Powered by Deep Web Technologies
Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Re-Dispatching Generation to Increase Power System Security Margin and Support Low Voltage Bus  

E-Print Network [OSTI]

Re-Dispatching Generation to Increase Power System Security Margin and Support Low Voltage Bus by re-dispatching generator outputs, using a normal vector found at a voltage collapse boundary or a low voltage boundary (LVB). This method uses the normal vector as an indicator to change the generation

2

Time varying voltage combustion control and diagnostics sensor  

DOE Patents [OSTI]

A time-varying voltage is applied to an electrode, or a pair of electrodes, of a sensor installed in a fuel nozzle disposed adjacent the combustion zone of a continuous combustion system, such as of the gas turbine engine type. The time-varying voltage induces a time-varying current in the flame which is measured and used to determine flame capacitance using AC electrical circuit analysis. Flame capacitance is used to accurately determine the position of the flame from the sensor and the fuel/air ratio. The fuel and/or air flow rate (s) is/are then adjusted to provide reduced flame instability problems such as flashback, combustion dynamics and lean blowout, as well as reduced emissions. The time-varying voltage may be an alternating voltage and the time-varying current may be an alternating current.

Chorpening, Benjamin T. (Morgantown, WV); Thornton, Jimmy D. (Morgantown, WV); Huckaby, E. David (Morgantown, WV); Fincham, William (Fairmont, WV)

2011-04-19T23:59:59.000Z

3

Multi-objective Optimal Power Flows to Evaluate Voltage Security Costs in Power Networks  

E-Print Network [OSTI]

1 Multi-objective Optimal Power Flows to Evaluate Voltage Security Costs in Power Networks William Abstract-- In this paper, new optimal power flow (OPF) tech- niques are proposed based on multi- dard power flow models. The results obtained using the proposed mixed OPFs are compared and analyzed

Cañizares, Claudio A.

4

High voltage electrical amplifier having a short rise time  

DOE Patents [OSTI]

A circuit, comprising an amplifier and a transformer is disclosed that produces a high power pulse having a fast response time, and that responds to a digital control signal applied through a digital-to-analog converter. The present invention is suitable for driving a component such as an electro-optic modulator with a voltage in the kilovolt range. The circuit is stable at high frequencies and during pulse transients, and its impedance matching circuit matches the load impedance with the output impedance. The preferred embodiment comprises an input stage compatible with high-speed semiconductor components for amplifying the voltage of the input control signal, a buffer for isolating the input stage from the output stage; and a plurality of current amplifiers connected to the buffer. Each current amplifier is connected to a field effect transistor (FET), which switches a high voltage power supply to a transformer which then provides an output terminal for driving a load. The transformer comprises a plurality of transmission lines connected to the FETs and the load. The transformer changes the impedance and voltage of the output. The preferred embodiment also comprises a low voltage power supply for biasing the FETs at or near an operational voltage.

Christie, David J. (Pleasanton, CA); Dallum, Gregory E. (Livermore, CA)

1991-01-01T23:59:59.000Z

5

Integrating Security and Real-Time Requirements Using Covert  

E-Print Network [OSTI]

ÐConcurrency control, covert channel analysis, database systems, locking protocols, multilevel security, real secure database systems use an access control mechanism based on the Bell- LaPadula model [3]. This model. Multilevel security requirements introduce a new dimension to transaction processing in real-time database

Son, Sang H.

6

Energy Aware Dynamic Voltage and Frequency Selection for Real-Time Systems with Energy Harvesting  

E-Print Network [OSTI]

Energy Aware Dynamic Voltage and Frequency Selection for Real-Time Systems with Energy Harvesting}@binghamton.edu Abstract In this paper, an energy aware dynamic voltage and frequency selection (EA-DVFS) algorithm energy and the harvested energy in a future duration. Specifically, if the system has sufficient energy

Qiu, Qinru

7

Z .Bioelectrochemistry and Bioenergetics 45 1998 316 Time course of transmembrane voltage induced by time-varying electric  

E-Print Network [OSTI]

Z .Bioelectrochemistry and Bioenergetics 45 1998 3­16 Time course of transmembrane voltage induced.rBioelectrochemistry and Bioenergetics 45 1998 3­164 Fig. 1. The model on which the calculations were based. The cell is a sphere

Ljubljana, University of

8

OnTimeSecure: Secure Middleware for Federated Network Performance Monitoring  

E-Print Network [OSTI]

- driven access to related federated Network Performance Mon- itoring (NPM) services are important federated authorization entitlement policies for timely orches- tration of NPM services. On measurement resources. We validate OnTimeSecure in a federated multi-domain NPM infrastructure by performing

Calyam, Prasad

9

Random Dynamic Voltage Scaling Design to Enhance Security of NCL S-Box  

E-Print Network [OSTI]

Power management is essential to building more efficient and optimized circuits in computer architecture-- The demand for enhanced security in cryptographic systems is increasing rapidly in recent years that NCL contains all the properties to resist common forms of side-channel attack (SCA). RDVS is designed

Ayers, Joseph

10

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

11

Protection against the man-in-the-middle-attack for the Kirchhoff-loop-Johnson(-like)-noise cipher and expansion by voltage-based security  

E-Print Network [OSTI]

It is shown that the original Kirchhoff-loop-Johnson(-like)-noise (KLJN) cipher is naturally protected against the man-in-the-middle (MITM) attack, if the eavesdropper is using resistors and noise voltage generators just like the sender and the receiver. The eavesdropper can extract zero bit of information before she is discovered. However, when the eavesdropper is using noise current generators, though the cipher is protected, the eavesdropper may still be able to extract one bit of information while she is discovered. For enhanced security, we expand the KLJN cipher with the comparison of the instantaneous voltages via the public channel. In this way, the sender and receiver has a full control over the security of measurable physical quantities in the Kirchhoff-loop. We show that when the sender and receiver compare not only their instantaneous current data but also their instantaneous voltage data then the zero-bit security holds even for the noise current generator case. We show that the original KLJN scheme is also zero-bit protected against that type of MITM attack when the eavesdropper uses voltage noise generators, only. In conclusion, within the idealized model scheme, the man-in-the-middle-attack does not provide any advantage compared to the regular attack considered earlier. The remaining possibility is the attack by a short, large current pulse, which described in the original paper as the only efficient type of regular attacks, and that yields the one bit security. In conclusion, the KLJN cipher is superior to known quantum communication schemes in every respect, including speed, robustness, maintenance need, price and its natural immunity against the man-in-the-middle attack.

Laszlo B. Kish

2006-02-13T23:59:59.000Z

12

Effects of Impulse Voltage Polarity, Peak Amplitude, and Rise Time on Streamers Initiated From a Needle Electrode in Transformer Oil  

E-Print Network [OSTI]

An electrothermal hydrodynamic model is presented to evaluate effects of the applied lightning impulse voltage parameters such as polarity, magnitude, and rise time on the initiation and propagation of the streamers formed ...

Jadidian, Jouya

13

Photostructured coating on a voltage degrader for a Time Projection Chamber (TPC)  

E-Print Network [OSTI]

Fibreglass-reinforced epoxy (Stesalit) tubes and rods were coated with a photostructured metal layer system of copper, nickel and gold for a voltage degrader built in a particle detector at CERN, Geneva. The metal layers were applied with galvanotechnical processes involving an original photolithographic exposure in three dimensions to produce a complex electrical circuit design able to provide the correct potential to 420 different conductors. The Stesalit substrate material, even after a first layer of electroless copper, is electrically quite resistive, creating problems for the electrodeposition of the subsequent nickel layer. A mathematical simulation of the plating thickness distribution showed that the electrolytic nickel deposition was suitable for short rods but electroless nickel was needed for the long rods. The functional properties of the metallized Stesalit components are satisfactory: no degradation of the gas quality within the Time Projection Chamber is observed; the potential distribution al...

Manaranche, C; Loquet, J L; Serdiouk, V; Scandurra, M; Zucchelli, P

2002-01-01T23:59:59.000Z

14

Security-Aware Resource Allocation for Real-Time Parallel Jobs on Homogeneous  

E-Print Network [OSTI]

processing systems [2], med- ical electronics [9], aircraft control [1], and scientific parallel computing [6 a system framework, security overhead, and parallel applications with deadline and security constraintsSecurity-Aware Resource Allocation for Real-Time Parallel Jobs on Homogeneous and Heterogeneous

Qin, Xiao

15

Weekly Address: Time to Create the Energy Security Trust | Department...  

Broader source: Energy.gov (indexed) [DOE]

approach to American energy -- including a proposal to establish an Energy Security Trust, which invests in research that will help shift our cars and trucks off of...

16

Abstract --When a real time digital simulator, emulating a switched circuit such as a voltage source converter, is interfaced  

E-Print Network [OSTI]

1 Abstract -- When a real time digital simulator, emulating a switched circuit such as a voltage source converter, is interfaced with a digital controller, the controller's firing signals may. Incorrect power flow due to inaccurate firing times and controller errors. 2. Switching jitter due

Lehn, Peter W.

17

Pseudonymous Secure Computation from Time-Lock Puzzles  

E-Print Network [OSTI]

. Taking inspiration from Bitcoin, we show that precise bounds on computational power can be used in place or other forms of setup? Taking inspiration from Bitcoin [31] we show that, indeed, nontrivial security can

18

Run-Time Security Traceability for Evolving Systems1  

E-Print Network [OSTI]

, integrity, authentication and others) and security assumptions on the system environment, can be specified applications (e.g., at BMW [5] and O2 (Germany) [6]). However, it is not enough that the specification

Jurjens, Jan

19

IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 15, NO. 3, AUGUST 2000 1137 A Fast Voltage Security Assessment  

E-Print Network [OSTI]

], the prominent methods in voltage stability analysis are those that find the system load margin, especially when system contingencies are considered. Associated with the curve, the real power margin and with the curve] and Chiang et al. [6] proposed fast curve fitting methods to calculate the limit of the nose curve; while

Venkatasubramanian, Mani V.

20

Privacy Act Fees and Time Limits | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNational Nuclearhas 'Natitude' | NationalADRWindNuclearSecurityNuclearExemptions

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Voltage and Timing Adaptation for Variation and Aging Tolerance in Nanometer VLSI Circuits  

E-Print Network [OSTI]

Process variations and circuit aging continue to be main challenges to the power-efficiency of VLSI circuits, as considerable power budget must be allocated at design time to mitigate timing variations. Modern designs incorporate adaptive techniques...

Shim, Kyu-Nam 1978-

2012-09-10T23:59:59.000Z

22

Integrating Preemption Threshold Scheduling and Dynamic Voltage Scaling for Energy Efficient Real-Time  

E-Print Network [OSTI]

scheduling (PTS) enables designing scalable real-time systems. PTS not only decreases the run-time overhead by the Earliest Dead- line First (EDF) policy. We present an algorithm to compute threshold preemption levels- tion is an important aspect of embedded systems design. Generally speaking, the pro- cessor consumes

Gupta, Rajesh

23

Voltage controlled current source  

DOE Patents [OSTI]

A seven decade, voltage controlled current source is described for use in testing intermediate range nuclear instruments that covers the entire test current range of from 10 picoamperes to 100 microamperes. High accuracy is obtained throughout the entire seven decades of output current with circuitry that includes a coordinated switching scheme responsive to the input signal from a hybrid computer to control the input voltage to an antilog amplifier, and to selectively connect a resistance to the antilog amplifier output to provide a continuous output current source as a function of a preset range of input voltage. An operator controlled switch provides current adjustment for operation in either a real-time simulation test mode or a time response test mode.

Casne, Gregory M. (Pittsburgh, PA)

1992-01-01T23:59:59.000Z

24

Wide Area Security Region Final Report  

SciTech Connect (OSTI)

This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of system parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed technology. Recommendations for the future work have also been formulated.

Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin; Gronquist, James; Du, Pengwei; Nguyen, Tony B.; Burns, J. W.

2010-03-31T23:59:59.000Z

25

Using Secure Real-time Padding Protocol to Secure Voice-over-IP from Traffic Analysis Attacks  

E-Print Network [OSTI]

on encrypted calls. It pads every RTP or SRTP packet to a predefined packet size, adds dummy packets at the end of every burst in a controllable way, adds dummy bursts to hide silence spurts, and hides information about the packet inter-arrival timings...

Mohanty, Saswat

2012-07-16T23:59:59.000Z

26

High voltage pulse conditioning  

DOE Patents [OSTI]

Apparatus for conditioning high voltage pulses from particle accelerators in order to shorten the rise times of the pulses. Flashover switches in the cathode stalk of the transmission line hold off conduction for a determinable period of time, reflecting the early portion of the pulses. Diodes upstream of the switches divert energy into the magnetic and electrostatic storage of the capacitance and inductance inherent to the transmission line until the switches close.

Springfield, Ray M. (Sante Fe, NM); Wheat, Jr., Robert M. (Los Alamos, NM)

1990-01-01T23:59:59.000Z

27

Transient voltage oscillations in coils  

SciTech Connect (OSTI)

Magnet coils may be excited into internal voltage oscillations by transient voltages. Such oscillations may electrically stress the magnet's dielectric components to many times its normal stress. This may precipitate a dielectric failure, and the attendant prolonged loss of service and costly repair work. Therefore, it is important to know the natural frequencies of oscillations of a magnet during the design stage, and to determine whether the expected switching transient voltages can excite the magnet into high-voltage internal oscillations. The series capacitance of a winding significantly affects its natural frequencies. However, the series capacitance is difficult to calculate, because it may comprise complex capacitance network, consisting of intra- and inter-coil turn-to-turn capacitances of the coil sections. A method of calculating the series capacitance of a winding is proposed. This method is rigorous but simple to execute. The time-varying transient voltages along the winding are also calculated.

Chowdhuri, P.

1985-01-01T23:59:59.000Z

28

Y-12 Times, A newsletter for employees and friends of the Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched FerromagnetismWaste and MaterialsWenjun1ofRadiative HeatingInnovationSecurityShift9

29

No-Arbitrage Pricing for Dividend-Paying Securities in Discrete-Time Markets with Transaction Costs  

E-Print Network [OSTI]

We prove a version of First Fundamental Theorem of Asset Pricing under transaction costs for discrete-time markets with dividend-paying securities. Specifically, we show that the no-arbitrage condition under the efficient friction assumption is equivalent to the existence of a risk-neutral measure. We derive dual representations for the superhedging ask and subhedging bid price processes of a derivative contract. Our results are illustrated with a vanilla credit default swap contract.

Bielecki, Tomasz R; Rodriguez, Rodrigo

2012-01-01T23:59:59.000Z

30

SRS employees devote time to 'Days of Caring' | National Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwards SAGE Awards

31

Y-12 Times, newsletter for employees and friends of the Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched FerromagnetismWaste and MaterialsWenjun1ofRadiative

32

Electronic security device  

DOE Patents [OSTI]

The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

1992-03-17T23:59:59.000Z

33

Dielectric-wall linear accelerator with a high voltage fast rise time switch that includes a pair of electrodes between which are laminated alternating layers of isolated conductors and insulators  

DOE Patents [OSTI]

A dielectric-wall linear accelerator is improved by a high-voltage, fast rise-time switch that includes a pair of electrodes between which are laminated alternating layers of isolated conductors and insulators. A high voltage is placed between the electrodes sufficient to stress the voltage breakdown of the insulator on command. A light trigger, such as a laser, is focused along at least one line along the edge surface of the laminated alternating layers of isolated conductors and insulators extending between the electrodes. The laser is energized to initiate a surface breakdown by a fluence of photons, thus causing the electrical switch to close very promptly. Such insulators and lasers are incorporated in a dielectric wall linear accelerator with Blumlein modules, and phasing is controlled by adjusting the length of fiber optic cables that carry the laser light to the insulator surface. 12 figs.

Caporaso, G.J.; Sampayan, S.E.; Kirbie, H.C.

1998-10-13T23:59:59.000Z

34

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

35

Langmuir probe measurements in a time-fluctuating-highly ionized non-equilibrium cutting arc: Analysis of the electron retarding part of the time-averaged current-voltage characteristic of the probe  

SciTech Connect (OSTI)

This work describes the application of Langmuir probe diagnostics to the measurement of the electron temperature in a time-fluctuating-highly ionized, non-equilibrium cutting arc. The electron retarding part of the time-averaged current-voltage characteristic of the probe was analysed, assuming that the standard exponential expression describing the electron current to the probe in collision-free plasmas can be applied under the investigated conditions. A procedure is described which allows the determination of the errors introduced in time-averaged probe data due to small-amplitude plasma fluctuations. It was found that the experimental points can be gathered into two well defined groups allowing defining two quite different averaged electron temperature values. In the low-current region the averaged characteristic was not significantly disturbed by the fluctuations and can reliably be used to obtain the actual value of the averaged electron temperature. In particular, an averaged electron temperature of 0.98 0.07 eV (= 11400 800 K) was found for the central core of the arc (30 A) at 3.5 mm downstream from the nozzle exit. This average included not only a time-average over the time fluctuations but also a spatial-average along the probe collecting length. The fitting of the high-current region of the characteristic using such electron temperature value together with the corrections given by the fluctuation analysis showed a relevant departure of local thermal equilibrium in the arc core.

Prevosto, L.; Mancinelli, B. [Grupo de Descargas Elctricas, Departamento Ing. Electromecnica, Facultad Regional Venado Tuerto (UTN), Laprida 651, Venado Tuerto (2600) Santa Fe (Argentina)] [Grupo de Descargas Elctricas, Departamento Ing. Electromecnica, Facultad Regional Venado Tuerto (UTN), Laprida 651, Venado Tuerto (2600) Santa Fe (Argentina); Kelly, H. [Grupo de Descargas Elctricas, Departamento Ing. Electromecnica, Facultad Regional Venado Tuerto (UTN), Laprida 651, Venado Tuerto (2600) Santa Fe (Argentina) [Grupo de Descargas Elctricas, Departamento Ing. Electromecnica, Facultad Regional Venado Tuerto (UTN), Laprida 651, Venado Tuerto (2600) Santa Fe (Argentina); Instituto de Fsica del Plasma (CONICET), Departamento de Fsica, Facultad de Ciencias Exactas y Naturales (UBA) Ciudad Universitaria Pab. I, 1428 Buenos Aires (Argentina)

2013-12-15T23:59:59.000Z

36

What is Security? A perspective on achieving security  

SciTech Connect (OSTI)

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

37

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

38

INFRASTRUCTURE SECURITY & ENERGY  

E-Print Network [OSTI]

price monitoring #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERYINFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity

Schrijver, Karel

39

High Voltage Safety Act  

Broader source: Energy.gov [DOE]

The purpose of the High Voltage Safety Act is to prevent injury to persons and property and interruptions of utility service resulting from accidental or inadvertent contact with high-voltage...

40

Automatic voltage imbalance detector  

DOE Patents [OSTI]

A device for indicating and preventing damage to voltage cells such as galvanic cells and fuel cells connected in series by detecting sequential voltages and comparing these voltages to adjacent voltage cells. The device is implemented by using operational amplifiers and switching circuitry is provided by transistors. The device can be utilized in battery powered electric vehicles to prevent galvanic cell damage and also in series connected fuel cells to prevent fuel cell damage.

Bobbett, Ronald E. (Los Alamos, NM); McCormick, J. Byron (Los Alamos, NM); Kerwin, William J. (Tucson, AZ)

1984-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

42

Experimental validation of a high voltage pulse measurement method.  

SciTech Connect (OSTI)

This report describes X-cut lithium niobate's (LiNbO3) utilization for voltage sensing by monitoring the acoustic wave propagation changes through LiNbO3 resulting from applied voltage. Direct current (DC), alternating current (AC) and pulsed voltage signals were applied to the crystal. Voltage induced shift in acoustic wave propagation time scaled quadratically for DC and AC voltages and linearly for pulsed voltages. The measured values ranged from 10 - 273 ps and 189 ps - 2 ns for DC and non-DC voltages, respectively. Data suggests LiNbO3 has a frequency sensitive response to voltage. If voltage source error is eliminated through physical modeling from the uncertainty budget, the sensor's U95 estimated combined uncertainty could decrease to ~0.025% for DC, AC, and pulsed voltage measurements.

Cular, Stefan; Patel, Nishant Bhupendra; Branch, Darren W.

2013-09-01T23:59:59.000Z

43

Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

44

Optical voltage reference  

DOE Patents [OSTI]

An optical voltage reference for providing an alternative to a battery source is described. The optical reference apparatus provides a temperature stable, high precision, isolated voltage reference through the use of optical isolation techniques to eliminate current and impedance coupling errors. Pulse rate frequency modulation is employed to eliminate errors in the optical transmission link while phase-lock feedback is employed to stabilize the frequency to voltage transfer function. 2 figures.

Rankin, R.; Kotter, D.

1994-04-26T23:59:59.000Z

45

Voltage Control Technical Conference  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Intro Voltage Control Conference - BPA Active Power Control in Wind Parks - Siemens Interconnection Criteria for Frequency Response Requirements - NERC Model Validation...

46

Voltage verification unit  

DOE Patents [OSTI]

A voltage verification unit and method for determining the absence of potentially dangerous potentials within a power supply enclosure without Mode 2 work is disclosed. With this device and method, a qualified worker, following a relatively simple protocol that involves a function test (hot, cold, hot) of the voltage verification unit before Lock Out/Tag Out and, and once the Lock Out/Tag Out is completed, testing or "trying" by simply reading a display on the voltage verification unit can be accomplished without exposure of the operator to the interior of the voltage supply enclosure. According to a preferred embodiment, the voltage verification unit includes test leads to allow diagnostics with other meters, without the necessity of accessing potentially dangerous bus bars or the like.

Martin, Edward J. (Virginia Beach, VA)

2008-01-15T23:59:59.000Z

47

Characterized ideal LC circuit Charge, current and voltage vary sinusoidally  

E-Print Network [OSTI]

resistance to LC circuit Oscillations become damped Charge, current and voltage still vary sinusoidally Oscillations Draw phasors for voltages of R, C and L at same time t Orient VR, VL, & VC phasors relativeReview Characterized ideal LC circuit Charge, current and voltage vary sinusoidally Added

Bertulani, Carlos A. - Department of Physics and Astronomy, Texas A&M University

48

Voltage balanced multilevel voltage source converter system  

DOE Patents [OSTI]

A voltage balanced multilevel converter for high power AC applications such as adjustable speed motor drives and back-to-back DC intertie of adjacent power systems. This converter provides a multilevel rectifier, a multilevel inverter, and a DC link between the rectifier and the inverter allowing voltage balancing between each of the voltage levels within the multilevel converter. The rectifier is equipped with at least one phase leg and a source input node for each of the phases. The rectifier is further equipped with a plurality of rectifier DC output nodes. The inverter is equipped with at least one phase leg and a load output node for each of the phases. The inverter is further equipped with a plurality of inverter DC input nodes. The DC link is equipped with a plurality of rectifier charging means and a plurality of inverter discharging means. The plurality of rectifier charging means are connected in series with one of the rectifier charging means disposed between and connected in an operable relationship with each adjacent pair of rectifier DC output nodes. The plurality of inverter discharging means are connected in series with one of the inverter discharging means disposed between and connected in an operable relationship with each adjacent pair of inverter DC input nodes. Each of said rectifier DC output nodes are individually electrically connected to the respective inverter DC input nodes. By this means, each of the rectifier DC output nodes and each of the inverter DC input nodes are voltage balanced by the respective charging and discharging of the rectifier charging means and the inverter discharging means.

Peng, Fang Zheng (Oak Ridge, TN); Lai, Jih-Sheng (Knoxville, TN)

1997-01-01T23:59:59.000Z

49

Voltage balanced multilevel voltage source converter system  

DOE Patents [OSTI]

Disclosed is a voltage balanced multilevel converter for high power AC applications such as adjustable speed motor drives and back-to-back DC intertie of adjacent power systems. This converter provides a multilevel rectifier, a multilevel inverter, and a DC link between the rectifier and the inverter allowing voltage balancing between each of the voltage levels within the multilevel converter. The rectifier is equipped with at least one phase leg and a source input node for each of the phases. The rectifier is further equipped with a plurality of rectifier DC output nodes. The inverter is equipped with at least one phase leg and a load output node for each of the phases. The inverter is further equipped with a plurality of inverter DC input nodes. The DC link is equipped with a plurality of rectifier charging means and a plurality of inverter discharging means. The plurality of rectifier charging means are connected in series with one of the rectifier charging means disposed between and connected in an operable relationship with each adjacent pair of rectifier DC output nodes. The plurality of inverter discharging means are connected in series with one of the inverter discharging means disposed between and connected in an operable relationship with each adjacent pair of inverter DC input nodes. Each of said rectifier DC output nodes are individually electrically connected to the respective inverter DC input nodes. By this means, each of the rectifier DC output nodes and each of the inverter DC input nodes are voltage balanced by the respective charging and discharging of the rectifier charging means and the inverter discharging means. 15 figs.

Peng, F.Z.; Lai, J.S.

1997-07-01T23:59:59.000Z

50

Facility Security Checklist U.S. Department of Transportation  

E-Print Network [OSTI]

was the last time security logs and/or incident reports were reviewed? 25. Is there a current security plan

Goodman, Robert M.

51

High voltage DC power supply  

DOE Patents [OSTI]

A high voltage DC power supply having a first series resistor at the output for limiting current in the event of a short-circuited output, a second series resistor for sensing the magnitude of output current, and a voltage divider circuit for providing a source of feedback voltage for use in voltage regulation is disclosed. The voltage divider circuit is coupled to the second series resistor so as to compensate the feedback voltage for a voltage drop across the first series resistor. The power supply also includes a pulse-width modulated control circuit, having dual clock signals, which is responsive to both the feedback voltage and a command voltage, and also includes voltage and current measuring circuits responsive to the feedback voltage and the voltage developed across the second series resistor respectively. 7 figs.

Droege, T.F.

1989-12-19T23:59:59.000Z

52

High voltage DC power supply  

DOE Patents [OSTI]

A high voltage DC power supply having a first series resistor at the output for limiting current in the event of a short-circuited output, a second series resistor for sensing the magnitude of output current, and a voltage divider circuit for providing a source of feedback voltage for use in voltage regulation is disclosed. The voltage divider circuit is coupled to the second series resistor so as to compensate the feedback voltage for a voltage drop across the first series resistor. The power supply also includes a pulse-width modulated control circuit, having dual clock signals, which is responsive to both the feedback voltage and a command voltage, and also includes voltage and current measuring circuits responsive to the feedback voltage and the voltage developed across the second series resistor respectively.

Droege, Thomas F. (Batavia, IL)

1989-01-01T23:59:59.000Z

53

High Temperature, High Voltage Fully Integrated Gate Driver Circuit  

Broader source: Energy.gov (indexed) [DOE]

driver circuit, 5-V on- chip voltage regulator, short-circuit protection, undervoltage lockout, bootstrap capacitor, dead time controller and temperature sensor * 0.8-micron,...

54

ABBGroup-1-High voltage lab  

E-Print Network [OSTI]

oscillations are due to travelling waves in the heating volume. #12;ABBGroup-9- 3-Sep-07 2. High voltage phase interrupts the injected current, it is stressed by the transient recovery voltage (TRV) oscillatingABBGroup-1- 3-Sep-07 High voltage lab Research on high voltage gas circuit breakers Nils P. Basse

Basse, Nils Plesner

55

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

2011-07-21T23:59:59.000Z

56

Electron launching voltage monitor  

DOE Patents [OSTI]

An electron launching voltage monitor measures MITL voltage using a relationship between anode electric field and electron current launched from a cathode-mounted perturbation. An electron launching probe extends through and is spaced from the edge of an opening in a first MITL conductor, one end of the launching probe being in the gap between the MITL conductor, the other end being adjacent a first side of the first conductor away from the second conductor. A housing surrounds the launching probe and electrically connects the first side of the first conductor to the other end of the launching probe. A detector detects the current passing through the housing to the launching probe, the detected current being representative of the voltage between the conductors. 5 figs.

Mendel, C.W.; Savage, M.E.

1992-03-17T23:59:59.000Z

57

A Framework of Concurrent Task Scheduling and Dynamic Voltage and Frequency Scaling in Real-Time Embedded Systems with Energy Harvesting  

E-Print Network [OSTI]

of batteries in conventional battery-powered embedded systems. In particular, the question of how one can achieve full energy autonomy (i.e., perpetual, battery-free operation) of a real-time embedded system harvesting module is comprised of a Photovoltaic (PV) panel for harvesting energy and a supercapacitor

Pedram, Massoud

58

the Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgramApplication ofU CtdballReal3 March 20106

59

the Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgramApplication ofU CtdballReal3 March 201060

60

the Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgramApplication ofU CtdballReal3 March

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

the Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, March 2012  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgramApplication ofU CtdballReal3 MarchW H A T

62

the Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, September 2012  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgramApplication ofU CtdballReal3 MarchW H A

63

the Y-12 times, a newsletter for employees and friends of the Y-12 National Security Complex, February 2012  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgramApplication ofU CtdballReal3 MarchW H A2

64

The Y-12 Times 70th Anniversary, a newsletter for employees and friends of the Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2 andThe MolecularPlaceThe publication of

65

The Y-12 Times, Nov 2009, a newsletter for employees and friends of the Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2 andThe MolecularPlaceThe publication of Volume 8,41

66

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2 andThe MolecularPlaceThe publication of Volume 8,4184

67

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2 andThe MolecularPlaceThe publication of Volume 8,41842

68

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2 andThe MolecularPlaceThe publication of Volume

69

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2 andThe MolecularPlaceThe publication of Volume7 August

70

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2 andThe MolecularPlaceThe publication of Volume7

71

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2 andThe MolecularPlaceThe publication of Volume75 June

72

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2 andThe MolecularPlaceThe publication of Volume75 June9

73

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2 andThe MolecularPlaceThe publication of Volume75

74

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2 andThe MolecularPlaceThe publication of Volume75Women

75

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2 andThe MolecularPlaceThe publication of

76

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, April 2010  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2 andThe MolecularPlaceThe publication of4 April 2010

77

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, April 2012  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2 andThe MolecularPlaceThe publication of4 April 20104

78

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, January 2012  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2 andThe MolecularPlaceThe publication of4 April 201041

79

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, July 2009  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2 andThe MolecularPlaceThe publication of4 April 2010417

80

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, July 2012  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2 andThe MolecularPlaceThe publication of4 April

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, March 2011  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2 andThe MolecularPlaceThe publication of4 April2 March

82

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, May 2010  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2 andThe MolecularPlaceThe publication of4 April2 March5

83

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complx, April 2011  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2 andThe MolecularPlaceThe publication of4 April23 April

84

Neurocomputing 69 (2006) 10621065 Dependence of the spike-triggered average voltage on  

E-Print Network [OSTI]

.V. All rights reserved. Keywords: Spike-triggered voltage; h-current; Damped voltage oscillations 1 oscillations. The model comprises a variable v for the membrane voltage, with time-scale tv and a secondNeurocomputing 69 (2006) 10621065 Dependence of the spike-triggered average voltage on membrane

Gerstner, Wulfram

2006-01-01T23:59:59.000Z

85

Real Time Grid Reliability Management 2005  

E-Print Network [OSTI]

Reactive Power Reserve Work Group, Western ElectricityReactive Voltage Security Assessment Wide Area Network Western Area Power Administration Western Electricity

Eto, Joe

2008-01-01T23:59:59.000Z

86

REAL TIME SYSTEM OPERATIONS 2006-2007  

E-Print Network [OSTI]

ReactivePowerReserveWorkGroup,WesternElectricityReactive North American Electric Reliability Corporation Western ElectricityReactive VoltageSecurityAssessment WesternAreaPowerAdministration Wide?areaSecurityAssessment WesternElectricity

Eto, Joseph H.

2008-01-01T23:59:59.000Z

87

Safety, Security & Fire Report  

E-Print Network [OSTI]

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

88

Lowering of the firing voltage and reducing of the discharge delay time in alternating current plasma display panels by a discontinuous spin-coated LaB{sub 6} film on the MgO protective layer  

SciTech Connect (OSTI)

A spin coated LaB{sub 6} discontinuous film is covered on MgO protective layer to improve the discharge performance of alternating current plasma display panels. Under the premise of high transmittance of more than 90%, a very small amount of polycrystal LaB{sub 6} powders added in an organic solvent are chosen as the coating solution. The discharge characteristics results show that with 250 torr 5% Xe-Ne pressure, the firing voltage and discharge delay time of the test panel with LaB{sub 6}/MgO double protective layer are decreased by 13.4% and 36.5%, respectively, compared with that of conventional MgO protective layer, likely owing to the low work function of LaB{sub 6.} Furthermore, the aging time of the proposed structure is comparable to that of pure MgO protective layer. Therefore, it will not increase the production costs and is highly suitable to be applied for alternating current plasma display panels with low electrical power consumption.

Deng, Jiang, E-mail: dj78291@163.com [School of Physical Electronic, University of Electronic Science and Technology of China, No.4, Section 2, Jianshe North Road, 610054 Chengdu (China)] [School of Physical Electronic, University of Electronic Science and Technology of China, No.4, Section 2, Jianshe North Road, 610054 Chengdu (China); Zeng, Baoqing [School of Physical Electronic, University of Electronic Science and Technology of China, No.4, Section 2, Jianshe North Road, 610054 Chengdu (China) [School of Physical Electronic, University of Electronic Science and Technology of China, No.4, Section 2, Jianshe North Road, 610054 Chengdu (China); Zhongshan Institute, University of Electronic Science and Technology of China, 528402 zhongshan (China); Wang, Xiaoju; Lin, Zulun; Qi, Kangcheng; Cao, Guichuan [School of Opto-electronic Information, University of Electronic Science and Technology of China, No.4, Section 2, Jianshe North Road, 610054 Chengdu (China)] [School of Opto-electronic Information, University of Electronic Science and Technology of China, No.4, Section 2, Jianshe North Road, 610054 Chengdu (China)

2014-03-15T23:59:59.000Z

89

Charge-pump voltage converter  

DOE Patents [OSTI]

A charge-pump voltage converter for converting a low voltage provided by a low-voltage source to a higher voltage. Charge is inductively generated on a transfer rotor electrode during its transit past an inductor stator electrode and subsequently transferred by the rotating rotor to a collector stator electrode for storage or use. Repetition of the charge transfer process leads to a build-up of voltage on a charge-receiving device. Connection of multiple charge-pump voltage converters in series can generate higher voltages, and connection of multiple charge-pump voltage converters in parallel can generate higher currents. Microelectromechanical (MEMS) embodiments of this invention provide a small and compact high-voltage (several hundred V) voltage source starting with a few-V initial voltage source. The microscale size of many embodiments of this invention make it ideally suited for MEMS- and other micro-applications where integration of the voltage or charge source in a small package is highly desirable.

Brainard, John P. (Albuquerque, NM); Christenson, Todd R. (Albuquerque, NM)

2009-11-03T23:59:59.000Z

90

INTEGRATED GHz VOLTAGE CONTROLLED OSCILLATORS  

E-Print Network [OSTI]

INTEGRATED GHz VOLTAGE CONTROLLED OSCILLATORS Peter Kinget Bell Labs - Lucent Technologies Murray Hill, NJ (USA) Abstract The voltage controlled oscillator (VCO) is a critical sub. We focus on the de- sign of a critical sub-block: the voltage controlled oscillator (VCO). We review

Kinget, Peter

91

National Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

92

REFINED RFP LOOP VOLTAGE CALCULATION J.C. Sprott  

E-Print Network [OSTI]

is the stored magnetic energy, Up is the plasma energy, and 'E is the global energy confinement time, which-of-merit for RFP devices is the loop voltage. Low loop voltage implies high plasma temperature and long energy is smallest if the loop is as close to the outside of the shell and as far from the primary windings

Sprott, Julien Clinton

93

Ignition distributor voltage generator  

SciTech Connect (OSTI)

This patent describes a voltage pulse generator and ignition distributor comprising, a base, a shaft rotatably supported by the base, a distributor cap supported by the base having a center electrode and circumferentially spaced outer electrodes. The pulse generator and ignition distribution also include a first rotor driven by the shaft formed of electrical insulating material having electrically conductive means connected to the center terminal and a portion that rotates past the outer electrodes. The portion of the electrically conductive means that rotates past the outer electrodes is spaced from the outer electrodes to form a gap therebetween. A voltage pulse generator comprises a second rotor driven by the shaft, at least one permanent magnet and an annular pickup coil supported by the base. The pickup coil has inner turns and outer turns, the beginning turn of the inner turns connected to a first lead and the last turn of the outer turns connected to a second lead, the outer turns enclosing the inner turns. The pickup coil also has a circuit connected directly between the second lead and ground which is operative to provide a direct conductive path to ground for high frequency energy capacitively coupled to the outer turns from the gap discharge between the electrically conductive means of the first rotor and an outer electrode, the outer turns forming a grounded shield for the inner turns.

Boyer, J.A.

1986-11-04T23:59:59.000Z

94

Incidents of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

95

Wide-range voltage modulation  

SciTech Connect (OSTI)

The Superconducting Super Collider`s Medium Energy Booster Abort (MEBA) kicker modulator will supply a current pulse to the abort magnets which deflect the proton beam from the MEB ring into a designated beam stop. The abort kicker will be used extensively during testing of the Low Energy Booster (LEB) and the MEB rings. When the Collider is in full operation, the MEBA kicker modulator will abort the MEB beam in the event of a malfunction during the filling process. The modulator must generate a 14-{mu}s wide pulse with a rise time of less than 1 {mu}s, including the delay and jitter times. It must also be able to deliver a current pulse to the magnet proportional to the beam energy at any time during ramp-up of the accelerator. Tracking the beam energy, which increases from 12 GeV at injection to 200 GeV at extraction, requires the modulator to operate over a wide range of voltages (4 kV to 80 kV). A vacuum spark gap and a thyratron have been chosen for test and evaluation as candidate switches for the abort modulator. Modulator design, switching time delay, jitter and pre-fire data are presented.

Rust, K.R.; Wilson, J.M.

1992-06-01T23:59:59.000Z

96

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

97

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

98

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

99

Global security  

SciTech Connect (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

100

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Humidity, Temperature, and Voltage (Presentation)  

SciTech Connect (OSTI)

An update is given on the work of the PV Quality Assurance Task Force; Group 3: studying the effects of humidity, temperature, and voltage bias.

Wohlgemuth, J.

2012-03-01T23:59:59.000Z

102

DECENTRALIZED CONTROL ARCHITECTURE FOR COUPLING MICROGRIDS INTO DISTRIBUTION NETWORKS 1 Task 1: Coupling Low-Voltage Microgrids into  

E-Print Network [OSTI]

DECENTRALIZED CONTROL ARCHITECTURE FOR COUPLING MICROGRIDS INTO DISTRIBUTION NETWORKS 1 Task 1: Coupling Low-Voltage Microgrids into Mid-Voltage Distribution Systems Zhao Wang, Student Member, IEEE-voltage (LV) microgrids. At the same time, reactive power is dispatched coordinatively so that voltage

Lemmon, Michael

103

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

2004-07-08T23:59:59.000Z

104

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

105

Secure control systems with application to cyber-physical systems  

SciTech Connect (OSTI)

Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

Dong, Jin [ORNL] [ORNL; Djouadi, Seddik M [ORNL] [ORNL; Nutaro, James J [ORNL] [ORNL; Kuruganti, Phani Teja [ORNL] [ORNL

2014-01-01T23:59:59.000Z

106

Milligram-Scale High-Voltage Power Electronics for Piezoelectric Microrobots  

E-Print Network [OSTI]

, the generation of high voltages for HMF actu- ators requires voltage conversion circuits with step-up ratios to the voltage step-up functionality, the power electronics circuitry must generate a time-varying signal ranging from 50 to 100. While there are a number of circuit topologies with high step-up ratios, many

Wood, Robert

107

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

108

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

2011-06-20T23:59:59.000Z

109

Low voltage nonprimary explosive detonator  

DOE Patents [OSTI]

A low voltage, electrically actuated, nonprimary explosive detonator is disclosed wherein said detonation is achieved by means of an explosive train in which a deflagration-to-detonation transition is made to occur. The explosive train is confined within a cylindrical body and positioned adjacent to low voltage ignition means have electrical leads extending outwardly from the cylindrical confining body. Application of a low voltage current to the electrical leads ignites a self-sustained deflagration in a donor portion of the explosive train which then is made to undergo a transition to detonation further down the train.

Dinegar, Robert H. (Los Alamos, NM); Kirkham, John (Newbury, GB2)

1982-01-01T23:59:59.000Z

110

Method of Controlling Corona Effects and Breakdown Voltage of Small Air Gaps Stressed by Impulse Voltages  

E-Print Network [OSTI]

This paper investigates the influence of a resistor on the dielectric behavior of an air gap. The resistor is connected in series with the air gap and the latter is stressed by impulse voltage. Air gap arrangements of different geometry with either the rod or the plate grounded are stressed with impulse voltages of both positive and negative polarity. The resistor is connected in series with the air gap in the return circuit connecting the gap with the impulse generator. The method followed involves the investigation of the graphs of the charging time concerning the air gaps capacitances, in connection to the value of the resistor, the geometry of the gap, the effect of grounding and the polarity effect. It is determined that the charging time of the air gap increases, as the value of the resistor increases. It is also determined that the peak voltage value of the fully charged air gap decreases as the value of the resistor increases. The results of the mathematical and simulation analysis are compared with the results of the oscillograms taken from experimental work. In addition and consequently to the above results it is concluded from the experimental work that the in series connection of the resistor in the circuit has significant influence on corona pulses (partial discharges) occurring in the gap and on the breakdown voltage of the gap. A new method of controlling the corona effects and consequently the breakdown voltage of small air gaps stressed by impulse voltage of short duration in connection to the ground effect and the polarity effect has arisen. Furthermore through mathematical analysis of the charging graphs obtained from simulation and experimental oscillograms there was a calculation of the values of the capacitance of the air gaps in relation to their geometry and the results were compared to the values calculated with mathematical analysis.

Athanasios Maglaras; Trifon Kousiouris; Frangiskos Topalis; Dimitrios Katsaros; Leandros A. Maglaras; Konstantina Giannakopoulou

2014-10-15T23:59:59.000Z

111

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

112

Voltage tunable microwave ferrite resonator  

E-Print Network [OSTI]

A novel method of implementing a tunable resonator using an applied voltage is presented. Stress is used to tune a microstrip resonator fabricated on a polycrystalline ferrite substrate. The stress was applied either ...

Oates, Daniel E.

113

Saving Megawatts with Voltage Optimization  

E-Print Network [OSTI]

that had been installed at several electric utility distribution substations in the U.S. and Canada. These systems, being operated in Conservation Voltage Regulation mode, have provided significant energy conservation where they have been installed...

Wilson, T.; Bell, D.

2010-01-01T23:59:59.000Z

114

LM111/LM211/LM311 Voltage Comparator  

E-Print Network [OSTI]

LM111/LM211/LM311 Voltage Comparator 1.0 General Description The LM111, LM211 and LM311 are voltage comparators that have input currents nearly a thousand times lower than devices like the LM106 or LM710A. Both the inputs and the outputs of the LM111, LM211 or the LM311 can be isolated from system ground

Lanterman, Aaron

115

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6.

2011-06-20T23:59:59.000Z

116

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

117

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

118

Securing Distributed Storage: Challenges, Techniques, and Systems  

E-Print Network [OSTI]

important security issues related to storage and present a comprehensive survey of the security services, present a critical review of the existing solutions, compare them, and highlight potential research issues time, recent trends in data outsourcing have raised many new privacy issues making security a crucial

Kim, Dae-Shik

119

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

120

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network [OSTI]

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Voltage, energy and power in electric circuits  

E-Print Network [OSTI]

Voltage, energy and power in electric circuits Science teaching unit #12;Disclaimer The Department-2008DVD-EN Voltage, energy and power in electric circuits #12;#12; Crown copyright 2008 1The National Strategies | Secondary Voltage, energy and power in electric circuits 00094-2008DVD-EN Contents Voltage

Berzins, M.

122

Ancillary service details: Voltage control  

SciTech Connect (OSTI)

Voltage control is accomplished by managing reactive power on an alternating-current power system. Reactive power can be produced and absorbed by both generation and transmission equipment. Reactive-power devices differ substantially in the magnitude and speed of response and in their capital costs. System operators, transmission owners, generators, customers, power marketers, and government regulators need to pay close attention to voltage control as they restructure the U.S. electricity industry. Voltage control can affect reliability and commerce in three ways: (1) Voltages must be maintained within an acceptable range for both customer and power-system equipment to function properly. (2) The movement of reactive power consumes transmission resources, which limits the ability to move real power and worsens congestion. (3) The movement of reactive power results in real-power losses. When generators are required to supply excessive amounts of reactive power, their real-power production must be curtailed. These opportunity costs are not currently compensated for in most regions. Current tariffs are based on embedded costs. These embedded-cost tariffs average about $0.51/MWh, equivalent to $1.5 billion annually for the United States as a whole. Although this cost is low when compared with the cost of energy, it still aggregates to a significant amount of money. This report takes a basic look at why the power system requires reactive power (an appendix explains the fundamentals of real and reactive power). The report then examines the various types of generation and transmission resources used to supply reactive power and to control voltage. Finally it discusses how these resources are deployed and paid for in several reliability regions around the country. As the U.S. electricity industry is restructured, the generation, transmission, and system-control equipment and functions that maintain voltages within the appropriate ranges are being deintegrated.

Kirby, B.; Hirst, E.

1997-12-01T23:59:59.000Z

123

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

124

Developing Secure Power Systems Professional Competence: Alignment...  

Broader source: Energy.gov (indexed) [DOE]

workforce development resources that can aid in the accelerating need for Secure Power Systems Professionals, while at the same time identifying capabilities and competencies to...

125

Security seal  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

126

Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices  

E-Print Network [OSTI]

Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices Bo Chen--Cyber security is becoming a major concern of smart grids, as the functionality of a smart grid is highly on smart grids. This paper discusses several types of cyber attacks. Then, it presents results of studies

Kundur, Deepa

127

Modulated voltage metastable ionization detector  

SciTech Connect (OSTI)

Metastable ionization detectors used for chromatographic analysis usually employa fixed high voltage for the ionization potential. For this reason, the operating range is limited to about three orders of magnitude. By use of the technique disclosed in the instant invention, operating ranges of about nine orders of magnitude are obtained. The output current from a metastable ionization detector (MID) is applied to a modulation voltage circuit. An adjustment is made to balance out the background current, and an output current, above background, is applied to an input of a strip chart recorder. For low level concentrations, i.e., low detected output current, the ionization potential will be at a maximum and the metastable ionization detector will operate at its most sensitive level. When the detected current from the metastable ionization detector increases above a predetermined threshold level, a voltage control circuit is activated which turns on a high voltage transistor which acts to reduce the ionization potential. The ionization potential applied to the metastable ionization detector is then varied so as to maintain the detected signal level constant. The variation in ionization potential is now related to the concentration fo the constituent and a representative amplitude is applied to another input of said strip chart recorder.

Carle, G. C.; Humphry, D. E.; Kojiro, D. R.

1985-08-27T23:59:59.000Z

128

Cyberspace security system  

SciTech Connect (OSTI)

A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

2014-06-24T23:59:59.000Z

129

High voltage photovoltaic power converter  

DOE Patents [OSTI]

An array of independently connected photovoltaic cells on a semi-insulating substrate contains reflective coatings between the cells to enhance efficiency. A uniform, flat top laser beam profile is illuminated upon the array to produce electrical current having high voltage. An essentially wireless system includes a laser energy source being fed through optic fiber and cast upon the photovoltaic cell array to prevent stray electrical signals prior to use of the current from the array. Direct bandgap, single crystal semiconductor materials, such as GaAs, are commonly used in the array. Useful applications of the system include locations where high voltages are provided to confined spaces such as in explosive detonation, accelerators, photo cathodes and medical appliances.

Haigh, Ronald E. (Arvada, CO); Wojtczuk, Steve (Cambridge, MA); Jacobson, Gerard F. (Livermore, CA); Hagans, Karla G. (Livermore, CA)

2001-01-01T23:59:59.000Z

130

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, Vol. 10, No. 6, June 2010  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2 andThe MolecularPlaceThe publication of4 April2

131

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

132

Onset voltage of corona on coated conductors  

SciTech Connect (OSTI)

This paper is aimed for investigating the effect of surface coating on the positive and negative onset voltages of corona from stressed conductor as a pre-requisite for onset-voltage calculation. The electric field is accurately calculated by the charge simulation technique. The calculated onset voltages agreed satisfactorily with those measured experimentally for bare conductors. The effect of coating-layer thickness and permittivity as well as conductor radius and height on the onset-voltage values is discussed.

Abdel-Salam, M. [Assiut Univ. (Egypt). Electrical Engineering Dept.; Abo-Shal, Y. [SCECO-East, Dammam (Saudi Arabia). Electrical Engineering Div.

1995-12-31T23:59:59.000Z

133

FOILFEST :community enabled security.  

SciTech Connect (OSTI)

The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

2005-09-01T23:59:59.000Z

134

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

135

REAL TIME SYSTEM OPERATIONS 2006-2007  

SciTech Connect (OSTI)

The Real Time System Operations (RTSO) 2006-2007 project focused on two parallel technical tasks: (1) Real-Time Applications of Phasors for Monitoring, Alarming and Control; and (2) Real-Time Voltage Security Assessment (RTVSA) Prototype Tool. The overall goal of the phasor applications project was to accelerate adoption and foster greater use of new, more accurate, time-synchronized phasor measurements by conducting research and prototyping applications on California ISO's phasor platform - Real-Time Dynamics Monitoring System (RTDMS) -- that provide previously unavailable information on the dynamic stability of the grid. Feasibility assessment studies were conducted on potential application of this technology for small-signal stability monitoring, validating/improving existing stability nomograms, conducting frequency response analysis, and obtaining real-time sensitivity information on key metrics to assess grid stress. Based on study findings, prototype applications for real-time visualization and alarming, small-signal stability monitoring, measurement based sensitivity analysis and frequency response assessment were developed, factory- and field-tested at the California ISO and at BPA. The goal of the RTVSA project was to provide California ISO with a prototype voltage security assessment tool that runs in real time within California ISO?s new reliability and congestion management system. CERTS conducted a technical assessment of appropriate algorithms, developed a prototype incorporating state-of-art algorithms (such as the continuation power flow, direct method, boundary orbiting method, and hyperplanes) into a framework most suitable for an operations environment. Based on study findings, a functional specification was prepared, which the California ISO has since used to procure a production-quality tool that is now a part of a suite of advanced computational tools that is used by California ISO for reliability and congestion management.

Eto, Joseph H.; Parashar, Manu; Lewis, Nancy Jo

2008-08-15T23:59:59.000Z

136

Security guide for subcontractors  

SciTech Connect (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

137

Control of Analyte Electrolysis in Electrospray Ionization Mass Spectrometry Using Repetitively Pulsed High Voltage  

SciTech Connect (OSTI)

Analyte electrolysis using a repetitively pulsed high voltage ion source was investigated and compared to that using a regular, continuously operating direct current high voltage ion source in electrospray ionization mass spectrometry. The extent of analyte electrolysis was explored as a function of the length and frequency of the high voltage pulse using the model compound reserpine in positive ion mode. Using +5 kV as the maximum high voltage amplitude, reserpine was oxidized to its 2, 4, 6 and 8-electron oxidation products when direct current high voltage was employed. In contrast, when using a pulsed high voltage, oxidation of reserpine was eliminated by employing the appropriate high voltage pulse length and frequency. This effect was caused by inefficient mass transport of the analyte to the electrode surface during the duration of the high voltage pulse and the subsequent relaxation of the emitter electrode/ electrolyte interface during the time period when the high voltage was turned off. This mode of ESI source operation allows for analyte electrolysis to be quickly and simply switched on or off electronically via a change in voltage pulse variables.

Kertesz, Vilmos [ORNL; Van Berkel, Gary J [ORNL

2011-01-01T23:59:59.000Z

138

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

139

Global Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Nuclear Security Both DOE and the National Nuclear Security Administration are working to reduce the risk of nuclear proliferation and provide technologies to improve...

140

Low power, scalable multichannel high voltage controller  

DOE Patents [OSTI]

A low voltage control circuit is provided for individually controlling high voltage power provided over bus lines to a multitude of interconnected loads. An example of a load is a drive for capillary channels in a microfluidic system. Control is distributed from a central high voltage circuit, rather than using a number of large expensive central high voltage circuits to enable reducing circuit size and cost. Voltage is distributed to each individual load and controlled using a number of high voltage controller channel switches connected to high voltage bus lines. The channel switches each include complementary pull up and pull down photo isolator relays with photo isolator switching controlled from the central high voltage circuit to provide a desired bus line voltage. Switching of the photo isolator relays is further controlled in each channel switch using feedback from a resistor divider circuit to maintain the bus voltage swing within desired limits. Current sensing is provided using a switched resistive load in each channel switch, with switching of the resistive loads controlled from the central high voltage circuit.

Stamps, James Frederick (Livermore, CA); Crocker, Robert Ward (Fremont, CA); Yee, Daniel Dadwa (Dublin, CA); Dils, David Wright (Fort Worth, TX)

2006-03-14T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Low power, scalable multichannel high voltage controller  

DOE Patents [OSTI]

A low voltage control circuit is provided for individually controlling high voltage power provided over bus lines to a multitude of interconnected loads. An example of a load is a drive for capillary channels in a microfluidic system. Control is distributed from a central high voltage circuit, rather than using a number of large expensive central high voltage circuits to enable reducing circuit size and cost. Voltage is distributed to each individual load and controlled using a number of high voltage controller channel switches connected to high voltage bus lines. The channel switches each include complementary pull up and pull down photo isolator relays with photo isolator switching controlled from the central high voltage circuit to provide a desired bus line voltage. Switching of the photo isolator relays is further controlled in each channel switch using feedback from a resistor divider circuit to maintain the bus voltage swing within desired limits. Current sensing is provided using a switched resistive load in each channel switch, with switching of the resistive loads controlled from the central high voltage circuit.

Stamps, James Frederick (Livermore, CA); Crocker, Robert Ward (Fremont, CA); Yee, Daniel Dadwa (Dublin, CA); Dils, David Wright (Fort Worth, TX)

2008-03-25T23:59:59.000Z

142

Dynamic Voltage Regulation Using Distributed Energy Resources  

SciTech Connect (OSTI)

Many distributed energy resources (DE) are near load centres and equipped with power electronics converters to interface with the grid, therefore it is feasible for DE to provide ancillary services such as voltage regulation, nonactive power compensation, and power factor correction. A synchronous condenser and a microturbine with an inverter interface are implemented in parallel in a distribution system to regulate the local voltage. Voltage control schemes of the inverter and the synchronous condenser are developed. The experimental results show that both the inverter and the synchronous condenser can regulate the local voltage instantaneously, while the dynamic response of the inverter is faster than the synchronous condenser; and that integrated voltage regulation (multiple DE perform voltage regulation) can increase the voltage regulation capability, increase the lifetime of the equipment, and reduce the capital and operation costs.

Xu, Yan [ORNL; Rizy, D Tom [ORNL; Li, Fangxing [ORNL; Kueck, John D [ORNL

2007-01-01T23:59:59.000Z

143

Voltage Vehicles | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov PtyInformationSEDS data Jump to: navigation, search ToolVoith HydroVoltage

144

Bright and fast voltage reporters across the visible spectrum via electrochromic FRET (eFRET)  

E-Print Network [OSTI]

We present a palette of brightly fluorescent genetically encoded voltage indicators (GEVIs) with excitation and emission peaks spanning the visible spectrum, sensitivities from 6 - 10% Delta F/F per 100 mV, and half-maximal response times from 1 - 7 ms. A fluorescent protein is fused to an Archaerhodopsin-derived voltage sensor. Voltage-induced shifts in the absorption spectrum of the rhodopsin lead to voltage-dependent nonradiative quenching of the appended fluorescent protein. Through a library screen, we identified linkers and fluorescent protein combinations which reported neuronal action potentials in cultured rat hippocampal neurons with a single-trial signal-to-noise ratio from 6.6 to 11.6 in a 1 kHz imaging bandwidth at modest illumination intensity. The freedom to choose a voltage indicator from an array of colors facilitates multicolor voltage imaging, as well as combination with other optical reporters and optogenetic actuators.

Zou, Peng; Douglass, Adam D; Hochbaum, Daniel R; Brinks, Daan; Werley, Christopher A; Harrison, D Jed; Campbell, Robert E; Cohen, Adam E

2014-01-01T23:59:59.000Z

145

Security guide for subcontractors  

SciTech Connect (OSTI)

This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

Adams, R.C.

1993-06-01T23:59:59.000Z

146

Barriers to creating a secure MPI  

SciTech Connect (OSTI)

This paper explores some of the many issues in developing security enhanced MPI for embedded real-time systems supporting the Department of Defense`s Multi-level Security policy (DoD MLS) are presented along with the preliminary design for such an MPI variant. In addition some of the many issues that need to be addressed in creating security enhanced versions of MPI for other domains are discussed. 19 refs.

Brightwell, R.; Greenberg, D.S.; Matt, B.J. [Sandia National Labs., Albuquerque, NM (United States); Davida, G.I. [Univ. of Wisconsin, Milwaukee, WI (United States). Dept. of Computer Sciences

1997-08-01T23:59:59.000Z

147

A New Bifurcation Analysis for Power System Dynamic Voltage Stability Studies  

E-Print Network [OSTI]

a specific system configuration and the operation condition. For a power system, the typical state variables are the time dependent generator voltages (For different generator models, the variables of generator voltages as the variables of the exciter, speed governor and so on; sometimes the dynamics of the load behavior will also

148

DECENTRALIZED VOLTAGE CONTROL TO MINIMIZE DISTRIBUTION LOSSES IN AN ISLANDED MICROGRID  

E-Print Network [OSTI]

power sources and energy storage systems such as batteries requires new power and voltage control-time voltage control algorithm that minimizes power losses for a microgrid supported by inverter based Microgrids can bring electricity power to rural communities or isolated military forward operation bases

Peng, Huei

149

Voltage controlled MESFET pulse shape generator  

SciTech Connect (OSTI)

A programmable pulse shape generator capable of producing pulse shapes for Nova and Beamlet has been designed and simulated using the circuit code SPICE. The design utilizes power MESFETS, which are commonly used in microwave amplifiers. The pulse shape is varied by setting a bias voltage on each in a chain of MESFETS with a 200 ps temporal resolution. The electrical pulse then drives an integrated electro-optic modulator similar to what is on Beamlet. Pulse shapes 22 and 25, used on Nova, have been generated by this design. There is no fundamental barrier to making such a pulse generator for use on the National Ignition Facility. In fact, the longer time scales on the NIF pulse will ease the high speed requirements of the pulse shape generator allowing the use of less expensive components. The next step will be to build a prototype circuit for initial testing on Beamlet and Nova.

Burkhart, S.C.

1994-10-26T23:59:59.000Z

150

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

151

Personnel Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

152

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

153

Wind Power Plant Voltage Stability Evaluation: Preprint  

SciTech Connect (OSTI)

Voltage stability refers to the ability of a power system to maintain steady voltages at all buses in the system after being subjected to a disturbance from a given initial operating condition. Voltage stability depends on a power system's ability to maintain and/or restore equilibrium between load demand and supply. Instability that may result occurs in the form of a progressive fall or rise of voltages of some buses. Possible outcomes of voltage instability are the loss of load in an area or tripped transmission lines and other elements by their protective systems, which may lead to cascading outages. The loss of synchronism of some generators may result from these outages or from operating conditions that violate a synchronous generator's field current limit, or in the case of variable speed wind turbine generator, the current limits of power switches. This paper investigates the impact of wind power plants on power system voltage stability by using synchrophasor measurements.

Muljadi, E.; Zhang, Y. C.

2014-09-01T23:59:59.000Z

154

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

155

High voltage load resistor array  

DOE Patents [OSTI]

A high voltage resistor comprising an array of a plurality of parallel electrically connected resistor elements each containing a resistive solution, attached at each end thereof to an end plate, and about the circumference of each of the end plates, a corona reduction ring. Each of the resistor elements comprises an insulating tube having an electrode inserted into each end thereof and held in position by one or more hose clamps about the outer periphery of the insulating tube. According to a preferred embodiment, the electrode is fabricated from stainless steel and has a mushroom shape at one end, that inserted into the tube, and a flat end for engagement with the end plates that provides connection of the resistor array and with a load.

Lehmann, Monty Ray (Smithfield, VA)

2005-01-18T23:59:59.000Z

156

Group 3: Humidity, Temperature, and Voltage (Presentation)  

SciTech Connect (OSTI)

Group 3 is chartered to develop accelerated stress tests that can be used as comparative predictors of module lifetime versus stresses associated with humidity, temperature and voltage.

Wohlgemuth, J.

2013-05-01T23:59:59.000Z

157

High Voltage Electrolyte for Lithium Batteries  

Broader source: Energy.gov (indexed) [DOE]

battery using high voltage high energy cathode materials to enable large-scale, cost competitive production of the next generation of electric-drive vehicles. To...

158

Lockout device for high voltage circuit breaker  

SciTech Connect (OSTI)

An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the respective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.

Kozlowski, L.J.; Shirey, L.A.

1993-01-26T23:59:59.000Z

159

Lockout device for high voltage circuit breaker  

DOE Patents [OSTI]

An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the repsective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.

Kozlowski, Lawrence J. (New Kensington, PA); Shirey, Lawrence A. (North Huntingdon, PA)

1993-01-01T23:59:59.000Z

160

Lookout device for high voltage circuit breaker  

SciTech Connect (OSTI)

An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the respective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.

Kozlowski, L.J.; Shirey, L.A.

1991-12-31T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Security & Sustainability College of Charleston  

E-Print Network [OSTI]

Security & Sustainability POLI 399 College of Charleston Fall 2013 Day/Time: T/H; 10@cofc.edu Office: 284 King Street, #206 (Office of Sustainability) Office Hours: by appt or virtual apt Instructor is that if sustained well-being and prosperity of human and ecological systems is the goal of sustainability

Young, Paul Thomas

162

Timing discriminator using leading-edge extrapolation  

DOE Patents [OSTI]

A discriminator circuit to recover timing information from slow-rising pulses by means of an output trailing edge, a fixed time after the starting corner of the input pulse, which is nearly independent of risetime and threshold setting is described. This apparatus comprises means for comparing pulses with a threshold voltage; a capacitor to be charged at a certain rate when the input signal is one-third threshold voltage, and at a lower rate when the input signal is two-thirds threshold voltage; current-generating means for charging the capacitor; means for comparing voltage capacitor with a bias voltage; a flip-flop to be set when the input pulse reaches threshold voltage and reset when capacitor voltage reaches the bias voltage; and a clamping means for discharging the capacitor when the input signal returns below one-third threshold voltage.

Gottschalk, B.

1981-07-30T23:59:59.000Z

163

Capturing power at higher voltages from arrays of microbial fuel cells without voltage reversal  

E-Print Network [OSTI]

is too low to be used directly for many practical applications. For example, a single light emitting diode (LED) requires a minimum voltage of 2 V.2 Thus, effective methods of boosting MFC voltages

164

The Constant Voltage Transformer (CVT) for Mitigating Effects of Voltage Sags on Industrial Equipment  

E-Print Network [OSTI]

) an increase in loads that use power electronics in some type of power conversion configuration [1][2]. This paper presents applications of the constant-voltage transformer (CVT) for mitigating the effects of electric service voltage sags on industrial...

Ferraro, R. J.; Osborne, R.; Stephens, R.

165

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security: Defense in Depth Strategies The Chief Information Officer (CIO) at the U 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program...

166

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue...

167

Fiber-optic voltage sensor with cladded fiber and evanescent wave variation detection  

DOE Patents [OSTI]

A fiber optic voltage sensor is described which includes a source of light, a reference fiber for receiving a known percentage of the light and an electrostrictive element having terminals across which is applied, a voltage to be measured. The electrostrictive element is responsive to the applied voltage to assume an altered physical state. A measuring fiber also receives a known percentage of light from the light source and is secured about the electrostrictive element. The measuring fiber is provided with a cladding and exhibits an evanescent wave in the cladding. The measuring fiber has a known length which is altered when the electrostrictive element assumes its altered physical state. A differential sensor is provided which senses the intensity of light in both the reference fiber and the measuring fiber and provides an output indicative of the difference between the intensities. 3 figs.

Wood, C.B.

1992-12-15T23:59:59.000Z

168

Voltage Collapse SimulationVoltage Collapse Simulation (Eastern Interconnection(Eastern Interconnection  

E-Print Network [OSTI]

PSERC Voltage Collapse SimulationVoltage Collapse Simulation (Eastern Interconnection(Eastern Interconnection Scenario)Scenario) Simulation Prepared by Dennis J. RaySimulation Prepared by Dennis J. Ray Interconnection based on a series of generator and line outages. An actual voltage collapse may not occur due

169

DESIGN AND IMPLEMENTATION OF A FUZZY LOGIC-BASED VOLTAGE CONTROLLER FOR VOLTAGE REGULATION  

E-Print Network [OSTI]

1 DESIGN AND IMPLEMENTATION OF A FUZZY LOGIC-BASED VOLTAGE CONTROLLER FOR VOLTAGE REGULATION In this paper the design and implementation of a fuzzy logic-based controller is described for regulating the output voltage of a synchronous generator. An automated fuzzy logic-based control strategy is presented

LaMeres, Brock J.

170

Current mode integrators and their applications in low-voltage high frequency CMOS signal processing  

E-Print Network [OSTI]

Low voltage CMOS fully differential integrators for high frequency continuous-time filters using current-mode techniques are presented.. Current mode techniques are employed to avoid the use of the floating differential pair, in order to achieve...

Smith, Sterling Lane

1993-01-01T23:59:59.000Z

171

Optimal Power Flow Incorporating Voltage Collapse Constraints  

E-Print Network [OSTI]

Optimal Power Flow Incorporating Voltage Collapse Constraints William Rosehart Claudio Ca on the current operating con- ditions is presented. Second, an Optimal Power Flow formulation that incorporates: Voltage Collapse, Optimal Power Flow, Bifur- cations. I. Introduction As open-access market principles

Cañizares, Claudio A.

172

Voltage regulation in linear induction accelerators  

DOE Patents [OSTI]

Improvement in voltage regulation in a Linear Induction Accelerator wherein a varistor, such as a metal oxide varistor, is placed in parallel with the beam accelerating cavity and the magnetic core. The non-linear properties of the varistor result in a more stable voltage across the beam accelerating cavity than with a conventional compensating resistance.

Parsons, William M. (Santa Fe, NM)

1992-01-01T23:59:59.000Z

173

Voltage regulation in linear induction accelerators  

DOE Patents [OSTI]

Improvement in voltage regulation in a linear induction accelerator wherein a varistor, such as a metal oxide varistor, is placed in parallel with the beam accelerating cavity and the magnetic core is disclosed. The non-linear properties of the varistor result in a more stable voltage across the beam accelerating cavity than with a conventional compensating resistance. 4 figs.

Parsons, W.M.

1992-12-29T23:59:59.000Z

174

An Adaptive Policy for Improved Timeliness in Secure Database Systems  

E-Print Network [OSTI]

An Adaptive Policy for Improved Timeliness in Secure Database Systems Sang H. Son * , Rasikan David. Multilevel security requirements introduce a new dimension to transaction processing in real­time database Timeliness, concurrency control, two­phase locking, non­interference, security, miss percentage 1

Son, Sang H.

175

Non-contact current and voltage sensor  

SciTech Connect (OSTI)

A detachable current and voltage sensor provides an isolated and convenient device to measure current passing through a conductor such as an AC branch circuit wire, as well as providing an indication of an electrostatic potential on the wire, which can be used to indicate the phase of the voltage on the wire, and optionally a magnitude of the voltage. The device includes a housing that contains the current and voltage sensors, which may be a ferrite cylinder with a hall effect sensor disposed in a gap along the circumference to measure current, or alternative a winding provided through the cylinder along its axis and a capacitive plate or wire disposed adjacent to, or within, the ferrite cylinder to provide the indication of the voltage.

Carpenter, Gary D; El-Essawy, Wael; Ferreira, Alexandre Peixoto; Keller, Thomas Walter; Rubio, Juan C; Schappert, Michael A

2014-03-25T23:59:59.000Z

176

Flexible method for monitoring fuel cell voltage  

DOE Patents [OSTI]

A method for equalizing the measured voltage of each cluster in a fuel cell stack wherein at least one of the clusters has a different number of cells than the identical number of cells in the remaining clusters by creating a pseudo voltage for the different cell numbered cluster. The average cell voltage of the all of the cells in the fuel cell stack is calculated and multiplied by a constant equal to the difference in the number of cells in the identical cell clusters and the number of cells in the different numbered cell cluster. The resultant product is added to the actual voltage measured across the different numbered cell cluster to create a pseudo voltage which is equivalent in cell number to the number of cells in the other identical numbered cell clusters.

Mowery, Kenneth D. (Noblesville, IN); Ripley, Eugene V. (Russiaville, IN)

2002-01-01T23:59:59.000Z

177

Low Beam Voltage, 10 MW, L-Band Cluster Klystron  

SciTech Connect (OSTI)

Conceptual design of a multi-beam klystron (MBK) for possible ILC and Project X applications is presented. The chief distinction between this MBK design and existing 10-MW MBK's is the low operating voltage of 60 kV. There are at least four compelling reasons that justify development at this time of a low-voltage MBK, namely (1) no pulse transformer; (2) no oil tank for high-voltage components and for the tube socket; (3) no high-voltage cables; and (4) modulator would be a compact 60-kV IGBT switching circuit. The proposed klystron consists of four clusters containing six beams each. The tube has common input and output cavities for all 24 beams, and individual gain cavities for each cluster. A closely related optional configuration, also for a 10 MW tube, would involve four totally independent cavity clusters with four independent input cavities and four 2.5 MW output ports, all within a common magnetic circuit. This option has appeal because the output waveguides would not require a controlled atmosphere, and because it would be easier to achieve phase and amplitude stability as required in individual SC accelerator cavities.

Teryaev, V.; /Novosibirsk, IYF; Yakovlev, V.P.; /Fermilab; Kazakov, S.; /KEK, Tsukuba; Hirshfield, J.L.; /Yale U. /Omega-P, New Haven

2009-05-01T23:59:59.000Z

178

Information Security Group IY5512 Computer Security  

E-Print Network [OSTI]

for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

Mitchell, Chris

179

Climate-derived tensions in Arctic security.  

SciTech Connect (OSTI)

Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

Backus, George A.; Strickland, James Hassler

2008-09-01T23:59:59.000Z

180

Real-time, digital pulse-shape discrimination in non-hazardous fast liquid scintillation detectors: Prospects for safety and security  

SciTech Connect (OSTI)

Pulse-shape discrimination (PSD) in fast, organic scintillation detectors is a long-established technique used to separate neutrons and {gamma} rays in mixed radiation fields. In the analogue domain the method can achieve separation in real time, but all knowledge of the pulses themselves is lost thereby preventing the possibility of any post- or repeated analysis. Also, it is typically reliant on electronic systems that are largely obsolete and which require significant experience to set up. In the digital domain, PSD is often more flexible but significant post-processing has usually been necessary to obtain neutron/{gamma}-ray separation. Moreover, the scintillation media on which the technique relies usually have a low flash point and are thus deemed hazardous. This complicates the ease with which they are used in industrial applications. In this paper, results obtained with a new portable digital pulse-shape discrimination instrument are described. This instrument provides real-time, digital neutron/{gamma} separation whilst preserving the synchronization with the time-of-arrival for each event, and realizing throughputs of 3 x 10{sup 6} events per second. Furthermore, this system has been tested with a scintillation medium that is non-flammable and not hazardous. (authors)

Joyce, M. J. [Engineering Dept., Lancaster Univ., Lancaster, LA1 4YR (United Kingdom); Aspinall, M. D.; Cave, F. D. [Hybrid Instruments Ltd., Lancaster LA1 1XB (United Kingdom); Lavietes, A. D. [Dept. of Safeguards, International Atomic Energy Agency, A-1400 Vienna (Austria)

2011-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

182

Data Security ROCKVILLE, MD  

E-Print Network [OSTI]

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

183

PH-315 A. La Rosa VOLTAGE-CONTROLLED OSCILLATOR  

E-Print Network [OSTI]

PH-315 A. La Rosa VOLTAGE-CONTROLLED OSCILLATOR 1. PURPOSE: An integrator and a Schmitt Trigger voltage; hence its name "voltage-controlled oscillator." 2. VOLTAGE-CONTROLLED OSCILLATOR Figure 1 shows voltage. An unusual feature of the circuit is its operation using a single positive supply.1 #12;- + 50k V

184

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

185

Security system signal supervision  

SciTech Connect (OSTI)

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

186

Lemnos interoperable security project.  

SciTech Connect (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

187

Electro-optical voltage sensor head  

DOE Patents [OSTI]

A miniature electro-optic voltage sensor system capable of accurate operation at high voltages. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam's polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured.

Woods, Gregory K. (Idaho Falls, ID)

1998-01-01T23:59:59.000Z

188

Securing America's Future Energy April 8, 2011 | Department of...  

Broader source: Energy.gov (indexed) [DOE]

America's Future Energy an e-mail with attachments of a New York Times article on oil prices. Securing America's Future Energy April 8, 2011 More Documents & Publications...

189

Tag: Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurity Tag: Security

190

Tag: security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9.security Tag: security Displaying 1 -

191

Secure Storage | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.SecureSecure Storage

192

Researchers map atomic movements that trigger voltage fade in...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

map atomic movements that trigger voltage fade in high-energy-density batteries January 22, 2015 Voltage and capacity curves from an LMR-NMC high-energy cathode show voltage fade...

193

Modular high voltage power supply for chemical analysis  

DOE Patents [OSTI]

A high voltage power supply for use in a system such as a microfluidics system, uses a DC-DC converter in parallel with a voltage-controlled resistor. A feedback circuit provides a control signal for the DC-DC converter and voltage-controlled resistor so as to regulate the output voltage of the high voltage power supply, as well as, to sink or source current from the high voltage supply.

Stamps, James F. (Livermore, CA); Yee, Daniel D. (Dublin, CA)

2008-07-15T23:59:59.000Z

194

Modular high voltage power supply for chemical analysis  

SciTech Connect (OSTI)

A high voltage power supply for use in a system such as a microfluidics system, uses a DC-DC converter in parallel with a voltage-controlled resistor. A feedback circuit provides a control signal for the DC-DC converter and voltage-controlled resistor so as to regulate the output voltage of the high voltage power supply, as well as, to sink or source current from the high voltage supply.

Stamps, James F. (Livermore, CA); Yee, Daniel D. (Dublin, CA)

2010-05-04T23:59:59.000Z

195

Modular high voltage power supply for chemical analysis  

DOE Patents [OSTI]

A high voltage power supply for use in a system such as a microfluidics system, uses a DC--DC converter in parallel with a voltage-controlled resistor. A feedback circuit provides a control signal for the DC--DC converter and voltage-controlled resistor so as to regulate the output voltage of the high voltage power supply, as well as, to sink or source current from the high voltage supply.

Stamps, James F. (Livermore, CA); Yee, Daniel D. (Dublin, CA)

2007-01-09T23:59:59.000Z

196

Electro-optic high voltage sensor  

DOE Patents [OSTI]

A small sized electro-optic voltage sensor capable of accurate measurement of high voltages without contact with a conductor or voltage source is provided. When placed in the presence of an electric field, the sensor receives an input beam of electromagnetic radiation. A polarization beam displacer separates the input beam into two beams with orthogonal linear polarizations and causes one linearly polarized beam to impinge a crystal at a desired angle independent of temperature. The Pockels effect elliptically polarizes the beam as it travels through the crystal. A reflector redirects the beam back through the crystal and the beam displacer. On the return path, the polarization beam displacer separates the elliptically polarized beam into two output beams of orthogonal linear polarization. The system may include a detector for converting the output beams into electrical signals and a signal processor for determining the voltage based on an analysis of the output beams.

Davidson, James R.; Seifert, Gary D.

2003-09-16T23:59:59.000Z

197

Voltage Management of Networks with Distributed Generation.  

E-Print Network [OSTI]

At present there is much debate about the impacts and benefits of increasing the amount of generation connected to the low voltage areas of the electricity distribution network. The UK government is under political ...

O'Donnell, James

2008-01-01T23:59:59.000Z

198

Low voltage arc formation in railguns  

DOE Patents [OSTI]

A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile.

Hawke, R.S.

1985-08-05T23:59:59.000Z

199

Low voltage arc formation in railguns  

DOE Patents [OSTI]

A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile. 2 figs.

Hawke, R.S.

1987-11-17T23:59:59.000Z

200

Low voltage arc formation in railguns  

DOE Patents [OSTI]

A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile.

Hawke, Ronald S. (Livermore, CA)

1987-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Group 3: Humidity, Temperature, and Voltage  

Broader source: Energy.gov [DOE]

This PowerPoint presentation, focused on humidity, temperature and voltage testing, was originally presented by John Wohlgemuth at the NREL 2013 PV Module Reliability Workshop on Feb. 26-27, 2013 in Denver, CO. It summarizes the activities of a working group chartered to develop accelerated stress tests that can be used as comparative predictors of module life versus stresses associated with humidity, temperature and voltage.

202

Addressing the Voltage Fade Issue with Lithium-Manganese-Rich...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Addressing the Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials Addressing the Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials 2013 DOE...

203

Addressing the Voltage Fade Issue with Lithium-Manganese-Rich...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials Addressing the Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials 2012 DOE Hydrogen and...

204

High-Voltage Solid Polymer Batteries for Electric Drive Vehicles...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

High-Voltage Solid Polymer Batteries for Electric Drive Vehicles High-Voltage Solid Polymer Batteries for Electric Drive Vehicles 2012 DOE Hydrogen and Fuel Cells Program and...

205

Vehicle Technologies Office Merit Review 2014: High-Voltage Solid...  

Broader source: Energy.gov (indexed) [DOE]

High-Voltage Solid Polymer Batteries for Electric Drive Vehicles Vehicle Technologies Office Merit Review 2014: High-Voltage Solid Polymer Batteries for Electric Drive Vehicles...

206

High-Voltage Solid Polymer Batteries for Electric Drive Vehicles...  

Broader source: Energy.gov (indexed) [DOE]

High-Voltage Solid Polymer Batteries for Electric Drive Vehicles High-Voltage Solid Polymer Batteries for Electric Drive Vehicles 2013 DOE Hydrogen and Fuel Cells Program and...

207

High voltage overhead long transmission line design and fault analysis.  

E-Print Network [OSTI]

??The goal of this project is to design a reliable high voltage overhead long transmission line that satisfies specific design criteria including voltage regulation, efficiency, (more)

Elzain, Mohamed Ali

2011-01-01T23:59:59.000Z

208

Securing Internet Routing Securing Internet Routing  

E-Print Network [OSTI]

Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc Set up paths

Goldberg, Sharon

209

Dynamic photorefractivity guided by single-pulse voltage  

SciTech Connect (OSTI)

The dynamic photorefractivity in a cell with photoconducting orienting layers, filled with a nematic liquid crystal (LC) 6CHBT and a mixture of anthraquinone dyes AD1 and AD2, has been investigated. The single-pulse mode, in which the polarity and amplitude of a dc electric field applied to an LC cell are switched for a fixed time interval, has been used. The scheme of dynamic self-diffraction of low-power laser beams was used in the experiment. The dependences of the width and intensity of diffraction pulses on the bias and switching voltages have been investigated. It is established that the width and intensity of the diffraction pulse arising after initial voltage recovery depends also on the switching pulse width. At the optimal width of the control pulse, the diffraction efficiency increases by two orders of magnitude.

Agashkov, A. V., E-mail: agashkov@inel.bas.net.by; Kovalev, A. A. [National Academy of Sciences of Belarus, Institute of Electronics (Belarus); Parka, J. [Military University of Technology, Institute of Applied Physics (Poland)

2008-03-15T23:59:59.000Z

210

Secure Transportation of HEU in Romania  

SciTech Connect (OSTI)

The National Nuclear Security Administration has announced the final shipments of Russian-origin highly enriched uranium (HEU) nuclear fuel from Romania. The material was removed and returned to Russia by air for storage at two secure nuclear facilities, making Romania the first country to remove all HEU since President Obama outlined his commitment to securing all vulnerable nuclear material around the world within four years. This was also the first time NNSA has shipped spent HEU by airplane, a development that will help accelerate efforts to meet the Presidents objective.

2009-07-06T23:59:59.000Z

211

Security problem on arbitrated quantum signature schemes  

SciTech Connect (OSTI)

Many arbitrated quantum signature schemes implemented with the help of a trusted third party have been developed up to now. In order to guarantee unconditional security, most of them take advantage of the optimal quantum one-time encryption based on Pauli operators. However, in this paper we point out that the previous schemes provide security only against a total break attack and show in fact that there exists an existential forgery attack that can validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover security against the proposed attack.

Choi, Jeong Woon [Emerging Technology R and D Center, SK Telecom, Kyunggi 463-784 (Korea, Republic of); Chang, Ku-Young; Hong, Dowon [Cryptography Research Team, Electronics and Telecommunications Research Institute, Daejeon 305-700 (Korea, Republic of)

2011-12-15T23:59:59.000Z

212

Energy Security Initiatives Update  

Broader source: Energy.gov (indexed) [DOE]

-- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft...

213

Energy Security Initiatives Update  

Broader source: Energy.gov [DOE]

Presentationgiven at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meetinglists Federal government energy security initiatives.

214

Control Systems Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

systems within the nation's critical infrastructure. The CSSP assists control systems vendors and asset ownersoperators in identifying security vulnerabilities and developing...

215

Industrial Security Specialst  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

216

Nevada National Security Site  

Broader source: Energy.gov [DOE]

HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities. In support of national defense initiatives...

217

Securing Cloud Storage Service.  

E-Print Network [OSTI]

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

218

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the safety, security and effectiveness of the nuclear deterrent without underground nuclear testing, consistent with the principles of the Stockpile Management Program...

219

TEC Information Security  

Broader source: Energy.gov (indexed) [DOE]

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

220

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Project Reviews, etc., except those specifically reserved for the Administrator for the National Nuclear Security Administration and the Deputy Secretary. cc: Mike Hickman. NA-Stl...

222

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

223

Hazardous Material Security (Maryland)  

Broader source: Energy.gov [DOE]

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

224

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

225

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

226

Distribution System Voltage Performance Analysis for High-Penetration Photovoltaics  

SciTech Connect (OSTI)

This report examines the performance of commonly used distribution voltage regulation methods under reverse power flow.

Liu, E.; Bebic, J.

2008-02-01T23:59:59.000Z

227

A Charge Pump that Generates Negative High Voltage with Variable Voltage , Eugene Ivanova,  

E-Print Network [OSTI]

A Charge Pump that Generates Negative High Voltage with Variable Voltage Gain Jun Zhaob, , Eugene, Massachusetts 02115, U.S.A. Abstract A cross-coupled structure based charge pump that generates negative high. The proposed negative charge pump is designed to deliver 40 uA with a wide supply range from 2.5V to 5.5V using

Ayers, Joseph

228

Distributed Voltage and Current Control of Multi-Terminal High-Voltage Direct  

E-Print Network [OSTI]

}@kth.se.) Abstract: High-voltage direct current (HVDC) is a commonly used technology for long-distance power for multi-terminal HVDC (MTDC) systems is proposed. Under certain conditions on the controller gains factor behind long-distance power transmission. High-voltage direct current (HVDC) is a commonly used

Dimarogonas, Dimos

229

Enhance your Cyber Security Knowledge  

E-Print Network [OSTI]

Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

230

Operational Security (OPSEC) Reminder | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

231

Electronic circuit for measuring series connected electrochemical cell voltages  

DOE Patents [OSTI]

An electronic circuit for measuring voltage signals in an energy storage device is disclosed. The electronic circuit includes a plurality of energy storage cells forming the energy storage device. A voltage divider circuit is connected to at least one of the energy storage cells. A current regulating circuit is provided for regulating the current through the voltage divider circuit. A voltage measurement node is associated with the voltage divider circuit for producing a voltage signal which is proportional to the voltage across the energy storage cell.

Ashtiani, Cyrus N. (West Bloomfield, MI); Stuart, Thomas A. (Toledo, OH)

2000-01-01T23:59:59.000Z

232

Sacramento Area Voltage Support Final Environmental Impact Statement  

SciTech Connect (OSTI)

The Western Area Power Administration's Central Valley Project transmission system forms an integral part of the interconnected Sacramento area transmission grid. Western is contractually responsible to oversee that the system is operated in accordance with strict reliability standards. Growth in the greater Sacramento, California area and power imported from generation outside the region, have increased the demand on the interconnected electric transmission system, leading to transmission system overloads and reducing the reliability and security of the area power system. Western has prepared this Sacramento Area Voltage Support (SVS) Draft Environmental Impact Statement (EIS) in compliance with Federal laws, regulations and guidelines, principally the National Environmental Policy Act (NEPA). This Draft EIS evaluates the potential environmental effects of physical improvements to the area's power system. Enhancements are needed to improve system reliability and provide voltage support for the Sacramento area. The results of public scoping meetings, workshops, meetings with agencies, and earlier studies by Western and area utilities helped to develop a range of alternatives for analysis. The Proposed Action involves: (1) Constructing a new double-circuit, 230-kV transmission line paralleling the existing double-circuit, 230-kV line from the O'Banion Substation to the Elverta Substation; (2) Realigning a portion of the existing Cottonwood-Roseville single-circuit, 230-kV transmission line north of Elverta Substation; and (3) Reconductoring the existing double-circuit, 230-kV transmission line from the Elverta Substation to the Tracy Substation. Public Hearings on the Draft EIS will be held between December 9-12, 2002. Comments on this Draft EIS are encouraged and should be sent to Ms. Loreen McMahon (above). Comments must be received by December 30, 2002.

N /A

2003-09-19T23:59:59.000Z

233

Sacramento Area Voltage Support Draft Environmental Impact Statement  

SciTech Connect (OSTI)

The Western Area Power Administration's Central Valley Project transmission system forms an integral part of the interconnected Sacramento area transmission grid. Western is contractually responsible to oversee that the system is operated in accordance with strict reliability standards. Growth in the greater Sacramento, California area and power imported from generation outside the region, have increased the demand on the interconnected electric transmission system, leading to transmission system overloads and reducing the reliability and security of the area power system. Western has prepared this Sacramento Area Voltage Support (SVS) Draft Environmental Impact Statement (EIS) in compliance with Federal laws, regulations and guidelines, principally the ''National Environmental Policy Act'' (NEPA). This Draft EIS evaluates the potential environmental effects of physical improvements to the area's power system. Enhancements are needed to improve system reliability and provide voltage support for the Sacramento area. The results of public scoping meetings, workshops, meetings with agencies, and earlier studies by Western and area utilities helped to develop a range of alternatives for analysis. The Proposed Action involves: Constructing a new double-circuit, 230-kV transmission line paralleling the existing double-circuit, 230-kV line from the O'Banion Substation to the Elverta Substation; Realigning a portion of the existing Cottonwood-Roseville single-circuit, 230-kV transmission line north of Elverta Substation; and Reconductoring the existing double-circuit, 230-kV transmission line from the Elverta Substation to the Tracy Substation. Public Hearings on the Draft EIS will be held between December 9-12, 2002. Comments on this Draft EIS are encouraged and should be sent to Ms. Loreen McMahon (above). Comments must be received by December 30, 2002.

N /A

2002-11-15T23:59:59.000Z

234

Compact high voltage solid state switch  

DOE Patents [OSTI]

A compact, solid state, high voltage switch capable of high conduction current with a high rate of current risetime (high di/dt) that can be used to replace thyratrons in existing and new applications. The switch has multiple thyristors packaged in a single enclosure. Each thyristor has its own gate drive circuit that circuit obtains its energy from the energy that is being switched in the main circuit. The gate drives are triggered with a low voltage, low current pulse isolated by a small inexpensive transformer. The gate circuits can also be triggered with an optical signal, eliminating the trigger transformer altogether. This approach makes it easier to connect many thyristors in series to obtain the hold off voltages of greater than 80 kV.

Glidden, Steven C.

2003-09-23T23:59:59.000Z

235

Secure Manufacturing | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.Secure Manufacturing

236

Experiment for measurements of the gas breakdown statistics by ramp voltage pulses  

SciTech Connect (OSTI)

In the first part of this article the electronic automatic system for the measurements of dynamic breakdown voltages U{sub b} with linearly rising (ramp) pulses is presented. It generates the sequence of ramp pulses with subvoltage level U{sub sub}{approx_equal}0 during the relaxation time {tau} of the tube, and the ramp pulses start from the static breakdown voltage U{sub s}, thus enabling the correct study of electrical breakdowns and relaxation in gases. In the second part the measurements in argon with and without a voltage during the off period of the pulse are analyzed. The influence of the subvoltage on the mean value of the breakdown voltage U{sub b} as a function of the rise rate k, on the statistical U{sub b} distributions and on the afterglow kinetics is also discussed.

Markovic, V. Lj.; Stamenkovic, S. N.; Gocic, S. R.; Petrovic, Z. Lj. [Department of Physics, University of Nis, P.O. Box 224, 18001 Nis (Serbia and Montenegro); Institute of Physics, P.O. Box 68, 11080 Belgrade (Serbia and Montenegro)

2006-09-15T23:59:59.000Z

237

SiGe BiCMOS Topologies for Low-Voltage Millimeter-Wave Voltage Controlled Oscillators and Frequency Dividers  

E-Print Network [OSTI]

SiGe BiCMOS Topologies for Low-Voltage Millimeter-Wave Voltage Controlled Oscillators and Frequency-mail: tod@eecg.toronto.edu Abstract -- BiCMOS topologies for mm-wave voltage- controlled oscillators operation for mm-wave applications. II. BICMOS VOLTAGE-CONTROLLED OSCILLATOR The Colpitts topology

Voinigescu, Sorin Petre

238

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

239

December 2003 SECURITY CONSIDERATIONS  

E-Print Network [OSTI]

December 2003 SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE Shirley security early in the information system development life cycle (SDLC), you may be able to avoid higher and a generic system development life cycle for illustrative purposes, the basic con cepts can be applied

Perkins, Richard A.

240

DATABASE SECURITY APPLICATIONS  

E-Print Network [OSTI]

DATABASE SECURITY #12;APPLICATIONS #12;Polyinstantiation for Cover Stories Ravi S. Sandhu and Sushil Jajodia* Center for Secure Information Systems & Department of Information and Software Systems Engineering George Mason University Falffax, VA 22030, USA emaih {sandhu, jajodia}Qsitevax.gmu.edu Abstract

Sandhu, Ravi

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Incidents of Security Concern  

SciTech Connect (OSTI)

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

242

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

243

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

244

SELECTING INFORMATION TECHNOLOGY SECURITY  

E-Print Network [OSTI]

be selected and used within the organization's overall program to man age the design, development, and maintenance of its IT security infra structure, and to protect the confiden tiality, integrity objectives and to protect information. Guide to Selecting Information Technology Security Products NIST

245

December 2007 SECURING EXTERNAL  

E-Print Network [OSTI]

devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

246

Physical simulation study of dynamic voltage instability  

SciTech Connect (OSTI)

This paper presents a physical simulation of the dynamic behavior of voltage instability in an interconnected multimachine environment. The dynamic evolving process leading to eventual voltage collapse, the scenario of the progressive reactive support reduction resulting from the MXL protection relays, the OLTC operation, and the effect of switched-in capacitor banks are examined using physical facilities in the laboratory. The physical simulation results are also compared with digital simulation results. This physical investigation provides a reliable foundation for the effective development of assessment approaches and countermeasures.

Tso, S.K.; Zhu, T.X. [Univ. of Hong Kong (Hong Kong); Zeng, Q.Y. [Electric Power Research Inst., Beijing (China); Lo, K.L. [Univ. of Strathclyde, Glasgow (United Kingdom). Dept. of Electrical and Electrical Engineering

1995-12-31T23:59:59.000Z

247

Indirection and computer security.  

SciTech Connect (OSTI)

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

248

International Nuclear Security  

SciTech Connect (OSTI)

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

249

Office of Departmental Personnel Security  

Broader source: Energy.gov [DOE]

The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

250

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

251

Outdoor PV Module Degradation of Current-Voltage Parameters: Preprint  

SciTech Connect (OSTI)

Photovoltaic (PV) module degradation rate analysis quantifies the loss of PV power output over time and is useful for estimating the impact of degradation on the cost of energy. An understanding of the degradation of all current-voltage (I-V) parameters helps to determine the cause of the degradation and also gives useful information for the design of the system. This study reports on data collected from 12 distinct mono- and poly-crystalline modules deployed at the National Renewable Energy Laboratory (NREL) in Golden, Colorado. Most modules investigated showed < 0.5%/year decrease in maximum power due to short-circuit current decline.

Smith, R. M.; Jordan, D. C.; Kurtz, S. R.

2012-04-01T23:59:59.000Z

252

Electro-optic voltage sensor for sensing voltage in an E-field  

DOE Patents [OSTI]

A miniature electro-optic voltage sensor system capable of accurate operation at high voltages. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam's polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured.

Woods, Gregory K. (Idaho Falls, ID); Renak, Todd W. (Idaho Falls, ID)

1999-01-01T23:59:59.000Z

253

Electro-optic voltage sensor for sensing voltage in an E-field  

DOE Patents [OSTI]

A miniature electro-optic voltage sensor system capable of accurate operation at high voltages is disclosed. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam`s polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured. 18 figs.

Woods, G.K.; Renak, T.W.

1999-04-06T23:59:59.000Z

254

Headquarters Facilities Master Security Plan  

Energy Savers [EERE]

Security Briefing. Failure of any employee to complete the SF-312 results in the termination of hisher security clearance and denial of access to classified matter. The badge...

255

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

256

Smart-Grid Security Issues  

SciTech Connect (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

257

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

258

Group 3: Humidity, Temperature and Voltage (Presentation)  

SciTech Connect (OSTI)

This is a summary of the work of Group 3 of the International PV QA Task Force. Group 3 is chartered to develop accelerated stress tests that can be used as comparative predictors of module lifetime versus stresses associated with humidity, temperature and voltage.

Wohlgemuth, J.

2013-09-01T23:59:59.000Z

259

Voltage control on a train system  

DOE Patents [OSTI]

The present invention provides methods for preventing low train voltages and managing interference, thereby improving the efficiency, reliability, and passenger comfort associated with commuter trains. An algorithm implementing neural network technology is used to predict low voltages before they occur. Once voltages are predicted, then multiple trains can be controlled to prevent low voltage events. Further, algorithms for managing inference are presented in the present invention. Different types of interference problems are addressed in the present invention such as "Interference During Acceleration", "Interference Near Station Stops", and "Interference During Delay Recovery." Managing such interference avoids unnecessary brake/acceleration cycles during acceleration, immediately before station stops, and after substantial delays. Algorithms are demonstrated to avoid oscillatory brake/acceleration cycles due to interference and to smooth the trajectories of closely following trains. This is achieved by maintaining sufficient following distances to avoid unnecessary braking/accelerating. These methods generate smooth train trajectories, making for a more comfortable ride, and improve train motor reliability by avoiding unnecessary mode-changes between propulsion and braking. These algorithms can also have a favorable impact on traction power system requirements and energy consumption.

Gordon, Susanna P.; Evans, John A.

2004-01-20T23:59:59.000Z

260

Electro-optic high voltage sensor  

DOE Patents [OSTI]

A small sized electro-optic voltage sensor capable of accurate measurement of high levels of voltages without contact with a conductor or voltage source is provided. When placed in the presence of an electric field, the sensor receives an input beam of electromagnetic radiation into the sensor. A polarization beam displacer serves as a filter to separate the input beam into two beams with orthogonal linear polarizations. The beam displacer is oriented in such a way as to rotate the linearly polarized beams such that they enter a Pockels crystal having at a preferred angle of 45 degrees. The beam displacer is therefore capable of causing a linearly polarized beam to impinge a crystal at a desired angle independent of temperature. The Pockels electro-optic effect induces a differential phase shift on the major and minor axes of the input beam as it travels through the Pockels crystal, which causes the input beam to be elliptically polarized. A reflecting prism redirects the beam back through the crystal and the beam displacer. On the return path, the polarization beam displacer separates the elliptically polarized beam into two output beams of orthogonal linear polarization representing the major and minor axes. The system may include a detector for converting the output beams into electrical signals, and a signal processor for determining the voltage based on an analysis of the output beams. The output beams are amplitude modulated by the frequency of the electric field and the amplitude of the output beams is proportional to the magnitude of the electric field, which is related to the voltage being measured.

Davidson, James R. (Idaho Falls, ID); Seifert, Gary D. (Idaho Falls, ID)

2002-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Best Practices for the Security of Radioactive Materials  

SciTech Connect (OSTI)

This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.

Coulter, D.T.; Musolino, S.

2009-05-01T23:59:59.000Z

262

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurity

263

A Comparison of High-Voltage Switches  

SciTech Connect (OSTI)

This report summarizes our work on high-voltage switches during the past few years. With joint funding from the Department of Energy (DOE) and the Department of Defense (DOD), we tested a wide variety of switches to a common standard. This approach permitted meaningful comparisons between disparate switches. Most switches were purchased from commercial sources, though some were experimental devices. For the purposes of this report, we divided the switches into three generic types (gas, vacuum, and semiconductor) and selected data that best illustrates important strengths and weaknesses of each switch type. Test techniques that indicate the state of health of the switches are emphasized. For example, a good indicator of residual gas in a vacuum switch is the systematic variation of the switching delay in response to changes in temperature and/or operating conditions. We believe that the presentation of this kind of information will help engineers to select and to test switches for their particular applications. Our work was limited to switches capable of driving slappers. Also known as exploding-foil initiators, slappers are detonators that initiate a secondary explosive by direct impact with a small piece of matter moving at the detonation velocity (several thousands of meters per second). A slapper is desirable for enhanced safety (no primary explosive), but it also places extra demands on the capacitor-discharge circuit to deliver a fast-rising current pulse (greater than 10 A/ns) of several thousand amperes. The required energy is substantially less than one joule; but this energy is delivered in less than one microsecond, taking the peak power into the megawatt regime. In our study, the switches operated in the 1 kV to 3 kV range and were physically small, roughly 1 cm{sup 3} or less. Although a fuze functions only once in actual use, multiple-shot capability is important for production testing and for research work. For this reason, we restricted this report to multiple-shot switches. Furthermore, our work included only switches with submicrosecond timing precision, thereby excluding mechanical switches.

Chu, K.W.; Scott, G.L.

1999-02-01T23:59:59.000Z

264

March 24, 2008 Databases: Security 1 Database Security and Authorization  

E-Print Network [OSTI]

to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

Adam, Salah

265

INSTITUTE FOR CYBER SECURITY Application-Centric Security  

E-Print Network [OSTI]

INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

Sandhu, Ravi

266

Distribution System Voltage Regulation by Distributed Energy Resources  

SciTech Connect (OSTI)

This paper proposes a control method to regulate voltages in 3 phase unbalanced electrical distribution systems. A constrained optimization problem to minimize voltage deviations and maximize distributed energy resource (DER) active power output is solved by harmony search algorithm. IEEE 13 Bus Distribution Test System was modified to test three different cases: a) only voltage regulator controlled system b) only DER controlled system and c) both voltage regulator and DER controlled system. The simulation results show that systems with both voltage regulators and DER control provide better voltage profile.

Ceylan, Oguzhan [ORNL; Liu, Guodong [ORNL; Xu, Yan [ORNL; Tomsovic, Kevin [University of Tennessee, Knoxville (UTK)

2014-01-01T23:59:59.000Z

267

Multilevel Cascade H-bridge Inverter DC Voltage Estimation Through Output Voltage Sensing  

E-Print Network [OSTI]

system as the inverter power supply may vary. For example, interface of solar panels or fuel cell. The output voltage is then processed by a DSP unit that uses the signals that command the switches

Tolbert, Leon M.

268

AMALGAMATED SECURITY COMMUNITIES  

E-Print Network [OSTI]

This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

Harvey, Andrew Stephen

2011-08-31T23:59:59.000Z

269

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

270

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

271

Operations Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

272

Engineering secure software  

E-Print Network [OSTI]

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after...

Jetly, Prateek

2001-01-01T23:59:59.000Z

273

Transmission Line Security Monitor: Final Report  

SciTech Connect (OSTI)

The Electric Power Transmission Line Security Monitor System Operational Test is a project funded by the Technical Support Working Group (TSWG). TSWG operates under the Combating Terrorism Technical Support Office that functions under the Department of Defense. The Transmission Line Security Monitor System is based on technology developed by Idaho National Laboratory. The technology provides a means for real-time monitoring of physical threats and/or damage to electrical transmission line towers and conductors as well as providing operational parameters to transmission line operators to optimize transmission line operation. The end use is for monitoring long stretches of transmission lines that deliver electrical power from remote generating stations to cities and industry. These transmission lines are generally located in remote transmission line corridors where security infrastructure may not exist. Security and operational sensors in the sensor platform on the conductors take power from the transmission line and relay security and operational information to operations personnel hundreds of miles away without relying on existing infrastructure. Initiated on May 25, 2007, this project resulted in pre-production units tested in realistic operational environments during 2010. A technology licensee, Lindsey Manufacturing of Azusa California, is assisting in design, testing, and ultimately production. The platform was originally designed for a security monitoring mission, but it has been enhanced to include important operational features desired by electrical utilities.

John Svoboda

2011-04-01T23:59:59.000Z

274

SECURING RADIO FREQUENCY IDENTIFICATION (RFID)  

E-Print Network [OSTI]

business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

275

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

276

Public key infrastructure for DOE security research  

SciTech Connect (OSTI)

This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

Aiken, R.; Foster, I.; Johnston, W.E. [and others

1997-06-01T23:59:59.000Z

277

Securing Infrastructure from High Explosive Threats  

SciTech Connect (OSTI)

Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

2009-03-20T23:59:59.000Z

278

Lemnos Interoperable Security Program  

SciTech Connect (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

279

Testing of High Voltage Surge Protection Devices for Use in Liquid Argon TPC Detectors  

E-Print Network [OSTI]

In this paper we demonstrate the capability of high voltage varistors and gas discharge tube arrestors for use as surge protection devices in liquid argon time projection chamber detectors. The insulating and clamping behavior of each type of device is characterized in air (room temperature), and liquid argon (90~K), and their robustness under high voltage and high energy surges in cryogenic conditions is verified. The protection of vulnerable components in liquid argon during a 150 kV high voltage discharge is also demonstrated. Each device is tested for argon contamination and light emission effects, and both are constrained to levels where no significant impact upon liquid argon time projection chamber functionality is expected. Both devices investigated are shown to be suitable for HV surge protection applications in cryogenic detectors.

J. Asaadi; J. M. Conrad; S. Gollapinni; B. J. P. Jones; H. Jostlein; J. M. St. John; T. Strauss; S. Wolbers; J. Zennamo

2014-06-23T23:59:59.000Z

280

Electrical system architecture having high voltage bus  

DOE Patents [OSTI]

An electrical system architecture is disclosed. The architecture has a power source configured to generate a first power, and a first bus configured to receive the first power from the power source. The architecture also has a converter configured to receive the first power from the first bus and convert the first power to a second power, wherein a voltage of the second power is greater than a voltage of the first power, and a second bus configured to receive the second power from the converter. The architecture further has a power storage device configured to receive the second power from the second bus and deliver the second power to the second bus, a propulsion motor configured to receive the second power from the second bus, and an accessory motor configured to receive the second power from the second bus.

Hoff, Brian Douglas (East Peoria, IL); Akasam, Sivaprasad (Peoria, IL)

2011-03-22T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Reactive Support and Voltage Control Service: Key Issues and Challenges  

E-Print Network [OSTI]

reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

Gross, George

282

Low Voltage White Phosphorescent OLED Achievements  

Broader source: Energy.gov [DOE]

Universal Display Corporation (UDC) and its research partners at Princeton University and the University of Southern California have succeeded in developing a white phosphorescent OLED (PHOLED) that achieved a record efficiency of 20 lumens per watt. This achievement is the result of the team's collaborative efforts to increase the efficiency of PHOLED lighting by focusing on two critical factors: lowering the drive voltages and increasing the amount of light extracted.

283

High Voltage Electrolyte for Lithium Batteries  

Broader source: Energy.gov (indexed) [DOE]

5.0E-04 1.0E-03 2 2.2 2.4 2.6 2.8 Voltage (V) dQdV (AhV) 1 st Charge 1.2M LiPF 6 ECEMC 37 1 st Charge 1.0M LiPF 6 TMS1NM3 55 with 2% and 4% VC 1 st Charge 1.0M LiPF 6 TMS...

284

V-088: Microsoft Security Bulletin Advance Notification for February 2013  

Broader source: Energy.gov [DOE]

Microsoft Security Bulletin Advance Notification for February 2013. Microsoft has posted 5 Critical Bulletins and 7 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on February 13, 2013, at 11:00 AM Pacific Time (US & Canada).

285

Cryptanalysis and Improvement of an Efficient CCA Secure PKE Scheme  

E-Print Network [OSTI]

that it is more efficient in the public/private keys than the famous CS98 and BMW05 CCA secure public key-time signature based on the BMW05 paradigm [2]. The third way owns to the concept of lossy trapdoor function than the famous CS98 and BMW05 CCA secure public key encryption scheme. However we will show

286

Electro-optic voltage sensor head  

DOE Patents [OSTI]

The invention is an electro-optic voltage sensor head designed for integration with existing types of high voltage transmission and distribution apparatus. The sensor head contains a transducer, which comprises a transducing material in which the Pockels electro-optic effect is observed. In the practice of the invention at least one beam of electromagnetic radiation is routed into the transducing material of the transducer in the sensor head. The beam undergoes an electro-optic effect in the sensor head when the transducing material is subjected to an E-field. The electro-optic effect is observed as a differential phase a shift, also called differential phase modulation, of the beam components in orthogonal planes of the electromagnetic radiation. In the preferred embodiment the beam is routed through the transducer along an initial axis and then reflected by a retro-reflector back substantially parallel to the initial axis, making a double pass through the transducer for increased measurement sensitivity. The preferred embodiment of the sensor head also includes a polarization state rotator and at least one beam splitter for orienting the beam along major and minor axes and for splitting the beam components into two signals which are independent converse amplitude-modulated signals carrying E-field magnitude and hence voltage information from the sensor head by way of optic fibers.

Crawford, Thomas M. (Idaho Falls, ID); Davidson, James R. (Idaho Falls, ID); Woods, Gregory K. (Cornelius, OR)

1999-01-01T23:59:59.000Z

287

Electro-optic voltage sensor head  

DOE Patents [OSTI]

The invention is an electro-optic voltage sensor head designed for integration with existing types of high voltage transmission and distribution apparatus. The sensor head contains a transducer, which comprises a transducing material in which the Pockels electro-optic effect is observed. In the practice of the invention at least one beam of electromagnetic radiation is routed into the transducing material of the transducer in the sensor head. The beam undergoes an electro-optic effect in the sensor head when the transducing material is subjected to an E-field. The electro-optic effect is observed as a differential phase a shift, also called differential phase modulation, of the beam components in orthogonal planes of the electromagnetic radiation. In the preferred embodiment the beam is routed through the transducer along an initial axis and then reflected by a retro-reflector back substantially parallel to the initial axis, making a double pass through the transducer for increased measurement sensitivity. The preferred embodiment of the sensor head also includes a polarization state rotator and at least one beam splitter for orienting the beam along major and minor axes and for splitting the beam components into two signals which are independent converse amplitude-modulated signals carrying E-field magnitude and hence voltage information from the sensor head by way of optic fibers. 6 figs.

Crawford, T.M.; Davidson, J.R.; Woods, G.K.

1999-08-17T23:59:59.000Z

288

Electrostatically screened, voltage-controlled electrostatic chuck  

DOE Patents [OSTI]

Employing an electrostatically screened, voltage-controlled electrostatic chuck particularly suited for holding wafers and masks in sub-atmospheric operations will significantly reduce the likelihood of contaminant deposition on the substrates. The electrostatic chuck includes (1) an insulator block having a outer perimeter and a planar surface adapted to support the substrate and comprising at least one electrode (typically a pair of electrodes that are embedded in the insulator block), (2) a source of voltage that is connected to the at least one electrode, (3) a support base to which the insulator block is attached, and (4) a primary electrostatic shield ring member that is positioned around the outer perimeter of the insulator block. The electrostatic chuck permits control of the voltage of the lithographic substrate; in addition, it provides electrostatic shielding of the stray electric fields issuing from the sides of the electrostatic chuck. The shielding effectively prevents electric fields from wrapping around to the upper or front surface of the substrate, thereby eliminating electrostatic particle deposition.

Klebanoff, Leonard Elliott (San Ramon, CA)

2001-01-01T23:59:59.000Z

289

Analysis and design of an electronic voltage ratchet  

E-Print Network [OSTI]

and decay. Impulse voltages are produced through the discharging of 0, capacitor into a shaping network consisting of resistors and a. capacitor as is shown in Figure 2. 9. The operation of the impulse generator is as follows. Capacitor Ci is charged from... voltage shaping network. as possible in order to reduce oscillations in the wavefront and wavetail portions of the impulse voltage [1). The impulse voltage generator requires a, highly charged capacitor or bank of capacitors. Capacitors may be charged...

Menendez, Jorge Carlos

2012-06-07T23:59:59.000Z

290

Effect of high-voltage nanosecond pulses on complex plasmas  

SciTech Connect (OSTI)

Influence of high-voltage (1-11 kV) pulses of nanosecond (20 ns) duration on microparticles levitating in a rf plasma is studied. It is shown that the pulses produce significant influence on the plasma, causing perturbations with the relaxation time of the order of 10{sup -4} s. This time is sufficient for the microparticle to acquire significant kinetic energy. Application of repetitive pulses leads to the vertical oscillations of the microparticles. Clusters, consisting of small number of microparticles, exhibit parametric instabilities of horizontal modes under the effect of repetitive pulses. It was shown that the parametric instability is caused by the vertical oscillations of the microparticles in the nonuniform environment of the sheath.

Pustylnik, M. Y.; Ivlev, A. V.; Thomas, H. M.; Morfill, G. E. [Max-Planck-Institut fuer Extraterrestrische Physik, Giessenbachstrasse, 85741 Garching (Germany); Vasilyak, L. M.; Vetchinin, S. P.; Polyakov, D. N.; Fortov, V. E. [Joint Institute for High Temperatures, Russian Academy of Sciences, Izhorskaya 13/19, 125412 Moscow (Russian Federation)

2009-11-15T23:59:59.000Z

291

Selective compensation of voltage harmonics in grid-connected microgrids  

E-Print Network [OSTI]

1 Selective compensation of voltage harmonics in grid-connected microgrids Mehdi Savaghebia , Juan is proposed for selective compensation of main voltage harmonics in a grid- connected microgrid. The aim level. Keywords Distributed Generator (DG); microgrid; grid-connected; voltage harmonics compensation. 1

Vasquez, Juan Carlos

292

Structural Optimization of High Voltage Transmission Line Towers considering  

E-Print Network [OSTI]

Structural Optimization of High Voltage Transmission Line Towers considering Continuum and Discrete/or to common designs largely repeated (e.g. automotive compo- nents), and high voltage transmission towers can than conventional designs of high voltage transmission line towers. The optimization model proposed

Colominas, Ignasi

293

LM2907LM2917FrequencytoVoltageConverter February 1995  

E-Print Network [OSTI]

TL H 7942 LM2907LM2917FrequencytoVoltageConverter February 1995 LM2907 LM2917 Frequency to Voltage Converter General Description The LM2907 LM2917 series are monolithic frequency to voltage converters doubling for low ripple full input protection in two versions (LM2907-8 LM2917-8) and its output swings

Wedeward, Kevin

294

Accurately measuring current-voltage characteristics of tunnel diodes  

E-Print Network [OSTI]

of the bias voltage range of oscillations in the IV curve.and the bias voltage range of oscillation in the IV curve.or to know the exact voltage range of oscillation in the IV

Bao, Mingqiang; Wang, Kang L

2006-01-01T23:59:59.000Z

295

DCS1800/WCDMA ADAPTIVE VOLTAGE-CONTROLLED OSCILLATOR  

E-Print Network [OSTI]

DCS1800/WCDMA ADAPTIVE VOLTAGE-CONTROLLED OSCILLATOR Aleksandar Tasi, Wouter A. Serdijn and John R, an adaptive 2G/3G voltage-controlled oscillator (VCO) is described in this paper. For the DCS1800 operation with this reasoning, an adaptive 2G/3G voltage- controlled oscillator, meant for a dual-standard adaptive front

Serdijn, Wouter A.

296

System for increasing corona inception voltage of insulating oils  

DOE Patents [OSTI]

The Corona Inception Voltage of insulating oils is increased by repetitive cycles of prestressing the oil with a voltage greater than the corona inception voltage, and either simultaneously or serially removing byproducts of corona by evacuation and heating the oil. 5 figs.

Rohwein, G.J.

1998-05-19T23:59:59.000Z

297

Laser Telecommunication timeLaser beam  

E-Print Network [OSTI]

Laser Telecommunication Experiment Laser time Laser beam intensity timeLaser beam Laser battery Laser connected to a circuit without a modulator. Bottom graph illustrates what happen when a modulating signal is superimposed to the DC voltage driving the laser Laser beam intensity DC Input voltage DC

La Rosa, Andres H.

298

Real Time Grid Reliability Management 2005  

SciTech Connect (OSTI)

The increased need to manage California?s electricity grid in real time is a result of the ongoing transition from a system operated by vertically-integrated utilities serving native loads to one operated by an independent system operator supporting competitive energy markets. During this transition period, the traditional approach to reliability management -- construction of new transmission lines -- has not been pursued due to unresolved issues related to the financing and recovery of transmission project costs. In the absence of investments in new transmission infrastructure, the best strategy for managing reliability is to equip system operators with better real-time information about actual operating margins so that they can better understand and manage the risk of operating closer to the edge. A companion strategy is to address known deficiencies in offline modeling tools that are needed to ground the use of improved real-time tools. This project: (1) developed and conducted first-ever demonstrations of two prototype real-time software tools for voltage security assessment and phasor monitoring; and (2) prepared a scoping study on improving load and generator response models. Additional funding through two separate subsequent work authorizations has already been provided to build upon the work initiated in this project.

Eto, Joe; Eto, Joe; Lesieutre, Bernard; Lewis, Nancy Jo; Parashar, Manu

2008-07-07T23:59:59.000Z

299

Incorporating voltage security into the planning, operation and monitoring of restructured electric energy markets  

E-Print Network [OSTI]

As open access market principles are applied to power systems, significant changes are happening in their planning, operation and control. In the emerging marketplace, systems are operating under higher loading conditions as markets focus greater...

Nair, Nirmal-Kumar

2006-04-12T23:59:59.000Z

300

Global Material Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickr Flickr Editor'sshortGeothermal HeatStartedGirlsMaterial Security |

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

physical security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective Actions Program LANL TRU

302

safeguards and security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -

303

Nuclear Security 101 | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear Science

304

Nuclear Security Enterprise | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear

305

International Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for and NovelFEG-SEMInterlibrary LoanExercises |Security

306

Defense Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINLNuclear Security | National Nuclear

307

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartment ofofOxfordVeteransAdministrationPhysical Security Systems |

308

Voltage-dependent calcium channels and currents in native neurons and other cells have been divided into high voltage  

E-Print Network [OSTI]

Voltage-dependent calcium channels and currents in native neurons and other cells have been divided than one subtype of channel. A new subfamily of voltage-dependent calcium channel á1 subunit genes. 1999), having four domains, each with a voltage sensor and a pore-forming P loop. However

Dolphin, Annette C.

309

Security Administration Production Office,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security and

310

SecuritySmart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0SecuritySmart March 2009

311

Safety, Security & Environment  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguards and SecuritySafety for

312

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

313

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

314

Security enhanced with increased vehicle inspections  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

315

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

Amin, Saurabh

2011-01-01T23:59:59.000Z

316

Transient recovery voltage considerations in the application of medium voltage circuit breakers  

SciTech Connect (OSTI)

Medium Voltage Circuit Breakers can fail to interrupt 3-phase fault currents when power systems have Transient Recovery Voltage (TRV) characteristics which exceed the rating of the circuit breaker. This paper examines the application of 13.8kV generation and load switchgear for an oil refinery in which circuit parameters as originally designed would have exceeded the 13.8kV circuit breakers TRV ratings had corrective measures not been taken. This paper illustrates this case and discusses the basis of TRV, how TRV is assessed, and alternative actions taken to bring circuits to within the 13.8 kV circuit breaker ratings.

Swindler, D.L.; Schwartz, P.; Hamer, P.S.; Lambert, S.R.

1995-12-31T23:59:59.000Z

317

The 5 Waves of Information Security From Kristian Beckman to the Present  

E-Print Network [OSTI]

The 5 Waves of Information Security ­ From Kristian Beckman to the Present Prof SH (Basie) von to the present time. The paper makes use of two papers by the author, Information Security ­ the Third Wave (von Solms, 2000) and Information Security ­ the Fourth Wave (von Solms, 2006), as well as a paper

Boyer, Edmond

318

ata security feature: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

319

Optimizing performance per watt on GPUs in High Performance Computing: temperature, frequency and voltage effects  

E-Print Network [OSTI]

The magnitude of the real-time digital signal processing challenge attached to large radio astronomical antenna arrays motivates use of high performance computing (HPC) systems. The need for high power efficiency (performance per watt) at remote observatory sites parallels that in HPC broadly, where efficiency is an emerging critical metric. We investigate how the performance per watt of graphics processing units (GPUs) is affected by temperature, core clock frequency and voltage. Our results highlight how the underlying physical processes that govern transistor operation affect power efficiency. In particular, we show experimentally that GPU power consumption grows non-linearly with both temperature and supply voltage, as predicted by physical transistor models. We show lowering GPU supply voltage and increasing clock frequency while maintaining a low die temperature increases the power efficiency of an NVIDIA K20 GPU by up to 37-48% over default settings when running xGPU, a compute-bound code used in radio...

Price, D C; Barsdell, B R; Babich, R; Greenhill, L J

2014-01-01T23:59:59.000Z

320

Towards Efficient Collaboration in Cyber Security  

SciTech Connect (OSTI)

Cyber security analysts in different geographical and organizational domains are often largely tasked with similar duties, albeit with domain-specific variations. These analysts necessarily perform much of the same work independently for instance, analyzing the same list of security bulletins released by largely the same set of software vendors. As such, communication and collaboration between such analysts would be mutually beneficial to the analysts involved, potentially reducing redundancy and offering the opportunity to preemptively alert each other to high-severity security alerts in a more timely fashion. However, several barriers to practical and efficient collaboration exist, and as such, no such framework exists to support such efforts. In this paper, we discuss the inherent difficulties which make efficient collaboration between cyber security analysts a difficult goal to achieve. We discuss preliminary ideas and concepts towards a collaborative cyber-security framework currently under development, whose goal is to facilitate analyst collaboration across these boundaries. While still in its early stages, we describe work-in-progress towards achieving this goal, including motivation, functionality, concepts, and a high-level description of the proposed system architecture.

Hui, Peter SY; Bruce, Joseph R.; Fink, Glenn A.; Gregory, Michelle L.; Best, Daniel M.; McGrath, Liam R.; Endert, Alexander

2010-06-03T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Safety and Security What do Safety/Security work with?  

E-Print Network [OSTI]

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

322

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network [OSTI]

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

323

ccsd-00014522,version1-5Oct2006 Co-transport-induced instability of membrane voltage in tip-growing cells  

E-Print Network [OSTI]

ccsd-00014522,version1-5Oct2006 Co-transport-induced instability of membrane voltage in tip at the same time. It is shown that these co-transporters destabilize generically the membrane voltage- tive dynamics and activity of membrane ion channels. Action potential and cardiac excitation spiral

Paris-Sud XI, Université de

324

National Security System Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

325

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

326

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

2011-07-21T23:59:59.000Z

327

September 2004 INFORMATION SECURITY  

E-Print Network [OSTI]

September 2004 INFORMATION SECURITY WITHIN THE SYSTEM DEVELOPMENT LIFE CYCLE Annabelle Lee of Standards and Technology Many System Development Life Cycle (SDLC) models exist that can be used. This model assumes that the system will be delivered near the end of its life cycle. Another SDLC model uses

328

Headquarters Security Operations  

Broader source: Energy.gov [DOE]

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

329

Metaphors for cyber security.  

SciTech Connect (OSTI)

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

330

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

331

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

332

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

2005-08-26T23:59:59.000Z

333

A network security monitor  

SciTech Connect (OSTI)

The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

1989-11-01T23:59:59.000Z

334

ARMY Energy Security Considerations  

E-Print Network [OSTI]

ARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2 Situation OIL & GAS LIQUIDS 38% Rise in NTV Fuel Use 35% of DoD utilities 21% of Fed government 11

335

Arnold Schwarzenegger REAL-TIME GRID RELIABILITY  

E-Print Network [OSTI]

Arnold Schwarzenegger Governor REAL-TIME GRID RELIABILITY MANAGEMENT California ISO Real Laboratory Consortium for Electric Reliability Technology Solutions APPENDIXC October 2008 CEC-500 (VSA) prototype to monitor system voltage conditions and provide real time dispatchers with reliability

336

Departmental Personnel Security- Clearance Automation  

Broader source: Energy.gov [DOE]

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

337

Database Security: A Historical Perspective  

E-Print Network [OSTI]

The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

Lesov, Paul

2010-01-01T23:59:59.000Z

338

System security Dr Len Hamey  

E-Print Network [OSTI]

, firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

Hamey, Len

339

Safe epoxy encapsulant for high voltage magnetics  

SciTech Connect (OSTI)

This paper describes the use of Formula 456, an aliphatic amine cured epoxy for impregnating coils and high voltage transformers. Sandia has evaluated a number of MDA-free epoxy encapsulants which relied on either anhydride or other aromatic amine curing agents. The use of aliphatic amine curing agents was more recently evaluated and has resulted in the definition of Formula 456 resin. Methylene dianiline (MDA) has been used for more than 20 years as the curing agent for various epoxy formulations throughout the Department of Energy and much of industry. Sandia National Laboratories began the process of replacing MDA with other formulations because of regulations imposed by OSHA on the use of MDA. OSHA has regulated MDA because it is a suspect carcinogen. Typically the elimination of OSHA-regulated materials provides a rare opportunity to qualify new formulations in a range of demanding applications. It was important to take full advantage of that opportunity, although the associated materials qualification effort was costly. Small high voltage transformers are one of those demanding applications. The successful implementation of the new formulation for high reliability transformers will be described. The test results that demonstrate the parts are qualified for use in DOE weapon systems will be presented.

Sanchez, R.O.; Archer, W.E.

1998-01-01T23:59:59.000Z

340

{open_quotes}Secure Bus{close_quotes} disturbance-free power at the utility substation level  

SciTech Connect (OSTI)

Over the last 18 months Public Service Company of New Mexico (PNM), El Camino Real Engineering, Inc. (CRE), Los Alamos National Laboratory (LANL) and Sandia National Laboratories (SNL) have worked on the development of disturbance-free power at the medium voltage substation level. The work resulted in the Secure Bus concept, a system in which a medium voltage bus in a substation is immune to power outages and voltage sags on the utility source. The Secure Bus voltage is also immune to voltage sags resulting from faults on any distribution feeder connected to the bus. The Secure Bus concept originated from work conducted to improve power quality for large high-tech manufacturing facilities, in particular for large semiconductor manufacturing plants. For the demands on quality power of a modern facility conventional equipment is not adequate for protecting the end user. For example, the operation of conventional vacuum breakers during short circuit conditions on a feeder circuit, requiring 3 to 5 cycles for breaker opening, does not allow for fast enough current interruption to avoid a voltage dip on the main bus. A sever voltage sag could result in a shut down of sensitive equipment being supplied by the other feeder circuits, which are connected to the main bus. The circumvent the problem, a fast breaker was introduced which interrupts the short circuit before the current causes a significant voltage disturbance. To make the bus immune also to power disturbances caused by power outages, energy storage is introduced to provide the necessary energy back-up in case the primary source is not available.

Boenig, H.J. [Los Alamos National Lab., NM (United States); Jones, W.H. [El Camino Real Engineering, Inc., Corrales, NM (United States)

1996-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Safeguard Security and Awareness Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

2002-10-02T23:59:59.000Z

342

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

343

Safeguards and Security Program References  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

2005-08-26T23:59:59.000Z

344

East Asian Security in 2025  

E-Print Network [OSTI]

East Asian Security in 2025 Who We Are Reagan Heavin Energy Adam Hudson State Capacity Brandon Krueger Military Sean ONeil Demographics Griffin Rozell Balance of Power Matt Suma Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean ONeil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda Conclusions Projections Drivers Four Outcomes Questions East Asian Security in 2025...

Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

2008-01-01T23:59:59.000Z

345

January 2005 INTEGRATING IT SECURITY  

E-Print Network [OSTI]

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS technology (IT) security and capital planning and investment control (CPIC) processes have been performed taining appropriate security controls, both at the enterprise-wide and system level, commensurate

346

RECOMMENDED SECURITY CONTROLS FOR FEDERAL  

E-Print Network [OSTI]

May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information-53, Recommended Security Controls for Federal Information Systems The basic questions that organizations should

347

August 2003 IT SECURITY METRICS  

E-Print Network [OSTI]

, efficiency, effectiveness, and the impact of the security controls. The process steps need not be sequen tial metrics program and provides examples of metrics based on the criti cal elements and security controls and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

348

Positioning Security from electronic warfare  

E-Print Network [OSTI]

Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

Kuhn, Markus

349

Architectural support for enhancing security in clusters  

E-Print Network [OSTI]

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on rewalls for their security, but the rewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

350

Line Management Perspective: National Nuclear Security Administration...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

351

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

352

Secretary Richardson Accepts Recommendations for Improving Security...  

National Nuclear Security Administration (NNSA)

Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

353

Security Science & Technology | Nuclear Science | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

354

Design and applications of a flicker voltage generator  

SciTech Connect (OSTI)

In this paper, a 200W flicker voltage generator is made by using microcomputers and linear amplification circuits. The modulation amplitudes and frequencies based on the UIE {Delta}V{sub 10} evaluation can be arbitrarily assigned by software with high accuracy. The flicker voltage signals measured at the customer side also can be re-generated. Some applications, such as evaluating the effects of flicker voltage on incandescent and compact fluorescent lamps (CFLs), are also made. From experimental tests by use of the flicker voltage generator, the properties of some compact fluorescent lamps and incandescent lamps are compared. Those properties describe the relation between input voltage variation and output flux of lamps, such that there is direct description of influences of flicker voltages on lamps.

Chang, W.N.; Wu, C.J. [National Taiwan Inst. of Tech., Peitow-Taipei (Taiwan, Province of China). Dept. of Electrical Engineering

1995-12-31T23:59:59.000Z

355

Nuclear dependence| The Russian Federation's future reliance on nuclear weapons for national security.  

E-Print Network [OSTI]

?? The Russian Federation's reliance on nuclear weapons for national security will steadily increase over time. Based on current evidence and historical data, the Russian (more)

Lukszo, Adam J.

2011-01-01T23:59:59.000Z

356

PAPER ACCEPTED TO THE IEEE TRANSACTIONS ON POWER SYSTEMS 1 Sensitivity-based Security-constrained OPF Market  

E-Print Network [OSTI]

PAPER ACCEPTED TO THE IEEE TRANSACTIONS ON POWER SYSTEMS 1 Sensitivity-based Security-constrained OPF Market Clearing Model F. Milano, Member, IEEE, C. A. Ca~nizares, Senior Member, IEEE, and A. J constraints that properly include voltage stability limits in the operation of competitive electricity markets

Cañizares, Claudio A.

357

Design of a Solid-State Fast Voltage Compensator for klystron modulators requiring constant AC power consumption  

E-Print Network [OSTI]

This paper proposes a novel topological solution for klystron modulators integrating a Fast Voltage Compensator which allows an operation at constant power consumption from the utility grid. This kind of solution is mandatory for the CLIC project under study, which requires several hundreds of synchronously operated klystron modulators for a total pulsed power of 39 GW. The topology is optimized for the challenging CLIC specifications, which require a very precise output voltage flat-top as well as fast rise and fall times (3s). The Fast Voltage Compensator is integrated in the modulator such that it only has to manage the capacitor charger current and a fraction of the charging voltage. Consequently, its dimensioning power and cost is minimized.

Davide, Aguglia; Philippe, Viarouge; Jerome, Cros

2015-01-01T23:59:59.000Z

358

NREL: Measurements and Characterization - Current Versus Voltage  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions and Achievements ofLizResultsGeothermalAnalytical MicroscopyCurrent

359

Sequential circuit design for radiation hardened multiple voltage integrated circuits  

DOE Patents [OSTI]

The present invention includes a radiation hardened sequential circuit, such as a bistable circuit, flip-flop or other suitable design that presents substantial immunity to ionizing radiation while simultaneously maintaining a low operating voltage. In one embodiment, the circuit includes a plurality of logic elements that operate on relatively low voltage, and a master and slave latches each having storage elements that operate on a relatively high voltage.

Clark, Lawrence T. (Phoenix, AZ); McIver, III, John K. (Albuquerque, NM)

2009-11-24T23:59:59.000Z

360

Method for voltage-gated protein fractionation  

DOE Patents [OSTI]

We report unique findings on the voltage dependence of protein exclusion from the pores of nanoporous polymer exclusion membranes. The pores are small enough that proteins are excluded from passage with low applied electric fields, but increasing the field enables proteins to pass through. The requisite field necessary for a change in exclusion is protein-specific with a correlation to protein size. The field-dependence of exclusion is important to consider for preconcentration applications. The ability to selectively gate proteins at exclusion membranes is also a promising means for manipulating and characterizing proteins. We show that field-gated exclusion can be used to selectively remove proteins from a mixture, or to selectively trap protein at one exclusion membrane in a series.

Hatch, Anson (Tracy, CA); Singh, Anup K. (Danville, CA)

2012-04-24T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Electrochemical Characterization of Voltage Fade in LMR-NMC cells  

Broader source: Energy.gov (indexed) [DOE]

the extent of Voltage Fade December 2012 * Establish baseline data on standard materials to facilitate comparison of various datasets March 2013 * Obtain data to determine...

362

Vehicle Technologies Office Merit Review 2014: Voltage Fade,...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Voltage Fade, an ABR Deep Dive Project: Status and Outcomes Presentation given by Argonne National Laboratory at 2014 DOE Hydrogen and Fuel Cells Program and Vehicle...

363

Nanoscale Morphological and Chemical Changes of High Voltage...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nanoscale Morphological and Chemical Changes of High Voltage Lithium-Manganese Rich NMC Composite Cathodes with Cycling Friday, August 29, 2014 Renewable energy is critical for the...

364

active capacitive voltage: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Khoman 5 Discrete Steps in the Capacitance-Voltage Characteristics of GaInNGaN Light Emitting Diode Structures Materials Science Websites Summary: Discrete Steps in the...

365

High Voltage Electrolytes for Li-ion Batteries  

Broader source: Energy.gov (indexed) [DOE]

or otherwise restricted information High Voltage Electrolytes for Li-ion Batteries Vehicle Technologies Program 2 Overview * Start: Sep 2008 * End: Sep 2011 * 20 %...

366

Electrochemical Characterization of Voltage Fade in LMR-NMC cells...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Electrochemical Characterization of Voltage Fade in LMR-NMC cells 2013 DOE Hydrogen and Fuel Cells Program and Vehicle Technologies Program Annual Merit Review and Peer...

367

Triple voltage dc-to-dc converter and method  

DOE Patents [OSTI]

A circuit and method of providing three dc voltage buses and transforming power between a low voltage dc converter and a high voltage dc converter, by coupling a primary dc power circuit and a secondary dc power circuit through an isolation transformer; providing the gating signals to power semiconductor switches in the primary and secondary circuits to control power flow between the primary and secondary circuits and by controlling a phase shift between the primary voltage and the secondary voltage. The primary dc power circuit and the secondary dc power circuit each further comprising at least two tank capacitances arranged in series as a tank leg, at least two resonant switching devices arranged in series with each other and arranged in parallel with the tank leg, and at least one voltage source arranged in parallel with the tank leg and the resonant switching devices, said resonant switching devices including power semiconductor switches that are operated by gating signals. Additional embodiments having a center-tapped battery on the low voltage side and a plurality of modules on both the low voltage side and the high voltage side are also disclosed for the purpose of reducing ripple current and for reducing the size of the components.

Su, Gui-Jia (Knoxville, TN)

2008-08-05T23:59:59.000Z

368

Security seal. [Patent application  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, G.W.

1981-11-17T23:59:59.000Z

369

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | National Nuclear SecurityAdministration

370

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear Forensics Bioinformatics

371

Security Clearances; Limitations  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof the Americas | Department ofofDeliveredSectionSecuring theSEC. 1072.

372

Strengthening Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBiSiteNeutronStrategic Plan The

373

Local Dynamic Reactive Power for Correction of System Voltage Problems  

SciTech Connect (OSTI)

Distribution systems are experiencing outages due to a phenomenon known as local voltage collapse. Local voltage collapse is occurring in part because modern air conditioner compressor motors are much more susceptible to stalling during a voltage dip than older motors. These motors can stall in less than 3 cycles (.05s) when a fault, such as on the sub-transmission system, causes voltage to sag to 70 to 60%. The reasons for this susceptibility are discussed in the report. During the local voltage collapse, voltages are depressed for a period of perhaps one or two minutes. There is a concern that these local events are interacting together over larger areas and may present a challenge to system reliability. An effective method of preventing local voltage collapse is the use of voltage regulation from Distributed Energy Resources (DER) that can supply or absorb reactive power. DER, when properly controlled, can provide a rapid correction to voltage dips and prevent motor stall. This report discusses the phenomenon and causes of local voltage collapse as well as the control methodology we have developed to counter voltage sag. The problem is growing because of the use of low inertia, high efficiency air conditioner (A/C) compressor motors and because the use of electric A/C is growing in use and becoming a larger percentage of system load. A method for local dynamic voltage regulation is discussed which uses reactive power injection or absorption from local DER. This method is independent, rapid, and will not interfere with conventional utility system voltage control. The results of simulations of this method are provided. The method has also been tested at the ORNL s Distributed Energy Communications and Control (DECC) Laboratory using our research inverter and synchronous condenser. These systems at the DECC Lab are interconnected to an actual distribution system, the ORNL distribution system, which is fed from TVA s 161kV sub-transmission backbone. The test results are also provided and discussed. The simulations and testing show that local voltage control from DER can prevent local voltage collapse. The results also show that the control can be provided so quickly, within 0.5 seconds, that is does not interfere with conventional utility methods.

Kueck, John D [ORNL; Rizy, D Tom [ORNL; Li, Fangxing [ORNL; Xu, Yan [ORNL; Li, Huijuan [University of Tennessee, Knoxville (UTK); Adhikari, Sarina [ORNL; Irminger, Philip [ORNL

2008-12-01T23:59:59.000Z

374

Research progress in dynamic security assessment  

SciTech Connect (OSTI)

Areas discussed are power system modeling, state estimation, structure decomposition, state forecasting, clustering and security measure development. A detailed dynamic model of a multi-machine power system has been developed. A process state estimator was developed to estimate the long-term dynamic behavior of the power system. The algorithm is identical to the extended Kalman filter but has a modified process noise driving term. A two-stage structure estimation technique was proposed for identifying the power system network configuration. Two approaches to structure decomposition were investigated. A time-scale decomposition of the system equations, based on a singular perturbation approach, was evaluated using a detailed model of a generating system. Spatial decomposition was examined by applying an optimal network decomposition technique to a 39-bus test system. Stochastic approximation based approaches to estimator simplification were examined. Explicit expressions were obtained for the evolution of the first and second moments of the system state. Research into security measures proceeded in three directions. The first area involves viewing the security assessment problem as a hyperplane crossing problem for a stochastic process. The second approach examined the stability of an unforced linear system where the system coefficients are subject to future jumps. The third area of research has led to the formulation of a security measure suitable for on-line assessment of transient stability.

Not Available

1982-12-01T23:59:59.000Z

375

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

376

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

377

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network [OSTI]

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 ? 25, 2010 ESL-HH-10-08-09 Proceedings of the 17... of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...

Ragsdale, G.

378

Measurement of high voltage using Rutherford backscattering spectrometry  

E-Print Network [OSTI]

A novel variation of Rutherford Backscattering Spectrometry (RBS) has been utilized to measure a high voltage collected on an aluminum target by Direct Energy Conversion. The maximum high voltage on the target was measured to be 97.5 kV +/- 2 k...

Abrego, Celestino Pete

2007-04-25T23:59:59.000Z

379

A LOW-VOLTAGE TEMPERATURE-STABLE MICROMECHANICAL PIEZOELECTRIC OSCILLATOR  

E-Print Network [OSTI]

A LOW-VOLTAGE TEMPERATURE-STABLE MICROMECHANICAL PIEZOELECTRIC OSCILLATOR Reza Abdolvand, Hossein polarization voltages (5-20V) for operation, which complicates the design of the oscillator circuit in today reference oscillator that utilizes a temperature-stable thin- film piezoelectric-on-silicon resonator

Ayazi, Farrokh

380

LOW VOLTAGE ANALOG CIRCUITS USING STANDARD CMOS TECHNOLOGY  

E-Print Network [OSTI]

LOW VOLTAGE ANALOG CIRCUITS USING STANDARD CMOS TECHNOLOGY Phillip E. Allen, Benjamin J. Blalock, and Gabriel A. Rincon School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta supply voltages in CMOS integrated circuits. As the channel lengths of CMOS technology decrease

Rincon-Mora, Gabriel A.

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Power Grid Voltage Integrity Verification Department of ECE  

E-Print Network [OSTI]

Power Grid Voltage Integrity Verification Maha Nizam Department of ECE University of Toronto devgan@magma-da.com ABSTRACT Full-chip verification requires one to check if the power grid is safe, i.e., if the voltage drop on the grid does not exceed a cer- tain threshold. The traditional simulation-based solution

Najm, Farid N.

382

Department of Energy award DE-SC0004164 Climate and National Security: Securing Better Forecasts  

SciTech Connect (OSTI)

The Climate and National Security: Securing Better Forecasts symposium was attended by senior policy makers and distinguished scientists. The juxtaposition of these communities was creative and fruitful. They acknowledged they were speaking past each other. Scientists were urged to tell policy makers about even improbable outcomes while articulating clearly the uncertainties around the outcomes. As one policy maker put it, we are accustomed to making these types of decisions. These points were captured clearly in an article that appeared on the New York Times website and can be found with other conference materials most easily on our website, www.scripps.ucsd.edu/cens/. The symposium, generously supported by the NOAA/JIMO, benefitted the public by promoting scientifically informed decision making and by the transmission of objective information regarding climate change and national security.

Reno Harnish

2011-08-16T23:59:59.000Z

383

Living and Working Safely Around High-Voltage Power Lines.  

SciTech Connect (OSTI)

High-voltage transmission lines can be just as safe as the electrical wiring in the homes--or just as dangerous. The crucial factor is ourselves: they must learn to behave safely around them. This booklet is a basic safety guide for those who live and work around power lines. It deals primarily with nuisance shocks due to induced voltages, and with potential electric shock hazards from contact with high-voltage lines. References on possible long-term biological effects of transmission lines are shown. In preparing this booklet, the Bonneville Power Administration has drawn on more than 50 years of experience with high-voltage transmission. BPA operates one of the world`s largest networks of long-distance, high-voltage lines. This system has more than 400 substations and about 15,000 miles of transmission lines, almost 4,400 miles of which are operated at 500,000 volts.

United States. Bonneville Power Administration.

2001-06-01T23:59:59.000Z

384

E-beam high voltage switching power supply  

DOE Patents [OSTI]

A high-power power supply produces a controllable, constant high voltage put under varying and arcing loads. The power supply includes a voltage regulator, an inductor, an inverter for producing a high frequency square wave current of alternating polarity, an improved inverter voltage clamping circuit, a step up transformer, an output rectifier for producing a dc voltage at the output of each module, and a current sensor for sensing output current. The power supply also provides dynamic response to varying loads by controlling the voltage regulator duty cycle and circuitry is provided for sensing incipient arc currents at the output of the power supply to simultaneously decouple the power supply circuitry from the arcing load. The power supply includes a plurality of discrete switching type dc--dc converter modules.

Shimer, Daniel W. (Danville, CA); Lange, Arnold C. (Livermore, CA)

1996-01-01T23:59:59.000Z

385

E-beam high voltage switching power supply  

DOE Patents [OSTI]

A high-power power supply produces a controllable, constant high voltage output under varying and arcing loads. The power supply includes a voltage regulator, an inductor, an inverter for producing a high frequency square wave current of alternating polarity, an improved inverter voltage clamping circuit, a step up transformer, an output rectifier for producing a dc voltage at the output of each module, and a current sensor for sensing output current. The power supply also provides dynamic response to varying loads by controlling the voltage regulator duty cycle and circuitry is provided for sensing incipient arc currents at the output of the power supply to simultaneously decouple the power supply circuitry from the arcing load. The power supply includes a plurality of discrete switching type dc--dc converter modules. 5 figs.

Shimer, D.W.; Lange, A.C.

1996-10-15T23:59:59.000Z

386

Dye filled security seal  

DOE Patents [OSTI]

A security seal for providing an indication of unauthorized access to a sealed object includes an elongate member to be entwined in the object such that access is denied unless the member is removed. The elongate member has a hollow, pressurizable chamber extending throughout its length that is filled with a permanent dye under greater than atmospheric pressure. Attempts to cut the member and weld it together are revealed when dye flows through a rupture in the chamber wall and stains the outside surface of the member.

Wilson, Dennis C. W. (Tijeras, NM)

1982-04-27T23:59:59.000Z

387

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScience National

388

National Security Science Archive  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScienceScience »

389

Security | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduled System OutagesNews PressThemesLinksUserSecurity

390

Security | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0

391

PNNL: Security & Privacy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 TheSteven Ashby Dr. Steven Ashby Photo Dr.1999alt=Search

392

Energy Security Overview  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing Zirconia Nanoparticles asSecondCareerFebruaryEnergySecurity Overview We are

393

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The National

394

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The NationalWashington. DC

395

Natlonal Nuclear Security Admlnlstratlon  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy2015 | JeffersonNations

396

Spark-safe low-voltage detonator  

DOE Patents [OSTI]

A column of explosive in a low-voltage detonator which makes it spark-safe ncludes an organic secondary explosive charge of HMX in the form of a thin pad disposed in a bore of a housing of the detonator in an ignition region of the explosive column and adjacent to an electrical ignition device at one end of the bore. The pad of secondary charge has an axial thickness within the range of twenty to thirty percent of its diameter. The explosive column also includes a first explosive charge of CP disposed in the housing bore in the ignition region of the explosive column next to the secondary charge pad on a side opposite from the ignition device. The first CP charge is loaded under sufficient pressure, 25 to 40 kpsi, to provide mechanical confinement of the pad of secondary charge and physical coupling thereof with the ignition device. The explosive column further includes a second explosive charge of CP disposed in the housing bore in a transition region of the explosive column next to the first CP charge on a side opposite from the pad of secondary charge. The second CP charge is loaded under sufficient pressure, about 10 kpsi, to allow occurrence of DDT. The first explosive CP charge has an axial thickness within the range of twenty to thirty percent of its diameter, whereas the second explosive CP charge contains a series of increments (nominally 4) each of which has an axial thickness-to-diameter ratio of one to two.

Lieberman, Morton L. (Albuquerque, NM)

1989-01-01T23:59:59.000Z

397

Bonfire-safe low-voltage detonator  

DOE Patents [OSTI]

A column of explosive in a low-voltage detonator which makes it bonfire-safe includes a first layer of an explosive charge of CP, or a primary explosive, and a second layer of a secondary organic explosive charge, such as PETN, which has a degradation temperature lower than the autoignition temperature of the CP or primary explosives. The first layer is composed of a pair of increments disposed in a bore of a housing of the detonator in an ignition region of the explosive column and adjacent to and in contact with an electrical ignition device at one end of the bore. The second layer is composed of a plurality of increments disposed in the housing bore in a transition region of the explosive column next to and in contact with the first layer on a side opposite from the ignition device. The first layer is loaded under a sufficient high pressure, 25 to 40 kpsi, to achieve ignition, whereas the second layer is loaded under a sufficient low pressure, about 10 kpsi, to allow occurrence of DDT. Each increment of the first and second layers has an axial length-to-diameter ratio of one-half.

Lieberman, Morton L. (Albuquerque, NM)

1990-01-01T23:59:59.000Z

398

Bonfire-safe low-voltage detonator  

DOE Patents [OSTI]

A column of explosive in a low-voltage detonator which makes it bonfire-safe includes a first layer of an explosive charge of CP, or a primary explosive, and a second layer of a secondary organic explosive charge, such as PETN, which has a degradation temperature lower than the autoignition temperature of the CP or primary explosives. The first layer is composed of a pair of increments disposed in a bore of a housing of the detonator in an ignition region of the explosive column and adjacent to and in contact with an electrical ignition device at one end of the bore. The second layer is composed of a plurality of increments disposed in the housing bore in a transition region of the explosive column next to and in contact with the first layer on a side opposite from the ignition device. The first layer is loaded under a sufficient high pressure, 25 to 40 kpsi, to achieve ignition, whereas the second layer is loaded under a sufficient low pressure, about 10 kpsi, to allow occurrence of DDT. Each increment of the first and second layers has an axial length-to-diameter ratio of one-half. 2 figs.

Lieberman, M.L.

1988-07-01T23:59:59.000Z

399

Transient power supply voltage (v{sub DDT}) analysis for detecting IC defects  

SciTech Connect (OSTI)

Transient power supply voltage (V{sub DDT}) analysis is a new testing technique demonstrated as a powerful alternative and complement to I{sub DDQ} testing. V{sub DDT} takes advantage of the limited response time of a voltage supply to the changing power demands of an IC during operation. Changes in the V{sub DD} response time are used to detect increases in power demand with resolutions of 100 nA at 100 kHz, 1 {mu}A at 1 MHz, and 2.5 {mu}A at 1.5 MHz. These current sensitivities have been shown for ICs with quiescent currents < 0.1 {mu}A and > 300 {mu}A. The V{sub DDT} signal acquisition protocols, frequency versus sensitivity tradeoffs, hardware considerations and limitations, data examples, and areas for future research are described.

Cole, E.I. Jr.; Soden, J.M.; Beegle, R.W. [and others

1997-04-01T23:59:59.000Z

400

Technology Transfer Success Stories, Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Navigate Home About Us Contact Information Hide Thumbs First Previous Pause Next Last Set Speed Slideshow speed: 5 seconds Move Autoinduction system New Image Set...

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Climate Change and National Security  

E-Print Network [OSTI]

CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 Climate change acts as a threat

Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

2015-01-01T23:59:59.000Z

402

David Telles wins NNSA Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

who conduct vulnerability analyses, authored the LANL Site Safeguards and Security Plan, and administered the Lab's Performance Assurance Program. Under his leadership,...

403

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

2008-08-12T23:59:59.000Z

404

Secure Data Center (Fact Sheet)  

SciTech Connect (OSTI)

This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

Not Available

2012-08-01T23:59:59.000Z

405

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

1995-09-28T23:59:59.000Z

406

Security classification of information  

SciTech Connect (OSTI)

This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

Quist, A.S.

1993-04-01T23:59:59.000Z

407

High voltage dc--dc converter with dynamic voltage regulation and decoupling during load-generated arcs  

DOE Patents [OSTI]

A high-power power supply produces a controllable, constant high voltage output under varying and arcing loads. The power supply includes a voltage regulator, an inductor, an inverter for producing a high frequency square wave current of alternating polarity, an improved inverter voltage clamping circuit, a step up transformer, an output rectifier for producing a dc voltage at the output of each module, and a current sensor for sensing output current. The power supply also provides dynamic response to varying loads by controlling the voltage regulator duty cycle and circuitry is provided for sensing incipient arc currents at the output of the power supply to simultaneously decouple the power supply circuitry from the arcing load. The power supply includes a plurality of discrete switching type dc--dc converter modules. 5 Figs.

Shimer, D.W.; Lange, A.C.

1995-05-23T23:59:59.000Z

408

High voltage dc-dc converter with dynamic voltage regulation and decoupling during load-generated arcs  

DOE Patents [OSTI]

A high-power power supply produces a controllable, constant high voltage output under varying and arcing loads. The power supply includes a voltage regulator, an inductor, an inverter for producing a high frequency square wave current of alternating polarity, an improved inverter voltage clamping circuit, a step up transformer, an output rectifier for producing a dc voltage at the output of each module, and a current sensor for sensing output current. The power supply also provides dynamic response to varying loads by controlling the voltage regulator duty cycle and circuitry is provided for sensing incipient arc currents at the output of the power supply to simultaneously decouple the power supply circuitry from the arcing load. The power supply includes a plurality of discrete switching type dc--dc converter modules.

Shimer, Daniel W. (Danville, CA); Lange, Arnold C. (Livermore, CA)

1995-01-01T23:59:59.000Z

409

Ideas for Security Assurance in Security Critical Software using Modelica  

E-Print Network [OSTI]

Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

Zhao, Yuxiao

410

2014 Headquarters Facilities Master Security Plan - Chapter 8...  

Office of Environmental Management (EM)

8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

411

2014 Headquarters Facilities Master Security Plan - Chapter 14...  

Office of Environmental Management (EM)

4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

412

2014 Headquarters Facilities Master Security Plan - Chapter 1...  

Office of Environmental Management (EM)

, Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

413

2014 Headquarters Facilities Master Security Plan - Chapter 10...  

Office of Environmental Management (EM)

0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

414

2014 Headquarters Facilities Master Security Plan - Chapter 3...  

Office of Environmental Management (EM)

3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

415

Panel Session: Optimization Techniques in Voltage Collapse Analysis," IEEE PES Summer Meeting, San Diego, July 14, 1998. Applications of Optimization to Voltage Collapse Analysis  

E-Print Network [OSTI]

Panel Session: Optimization Techniques in Voltage Collapse Analysis," IEEE PES Summer Meeting, San Diego, July 14, 1998. Applications of Optimization to Voltage Collapse Analysis Claudio A. Ca|Thispaper describesseveralapplica- tions of optimization for voltage stability analysis VSA of power systems. Voltage stability prob

Cañizares, Claudio A.

416

Spark-safe low-voltage detonator  

DOE Patents [OSTI]

A column of explosive in a low-voltage detonator which makes it spark-safe includes an organic secondary explosive charge of HMX in the form of a thin pad disposed in a bore of a housing of the detonator in an ignition region of the explosive column and adjacent to an electrical ignition device at one end of the bore. The pad of secondary charge has an axial thickness within the range of twenty to thirty percent of its diameter. The explosive column also includes a first explosive charge of CP disposed in the housing bore in the ignition region of the explosive column next to the secondary charge pad on a side opposite from the ignition device. The first CP charge is loaded under sufficient pressure, 25 to 40 kpsi, to provide mechanical confinement of the pad of secondary charge and physical coupling thereof with the ignition device. The explosive column further includes a second explosive charge of CP disposed in the housing bore in a transition region of the explosive column next to the first CP charge on a side opposite from the pad of secondary charge. The second CP charge is loaded under sufficient pressure, about 10 kpsi, to allow occurrence of DDT. The first explosive CP charge has an axial thickness within the range of twenty to thirty percent of its diameter, whereas the second explosive CP charge contains a series of increments (nominally 4), each of which has an axial thickness-to-diameter ratio of one to two. 2 figs.

Lieberman, M.L.

1988-07-01T23:59:59.000Z

417

Electro-optic voltage sensor with Multiple Beam Splitting  

DOE Patents [OSTI]

A miniature electro-optic voltage sensor system capable of accurate operation at high voltages without use of the dedicated voltage dividing hardware. The invention achieves voltage measurement without significant error contributions from neighboring conductors or environmental perturbations. The invention employs a transmitter, a sensor, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor. Within the sensor the beam undergoes the Pockels electro-optic effect. The electro-optic effect produces a modulation of the beam's polarization, which is in turn converted to a pair of independent conversely-amplitude-modulated signals, from which the voltage of the E-field is determined by the signal processor. The use of converse AM signals enables the signal processor to better distinguish signal from noise. The sensor converts the beam by splitting the beam in accordance with the axes of the beam's polarization state (an ellipse) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured.

Woods, Gregory K. (Cornelius, OR); Renak, Todd W. (Idaho Falls, ID); Crawford, Thomas M. (Idaho Falls, ID); Davidson, James R. (Idaho Falls, ID)

2000-01-01T23:59:59.000Z

418

Electro-optic voltage sensor with beam splitting  

DOE Patents [OSTI]

The invention is a miniature electro-optic voltage sensor system capable of accurate operation at high voltages without use of the dedicated voltage dividing hardware typically found in the prior art. The invention achieves voltage measurement without significant error contributions from neighboring conductors or environmental perturbations. The invention employs a transmitter, a sensor, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor. Within the sensor the beam undergoes the Pockels electro-optic effect. The electro-optic effect produces a modulation of the beam's polarization, which is in turn converted to a pair of independent conversely-amplitude-modulated signals, from which the voltage of the E-field is determined by the signal processor. The use of converse AM signals enables the signal processor to better distinguish signal from noise. The sensor converts the beam by splitting the beam in accordance with the axes of the beam's polarization state (an ellipse) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured.

Woods, Gregory K. (Cornelius, OR); Renak, Todd W. (Idaho Falls, ID); Davidson, James R. (Idaho Falls, ID); Crawford, Thomas M. (Idaho Falls, ID)

2002-01-01T23:59:59.000Z

419

Workshop on Education in Computer Security Page 1 Computer Security in Introductory Programming Classes  

E-Print Network [OSTI]

of domains occurs in a secure manner (as defined by the site security policy) and that the change in domains

Bishop, Matt

420

The changing face of Hanford security 1990--1994  

SciTech Connect (OSTI)

The meltdown of the Cold War was a shock to the systems built to cope with it. At the DOE`s Hanford Site in Washington State, a world-class safeguards and security system was suddenly out of step with the times. The level of protection for nuclear and classified materials was exceptional. But the cost was high and the defense facilities that funded security were closing down. The defense mission had created an umbrella of security over the sprawling Hanford Site. Helicopters designed to ferry special response teams to any trouble spot on the 1,456 square-kilometer site made the umbrella analogy almost literally true. Facilities were grouped into areas, fenced off like a military base, and entrance required a badge check for everyone. Within the fence, additional rings of protection were set up around security interests or targets. The security was effective, but costly to operate and inconvenient for employees and visitors alike. Moreover, the umbrella meant that virtually all employees needed a security clearance just to get to work, whether they worked on classified or unclassified projects. Clearly, some fundamental rethinking of safeguards and security was needed. The effort to meet that challenge is the story of transition at Hanford and documented here.

Thielman, J.

1995-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Secure Interoperable Open Smart Grid Demonstration Project  

SciTech Connect (OSTI)

The Consolidated Edison, Inc., of New York (Con Edison) Secure Interoperable Open Smart Grid Demonstration Project (SGDP), sponsored by the United States (US) Department of Energy (DOE), demonstrated that the reliability, efficiency, and flexibility of the grid can be improved through a combination of enhanced monitoring and control capabilities using systems and resources that interoperate within a secure services framework. The project demonstrated the capability to shift, balance, and reduce load where and when needed in response to system contingencies or emergencies by leveraging controllable field assets. The range of field assets includes curtailable customer loads, distributed generation (DG), battery storage, electric vehicle (EV) charging stations, building management systems (BMS), home area networks (HANs), high-voltage monitoring, and advanced metering infrastructure (AMI). The SGDP enables the seamless integration and control of these field assets through a common, cyber-secure, interoperable control platform, which integrates a number of existing legacy control and data systems, as well as new smart grid (SG) systems and applications. By integrating advanced technologies for monitoring and control, the SGDP helps target and reduce peak load growth, improves the reliability and efficiency of Con Edisons grid, and increases the ability to accommodate the growing use of distributed resources. Con Edison is dedicated to lowering costs, improving reliability and customer service, and reducing its impact on the environment for its customers. These objectives also align with the policy objectives of New York State as a whole. To help meet these objectives, Con Edisons long-term vision for the distribution grid relies on the successful integration and control of a growing penetration of distributed resources, including demand response (DR) resources, battery storage units, and DG. For example, Con Edison is expecting significant long-term growth of DG. The SGDP enables the efficient, flexible integration of these disparate resources and lays the architectural foundations for future scalability. Con Edison assembled an SGDP team of more than 16 different project partners, including technology vendors, and participating organizations, and the Con Edison team provided overall guidance and project management. Project team members are listed in Table 1-1.

Magee, Thoman

2014-12-31T23:59:59.000Z

422

Pricing Security L. Jean Camp  

E-Print Network [OSTI]

documented, with free patches, continue to exist on the Internet(Farmer, 1999). An alternative solution on the issues of defining the good and jumpstarting a market in the information survivability workshop. Security, the lack of security on one machine can cause adverse effects on another. The most obvious example

Camp, L. Jean

423

Fluid Mechanics and Homeland Security  

E-Print Network [OSTI]

Fluid Mechanics and Homeland Security Gary S. Settles Mechanical and Nuclear Engineering Department. 2006. 38:87­110 The Annual Review of Fluid Mechanics is online at fluid.annualreviews.org doi: 10 security involves many applications of fluid mechanics and offers many opportunities for research

Settles, Gary S.

424

Reporting Incidents Of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

2001-04-03T23:59:59.000Z

425

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

426

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

427

FOOD SECURITY: WAYS FORWARD THROUGH  

E-Print Network [OSTI]

FOOD SECURITY: WAYS FORWARD THROUGH COOPERATIVE PRODUCTION AND MARKETING1 "Given the chance, poor. The Sustainable Community Connections project, coordinated by AWISH-HELLAS, seeks to address food security issues) olive oil-related products, with targeting of markets in the European Union (EU) and United States (US

Zaferatos, Nicholas C.

428

Secure Compressed Reading in Smart Grids  

E-Print Network [OSTI]

Smart Grids measure energy usage in real-time and tailor supply and delivery accordingly, in order to improve power transmission and distribution. For the grids to operate effectively, it is critical to collect readings from massively-installed smart meters to control centers in an efficient and secure manner. In this paper, we propose a secure compressed reading scheme to address this critical issue. We observe that our collected real-world meter data express strong temporal correlations, indicating they are sparse in certain domains. We adopt Compressed Sensing technique to exploit this sparsity and design an efficient meter data transmission scheme. Our scheme achieves substantial efficiency offered by compressed sensing, without the need to know beforehand in which domain the meter data are sparse. This is in contrast to traditional compressed-sensing based scheme where such sparse-domain information is required a priori. We then design specific dependable scheme to work with our compressed sensing based ...

Cai, Sheng; Chen, Minghua; Yan, Jianxin; Jaggi, Sidharth

2012-01-01T23:59:59.000Z

429

Optically triggered high voltage switch network and method for switching a high voltage  

DOE Patents [OSTI]

An optically triggered solid state switch and method for switching a high voltage electrical current. A plurality of solid state switches (350) are connected in series for controlling electrical current flow between a compensation capacitor (112) and ground in a reactive power compensator (50, 50') that monitors the voltage and current flowing through each of three distribution lines (52a, 52b and 52c), which are supplying three-phase power to one or more inductive loads. An optical transmitter (100) controlled by the reactive power compensation system produces light pulses that are conveyed over optical fibers (102) to a switch driver (110') that includes a plurality of series connected optical triger circuits (288). Each of the optical trigger circuits controls a pair of the solid state switches and includes a plurality of series connected resistors (294, 326, 330, and 334) that equalize or balance the potential across the plurality of trigger circuits. The trigger circuits are connected to one of the distribution lines through a trigger capacitor (340). In each switch driver, the light signals activate a phototransistor (300) so that an electrical current flows from one of the energy reservoir capacitors through a pulse transformer (306) in the trigger circuit, producing gate signals that turn on the pair of serially connected solid state switches (350).

El-Sharkawi, Mohamed A. (Renton, WA); Andexler, George (Everett, WA); Silberkleit, Lee I. (Mountlake Terrace, WA)

1993-01-19T23:59:59.000Z

430

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

1995-09-28T23:59:59.000Z

431

Office of Headquarters Personnel Security Operations  

Broader source: Energy.gov [DOE]

The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

432

Departmental Personnel Security- Policy and Procedures  

Broader source: Energy.gov [DOE]

Departmental Personnel Security provides centralized and authoritative policy guidance and ensures consistent and effective implementation of the DOE personnel security program Department-wide to include the National Nuclear Security Administration.

433

A capacitor-less low drop-out voltage regulator with fast transient response  

E-Print Network [OSTI]

. Most systems incorporate several voltage regulators which supply various subsystems and provide isolation among such subsystems. Low dropout (LDO) voltage regulators are generally used to supply low voltage, low noise analog circuitry. Each LDO...

Milliken, Robert Jon

2006-04-12T23:59:59.000Z

434

Multilevel cascade voltage source inverter with seperate DC sources  

DOE Patents [OSTI]

A multilevel cascade voltage source inverter having separate DC sources is described herein. This inverter is applicable to high voltage, high power applications such as flexible AC transmission systems (FACTS) including static VAR generation (SVG), power line conditioning, series compensation, phase shifting and voltage balancing and fuel cell and photovoltaic utility interface systems. The M-level inverter consists of at least one phase wherein each phase has a plurality of full bridge inverters equipped with an independent DC source. This inverter develops a near sinusoidal approximation voltage waveform with only one switching per cycle as the number of levels, M, is increased. The inverter may have either single-phase or multi-phase embodiments connected in either wye or delta configurations.

Peng, Fang Zheng (Oak Ridge, TN); Lai, Jih-Sheng (Knoxville, TN)

1997-01-01T23:59:59.000Z

435

Multilevel cascade voltage source inverter with separate DC sources  

DOE Patents [OSTI]

A multilevel cascade voltage source inverter having separate DC sources is described herein. This inverter is applicable to high voltage, high power applications such as flexible AC transmission systems (FACTS) including static VAR generation (SVG), power line conditioning, series compensation, phase shifting and voltage balancing and fuel cell and photovoltaic utility interface systems. The M-level inverter consists of at least one phase wherein each phase has a plurality of full bridge inverters equipped with an independent DC source. This inverter develops a near sinusoidal approximation voltage waveform with only one switching per cycle as the number of levels, M, is increased. The inverter may have either single-phase or multi-phase embodiments connected in either wye or delta configurations. 15 figs.

Peng, F.Z.; Lai, J.S.

1997-06-24T23:59:59.000Z

436

Unravelling the Performance Degradation Mechanisms in High-voltage...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Unravelling the Performance Degradation Mechanisms in High-voltage Lithium-ion Battery Composite Oxide Electrodes Apr 11 2014 02:00 PM - 03:00 PM Debasish Mohanty, ORNL, Oak Ridge...

437

Stability issues in IC Low Drop Out voltage regulators  

E-Print Network [OSTI]

Performance issues of IC Low Drop Out (LDO) voltage regulators, with specific reference to stability, are discussed in this thesis. Evaluation of existing frequency compensation schemes and their performances across operating loads is presented...

Chava, Krishna Chaitanya

2002-01-01T23:59:59.000Z

438

Operation of buck regulator with ultra-low input voltage  

E-Print Network [OSTI]

Based on the LTC3621 and LTC3624, the designed buck regulator proposed in this thesis aims to lower the allowed input voltage and increase efficiency compared to the original part without making significant changes to ...

Harris, Cory Angelo

2014-01-01T23:59:59.000Z

439

Voltage Dependent Charge Storage Modes and Capacity in Subnanometer Pores  

SciTech Connect (OSTI)

Using molecular dynamics simulations, we show that charge storage in subnanometer pores follows a distinct voltage-dependent behavior. Specifically, at lower voltages, charge storage is achieved by swapping co-ions in the pore with counterions in the bulk electrolyte. As voltage increases, further charge storage is due mainly to the removal of co-ions from the pore, leading to a capacitance increase. The capacitance eventually reaches a maximum when all co-ions are expelled from the pore. At even higher electrode voltages, additional charge storage is realized by counterion insertion into the pore, accompanied by a reduction of capacitance. The molecular mechanisms of these observations are elucidated and provide useful insight for optimizing energy storage based on supercapacitors.

Qiao, Rui [Clemson University; Meunier, V. [Rensselaer Polytechnic Institute (RPI); Huang, Jingsong [ORNL; Wu, Peng [ORNL; Sumpter, Bobby G [ORNL

2012-01-01T23:59:59.000Z

440

An Adaptive Voltage Control Algorithm with Multiple Distributed Energy  

SciTech Connect (OSTI)

Distributed energy resources (DE) with power electronics (PE) interfaces with the right control are capable of providing reactive power related ancillary services. Voltage regulation in particular has drawn much attention. In this paper the challenges to control multiple DEs to regulate the local voltage in distribution systems is addressed and a decentralized adaptive voltage control method is proposed. The simulation results in different system conditions show that this adaptive voltage control method is capable of satisfying the fast response speed requirement without causing oscillation or instability of the system. Since this method has high tolerance to the shortage of the system parameters and can be widely adaptive to the variable operation situations of the power systems, it is very suited for the utility application.

Li, Huijuan [University of Tennessee, Knoxville (UTK); Li, Fangxing [ORNL; Adhikari, Sarina [ORNL; Xu, Yan [ORNL; Rizy, D Tom [ORNL; Kueck, John D [ORNL

2009-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Modeling the operating voltage of liquid metal battery cells  

E-Print Network [OSTI]

A one-dimensional, integrative model of the voltage during liquid metal battery operation has been developed to enhance the understanding of performance at the cell level. Two liquid metal batteries were studied: Mg-Sb for ...

Newhouse, Jocelyn Marie

2014-01-01T23:59:59.000Z

442

Multilevel cascade voltage source inverter with seperate DC sources  

DOE Patents [OSTI]

A multilevel cascade voltage source inverter having separate DC sources is described herein. This inverter is applicable to high voltage, high power applications such as flexible AC transmission systems (FACTS) including static VAR generation (SVG), power line conditioning, series compensation, phase shifting and voltage balancing and fuel cell and photovoltaic utility interface systems. The M-level inverter consists of at least one phase wherein each phase has a plurality of full bridge inverters equipped with an independent DC source. This inverter develops a near sinusoidal approximation voltage waveform with only one switching per cycle as the number of levels, M, is increased. The inverter may have either single-phase or multi-phase embodiments connected in either wye or delta configurations.

Peng, Fang Zheng (Knoxville, TN); Lai, Jih-Sheng (Blacksburg, VA)

2002-01-01T23:59:59.000Z

443

High frequency AC power converter for low voltage circuits  

E-Print Network [OSTI]

This thesis presents a novel AC power delivery architecture that is suitable for VHF frequency (50-100MHz) polyphase AC/DC power conversion in low voltage integrated circuits. A complete AC power delivery architecture was ...

Salazar, Nathaniel Jay Tobias

2012-01-01T23:59:59.000Z

444

Planar LTCC transformers for high voltage flyback converters: Part II.  

SciTech Connect (OSTI)

This paper is a continuation of the work presented in SAND2007-2591 'Planar LTCC Transformers for High Voltage Flyback Converters'. The designs in that SAND report were all based on a ferrite tape/dielectric paste system originally developed by NASCENTechnoloy, Inc, who collaborated in the design and manufacturing of the planar LTCC flyback converters. The output/volume requirements were targeted to DoD application for hard target/mini fuzing at around 1500 V for reasonable primary peak currents. High voltages could be obtained but with considerable higher current. Work had begun on higher voltage systems and is where this report begins. Limits in material properties and processing capabilities show that the state-of-the-art has limited our practical output voltage from such a small part volume. In other words, the technology is currently limited within the allowable funding and interest.

Schofield, Daryl (NASCENTechnology, Inc., Watertown, SD); Schare, Joshua M., Ph.D.; Slama, George (NASCENTechnology, Inc., Watertown, SD); Abel, David (NASCENTechnology, Inc., Watertown, SD)

2009-02-01T23:59:59.000Z

445

Secondary Control for Voltage Unbalance Compensation in an Islanded Microgrid  

E-Print Network [OSTI]

coupling (PCC). Unbalance compensation is achieved by proper control of distributed generators (DGs unbalance. Keywords-distributed generation; microgrid; secondary control; voltage unbalance compensation I. INTRODUCTION Distributed Generators (DGs) may be connected individually to the utility grid or be integrated

Vasquez, Juan Carlos

446

IMPACT OF DYNAMIC VOLTAGE SCALING (DVS) ON CIRCUIT OPTIMIZATION  

E-Print Network [OSTI]

Circuit designers perform optimization procedures targeting speed and power during the design of a circuit. Gate sizing can be applied to optimize for speed, while Dual-VT and Dynamic Voltage Scaling (DVS) can be applied to optimize for leakage...

Esquit Hernandez, Carlos A.

2010-01-16T23:59:59.000Z

447

Design & Fabrication of a High-Voltage Photovoltaic Cell  

SciTech Connect (OSTI)

Silicon photovoltaic (PV) cells are alternative energy sources that are important in sustainable power generation. Currently, applications of PV cells are limited by the low output voltage and somewhat low efficiency of such devices. In light of this fact, this project investigates the possibility of fabricating high-voltage PV cells on float-zone silicon wafers having output voltages ranging from 50 V to 2000 V. Three designs with different geometries of diffusion layers were simulated and compared in terms of metal coverage, recombination, built-in potential, and conduction current density. One design was then chosen and optimized to be implemented in the final device design. The results of the simulation serve as a feasibility test for the design concept and provide supportive evidence of the effectiveness of silicon PV cells as high-voltage power supplies.

Felder, Jennifer; /North Carolina State U. /SLAC

2012-09-05T23:59:59.000Z

448

High-voltage air-core pulse transformers  

SciTech Connect (OSTI)

General types of air core pulse transformers designed for high voltage pulse generation and energy transfer applications are discussed with special emphasis on pulse charging systems which operate up to the multi-megavolt range. The design, operation, dielectric materials, and performance are described. It is concluded that high voltage air core pulse transformers are best suited to applications outside the normal ranges of conventional magnetic core transformers. In general these include charge transfer at high power levels and fast pulse generation with comparatively low energy. When properly designed and constructed, they are capable of delivering high energy transfer efficiency and have demonstrated superior high voltage endurance. The principal disadvantage of high voltage air core transformers is that they are not generally available from commercial sources. Consequently, the potential user must become thoroughly familiar with all aspects of design, fabrication and system application before he can produce a high performance transformer system. (LCL)

Rohwein, G. J.

1981-01-01T23:59:59.000Z

449

Independent Activity Report, Office of Secure Transportation...  

Broader source: Energy.gov (indexed) [DOE]

Office of Secure Transportation - March 2011 Independent Activity Report, Office of Secure Transportation - March 2011 March 2011 Report for the Appropriateness of Revisions to the...

450

Independent Oversight Evaluation, Office of Secure Transportation...  

Office of Environmental Management (EM)

Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office...

451

Independent Oversight Inspection, Office of Secure Transportation...  

Office of Environmental Management (EM)

Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the...

452

Security & Defense Licenses Available | Tech Transfer | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...

453

Homeland Security and Emergency Management Coordination (HSEMC...  

National Nuclear Security Administration (NNSA)

Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

454

Preliminary Notice of Violation, National Security Technologies...  

Office of Environmental Management (EM)

Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 August 11,...

455

Safety and Security Enforcement Process Overview  

Broader source: Energy.gov (indexed) [DOE]

SAFETY AND SECURITY ENFORCEMENT PROCESS OVERVIEW August 2012 OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF HEALTH, SAFETY AND SECURITY U.S. DEPARTMENT OF ENERGY AUGUST 2012 DOE...

456

Safety and Security Enforcement Coordinator Handbook  

Broader source: Energy.gov (indexed) [DOE]

SAFETY AND SECURITY ENFORCEMENT COORDINATOR HANDBOOK August 2012 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy AUGUST 2012 DOE...

457

Harold Washington Social Security Administration (SSA) Center...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

458

National Securities Technologies _NSTec_ Livermore Operations...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration NRTL Nationally Recognized Testing Laboratory NSTec National Security Technologies, LLC NTS Nevada Test Site OSHA Occupational Safety and...

459

Preliminary Notice of Violation, National Security Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

a Preliminary Notice of Violation (SEA-2014-02) to National Security Technologies, LLC (NSTec), for violations of Department of Energy's classified information security program...

460

National Nuclear Security Administration Appropriation and Program...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4 National Nuclear Security Administration Appropriation and Program Summary Tables Outyear Appropriation Summary Tables FY 2012 BUDGET TABLES National Nuclear Security...

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

Independent Oversight Review, Nevada National Security Site,...  

Broader source: Energy.gov (indexed) [DOE]

and Special Door Interlock systems at the Nevada National Security Site (NNSS) Device Assembly Facility (DAF). The NNSS DAF is operated by National Security Technologies, LLC...

462

Automated Security Compliance Tool for the Cloud.  

E-Print Network [OSTI]

?? Security, especially security compliance, is a major concern that is slowing down the large scale adoption of cloud computing in the enterprise environment. Business (more)

Ullah, Kazi Wali

2012-01-01T23:59:59.000Z

463

Independent Oversight Activity Report, Nevada National Security...  

Office of Environmental Management (EM)

Report, Nevada National Security Site - March 3-6, 2014 March 2014 Operational Awareness Oversight of the Nevada National Security Site HIAR NNSS-2014-03-03 This...

464

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Broader source: Energy.gov (indexed) [DOE]

COUNTRIES More Documents & Publications 2014 Headquarters Facilities Master Security Plan - Chapter 6, Foreign Interaction PSH-12-0117 - In the matter of Personnel Security...

465

Extension of DOE Directive on Cyber Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

2003-06-04T23:59:59.000Z

466

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

Amin, Saurabh

2011-01-01T23:59:59.000Z

467

ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING...  

Broader source: Energy.gov (indexed) [DOE]

8: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS Protection program records include the...

468

Enforcement Letter, Consolidated Nuclear Security, LLC | Department...  

Energy Savers [EERE]

security incidents involving the unclassified waste stream and discrepancies in the inventory of accountable nuclear material at DOE's Y-12 National Security Complex in Oak...

469

Sinusoidal voltage controlled oscillators using operational transconductance amplifiers  

E-Print Network [OSTI]

SINUSOIDAI. VOLTAGE CONTROLLED OSCILLATORS I. SING OPERATIONAL TRANSCONDUCTANCE AMPLIFIERS A Thesis JAVIFB . IOAQUIN HOYI. K I'ASSANO Suhndtted to the Graduate College ol' 'I'exes A8cM University in partial fulfillment of the requirement... for the degree of MASTER OF SCIENCE May 1985 Major Subject: Electrical Engineering SINUSOIDAL VOLTAGE CONTROLLED OSCILLATORS USING OPERATIONAI, TRANSCONDUCTANCE AMPLIFIERS A Thesis by JAVIER JOAQUIN HOYLE PASSANO Approved as to style and content by: o...

Hoyle Passano, Javier Joaquin

1985-01-01T23:59:59.000Z

470

Image-line voltage controlled oscillators and grating antennas  

E-Print Network [OSTI]

IMAGE-LINE VOLTAGE CONTROLLED OSCILLATORS AND GRATING ANTENNAS A Thesis by ALEXANDER MacDONALD KIRK Submitted to the Office of Graduate Studies of Texas ABM University in partial fulfillment of the requirements for the degree of MASTER... OF SCIENCE May 1991 Major Subject: Electrical Engineering IMAGE-LINE VOLTAGE CONTROLLED OSCILLATORS AND GRATING ANTENNAS A Thesis by ALEXANDER MacDONALD KIRK Approved as to style and content by: Kai Chang (Chair of Committee) Robert D. Nevels...

Kirk, Alexander MacDonald

1991-01-01T23:59:59.000Z

471

Design issues for high voltage converters for ion engines  

SciTech Connect (OSTI)

A design strategy is presented for a power converter for a high voltage ion engine for a spacecraft application. Various design issues such as appropriate topologies and control methods are considered. In this particular instance it was determined that a full bridge converter with phase shift gating and voltage mode control provided an efficient system with a minimum of electromagnetic interference. This system can be implemented in a straightforward manner, and it is relatively easy to protect from faults at the output.

King, R.J.; Stuart, T.A. [Univ. of Toledo, OH (United States)

1995-12-31T23:59:59.000Z

472

Measuring Helical FCG Voltage with an Electric Field Antenna  

SciTech Connect (OSTI)

A method of measuring the voltage produced by a helical explosive flux compression generator using a remote electric field antenna is described in detail. The diagnostic has been successfully implemented on several experiments. Measured data from the diagnostic compare favorably with voltages predicted using the code CAGEN, validating our predictive modeling tools. The measured data is important to understanding generator performance, and is measured with a low-risk, minimally intrusive approach.

White, A D; Anderson, R A; Javedani, J B; Reisman, D B; Goerz, D A; Ferriera, A J; Speer, R D

2011-08-01T23:59:59.000Z

473

Chloromethyl chlorosulfate as a voltage delay inhibitor in lithium cells  

DOE Patents [OSTI]

Chloromethyl chlorosulfate (CMCS) is used as a passive film growth inhibitor in electrochemical cells to minimize voltage delay and low-voltage discharge. Film growth on lithium anodes is significantly diminished when CMCS is added to SOCl[sub 2] and SO[sub 2]Cl[sub 2] electrolytes of lithium batteries. The CMCS also has the effect of extending the shelf-life of Li/SOCl[sub 2] and Li/SO[sub 2]Cl[sub 2] batteries.

Delnick, F.M.

1993-04-13T23:59:59.000Z

474

Chloromethyl chlorosulfate as a voltage delay inhibitor in lithium cells  

DOE Patents [OSTI]

Chloromethyl chlorosulfate (CMCS) is used as a passive film growth inhibitor in electrochemical cells to minimize voltage delay and low-voltage discharge. Film growth on lithium anodes is significantly diminished when CMCS is added to SOCl.sub.2 and SO.sub.2 Cl.sub.2 electrolytes of lithium batteries. The CMCS also has the effect of extending the shelf-life of Li/SOCl.sub.2 and Li/SO.sub.2 Cl.sub.2 batteries.

Delnick, Frank M. (Albuquerque, NM)

1993-01-01T23:59:59.000Z

475

Experimental investigation of dielectric barrier discharge plasma actuators driven by repetitive high-voltage nanosecond pulses with dc or low frequency sinusoidal bias  

SciTech Connect (OSTI)

Experimental studies were conducted of a flow induced in an initially quiescent room air by a single asymmetric dielectric barrier discharge driven by voltage waveforms consisting of repetitive nanosecond high-voltage pulses superimposed on dc or alternating sinusoidal or square-wave bias voltage. To characterize the pulses and to optimize their matching to the plasma, a numerical code for short pulse calculations with an arbitrary impedance load was developed. A new approach for nonintrusive diagnostics of plasma actuator induced flows in quiescent gas was proposed, consisting of three elements coupled together: the schlieren technique, burst mode of plasma actuator operation, and two-dimensional numerical fluid modeling. The force and heating rate calculated by a plasma model was used as an input to two-dimensional viscous flow solver to predict the time-dependent dielectric barrier discharge induced flow field. This approach allowed us to restore the entire two-dimensional unsteady plasma induced flow pattern as well as characteristics of the plasma induced force. Both the experiments and computations showed the same vortex flow structures induced by the actuator. Parametric studies of the vortices at different bias voltages, pulse polarities, peak pulse voltages, and pulse repetition rates were conducted experimentally. The significance of charge buildup on the dielectric surface was demonstrated. The charge buildup decreases the effective electric field in the plasma and reduces the plasma actuator performance. The accumulated surface charge can be removed by switching the bias polarity, which leads to a newly proposed voltage waveform consisting of high-voltage nanosecond repetitive pulses superimposed on a high-voltage low frequency sinusoidal voltage. Advantages of the new voltage waveform were demonstrated experimentally.

Opaits, Dmitry F.; Likhanskii, Alexandre V.; Neretti, Gabriele; Zaidi, Sohail; Shneider, Mikhail N.; Miles, Richard B. [Mechanical and Aerospace Engineering, Princeton University, Princeton, New Jersey 08544 (United States); Macheret, Sergey O. [Lockheed Martin Aeronautics Company, Palmdale, California 93599 (United States)

2008-08-15T23:59:59.000Z

476

Centralized wind power plant voltage control with optimal power flow algorithm.  

E-Print Network [OSTI]

??This thesis presents a method of controlling the reactive power injected into a medium-voltage collection system by multiple wind turbine generators such that the voltage (more)

Kline, Jared Andrew

2011-01-01T23:59:59.000Z

477

Optimizing the CEBAF Injector for Beam Operation with a Higher Voltage Electron Gun  

E-Print Network [OSTI]

Recent developments in the DC gun technology used at CEBAF have allowed an increase in operational voltage from 100kV to 130kV. In the near future this will be extended further to 200kV with the purchase of a new power supply. The injector components and layout at this time have been designed specifically for 100kV operation. It is anticipated that with an increase in gun voltage and optimization of the layout and components for 200kV operation, that the electron bunch length and beam brightness can be improved upon. This paper explores some upgrade possibilities for a 200kV gun CEBAF injector through beam dynamic simulations.

Hannon, F E; Kazimi, R

2011-01-01T23:59:59.000Z

478

Optimizing the CEBAF Injector for Beam Operation with a Higher Voltage Electron Gun  

SciTech Connect (OSTI)

Recent developments in the DC gun technology used at CEBAF have allowed an increase in operational voltage from 100kV to 130kV. In the near future this will be extended further to 200kV with the purchase of a new power supply. The injector components and layout at this time have been designed specifically for 100kV operation. It is anticipated that with an increase in gun voltage and optimization of the layout and components for 200kV operation, that the electron bunch length and beam brightness can be improved upon. This paper explores some upgrade possibilities for a 200kV gun CEBAF injector through beam dynamic simulations.

F.E. Hannon, A.S. Hofler, R. Kazimi

2011-03-01T23:59:59.000Z

479

The Application of Planning to Power Substation Voltage Control Keith Bell, Andrew Coles, Maria Fox, Derek Long and Amanda Smith  

E-Print Network [OSTI]

around iterative refinement. 1 Introduction1 The control of electricity distribution is a challenging, a reactive system at the sub- station is used to meet voltage target within this range, set for each time of the day. The reactive system makes use of the adjustable substation components (Wood & Wollenberg 1996

Coles, Andrew

480

Security control methods for CEDR  

SciTech Connect (OSTI)

The purpose of this document is to summarize the findings of recent studies on the security problem in statistical databases and examine their applicability to the specific needs of CEDR. The document is organized as follows: In Section 2 we describe some general control methods which are available on most commercial database software. In Section 3 we provide a classification of statistical security methods. In Section 4 we analyze the type of users of CEDR and the security control methods which may be applied to each type. In Section 5 we summarize the findings of this study and recommend possible solutions.

Rotem, D.

1990-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

AP1000 Design for Security  

SciTech Connect (OSTI)

Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

2006-07-01T23:59:59.000Z

482

National Security Science July 2014  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurityJuly

483

DF-479 SD-11 Directory Security: Mechanisms and Practicality  

E-Print Network [OSTI]

This document reviews security issues and identifies some of the specific measures required to achieve security.

North American Directory

484

updated 6/7/2007 Aerospace Security Certificate (21 Hours)  

E-Print Network [OSTI]

Technologies AVED 5413* Landside Security Technologies AVED 5423* Security Planning, Audits, and NIMS AVED 5433

Veiga, Pedro Manuel Barbosa

485

A Strategy for Information Security: TOGAF , A. Movasseghi2  

E-Print Network [OSTI]

Security Planning, Information Security, TOGAF 1 Introduction Today's globally distributed network systems

Ertaull, Levent

486

CAMPUS ANNUAL SAFETY & SECURITY CRIME REPORT 2011 EMERGENCY NUMBERS  

E-Print Network [OSTI]

Security service is currently handled through a private security guard service contract, which provides

Olsen, Stephen L.

487

Degraded voltage resulting in non-safety UPS failure at Nine Mile Point Unit 2 August 13, 1991  

SciTech Connect (OSTI)

At approximately 5:48 a.m. on august 13, 1991, phase B of the main stepup transformer of Niagara Mohawk's Nine Mile Point Unit 2 (NMP2) Nuclear Power Plant experienced a failure resulting in degraded voltage in phase B of the electrical AC distribution system. The duration of the degraded voltage lasted 12 cycles, the time required to clear the fault and to fast transfer the house loads to alternate offsite sources. The protective relaying schemes accomplished this without any abnormalities. This paper reports that due to the nature of the fault and its protection, the turbine tripped, resulting in an automatic reactor scram. However, during the fast transfer under degraded voltage conditions, five non-0safety related Uninterruptible Power Supplies (UPS) tripped; these UPS's were supplied by Exide Electronics. The tripping of these UPS's resulted in the loss of plant process computers, Control Room annunciation, and a significant portion of non-safety related instrumentation and control circuits.

Julka, A.K. (Niagara Mohawk Power Corp. (United States))

1992-08-01T23:59:59.000Z

488

Cryptography and Data Security  

E-Print Network [OSTI]

The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and subsequently whmh data sets an active user may read or wrote. Flow controls regulate the dissemination of values among the data sets accessible to a user. Inference controls protect statistical databases by preventing questioners from deducing confidential information by posing carefully designed sequences of statistical queries and correlating the responses. Statlstmal data banks are much less secure than most people beheve. Data encryption attempts to prevent unauthorized disclosure of confidential information in transit or m storage. This paper describes the general nature of controls of each type, the kinds of problems they can and cannot solve, and their inherent limitations and weaknesses. The paper is intended for a general audience with little background in the area.

Dorothy E. Denning; Peter; J. Denning

1982-01-01T23:59:59.000Z

489

Port security and information technology  

E-Print Network [OSTI]

The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

Petrakakos, Nikolaos Harilaos

2005-01-01T23:59:59.000Z

490

Meeting Federal Energy Security Requirements  

Broader source: Energy.gov [DOE]

Presentationgiven at at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meetingdiscusses the opportunity to increase the scope of federal-utility partnerships for meeting energy security requirements.

491

Utility Security & Resiliency: Working Together  

Broader source: Energy.gov [DOE]

Presentationgiven at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meetingdiscusses Edison Electric Institute (EEI), including its key security objectives, key activities, cybersecurity activities, and spare transformer equipment program (STEP).

492

Intrusion detection using secure signatures  

DOE Patents [OSTI]

A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

Nelson, Trent Darnel; Haile, Jedediah

2014-09-30T23:59:59.000Z

493

Securities trading of concepts (STOC)  

E-Print Network [OSTI]

Identifying winning new product concepts can be a challenging process that requires insight into private consumer preferences. To measure consumer preferences for new product concepts, the authors apply a securities trading ...

Dahan, Ely

494

Italy | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

United States and Italy on the 2014 Nuclear Security Summit See a fact sheet here.The White HouseOffice of the Press SecretaryItaly and the United States of America are pleased...

495

Belgium | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Elio Di Rupo of Belgium on the 2014 Nuclear Security Summit See a fact sheet here.The White HouseOffice of the Press SecretaryBelgium and the United States of America are pleased...

496

Forrestal Security and Safety Procedures  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish uniform procedures for the security and safety of the Forrestal Building and to inform all personnel of precautionary measures. This directive does not cancel another directive. Canceled by DOE N 251.11.

1983-02-02T23:59:59.000Z

497

INL@Work Cyber Security  

SciTech Connect (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2010-01-01T23:59:59.000Z

498

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

2008-08-12T23:59:59.000Z

499

Security Area Vouching and Piggybacking  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes requirements for the Department of Energy (DOE) Security Area practice of "vouching" or "piggybacking" access by personnel. DOE N 251.40, dated 5-3-01, extends this directive until 12-31-01.

2000-06-05T23:59:59.000Z

500

INL@Work Cyber Security  

ScienceCinema (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2013-05-28T23:59:59.000Z