pulsed atmospheric argon plasma jet is stable and cold with an electron density 3.9 times greater than that in a comparable sinusoidal jet. Its optical emission is also much stronger. Electrical measurement suggests that the discharge event is preceded with a prebreakdown phase and its plasma stability is facilitated by the short voltage pulses.

Walsh, J. L.; Kong, M. G. [Department of Electronic and Electrical Engineering, Loughborough University, Loughborough, Leicestershire LE11 3TU (United Kingdom)

2007-11-26T23:59:59.000Z

477

Newsletters | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Newsletters | National Nuclear Security Administration Newsletters | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Newsletters Home > Media Room > Newsletters Newsletters NNSA publishes a monthly newsletter featuring current events and activities across the nuclear security enterprise. Online archives are available back

478

Speeches | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Speeches | National Nuclear Security Administration Speeches | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Speeches Home > Media Room > Speeches Speeches NNSA officials frequently speak at public events around the world on topics ranging from nuclear security to infrastructure and strategic planning.

479

Safety and Security Enforcement Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Enforcement Enforcement Enforcement Home Worker Safety and Health Enforcement Office of Nuclear Safety Enforcement Security Enforcement Notices of Violation Consent Orders / Settlement Agreements Compliance Orders Special Report Orders Enforcement Letters Regulatory Assistance Reviews Enforcement Program and Process Guidance and Information Non-Compliance Tracking System (NTS) Non-Compliance Reporting Thresholds Regulations and Directives Enforcement Staff Enforcement Coordinator Contact Information 2013 DOE Safety and Security Enforcement Workshop Request for Investigation or Inspection of Safety or Security Violations Archived Documents HSS Logo Safety and Security Enforcement Program Office of Enforcement and Oversight What's New: » Worker Safety and Health Enforcement Preliminary Notice of Violation issued to Brookhaven Science Associates, LLC

480

Climate Change and National Security  

E-Print Network (OSTI)

CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 Climate change acts as a threat

Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

2015-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Sandia National Laboratories: Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Wind Generator Modeling On June 26, 2014, in Computational Modeling & Simulation, Energy, Energy Surety, Grid Integration, Infrastructure Security, Modeling, Modeling & Analysis,...

482

Hardware Security through Design Obfuscation.  

E-Print Network (OSTI)

??Security of integrated circuits (ICs) has emerged as a major concern at different stages of IC life-cycle, spanning design, test, fabrication and deployment. Modern ICs (more)

Chakraborty, Rajat Subhra

2010-01-01T23:59:59.000Z

483

Jordan | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Jordan | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

484

Personnel Security Corner- PERSEC Corner  

Energy.gov (U.S. Department of Energy (DOE))

Welcome to the Departmental Personnel Security PERSEC Corner document collection. If you have not yet registered for access to this information, please complete our Registration form.

485

russia | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

russia | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

486

Energy Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber-physical solutions Cybersecurity for energy delivery systems outreach AMI smart metering upgradeability test framework Practical quantum security for grid automation...

487

Sandia National Laboratories: Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

July 31, 2014, in DETL, Distribution Grid Integration, Energy, Energy Surety, Facilities, Grid Integration, Infrastructure Security, News, News & Events, Photovoltaic, Renewable...

488

David Telles wins NNSA Security  

NLE Websites -- All DOE Office Websites (Extended Search)

who conduct vulnerability analyses, authored the LANL Site Safeguards and Security Plan, and administered the Lab's Performance Assurance Program. Under his leadership,...

489

Cyber Security Process Requirements Manual  

Directives, Delegations, and Requirements

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

2008-08-12T23:59:59.000Z

490

Secure Data Center (Fact Sheet)  

SciTech Connect

This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

Not Available

2012-08-01T23:59:59.000Z

491

Sandia National Laboratories: Infrastructure Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Sandia Study Shows Large LNG Fires Hotter but Smaller Than Expected On December 6, 2011, in Analysis, Energy Assurance, Infrastructure Security, Modeling, Modeling & Analysis,...

492

National Nuclear Security Administration Overview  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

1, 2011 - 1, 2011 - Page 1 National Transportation Stakeholders Forum Denver, Colorado May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2 National Transportation Stakeholders Forum (NTSF) * Introduction * NNSA Certifying Official Role * Offsite Source Recovery Project * Waste Shipments * Nuclear Materials Management Planning * Summary May 11, 2011 - Page 3 NNSA Plays a Critical Role: Ensuring our Nation's Security * Maintaining the safety, security and effectiveness of the nuclear weapons stockpile without nuclear testing * Reducing the global danger from the proliferation of nuclear weapons and materials * Provide safe and effective nuclear propulsion for the

493

Speeches | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Speeches | National Nuclear Security Administration Speeches | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The National Nuclear Security Administration Speeches Home > Media Room > Speeches Speeches NNSA officials frequently speak at public events around the world on topics ranging from nuclear security to infrastructure and strategic planning.

494

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

require authoization be obtained throught the SNL Foreign National Request (FNR) Security Plan (SP) electronic process. The Contractor and Subcontractor must notify their...

495

Information Technology Management ((Information Security))  

Energy.gov (U.S. Department of Energy (DOE))

A successful candidate in this position will serve as an Information Technology Specialist (Information Security) with responsibility for the implementation of a wide range of technically complex...

496

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

the potential danger associated with an item is questionable, consult the physical security contact for additional information. Illegal drugs (does not include controlled...

497

Transient recovery voltage considerations in the application of medium voltage circuit breakers  

SciTech Connect

Medium Voltage Circuit Breakers can fail to interrupt 3-phase fault currents when power systems have Transient Recovery Voltage (TRV) characteristics which exceed the rating of the circuit breaker. This paper examines the application of 13.8kV generation and load switchgear for an oil refinery in which circuit parameters as originally designed would have exceeded the 13.8kV circuit breakers TRV ratings had corrective measures not been taken. This paper illustrates this case and discusses the basis of TRV, how TRV is assessed, and alternative actions taken to bring circuits to within the 13.8 kV circuit breaker ratings.

Swindler, D.L.; Schwartz, P.; Hamer, P.S.; Lambert, S.R.

1995-12-31T23:59:59.000Z

498

Kirchhoff voltage law corrected for radiating circuits  

E-Print Network (OSTI)

When a circular loop composed by a RLC is put to oscillate, the oscillation will eventually vanish in an exponentially decaying current, even considering superconducting wires, due to the emission of electric and magnetic dipole radiation. In this work we propose a modification on the Kirchhoff voltage law by adding the radiative contributions to the energy loss as an effective resistance, whose value is relatively small when compared to typical resistance value, but fundamental to describe correctly real circuits. We have also analysed the change in the pattern of the radiation spectra emitted by the circuit as we vary both the effective and electrical resistance.

Lara, Vitor

2014-01-01T23:59:59.000Z

499

A High Voltage Direct Current Generator  

Science Journals Connector (OSTI)

When powdered materials are blown through metal tubes by means of compressed air considerable quantities of electricity are produced by contact electrification. It was found that 610-5 coulombs could be produced per gram of diatomaceous earth, a form of silica, blown through a short length of copper tube. A generator of extremely high voltage is proposed, and a small scale model of such a generator is described, by means of which currents of 810-5 amperes at 260 kilovolts were generated.

Richard E. Vollrath

1932-10-15T23:59:59.000Z

500

National Security Science  

NLE Websites -- All DOE Office Websites (Extended Search)

NSS cover - april NSS cover - april Read the April 2013 issue: web | interactive| pdf Skip to Content Skip to Search Skip to Utility Navigation Skip to Top Navigation Skip to Content Navigation Los Alamos National Laboratory submit About | Mission | Business | Newsroom | Phonebook Los Alamos National Laboratory links to site home page Science & Innovation Collaboration Careers, Jobs Community, Environment Science & Innovation Home » Science & Engineering Capabilities Accelerators, Electrodynamics Bioscience, Biosecurity, Health Chemical Science Earth, Space Sciences Energy Engineering High Energy Density Plasmas, Fluids Information Science, Computing, Applied Math Materials Science National Security, Weapons Science Nuclear & Particle Physics, Astrophysics, Cosmology