Powered by Deep Web Technologies
Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Appendix C: California ISO Real Time Voltage Security Assessment...  

NLE Websites -- All DOE Office Websites (Extended Search)

C: California ISO Real Time Voltage Security Assessment (VSA) Prototype Functional SpecificationsPrototype Development Title Appendix C: California ISO Real Time Voltage Security...

2

Appendix B: California ISO Real Time Voltage Security Assessment...  

NLE Websites -- All DOE Office Websites (Extended Search)

B: California ISO Real Time Voltage Security Assessment (VSA) Summary Report Title Appendix B: California ISO Real Time Voltage Security Assessment (VSA) Summary Report Publication...

3

Appendix A: California ISO Real Time Voltage Security Assessment...  

NLE Websites -- All DOE Office Websites (Extended Search)

A: California ISO Real Time Voltage Security Assessment (VSA) Project: Summary of Survey Results on Methodologies for use in Real-Time Voltage Security Assessment Title Appendix A:...

4

California ISO Real-Time Voltage Security Assessment (VSA) Project...  

NLE Websites -- All DOE Office Websites (Extended Search)

Arnold Schwarzenegger Governor REAL-TIME GRID RELIABILITY MANAGEMENT California ISO Real-Time Voltage Security Assessment (VSA) Project: Summary of Survey Results on Methodologies...

5

California ISO Real-Time Voltage Security Assessment (VSA) Summary Report  

NLE Websites -- All DOE Office Websites (Extended Search)

Real-Time Real-Time Voltage Security Assessment (VSA) Summary Report Prepared For: California Energy Commission Public Interest Energy Research Program Prepared By: Lawrence Berkeley National Laboratory Consortium for Electric Reliability Technology Solutions APPENDIX B October 2008 CEC-500-2008-049-APB Prepared By: Lawrence Berkeley National Laboratory Joe Eto, Manu Parashar, Bernard Lesieutre, and Nancy Jo Lewis Berkeley, CA Administered by University of California, California Institute for Energy and Environment under 500-99-013, BOA-138. Jim Cole, Larry Miller Oakland, California 94612 Commission Contract No. 500-02-004 Commission Work Authorization No: MR-036 Prepared For: Public Interest Energy Research (PIER) California Energy Commission

6

Assessment of Voltage Security Methods and Tools  

Science Conference Proceedings (OSTI)

To ensure voltage-secure operation of a power system, VAR control devices must be optimally placed and operated. This project assessed tools and methods that claim to help utilities meet these needs and recommended specific enhancements to these tools.

1995-10-26T23:59:59.000Z

7

Temperature and voltage aware timing analysis: application to voltage drops  

Science Conference Proceedings (OSTI)

In the nanometer era, the physical verification of CMOS digital circuit becomes a complex task. Designers must account of new factors that impose a significant change in validation methods. One of these major changes in timing verification to handle ...

B. Lasbouygues; R. Wilson; N. Azemard; P. Maurine

2007-04-01T23:59:59.000Z

8

A Hybrid Framework for Voltage Security Assessment Integrating Simulation and Measurement Based Approaches  

Science Conference Proceedings (OSTI)

Voltage stability is the ability of a power system to maintain adequate voltage magnitudes at buses, which is a major concern in daily power system operations and a leading factor to limit power transfers in a prevailing open-access environment. Currently, simulation-based voltage security assessment (VSA) tools are applied widely by electric utilities to analyze either steady-state or transient voltage stability issues. Those VSA tools can help operators foresee the next critical ...

2012-12-31T23:59:59.000Z

9

Real-time static voltage scaling on multiprocessors  

Science Conference Proceedings (OSTI)

We propose a real-time static voltage scaling (RT-SVS) technique called T-L plane transforming, which is an extension of LLREF, an optimal real-time scheduling algorithm for multiprocessor systems. We present two RT-SVS algorithms for different types ... Keywords: energy consumption, multiprocessor systems, real-time scheduling, real-time voltage scaling

Kenji Funaoka; Shinpei Kato; Nobuyuki Yamasaki

2007-11-01T23:59:59.000Z

10

Incorporating voltage security into the planning, operation and monitoring of restructured electric energy markets  

E-Print Network (OSTI)

As open access market principles are applied to power systems, significant changes are happening in their planning, operation and control. In the emerging marketplace, systems are operating under higher loading conditions as markets focus greater attention to operating costs than stability and security margins. Since operating stability is a basic requirement for any power system, there is need for newer tools to ensure stability and security margins being strictly enforced in the competitive marketplace. This dissertation investigates issues associated with incorporating voltage security into the unbundled operating environment of electricity markets. It includes addressing voltage security in the monitoring, operational and planning horizons of restructured power system. This dissertation presents a new decomposition procedure to estimate voltage security usage by transactions. The procedure follows physical law and uses an index that can be monitored knowing the state of the system. The expression derived is based on composite market coordination models that have both PoolCo and OpCo transactions, in a shared stressed transmission grid. Our procedure is able to equitably distinguish the impacts of individual transactions on voltage stability, at load buses, in a simple and fast manner. This dissertation formulates a new voltage stability constrained optimal power flow (VSCOPF) using a simple voltage security index. In modern planning, composite power system reliability analysis that encompasses both adequacy and security issues is being developed. We have illustrated the applicability of our VSCOPF into composite reliability analysis. This dissertation also delves into the various applications of voltage security index. Increasingly, FACT devices are being used in restructured markets to mitigate a variety of operational problems. Their control effects on voltage security would be demonstrated using our VSCOPF procedure. Further, this dissertation investigates the application of steady state voltage stability index to detect potential dynamic voltage collapse. Finally, this dissertation examines developments in representation, standardization, communication and exchange of power system data. Power system data is the key input to all analytical engines for system operation, monitoring and control. Data exchange and dissemination could impact voltage security evaluation and therefore needs to be critically examined.

Nair, Nirmal-Kumar

2004-12-01T23:59:59.000Z

11

Voltage stability/security assessment and on-line control  

SciTech Connect

Project RP3040-1 was initiated in 1989, and concluded with the release of the Voltage Stability analysis program, VSTAB, in 1992. VSTAB is a production grade program for voltage stability assessment of large complex power systems. During the course of the RP3040-1, much effort was spent in developing a clear understanding of voltage stability and in defining the special modeling and analytical techniques required to accurately capture the phenomenon through simulation. The result was the development of new steady state methods which can complement the dynamic simulation methods currently available with EPRI's Extended Transient/Midterm Stability Program (ETMSP). VSTAB uses an enhanced powerflow combined with a specially developed modal analysis algorithm to provide information regarding both the proximity to, and mechanism of, voltage instability. The program is fast, easy to use, and comprehensive in both modeling and analysis features. This Programmer's Manual documents the structure and code details of VSTAB. It is intended as a reference document for those required to maintain or enhance the VSTAB program. For details on analytical techniques used in the program, readers are directed to the VSTAB Application Guide and Final Report for project RP3040-1.

Morison, G.K.; Gao, B.; Hamadanizadeh, H. (Ontario Hydro, Toronto, ON (Canada))

1993-04-01T23:59:59.000Z

12

Compile-time dynamic voltage scaling settings: opportunities and limits  

Science Conference Proceedings (OSTI)

With power-related concerns becoming dominant aspects of hardware and software design, significant research effort has been devoted towards system power minimization. Among run-time power-management techniques, dynamic voltage scaling (DVS) has emerged ... Keywords: analytical model, compiler, dynamic voltage scaling, low power, mixed-integer linear programming

Fen Xie; Margaret Martonosi; Sharad Malik

2003-06-01T23:59:59.000Z

13

Time varying voltage combustion control and diagnostics sensor  

DOE Patents (OSTI)

A time-varying voltage is applied to an electrode, or a pair of electrodes, of a sensor installed in a fuel nozzle disposed adjacent the combustion zone of a continuous combustion system, such as of the gas turbine engine type. The time-varying voltage induces a time-varying current in the flame which is measured and used to determine flame capacitance using AC electrical circuit analysis. Flame capacitance is used to accurately determine the position of the flame from the sensor and the fuel/air ratio. The fuel and/or air flow rate (s) is/are then adjusted to provide reduced flame instability problems such as flashback, combustion dynamics and lean blowout, as well as reduced emissions. The time-varying voltage may be an alternating voltage and the time-varying current may be an alternating current.

Chorpening, Benjamin T. (Morgantown, WV); Thornton, Jimmy D. (Morgantown, WV); Huckaby, E. David (Morgantown, WV); Fincham, William (Fairmont, WV)

2011-04-19T23:59:59.000Z

14

High voltage electrical amplifier having a short rise time  

DOE Patents (OSTI)

A circuit, comprising an amplifier and a transformer is disclosed that produces a high power pulse having a fast response time, and that responds to a digital control signal applied through a digital-to-analog converter. The present invention is suitable for driving a component such as an electro-optic modulator with a voltage in the kilovolt range. The circuit is stable at high frequencies and during pulse transients, and its impedance matching circuit matches the load impedance with the output impedance. The preferred embodiment comprises an input stage compatible with high-speed semiconductor components for amplifying the voltage of the input control signal, a buffer for isolating the input stage from the output stage; and a plurality of current amplifiers connected to the buffer. Each current amplifier is connected to a field effect transistor (FET), which switches a high voltage power supply to a transformer which then provides an output terminal for driving a load. The transformer comprises a plurality of transmission lines connected to the FETs and the load. The transformer changes the impedance and the voltage of the output. The preferred embodiment also comprises a low voltage power supply for biasing the FETs at or near an operational voltage. 8 figs.

Christie, D.J.; Dallum, G.E.

1989-12-07T23:59:59.000Z

15

High voltage electrical amplifier having a short rise time  

DOE Patents (OSTI)

A circuit, comprising an amplifier and a transformer is disclosed that produces a high power pulse having a fast response time, and that responds to a digital control signal applied through a digital-to-analog converter. The present invention is suitable for driving a component such as an electro-optic modulator with a voltage in the kilovolt range. The circuit is stable at high frequencies and during pulse transients, and its impedance matching circuit matches the load impedance with the output impedance. The preferred embodiment comprises an input stage compatible with high-speed semiconductor components for amplifying the voltage of the input control signal, a buffer for isolating the input stage from the output stage; and a plurality of current amplifiers connected to the buffer. Each current amplifier is connected to a field effect transistor (FET), which switches a high voltage power supply to a transformer which then provides an output terminal for driving a load. The transformer comprises a plurality of transmission lines connected to the FETs and the load. The transformer changes the impedance and voltage of the output. The preferred embodiment also comprises a low voltage power supply for biasing the FETs at or near an operational voltage.

Christie, David J. (Pleasanton, CA); Dallum, Gregory E. (Livermore, CA)

1991-01-01T23:59:59.000Z

16

Y-12 Times | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Employees & Retirees Y-12 Times Y-12 Times Posted: July 19, 2012 - 12:12pm The Y-12 Times is a newsletter for employees and friends of the Y-12 National Security Complex,...

17

High power impulse magnetron sputtering: Current-voltage-time ...  

pauses between pulses !typically 20 ms". The nominal volt-age of the pulser was adjustable up to 1000 V. The arc threshold was set to 120 A. If the current exceeded this

18

Voltage Stability/Security Assessment and On-Line Control: Volumes 1-4  

Science Conference Proceedings (OSTI)

To address growing utility concerns of voltage instability and possible voltage collapse, EPRI has developed a new voltage stability analysis package for large power systems, VSTAB. This off-line planning tool provides information on a utility power system's proximity to and mechanism of voltage instability.

1993-05-01T23:59:59.000Z

19

Energy Aware Dynamic Voltage and Frequency Selection for Real-Time Systems with Energy Harvesting  

E-Print Network (OSTI)

Energy Aware Dynamic Voltage and Frequency Selection for Real-Time Systems with Energy Harvesting}@binghamton.edu Abstract In this paper, an energy aware dynamic voltage and frequency selection (EA-DVFS) algorithm energy and the harvested energy in a future duration. Specifically, if the system has sufficient energy

Qiu, Qinru

20

Privacy Act Fees and Time Limits | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Fees and Time Limits | National Nuclear Security Administration Fees and Time Limits | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Privacy Act Fees and Time Limits Home > About Us > Our Operations > NNSA Office of General Counsel > Privacy Act (PA) of 1974 > Privacy Act Fees and Time Limits Privacy Act Fees and Time Limits The Act provides agencies to assess fees only for the cost of reproducing

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Random Dynamic Voltage Scaling Design to Enhance Security of NCL S-Box  

E-Print Network (OSTI)

component of symmetric key algorithms which performs substitution. In block ciphers, they are typically used to enhance the resistance against SCA in the way of randomly changing the supply voltage so that "random. The trade- offs between performance and energy efficiency are constant challenges that designers have

Ayers, Joseph

22

Security  

Science Conference Proceedings (OSTI)

... Security. Organizations need standards, guidelines, and ... to support health IT implementations. HIPAA Security Rule Toolkit. ...

2011-12-05T23:59:59.000Z

23

An enhanced dynamic voltage scaling scheme for energy-efficient embedded real-time control systems  

Science Conference Proceedings (OSTI)

Real-Time Dynamic Voltage Scaling (RT-DVS) has been one of the most important techniques for energy savings in battery-powered embedded systems. However, pure RT-DVS approaches rarely take into account the actual performance requirements of the target ...

Feng Xia; Youxian Sun

2006-05-01T23:59:59.000Z

24

A method for calculation of margins to voltage instability applied on the Norwegian system for maintaining required security level  

SciTech Connect

The paper describes a method for calculating margins to voltage instability. The method is based on sensitivity techniques. The measure to voltage instability can be given in terms of MW, MVAr or MVA depending on the components in the increase in load. The extensions to earlier publications of the method are the ability to increase the load and generation simultaneously on several buses without increasing the computation time. A single forward and backward substitution is sufficient to find the required sensitivities when the load is increased. The productions of the plant can be increased either by a specified profile or by using the turbine droop characteristics. A method for identification of contingencies needing an explicit reserve evaluation is briefly described.

Flataboe, N.; Fosso, O.B.; Ognedal, R.; Carlsen, T.; Heggland, K.R.

1993-08-01T23:59:59.000Z

25

Voltage- and time-dependent action of histrionicotoxin on the endplate current of the frog muscle.J. Gen  

E-Print Network (OSTI)

arrow poison frog, Dendrobates histrionicus, decreased the amplitude and timecourse of the endplate current, and altered the voltage dependence of the halfdecay time. In addition, the toxin produced a characteristic nonlinearity in the current-voltage relationship of the endplate current when 3-s voltage conditioning steps were used. Reduction in time of the conditioning steps to 10 ms made the current-voltage relationship linear. The decrease in peak amplitude of the endplate current (epc) produced by histrionicotoxin measured during long hyperpolarizing conditioning steps was fitted by a single exponential function. The calculated rate constants ranged from 0.03 to 0.14 s-1 and varied with membrane potential at hyperpolarizing levels. The voltage- and time-dependent action of histrionicotoxin does not require an initial activation of receptors by acetylcholine (ACh). The characteristic of the current-voltage relationship can be accounted for by the observed voltage and time dependency of the attenuation of the endplate current amplitude in the presence of histrionicotoxin during long conditioning steps. These effects of histrionicotoxin on the peak amplitude, and on the voltage and time dependence of the epc were concentration-dependent and slowly reversible upon washing out the toxin. Thus, the voltage- and time-dependent action of histrionicotoxin at the endplate is related to an increase in the affinity between the toxin and the ACh receptor-ionic channel complex. This increase in affinity is postulated to be due to a conformational change of the macromolecule in the presence of histrionicotoxin which is demonstrated to be relatively slow, i.e., on the order of tens of seconds.

Leona M. Masukawa; Edson X. Albuquerque

1978-01-01T23:59:59.000Z

26

Effects of Impulse Voltage Polarity, Peak Amplitude, and Rise Time on Streamers Initiated From a Needle Electrode in Transformer Oil  

E-Print Network (OSTI)

An electrothermal hydrodynamic model is presented to evaluate effects of the applied lightning impulse voltage parameters such as polarity, magnitude, and rise time on the initiation and propagation of the streamers formed ...

Jadidian, Jouya

27

RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises (Extended Version)  

Science Conference Proceedings (OSTI)

The Real-Time Immersive Network Simulation Environment (RINSE) simulator is being developed to support large-scale network security preparedness and training exercises, involving hundreds of players and a modeled network composed of hundreds of local-area ... Keywords: Simulation, emulation, networking, security

Michael Liljenstam; Jason Liu; David M. Nicol; Yougu Yuan; Guanhua Yan; Chris Grier

2006-01-01T23:59:59.000Z

28

Security analysis of the time-coding quantum key distribution protocols  

E-Print Network (OSTI)

We report the security analysis of time-coding quantum key distribution protocols. The protocols make use of coherent single-photon pulses. The key is encoded in the photon time-detection. The use of coherent superposition of states allows to detect eavesdropping of the key. We give a mathematical model of a first protocol from which we derive a second, simpler, protocol. We derive the security analysis of both protocols and find that the secure rates can be similar to those obtained with the BB84 protocol. We then calculate the secure distance for those protocols over standard fibre links. When using low-noise superconducting single photon detectors, secure distances over 200 km can be foreseen. Finally, we analyse the consequences of photon-number splitting attacks when faint pulses are used instead of single photon pulses. A decoy states technique can be used to prevent such attacks.

Thierry Debuisschert; Simon Fossier

2011-08-31T23:59:59.000Z

29

CMOS Open Defect Detection Based on Supply Current in Time-Variable Electric Field and Supply Voltage Application  

Science Conference Proceedings (OSTI)

In this paper, a new test method is proposed for detecting open defects in CMOS ICs. The method is based on supply current of ICs generated by applying time-variable supply voltage and electric field from the outside of the ICs. The feasibility of the ...

Masaki Hashizume; Masahiro Ichimiya; Hiroyuki Yotsuyanagi; Takeomi Tamesada

2001-11-01T23:59:59.000Z

30

Power-aware scheduling and dynamic voltage setting for tasks running on a hard real-time system  

E-Print Network (OSTI)

Abstract- This paper addresses the problem of minimizing energy consumption of a computer system performing periodic hard real-time tasks with precedence constraints. In the proposed approach, dynamic power management and voltage scaling techniques are combined to reduce the energy consumption of the CPU and devices. The optimization problem is first formulated as an integer programming problem. Next, a three-phase solution framework, which integrates power management scheduling and task voltage assignment, is proposed. Experimental results show that the proposed approach outperforms existing methods by an average of 18 % in terms of the system-wide energy savings. I.

Peng Rong

2006-01-01T23:59:59.000Z

31

CERTS 2012 Program Review - New Security Tools for Real-Time Operations - Jim McCalley, Iowa State  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Tools for Real-Time Operation: Security Tools for Real-Time Operation: Risk-based security-constrained economic dispatch (RB-SCED) James D. McCalley Iowa State University jdm@iastate.edu June 13, 2012 Acknowledgement: Qin Wang, Siddhartha Khaitan 1. Project Objective: Develop Risk-based Security Assessment and Market functions Provide new control-room software capabilities through: BETTER SECURITY & ECONOMIC PERFORMANCE: Identify a more secure operating condition at lower production costs Risk-based security- constrained economic dispatch (RB-SCED) * more secure operating conditions * lower costs Achieve economic objective while managing system security +circuit security instead of only the latter. Function Concept Outcome Risk Index       n k n k j j k j

32

Weekly Address: Time to Create the Energy Security Trust | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Weekly Address: Time to Create the Energy Security Trust Weekly Address: Time to Create the Energy Security Trust Weekly Address: Time to Create the Energy Security Trust March 18, 2013 - 3:23pm Addthis Matt Compton Deputy Director of Online Content for the Office of Digital Strategy at the White House. Editor's Note: This blog is cross-posted from WhiteHouse.gov. President Obama discusses the need to harness American energy in order to reduce our dependence on oil and make the United States a magnet for new jobs. He highlights his all-of-the-above approach to American energy -- including a proposal to establish an Energy Security Trust, which invests in research that will help shift our cars and trucks off of oil. Addthis Related Articles National Energy Action Month Photo courtesy of the Pacific Northwest National Laboratory.

33

Real time prelocalisation of electrical defaults on high voltage underground cable (single-phase case)  

Science Conference Proceedings (OSTI)

This paper proposes an assistance tool to the prelocalisation of the insulation defaults affecting electrical single-phase cables by using voltage and current measurements available in source substation. An equivalent network modeling defaults to the ... Keywords: default distance, distributed parameters, insulation default, prelocalisation, sheath, underground cable

Thameur Aloui; Fathi Ben Amar; Nizar Derbel; Hsan Hadj Abdallah

2010-05-01T23:59:59.000Z

34

Energy aware dynamic voltage and frequency selection for real-time systems with energy harvesting  

Science Conference Proceedings (OSTI)

In this paper, an energy aware dynamic voltage and frequency selection (EA-DVFS) algorithm is proposed. The EA-DVFS algorithm adjusts the processor's behavior depending on the summation of the stored energy and the harvested energy in a future duration. ...

Shaobo Liu; Qinru Qiu; Qing Wu

2008-03-01T23:59:59.000Z

35

Security of high speed quantum key distribution with finite detector dead time  

E-Print Network (OSTI)

The security of a high speed quantum key distribution system with finite detector dead time \\tau is analyzed. When the transmission rate becomes higher than the maximum count rate of the individual detectors (1/\\tau ), security issues affect the algorithm for sifting bits. Analytical calculations and numerical simulations of the Bennett-Brassard BB84 protocol are performed. We study Rogers et al.'s protocol (introduced in "Detector dead-time effects and paralyzability in high-speed quantum key distribution," New J. Phys. 9 (2007) 319) in the presence of an active eavesdropper Eve who has the power to perform an intercept-resend attack. It is shown that Rogers et al.'s protocol is no longer secure. More specifically, Eve can induce a basis-dependent detection efficiency at the receiver's end. Modified key sifting schemes that are secure in the presence of dead time and an active eavesdropper are then introduced. We analyze and compare these secure sifting schemes for this active Eve scenario, and calculate and simulate their key generation rate. It is shown that the maximum key generation rate is 1/(2\\tau ) for passive basis selection, and 1/\\tau for active basis selection. The security analysis for finite detector dead time is also extended to the decoy state BB84 protocol.

Viacheslav Burenkov; Bing Qi; Ben Fortescue; Hoi-Kwong Lo

2010-05-03T23:59:59.000Z

36

An efficient and secure protocol for sensor network time synchronization  

Science Conference Proceedings (OSTI)

The emerging field of wireless sensor networks offers countless possibilities for achieving large scale monitoring in a distributed environment. These networks of resource constrained nodes require time synchronization for various distributed operations, ... Keywords: cross-layer control, passive participation, sensor networks, tempest, time synchronization

Emerson Farrugia; Robert Simon

2006-02-01T23:59:59.000Z

37

Privacy Act Fees and Time Limits | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Privacy Act Fees and Time Limits The Act provides agencies to assess fees only for the cost of reproducing records. However, it is the policy of the DOE to provide an individual...

38

Security of high speed quantum key distribution with finite detector dead time  

E-Print Network (OSTI)

The security of a high speed quantum key distribution system with finite detector dead time \\tau is analyzed. When the transmission rate becomes higher than the maximum count rate of the individual detectors (1/\\tau ), security issues affect the algorithm for sifting bits. Analytical calculations and numerical simulations of the Bennett-Brassard BB84 protocol are performed. We study Rogers et al.'s protocol (introduced in "Detector dead-time effects and paralyzability in high-speed quantum key distribution," New J. Phys. 9 (2007) 319) in the presence of an active eavesdropper Eve who has the power to perform an intercept-resend attack. It is shown that Rogers et al.'s protocol is no longer secure. More specifically, Eve can induce a basis-dependent detection efficiency at the receiver's end. Modified key sifting schemes that are secure in the presence of dead time and an active eavesdropper are then introduced. We analyze and compare these secure sifting schemes for this active Eve scenario, and calculate and...

Burenkov, Viacheslav; Fortescue, Ben; Lo, Hoi-Kwong

2010-01-01T23:59:59.000Z

39

SRS employees devote time to 'Days of Caring' | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

employees devote time to 'Days of Caring' | National Nuclear Security employees devote time to 'Days of Caring' | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > NNSA Blog > SRS employees devote time to 'Days of Caring' SRS employees devote time to 'Days of Caring' Posted By Office of Public Affairs SRS employees devote time to 'Days of Caring' Dozens of Savannah River Site employees recently spent time off

40

Unconditional Security of Time-energy Entanglement Quantum Key Distribution using Dual-basis Interferometry  

E-Print Network (OSTI)

High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate (SKR) with high photon-information efficiency (PIE). We consider HDQKD based on the time-energy entanglement (TEE) produced by spontaneous parametric downconversion (SPDC), and show that it is secure against collective attacks. Its security rests upon visibility data---obtained from Franson and conjugate-Franson interferometers---that probe photon-pair frequency correlations and arrival-time correlations. From these measurements an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable QKD so that it applies to our HDQKD protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, SKR lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results suggest that TEE-based HDQKD could permit a 650 bit/sec SKR over 200 km transmission distance in optical fiber with a PIE of 1.9 secure-key bits per photon coincidence in the key-generation phase using receivers with 15% system efficiency.

Zheshen Zhang; Jacob Mower; Dirk Englund; Franco N. C. Wong; Jeffrey H. Shapiro

2013-11-04T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Enhancing Security of Real-Time Applications on Grids through Dynamic Scheduling  

E-Print Network (OSTI)

advances in processing power, network bandwidth, and storage capacity, Grids are emerging as next [38], and distributed medical data systems [20]. On-line transaction processing systems are examplesEnhancing Security of Real-Time Applications on Grids through Dynamic Scheduling Tao Xie Xiao Qin

Feitelson, Dror

42

Y-12 Times, A newsletter for employees and friends of the Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

9 9 September 2010 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 2 Career planning: advice from the president Page 4 They've got the power Page 5 Y-12's waterworks Page 6 Meet the LIFE force Page 6 Former plant manager makes the schoolhouse rock B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout Lisa Harris Contributors Ellen Boatner Mary Bryant Ashley Craig-Watkins Beth Eckerman Ryn Etter Kathy Fahey John Holbrook Dave Keim Kathryn King

43

A Framework of Concurrent Task Scheduling and Dynamic Voltage and Frequency Scaling in Real-Time Embedded Systems with Energy Harvesting  

E-Print Network (OSTI)

harvesting module is comprised of a Photovoltaic (PV) panel for harvesting energy and a supercapacitor panel, state-of- charge management for the supercapacitor, and energy-harvesting- aware real-time task-leakage of the supercapacitor, and power losses in voltage converters, employs a cascaded feedback control structure

Pedram, Massoud

44

Performance of Dynamic Voltage Restorer (DVR) against Voltage Sags and Swells Using Space Vector PWM Technique  

Science Conference Proceedings (OSTI)

Due to increasing complexity in the power system, voltage sags are now becoming one of the most significant power quality problems. Voltage sag is a short reduction voltage from nominal voltage, occurs in a short time. Short-lived voltage sags may not ... Keywords: Custom power, power quality, voltage sag, SPWM, SVPWM, DVR, PSCAD/EMTDC.

Palaparthi Ananthababu; Burle Trinadha; K. Ram Charan

2009-12-01T23:59:59.000Z

45

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013  

E-Print Network (OSTI)

Allied Security Scholarship ALLIED SECURITY SCHOLARSHIP 2013 BACKGROUND The Allied Security Scholarship was established by Allied Security to assist students to undertake full-time study at the University of Waikato. REGULATIONS 1. The Scholarship shall be known as the Allied Security Scholarship. 2

Waikato, University of

46

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

0 0 October 2010 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 2 Air Force visits Y-12's 'White Castle' Page 3 Family ties Pages 4 and 5 Safeguards, Security and Emergency Services Sentinel Page 6 Readiness workshop celebrates a decade of sharing lessons learned Page 8 Extra! Extra! Read about the past B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout Lisa Harris Contributors Ellen Boatner Susan Butefi sh Amanda Byrge Mary Bryant Ryn Etter

47

the Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, September 2012  

NLE Websites -- All DOE Office Websites (Extended Search)

Operations resume Operations resume (pg. 2) Y-12 resumes nuclear operations Aug. 15. Phased Array (pg. 5) A Y-12 project brings sweet success to weld inspections. September 2012 Visit us! Whether you've been a Y-12 employee for one year or 40 years, the events of July 28 had an effect on your time here. Y-12ers have always considered themselves a family, and like family, we must work together to regain the confidence of interested groups. We know three people cut through fences and vandalized the Highly Enriched Uranium Materials Facility July 28. As a result, B&W Y-12 ordered a temporary security stand-down. The National Nuclear Security Administration fully supported this step to ensure continued confidence in safe and secure operations. Nuclear operations resumed Aug. 15 (see pg. 2).

48

Y-12 Times, newsletter for employees and friends of the Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Ideas spark Ideas spark inventions (pages 4 and 5) Y-12 inventors were awarded 11 patents in fi scal 2012. These guys have totally lost it! (page 6) Three Y-12ers share their advice for getting fi t. October 2012 Visit us! Following the July 28 trespassing inci- dent at the Y-12 National Security Complex, B&W Y-12 has moved quickly to improve security and maintenance. "All of us at B&W Y-12 appreciate the Inspector General's work in assessing the event of July 28 and making recommen- dations for security operations improve- ment. We've taken dramatic actions and are making major security improvements at the site," said Charles (Chuck) G. Spencer, pres- ident and general manager for B&W Y-12. In an Aug. 23 address to Y-12 managers and supervisors, Spencer encouraged staff

49

RINSE: The Real-Time Immersive Network Simulation Environment for Network Security Exercises  

Science Conference Proceedings (OSTI)

The RINSE simulator is being developed to support large-scale network security preparedness and training exercises, involving hundreds of players and a modeled network composed of hundreds of LANs. The simulator must be able to present a realistic rendering ...

Michael Liljenstam; Jason Liu; David Nicol; Yougu Yuan; Guanhua Yan; Chris Grier

2005-06-01T23:59:59.000Z

50

? Adjustable Output Voltage  

E-Print Network (OSTI)

The LM25010 features all the functions needed to implement a low cost, efficient, buck regulator capable of supplying in excess of 1A load current. This high voltage regulator integrates an N-Channel Buck Switch, and is available in thermally enhanced LLP-10 and TSSOP-14EP packages. The constant on-time regulation scheme requires no loop compensation resulting in fast load transient response and simplified circuit implementation. The operating frequency remains constant with line and load variations due to the inverse relationship between the input voltage and the on-time. The valley current limit detection is set at 1.25A. Additional features include: VCC under-voltage lock-out, thermal shutdown, gate drive under-voltage lock-out, and maximum duty cycle limiter.

Lmq Is Aec-q Grade

2008-01-01T23:59:59.000Z

51

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

7 7 August 2011 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 2 Getting the big picture Page 3 Going digital saves times and money Page 4 Machinist invents lockout device Page 4 Green cleaning Page 5 Retiree combines love of math and teaching B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout Lisa Harris Contributors Ellen Boatner Mary Bryant Ashley Douglas Kathy Fahey Scott Fraker David Keim Brett Pate Eric Swanson Brian Wagner Donna Waston

52

Low-voltage gyrotrons  

SciTech Connect

For a long time, the gyrotrons were primarily developed for electron cyclotron heating and current drive of plasmas in controlled fusion reactors where a multi-megawatt, quasi-continuous millimeter-wave power is required. In addition to this important application, there are other applications (and their number increases with time) which do not require a very high power level, but such issues as the ability to operate at low voltages and have compact devices are very important. For example, gyrotrons are of interest for a dynamic nuclear polarization, which improves the sensitivity of the nuclear magnetic resonance spectroscopy. In this paper, some issues important for operation of gyrotrons driven by low-voltage electron beams are analyzed. An emphasis is made on the efficiency of low-voltage gyrotron operation at the fundamental and higher cyclotron harmonics. These efficiencies calculated with the account for ohmic losses were, first, determined in the framework of the generalized gyrotron theory based on the cold-cavity approximation. Then, more accurate, self-consistent calculations for the fundamental and second harmonic low-voltage sub-THz gyrotron designs were carried out. Results of these calculations are presented and discussed. It is shown that operation of the fundamental and second harmonic gyrotrons with noticeable efficiencies is possible even at voltages as low as 5-10 kV. Even the third harmonic gyrotrons can operate at voltages about 15 kV, albeit with rather low efficiency (1%-2% in the submillimeter wavelength region).

Glyavin, M. Yu.; Zavolskiy, N. A.; Sedov, A. S. [Institute of Applied Physics RAS, N. Novgorod 603600 (Russian Federation); Nusinovich, G. S. [IREAP, University of Maryland, College Park, Maryland 20742-3511 (United States)

2013-03-15T23:59:59.000Z

53

Voltage Stability Studies for Southern Company Services  

Science Conference Proceedings (OSTI)

This report describes a study conducted under an EPRI Tailored Collaboration project to develop and demonstrate procedures for the assessment of voltage security of the Southern Electric System (SES). The contractor used EPRI steady-state analysis tools including VSTAB (Voltage STABility assessment program) to assess stability margins and verified them using EPRI dynamic tools including ETMSP (Extended Transient / Mid-term Stability Program).

1997-12-31T23:59:59.000Z

54

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, July 2009  

NLE Websites -- All DOE Office Websites (Extended Search)

7 7 July 2009 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E W H A T ' S I N S I D E Page 2 Page 2 Fly me to the moon Page 3 Page 3 The calibrating crew Page 4 Page 4 Having the time of their lives Page 6 Page 6 Y-12's faces in Washington Page 8 Page 8 Y-12 reaches new heights B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex The Y-12 National Security Complex recently received several national awards for its pollution prevention (P2) efforts to create a greener environment and become a more sustainable site. Y-12 won a White House Closing the Circle Award in the waste/P2 category, three

55

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

9 9 October 2011 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 2 Y-12: A winning team at the Super Bowl Page 3 Members of tomorrow's work force are Y-12 ambassadors Page 4 Reconnect with retiree Charlie Montgomery Page 8 Live a better life B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout Lisa Harris Contributors Ellen Boatner Ashley Douglas Kathy Fahey Scott Fraker John Holbrook David Keim Terry Marlar Jill McNutt Cindy Moffett

56

the Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

6 6 July 2011 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 2 Y-12 submits Voluntary Protection Program application Page 3 Preparing for the big freeze while temperatures soar Page 4 Quitters setting an example Page 5 Meet the YES board Page 8 Apprentices compete in Nashville B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout Lisa Harris Contributors Ellen Boatner Ashley Douglas Kathy Fahey Scott Fraker David Keim Jill McNutt Brett Pate

57

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, March 2011  

NLE Websites -- All DOE Office Websites (Extended Search)

2 2 March 2011 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 2 Governance Transformation and lightbulbs: What's the connection? Page 3 Improving things...rapidly Page 4 Retiree builds school from A to Z Page 5 Zirconium to Zucker, the booming 1950s Page 8 "All of those complaints you have with safety can be summed up here." B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout Lisa Harris Contributors Ellen Boatner Mary Bryant

58

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, April 2012  

NLE Websites -- All DOE Office Websites (Extended Search)

4 4 April 2012 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 2 Y-12 technologies licensed Page 3 Sharing nuclear criticality safety expertise Pages 4 and 5 Y-12's education partnerships Page 6 Y-12's jewel in Project Sapphire Page 8 Historic photos create lasting memories B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout Lisa Harris Contributors Carolyn Andrews Mary Bryant Ellen Boatner Kathy Fahey Scott Fraker John Holbrook David Keim

59

The Y-12 Times, Nov 2009, a newsletter for employees and friends of the Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

1 1 November 2009 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 2 Y-12 employee teams honored by NNSA Page 4 Working safely day after day Page 5 Social networking comes to government agencies Page 7 Extra money in your pocket B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout/Design Lisa Harris Contributors Ellen Boatner Bridget Correll Ken Davis Beth Eckerman Kathy Fahey Tom Fisher Vicki Hinkel John Holbrook Dave Keim Jamie Loveday Abe Mathews

60

Voltage controlled current source  

DOE Patents (OSTI)

A seven decade, voltage controlled current source is described for use in testing intermediate range nuclear instruments that covers the entire test current range of from 10 picoamperes to 100 microamperes. High accuracy is obtained throughout the entire seven decades of output current with circuitry that includes a coordinated switching scheme responsive to the input signal from a hybrid computer to control the input voltage to an antilog amplifier, and to selectively connect a resistance to the antilog amplifier output to provide a continuous output current source as a function of a preset range of input voltage. An operator controlled switch provides current adjustment for operation in either a real-time simulation test mode or a time response test mode.

Casne, Gregory M. (Pittsburgh, PA)

1992-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

High frequency breakdown voltage  

SciTech Connect

This report contains information about the effect of frequency on the breakdown voltage of an air gap at standard pressure and temperature, 76 mm Hg and O{degrees}C, respectively. The frequencies of interest are 47 MHz and 60 MHz. Additionally, the breakdown in vacuum is briefly considered. The breakdown mechanism is explained on the basis of collision and ionization. The presence of the positive ions produced by ionization enhances the field in the gap, and thus determines the breakdown. When a low-frequency voltage is applied across the gap, the breakdown mechanism is the same as that caused by the DC or static voltage. However, when the frequency exceeds the first critical value f{sub c}, the positive ions are trapped in the gap, increasing the field considerably. This makes the breakdown occur earlier; in other words, the breakdown voltage is lowered. As the frequency increases two decades or more, the second critical frequency, f{sub ce}, is reached. This time the electrons start being trapped in the gap. Those electrons that travel multiple times across the gap before reaching the positive electrode result in an enormous number of electrons and positive ions being present in the gap. The result is a further decrease of the breakdown voltage. However, increasing the frequency does not decrease the breakdown voltage correspondingly. In fact, the associated breakdown field intensity is almost constant (about 29 kV/cm).The reason is that the recombination rate increases and counterbalances the production rate, thus reducing the effect of the positive ions` concentration in the gap. The theory of collision and ionization does not apply to the breakdown in vacuum. It seems that the breakdown in vacuum is primarily determined by the irregularities on the surfaces of the electrodes. Therefore, the effect of frequency on the breakdown, if any, is of secondary importance.

Chu, Thanh Duy

1992-03-01T23:59:59.000Z

62

High voltage pulse conditioning  

DOE Patents (OSTI)

Apparatus for conditioning high voltage pulses from particle accelerators in order to shorten the rise times of the pulses. Flashover switches in the cathode stalk of the transmission line hold off conduction for a determinable period of time, reflecting the early portion of the pulses. Diodes upstream of the switches divert energy into the magnetic and electrostatic storage of the capacitance and inductance inherent to the transmission line until the switches close.

Stringfield, R.M.; Wheat, R.M. Jr.

1989-02-21T23:59:59.000Z

63

High voltage pulse conditioning  

DOE Patents (OSTI)

Apparatus for conditioning high voltage pulses from particle accelerators in order to shorten the rise times of the pulses. Flashover switches in the cathode stalk of the transmission line hold off conduction for a determinable period of time, reflecting the early portion of the pulses. Diodes upstream of the switches divert energy into the magnetic and electrostatic storage of the capacitance and inductance inherent to the transmission line until the switches close.

Springfield, Ray M. (Sante Fe, NM); Wheat, Jr., Robert M. (Los Alamos, NM)

1990-01-01T23:59:59.000Z

64

Secure Broadcast with One-Time Signatures in Controller Area Networks  

Science Conference Proceedings (OSTI)

Broadcast authentication in Controller Area Networks CAN is subject to real time constraints that are hard to satisfy by expensive public key primitives. For this purpose the authors study here the use of one-time signatures which can be built on the ... Keywords: Authentication, Broadcast, Controller Area Networks CAN, One-Time Signatures, S12

Bogdan Groza, Pal-Stefan Murvay

2013-07-01T23:59:59.000Z

65

Fiber-optic voltage sensor  

DOE Patents (OSTI)

A fiber optic voltage sensor is described which includes a source of light, a reference fiber for receiving a known percentage of the light and an electrostrictive element having terminals across which is applied, a voltage to be measured. The electrostrictive element is responsive to the applied voltage to assume an altered physical state. A measuring fiber also receives a known percentage of light from the light source and is secured about the electrostrictive element. The measuring fiber is provided with a cladding and exhibits an evanescent wave in the cladding. The measuring fiber has a known length which is altered when the electrostrictive element assumes its altered physical state. A differential sensor is provided which senses the intensity of light in both the reference fiber and the measuring fiber and provides an output indicative of the difference between the intensities.

Wood, C.B.

1990-01-01T23:59:59.000Z

66

Fiber-optic voltage sensor  

DOE Patents (OSTI)

A fiber optic voltage sensor is described which includes a source of light, a reference fiber for receiving a known percentage of the light and an electrostrictive element having terminals across which is applied, a voltage to be measured. The electrostrictive element is responsive to the applied voltage to assume an altered physical state. A measuring fiber also receives a known percentage of light from the light source and is secured about the electrostrictive element. The measuring fiber is provided with a cladding and exhibits an evanescent wave in the cladding. The measuring fiber has a known length which is altered when the electrostrictive element assumes its altered physical state. A differential sensor is provided which senses the intensity of light in both the reference fiber and the measuring fiber and provides an output indicative of the difference between the intensities.

Wood, C.B.

1990-12-31T23:59:59.000Z

67

Security Perimeter  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to...

68

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, April 2010  

NLE Websites -- All DOE Office Websites (Extended Search)

4 4 April 2010 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Pages 2 and 3 HEUMF dedication: Getting the job done Page 4 Math whiz sums up his job Page 6 On-site fi tness centers to open Page 6 Doing the right thing Page 8 Measuring performance: Yes, we can B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout Lisa Harris Contributors Ellen Boatner Ken Davis Beth Eckerman Ryn Etter Kathy Fahey John Holbrook Dave Keim Jamie Loveday Jill McNutt Brett Pate

69

The Y-12 Times 70th Anniversary, a newsletter for employees and friends of the Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

After meeting or exceeding several of its fiscal After meeting or exceeding several of its fiscal 2012 Defense Program goals, Y-12 is now engaged in activities to meet this year's life extension, surveillance and dismantle- ment goals. For fiscal 2013, the W78/88-1 Life Extension Program is funded at Y-12 for the first time. "The W78/88 1 LEP will secure work for the 2020s, so Y-12 can continue its major mission work after completion of the W76-1 and B61-12," said Tom Thrasher, program manager. Y-12 has begun working with Lawrence Livermore and Los Alamos national laboratories on the manufacturability of the units. The conceptual designs include reuse technologies geared toward reducing the cost of LEPs. Defense Program funding this year also supports a major phase in the B61-12 LEP. This phase involves establishing manufacturing processes for the evaluation hardware

70

Feature: Network Security It's About Time: An Offer for a Metric  

Science Conference Proceedings (OSTI)

The destruction of the United States would be the ultimate in non-availability. (France might disagree, but so be it.) To avoid that eventuality during the Cold War, the US military defended us poor, soon-to-be-nuked, citizenry, with time.

Winn Schwartau

2001-08-01T23:59:59.000Z

71

Electronic security device  

DOE Patents (OSTI)

The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

1992-01-01T23:59:59.000Z

72

Electronic security device  

DOE Patents (OSTI)

The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

1992-03-17T23:59:59.000Z

73

REAL TIME SYSTEM OPERATIONS 2006-2007  

E-Print Network (OSTI)

SecurityRegionsof ElectricalPowerSystems,ProceedingsSecurityRegionsofElectricalPowerSystemsbyPowerandVoltageCollapsein ElectricalPowerSystems,IEEE

Eto, Joseph H.

2008-01-01T23:59:59.000Z

74

PQ Encyclopedia: Understanding Voltage Unbalance  

Science Conference Proceedings (OSTI)

This PQ Encyclopedia examines voltage unbalance, methods to calculate line voltages and the degree of voltage unbalance, and mitigation techniques.

2009-12-11T23:59:59.000Z

75

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

4 4 April 2009 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout/Design Lisa Harris Contributors Ellen Boatner Ken Davis Beth Eckerman Kathy Fahey Stuart Hames Jamie Loveday W H A T ' S I N S I D E W H A T ' S I N S I D E Page 2 Page 2 Strategic objectives redefi ned Page 3 Page 3 Support the Y-12 team at Relay for Life Page 4 Page 4 Y-12 and the environment Page 5 Page 5 Hopping to fi nd eggs Page 7 Page 7 A picture IS worth a thousand words Mary Murray Brett Pate Ray Smith Donna Watson Lisa Xiques B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. the times

76

Office of Security Assistance  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Director's Perspective Welcome to the Office of Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal Year 2007, HSS performed extensive assistance activities at the request of DOE/NNSA program offices and field sites. The activities ranged from special and routine site survey assistance, physical and technical security inspections in support of the Office of Intelligence, Vulnerability Assessment and Design Basis Threat (DBT) implementation assistance, third-party, adversary support, and DBT implementation and planning validation activities associated with the Site Assistance Visits and Technology Assistance Visits. The security assistance provided to our customers included technical expertise tailored to augment site capabilities in critical fields.

77

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent;...

78

HIGH VOLTAGE GENERATOR  

DOE Patents (OSTI)

This patent relates to high voltage supply circuits adapted for providing operating voltages for GeigerMueller counter tubes, and is especially directed to an arrangement for maintaining uniform voltage under changing conditions of operation. In the usual power supply arrangement for counter tubes the counter voltage is taken from across the power supply output capacitor. If the count rate exceeds the current delivering capaciiy of the capacitor, the capacitor voltage will drop, decreasing the counter voltage. The present invention provides a multivibrator which has its output voltage controlled by a signal proportional to the counting rate. As the counting rate increases beyond the current delivering capacity of the capacitor, the rectified voltage output from the multivibrator is increased to maintain uniform counter voltage.

Zito, G.V.

1959-04-21T23:59:59.000Z

79

Security Plans  

Science Conference Proceedings (OSTI)

... Appendix A Glossary - A glossary of security terms used within the security planning document. ... F, Glossary. None applicable.

2013-09-30T23:59:59.000Z

80

Mitigation of different type voltage sags in low voltage distribution systems using dynamic voltage restorer  

Science Conference Proceedings (OSTI)

The main problems of the voltage sag in low voltage distribution systems due to sensitive loads. Voltage sags can caused malfunction in the distribution system. In order to protect voltage sags in the network a device which called Dynamic Voltage Restorer ... Keywords: custom device, dynamic voltage restorer (DVR), low voltage, power injected, voltage sag

Rosli Omar

2010-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Security - Identification Badges  

Science Conference Proceedings (OSTI)

Security - Identification Badges. All doors to the Child Care Center are locked at all times and access is via the card reader system only. ...

2013-08-15T23:59:59.000Z

82

Security Assistance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Assistance Security Assistance Security Assistance Welcome to Security Assistance Samuel N. Callahan, Director Mission and Functions The Office of Health, Safety, and Security (HSS) created the Office of Security Assistance Program to provide timely technical assistance and system support to field and Headquarters elements to enhance site security programs, upon request. The program is comprised of technologists and subject matter experts from all security disciplines including Program Management, Protection Program Operations, Information Security, Materials Control and Accountability, and Personnel Security. HSS is committed to building a security assistance program to serve the interests of the Department based upon the needs of our customers - with emphasis on customer-focus and meeting multi-disciplinary security needs. In Fiscal

83

Automatic voltage imbalance detector  

DOE Patents (OSTI)

A device for indicating and preventing damage to voltage cells such as galvanic cells and fuel cells connected in series by detecting sequential voltages and comparing these voltages to adjacent voltage cells. The device is implemented by using operational amplifiers and switching circuitry is provided by transistors. The device can be utilized in battery powered electric vehicles to prevent galvanic cell damage and also in series connected fuel cells to prevent fuel cell damage.

Bobbett, Ronald E. (Los Alamos, NM); McCormick, J. Byron (Los Alamos, NM); Kerwin, William J. (Tucson, AZ)

1984-01-01T23:59:59.000Z

84

Constant voltage ultracapacitor  

Science Conference Proceedings (OSTI)

Ultracapacitors have attracted lots of attention recently due to their growing use in hybrid vehicles and in energy storage applications for the smart grid. A very undesirable feature of ultracapacitors is the fact that the voltage drops as the capacitor is discharged. DC-DC converters are employed at present to convert the voltage of the ultracapacitor to constant voltage; however

Ezzat G. Bakhoum

2012-01-01T23:59:59.000Z

85

A voltage controlled current source  

DOE Patents (OSTI)

A seven decade, voltage controlled current source is described for use in testing intermediate range nuclear instruments that covers the entire test current range of from 10 picoampers to 100 microamperes. High accuracy is obtained throughout the entire seven decades of output current with circuitry that includes a coordinated switching scheme responsive to the input signal from a hybrid computer to control the input voltage to an antilog amplifier, and to selectively connect a resistance to the antilog amplifier output to provide a continuous output current source as a function of a preset range of input voltage. An operator controlled switch provides current adjustment for operation in either a real-time simulation test mode or a time response test mode.

Casne, G.M.

1990-12-21T23:59:59.000Z

86

Quantifying Security in Secure Software Development Phases  

Science Conference Proceedings (OSTI)

Secure software is crucial in todays software dependent world. However, most of the time, security is not addressed from the very beginning of a software development life cycle (SDLC), and it is only incorporated after the software has been developed. ...

Muhammad Umair Ahmed Khan; Mohammad Zulkernine

2008-07-01T23:59:59.000Z

87

Active security  

Science Conference Proceedings (OSTI)

In this paper we introduce active security, a new methodology which introduces programmatic control within a novel feedback loop into the defense infrastructure. Active security implements a unified programming environment which provides interfaces ... Keywords: central management, digital forensics, network security

Ryan Hand, Michael Ton, Eric Keller

2013-11-01T23:59:59.000Z

88

Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber...

89

Automated Voltage Control in LHCb  

E-Print Network (OSTI)

LHCb is one of the 4 LHC experiments. In order to ensure the safety of the detector and to maximize efficiency, LHCb needs to coordinate its own operations, in particular the voltage configuration of the different subdetectors, according to the accelerator status. A control software has been developed for this purpose, based on the Finite State Machine toolkit and the SCADA system used for control throughout LHCb (and the other LHC experiments). This software permits to efficiently drive both the Low Voltage (LV) and High Voltage (HV) systems of the 10 different sub-detectors that constitute LHCb, setting each sub-system to the required voltage (easily configurable at run-time) based on the accelerator state. The control software is also responsible for monitoring the state of the Sub-detector voltages and adding it to the event data in the form of status-bits. Safe and yet flexible operation of the LHCb detector has been obtained and automatic actions, triggered by the state changes of the ...

Granado Cardoso, L; Jacobsson, R

2011-01-01T23:59:59.000Z

90

The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, Vol. 10, No. 6, June 2010  

NLE Websites -- All DOE Office Websites (Extended Search)

6 6 June 2010 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 2 Kohlhorst answers employees' questions Page 3 The ultimate cutting-edge technology Pages 4 and 5 Y-12 volunteers hit area communities Page 6 Catch up with Y-12 retiree Jack Rider Page 8 Alpha 3 gets a makeover B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley: alleyab@y12.doe.gov Heidi Spurling: spurlinghw@y12.doe.gov Layout Lisa Harris Contributors Ellen Boatner Beth Eckerman Ryn Etter Kathy Fahey Scott Hackler Vicki Hinkel John Holbrook

91

Optical voltage reference  

DOE Patents (OSTI)

An optical voltage reference for providing an alternative to a battery source. The optical reference apparatus provides a temperature stable, high precision, isolated voltage reference through the use of optical isolation techniques to eliminate current and impedance coupling errors. Pulse rate frequency modulation is employed to eliminate errors in the optical transmission link while phase-lock feedback is employed to stabilize the frequency to voltage transfer function.

Rankin, R.; Kotter, D.

1992-12-31T23:59:59.000Z

92

Optical voltage reference  

DOE Patents (OSTI)

An optical voltage reference for providing an alternative to a battery source is described. The optical reference apparatus provides a temperature stable, high precision, isolated voltage reference through the use of optical isolation techniques to eliminate current and impedance coupling errors. Pulse rate frequency modulation is employed to eliminate errors in the optical transmission link while phase-lock feedback is employed to stabilize the frequency to voltage transfer function. 2 figures.

Rankin, R.; Kotter, D.

1994-04-26T23:59:59.000Z

93

Automated Voltage Standard Ready  

Science Conference Proceedings (OSTI)

... We wanted a standard that was ... as envisioned, then within our lifetimes there will no longer be a need for voltage transfer standards that have to be ...

2013-04-08T23:59:59.000Z

94

A Game Theoretical Approach to Communication Security  

E-Print Network (OSTI)

Security solutions . . . . . . . . . . . . . . . .Practical security solutions . . . . . . . . . . . . .Communication security

Gueye, Assane

2011-01-01T23:59:59.000Z

95

Physical design with multiple on-chip voltages  

Science Conference Proceedings (OSTI)

Supply voltage is one of the dominant factors that determine the timing performance and power consumption of VLSI chips. For digital systems with a single supply voltage, some logic devices typically operate faster or more frequently than necessary, ...

Chunhong Chen

2002-04-01T23:59:59.000Z

96

Is teaching with security in mind working?  

Science Conference Proceedings (OSTI)

Security topics have been taught for some time at universities. The most common approach has been to teach a required topic, and then introduce a security module later in the course. We have been promoting the notion of teaching security at the same ... Keywords: SQL injection, computer security, security and protection

Svetlana Peltsverger; Orlando Karam

2010-10-01T23:59:59.000Z

97

Secure video communications system  

DOE Patents (OSTI)

A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

Smith, Robert L. (Idaho Falls, ID)

1991-01-01T23:59:59.000Z

98

the Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Buttons, Buttons, pg. 2 Buttons aren't only for the clothing industry. STEM, pg. 8 Y-12's contributions to Knoxville's L&N STEM Academy are a sound investment. Film crews from national television stations don't usually go on classified missions. How- ever, MSNBC's Rachel Maddow was granted special access to report on the successful removal of highly enriched uranium from Mexico's National Institute for Nuclear Research in February. Y-12 was tasked by the National Nuclear Security Administration's Office of Global Threat Reduction (more commonly known as the Global Threat Reduction Initiative or GTRI) to support the packaging and removal of fresh HEU from Mexico's Training, Research, Isotopes, General Atomics (or TRIGA) II Research Reactor, located south of Mexico City. This

99

Voltage balanced multilevel voltage source converter system  

SciTech Connect

A voltage balanced multilevel converter for high power AC applications such as adjustable speed motor drives and back-to-back DC intertie of adjacent power systems. This converter provides a multilevel rectifier, a multilevel inverter, and a DC link between the rectifier and the inverter allowing voltage balancing between each of the voltage levels within the multilevel converter. The rectifier is equipped with at least one phase leg and a source input node for each of the phases. The rectifier is further equipped with a plurality of rectifier DC output nodes. The inverter is equipped with at least one phase leg and a load output node for each of the phases. The inverter is further equipped with a plurality of inverter DC input nodes. The DC link is equipped with a plurality of rectifier charging means and a plurality of inverter discharging means. The plurality of rectifier charging means are connected in series with one of the rectifier charging means disposed between and connected in an operable relationship with each adjacent pair of rectifier DC output nodes. The plurality of inverter discharging means are connected in series with one of the inverter discharging means disposed between and connected in an operable relationship with each adjacent pair of inverter DC input nodes. Each of said rectifier DC output nodes are individually electrically connected to the respective inverter DC input nodes. By this means, each of the rectifier DC output nodes and each of the inverter DC input nodes are voltage balanced by the respective charging and discharging of the rectifier charging means and the inverter discharging means.

Peng, Fang Zheng (Oak Ridge, TN); Lai, Jih-Sheng (Knoxville, TN)

1997-01-01T23:59:59.000Z

100

Voltage balanced multilevel voltage source converter system  

SciTech Connect

Disclosed is a voltage balanced multilevel converter for high power AC applications such as adjustable speed motor drives and back-to-back DC intertie of adjacent power systems. This converter provides a multilevel rectifier, a multilevel inverter, and a DC link between the rectifier and the inverter allowing voltage balancing between each of the voltage levels within the multilevel converter. The rectifier is equipped with at least one phase leg and a source input node for each of the phases. The rectifier is further equipped with a plurality of rectifier DC output nodes. The inverter is equipped with at least one phase leg and a load output node for each of the phases. The inverter is further equipped with a plurality of inverter DC input nodes. The DC link is equipped with a plurality of rectifier charging means and a plurality of inverter discharging means. The plurality of rectifier charging means are connected in series with one of the rectifier charging means disposed between and connected in an operable relationship with each adjacent pair of rectifier DC output nodes. The plurality of inverter discharging means are connected in series with one of the inverter discharging means disposed between and connected in an operable relationship with each adjacent pair of inverter DC input nodes. Each of said rectifier DC output nodes are individually electrically connected to the respective inverter DC input nodes. By this means, each of the rectifier DC output nodes and each of the inverter DC input nodes are voltage balanced by the respective charging and discharging of the rectifier charging means and the inverter discharging means. 15 figs.

Peng, F.Z.; Lai, J.S.

1997-07-01T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Substation voltage upgrading  

SciTech Connect

Substation voltage uprating, i.e., conversion of a substation from a lower rated voltage to a higher rated voltage without a complete substation rebuild, can lead to excellent economic benefits. Utilization of the old substation layout and/or the existing equipment, to some extent, is the practical objective of such an uprating. The objective of this project was to assess the opportunities for substation uprating in the industry, to establish feasibility for such uprating and to study methods for accomplishing it. The final aim of the project was to provide guidance to utilities interested in uprating. 56 refs., 41 figs., 18 tabs.

Panek, J.; Elahi, H.; Sublich, M. (General Electric Co., Schenectady, NY (USA). Systems Development and Engineering Dept.)

1989-08-01T23:59:59.000Z

102

Voltage Quality Improvement Using DVR  

Science Conference Proceedings (OSTI)

The problem of voltage sags and Swells and its severe impact on sensitive loads is well known. To solve this problem, custom power devices are used. One of those devices is the Dynamic Voltage Restorer (DVR), which is one of the most efficient and effective ... Keywords: Dynamic Voltage Restorer (DVR), Voltage sags, Voltage swells, Custom power, Power Quality

M. Arun Bhaskar; S. S. Dash; C. Subramani; M. Jagadeesh Kumar; P. R. Giresh; M. Varun Kumar

2010-03-01T23:59:59.000Z

103

Secure Facilities & Capabilities | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Facilities SHARE Secure Facilities and Capabilities...

104

Current-Voltage and Capacitance-Voltage characteristics of Pd ...  

Science Conference Proceedings (OSTI)

Presentation Title, Current-Voltage and Capacitance-Voltage characteristics of Pd ... Nonlocal Modeling in High Rate Deformation and Ductile Fracture of...

105

Security Cases  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

security-cases Office of Hearings and Appeals 1000 security-cases Office of Hearings and Appeals 1000 Independence Ave., SW Washington, DC, 20585 202-287-1566 en PSH-13-0103 - In the Matter of Personnel Security http://energy.gov/oha/downloads/psh-13-0103-matter-personnel-security security" class="title-link">PSH-13-0103 - In the Matter of Personnel Security

106

Security Policy  

Science Conference Proceedings (OSTI)

... M/S ACES Pvt. Ltd. Pakistan Page Security Policy ... 2013 M/S ACES Pvt. Ltd. Pakistan 5/27/2013 Page 2. [SECURITY POLICY] May 27, 2013 ...

2013-05-29T23:59:59.000Z

107

High voltage DC power supply  

DOE Patents (OSTI)

A high voltage DC power supply having a first series resistor at the output for limiting current in the event of a short-circuited output, a second series resistor for sensing the magnitude of output current, and a voltage divider circuit for providing a source of feedback voltage for use in voltage regulation is disclosed. The voltage divider circuit is coupled to the second series resistor so as to compensate the feedback voltage for a voltage drop across the first series resistor. The power supply also includes a pulse-width modulated control circuit, having dual clock signals, which is responsive to both the feedback voltage and a command voltage, and also includes voltage and current measuring circuits responsive to the feedback voltage and the voltage developed across the second series resistor respectively. 7 figs.

Droege, T.F.

1989-12-19T23:59:59.000Z

108

Application of Newton's optimal power flow in voltage/reactive power control  

Science Conference Proceedings (OSTI)

This paper considers an application of Newton's optimal power flow to the solution of the secondary voltage/reactive power control in transmission networks. An efficient computer program based on the latest achievements in the sparse matrix/vector techniques has been developed for this purpose. It is characterized by good robustness, accuracy and speed. A combined objective function appropriate for various system load levels with suitable constraints, for treatment of the power system security and economy is also proposed. For the real-time voltage/reactive power control, a suboptimal power flow procedure has been derived by using the reduced set of control variables. This procedure is based on the sensitivity theory applied to the determination of zones for the secondary voltage/reactive power control and corresponding reduced set of regulating sources, whose reactive outputs represent control variables in the optimal power flow program. As a result, the optimal power flow program output becomes a schedule to be used by operators in the process of the real-time voltage/reactive power control in both normal and emergency operating states.

Bjelogrlic, M.; Babic, B.S. (Electric Power Board of Serbia, Belgrade (YU)); Calovic, M.S. (Dept. of Electrical Engineering, University of Belgrade, Belgrade (YU)); Ristanovic, P. (Institute Nikola Tesla, Belgrade (YU))

1990-11-01T23:59:59.000Z

109

Security & Sustainability College of Charleston  

E-Print Network (OSTI)

Security & Sustainability POLI 399 College of Charleston Fall 2013 Day/Time: T/H; 10 we can think about generating greater security and prosperity through systemic change that arises, then providing security is paramount consideration along that path. Using frames of collective, national

Young, Paul Thomas

110

Comparative High Voltage Impulse Measurement  

Science Conference Proceedings (OSTI)

... substrate and surrounded by insulating oil; the low ... the amplitudes of the voltage peaks that are ... The uncertainties in the peak output voltages for the ...

2013-04-19T23:59:59.000Z

111

Device for monitoring cell voltage  

SciTech Connect

A device for monitoring a rechargeable battery having a number of electrically connected cells includes at least one current interruption switch for interrupting current flowing through at least one associated cell and a plurality of monitoring units for detecting cell voltage. Each monitoring unit is associated with a single cell and includes a reference voltage unit for producing a defined reference threshold voltage and a voltage comparison unit for comparing the reference threshold voltage with a partial cell voltage of the associated cell. The reference voltage unit is electrically supplied from the cell voltage of the associated cell. The voltage comparison unit is coupled to the at least one current interruption switch for interrupting the current of at least the current flowing through the associated cell, with a defined minimum difference between the reference threshold voltage and the partial cell voltage.

Doepke, Matthias (Garbsen, DE); Eisermann, Henning (Edermissen, DE)

2012-08-21T23:59:59.000Z

112

Voltage Control Optimization to Improve Transmission Efficiency  

Science Conference Proceedings (OSTI)

An optimal power flow solution is unique from a conventional power flow solution in that an objective function and user-specified constraints are enforced and satisfied to reach a valid solution. This report presents an analytical study on the optimization of power flow in order to minimize reactive power losses via the modification of generator voltage schedules and transmission switched shunt status. The study examines the potential benefits and applicability of near-real-time voltage control ...

2012-11-08T23:59:59.000Z

113

Electron launching voltage monitor  

DOE Patents (OSTI)

An electron launching voltage monitor measures MITL voltage using a relationship between anode electric field and electron current launched from a cathode-mounted perturbation. An electron launching probe extends through and is spaced from the edge of an opening in a first MITL conductor, one end of the launching probe being in the gap between the MITL conductor, the other end being adjacent a first side of the first conductor away from the second conductor. A housing surrounds the launching probe and electrically connects the first side of the first conductor to the other end of the launching probe. A detector detects the current passing through the housing to the launching probe, the detected current being representative of the voltage between the conductors.

Mendel, Clifford W. (Albuquerque, NM); Savage, Mark E. (Albuquerque, NM)

1992-01-01T23:59:59.000Z

114

Cyber Security | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Home | Science & Discovery | National Security | Initiatives | Cyber Security SHARE Cyber Security Through Science A Science-Based Approach image ORNL uses a science-based approach that combines experimentation, theory, modeling, and high performance computing to solve some of the nation's cyber security grand challenges. Significant, 'game-changing' transformation requires a science-based approach that combines fundamental understanding with experimentation, theory, and modeling. The most successful scientific programs use peer review to maximize intellectual capital and prioritize research needs. The Department of Energy has applied this approach through programs such as the Scientific Discovery through Advanced Computing (SciDAC) and ASCI,

115

SecureBox: National Security Through Secure Cargo Team Members  

SecureBox: National Security Through Secure Cargo Team Members: Front Row (left to right): Howard Lowdermilk, Greg Dallum, Faranak Nekoogar, Vickie ...

116

Safety, Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Safety, Security Safety, Security Safety, Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our work Our commitments We conduct our work safely and responsibly to achieve our mission. We ensure a safe and healthful environment for workers, contractors, visitors, and other on-site personnel. We protect the health, safety, and welfare of the general public. We do not compromise safety for personal, programmatic, or

117

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8206,...

118

Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

transparency, and security that are preconditions to the ultimate fulfillment of the Non-Proliferation Treaty's goals and ambitions. Open Source Center The Open Source Center...

119

Cascode buffer for monolithic voltage conversion operating at high input supply voltages  

E-Print Network (OSTI)

A high-to-low switching DC-DC converter that operates at input supply voltages up to two times as high as the maximum voltage permitted in a nanometer CMOS technology is proposed in this paper. The circuit technique is based on a cascode bridge that maintains the steady-state voltage differences among the terminals of all of the transistors within a range imposed by a specific fabrication technology. The proposed circuit technique permits the full integration of active and passive devices of a switching DC-DC converter with a high voltage conversion ratio in a standard low voltage CMOS process. An efficiency of 87.8 % is achieved for 3.6 volts to 0.9 volts conversion assuming

Volkan Kursun; Gerhard Schrom; Vivek K. De; Eby G. Friedman; Siva G. Narendra

2005-01-01T23:59:59.000Z

120

HIPAA Security Rule  

Science Conference Proceedings (OSTI)

Related ActivitiesHIPAA Security RuleHealth Information Exchange (HIE) Security Architecture. Related ... HIPAA Security Rule. NIST ...

2011-11-21T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Security Enforcement Reporting Criteria  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Classified Information Security Noncompliance Reporting Criteria January 2012 MANDATORY SECURITY INCIDENT REPORTING Classified information security noncompliances are categorized...

122

Security Automation Conference & Workshop  

Science Conference Proceedings (OSTI)

... Security Automation Conference & Workshop. ... Richard Hale, DISA - Information Security & Security Automation in DoD (coming soon); ...

123

RFI - Comments on Computer Security Incident Coordination  

Science Conference Proceedings (OSTI)

... 21:49 To: incidentcoordination@nist.gov Subject: Computer Security Incident Coordination (CSIC): Providing Timely Cyber Incident Response ...

2013-08-19T23:59:59.000Z

124

Remote PC Security: Securing the home worker  

Science Conference Proceedings (OSTI)

A recent study of 1000 teleworkers in 10 countries, commissioned by Cisco, showed that one in five allows friends, family and others to use their work PC to access the Internet. Now is the time to pull stray remote workers back into the security fold. ...

Steven Furnell

2006-11-01T23:59:59.000Z

125

Lab announces security changes  

NLE Websites -- All DOE Office Websites (Extended Search)

Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security...

126

Personnel Security Program | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Personnel Security Program Home > About Us > Our Programs > Nuclear Security > Personnel Security...

127

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

128

Energy Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Energy Security Energy Security Energy Security LANL's mission is to develop and apply science and technology to ensure the safety, security, and effectiveness of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. April 12, 2012 A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. A closed photobioreactor system is essentially a series of plastic or glass containers for water and algae. Proponents of such bioreactors (compared to open ponds) say the growth environment can be more easily controlled; they prevent evaporation; and light penetrates through all sides of the container, which increases cell density. However, bioreactors suffer high materials and energy costs as well as mixing and gas-exchange

129

HIGH VOLTAGE GENERATOR  

DOE Patents (OSTI)

A generator for producing relatively large currents at high voltages is described. In general, the invention comprises a plurality of capacitors connected in series by a plurality of switches alternately disposed with the capacitors. The above-noted circuit is mounted for movement with respect to contact members and switch closure means so that a load device and power supply are connected across successive numbers of capacitors, while the other capacitors are successively charged with the same power supply.

Schwemin, A.J.

1959-03-17T23:59:59.000Z

130

HIGH VOLTAGE GENERATOR  

DOE Patents (OSTI)

A generator is presented for producing relatively large currents at high voltages. In general, the invention comprises a plurality of capacitors connected in series by a plurality of switches alternately disposed with the capacitors. The circuit is mounted for movement with respect to contact members and switch closure means so that a load device and power supply are connected across successive numbers of capacitors, while the other capacitors are successively charged with the same power supply.

Schwemin, A.J.

1959-03-17T23:59:59.000Z

131

HIGH VOLTAGE ION SOURCE  

DOE Patents (OSTI)

A device is described for providing a source of molecular ions having a large output current and with an accelerated energy of the order of 600 kv. Ions are produced in an ion source which is provided with a water-cooled source grid of metal to effect maximum recombination of atomic ions to molecular ions. A very high accelerating voltage is applied to withdraw and accelerate the molecular ions from the source, and means are provided for dumping the excess electrons at the lowest possible potentials. An accelerating grid is placed adjacent to the source grid and a slotted, grounded accelerating electrode is placed adjacent to the accelerating grid. A potential of about 35 kv is maintained between the source grid and accelerating grid, and a potential of about 600 kv is maintained between the accelerating grid and accelerating electrode. In order to keep at a minimum the large number of oscillating electrons which are created when such high voltages are employed in the vicinity of a strong magnetic field, a plurality of high voltage cascaded shields are employed with a conventional electron dumping system being employed between each shield so as to dump the electrons at the lowest possible potential rather than at 600 kv.

Luce, J.S.

1960-04-19T23:59:59.000Z

132

High voltage variable diameter insulator  

DOE Patents (OSTI)

A high voltage feedthrough assembly (10) having a tubular insulator (15) extending between the ground plane ring (16) and the high voltage ring (30). The insulator (15) is made of Pyrex and decreases in diameter from the ground plane ring (16) to the high voltage ring (30), producing equipotential lines almost perpendicular to the wall (27) of the insulator (15) to optimize the voltage-holding capability of the feedthrough assembly (10).

Vanecek, David L. (Martinez, CA); Pike, Chester D. (Pinole, CA)

1984-01-01T23:59:59.000Z

133

Automatic voltage-imbalance detector  

DOE Patents (OSTI)

A device is described for indicating and preventing damage to voltage cells such as galvanic cells and fuel cells connected in series by detecting sequential voltages and comparing these voltages to adjacent voltage cells. The device is implemented by using operational amplifiers and switching circuitry is provided by transistors. The device can be utilized in battery powered electric vehicles to prevent galvanic cell damage and also in series connected fuel cells to prevent fuel cell damage.

Bobbett, R.E.; McCormick, J.B.; Kerwin, W.J.

1981-05-20T23:59:59.000Z

134

ENERGY SECURITY  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

national strategy for national strategy for ENERGY SECURITY recommendations to the nation on reducing u.s. oil dependence september 2008 a project of a project of a national strategy for energy security Recommendations to the Nation on Reducing U.S. Oil Dependence september 2008 Table of Contents 2 Energy Security Leadership Council 3 Statement of Purpose 4 Letter to the President, the Congress, and the American People 7 Outline of Main Body of Report 13 Introduction 21 Policy Recommendations: Summary 33 Part I · Diversify Energy Supplies for the Transportation Sector

135

Security Rulemaking  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM 2 NATIONAL TRANSPORTATION STAKEHOLDERS FORUM Knoxville, TN - May 16, 2012 2 NRC Actions Since September 11, 2001 * Interim solution - enhance existing regulations through Security Orders * Objectives of the Orders are enhanced control of material to - Prevent unauthorized access - Prevent malevolent use of material - Mitigate consequences * Orders were issued to NRC licensees that transport: - Spent Nuclear Fuel - IAEA Code of Conduct Category 1 and 2 quantities of radioactive material Security Rulemakings 3 NRC Ongoing Activities * Orders are an interim measure * Long-term approach is to enhance transport security through public rulemaking * Rulemaking process in progress for - SNF Transportation Security - Physical Protection of Category 1 and 2 material (both fixed

136

Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Security Security Security program under Office of Health, Safety and Security developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented. Headquarters Facilities Master Security Plan The purpose of the Headquarters Facility Master Security Plan (HQFMSP) is to inform employees, contractors, and visitors of the security procedures

137

Transportation Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

138

Planning of distribution networks for medium voltage and low voltage.  

E-Print Network (OSTI)

??Determination of the placement and rating of transformers and feeders are the main objective of the basic distribution network planning. The bus voltage and the (more)

Ziari, Iman

2011-01-01T23:59:59.000Z

139

High voltage feedthrough bushing  

DOE Patents (OSTI)

A feedthrough bushing for a high voltage diode provides for using compression sealing for all sealing surfaces. A diode assembly includes a central conductor extending through the bushing and a grading ring assembly circumferentially surrounding and coaxial with the central conductor. A flexible conductive plate extends between and compressively seals against the central conductor and the grading ring assembly, wherein the flexibility of the plate allows inner and outer portions of the plate to axially translate for compression sealing against the central conductor and the grading ring assembly, respectively. The inner portion of the plate is bolted to the central conductor for affecting sealing. A compression beam is also bolted to the central conductor and engages the outer portion of the plate to urge the outer portion toward the grading ring assembly to obtain compression sealing therebetween.

Brucker, J.P.

1991-12-31T23:59:59.000Z

140

Smart-Grid Security Issues  

Science Conference Proceedings (OSTI)

Although researchers have spent considerable time on smart-grid cybersecurity issues, major problems remain unsolved. This article presents a high-level review of authentication and encryption solutions for smart-grid architectures. Keywords: smart grid, computer security, security and privacy, electrical grid, authentication, encryption, SCADA

Himanshu Khurana; Mark Hadley; Ning Lu; Deborah A. Frincke

2010-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Substation voltage upgrading  

SciTech Connect

This report addresses specific issues to support sound yet not unduly conservative uprating practices for substations. The main parts of the report cover the insulation withstand and overvoltage protection aspects, environmental measurements, reliability criteria, and industry experience. First the insulation design concerns are addressed. Substation stress by a backflashover of the line insulation due to lightning in the vicinity of the substation is recognized as a critical stress. A representative part of a 550 kV BIL substation was erected at the EPRI High Voltage Transmission Research Center, where also a special test circuit was assembled to produce a fast front, slow tail (0.2/200 {mu}s) wave. The substation as well as some special configurations were tested for line-to-ground and line-to-line withstand. Computer studies were performed to complement the test results. A number of important conclusions was reached. The most prominent result in that the high frequency oscillations, as caused by reflections within the substation, do not effect the Critical Flashover Voltage (CFO). The present practice, based on the highest peak is therefore very conservative. The slow tail of the wave appears to dictate the CFO. An arrester model for computer studies to represent very fast as well as slow phenomena was derived. It is based on full scale arrester test data, made available in this project. The computer program to calculate arrester model parameters is also a part of the report. The electric environmental measurements are reported for the tested substation at the HVTRC and for the uprated substation of Public Service Company of Colorado, both before and after the uprating. The performance is satisfactory when corona free hardware is used. Insulation design criteria are analyzed based on substation reliability, the system viewpoint and consequences of the failure. Utility experience with uprated substations is reviewed.

Panek, J.; Elahi, H.; Lux, A.; Imece, A.F. (General Electric Co., Schenectady, NY (United States). Power Systems Engineering Dept.); LaPanse, R.A.; Stewart, J.R. (Public Service Co. of Colorado, Denver, CO (United States))

1992-04-01T23:59:59.000Z

142

Message Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Message Message Security Services Overview ECS Audio/Video Conferencing Fasterdata IPv6 Network Network Performance Tools (perfSONAR) ESnet OID Registry PGP Key Service Virtual Circuits (OSCARS) OSCARS Case Study Documentation User Manual FAQ Design Specifications Functional Specifications Notifications Publications Authorization Policy Default Attributes Message Security Clients For Developers Interfaces Links Hardware Requirements DOE Grids Service Transition Contact Us Technical Assistance: 1 800-33-ESnet (Inside the US) 1 800-333-7638 (Inside the US) 1 510-486-7600 (Globally) 1 510-486-7607 (Globally) Report Network Problems: trouble@es.net Provide Web Site Feedback: info@es.net Message Security Overview The OSCARS Web pages and Web Services are run within a Tomcat container which uses SSL connections to encrypt all messages. The OSCARS Web Service

143

Transportation Security  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work Plan, dated 8/2/06, Product #16, stated: "Develop an annotated bibliography of publicly-available documents related to security of radioactive material transportation." * Earlier this year, a preliminary draft annotated bibliography on this topic was developed by T-REX , UNM, to initially address this STG Work Plan Task. Preliminary Draft - For Review Only 3 Considerations in Determining Release of Information * Some "Publicly-available" documents could potentially contain inappropriate information according to standards set by DOE information security policy and DOE Guides. - Such documents would not be freely

144

Tag: security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

security security Tag: security Displaying 1 - 5 of 5... Category: Security Security Y-12 places the highest priority on maintaining and improving its security posture. More... Category: News Johnson shares perspective on security Rod Johnson, B&W Y-12 deputy general manager of Security, recently discussed the security atmosphere since his arrival last August and what he sees as Y-12's security future. More... Category: News Y-12 to Install New Fence to Reduce Trespassing The National Nuclear Security Administration today announced plans to extend the boundary fence at the Y-12 National Security Complex along Scarboro Road. The new fence is expected to be in place by April 4. More... Category: News New institute promotes nuclear security Y-12 is partnering with the University of Tennessee and others to provide

145

National Security Technology Center | Y-12 National Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Security and Training National Security ... National Security Technology Center What kinds of security technologies are we talking about? See our capabilities...

146

Humidity, Temperature, and Voltage (Presentation)  

SciTech Connect

An update is given on the work of the PV Quality Assurance Task Force; Group 3: studying the effects of humidity, temperature, and voltage bias.

Wohlgemuth, J.

2012-03-01T23:59:59.000Z

147

Voltage Vehicles | Open Energy Information  

Open Energy Info (EERE)

Sector Vehicles Product Voltage Vehicles is a nascent, full-service alternative fuel vehicle distributor specializing in the full spectrum of electric vehicles (EV) and...

148

Physical Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

149

Security for grids  

E-Print Network (OSTI)

S. Kent, R. Atkinson. Security Architecture for the InternetTsudik, S. Tuecke. A Security Architecture for ComputationalComputer and Communications Security Conference, pp. 83-92,

Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

2005-01-01T23:59:59.000Z

150

Taxation and Social Security  

E-Print Network (OSTI)

Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

Kaplow, Louis

2006-01-01T23:59:59.000Z

151

Security and Elections  

E-Print Network (OSTI)

World Conf. Information Security Education, 2007, pp. 1724;Security andElections IEEE Security & Privacy, 10(5):6467, Sept. -

Bishop, Matt; Peisert, Sean

2012-01-01T23:59:59.000Z

152

Java Security  

Science Conference Proceedings (OSTI)

From the Publisher:With a market share of almost 70%, Java can be rightly called the programming language of the Web. Java security allows transmission of sensitive information, stores sensitive data, ensures that code is from a trusted source, and ensures ...

Madhushree Ganguli

2002-11-01T23:59:59.000Z

153

Strain-optic voltage monitor  

DOE Patents (OSTI)

A voltage monitor which uses the shift in absorption edge of crystalline material to measure strain resulting from electric field-induced deformation of piezoelectric or electrostrictive material, providing a simple and accurate means for measuring voltage applied either by direct contact with the crystalline material or by subjecting the material to an electric field.

Weiss, J.D.

1995-12-31T23:59:59.000Z

154

Physical Security Systems | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

155

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Physical Security Systems | National Nuclear Security Administration Physical Security Systems | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Physical Security Systems Home > About Us > Our Programs > Nuclear Security > Physical Security Systems Physical Security Systems After the 9/11 terrorist attacks, NNSA took steps to protect its critical

156

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements...

157

Security Forms | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Security Forms Home > About Us > Our Programs > Nuclear Security > Nuclear Materials...

158

Information Security: Coordination of Federal Cyber Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research...

159

Formalizing information security knowledge  

Science Conference Proceedings (OSTI)

Unified and formal knowledge models of the information security domain are fundamental requirements for supporting and enhancing existing risk management approaches. This paper describes a security ontology which provides an ontological structure for ... Keywords: information security, risk management, security ontology

Stefan Fenz; Andreas Ekelhart

2009-03-01T23:59:59.000Z

160

Cyber Security Evaluations Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Home Sub Offices Security Evaluations Cyber Security Evaluations Emergency Management Oversight Environment, Safety and Health Evaluations Mission &...

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Safety and Security  

Science Conference Proceedings (OSTI)

*. Bookmark and Share. Safety and Security. ... National and International Standards for X-ray Security Screening Applications. ...

2013-07-29T23:59:59.000Z

162

Cryptographic and Security Testing  

Science Conference Proceedings (OSTI)

Directory of Accredited Laboratories. Cryptographic and Security Testing. ... TX. atsec information security corporation, Austin, TX [200658- 0] VA. ...

2013-12-27T23:59:59.000Z

163

Computer Security Division Homepage  

Science Conference Proceedings (OSTI)

Computer Security Division. ... The 2012 Computer Security Division Annual Report (Special Publication 800-165) is now available. ...

2013-09-12T23:59:59.000Z

164

Mobile Security and Forensics  

Science Conference Proceedings (OSTI)

Mobile Security and Forensics. Summary: The goal of the project is to improve the security of mobile devices and software. ...

2013-01-15T23:59:59.000Z

165

National Security Initiatives | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Bioinformatics Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Initiatives SHARE National...

166

Global Security 2009  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security *Intelligence *Hyper Innovation Global Security Weapons & Complex Integration NIF Office of Strategic Outcomes Operations & Business Lawrence Livermore National...

167

HAN System Security Requirements  

Science Conference Proceedings (OSTI)

This report, "Home Area Network (HAN) Security Requirements," identifies and discusses the key cyber security requirements for different interfaces of HAN-based systems. These cyber security requirements for HAN interfaces are derived from the Department of Homeland Security (DHS) "Catalog of Control Systems Security," which provides an excellent checklist of general security requirements.

2009-12-22T23:59:59.000Z

168

Security seal  

DOE Patents (OSTI)

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

169

High voltage VLF testing of power cables  

SciTech Connect

This publication describes a laboratory test program conducted with the objective to develop a test that would replace the existing dc withstand test. The article describes the methodology used to establish the voltage duration and magnitude of VLF (0.1 Hz) high voltage field tests suitable for crosslinked polyethylene (XLPE) insulated power cable. The results show that the voltage breakdown of laboratory aged XLPE cable at 0.1 Hz is approximately equal to that at 60 Hz, that proof tests at 0.1 Hz is approximately equal to that at 60 Hz, that proof tests at 0.1 Hz cause very little damage to the cable, and that 0.1 Hz testing appears to be a satisfactory alternate to dc testing. Preliminary values are suggested for voltage magnitude and time duration of cable acceptance, maintenance and proof tests at 0.1 Hz for XLPE cable rated up to 35 kV. A program is underway to similarly evaluate samples of service-aged XLPE cable; as well as to demonstrate the use of the preliminary test values at typical utility installations.

Eager, G.S.; Katz, C.; Fryszczyn, B. [Cable Technology Labs., Inc., New Brunswick, NJ (United States); Densley, J. [Ontario Hydro, Toronto, Ontario (Canada); Bernstein, B.S. [EPRI, Washington, DC (United States)

1997-04-01T23:59:59.000Z

170

Innovations for a secure nation  

NLE Websites -- All DOE Office Websites (Extended Search)

Innovations for a Secure Nation Innovations for a Secure Nation /about/_assets/images/icon-70th.jpg Innovations for a Secure Nation LANL's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. image description Plasma technology for textile finishing applications gets a boost from LANL APJeT received a $100,000 Venture Acceleration Fund award from LANS helping to complete design and engineering of a commercial-scale production unit. - 4/3/12 One of several active projects, LANL and Chevron co-developed INFICOMM(tm), a wireless technology used to collect real-time temperature and pressure information from sensors in oil and gas wells, including very deep wells already producing oil and gas and drilling operations for new wells.

171

Low-Voltage Cable Aging Management Guidance  

Science Conference Proceedings (OSTI)

This report, intended for use by power plant engineers and craft and administrative personnel who are responsible for cable system aging management, provides guidance on the effective and efficient application of current information and techniques related to aging and condition monitoring (CM) of low-voltage cables. The identification of cables that are prone to early aging and the timely replacement or repair of cables that are degraded will minimize unnecessary power losses, unplanned shutdowns, ...

2013-12-23T23:59:59.000Z

172

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

173

Security rules versus Security properties Mathieu Jaume  

E-Print Network (OSTI)

Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

Paris-Sud XI, Université de

174

INSTITUTE FOR CYBER SECURITY Security Models  

E-Print Network (OSTI)

INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

Sandhu, Ravi

175

Security Procedures Caltech Campus Security Dispatch  

E-Print Network (OSTI)

Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

Goddard III, William A.

176

Obfuscation (IND-CPA Security Circular Security)  

E-Print Network (OSTI)

Obfuscation (IND-CPA Security Circular Security) (Draft Version, 24 October 2013) Antonio@cs.au.dk 2 Aarhus University, Denmark, orlandi@cs.au.dk Abstract Circular security is an important notion for public-key encryption schemes and is needed by several cryptographic protocols. In circular security

International Association for Cryptologic Research (IACR)

177

Two terminal line voltage thermostat  

Science Conference Proceedings (OSTI)

A two terminal line voltage thermostat includes a switch which effectively connects line voltage to a heater load. The entire process is controlled by an integrated circuit microcontroller which is powered by a rectified voltage from a transformer secondary connected to a primary which is in series with the heater load. Backup battery power is provided to maintain limited functions of the microcontroller in the event of overall power loss. The microcontroller is programmed to meet the temperature sensing and control requirements specific to a two terminal electric baseboard heating installation. 7 figs.

Stalsberg, K.J.; Ingalls, J.E.; Hoglund, S.R.

1995-10-10T23:59:59.000Z

178

DOE O 472.2, Personnel Security  

Directives, Delegations, and Requirements

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable ...

2011-07-27T23:59:59.000Z

179

Nonproliferation & International Security | National Nuclear Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

180

Nonproliferation & International Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Nonproliferation & International Security | National Nuclear Security Nonproliferation & International Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nonproliferation & International Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security Nonproliferation & International Security

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

DECENTRALIZED CONTROL ARCHITECTURE FOR COUPLING MICROGRIDS INTO DISTRIBUTION NETWORKS 1 Task 1: Coupling Low-Voltage Microgrids into  

E-Print Network (OSTI)

DECENTRALIZED CONTROL ARCHITECTURE FOR COUPLING MICROGRIDS INTO DISTRIBUTION NETWORKS 1 Task 1: Coupling Low-Voltage Microgrids into Mid-Voltage Distribution Systems Zhao Wang, Student Member, IEEE-voltage (LV) microgrids. At the same time, reactive power is dispatched coordinatively so that voltage

Lemmon, Michael

182

Abstract--This paper investigates how to detect a dynamic voltage collapse situation. The generator and governor dynamics  

E-Print Network (OSTI)

to an interest in maintaining an optimum, secure and reliable power system operation. One such security issue instability detection and mitigation features to maintain an acceptable level of system reliability power flow model. This analysis has been practically viable because of the view that the voltage

183

Chapter 4 - Understanding Voltage Sags  

Science Conference Proceedings (OSTI)

This chapter of the EPRI Solutions PQ Encyclopedia provides information for understanding the voltage sag, which is the single most potent cause of end user power quality (PQ) problems.

2005-12-31T23:59:59.000Z

184

Identification of Critical Voltage Control Areas and Determination of Required Reactive Power Reserves  

Science Conference Proceedings (OSTI)

The objective of this research project is to investigate and devise a methodology for identifying areas in power systems that are prone to voltage instability under particular operating conditions and contingencies. These areas, which are prone to instability due to their lack of reactive power reserves, are referred to as critical voltage control areas (VCAs). Once VCAs are identified, methods of determining their adequate reactive power reserve requirements to ensure secure system operation under all c...

2008-12-09T23:59:59.000Z

185

Definition: Automated Voltage Regulators | Open Energy Information  

Open Energy Info (EERE)

Regulators Regulators Jump to: navigation, search Dictionary.png Automated Voltage Regulators Voltage regulators are transformers that can increase or decrease the voltage on a distribution circuit to help keep the voltage within a pre-determined band. Unlike capacitor banks, voltage regulators cannot adjust power factor. These devices typically monitor the voltage at the location where they are connected, and compare it to a programmed set point. If the voltage deviates too far from the set point, the voltage regulator can increase or decrease its output voltage by moving the tap on the secondary side up or down. An automated voltage regulator can operate with remote control signals, or in concert with other area voltage control devices, to help regulate distribution voltage in a coordinated fashion.

186

High-voltage-compatible, fully depleted CCDs  

E-Print Network (OSTI)

result of this high-voltage requirement, we have taken a di?voltage is necessary in order to meet the PSF requirementsrequirements for SNAP have resulted in a need to operate at substrate bias voltages

2006-01-01T23:59:59.000Z

187

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... approach to protect critical federal missions and business functions ... security areas such physical security, personnel security, continuity of operations ...

188

Using Operational Security (OPSEC) to Support a Cyber Security...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

189

T-592: Cisco Security Advisory: Cisco Secure Access Control System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

2: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

190

A CMOS threshold voltage reference source for very-low-voltage applications  

Science Conference Proceedings (OSTI)

This paper describes a CMOS voltage reference that makes use of weak inversion CMOS transistors and linear resistors, without the need for bipolar transistors. Its operation is analogous to the bandgap reference voltage, but the reference voltage is ... Keywords: Threshold voltage, Ultra-low-power, Very-low-voltage, Voltage reference

Luis H. C. Ferreira; Tales C. Pimenta; Robson L. Moreno

2008-12-01T23:59:59.000Z

191

Information Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Information Security | National Nuclear Security Administration Information Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Information Security Home > About Us > Our Programs > Nuclear Security > Information Security Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

192

Low Swing Dual Threshold Voltage Domino Logic  

E-Print Network (OSTI)

A low swing domino logic technique is proposed to decrease power consumption without sacrificing noise immunity. With the proposed low swing domino logic circuit technique, active power consumption is reduced by up to 9.4% while improving the noise immunity by 2.6% as compared to standard domino logic circuits. It is also shown that by applying a low swing contention reduction technique, the power savings can be further increased by 6.7% while the delay can be improved by 8.6%. A simple and efficient dual threshold voltage (dual-V t ) circuit technique that incorporates low swing signals is also proposed. It is shown that the proposed dual-V technique reduces the standby leakage current by approximately 235 times while offering enhanced delay characteristics as compared to a standard low threshold voltage implementation.

Volkan Kursun; Eby G. Friedman

2002-01-01T23:59:59.000Z

193

Surge voltage suppression in residential power circuits  

Science Conference Proceedings (OSTI)

... Tran- sients in Low Voltage Supply Systems,'' The ... a high-voltage transformer for an oil furnace ... of service entrance SPD of 1960-1970 vintage were ...

2013-05-17T23:59:59.000Z

194

Cyber and Network Security Homepage  

Science Conference Proceedings (OSTI)

Cyber and Network Security. Cyber and network security is focused on ensuring three security objectives of information ...

2010-10-05T23:59:59.000Z

195

Security Components and Mechanisms Group  

Science Conference Proceedings (OSTI)

Security Components and Mechanisms Group. Welcome. ... A security checklist is a document that contains instructions for securely configuring ...

2013-01-17T23:59:59.000Z

196

Bioinformatics Systems | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Cyber Security Nuclear Forensics Bioinformatics Videos Workshops National Security Home | Science & Discovery | National Security | Initiatives | Bioinformatics SHARE...

197

GAO Information Security Issues Update  

Science Conference Proceedings (OSTI)

... Critical IT Systems & Infrastructure - NNSA Supercomputers CP & Security - State Security System - Wireless Security - IRS e*File ...

2010-10-08T23:59:59.000Z

198

Secure security model implementation for security services and related attacks base on end-to-end, application layer and data link layer security  

Science Conference Proceedings (OSTI)

SCADA (Supervisory Control and Data Acquisition), these are systems based on real-time processing, control and design for real time infrastructure such as water pumping stations, oil purification plants and rail control centers etc. In the initial structure ... Keywords: SCADA attacks, cryptography hybrid algorithm, data flow and distribution, distributed network protocole, hybrid algorithms, prevention system, secure simulation model, security issues, security services, simulation base experimentation and results, supervisory control and data acquisition (SCADA)

Shahrulniza Musa; AAmir Shahzad; Abdulaziz Aborujilah

2013-01-01T23:59:59.000Z

199

Border Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

200

HIGH VOLTAGE ELECTRODES  

DOE Patents (OSTI)

S>This patent relates to electrode structure for creating an intense direct current electric field which may have a field strength of the order of two to three times that heretofore obtained, with automatic suppression of arcing. The positive electrode is a conventional conductive material such as copper while the negative electrode is made from a special material having a resistivity greater than that of good conductors and less than that of good insulators. When an incipient arc occurs, the moderate resistivity of the negative electrode causes a momentary, localized decrease in the electric field intensity, thus suppressing the flow of electrons and avoiding arcing. Heated glass may be utilized for the negative electrode, since it provides the desired combination of resistivity, capacity, dielectric strength, mechani-cal strength, and thermal stability. (AEC)

Murray, J.J.

1963-04-23T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

FOILFEST :community enabled security.  

SciTech Connect

The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

2005-09-01T23:59:59.000Z

202

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Thermal thermal environments different from regulatory standards. Packaging, Transport, Storage & Security

203

Designing security into software  

E-Print Network (OSTI)

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

204

CAMPUS SECURITY CARD REQUISITION  

E-Print Network (OSTI)

CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

205

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

National Nuclear Security Administration National Nuclear Security Administration Ofice of Secure Transportation mKlK= Box RQMM= ^luquerqueI= kj= UTNUR= ;JAN 03 213 MEMORANDUM FOR GREGORY eK= WOODS GENERAL COUNSEL DEPARTMENT OF ENERGY FROM: SUBJECT: JEFFREY P. HARREL ASSIST ANT DEPU FOR SECURE 2013 ANNUAL PLANNING SUMMARY In response to your memorandum of December TI= 2012, the following information is provided for the National Nuclear Security Administration Ofice of Secure

206

Security guide for subcontractors  

Science Conference Proceedings (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

207

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Security Strategies for the Smart Grid: Protecting the ... Overview: The Government Smart Card Interoperability ... Mar 2001, An Introduction to IPsec ...

208

Personnel Security Program | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

209

Radiological Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

210

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... Standards. ITL January 1999, Jan 1999, Secure Web-Based Access to High Performance Computing Resources. ITL November ...

211

Ancillary service details: Voltage control  

SciTech Connect

Voltage control is accomplished by managing reactive power on an alternating-current power system. Reactive power can be produced and absorbed by both generation and transmission equipment. Reactive-power devices differ substantially in the magnitude and speed of response and in their capital costs. System operators, transmission owners, generators, customers, power marketers, and government regulators need to pay close attention to voltage control as they restructure the U.S. electricity industry. Voltage control can affect reliability and commerce in three ways: (1) Voltages must be maintained within an acceptable range for both customer and power-system equipment to function properly. (2) The movement of reactive power consumes transmission resources, which limits the ability to move real power and worsens congestion. (3) The movement of reactive power results in real-power losses. When generators are required to supply excessive amounts of reactive power, their real-power production must be curtailed. These opportunity costs are not currently compensated for in most regions. Current tariffs are based on embedded costs. These embedded-cost tariffs average about $0.51/MWh, equivalent to $1.5 billion annually for the United States as a whole. Although this cost is low when compared with the cost of energy, it still aggregates to a significant amount of money. This report takes a basic look at why the power system requires reactive power (an appendix explains the fundamentals of real and reactive power). The report then examines the various types of generation and transmission resources used to supply reactive power and to control voltage. Finally it discusses how these resources are deployed and paid for in several reliability regions around the country. As the U.S. electricity industry is restructured, the generation, transmission, and system-control equipment and functions that maintain voltages within the appropriate ranges are being deintegrated.

Kirby, B.; Hirst, E.

1997-12-01T23:59:59.000Z

212

Nuclear Security Conference 2010 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Conference 2010 Nuclear Security Conference 2010 Nuclear Security Conference 2010 April 14, 2010 - 12:00am Addthis The Role of the Private Sector in Securing Nuclear Materials U.S. Secretary of Energy Steven Chu Wednesday, April 14, 2010 Secretary Steven Chu spoke this morning at the Nuclear Security Conference 2010: the Role of the Private Sector in Securing Nuclear Materials. Below are his remarks as prepared for delivery: I would like to thank the Nuclear Energy Institute for hosting this important conference on the role of the private sector in securing nuclear materials. I would also like to thank all of you for your participation today. Your industry lies at the intersection of two of the most pressing issues of our time: the energy challenge and the threat of nuclear proliferation.

213

Nuclear Security Conference 2010 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Conference 2010 Nuclear Security Conference 2010 Nuclear Security Conference 2010 April 14, 2010 - 12:00am Addthis The Role of the Private Sector in Securing Nuclear Materials U.S. Secretary of Energy Steven Chu Wednesday, April 14, 2010 Secretary Steven Chu spoke this morning at the Nuclear Security Conference 2010: the Role of the Private Sector in Securing Nuclear Materials. Below are his remarks as prepared for delivery: I would like to thank the Nuclear Energy Institute for hosting this important conference on the role of the private sector in securing nuclear materials. I would also like to thank all of you for your participation today. Your industry lies at the intersection of two of the most pressing issues of our time: the energy challenge and the threat of nuclear proliferation.

214

Office of Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Home Sub Offices › Security Policy › Security Assistance › Departmental Personnel Security Mission & Functions › Security Policy › Security Assistance › Departmental Personnel Security Human Reliability Program (HRP) Guidance Documents Security Technology Information Archive (STIA) Related Links › DOE › DOE CIO › NNSA › DOE CFO › NTC › S&S PIR Contact Us HSS Logo Welcome to the Office of Security Mission and Functions The Office of Security (HS-50) developes security policy, provides security expertise to assist field elements in planning site protection strategies and coordinates with domestic authorities to provide safeguards and security technical assistance, technical systems support, and technology development and deployment opportunities. The Office of Security, through the Office of Departmental Personnel Security, also ensures that Departmental personnel security programs (included the National Nuclear Security Administration) are consistent and effectively implemented.

215

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Oversight Program Home Office of Security and Cyber Evaluations Office of Safety and Emergency Management Evaluations Guidance Documents Security and Cyber Evaluations ...

216

Cyber Security Module  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Module Cyber security training is required for all facility users and must be submitted before or upon arrival at the GUV Center. System Requirements and Information...

217

Security - Problem Solved?  

Science Conference Proceedings (OSTI)

There are plenty of security problems that have solutions. Yet, our security problems don't seem to be going away. What's wrong here?

John Viega

2005-06-01T23:59:59.000Z

218

NIST Cyber Security Framework  

Science Conference Proceedings (OSTI)

Page 1. NIST Cyber Security Framework ISA-62443-2-1 :2009 ISA-62443-2-1 (Ed. 2, D2E8 ... Page 2. Security NIST Cyber ...

2013-12-13T23:59:59.000Z

219

NNSA orders security enhancements  

NLE Websites -- All DOE Office Websites (Extended Search)

orders security enhancements NNSA orders security enhancements Because of this government order, until further notice all vehicles entering government property will be required to...

220

Security: A Coordinated Approach  

Science Conference Proceedings (OSTI)

... SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security ... Location-Awareness ICS/SCADA Smart Grid Mobile Devices ...

2012-10-26T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

JLab Security Banner  

NLE Websites -- All DOE Office Websites (Extended Search)

Computer Center | Jefferson Lab Home | Experiments | The Lab | News Privacy and Security Notice Security Notice This is a Federal computer system and is the property of the United...

222

Portec Voltage Regulators: for Emergency Diesel Generators  

Science Conference Proceedings (OSTI)

This report contains information to help utilities address emergency diesel generator voltage regulator issues.

2004-12-15T23:59:59.000Z

223

Probabilistic voltage assessment and VAR compensation  

SciTech Connect

The system voltage profile subject to system elements' forced outage is accessed. Two system voltage reliability indexes are evaluated: the loss of voltage probability, and the expected voltage violation. A similar set of two voltage reliability indexes are also calculated for every load bus in the system. A simple VAR compensation approach is introduced. It enhances the voltage profile assuming a maximum of three overlapping element outages can occur. For purposes of demonstration, the system and load bus voltage reliability indexes are calculated for the AEP 30-bus system. Results of applying the proposed VAR compensation scheme to the 30-bus system are also presented and discussed.

Sharaf, T.A.M.; Berg, G.J.

1988-01-01T23:59:59.000Z

224

Protocol, Security Assistance - January 2007 | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 Protocol, Security Assistance - January 2007 January 2007 Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security. The Assistance Program is comprised of technologists and subject matter experts from all the S&S disciplines and technical areas including Program Planning Management and Support, Advanced Security Technologies, Protective Force, Physical Security, Information Protection, Safeguards and Security Construction Projects, Vulnerability Assessments, and Nuclear Materials Control and Accountability. Our commitment is to continue to build an assistance program dedicated to serving the interests of the Department and our customers' S&S programs. Our emphasis remains

225

Office of Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Security Policy Office of Security Policy Mission and Functions The Office of Security Policy develops and promulgates safeguards and security policy governing the protection of National Security and other critical assets entrusted to the Department. Director's Perspective Welcome to the Office of Security Policy Jack Cowden, Director The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the Department. This includes the protection of DOE nuclear facilities, nuclear weapons components, special nuclear materials and classified information. Our broad topical areas are organized as: Program Planning and Management, Protection Program Operations (which includes both physical security and protective forces), Information Security and Material Control and Accountability.

226

Secure Manufacturing | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to optimize manufacturing and systems performance; and executing projects cost effectively and with timeliness. Y-12 accomplishes this mission to meet the national security challenges of today and those of the future, with capability and expertise in the following areas:

227

Development of static and simulation programs for voltage stability studies of bulk power system  

SciTech Connect

In the analysis and evaluation of voltage stability, it is necessary to accurately identify the stability margin at each load point under specific system configuration or power balance condition. Voltage stability margin can be basically identified by the multi-solution load flow calculation method. When predicted by this static analysis that voltage instability may occur, time domain simulation will be required which includes the models of various control equipments related with system voltage profile. To deal with this, the following two analytical computer codes shown below were developed. (1) Voltage stability static analysis computer code employing a new load flow calculation method. (2) Time domain long term simulation computer code for voltage stability. These computer codes can also calculate the voltage stability index at each load point which is based on the margin to the stability power limit at each load point. The practicality of these codes developed were verified by applying to the IEEE-118 test system.

Nagao, T.; Tanaka, K.; Takenaka, K. [Central Research Inst. of Electric Power Industry, Tokyo (Japan)

1997-02-01T23:59:59.000Z

228

CYBER SECURITY METRICS AND MEASURES  

Science Conference Proceedings (OSTI)

... CYBER SECURITY METRICS AND MEASURES ... Keywords: cyber security; metrics; measures; software; computer systems; IT ...

2013-05-07T23:59:59.000Z

229

Nuclear Security | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

230

Nuclear Security | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

| National Nuclear Security Administration | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Home > About Us > Our Programs > Nuclear Security Nuclear Security The Office of Defense Nuclear Security (DNS) is responsible for the development and implementation of security programs for NNSA. In this capacity, DNS is the NNSA line management organization responsible for

231

Nuclear Security Enterprise | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Enterprise | National Nuclear Security Administration Enterprise | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Nuclear Security Enterprise Home > About Us > Our Programs > Defense Programs > Nuclear Security Enterprise Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective nuclear deterrent through the

232

Security tasks are highly interdependent.  

E-Print Network (OSTI)

Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

233

Security Policies Dr. Ahmad Almulhem  

E-Print Network (OSTI)

Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

Almulhem, Ahmad

234

Security Technologies Group  

Science Conference Proceedings (OSTI)

Security Technologies Group. Welcome. Our group develops measurement science in support of performance-based standards ...

2012-10-24T23:59:59.000Z

235

Nuclear Security & Safety  

Energy.gov (U.S. Department of Energy (DOE))

The Energy Department is working to enhance nuclear security through defense, nonproliferation, and environmental efforts.

236

Industrial Control Systems Security  

Science Conference Proceedings (OSTI)

... Risk Management Architecture security focus Physical interaction ... Cybersecurity Cybersecurity Framework Smart Grid Program ...

2013-06-05T23:59:59.000Z

237

NERSC Computer Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as possible at security@nersc.gov. You may also call the NERSC consultants (or NERSC Operations during non-business hours) at 1-800-66-NERSC. Please save any evidence of the break-in and include as many details as possible in your communication with us. NERSC Computer Security Tutorial

238

High voltage photovoltaic power converter  

DOE Patents (OSTI)

An array of independently connected photovoltaic cells on a semi-insulating substrate contains reflective coatings between the cells to enhance efficiency. A uniform, flat top laser beam profile is illuminated upon the array to produce electrical current having high voltage. An essentially wireless system includes a laser energy source being fed through optic fiber and cast upon the photovoltaic cell array to prevent stray electrical signals prior to use of the current from the array. Direct bandgap, single crystal semiconductor materials, such as GaAs, are commonly used in the array. Useful applications of the system include locations where high voltages are provided to confined spaces such as in explosive detonation, accelerators, photo cathodes and medical appliances.

Haigh, Ronald E. (Arvada, CO); Wojtczuk, Steve (Cambridge, MA); Jacobson, Gerard F. (Livermore, CA); Hagans, Karla G. (Livermore, CA)

2001-01-01T23:59:59.000Z

239

MasteringWeb Services Security MasteringWeb Services Security  

E-Print Network (OSTI)

Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

240

TRANSISTOR HIGH VOLTAGE POWER SUPPLY  

DOE Patents (OSTI)

High voltage, direct current power supplies are described for use with battery powered nuclear detection equipment. The particular advantages of the power supply described, are increased efficiency and reduced size and welght brought about by the use of transistors in the circuit. An important feature resides tn the employment of a pair of transistors in an alternatefiring oscillator circuit having a coupling transformer and other circuit components which are used for interconnecting the various electrodes of the transistors.

Driver, G.E.

1958-07-15T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and providing weapons material for peacetime uses. We are a leader across the National Nuclear Security Administration in implementing technology and current training to ensure materials are protected with the highest degree of confidence. We provide the expertise to secure highly enriched uranium - domestically

242

Security Notice | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Notice Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized users; to access, obtain, alter, damage, or destroy information; or otherwise to interfere with the system or its operation - all are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and

243

Voltage Control Devices on the IEEE 8500 Node Test Feeder  

SciTech Connect

The IEEE Test Cases provide researchers with distribution system models that can be used to validate new analytic methods. The newest of these models is the 8500-node test feeder which contains multiple devices for voltage control. In addition to a substation regulator there are multiple inline regulators as well as capacitor banks. This paper will discuss the detail in which voltage control devises should be modeled when examining large distribution systems. This discussion will include issues associated with power flow analysis for a single time step as well as for time series analysis.

Schneider, Kevin P.; Fuller, Jason C.

2010-01-06T23:59:59.000Z

244

Office of Headquarters Security Operations: Security Awareness...  

NLE Websites -- All DOE Office Websites (Extended Search)

Paul Ruehs Contact Information: Paul Ruehs - (301) 903-7189; Room F-324 Scope: The Security Awareness Program is established by DOE Order to inform individuals of their...

245

NIST, Computer Security Division, Computer Security ...  

Science Conference Proceedings (OSTI)

... The NIST Handbook SP 800-12. SP 800-12 (HTML). NIST IR 7621, Oct 2009, Small Business Information Security: The Fundamentals NISTIR 7621. ...

246

REAL TIME SYSTEM OPERATIONS 2006-2007  

Science Conference Proceedings (OSTI)

The Real Time System Operations (RTSO) 2006-2007 project focused on two parallel technical tasks: (1) Real-Time Applications of Phasors for Monitoring, Alarming and Control; and (2) Real-Time Voltage Security Assessment (RTVSA) Prototype Tool. The overall goal of the phasor applications project was to accelerate adoption and foster greater use of new, more accurate, time-synchronized phasor measurements by conducting research and prototyping applications on California ISO's phasor platform - Real-Time Dynamics Monitoring System (RTDMS) -- that provide previously unavailable information on the dynamic stability of the grid. Feasibility assessment studies were conducted on potential application of this technology for small-signal stability monitoring, validating/improving existing stability nomograms, conducting frequency response analysis, and obtaining real-time sensitivity information on key metrics to assess grid stress. Based on study findings, prototype applications for real-time visualization and alarming, small-signal stability monitoring, measurement based sensitivity analysis and frequency response assessment were developed, factory- and field-tested at the California ISO and at BPA. The goal of the RTVSA project was to provide California ISO with a prototype voltage security assessment tool that runs in real time within California ISO?s new reliability and congestion management system. CERTS conducted a technical assessment of appropriate algorithms, developed a prototype incorporating state-of-art algorithms (such as the continuation power flow, direct method, boundary orbiting method, and hyperplanes) into a framework most suitable for an operations environment. Based on study findings, a functional specification was prepared, which the California ISO has since used to procure a production-quality tool that is now a part of a suite of advanced computational tools that is used by California ISO for reliability and congestion management.

Eto, Joseph H.; Parashar, Manu; Lewis, Nancy Jo

2008-08-15T23:59:59.000Z

247

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

i. i. Message from the Administrator President Obama has reshaped our national security priorities making enterprise infrastructure modernization with integrated Information Technology (IT) capabilities a key strategic initiative. Our IT infrastructure must ensure that our workforce can access appropriate information in a secure, reliable, and cost-effective manner. Effective information sharing throughout the government enhances the national security of the United States (US). For the National Nuclear Security Administration (NNSA), effective information sharing helps strengthen our nuclear security mission; builds collaborative networks within NNSA as well as with the Department of Energy (DOE), Department of Defense (DoD), and other national security

248

Homeland Security Programs | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Homeland Security Programs Homeland Security Programs SHARE Homeland Security Programs The Homeland Security Programs support the Department of Homeland Security (DHS), other federal and state agencies, and commercial partners. Through the integration of a number of key competencies, ORNL is able to provide critical operational, technical, and scientific support to these sponsors. A key focus of this area is to translate the critical research into operational capability for the security, protection, response, and recovery of the nation against natural and man-made events. Research Areas detecting, preventing, and reversing the proliferation of weapons of mass destruction deploying integrated systems for incident awareness, detection, and response providing technology for detecting explosives at the

249

Voltage unbalance effects on induction motor performance  

Science Conference Proceedings (OSTI)

The reliability of electric drives and driven motors depends on the quality of the power supply voltage especially in the critical industrial process. In this work, a theoretical study of the effects of voltage unbalances, sags and swells on induction ... Keywords: efficiency, power losses and derating factor, sags, symmetrical components, voltage unbalance

L. Refoufi; H. Bentarzi; F. Z. Dekhandji

2006-09-01T23:59:59.000Z

250

Learning mobile security with android security labware  

Science Conference Proceedings (OSTI)

As smart mobile devices grow increasingly in popularity, so do the incentives for attackers. Recent surveys on mobile security describe the rapidly increasing number and sophistication of mobile attacks. Newer sources of risks are being introduced or ... Keywords: android, labware, mobile security

Minzhe Guo; Prabir Bhattacharya; Ming Yang; Kai Qian; Li Yang

2013-03-01T23:59:59.000Z

251

High Voltage GaN Schottky Rectifiers  

SciTech Connect

Mesa and planar GaN Schottky diode rectifiers with reverse breakdown voltages (V{sub RB}) up to 550V and >2000V, respectively, have been fabricated. The on-state resistance, R{sub ON}, was 6m{Omega}{center_dot} cm{sup 2} and 0.8{Omega}cm{sup 2}, respectively, producing figure-of-merit values for (V{sub RB}){sup 2}/R{sub ON} in the range 5-48 MW{center_dot}cm{sup -2}. At low biases the reverse leakage current was proportional to the size of the rectifying contact perimeter, while at high biases the current was proportional to the area of this contact. These results suggest that at low reverse biases, the leakage is dominated by the surface component, while at higher biases the bulk component dominates. On-state voltages were 3.5V for the 550V diodes and {ge}15 for the 2kV diodes. Reverse recovery times were <0.2{micro}sec for devices switched from a forward current density of {approx}500A{center_dot}cm{sup -2} to a reverse bias of 100V.

CAO,X.A.; CHO,H.; CHU,S.N.G.; CHUO,C.-C.; CHYI,J.-I.; DANG,G.T.; HAN,JUNG; LEE,C.-M.; PEARTON,S.J.; REN,F.; WILSON,R.G.; ZHANG,A.P.

1999-10-25T23:59:59.000Z

252

Nuclear Security 101 | National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

253

Nuclear Security 101 | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

101 | National Nuclear Security Administration 101 | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog Home > Media Room > Fact Sheets > Nuclear Security 101 Fact Sheet Nuclear Security 101 Mar 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material,

254

High voltage RF feedthrough bushing  

DOE Patents (OSTI)

Described is a multi-element, high voltage radio frequency bushing for trmitting RF energy to an antenna located in a vacuum container. The bushing includes a center conductor of complex geometrical shape, an outer coaxial shield conductor, and a thin-walled hollow truncated cone insulator disposed between central and outer conductors. The shape of the center conductor, which includes a reverse curvature portion formed of a radially inwardly directed shoulder and a convex portion, controls the uniformity of the axial surface gradient on the insulator cone. The outer shield has a first substantially cylindrical portion and a second radially inwardly extending truncated cone portion.

Grotz, Glenn F. (Huntington Station, NY)

1984-01-01T23:59:59.000Z

255

Security Cases | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

November 1, 2013 November 1, 2013 PSH-13-0092 - In the Matter of Personnel Security On November 1, 2013, a Hearing Officer issued a Decision in which he determined that an individual's access authorization should not be restored. In reaching this determination, the Hearing Officer found that the individual had not resolved security concerns regarding the Criterion L concerns arising from his lengthy history of financial irresponsibility and his failure to timely comply with an information request regarding his financial status. October 29, 2013 PSH-13-0086 - In the Matter of Personnel Security Hearing On October 29, 2013, an OHA Hearing Officer issued a decision in which he determined that an individual's DOE access authorization should be restored. The Record showed that the individual had two DUIs and that a

256

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS  

E-Print Network (OSTI)

SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

257

Campus Security Report 1 Campus seCurity  

E-Print Network (OSTI)

Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

Wilmers, Chris

258

Cyber Security Evaluations - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO) Independent Oversight Review of the Classified Cyber Security Programs at the Savannah River Site, March 2012, (OUO) Independent Oversight Review of the Unclassified and Classified Cyber Security Programs at the Office of Scientific and Technical Information, March 2012, (OUO) Independent Oversight 2011 Report on Security Vulnerabilities of National Laboratory Computers, April 13, 2012, (OUO) Technical Review of the Office of Health, Safety and Security Classified Local Area Network, May 2012, (OUO) 2011 (U) Unclassified Cyber Security Technical Review of the Bonneville Power Administration Transmission Services Control Center Network, (OUO), May 2011

260

Checking Security Policy Compliance  

E-Print Network (OSTI)

Ensuring compliance of organizations to federal regulations is a growing concern. This paper presents a framework and methods to verify whether an implemented low-level security policy is compliant to a high-level security policy. Our compliance checking framework is based on organizational and security metadata to support refinement of high-level concepts to implementation specific instances. Our work uses the results of refinement calculus to express valid refinement patterns and their properties. Intuitively, a low-level security policy is compliant to a high-level security policy if there is a valid refinement path from the high-level security policy to the low-level security policy. Our model is capable of detecting violations of security policies, failures to meet obligations, and capability and modal conflicts.

Gowadia, Vaibhav; Kudo, Michiharu

2008-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Performance and security tradeoff  

Science Conference Proceedings (OSTI)

A tradeoff is a situation that involves losing one quality or aspect of something in return for gaining another quality or aspect. Speaking about the tradeoff between performance and security indicates that both, performance and security, can be measured, ...

Katinka Wolter; Philipp Reinecke

2010-06-01T23:59:59.000Z

262

Secure Shell (SSH)  

NLE Websites -- All DOE Office Websites (Extended Search)

Secure Shell (SSH) Name: Rutaiwan Status: Educator Age: 20s Location: NA Country: NA Date: June 2003 Question: What is the Secure Shell (SSH)? What is a strong and weak points of...

263

Foundation for system security  

Science Conference Proceedings (OSTI)

We provide a coherent framework for the design and analysis of secure systems. Our framework is inspired by Lawrence Lessig's modalities of control, by Niklas Luhmann's theory of trust, by existing models of information security, and by existing models ...

Clark Thomborson

2009-01-01T23:59:59.000Z

264

Influence of voltage drop to electric drive with induction motor and voltage sourced inverter  

Science Conference Proceedings (OSTI)

This paper solves problematic of immunity from the voltage drop of the power supply of the electric drive with induction motor with Voltage-Fed inverter. There are reflected opportune control algorithms for the quickly to change of working regime from ... Keywords: electric drive with induction motor, electric drive with voltage sourced inverter, voltage drop

P. Bene; J. Fo?t; M. Pittermann

2011-09-01T23:59:59.000Z

265

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure...

266

Security system signal supervision  

SciTech Connect

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

267

ADVANCED DATA SECURITY  

Science Conference Proceedings (OSTI)

ADVANCED DATA SECURITY. NVLAP Lab Code: 200968-0. Address and Contact Information: 1933 O'Toole Avenue San ...

2013-11-08T23:59:59.000Z

268

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Digital Age - Information Security Transformation for the ... to Information Systems (Transforming the Certification ... for Smart Grid Cyber Security (NIST ...

269

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Automated Information Flows for Situational Awareness; Transformation of Dynamic Security ... Cyber security leadership in the Executive Branch. ...

270

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Nuclear Regulatory Commission; National Security Agency (File ... Richard S. Carson & Associates; RSA Securities; RU Consulting (File 1 of 2 ...

271

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... per the Security Content Automation Protocol (SCAP ... securely install and configure a device; and; ... applicable scenarios and distribution formats, the ...

272

Low power, scalable multichannel high voltage controller  

DOE Patents (OSTI)

A low voltage control circuit is provided for individually controlling high voltage power provided over bus lines to a multitude of interconnected loads. An example of a load is a drive for capillary channels in a microfluidic system. Control is distributed from a central high voltage circuit, rather than using a number of large expensive central high voltage circuits to enable reducing circuit size and cost. Voltage is distributed to each individual load and controlled using a number of high voltage controller channel switches connected to high voltage bus lines. The channel switches each include complementary pull up and pull down photo isolator relays with photo isolator switching controlled from the central high voltage circuit to provide a desired bus line voltage. Switching of the photo isolator relays is further controlled in each channel switch using feedback from a resistor divider circuit to maintain the bus voltage swing within desired limits. Current sensing is provided using a switched resistive load in each channel switch, with switching of the resistive loads controlled from the central high voltage circuit.

Stamps, James Frederick (Livermore, CA); Crocker, Robert Ward (Fremont, CA); Yee, Daniel Dadwa (Dublin, CA); Dils, David Wright (Fort Worth, TX)

2006-03-14T23:59:59.000Z

273

Low power, scalable multichannel high voltage controller  

DOE Patents (OSTI)

A low voltage control circuit is provided for individually controlling high voltage power provided over bus lines to a multitude of interconnected loads. An example of a load is a drive for capillary channels in a microfluidic system. Control is distributed from a central high voltage circuit, rather than using a number of large expensive central high voltage circuits to enable reducing circuit size and cost. Voltage is distributed to each individual load and controlled using a number of high voltage controller channel switches connected to high voltage bus lines. The channel switches each include complementary pull up and pull down photo isolator relays with photo isolator switching controlled from the central high voltage circuit to provide a desired bus line voltage. Switching of the photo isolator relays is further controlled in each channel switch using feedback from a resistor divider circuit to maintain the bus voltage swing within desired limits. Current sensing is provided using a switched resistive load in each channel switch, with switching of the resistive loads controlled from the central high voltage circuit.

Stamps, James Frederick (Livermore, CA); Crocker, Robert Ward (Fremont, CA); Yee, Daniel Dadwa (Dublin, CA); Dils, David Wright (Fort Worth, TX)

2008-03-25T23:59:59.000Z

274

Dynamic Voltage Regulation Using Distributed Energy Resources  

Science Conference Proceedings (OSTI)

Many distributed energy resources (DE) are near load centres and equipped with power electronics converters to interface with the grid, therefore it is feasible for DE to provide ancillary services such as voltage regulation, nonactive power compensation, and power factor correction. A synchronous condenser and a microturbine with an inverter interface are implemented in parallel in a distribution system to regulate the local voltage. Voltage control schemes of the inverter and the synchronous condenser are developed. The experimental results show that both the inverter and the synchronous condenser can regulate the local voltage instantaneously, while the dynamic response of the inverter is faster than the synchronous condenser; and that integrated voltage regulation (multiple DE perform voltage regulation) can increase the voltage regulation capability, increase the lifetime of the equipment, and reduce the capital and operation costs.

Xu, Yan [ORNL; Rizy, D Tom [ORNL; Li, Fangxing [ORNL; Kueck, John D [ORNL

2007-01-01T23:59:59.000Z

275

Climate-derived tensions in Arctic security.  

Science Conference Proceedings (OSTI)

Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

Backus, George A.; Strickland, James Hassler

2008-09-01T23:59:59.000Z

276

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

277

Human Rights and Security  

E-Print Network (OSTI)

Migration, Human Rights and Security in Europe MRU Student Conference Proceedings 2012 Edited by Siril Berglund, Helen McCarthy and Agata Patyna #12;2 "Migration, Human Rights and Security...............................................................................................58 #12;3 "Migration, Human Rights and Security in Europe", MRU Student Conference Proceedings

Saunders, Mark

278

UNIVERSITY POLICE ANNUAL SECURITY  

E-Print Network (OSTI)

UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

Kulp, Mark

279

Functional Programming and Security  

E-Print Network (OSTI)

This paper analyses the security contribution of typical functional-language features by examining them in the light of accepted information security principles. Imperative and functional code are compared to illustrate various cases. In conclusion, there may be an excellent case for the use of functional languages on the grounds of better security; however, empirical research should be done to validate this possibility.

Motara, Yusuf Moosa

2012-01-01T23:59:59.000Z

280

Information Security Guide  

E-Print Network (OSTI)

Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Energy, Climate & Infrastructure Security  

E-Print Network (OSTI)

Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-0987P Transportation of the safe and secure transport of radioactive and hazardous materials. AWaytoEnsureSafeTransport Sandia

282

Verifiably secure devices  

Science Conference Proceedings (OSTI)

We put forward the notion of a verifiably secure device, in essence a stronger notion of secure computation, and achieve it in the ballot-box model. Verifiably secure devices 1. Provide a perfect solution to the problem of achieving correlated equilibrium, ...

Sergei Izmalkov; Matt Lepinski; Silvio Micali

2008-03-01T23:59:59.000Z

283

Understanding Android Security  

Science Conference Proceedings (OSTI)

Google's Android platform is a widely anticipated open source operating system for mobile phones. This article describes Android's security model and attempts to unmask the complexity of secure application development. The authors conclude by identifying ... Keywords: Android, mobile phones, Smartphones, security

William Enck; Machigar Ongtang; Patrick McDaniel

2009-01-01T23:59:59.000Z

284

Lemnos interoperable security project.  

Science Conference Proceedings (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

285

Security auditing course development  

Science Conference Proceedings (OSTI)

As people increasingly depend on computers and network systems, security auditing has become one of the most effective security practices to achieve defense-in-depth in organizations. It follows an effective process to measure policies, procedures ... Keywords: IT audit, IT education, curriculum development, security

Yin Pan

2007-10-01T23:59:59.000Z

286

Pattern Recognition Applications in Securities Trading Richard Pospesel  

E-Print Network (OSTI)

of various published classification and regression techniques as applied to securities price forecasting. Furthermore, it is impossible to forecast a security's price at any time in the future because statistical models which can forecast security prices beyond 50% accuracy. That is, tomorrow's price should

Zanibbi, Richard

287

Wire-Extrusion Process Disrupted By Voltage Sags  

Science Conference Proceedings (OSTI)

This PQTN Case Study investigates voltage sags originating from a utility distribution system at a wire-extrusion plant near Cleveland, Ohio that were causing a wire-drawing process to malfunction, resulting in broken tungsten wire and hours of time spent restarting the manufacturing process.

2003-12-31T23:59:59.000Z

288

Technologies for Remote Monitoring of Substation Assets: Physical Security  

Science Conference Proceedings (OSTI)

This report assesses the benefits of including remote monitoring with the various security technologies used for providing physical security to substation facilities and equipment. This remote monitoring provides near-real-time security information on the access points to substation facilities as well as the status and health of equipment to determine if the equipment has been tampered with or is otherwise not functioning correctly. The types of security technologies include locks at gates and doors, vid...

2006-03-13T23:59:59.000Z

289

Program Areas | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Programs Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program...

290

Supporting Organizations | National Security | ORNL  

NLE Websites -- All DOE Office Websites (Extended Search)

Initiatives Facilities Events and Conferences Supporting Organizations National Security Home | Science & Discovery | National Security | Supporting Organizations SHARE Supporting...

291

Lemnos Interoperable Security Program  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Lemnos Interoperable Security Program Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as firewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products from different vendors because the industry lacks a widely accepted mechanism for evaluating functionality, performance,

292

Security | Argonne National Laboratory  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Security Nonproliferation and Nuclear Forensics Decision Science Sensors and Materials Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass disruption or destruction, thereby protecting our citizens and our national interests. Our goal is to make America a safer place through innovations in threat decision science, sensors and materials, infrastructure assurance,

293

Building security requirements with CLASP  

Science Conference Proceedings (OSTI)

Traditionally, security requirements have been derived in an ad hoc manner. Recently, commercial software development organizations have been looking for ways to produce effective security requirements.In this paper, we show how to build security ... Keywords: application security, security process, security requirements

John Viega

2005-07-01T23:59:59.000Z

294

Characterisation of the VELO High Voltage System  

E-Print Network (OSTI)

The high voltage system supplies the bias voltage to the 88 silicon sensors which comprise the LHCb Vertex Locator (VELO). This note describes the results of the tests which have been performed on the hardware of the high voltage system of the VELO. Each individual test detailed in this note corresponds to a specific requirement of the system. These requirements arise primarily from ensuring the safety of the silicon sensors and the quality of the data taken from the VELO modules. The tests performed are in four categories: normal operation of the high voltage system; verification of its stability under operation; discussion of its behaviour in failure modes; and details of operation at low voltage. Noteworthy issues, identified through the tests, include the behaviour of the high voltage modules at voltages below 9V, the current limit that can be applied during ramping of the voltage, and the speed with which the voltage is cut during failures of the system. The results of these tests provide high confidence that the high voltage system can be safely used and demonstrate that low noise is produced by the power supplies. LHCb Public Note, LHCb-2008-009Contents 1

Barinjaka Rakotomiaramanana; Chris Parkes; Lars Eklund

2008-01-01T23:59:59.000Z

295

Engineering secure software  

E-Print Network (OSTI)

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after-the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar to classical software engineering, to those that may be used in analyses of security requirements, as well as tools that can help engineer secure software. The survey classifies the approaches as process-oriented and as tools-oriented. The current approaches are incomplete in nature. They seem to address the security problem in parts and not in the whole. A comprehensive methodology, integrated with evolutionary software engineering practices is presented. The methodology combines both process and tools oriented approaches to construct secure software.

Jetly, Prateek

2001-01-01T23:59:59.000Z

296

Lockout device for high voltage circuit breaker  

Science Conference Proceedings (OSTI)

An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the repsective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.

Kozlowski, Lawrence J. (New Kensington, PA); Shirey, Lawrence A. (North Huntingdon, PA)

1993-01-01T23:59:59.000Z

297

Lockout device for high voltage circuit breaker  

DOE Patents (OSTI)

An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the respective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.

Kozlowski, L.J.; Shirey, L.A.

1993-01-26T23:59:59.000Z

298

Lookout device for high voltage circuit breaker  

DOE Patents (OSTI)

An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the respective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.

Kozlowski, L.J.; Shirey, L.A.

1991-12-31T23:59:59.000Z

299

TIME CALIBRATED OSCILLOSCOPE SWEEP  

DOE Patents (OSTI)

The time calibrator of an electric signal displayed on an oscilloscope is described. In contrast to the conventional technique of using time-calibrated divisions on the face of the oscilloscope, this invention provides means for directly superimposing equal time spaced markers upon a signal displayed upon an oscilloscope. More explicitly, the present invention includes generally a generator for developing a linear saw-tooth voltage and a circuit for combining a high-frequency sinusoidal voltage of a suitable amplitude and frequency with the saw-tooth voltage to produce a resultant sweep deflection voltage having a wave shape which is substantially linear with respect to time between equal time spaced incremental plateau regions occurring once each cycle of the sinusoidal voltage. The foregoing sweep voltage when applied to the horizontal deflection plates in combination with a signal to be observed applied to the vertical deflection plates of a cathode ray oscilloscope produces an image on the viewing screen which is essentially a display of the signal to be observed with respect to time. Intensified spots, or certain other conspicuous indications corresponding to the equal time spaced plateau regions of said sweep voltage, appear superimposed upon said displayed signal, which indications are therefore suitable for direct time calibration purposes.

Owren, H.M.; Johnson, B.M.; Smith, V.L.

1958-04-22T23:59:59.000Z

300

Safeguards and Security and Cyber Security RM  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Safeguards and Security and Safeguards and Security and Cyber Security Review Module March 2010 CD- -0 OFFICE O S CD-1 OF ENVIRO Standard Safeguar and Cy Rev Critical D CD-2 M ONMENTA Review Pla rds and S yber Secu view Modul Decision (CD CD March 2010 AL MANAG an (SRP) Security urity le D) Applicabili D-3 GEMENT ity CD-4 Post Ope eration Standard Review Plan, 2 nd Edition, March 2010 i FOREWORD The Standard Review Plan (SRP) 1 provides a consistent, predictable corporate review framework to ensure that issues and risks that could challenge the success of Office of Environmental Management (EM) projects are identified early and addressed proactively. The internal EM project review process encompasses key milestones established by DOE O 413.3A, Change 1, Program and Project Management for the Acquisition of Capital Assets, DOE-STD-

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Office of Headquarters Security Operations: Operations Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

302

Office of Headquarters Security Operations: Headquarters Security...  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

303

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

74: Drupal Secure Password Hashes Module Security Bypass 74: Drupal Secure Password Hashes Module Security Bypass Vulnerability T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerability July 22, 2011 - 3:00pm Addthis PROBLEM: Drupal Secure Password Hashes Module Security Bypass Vulnerability PLATFORM: Drupal Secure Password Hashes 6.X-1.0 Drupal Secure Password Hashes 5.X-1.4 ABSTRACT: The Secure Password Hashes module for Drupal is prone to a security-bypass vulnerability. reference LINKS: Drupal Homepage SA-CONTRIB-2011-026 - Secure Password Hashes (phpass) - Multiple Vulnerabilities IMPACT ASSESSMENT: Medium Discussion: This module uses the PHPass hashing library to try to store users hashed passwords securely. The module sets a fixed string for the 'pass' column in the {users} database column but does not replace the pass attribute of the account

304

Definition: Operating Voltage | Open Energy Information  

Open Energy Info (EERE)

Voltage Voltage Jump to: navigation, search Dictionary.png Operating Voltage The voltage level by which an electrical system is designated and to which certain operating characteristics of the system are related; also, the effective (root-mean-square) potential difference between any two conductors or between a conductor and the ground. The actual voltage of the circuit may vary somewhat above or below this value.[1] Related Terms system References ↑ Glossary of Terms Used in Reliability Standards An LikeLike UnlikeLike You like this.Sign Up to see what your friends like. inline Glossary Definition Retrieved from "http://en.openei.org/w/index.php?title=Definition:Operating_Voltage&oldid=480559" Categories: Definitions ISGAN Definitions What links here Related changes

305

Energy-efficient datapath scheduling using multiple voltages and dynamic clocking  

Science Conference Proceedings (OSTI)

Recently, dynamic frequency scaling has been explored at the CPU and system levels for power optimization. Low-power datapath scheduling using multiple supply voltages has been well researched. In this work, we develop new datapath scheduling algorithms ... Keywords: High-level synthesis, dynamic frequency clocking, low-power datapath synthesis, multiple voltage scheduling, resource-constrained scheduling, time-constrained scheduling

Saraju P. Mohanty; N. Ranganathan

2005-04-01T23:59:59.000Z

306

Lowering Power using the Voltage Identification Bit  

E-Print Network (OSTI)

Voltage identification is a form of adaptive voltage scaling (AVS). The voltage-identification technique described in this application note enables certain devices in the Virtex-7 family to be operated at a lower voltage of 0.9V while delivering the same specified performance as that of a device operating at the nominal supply voltage of 1.0V. Voltage identification capable devices consume approximately 30 % lower worst case (maximum) static power and correspondingly dissipate less heat. Reduced power consumption is a desirable characteristic and one that Xilinx 7 series FPGAs fulfill in multiple ways. The primary purpose of the voltage-identification technique is to reduce the worst-case power consumption of-1C devices. However, the significance of the voltage-identification technique goes beyond an individual device dissipating less energy, it also can lower the overall system cost. Power supplies and thermal management requirements are normally specified based on the worst-case power demands of all the systems components. Although the 7 series FPGAs-1C devices are the most cost-effective, the total cost of a product is the sum of all parts, and costs associated with the power supply and thermal management can be significant. The voltage-identification technique specifically reduces worst-case power consumption, which reduces the overall costs associated with specifying a larger power supply, requiring a heat sink, adding forced air cooling, or including similar devices. This application note shows the technical aspects of implementing the voltage-identification technique and introduces a reference design for the VC707 evaluation kit. It also explains how voltage identification fits into the complete power portfolio of Virtex-7 FPGAs and highlights the benefits of using the voltage-identification technique to reduce power consumption and system costs.

Ken Chapman; Jameel Hussein

2012-01-01T23:59:59.000Z

307

The effect of DVR location for enhancing voltage sag  

Science Conference Proceedings (OSTI)

Recently, Dynamic Voltage Restorer (DVR) has become a popular power electronic device as a protection for sensitive loads from voltage sag. Voltage sag widely known as one of the major problem in power quality, it is defined as a short reduction of voltage ... Keywords: dynamic voltage restorer, power quality, voltage sag

Rohanim Ibrahim; Ahmed M. A. Haidar; M. Zahim; Herbert Iu

2010-03-01T23:59:59.000Z

308

Emergency Diesel Generator Voltage Regulator Guidelines  

Science Conference Proceedings (OSTI)

This product kit, containing six separate documents, provides information to help utilities address emergency diesel generator voltage regulator issues and maintenance.

2005-12-20T23:59:59.000Z

309

Characterisation of the VELO High Voltage System  

E-Print Network (OSTI)

The high voltage system supplies the bias voltage to the 88 silicon sensors which comprise the LHCb Vertex Locator (VELO). This note describes the results of the tests which have been performed on the hardware of the high voltage system of the VELO. Each individual test detailed in this note corresponds to a specific requirement of the system. These requirements arise primarily from ensuring the safety of the silicon sensors and the quality of the data taken from the VELO modules. The tests performed are in four categories: normal operation of the high voltage system; vercation of its stability under operation; discussion of its behaviour in failure modes; and details of operation at low voltage. Noteworthy issues, identified through the tests, include the behaviour of the high voltage modules at voltages below 9V, the current limit that can be applied during ramping of the voltage, and the speed with which the voltage is cut during failures of the system. The results of these tests provide high confidence th...

Rakotomiaramanana, B; Eklund, L

2008-01-01T23:59:59.000Z

310

Characterisation of the VELO High Voltage System  

E-Print Network (OSTI)

The high voltage system supplies the bias voltage to the 88 silicon sensors which comprise the LHCb Vertex Locator (VELO). This note describes the results of the tests which have been performed on the hardware of the high voltage system of the VELO. Each individual test detailed in this note corresponds to a specific requirement of the system. These requirements arise primarily from ensuring the safety of the silicon sensors and the quality of the data taken from the VELO modules. The tests performed are in four categories: normal operation of the high voltage system; verification of its stability under operation; discussion of its behaviour in failure modes; and details of operation at low voltage. Noteworthy issues, identified through the tests, include the behaviour of the high voltage modules at voltages below 9V, the current limit that can be applied during ramping of the voltage, and the speed with which the voltage is cut during failures of the system. The results of these tests provide high confidence...

Rakotomiaramanana, B; Eklund, L

2008-01-01T23:59:59.000Z

311

Enhancing Open Circuit Voltage by Combining Thermoelectric ...  

Science Conference Proceedings (OSTI)

Enhancing Open Circuit Voltage by Combining Thermoelectric Materials and Dye -Sensitized Solar Cell in Series Estimation of Compressive Strength of High...

312

Quantum Voltage System Development and Dissemination  

Science Conference Proceedings (OSTI)

... of the unit of electric potential difference, the volt, and precise techniques for measuring voltage are essential to the electrical ... Facilities/Tools Used: ...

2012-11-14T23:59:59.000Z

313

Voltage Source Converter Technology for Offshore Grids.  

E-Print Network (OSTI)

??This master thesis has investigated the possible application of voltage source converters (VSC) for the interconnection of offshore installations, i.e. wind farms and petroleum platforms, (more)

Vormedal, Pl Kristian Myhrer

2010-01-01T23:59:59.000Z

314

Group 3: Humidity, Temperature, and Voltage (Presentation)  

DOE Green Energy (OSTI)

Group 3 is chartered to develop accelerated stress tests that can be used as comparative predictors of module lifetime versus stresses associated with humidity, temperature and voltage.

Wohlgemuth, J.

2013-05-01T23:59:59.000Z

315

The IAEA Assistance and Training Programme for Transport Security  

Science Conference Proceedings (OSTI)

The IAEA Office of Nuclear Security is working cooperatively with the U.S. Department of Energy's Global Threat Reduction Initiative, European Union and Australia to provide transport security assistance to countries throughout the world. Assistance is available to countries in reviewing and upgrading their transport security programs at all levels: (1) National level (regulatory and other government agencies); and (2) Operator level (shippers and carriers). Assistance is directed at implementing a consistent level of security throughout the life cycle of radioactive material (same level of security during transport as when in a fixed facility) Upgrade assistance can include: (1) Expert advisory missions to provide advice and guidance; (2) Training courses for regulatory, governmental and industry personnel; (3) Transport security awareness; (4) Detailed training on designing and implementing transport security programs; (5) Planning to identify and prioritize needs (developing security approaches and plans); (6) Developing model security plans and procedures; and (7) Equipment (vehicles, packages, command and control equipment, etc.). Country visits are now being scheduled to initiate transport security cooperative activities. A training course has been developed to assist countries in developing and implementing transport security programs. The training course has been given as a national training course (three times) and as a Regional training course (three times). The course addresses recommended security provisions for the transport of all radioactive material.

Hawk, Mark B [ORNL; Eriksson, Ann-Margret [International Atomic Energy Agency (IAEA); Rawl, Richard [Transport Security and Safety, Oak Ridge; Anderson, Kimberly K [ORNL

2010-01-01T23:59:59.000Z

316

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Physical Protection Office of Physical Protection Bill Dwyer Director, 202-586-7887 Mission The mission of the Office of Physical Protection is to implement and oversee dedicated human resources, processes, and equipment designed to protect personnel and assets entrusted to our care at Department of Energy (DOE) Headquarters facilities. The Office is comprised of dedicated DOE Federal security professionals, Headquarters Protective Force personnel, and Alarms and Access Control Technicians. These security subject matter experts work together to ensure compliance with DOE Safeguards and Security regulations, Interagency Security Committee guidance, and federal laws. The result of this collaboration is a security program designed to ensure a safe and secure working environment for all Headquarters employees.

317

National Security Science Archive  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security Science » National Security Science » NSS Archive National Security Science magazine Latest Issue:April 2013 All Issues » submit National Security Science Archive Using its broad and unique scientific and engineering capabilities, the Laboratory solves a diverse set of challenges to national and global security and the weapons programs. National Security Science magazine showcases the breadth and depth of the Laboratory's scientific and technical work to policy makers, the general public, academia, and scientific and technical experts. past issues cover Issue 2 2012 interactive | web | pdf past issues cover Issue 1 2012 interactive | web | pdf past issues cover Issue 3 2011 web | pdf past issues cover Issue 2 2011 web | pdf past issues cover Issue 1 2011 web | pdf past issues cover

318

Security and Privacy Notice  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Privacy Notice Security and Privacy Notice Thank you for visiting the Office of Health, Safety and Security (HSS) web site and reviewing our position on security and privacy. SECURITY NOTICE This web site is part of a Federal computer system and is the property of the United States Government. It is for authorized use only. The Department of Energy monitors this web site for security purposes to ensure it remains available and to protect information in the system. The Department of Energy uses software programs and additional equipment to monitor network traffic to identify unauthorized attempts to access, obtain, alter, damage or destroy information, or otherwise to interfere with the system or its operation. Any and all uses of this system and all files on this system

319

PNNL: Security & Privacy  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Privacy Security & Privacy Thank you for visiting the Pacific Northwest National Laboratory (PNNL) website (pnnl.gov) and reviewing our security and privacy policies. The following policies apply to all pages and sites in the pnnl.gov domain, unless otherwise noted. Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or

320

Security Topic Group  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Group Group Security and TEC * Tension exists between open forum concept of TEC and the ability of STG members to discuss security topics. - DOE will maintain the open forum - it will not form a subgroup of cleared members NAS Study * Some members want STG to formally recommend a fully independent review of security issues - DOE is reviewing the NAS study and has not formulated a position Security Topic Group (Continued) Classification Guide & Information Sharing Protocol * Guide is finished and undergoing internal concurrence - Slated for late September release * Protocol will be completed once the guide is issued Security-Related Lessons Learned * Lessons learned document was distributed and comments requested by the end of March Security Topic Group (Continued) SRG/CVSA Survey

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Cyberspace security: How to develop a security strategy  

E-Print Network (OSTI)

Despite all visible dividers, the Internet is getting us closer and closer, but with a great price. Our security is the price. The internatl. community is fully aware of the urgent need to secure the cyberspace as you see the multiplication of security standards and national schemes interpreting them beyond borders: ISO 15408, ISO 17799, and ISO 27001. Even though some countries, incl. the Security Big Six (SB6), are equipped with their security books and may feel relatively safe; this remains a wrong sense of security as long as they share their networks with entities of less security. The standards impose security best practices and system specifications for the development of information security management systems. Partners beyond borders have to be secure as this is only possible if all entities connected to the partnership remain secure. Unfortunately, there is no way to verify the continuous security of partners without periodic security auditing and certification, and members who do not comply should ...

Raggad, Bel G

2007-01-01T23:59:59.000Z

322

Capturing power at higher voltages from arrays of microbial fuel cells without voltage reversal  

E-Print Network (OSTI)

is too low to be used directly for many practical applications. For example, a single light emitting diode (LED) requires a minimum voltage of 2 V.2 Thus, effective methods of boosting MFC voltages

323

Aalborg Universitet Mitigation of Voltage Sags in CIGRE Low Voltage Distribution Network  

E-Print Network (OSTI)

software version 15.0. Index Terms--Wind Turbine Generator (WTG), Photovoltaic (PV), Voltage Source of voltage sags. I. INTRODUCTION Power quality, reliability and stability are the prime requirement of modern

Bak-Jensen, Birgitte

324

Security (Un-)Usability 17 Security Usability Fundamentals  

E-Print Network (OSTI)

Security (Un-)Usability 17 Security Usability Fundamentals An important consideration when you're building an application is the usability of the security features that you'll be employing. Security experts frequently lament that security has been bolted onto applications as an afterthought, however

Cortes, Corinna

325

Enterprise Cyber Security Posture  

Science Conference Proceedings (OSTI)

... to enable organizations to transform uncertainties into ... org/issues- research/telecom/security-breach-notification ... systems C. Cyber-physical systems ...

2013-04-10T23:59:59.000Z

326

Seamless and Secure Mobility  

Science Conference Proceedings (OSTI)

... layer techniques and the use of advanced measurement in order to accurately assess and manage the performance and security characteristics of ...

2013-11-27T23:59:59.000Z

327

security blunders (INMM 2010)  

NLE Websites -- All DOE Office Websites (Extended Search)

OF SECURITY BLUNDERS Roger G. Johnston and Jon S. Warner Vulnerability Assessment Team Nuclear Engineering Division Argonne National Laboratory 9700 S. Cass Ave, Building 206,...

328

Hazardous Material Security (Maryland)  

Energy.gov (U.S. Department of Energy (DOE))

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

329

Nevada National Security Site  

NLE Websites -- All DOE Office Websites (Extended Search)

of nuclear weapons and storing special nuclear materials. Other activities include environmental management, national security response, and defense and civil technologies....

330

Security problem on arbitrated quantum signature schemes  

E-Print Network (OSTI)

Until now, there have been developed many arbitrated quantum signature schemes implemented with a help of a trusted third party. In order to guarantee the unconditional security, most of them take advantage of the optimal quantum one-time encryption method based on Pauli operators. However, we in this paper point out that the previous schemes only provides a security against total break and actually show that there exists a simple existential forgery attack to validly modify the transmitted pair of message and signature. In addition, we also provide a simple method to recover the security against the proposed attack.

Jeong Woon Choi; Ku-Young Chang; Dowon Hong

2011-06-27T23:59:59.000Z

331

Timing discriminator using leading-edge extrapolation  

DOE Patents (OSTI)

A discriminator circuit to recover timing information from slow-rising pulses by means of an output trailing edge, a fixed time after the starting corner of the input pulse, which is nearly independent of risetime and threshold setting is described. This apparatus comprises means for comparing pulses with a threshold voltage; a capacitor to be charged at a certain rate when the input signal is one-third threshold voltage, and at a lower rate when the input signal is two-thirds threshold voltage; current-generating means for charging the capacitor; means for comparing voltage capacitor with a bias voltage; a flip-flop to be set when the input pulse reaches threshold voltage and reset when capacitor voltage reaches the bias voltage; and a clamping means for discharging the capacitor when the input signal returns below one-third threshold voltage.

Gottschalk, B.

1981-07-30T23:59:59.000Z

332

Timing discriminator using leading-edge extrapolation  

DOE Patents (OSTI)

A discriminator circuit to recover timing information from slow-rising pulses by means of an output trailing edge, a fixed time after the starting corner of the input pulse, which is nearly independent of risetime and threshold setting. This apparatus comprises means for comparing pulses with a threshold voltage; a capacitor to be charged at a certain rate when the input signal is one-third threshold voltage, and at a lower rate when the input signal is two-thirds threshold voltage; current-generating means for charging the capacitor; means for comparing voltage capacitor with a bias voltage; a flip-flop to be set when the input pulse reaches threshold voltage and reset when capacitor voltage reaches the bias voltage; and a clamping means for discharging the capacitor when the input signal returns below one-third threshold voltage.

Gottschalk, Bernard (Palo Alto, CA)

1983-01-01T23:59:59.000Z

333

Low voltage ride-through capability improvement of wind power generation using dynamic voltage restorer  

Science Conference Proceedings (OSTI)

Recently, the total amount of generation from wind power plants has been increased all over the world. In this situation, a large amount of disconnection of wind generation may give a serious influence in the power system. Consequently, Low Voltage Ride-Through ... Keywords: dynamic voltage restorer, energy storage, fault ride-through, fixed-speed induction generator, low voltage ride-through, voltage sag, wind power generation

Naohiro Hasegawa; Teruhisa Kumano

2010-02-01T23:59:59.000Z

334

Fiber-optic voltage sensor with cladded fiber and evanescent wave variation detection  

DOE Patents (OSTI)

A fiber optic voltage sensor is described which includes a source of light, a reference fiber for receiving a known percentage of the light and an electrostrictive element having terminals across which is applied, a voltage to be measured. The electrostrictive element is responsive to the applied voltage to assume an altered physical state. A measuring fiber also receives a known percentage of light from the light source and is secured about the electrostrictive element. The measuring fiber is provided with a cladding and exhibits an evanescent wave in the cladding. The measuring fiber has a known length which is altered when the electrostrictive element assumes its altered physical state. A differential sensor is provided which senses the intensity of light in both the reference fiber and the measuring fiber and provides an output indicative of the difference between the intensities. 3 figs.

Wood, C.B.

1992-12-15T23:59:59.000Z

335

Fiber-optic voltage sensor with cladded fiber and evanescent wave variation detection  

DOE Patents (OSTI)

A fiber optic voltage sensor is described which includes a source of light, a reference fiber for receiving a known percentage of the light and an electrostrictive element having terminals across which is applied, a voltage to be measured. The electrostrictive element is responsive to the applied voltage to assume an altered physical state. A measuring fiber also receives a known percentage of light from the light source and is secured about the electrostrictive element. The measuring fiber is provided with a cladding and exhibits an evanescent wave in the cladding. The measuring fiber has a known length which is altered when the electrostrictive element assumes its altered physical state. A differential sensor is provided which senses the intensity of light in both the reference fiber and the measuring fiber and provides an output indicative of the difference between the intensities.

Wood, Charles B. (Lakewood, CO)

1992-01-01T23:59:59.000Z

336

Silicon photomultiplier timing performance study  

E-Print Network (OSTI)

Many characteristics of Silicon Photomultipliers can be tuned with temperature and operation voltage. We present preliminary results of a study of the effect of these two operation parameters on the time resolution of large active area Multi-Pixel Photon Counters (MPPCs) manufactured by Hamamatsu. Measurements at -10 C, 0 C, and 10 C at different bias voltages were performed. The time resolution is best at low temperature and high over-voltage. Most significant improvements can be achieved in cases with low number of fired pixels (40 pixels) the effect of temperature and operation voltage becomes smaller. The timing performance still improves with decreasing temperature (~ factor of 2) but it hardly depends on the operation voltage. The study shows, that especially in applications where only few photons are available for detection a careful optimization of temperature and operation voltage are advisable to obtain optimum timing results with the MPPC.

Gama Ahmed; Paul Bhler; Johann Marton; Ken Suzuki

2010-06-21T23:59:59.000Z

337

Voltage regulation in linear induction accelerators  

DOE Patents (OSTI)

Improvement in voltage regulation in a Linear Induction Accelerator wherein a varistor, such as a metal oxide varistor when it is placed in parallel with the beam accelerating cavity and the magnetic core. The non-linear properties of the varistor result in a more stable voltage across the beam accelerating cavity than with a conventional compensating resistance.

Parsons, W.M.

1991-03-19T23:59:59.000Z

338

Voltage regulation in linear induction accelerators  

DOE Patents (OSTI)

Improvement in voltage regulation in a linear induction accelerator wherein a varistor, such as a metal oxide varistor, is placed in parallel with the beam accelerating cavity and the magnetic core is disclosed. The non-linear properties of the varistor result in a more stable voltage across the beam accelerating cavity than with a conventional compensating resistance. 4 figs.

Parsons, W.M.

1992-12-29T23:59:59.000Z

339

Timing analysis in presence of supply voltage and temperature variations  

Science Conference Proceedings (OSTI)

In the nanometer era, the physical verification of CMOS digital circuit becomes a complex task. Designers must account of numerous new factors that impose a drastic change in validation and physical verification methods. One of these major changes in ...

B. Lasbouygues; R. Wilson; N. Azemard; P. Maurine

2006-04-01T23:59:59.000Z

340

DOC Information System Security Conference on Innovating ...  

Science Conference Proceedings (OSTI)

... B. Walsh, Acting Director, Cyber Security Program, Department of Homeland Security. ... R. Clark, Senior Advisor National and Cyber Security, DOC. ...

2013-06-28T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

SECURITY TERMINATION STATEMENT | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

SECURITY TERMINATION STATEMENT SECURITY TERMINATION STATEMENT Form provides an individual's statement in connection with the termination of access authorization (security...

342

National Nuclear Security Administration Overview | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nuclear Security Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National...

343

NREL: Measurements and Characterization - Current Versus Voltage  

NLE Websites -- All DOE Office Websites (Extended Search)

Current Versus Voltage Current Versus Voltage The National Renewable Energy Laboratory (NREL) Device Performance group uses current versus voltage (I-V) measurement systems to assess the main performance parameters for photovoltaic (PV) cells and modules. I-V measurement systems determine the output performance of devices, including: open-circuit voltage (Voc), short-circuit current (Isc), fill factor (FF), maximum power output of the device (Pmax), voltage at maximum power (Vmax), current at maximum power (Imax), and conversion efficiency of the device (η). Some I-V systems may also be used to perform dark I-V measurements to determine diode properties and series and shunt resistances. We use three I-V systems to measure performance of individual PV cells; and four for modules - two for measurements under simulated conditions; and

344

High Voltage Safety Act | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

High Voltage Safety Act High Voltage Safety Act High Voltage Safety Act < Back Eligibility Commercial Construction Developer General Public/Consumer Industrial Installer/Contractor Utility Savings Category Alternative Fuel Vehicles Hydrogen & Fuel Cells Buying & Making Electricity Water Home Weatherization Solar Wind Program Info State Georgia Program Type Safety and Operational Guidelines Siting and Permitting The purpose of the High Voltage Safety Act is to prevent injury to persons and property and interruptions of utility service resulting from accidental or inadvertent contact with high-voltage electric lines by providing that no work shall be done in the vicinity of such lines unless and until the owner or operator thereof has been notified of such work and has taken the appropriate safety measures. The Georgia Public Service Commission requires

345

Flexible method for monitoring fuel cell voltage  

DOE Patents (OSTI)

A method for equalizing the measured voltage of each cluster in a fuel cell stack wherein at least one of the clusters has a different number of cells than the identical number of cells in the remaining clusters by creating a pseudo voltage for the different cell numbered cluster. The average cell voltage of the all of the cells in the fuel cell stack is calculated and multiplied by a constant equal to the difference in the number of cells in the identical cell clusters and the number of cells in the different numbered cell cluster. The resultant product is added to the actual voltage measured across the different numbered cell cluster to create a pseudo voltage which is equivalent in cell number to the number of cells in the other identical numbered cell clusters.

Mowery, Kenneth D. (Noblesville, IN); Ripley, Eugene V. (Russiaville, IN)

2002-01-01T23:59:59.000Z

346

Corona and Motor Voltage Interim Report  

SciTech Connect

It has been suggested that to meet the FreedomCAR objectives for cost, size, weight, efficiency, and reliability higher buss voltages be utilized in HEV and FC automotive applications. The reasoning is that since electric power is equal to the product of voltage and current for a given power a higher voltage and lower current would result in smaller cable and inverter switching components. Consequently, the system can be lighter and smaller. On the other hand, higher voltages are known to require better and thicker electrical insulation that reduce the available slot area for motor windings. One cause of slow insulation breakdown is corona that gradually erodes the insulation and shortens the life expectancy of the motor. This study reports on the results of a study on corona initiating voltages for mush-wound and bobbin-wound stators. A unique testing method is illustrated.

Hsu, J.S.

2005-05-06T23:59:59.000Z

347

Annual Security Report October 2012  

E-Print Network (OSTI)

1 Annual Security Report October 2012 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

Goddard III, William A.

348

Dumb Ideas in Computer Security  

E-Print Network (OSTI)

Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

349

Techno Security's Guide to Securing SCADA: A Comprehensive Handbook On Protecting The Critical Infrastructure  

Science Conference Proceedings (OSTI)

Around the world, SCADA (supervisory control and data acquisition) systems and other real-time process control networks run mission-critical infrastructure--everything from the power grid to water treatment, chemical manufacturing to transportation. ... Keywords: Computer Science, Security

Jack Wiles

2008-07-01T23:59:59.000Z

350

Tag: Global Security | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Global Security Global Security Tag: Global Security Displaying 1 - 10 of 61... Category: Global Security Ultrasonic cleaner cuts costs, enhances safety The process of upgrading an old cleaning unit revealed how things were once done and the advances that have followed. More... Category: Global Security Well Logging Security Initiatives GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide. More... Category: Global Security Y-12 Receives Two R&D 100 Awards Engineers at the National Nuclear Security Administration's Y-12 National Security Complex have won two R&D 100 Awards. More... Category: Global Security Y-12 researchers garner R&D 100 awards A research chemist and his revolutionary cloth invented to clean surfaces

351

Security and Cyber Evaluations - Guidance Documents  

NLE Websites -- All DOE Office Websites (Extended Search)

Guidance Documents Security and Cyber Evaluations Security Evaluations Appraisal Process Guide, April 2008 Cyber Security Evaluations Appraisal Process Guide, April 2008 Security...

352

Nevada National Security Site | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Nevada National Security Site Nevada National Security Site Nevada National Security Site | October 2011 Control Point Nevada National Security Site | October 2011 Control Point...

353

Headquarters Facilities Master Security Plan | Department of...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Headquarters Facilities Master Security Plan Headquarters Facilities Master Security Plan Welcome to the 2013 version of the Headquarters Facilities Master Security...

354

Physical Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Oversight Security & Cyber Evaluations Security and Cyber Guidance Physical Security Reports Physical Security Reports 2012 (U) Pantex Plant Protective Force Response...

355

Integrated Security System | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Integrated Security System Integrated Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems...

356

PRIVACY/SECURITY NOTICE  

NLE Websites -- All DOE Office Websites (Extended Search)

PRIVACY/SECURITY NOTICE PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system employs software programs to monitor network traffic to identify unauthorized activities. By accessing this Web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended purposes; to deny service to authorized

357

Securing Control Systems Modems  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Recommended Practice for Securing Recommended Practice for Securing Control System Modems January 2008 iii ABSTRACT This paper addresses an often overlooked "backdoor" into critical infrastructure control systems created by modem connections. A modem's connection to the public telephone system is similar to a corporate network connection to the Internet. By tracing typical attack paths into the system, this paper provides the reader with an analysis of the problem and then guides the reader through methods to evaluate existing modem security. Following the analysis, a series of methods for securing modems is provided. These methods are correlated to well-known networking security methods. iv ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland

358

International Nuclear Security  

SciTech Connect

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

359

Secure Contexts (Extended Abstract)  

E-Print Network (OSTI)

Information flow security in a multilevel system aims at guaranteeing that no high level information is revealed to low levels. A usual requirement to ensure information flow security for a process is that no generic attacker can induce a high-to-low information flow. This requirement is too demanding when we have some knowledge about the contexts where the process is going to run. To deal with these situations we introduce the notion of secure contexts for a process. The notion is parametric with respect to both the observational equivalence and the operation used to characterize the low level behavior. In the paper we mainly analyze the cases of bisimulation and trace equivalence. We describe how to build secure contexts in these cases and we show that two well-known security properties, BNDC and NDC, are just special instances of our general notion.

Annalisa Bossi; Damiano Macedonio; Carla Piazza; Sabina Rossi

2003-01-01T23:59:59.000Z

360

Indirection and computer security.  

SciTech Connect

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Low Beam Voltage, 10 MW, L-Band Cluster Klystron  

SciTech Connect

Conceptual design of a multi-beam klystron (MBK) for possible ILC and Project X applications is presented. The chief distinction between this MBK design and existing 10-MW MBK's is the low operating voltage of 60 kV. There are at least four compelling reasons that justify development at this time of a low-voltage MBK, namely (1) no pulse transformer; (2) no oil tank for high-voltage components and for the tube socket; (3) no high-voltage cables; and (4) modulator would be a compact 60-kV IGBT switching circuit. The proposed klystron consists of four clusters containing six beams each. The tube has common input and output cavities for all 24 beams, and individual gain cavities for each cluster. A closely related optional configuration, also for a 10 MW tube, would involve four totally independent cavity clusters with four independent input cavities and four 2.5 MW output ports, all within a common magnetic circuit. This option has appeal because the output waveguides would not require a controlled atmosphere, and because it would be easier to achieve phase and amplitude stability as required in individual SC accelerator cavities.

Teryaev, V.; /Novosibirsk, IYF; Yakovlev, V.P.; /Fermilab; Kazakov, S.; /KEK, Tsukuba; Hirshfield, J.L.; /Yale U. /Omega-P, New Haven

2009-05-01T23:59:59.000Z

362

Stability issues in IC Low Drop Out voltage regulators  

E-Print Network (OSTI)

Performance issues of IC Low Drop Out (LDO) voltage regulators, with specific reference to stability, are discussed in this thesis. Evaluation of existing frequency compensation schemes and their performances across operating loads is presented. The problem of instability of the LDO voltage regulator at low Electo Static Resistance (ESR) of the load capacitors and the consequences of this problem are highlighted. As a solution to some of the discussed problems, an alternate LDO voltage regulator topology that is stable with low Electro Static Resistance (ESR) capacitive loads is presented. The proposed scheme, instead of relying on the zero generated by the load capacitor and its ESR combination for stability, generates a zero internally. The LDO voltage regulator is implemented and fabricated in AMI 0.5mm CMOS technology through MOSIS service. It is demonstrated that this scheme realizes robust frequency compensation, facilitates use of Multi Layer Ceramic Capacitors (MLCC) for load of LDO regulators, and improves transient response and noise performance. Test results from the prototype provide an evaluation of the most important parameters of the regulator: ground current, load regulation, line regulation, output noise and start-up time.

Chava, Krishna Chaitanya

2002-01-01T23:59:59.000Z

363

The Office of Nuclear Safeguards and Security | National Nuclear Security  

National Nuclear Security Administration (NNSA)

Safeguards and Security | National Nuclear Security Safeguards and Security | National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog The Office of Nuclear Safeguards and Security Home > About Us > Our Programs > Nonproliferation > Nonproliferation & International Security > The Office of Nuclear Safeguards and Security The Office of Nuclear Safeguards and Security

364

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... To receive email notification(s) when new security publications are released, subscribe to the CSRC Publications Mailing List. ... NIST Security Events. ...

365

Berkeley Lab Cyber Security - Cyber Security Website - Berkeley...  

NLE Websites -- All DOE Office Websites (Extended Search)

Department of Energy logo Phone Book Jobs Search Contact Us About CPIC Intranet Cyber Home Resources Training Requirements Search Cyber Security Cyber Security Website FAQs...

366

Well Logging Security Initiatives | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat...

367

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... and Space Administration, the National Security Agency, the Department of Energy, the US Office of Management and Budget, the Social Security ...

368

Security and Training | Y-12 National Security Complex  

NLE Websites -- All DOE Office Websites (Extended Search)

Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and...

369

From National Security to Environmental Security: A Historical Overview .  

E-Print Network (OSTI)

??The study attempts to provide a historical approach to the role of the environment in security studies. Contemporary security challenges have shown that the narrow (more)

Vella, Andre`

2012-01-01T23:59:59.000Z

370

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... NIST Computer Security Division is Proud to Announce the Release of DRAFT NISTIR 7298, Revision 2: NIST Glossary of Key Information Security ...

371

SCADA system security, complexity, and security proof  

Science Conference Proceedings (OSTI)

Modern Critical infrastructures have command and control systems. These command and control systems are commonly called supervisory control and data acquisition (SCADA). In the past, SCADA system has a closed operational environment, so these systems ... Keywords: 11770-2 mechanism 9, Formal security poof, SCADA, key management

Reda Shbib; Shikun Zhou; Khalil Alkadhimi

2012-11-01T23:59:59.000Z

372

UC SECURITY FRAMEWORK 2011 -2012  

E-Print Network (OSTI)

1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

Hickman, Mark

373

The security of machine learning  

E-Print Network (OSTI)

of the IEEE symposium on security and privacy (pp. 188201).and communications security (CCS) (pp. 5968). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

2010-01-01T23:59:59.000Z

374

January 2005 INTEGRATING IT SECURITY  

E-Print Network (OSTI)

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

375

Evaluating mobile agent platform security  

Science Conference Proceedings (OSTI)

Agent mobility requires additional security standards. While the theoretical aspects of mobile agent security have been widely studied, there are few studies about the security standards of current agent platforms. In this paper, test cases are proposed ...

Axel Brkle; Alice Hertel; Wilmuth Mller; Martin Wieser

2006-09-01T23:59:59.000Z

376

Facility Security Officer Contractor Toolcart  

NLE Websites -- All DOE Office Websites (Extended Search)

OVERVIEW OVERVIEW SPECIAL MESSAGE Please refer to this website each time you need to generate a required form. This will ensure that you are using the most recent version of the form. Do not download the form and save on place it on your hard drive. Proper Completion of Security Termination Statements: When completing Security Termination Statements for submittal to DOE, please ensure the reason for termination is clear and provides the reason(s) for termination. This will allow DOE to make any necessary determinations that may affect clearance eligibility. For example, simply including "terminated" or "for cause" does not provide enough information to DOE for processing. Please direct questions to Joanne Trujillo at 284-2554 or jmtruji@sandia.gov in NM and Carol James 294-2061or cdjames@sandia.gov in CA.

377

GaAs series connected photovoltaic converters for high voltage capacitor charging applications  

DOE Green Energy (OSTI)

This report describes the design features of series connected photovoltaic arrays which will be required to charge capacitors to relatively high (400V) voltages in time periods on the order of 1 microsecond. The factors which determine the array voltage and the capacitor charge time are given. Individual element junction designs, along with an interconnect scheme, and a semiconductor process to realize them are presented. Finally, the input laser optical required to meet the requirements is determined.

Rose, B.H.

1997-09-01T23:59:59.000Z

378

Voltage controlled spintronics device for logic applications.  

SciTech Connect

We consider logic device concepts based on our previously proposed spintronics device element whose magnetization orientation is controlled by application of a bias voltage instead of a magnetic field. The basic building block is the voltage-controlled rotation (VCR) element that consists of a four-layer structure--two ferromagnetic layers separated by both nanometer-thick insulator and metallic spacer layers. The interlayer exchange coupling between the two ferromagnetic layers oscillates as a function of applied voltage. We illustrate transistor-like concepts and re-programmable logic gates based on VCR elements.

Bader, S. D.; You, C.-Y.

1999-09-03T23:59:59.000Z

379

Voltage controlled spintronic devices for logic applications  

SciTech Connect

We consider logic device concepts based on our previously proposed spintronics device element whose magnetization orientation is controlled by application of a bias voltage instead of a magnetic field. The basic building block is the voltage-controlled rotation (VCR) element that consists of a four-layer structure--two ferromagnetic layers separated by both nanometer-thick insulator and metallic spacer layers. The interlayer exchange coupling between the two ferromagnetic layers oscillates as a function of applied voltage. We illustrate transistorlike concepts and reprogrammable logic gates based on VCR elements. (c) 2000 American Institute of Physics.

You, Chun-Yeol [Materials Science Division, Argonne National Laboratory, Argonne, Illinois 60439 (United States); Bader, S. D. [Materials Science Division, Argonne National Laboratory, Argonne, Illinois 60439 (United States)

2000-05-01T23:59:59.000Z

380

Interphase power controller with voltage injection  

Science Conference Proceedings (OSTI)

This paper introduces a new family of Interphase Power Controllers (IPC) based on the principle of voltage injection commonly used in phase-shifting transformers (PST). The voltage injection IPC exhibits power (active and reactive) control characteristics similar to previously defined IPC's and retains their inherent qualities: passive control, short circuit limitation and voltage decoupling. It also provides more flexibility for the adjustment of the operating points. Two promising topologies are described in more detail. One of them offers the potential of retrofitting existing phase-shifting transformers into full-fledged IPC's.

Beauregard, F.; Brochu, J.; Morin, G.; Pelletier, P. (Centre d'Innovation sur le Transport d'Energie du Quebec, Varennes, Quebec (Canada))

1994-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Performance of a voltage peak detection-based flickermeter  

Science Conference Proceedings (OSTI)

Voltage fluctuations and rapid voltage changes lead to lamps flickering and disturbance of visual perception may occur consequently. For evaluation of the flicker severity level by means of voltage measurement there was developed an instrument called ... Keywords: Matlab Simulink, flickermeter, interharmonics, performance analysis, voltage fluctuation, voltage peak detection

Jiri Drapela

2009-12-01T23:59:59.000Z

382

Office of Security Operations: Headquarters Security Officers (HSO) Program  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Officers (HSO) Program Headquarters Security Officers (HSO) Program Responsible Individual/Contact: Wayne Berkebile - (301) 903-1163 - D-320 Scope: The Headquarters Security Officer (HSO) Program was established in 1990 by the Under Secretary of Energy in order to improve communications between the Office of Headquarters Security Operations and component organizations within DOE Headquarters. It is governed by DOE Headquarters Order 472.1, Headquarters Security Officer Program, dated 3-19-2010. Each Headquarters element is required to appoint at least one HSO and an Alternate HSO. HSOs perform a wide variety of security-related functions within their element such as obtaining security badges and clearances, maintaining Security Areas, acquiring security equipment, implementing procedures for protecting classified and sensitive information, conducting security inquiries, and arranging for required security services.

383

Security and Suitability Process Reform  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security and Suitability Process Reform December 2008 Provided by the Joint Security and Suitability Reform Team EXECUTIVE OFFICE OF THE PRESIDENT OFFICE OF MANAGEMENT AND BUDGET...

384

Security Suites | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Security Suites Available by Internet Service Providers Comcast Comcast offers the Norton Security Suite with antivirus and firewall software for your protection, for no additional...

385

Smart-Grid Security Issues  

Science Conference Proceedings (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

386

Fiber optic current monitor for high-voltage applications  

DOE Patents (OSTI)

A current monitor which derives its power from the conductor being measured for bidirectionally measuring the magnitude of current (from DC to above 50 khz) flowing through a conductor across which a relatively high level DC voltage is applied, includes a pair of identical transmitter modules connected in opposite polarity to one another in series with the conductor being monitored, for producing from one module a first light signal having an intensity directly proportional to the magnitude of current flowing in one direction through the conductor during one period of time, and from the other module a second light signal having an intensity directly proportional to the magnitude of current flowing in the opposite direction through the conductor during another period of time, and a receiver located in a safe area remote from the high voltage area for receiving the first and second light signals, and converting the same to first and second voltage signals having levels indicative of the magnitude of current being measured at a given time. 6 figs.

Renda, G.F.

1992-04-21T23:59:59.000Z

387

Privacy/Security Policy  

NLE Websites -- All DOE Office Websites (Extended Search)

Privacy/Security Privacy/Security Privacy/Security Policy This web site is part of a federal computer system used to accomplish federal functions. Read the following important privacy and security information carefully. Security Notice October 31, 2000 This web site is part of a federal computer system used to accomplish federal functions. The Department of Energy monitors this web site for security purposes to ensure that it remains available to all users and to protect information in the system. By accessing this web site, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features, to use the system for other than intended purposes, to deny service to authorized users, to access, obtain, alter, damage, or destroy information, or otherwise to interfere with the system or its operation are prohibited. Evidence of such acts may be disclosed to law enforcement authorities and result in criminal prosecution under the Computer Fraud and Abuse Act of 1986 (Pub. L. 99-474) and the National Information Infrastructure Protection Act of 1996 (Pub. L. 104-294), (18 U.S.C. 1030), or other applicable criminal laws.

388

Voltage protection scheme for MG sets used to drive inductive energy storage systems  

DOE Green Energy (OSTI)

A recent tokamak proposal at ORNL called for MG (motor-generator) sets to drive the ohmic heating (OH) coil, which was to be subjected to 20 kV immediately after coil charge-up to initiate the experiment. Since most rotating machinery is inherently low voltage, including the machines available at ORNL, a mechanism was necessary to isolate the generators from the high voltage portions of the circuit before the appearance of this voltage. It is not the expected 20 kV at the coil that causes difficulty, because the main interrupting switch handles this. The voltage induced in the armature due to di/dt and the possibility of faults are the greatest causes for concern and are responsible for the complexity of the voltage protection scheme, which must accommodate any possible combination of fault time and location. Such a protection scheme is presented in this paper.

Campen, G.L.; Easter, R.B.

1977-01-01T23:59:59.000Z

389

Home Network Security  

E-Print Network (OSTI)

Home computers that are connected to the Internet are under attack and need to be secured. That process is relatively well understood, even though we do not have perfect solutions today and probably never will. Meanwhile, however, the home computing environment is evolving into a home network of multiple devices, which will also need to be secured. We have little experience with these new home networks and much research needs to be done in this area. This paper gives a view of the requirements and some of the techniques available for securing home networks.

Technology Journal Interoperable; Carl M. Ellison; Corporate Technology Group; Intel Corporation

2002-01-01T23:59:59.000Z

390

Property:Nominal Voltage | Open Energy Information  

Open Energy Info (EERE)

Nominal Voltage Nominal Voltage Jump to: navigation, search Property Name Nominal Voltage Property Type Number This is a property of type Number. Pages using the property "Nominal Voltage" Showing 22 pages using this property. D Distributed Generation Study/10 West 66th Street Corp + 480 + Distributed Generation Study/615 kW Waukesha Packaged System + 480 + Distributed Generation Study/Aisin Seiki G60 at Hooligans Bar and Grille + 240 + Distributed Generation Study/Arrow Linen + 480 + Distributed Generation Study/Dakota Station (Minnegasco) + 0 + Distributed Generation Study/Elgin Community College + 4,160 + Distributed Generation Study/Emerling Farm + 480 + Distributed Generation Study/Floyd Bennett + 480 + Distributed Generation Study/Harbec Plastics + 480 +

391

Low voltage arc formation in railguns  

DOE Patents (OSTI)

A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile.

Hawke, R.S.

1985-08-05T23:59:59.000Z

392

Low voltage arc formation in railguns  

DOE Patents (OSTI)

A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile.

Hawke, Ronald S. (Livermore, CA)

1987-01-01T23:59:59.000Z

393

Low voltage arc formation in railguns  

DOE Patents (OSTI)

A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile. 2 figs.

Hawke, R.S.

1987-11-17T23:59:59.000Z

394

High-voltage-compatible, fully depleted CCDs  

SciTech Connect

We describe charge-coupled device (CCD) developmentactivities at the Lawrence Berkeley National Laboratory (LBNL).Back-illuminated CCDs fabricated on 200-300 mu m thick, fully depleted,high-resistivity silicon substrates are produced in partnership with acommercial CCD foundry.The CCDs are fully depleted by the application ofa substrate bias voltage. Spatial resolution considerations requireoperation of thick, fully depleted CCDs at high substrate bias voltages.We have developed CCDs that are compatible with substrate bias voltagesof at least 200V. This improves spatial resolution for a given thickness,and allows for full depletion of thicker CCDs than previously considered.We have demonstrated full depletion of 650-675 mu m thick CCDs, withpotential applications in direct x-ray detection. In this work we discussthe issues related to high-voltage operation of fully depleted CCDs, aswell as experimental results on high-voltage-compatible CCDs.

Holland, Stephen E.; Bebek, Chris J.; Dawson, Kyle S.; Emes, JohnE.; Fabricius, Max H.; Fairfield, Jessaym A.; Groom, Don E.; Karcher, A.; Kolbe, William F.; Palaio, Nick P.; Roe, Natalie A.; Wang, Guobin

2006-05-15T23:59:59.000Z

395

Superconducting Low Voltage Direct Current (LVDC) Networks  

Science Conference Proceedings (OSTI)

A low voltage dc superconducting distribution network is a challenging future opportunity for power distribution. This report presents a scheme for a superconducting, parallel- connected, multiterminal dc transmission system.

1994-04-27T23:59:59.000Z

396

Spark gap with low breakdown voltage jitter  

SciTech Connect

Novel spark gap devices and electrodes are disclosed. The novel spark gap devices and electrodes are suitable for use in a variety of spark gap device applications. The shape of the electrodes gives rise to local field enhancements and reduces breakdown voltage jitter. Breakdown voltage jitter of approximately 5% has been measured in spark gaps according the invention. Novel electrode geometries and materials are disclosed.

Rohwein, Gerald J. (Albuquerque, NM); Roose, Lars D. (Albuquerque, NM)

1996-01-01T23:59:59.000Z

397

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card  

E-Print Network (OSTI)

SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

Li, Mo

398

Safety and Security What do Safety/Security work with?  

E-Print Network (OSTI)

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

399

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY August 8, 2011 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

400

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY  

E-Print Network (OSTI)

28 00 00 ELECTRONIC SAFETY AND SECURITY ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION Services #12;28 00 00 ELECTRONIC SAFETY AND SECURITY May 1, 2013 2 THE UNIVERSITY OF TEXAS AT AUSTIN ELECTRONIC SECURITY SYSTEM DESIGN, CONSTRUCTION AND COMMISSIONING GUIDE PART 1 - GENERAL 1.1 NOTICE

Texas at Austin, University of

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

NIST.gov - Computer Security Division - Computer Security ...  

Science Conference Proceedings (OSTI)

... Risks posters; National Security Agency Counterintelligence Awareness (301-688-6535); Native Intelligence, Inc. Rainbow ...

402

System for increasing corona inception voltage of insulating oils  

DOE Patents (OSTI)

The Corona Inception Voltage of insulating oils is increased by repetitive cycles of prestressing the oil with a voltage greater than the corona inception voltage, and either simultaneously or serially removing byproducts of corona by evacuation and heating the oil.

Rohwein, Gerald J. (Albuquerque, NM)

1998-01-01T23:59:59.000Z

403

Federal Information Systems Security Educators' Association ...  

Science Conference Proceedings (OSTI)

Federal Information Systems Security Educators' Association (FISSEA). Summary: The Federal Information Systems Security ...

2013-01-15T23:59:59.000Z

404

Border Gateway Protocol - Robustness and Security  

Science Conference Proceedings (OSTI)

Border Gateway Protocol - Robustness and Security. Summary: This project focuses on Robustness, Security, and Scalability ...

2012-05-03T23:59:59.000Z

405

NIST Highlight about workshop on homeland security ...  

Science Conference Proceedings (OSTI)

Workshop on Homeland Security Standards. On ... Related Links: ANSI Homeland Security Standards Panel. Contact. General ...

2011-12-14T23:59:59.000Z

406

Federal Computer Security Program Managers' Forum (Forum ...  

Science Conference Proceedings (OSTI)

Federal Computer Security Program Managers' Forum. Summary: The Federal Computer Security Program Managers' Forum ...

2013-01-15T23:59:59.000Z

407

Global Nuclear Security Technology Division (GNSTD)  

NLE Websites -- All DOE Office Websites (Extended Search)

Systems Nonproliferation Technology Nuclear Material Detection & Characterization Nuclear Security Advanced Technologies Safeguards & Security Technology Threat Reduction...

408

National Security Information Systems (NSIS) -National Security Systems &  

NLE Websites -- All DOE Office Websites (Extended Search)

NSSA: National Security Information Systems NSSA: National Security Information Systems Nonproliferation & National Security (NPNS) Overview Technical Nonproliferation Policy Support Strategic Trade Control Review of export license applications Multilateral Export Control Arrangements Interdiction Engagement & Training INECP INSEP GIPP Safeguards Concepts and Approaches Human Capital Development Additional Protocol Technical Assistance National Security Systems & Assessments National Security Information Systems Vulnerability Assessment Team (VAT) Radiation Detection & Response (RDR) Contact NPNS Other Major Programs Work with Argonne Contact us For Employees Site Map Help Join us on Facebook Follow us on Twitter NE Division on Flickr Nonproliferation and National Security Program National Security Systems & Assessments

409

National Security, Weapons Science  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security, Weapons Science National Security, Weapons Science /science-innovation/_assets/images/icon-science.jpg National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at LANL is part of the DOE's stockpile stewardship program. It uses two large X-ray machines to record three-dimensional interior images of materials. In most experiments, materials (including plutonium) undergo hydrodynamic shock to simulate the implosion process in nuclear bombs and/or the effects of severe hydrodynamic stress. The tests are described as "full-scale mockups

410

National Nuclear Security Administration  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

AI~W~~l AI~W~~l 11Vl'~~4 National Nuclear Security Administration Department of Energy National Nuclear Security Administration Nevada Site Office P.O. Box 98518 Las Vegas, NV 89193-8518 JAN! 8 2013 Gregory H. Woods, General Counsel, DOE/HQ (GC-1) FORS NATIONAL NUCLEAR SECURITY ADMINISTRATION NEVADA SITE OFFICE (NNSA/NSO) NATIONAL ENVIRONMENTAL POLICY ACT (NEPA) ANNUAL SUMMARY In accordance with DOE Order 451.1B, National Environmental Policy Act Compliance Program, NNSA/NSO is submitting the enclosed Annual NEP A Planning Summary. The document provides a brief description of ongoing and planned NEP A actions for calendar year 2013. This summary provides information for completion of the Site- Wide Environmental Impact Statement for the Nevada National Security Site and Off-Site Locations in the State of Nevada.

411

Security/Disclaimer  

Office of Scientific and Technical Information (OSTI)

U.S. Department of Energy DOE Green Energy Home & Search About Contact Us Javascript Not Enabled OSTI Security Website Policies and Important Links Some links on this page may take...

412

Internet Security Glossary  

Science Conference Proceedings (OSTI)

This Glossary (191 pages of definitions and 13 pages of references) provides abbreviations, explanations, and recommendations for use of information system security terminology. The intent is to improve the comprehensibility of writing that deals with ...

R. Shirey

2000-05-01T23:59:59.000Z

413

Office of Security Enforcement  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

414

Office of Security Operations  

NLE Websites -- All DOE Office Websites (Extended Search)

The Office of Health, Safety and Security HSS Logo Department of Energy Seal Left Tab SEARCH Right Tab TOOLS Right Tab Left Tab HOME Right Tab Left Tab ABOUT US Right Tab Left Tab...

415

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites (Extended Search)

Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

416

Wi-Fi security  

Science Conference Proceedings (OSTI)

"ALL [wireless security] mechanisms are completely in-effective" was the conclusion of a study by the Department of Computer Science at the University of Maryland. This discussion will systematically shed light on the inherent insecurities involved with ...

Paul Williams

2006-04-01T23:59:59.000Z

417

Information Security: Coordination of Federal Cyber Security Research and  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security: Coordination of Federal Cyber Security Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft of this report, OMB stated that it would review the need for such guidance. Information Security: Coordination of Federal Cyber Security Research and Development More Documents & Publications Networking and Information Technology Research and Development Supplement to the President's Budget (February 2010)

418

Modular high voltage power supply for chemical analysis  

DOE Patents (OSTI)

A high voltage power supply for use in a system such as a microfluidics system, uses a DC-DC converter in parallel with a voltage-controlled resistor. A feedback circuit provides a control signal for the DC-DC converter and voltage-controlled resistor so as to regulate the output voltage of the high voltage power supply, as well as, to sink or source current from the high voltage supply.

Stamps, James F. (Livermore, CA); Yee, Daniel D. (Dublin, CA)

2008-07-15T23:59:59.000Z

419

Modular high voltage power supply for chemical analysis  

DOE Patents (OSTI)

A high voltage power supply for use in a system such as a microfluidics system, uses a DC--DC converter in parallel with a voltage-controlled resistor. A feedback circuit provides a control signal for the DC--DC converter and voltage-controlled resistor so as to regulate the output voltage of the high voltage power supply, as well as, to sink or source current from the high voltage supply.

Stamps, James F. (Livermore, CA); Yee, Daniel D. (Dublin, CA)

2007-01-09T23:59:59.000Z

420

Best Practices for the Security of Radioactive Materials  

Science Conference Proceedings (OSTI)

This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass both physical security (hardware and engineering) and administrative procedures. Security regimes for these devices and materials typically use a defense-in-depth- or layered-security approach to eliminate single points of failure. The Department of Energy, the Department of Homeland Security, the Department of Defense, the American Society of Industrial Security (ASIS), the Security Industry Association (SIA) and Underwriters Laboratory (UL) all rovide design guidance and hardware specifications. With a graded approach, a physical-security specialist can tailor an integrated security-management system in the most appropriate cost-effective manner to meet the regulatory and non-regulatory requirements of the licensee or client.

Coulter, D.T.; Musolino, S.

2009-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Incidents of Security Concern  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

NOT MEASUREMENT NOT MEASUREMENT SENSITIVE DOE-STD-1210-2012 September 2012 DOE STANDARD Incidents of Security Concern U.S. Department of Energy AREA SANS Washington, D.C. 20585 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. DOE-STD-1210-2012 INTENTIONALLY BLANK DOE-STD-1210-2012 TABLE OF CONTENTS PARAGRAPH PAGE FOREWORD ................................................................................................................................ IV INCIDENTS OF SECURITY CONCERN......................................................................................1 1. SCOPE ....................................................................................................................................1 2. PURPOSE...............................................................................................................................1

422

Security Resiliency Testing  

Science Conference Proceedings (OSTI)

An accepted practice within the electric sector is to pre-stage and test equipment before deployment. Verification of functionality, operating parameters, and interoperability of equipment to be deployed can often be incorporated into predeployment testing. This testing may also support the selection of features responsible for the security of the host equipment. However, some security features and many aspects of resiliency testing may require activation, interaction, and interoperability with an ...

2013-12-02T23:59:59.000Z

423

Transportation Security Update  

Science Conference Proceedings (OSTI)

The U.S. Department of Transportation (DOT) final rules issued in 2003 required persons who offer for transportation or transport certain hazardous materials to develop and implement security plans. The Electric Power Research Institute (EPRI) formed a Transportation Security Implementation Working Group, which included representation from the Nuclear Energy Institute (NEI), to identify key projects, which were documented in the original report in 2005. This report updates information in the original rep...

2011-07-27T23:59:59.000Z

424

Data port security lock  

DOE Patents (OSTI)

In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

2008-06-24T23:59:59.000Z

425

Erera, Spring School 2004 Transportation Security  

E-Print Network (OSTI)

! Transportation security research: future #12;Erera, Spring School 2004 Outline ! Understanding transportationErera, Spring School 2004 Transportation Security Alan Erera and Chelsea C. White III Industrial transportation security ! Security regulations and programs ! Transportation security research: present

Erera, Alan

426

Cell Voltage Noise Reduction Based on Wavelet in Aluminum ...  

Science Conference Proceedings (OSTI)

Presentation Title, Cell Voltage Noise Reduction Based on Wavelet in Aluminum ... cell voltage signals collected in aluminium electrolysis process are with high...

427

Dynamic Simulation of Cell Voltage Resonance Effect in Aluminum ...  

Science Conference Proceedings (OSTI)

Dubal Cell Voltage Drop Initiatives towards Low Energy High Amperage Cells Dynamic Simulation of Cell Voltage Resonance Effect in Aluminum Electrolysis...

428

Green Island Power Authority Transmission Voltage Support System...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Green Island Power Authority Transmission Voltage Support System Project Green Island Power Authority Transmission Voltage Support System Project Power point presentation...

429

CMS System Security Plan Template  

Science Conference Proceedings (OSTI)

System Security Plan (SSP) Template Instructions. This template contains boiler plate language. Each template must be ...

2009-06-30T23:59:59.000Z

430

Roadmapping Workshop: Measurement of Security ...  

Science Conference Proceedings (OSTI)

Roadmapping Workshop: Measurement of Security Technology Performance Impacts for Industrial Control System. Purpose: ...

2013-10-31T23:59:59.000Z

431

Security Outreach and Integration Group  

Science Conference Proceedings (OSTI)

Security Outreach and Integration Group. Welcome. The US economy, citizens, and government rely on information technology. ...

2013-01-17T23:59:59.000Z

432

UH Mnoa Contacts: Campus Security  

E-Print Network (OSTI)

UH Mnoa Contacts: Campus Security 956-6911 Security Escort Service 956-SAFE Women's Center 956 pauvaw@hawaii.edu University Health Services 956-8965 www.hawaii.edu/shs/ Mlama Pono | www.hawaii.edu/security if you think you have been drugged. Police and Campus Security are trained in assisting with these types

433

Brief No. 9 WATER SECURITY,  

E-Print Network (OSTI)

Brief No. 9 WATER SECURITY, RISK & SOCIETY 1 of 4 Water Security and Federal Rivers March 2012 Australian National University Key messages · Water security in a hydroclimatic risk society. Climate risks interact with rapidly changing social, demographic and economic forces to position water security

New, Mark

434

News: IBM launches security offensive  

Science Conference Proceedings (OSTI)

IBM has announced a major security push, representing a US$1.5 billion investment in security-related projects next year. It will partner with other security vendors to offer a set of security services targeting information assets. The services will ...

2007-11-01T23:59:59.000Z

435

Developing security protocols by refinement  

Science Conference Proceedings (OSTI)

We propose a development method for security protocols based on stepwise refinement. Our refinement strategy guides the transformation of abstract security goals into protocols that are secure when operating over an insecure channel controlled by a Dolev-Yao-style ... Keywords: entity authentication, formal development, key establishment, security protocols, stepwise refinement

Christoph Sprenger; David Basin

2010-10-01T23:59:59.000Z

436

Security challenges in embedded systems  

Science Conference Proceedings (OSTI)

Embedded systems security is a significant requirement in emerging environments, considering the increasing deployment of embedded systems in several application domains. The large number of deployed embedded systems, their limited resources and their ... Keywords: Communication system security, computer security, embedded systems, security

Dimitrios N. Serpanos; Artemios G. Voyiatzis

2013-03-01T23:59:59.000Z

437

News in ITL - Computer Security  

Science Conference Proceedings (OSTI)

... Cybersecurity Center Seeks Comments on Energy Industry Security ... Commerce Department Proposes New Policy Framework to Strengthen ...

2010-10-22T23:59:59.000Z

438

CMS System Security Plan Procedure  

Science Conference Proceedings (OSTI)

... TASK 5: SYSTEM DECOMMISSION. ... BPSSM Business Partners Systems Security Manual. ... of Information Technology, Policy, Procedures, & Audits. ...

2009-06-30T23:59:59.000Z

439

Publicly Submitted White Papers - Security  

Science Conference Proceedings (OSTI)

... Security Threats, Exploits, Vulnerabilites, Incidents, and Responses; ... CAHV); Critical Incident Response and Disaster Recovery Assistance; ...

2011-08-02T23:59:59.000Z

440

Towards web security using PLASMA  

Science Conference Proceedings (OSTI)

The World Wide Web is one of the most significant multi-media applications ever developed-and therefore securing the web is one of the most pressing problems. There exist a number of approaches for securing the World Wide Web which, however, usually ... Keywords: high level security, multimedia, secure communications platform, world wide web

Annette Krannig

1998-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Secure Windows Dr. Bernd Borchert  

E-Print Network (OSTI)

Secure Windows Dr. Bernd Borchert WSI für Informatik Univ. Tübingen #12;Problem: Trojans Server Windows" Server (encoding) Internet #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows" #12;Server (encoding) Internet Solution: ,,Secure Windows

Borchert, Bernd

442

Security-oriented program transformations  

Science Conference Proceedings (OSTI)

Security experts generally believe that, "security cannot be added on, it must be designed from the beginning" [1]. This is because the typical way of improving system security by patches is ad hoc and has not produced good results. My work shows that ... Keywords: program transformation, security

Munawar Hafiz; Ralph E. Johnson

2009-04-01T23:59:59.000Z

443

Lemnos Interoperable Security Program  

Science Conference Proceedings (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

444

TR-IIS-05-012 An Application-layer Security  

E-Print Network (OSTI)

TR-IIS-05-012 An Application-layer Security Control for Real-time Video Streaming Chia-Hui Wang of Information Science, Academia Sinica, Taiwan in 2004. #12;An Application-layer Security Control for Real preserve privacy and commercial values. Thus, it's very important to secure real-time video streaming

Chen, Sheng-Wei

445

Principal Associate Director - Global Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Principal Associate Director - Global Security Principal Associate Director - Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with special focus on developing and applying the scientific and engineering capabilities to address complex national and global security threats. Contact Operator Los Alamos National Laboratory (505 667-5061 Wallace's expertise is forensic seismology, a highly specialized discipline focusing on detection and quantification of nuclear tests. Terry C. Wallace, Jr. Principal Associate Director for Global Security Terry C. Wallace, Jr., Principal Associate Director for Global Security As Principal Associate Director for Global Security, Wallace leads Laboratory programs with a focus on applying scientific and engineering capabilities

446

National Security | ornl.gov  

NLE Websites -- All DOE Office Websites (Extended Search)

Program Areas Program Areas Initiatives Facilities Events and Conferences Supporting Organizations A scientific approach to global security Initiatives | Programs Home | Science & Discovery | National Security National Security | National Security SHARE ORNL plays an important role in national and global security by virtue of its expertise in advanced materials, nuclear science, supercomputing and other scientific specialties. Discovery and innovation in these areas are essential for protecting US citizens and advancing national and global security priorities. ORNL supports these missions by using its signature strengths to meet complex national security challenges in a number of areas. Nuclear Nonproliferation - The laboratory's expertise and experience covers the spectrum of nuclear nonproliferation work, from basic R&D to

447

Framework for SCADA Security Policy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Framework for SCADA Security Policy Framework for SCADA Security Policy Dominique Kilman Jason Stamp dkilman@sandia.gov jestamp@sandia.gov Sandia National Laboratories Albuquerque, NM 87185-0785 Abstract - Modern automation systems used in infrastruc- ture (including Supervisory Control and Data Acquisition, or SCADA) have myriad security vulnerabilities. Many of these relate directly to inadequate security administration, which precludes truly effective and sustainable security. Adequate security management mandates a clear administrative struc- ture and enforcement hierarchy. The security policy is the root document, with sections covering purpose, scope, posi- tions, responsibilities, references, revision history, enforce- ment, and exceptions for various subjects relevant for system

448

User-Centered Security Engineering  

E-Print Network (OSTI)

Current approaches to security engineering mainly focus on attacker models, secure mechanisms, and code testing to ensure a high level security standard. However, these approaches do not sufficiently emphasize the usability of the system and the risk arises that the implemented mechanisms create overheads for users or require unworkable user behaviour. In addition, end users will not use security products they cannot understand or which are difficult to apply. Therefore, we propose the new concept of integrated user-centered security engineering to bridge the gap between security and usability. This method has been pursued for the development and implementation of the security tool "Identity Manager".

Daniela Gerd tom Markotten

2002-01-01T23:59:59.000Z

449

Nevada National Security Site - Reports  

NLE Websites -- All DOE Office Websites (Extended Search)

Reports Reports Nevada National Security Site Review Reports 2013 Independent Oversight Targeted Review of the Safety Significant Blast Door and Special Door Interlock Systems and Review of Federal Assurance Capability at the Nevada National Security Site, December 2013 Review of the Nevada National Security Site Criticality Safety Program Corrective Action Plan Closure, May 2013 Review Reports 2012 Review of the Nevada National Security Site Implementation Verification Review Processes, March 2012 Activity Reports 2012 Nevada National Security Site Operational Awareness Visit, December 2012 Operational Awareness Oversight of the Nevada National Security Site, August 2012 Review Reports 2011 Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems

450

Security Technology Demonstration and Validation Sustainability Plan  

SciTech Connect

This report describes the process of creating continuity and sustainability for demonstration and validation (DEMVAL) assets at the National Security Technology Incubator (NSTI). The DEMVAL asset program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The mission of the NSTI program is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. Part of this support is envisioned to be research and development of companies technology initiatives, at the same time providing robust test and evaluation of actual development activities. This program assists companies in developing technologies under the NSTI program through demonstration and validation of technologies applicable to national security created by incubators and other sources. The NSPP also will support the creation of an integrated demonstration and validation environment. Development of the commercial potential for national security technologies is a significant NSTI focus. As part of the process of commercialization, a comprehensive DEMVAL program has been recognized as an essential part of the overall incubator mission. A number of resources have been integrated into the NSTI program to support such a DEMVAL program.

None

2008-08-31T23:59:59.000Z

451

Transmission Line Security Monitor: Final Report  

SciTech Connect

The Electric Power Transmission Line Security Monitor System Operational Test is a project funded by the Technical Support Working Group (TSWG). TSWG operates under the Combating Terrorism Technical Support Office that functions under the Department of Defense. The Transmission Line Security Monitor System is based on technology developed by Idaho National Laboratory. The technology provides a means for real-time monitoring of physical threats and/or damage to electrical transmission line towers and conductors as well as providing operational parameters to transmission line operators to optimize transmission line operation. The end use is for monitoring long stretches of transmission lines that deliver electrical power from remote generating stations to cities and industry. These transmission lines are generally located in remote transmission line corridors where security infrastructure may not exist. Security and operational sensors in the sensor platform on the conductors take power from the transmission line and relay security and operational information to operations personnel hundreds of miles away without relying on existing infrastructure. Initiated on May 25, 2007, this project resulted in pre-production units tested in realistic operational environments during 2010. A technology licensee, Lindsey Manufacturing of Azusa California, is assisting in design, testing, and ultimately production. The platform was originally designed for a security monitoring mission, but it has been enhanced to include important operational features desired by electrical utilities.

John Svoboda

2011-04-01T23:59:59.000Z

452

Public key infrastructure for DOE security research  

SciTech Connect

This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

Aiken, R.; Foster, I.; Johnston, W.E. [and others

1997-06-01T23:59:59.000Z

453

Argonne Team Challenges Physical Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Engineering & Systems Analysis Engineering & Systems Analysis Success Stories For further information, contact Roger Johnston, rogerj@anl.gov "Real security is thinking like the bad guys," maintains Roger Johnston, head of Argonne's VAT. Argonne Team Challenges Physical Security Physical security-the art of protecting tangible assets-is the counterpart to cyber security. Physical security can take the form of locks, tamper-indicating seals, guards who stand watch

454

Sacramento Area Voltage Support Draft Environmental Impact Statement  

Science Conference Proceedings (OSTI)

The Western Area Power Administration's Central Valley Project transmission system forms an integral part of the interconnected Sacramento area transmission grid. Western is contractually responsible to oversee that the system is operated in accordance with strict reliability standards. Growth in the greater Sacramento, California area and power imported from generation outside the region, have increased the demand on the interconnected electric transmission system, leading to transmission system overloads and reducing the reliability and security of the area power system. Western has prepared this Sacramento Area Voltage Support (SVS) Draft Environmental Impact Statement (EIS) in compliance with Federal laws, regulations and guidelines, principally the ''National Environmental Policy Act'' (NEPA). This Draft EIS evaluates the potential environmental effects of physical improvements to the area's power system. Enhancements are needed to improve system reliability and provide voltage support for the Sacramento area. The results of public scoping meetings, workshops, meetings with agencies, and earlier studies by Western and area utilities helped to develop a range of alternatives for analysis. The Proposed Action involves: Constructing a new double-circuit, 230-kV transmission line paralleling the existing double-circuit, 230-kV line from the O'Banion Substation to the Elverta Substation; Realigning a portion of the existing Cottonwood-Roseville single-circuit, 230-kV transmission line north of Elverta Substation; and Reconductoring the existing double-circuit, 230-kV transmission line from the Elverta Substation to the Tracy Substation. Public Hearings on the Draft EIS will be held between December 9-12, 2002. Comments on this Draft EIS are encouraged and should be sent to Ms. Loreen McMahon (above). Comments must be received by December 30, 2002.

N /A

2002-11-15T23:59:59.000Z

455

Sacramento Area Voltage Support Final Environmental Impact Statement  

Science Conference Proceedings (OSTI)

The Western Area Power Administration's Central Valley Project transmission system forms an integral part of the interconnected Sacramento area transmission grid. Western is contractually responsible to oversee that the system is operated in accordance with strict reliability standards. Growth in the greater Sacramento, California area and power imported from generation outside the region, have increased the demand on the interconnected electric transmission system, leading to transmission system overloads and reducing the reliability and security of the area power system. Western has prepared this Sacramento Area Voltage Support (SVS) Draft Environmental Impact Statement (EIS) in compliance with Federal laws, regulations and guidelines, principally the National Environmental Policy Act (NEPA). This Draft EIS evaluates the potential environmental effects of physical improvements to the area's power system. Enhancements are needed to improve system reliability and provide voltage support for the Sacramento area. The results of public scoping meetings, workshops, meetings with agencies, and earlier studies by Western and area utilities helped to develop a range of alternatives for analysis. The Proposed Action involves: (1) Constructing a new double-circuit, 230-kV transmission line paralleling the existing double-circuit, 230-kV line from the O'Banion Substation to the Elverta Substation; (2) Realigning a portion of the existing Cottonwood-Roseville single-circuit, 230-kV transmission line north of Elverta Substation; and (3) Reconductoring the existing double-circuit, 230-kV transmission line from the Elverta Substation to the Tracy Substation. Public Hearings on the Draft EIS will be held between December 9-12, 2002. Comments on this Draft EIS are encouraged and should be sent to Ms. Loreen McMahon (above). Comments must be received by December 30, 2002.

N /A

2003-09-19T23:59:59.000Z

456

Environment/Health/Safety/Security (EHSS): Security and Emergency Services  

NLE Websites -- All DOE Office Websites (Extended Search)

Security and Emergency Services Security and Emergency Services SEO Home page collage Documents Organization Chart Related Sites Fire Department Security Services EMERGENCY SERVICES The purpose of Berkeley Lab's Emergency Services is to ensure emergency resources are in maximum readiness, before, during, and after any emergency. ISSM: Integrated Safeguards and Security Management Security Updates MISSION STATEMENT: Provide integrated and efficient life safety, emergency and security services to all employees, guests, and users at the main Berkeley site and off-site facilities. Also, promote continuous improvement of the Lab's scientific and supportive activities. The core competencies of the group are: Emergency response to include fire suppression, emergency medical and hazmat response services

457

U-078: Microsoft Security Bulletin Advance Notification for January 2012 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

78: Microsoft Security Bulletin Advance Notification for January 78: Microsoft Security Bulletin Advance Notification for January 2012 U-078: Microsoft Security Bulletin Advance Notification for January 2012 January 10, 2012 - 8:15am Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for January 2012. PLATFORM: Windows Server 2008 R2, Windows 7, Windows Server 2008, Windows Vista, Windows Server 2003, Windows XP ABSTRACT: Microsoft Security Bulletin Advance Notification for January 2012. Microsoft has posted 1 Critical Bulletins and 6 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow propagation of Internet worm without user action. Microsoft will host a webcast to address customer questions on the security bulletins on January 11, 2012, at 11:00 AM Pacific Time (US & Canada).

458

National Strategy to Secure Cyberspace (February 2003) | Department of  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strategy to Secure Cyberspace (February 2003) Strategy to Secure Cyberspace (February 2003) National Strategy to Secure Cyberspace (February 2003) The National Strategy to Secure Cyberspace outlines an initial framework for both organizing and prioritizing efforts. It provides direction to the federal government departments and agencies that have roles in cyberspace security. It also identifies steps that state and local governments, private companies and organizations, and individual Americans can take to improve our collective cybersecurity. The Strategy highlights the role of public-private engagement. The document provides a framework for the contributions that we all can make to secure our parts of cyberspace. The dynamics of cyberspace will require adjustments and amendments to the Strategy over time.

459

U-057: Microsoft Security Bulletin Advance Notification for December 2011 |  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

57: Microsoft Security Bulletin Advance Notification for 57: Microsoft Security Bulletin Advance Notification for December 2011 U-057: Microsoft Security Bulletin Advance Notification for December 2011 December 9, 2011 - 12:00pm Addthis PROBLEM: Microsoft Security Bulletin Advance Notification for December 2011. PLATFORM: Windows Server 2008 R2, Windows 7, Windows Server 2008, Windows Vista, Windows Server 2003, Windows XP ABSTRACT: Microsoft Security Bulletin Advance Notification for December 2011. Microsoft has posted 3 Critical Bulletins and 11 Important bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow propagation of Internet worm without user action. Microsoft will host a webcast to address customer questions on the security bulletins on December 14, 2011, at 11:00 AM Pacific Time (US & Canada).

460

Human Errors in Information Security  

E-Print Network (OSTI)

The purpose of the paper is to target audience and stakeholder individuals whom are in charge of securing the assets of their organisations and institutions. This paper starts by providing a brief overview of information security, outlining the main goals and techniques of the discipline. The paper also discusses the role of human factors and how the information security research community has recognised the increasingly crucial role of human behaviour in many security failures. This is followed by a literature review of human errors in information security. Finally, this paper discusses Reason's Generic Error Modelling System (GEMS) as a potential model for explaining human errors in information security [18]. The terms computer security, network security and information security are used interchangeably in this paper.

Munir Ahmed; Lukman Sharif; Muhammad Kabir; Maha Al-maimani

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

An Electronic Voltage Transformer Based on WLAN Technology  

Science Conference Proceedings (OSTI)

An electronic voltage transformer based on WLAN technology is developed for adapting to the development trends of substations synthesis automation. The transformer is composed of voltage-to-current conversion unit, signal processing unit and data ... Keywords: electronic voltage transformer, voltage-to-current conversion, WLAN technology, digital interface, wireless communication

Jianqin Feng; Qingming Wang; Fen Niu; Guangzhao Cui; Anping Zheng

2010-03-01T23:59:59.000Z

462

Motor voltage high harmonics influence to efficient energy usage  

Science Conference Proceedings (OSTI)

Analysis of the effect of non-sinusoidal voltages on the three-phase induction motor is presented in the paper. When the induction motors are supplied by a rectangular shape of the voltage inverter with high levels of harmonic voltage (Uh,i ... Keywords: energy efficiency, harmonics, induction motor, non-sinusoidal voltage, power losses

Miloje M. Kostic; Branka B. Kostic

2011-07-01T23:59:59.000Z

463

Analysis of Voltage Rise Effect on Distribution Network with Distributed  

E-Print Network (OSTI)

appearance of hidden loads and affect the voltage profile of low voltage distribution network. To overcomeAnalysis of Voltage Rise Effect on Distribution Network with Distributed Generation M. A. Mahmud. This paper presents a detail analysis of how does voltage rise on distribution network due to the penetration

Pota, Himanshu Roy

464

Distribution System Voltage Performance Analysis for High-Penetration Photovoltaics  

DOE Green Energy (OSTI)

This report examines the performance of commonly used distribution voltage regulation methods under reverse power flow.

Liu, E.; Bebic, J.

2008-02-01T23:59:59.000Z

465

Optimal Compensation Algorithms for a Dynamic Voltage Restorer  

Science Conference Proceedings (OSTI)

The Dynamic Voltage Restorer (DVR) as an electronics based custom device, is used to protect sensitive loads from the voltage sags in the power distribution system. With the rapid technology advancement in industrial control processes, it is experiencing ... Keywords: Dynamic Voltage Restorer (DVR), power quality, voltage sag, Zero Active Power Compensation (ZAPC), Minimal Active Power Compensation (MAPC)

Deng Pan; Chen Zhongming; Jiang Peng; Abdelkrim Benchaib; Guillaume De Preville

2010-06-01T23:59:59.000Z

466

Developments in line-voltage thermostats  

Science Conference Proceedings (OSTI)

A thermostat that provides reliable, accurate temperature control is the key to a comfortable, efficient space-heating system. The lack of a commercially available line-voltage thermostat that is affordable and performs well has been a significant factor in limiting the comfort and popularity of zoned residential electric heating systems. With EPRI support, two manufacturers have developed innovative, electronics-based line-voltage thermostats that offer a cost-effective control option for creating a comfortable environment with zoned electric heat. These thermostats also may help reduce energy consumption.

Kesselring, J.

1992-09-01T23:59:59.000Z

467

National Nuclear Security Administration  

NLE Websites -- All DOE Office Websites

National Nuclear Security Administration National Nuclear Security Administration Our Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy Emergency Response Recapitalizing Our Infrastructure Continuing Management Reform Countering Nuclear Terrorism About Us Our Programs Our History Who We Are Our Leadership Our Locations Budget Our Operations Media Room Congressional Testimony Fact Sheets Newsletters Press Releases Speeches Events Social Media Video Gallery Photo Gallery NNSA Archive Federal Employment Apply for Our Jobs Our Jobs Working at NNSA Blog US, UK, France Discuss Stockpile Stewardship, Arms Control and Nonproliferation and Visit the Nevada National Security Site Learn More NNSA DOE removes all remaining HEU from Hungary Learn More DOE removes all remaining HEU from Hungary Tiffany A. Blanchard-Case receives 2013 Linton Brooks Medal

468

Energy Security Initiatives Update  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Make Energy A Consideration in All We DoTM Make Energy A Consideration in All We DoTM ENERGY SECURITY INITIATIVES UPDATE Ms Karen White AFFEC On behalf of Mr Mike Aimone 1 Make Energy A Consideration in All We DoTM 2 Energy Security Initiatives AFCESA ETL 09-10 -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft Bliss, TX) National Renewable Energy Lab (NREL) Net Zero Pilot at Marine Corps Air Station Miramar and Naval Base Ventura County (San Nicolas Island) Smart Grid Initiatives: Maxwell AFB AL, Army BAAs (3 each); Naval Base Ventura County (San Nicholas Island) National Defense University sponsored Electric Grid War Game (Jul) Task Force on Grid Vulnerability (Gaps/Seams in S&T ) initiative (Joint

469

Security Clearances; Limitations  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. SEC. 1072. SECURITY CLEARANCES; LIMITATIONS. (a) In General.-Title III of the Intelligence Reform and Terrorism Prevention Act of 2004 (50 U.S.C. 435b) is amended by adding at the end the following new section: "SEC. 3002. SECURITY CLEARANCES; LIMITATIONS. "(a) Definitions.-In this section: "(1) Controlled substance.-The term `controlled substance' has the meaning given that term in section 102 of the Controlled Substances Act (21 U.S.C. 802). "(2) Covered person.-The term `covered person' means- "(A) an officer or employee of a Federal agency; "(B) a member of the Army, Navy, Air Force, or Marine Corps who is on active duty or is in an active status; and "(C) an officer or employee of a contractor of a Federal agency.

470

A systematic review of security requirements engineering  

Science Conference Proceedings (OSTI)

One of the most important aspects in the achievement of secure software systems in the software development process is what is known as Security Requirements Engineering. However, very few reviews focus on this theme in a systematic, thorough and unbiased ... Keywords: Requirements engineering, Secure development, Security, Security engineering, Security requirements, Security requirements engineering, Systematic review

Daniel Mellado; Carlos Blanco; Luis E. Snchez; Eduardo Fernndez-Medina

2010-06-01T23:59:59.000Z

471

Electronic circuit for measuring series connected electrochemical cell voltages  

DOE Patents (OSTI)

An electronic circuit for measuring voltage signals in an energy storage device is disclosed. The electronic circuit includes a plurality of energy storage cells forming the energy storage device. A voltage divider circuit is connected to at least one of the energy storage cells. A current regulating circuit is provided for regulating the current through the voltage divider circuit. A voltage measurement node is associated with the voltage divider circuit for producing a voltage signal which is proportional to the voltage across the energy storage cell.

Ashtiani, Cyrus N. (West Bloomfield, MI); Stuart, Thomas A. (Toledo, OH)

2000-01-01T23:59:59.000Z

472

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2011 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2011 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

473

National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

U.S. Department of Energy National Nuclear Security Administration Federal Equal Opportunity Recruitment Program Plan Certification - Fiscal Year 2009 Please type or print clearly and return this sheet with original signature to: Ms. Carmen Andujar, Manager Recruiting, Examining and Assessment Group Center for Talent and Capacity Policy Strategic Human Resources Policy Attn: FY 2009 FEORP Report U.S. Office of Personnel Management 1900 E Street, NW, Room 6547 Washington, D.C. 20415-9800 A. Name and Address of Agency National Nuclear Security Administration Office of Diversity and Outreach 1000 Independence Avenue, SW Washington, DC 20585 B. Name and Title of Designated FEORP Official (include address, if different from above,

474

IMPACTS OF BIOFUEL PRODUCTION ON FOOD SECURITY  

E-Print Network (OSTI)

Food security exists when all people, at all times, have physical and economic access to sufficient safe and nutritious food to meet their dietary needs and food preferences for a healthy and active life. This definition was adopted at the World Food Summit in 1996 (FAO, 1996) when references to food safety,

unknown authors

2010-01-01T23:59:59.000Z

475

IBM Internet Security Systems Threat Insight Monthly  

E-Print Network (OSTI)

. http://docs.info.apple.com/article.html?artnum=303411 BEA Systems - 2007 Daylight Savings Time ChangesIBM Internet Security Systems X-Force ® Threat Insight Monthly www.iss.netwww.iss.net February 2007 Shellcode Heuristics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 The 2007 Daylight

476

Nuclear Safeguards and Security Challenge:  

National Nuclear Security Administration (NNSA)

Nuclear Safeguards and Security Nuclear Safeguards and Security Challenge: The international safeguards and security system is being challenged by evolving proliferation and terrorism threats, expanding International Atomic Energy Agency (IAEA) responsibilities, a retiring safeguards workforce, and the need for better technologies to detect and deter proliferation, theft, and sabotage. Response: Revitalize, strengthen, and sustain U.S. and international safeguards and security capabilities through the Next Generation Safeguards Initiative (NGSI) and International Nuclear Security programs that: * Support the development of safeguards and security policies, concepts and approaches * Develop human capital through training and education * Develop and implement new safeguards systems,

477

Cyber Security Issues and Requirements  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Program Program (SGIG) Cyber Security Issues and Requirements Jeff Dagle November 19, 2009 Communication and Information Technology will be Central to Smart Grid Deployment Final Interim Smart Grid Roadmap, prepared by the Electric Power Research Institute (EPRI) for the National Institute of Standards and Technology (NIST) Cyber Security Requirements Associated with ARRA Projects Proposals were required to include:  Discussion of how cyber security risks will be mitigated  What criteria will be used for vendor and technology selection  Relevant cyber security standards that will be followed (or industry best practices)  How emerging smart grid cyber security standards that are currently being developed will be adopted Cyber Security Objectives for Smart

478

New Security Challenges in the Global Era: Environmental Security  

NLE Websites -- All DOE Office Websites (Extended Search)

New Security Challenges in the Global Era: Environmental Security New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar Host/Point of Contact: Mithra Moezzi The environment is the planetary support system on which all other human enterprises depend. If political, social, cultural, religious, and most importantly economic systems are to remain secure and viable, the environment must also remain secure and viable. This makes global environmental conditions a legitimate U.S. national security concern. The security of individuals, communities, nations, and the entire global community is increasingly jeopardized by unpremeditated, non-military environmental threats. These threats are self-generated: we perpetrate them on ourselves, by fouling our air and water, and over-harvesting our land.

479

Environment/Health/Safety/Security (EHSS): Security & Emergency Services:  

NLE Websites -- All DOE Office Websites (Extended Search)

Security & Emergency Services Security & Emergency Services Security Update ID Cards Gate Procedures Visitor/Guest Access Bus/Shuttle Reporting Foreign Contacts Mail Handling Contacts Cyber Protection Website ISSM Website ISSM: Counterintelligence and Counterterrorism Emergency Services Website Security and Emergency Operations Website Security Update THREAT ASSESSMENT: January 9, 2004-- The Department of Energy has directed all DOE sites to lower their security status to Secon Level 3, to coincide with the Department of Homeland Security advisory system. Security measures as listed below are in place. If you have any questions, call Dan Lunsford at x6016. ID Cards: Every employee must have a valid LBNL proximity badge and either wear it or produce it upon request. Badges and clips are available in the Site Access

480

New Security Challenges in the Global Era: Environmental Security  

NLE Websites -- All DOE Office Websites (Extended Search)

New Security Challenges in the Global Era: Environmental Security Speaker(s): Beth Chalecki Date: October 4, 2001 - 12:00pm Location: Bldg. 90 Seminar HostPoint of Contact: Mithra...

Note: This page contains sample records for the topic "time voltage security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

The security fallacy: Seven myths about physical security | Argonne  

NLE Websites -- All DOE Office Websites (Extended Search)

Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Watch Roger Johnston speak on voting machine security in the Illinois area. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Because orbiting satellites send GPS signals from space, they are faint and easily overriden by stronger signals. Image credit: NASA. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. Security cameras aren't all they're cracked up to be. Image credit: Jaymis Loveday. The security fallacy: Seven myths about physical security By Louise Lerner * October 26, 2010 Tweet EmailPrint The high-tech access control device was secure, sophisticated, and complex;

482

The Office of Health, Safety and Security  

NLE Websites -- All DOE Office Websites (Extended Search)

Summary Report - Independent Oversight Inspection of Safeguards and Security and Cyber Security at the Y-12 Site Office and the Y-12 National Security Complex (U), January...

483

Strengthening Cyber Security | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Strengthening Cyber Security Strengthening Cyber Security Describes the goals and activities of the National SCADA Test Bed program to secure control systems in the energy sector...

484

National Security & Safety Reports | Department of Energy  

NLE Websites -- All DOE Office Websites (Extended Search)

National Security & Safety Reports National Security & Safety Reports October 29, 2013 Evaluation Report: IG-0897 The Department of Energy's Unclassified Cyber Security Program -...

485

Security and Performance Considerations in Wireless Networks  

E-Print Network (OSTI)

ACM Workshop on Wireless Security, 2004. [3] ISM Wide-bandTraffic Flows. In Network Security Lab (NSL) Technicalthe Challenges of Security in a Mobile Environment. In

Pelechrinis, Konstantinos

2010-01-01T23:59:59.000Z

486

Cyber Security Reports | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Cyber Security Reports Cyber Security Reports 2012 Review of the Classified Cyber Security Programs at the Lawrence Livermore National Laboratory, January 2012, (OUO)...

487

Security and United States Immigration Policy  

E-Print Network (OSTI)

Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

Totten, Robbie James

2012-01-01T23:59:59.000Z

488

Visitor_Security_and_Safety_Information  

NLE Websites -- All DOE Office Websites (Extended Search)

in a designated lot near the main lobby and auditorium. Office of Health, Safety and Security Office of Security Operations Office of Headquarters Security Operations United...

489

Network Security Automation Standards: TNC and SCAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 6. ...

2012-10-26T23:59:59.000Z

490

Lemnos Interoperable Security Program | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Program More Documents & Publications SECURITY CORE FUNCTION AND DEFINITION REPORT Lemnos Interoperable Security DOE National SCADA Test Bed Program Multi-Year Plan...

491

Security Orchestration with IF-MAP  

Science Conference Proceedings (OSTI)

... IPAM SIM / SEM Asset Management System AAA ICS/SCADA Security Physical Security Endpoint Security (via NAC) IF-MAP Protocol MAP Page 7. ...

2012-10-26T23:59:59.000Z

492

Office of Headquarters Security Operations - Headquarters Facilities...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations HomeIntroduction Physical Security Limited Areas and Vault-Type Rooms Personnel Security Foreign Ownership, Control or Influence; Facility...

493

DOE Headquarters Security Quick Reference Book | Navigation  

NLE Websites -- All DOE Office Websites (Extended Search)

TECH. & INFO. SECURITY TEAM HOME COVER | INTRODUCTION SECURITY ACRONYMS TABLE OF CONTENTS HEADQUARTERS SECURITY OFFICER PROTECTIVE FORCE UNCLASSIFIED FOREIGN VISITS & ASSIGNMENTS...

494

Office of Headquarters Security Operations: Headquarters Access...  

NLE Websites -- All DOE Office Websites (Extended Search)

Headquarters Security Operations Home Sub Offices HQ Security Officers (HSO) Program Office of Information Security Office of Headquarters Personnel Office of...

495

Office of Security Operations: Director's Message  

NLE Websites -- All DOE Office Websites (Extended Search)

Office of Executive Protection Home Sub Offices HQ Security Officers (HSO) Program Office of Security Operations Office of Information Security Office of...

496

Oak Ridge National Laboratory - Global Security Directorate  

NLE Websites -- All DOE Office Websites (Extended Search)

External Links Department of Homeland Security DHS Centers of Excellence Home Centers & Programs Department of Homeland Security Programs The Homeland Security Programs Office...

497

Enforcement Regulations and Directives - Security | Department...  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Security Enforcement Regulations and Directives - Security Classified Information Security 10 C.F.R Part 824 - Procedural Rules for the Assessment of Civil Penalties for Classified...

498

Security and Cyber Guidance | Department of Energy  

Energy.gov (U.S. Department of Energy (DOE)) Indexed Site

Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal Process Guide - April...

499

On Cyber Security for Networked Control Systems  

E-Print Network (OSTI)

9.2.2 Security Interdependence . . . . . . Bounded Control7 Security Constrained Networked Control 7.1Inputs 9 Security Interdependencies for Networked 9.1

Amin, Saurabh

2011-01-01T23:59:59.000Z

500

Global Environmental Change and Human Security  

E-Print Network (OSTI)

with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

Kunnas, Jan

2011-01-01T23:59:59.000Z