National Library of Energy BETA

Sample records for time voltage security

  1. PMU-Aided Voltage Security Assessment for a Wind Power Plant: Preprint

    SciTech Connect (OSTI)

    Jiang, H.; Zhang, Y. C.; Zhang, J. J.; Muljadi, E.

    2015-04-08

    Because wind power penetration levels in electric power systems are continuously increasing, voltage stability is a critical issue for maintaining power system security and operation. The traditional methods to analyze voltage stability can be classified into two categories: dynamic and steady-state. Dynamic analysis relies on time-domain simulations of faults at different locations; however, this method needs to exhaust faults at all locations to find the security region for voltage at a single bus. With the widely located phasor measurement units (PMUs), the Thevenin equivalent matrix can be calculated by the voltage and current information collected by the PMUs. This paper proposes a method based on a Thevenin equivalent matrix to identify system locations that will have the greatest impact on the voltage at the wind power plant’s point of interconnection. The number of dynamic voltage stability analysis runs is greatly reduced by using the proposed method. The numerical results demonstrate the feasibility, effectiveness, and robustness of the proposed approach for voltage security assessment for a wind power plant.

  2. PMU-Aided Voltage Security Assessment for a Wind Power Plant...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PMU-Aided Voltage Security Assessment for a Wind Power Plant Preprint H. Jiang, 1 Y.C. Zhang, 2 J.J. Zhang, 1 and E. Muljadi 2 1 University of Denver 2 National Renewable Energy ...

  3. Time varying voltage combustion control and diagnostics sensor

    DOE Patents [OSTI]

    Chorpening, Benjamin T.; Thornton, Jimmy D.; Huckaby, E. David; Fincham, William

    2011-04-19

    A time-varying voltage is applied to an electrode, or a pair of electrodes, of a sensor installed in a fuel nozzle disposed adjacent the combustion zone of a continuous combustion system, such as of the gas turbine engine type. The time-varying voltage induces a time-varying current in the flame which is measured and used to determine flame capacitance using AC electrical circuit analysis. Flame capacitance is used to accurately determine the position of the flame from the sensor and the fuel/air ratio. The fuel and/or air flow rate (s) is/are then adjusted to provide reduced flame instability problems such as flashback, combustion dynamics and lean blowout, as well as reduced emissions. The time-varying voltage may be an alternating voltage and the time-varying current may be an alternating current.

  4. High voltage electrical amplifier having a short rise time

    DOE Patents [OSTI]

    Christie, David J.; Dallum, Gregory E.

    1991-01-01

    A circuit, comprising an amplifier and a transformer is disclosed that produces a high power pulse having a fast response time, and that responds to a digital control signal applied through a digital-to-analog converter. The present invention is suitable for driving a component such as an electro-optic modulator with a voltage in the kilovolt range. The circuit is stable at high frequencies and during pulse transients, and its impedance matching circuit matches the load impedance with the output impedance. The preferred embodiment comprises an input stage compatible with high-speed semiconductor components for amplifying the voltage of the input control signal, a buffer for isolating the input stage from the output stage; and a plurality of current amplifiers connected to the buffer. Each current amplifier is connected to a field effect transistor (FET), which switches a high voltage power supply to a transformer which then provides an output terminal for driving a load. The transformer comprises a plurality of transmission lines connected to the FETs and the load. The transformer changes the impedance and voltage of the output. The preferred embodiment also comprises a low voltage power supply for biasing the FETs at or near an operational voltage.

  5. System-area operating margin assessment and security enhancement against voltage collapse

    SciTech Connect (OSTI)

    Berizzi, A.; Bresesti, P.; Marannino, P.; Granelli, G.P.; Montagna, M.

    1996-08-01

    The (very) short term reactive power scheduling function, to be adopted by ENEL Spa, takes into account the voltage stability requirements in a preventive application of the security function. In this environment the procedure determines the voltage collapse distance of the global system and of the areas controlled by the Secondary Voltage Regulation (SVR) both in short (24 hours ahead) and in a very short term (few hours or fractions of hour ahead). The procedure also schedules the control actions to be taken in emergency states in a preventive way. Area or system-wise indicators, based on nodal sensitivities and/or eigen (singular) value analysis, provide effective measures of the margins of the system with respect to the risk of voltage collapse and the related corrective actions. Applications of the procedure to the EHV network and to a subtransmission area of the ENEL system are presented in the paper.

  6. Influence of voltage rise time on microwave generation in relativistic backward wave oscillator

    SciTech Connect (OSTI)

    Wu, Ping; Deng, Yuqun; Sun, Jun; Teng, Yan; Shi, Yanchao; Chen, Changhua

    2015-10-15

    In relativistic backward wave oscillators (RBWOs), although the slow wave structure (SWS) and electron beam determine the main characteristics of beam-wave interaction, many other factors can also significantly affect the microwave generation process. This paper investigates the influence of voltage rise time on beam-wave interaction in RBWOs. Preliminary analysis and PIC simulations demonstrate if the voltage rise time is moderately long, the microwave frequency will gradually increase during the startup process until the voltage reaches its amplitude, which can be explained by the dispersion relation. However, if the voltage rise time is long enough, the longitudinal resonance of the finitely-long SWS will force the RBWO to work with unwanted longitudinal modes for a while and then gradually hop to the wanted longitudinal mode, and this will lead to an impure microwave frequency spectrum. Besides, a longer voltage rise time will delay the startup process and thus lead to a longer microwave saturation time. And if unwanted longitudinal modes are excited due to long voltage rise time, the microwave saturation time will be further lengthened. Therefore, the voltage rise time of accelerators adopted in high power microwave technology should not be too long in case unwanted longitudinal modes are excited.

  7. Extremum seeking-based optimization of high voltage converter modulator rise-time

    SciTech Connect (OSTI)

    Scheinker, Alexander; Bland, Michael; Krstic, Miroslav; Audia, Jeff

    2013-02-01

    We digitally implement an extremum seeking (ES) algorithm, which optimizes the rise time of the output voltage of a high voltage converter modulator (HVCM) at the Los Alamos Neutron Science Center (LANSCE) HVCM test stand by iteratively, simultaneously tuning the first 8 switching edges of each of the three phase drive waveforms (24 variables total). We achieve a 50 ?s rise time, which is reduction in half compared to the 100 ?s achieved at the Spallation Neutron Source (SNS) at Oak Ridge National Laboratory. Considering that HVCMs typically operate with an output voltage of 100 kV, with a 60Hz repetition rate, the 50 ?s rise time reduction will result in very significant energy savings. The ES algorithm will prove successful, despite the noisy measurements and cost calculations, confirming the theoretical results that the algorithm is not affected by noise whose frequency components are independent of the perturbing frequencies.

  8. Y-12 Times archive | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Employees & Retirees / Y-12 Times archive Y-12 Times archive Posted: July 19, 2012 - 12:12pm The Y-12 Times was a newsletter for employees and friends of the Y-12 National Security Complex. Past issues are available as PDF files. The newsletter primarily served Y-12 employees and their families, but was also mailed to other U.S. Department of Energy sites around the world. Federal and state congressional delegates from Tennessee also received the newsletter, as well as local news media. 2014

  9. Nuclear security: DOE's reinvestigation of employees has not been timely

    SciTech Connect (OSTI)

    Not Available

    1987-03-10

    We found that DOE headquarters and some field offices have been unable to meet DOE goals to reinvestigate security clearances. Clearance reinvestigation are an important element of DOE's security program because they are aimed at identifying employees whose lifestyles raise questions about their eligibility for a clearance. DOE's failure to perform timely reinvestigation has contributed to having cleared employees in its work force who may not be suitable for a clearance because they have serious drug, alcohol, or other problems. DOE needs to develop a plan to ensure that all required reinvestigations are performed on time. Planning should start with a review of the appropriateness of the number and level of active clearances, since these factors largely determine the reinvestigation workload. The plan should then provide for the resources necessary to meet requirements.

  10. Extremum seeking-based optimization of high voltage converter modulator rise-time

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Scheinker, Alexander; Bland, Michael; Krstic, Miroslav; Audia, Jeff

    2013-02-01

    We digitally implement an extremum seeking (ES) algorithm, which optimizes the rise time of the output voltage of a high voltage converter modulator (HVCM) at the Los Alamos Neutron Science Center (LANSCE) HVCM test stand by iteratively, simultaneously tuning the first 8 switching edges of each of the three phase drive waveforms (24 variables total). We achieve a 50 μs rise time, which is reduction in half compared to the 100 μs achieved at the Spallation Neutron Source (SNS) at Oak Ridge National Laboratory. Considering that HVCMs typically operate with an output voltage of 100 kV, with a 60Hz repetitionmore » rate, the 50 μs rise time reduction will result in very significant energy savings. The ES algorithm will prove successful, despite the noisy measurements and cost calculations, confirming the theoretical results that the algorithm is not affected by noise whose frequency components are independent of the perturbing frequencies.« less

  11. Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  12. Evolution of a voltage-time model of thermal batteries. Technical memo

    SciTech Connect (OSTI)

    Knight, J.

    1991-02-01

    A temperature time model of thermal batteries has almost been completed and validated against experimental data. This Memorandum first summarises early attempts to integrate a voltage-time model into this, taking advantage of the instantaneous predictions of temperature, thermodynamic potentials, and internal resistance which the thermal model provides. It then describes how recent refinements of the voltage-time model have led to improved simulation of the discharges of a wide range of sizes and types of thermal battery under an equally wide range of test conditions. The semi-empirical approach adopted has been to provide a universally-applicable framework based on logical concepts to cover various effects such as polarisation etc, but with adjustable numerical parameters. It is shown that a moderately good simulation may be obtained for the majority of available discharge curves, using this one set of equations and without altering parameter values. Further improvements can be obtained when parameter values are optimised for one particular type of battery. Comparisons of model simulations against a body of experimental data have pinpointed remaining discrepancies which will guide further refinement efforts.

  13. security

    National Nuclear Security Administration (NNSA)

    exan-Calvin-Nelson-secures-recognition-for-expertise.aspx">Pantex website.

    Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  14. Provably secure time distribution for the electric grid

    SciTech Connect (OSTI)

    Smith IV, Amos M; Evans, Philip G; Williams, Brian P; Grice, Warren P

    2015-01-01

    We demonstrate a quantum time distribution (QTD) method that combines the precision of optical timing techniques with the integrity of quantum key distribution (QKD). Critical infrastructure is dependent on microprocessor- and programmable logic-based monitoring and control systems. The distribution of timing information across the electric grid is accomplished by GPS signals which are known to be vulnerable to spoofing. We demonstrate a method for synchronizing remote clocks based on the arrival time of photons in a modifed QKD system. This has the advantage that the signal can be veried by examining the quantum states of the photons similar to QKD.

  15. Privacy Act Fees and Time Limits | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | (NNSA) Fees and Time Limits The Act provides agencies to assess fees only for the cost of reproducing records. However, it is the policy of the DOE to provide an individual with one copy of his or her requested records free of charge. The Act does not stipulate a time frame for an agency to provide access to individual records; however, the DOE's regulation (10 CFR, Part 1008.7(b)) states "Every effort will be made to respond within ten working days of the date of receipt by the

  16. PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts

    SciTech Connect (OSTI)

    McNeil, Nikki C; Bridges, Robert A; Iannacone, Michael D; Czejdo, Bogdan; Perez, Nicolas E; Goodall, John R

    2013-01-01

    Public disclosure of important security information, such as knowledge of vulnerabilities or exploits, often occurs in blogs, tweets, mailing lists, and other online sources significantly before proper classification into structured databases. In order to facilitate timely discovery of such knowledge, we propose a novel semi-supervised learning algorithm, PACE, for identifying and classifying relevant entities in text sources. The main contribution of this paper is an enhancement of the traditional bootstrapping method for entity extraction by employing a time-memory trade-off that simultaneously circumvents a costly corpus search while strengthening pattern nomination, which should increase accuracy. An implementation in the cyber-security domain is discussed as well as challenges to Natural Language Processing imposed by the security domain.

  17. Time-resolved photoluminescence measurements for determining voltage-dependent charge-separation efficiencies of subcells in triple-junction solar cells

    SciTech Connect (OSTI)

    Tex, David M.; Ihara, Toshiyuki; Kanemitsu, Yoshihiko; Akiyama, Hidefumi; Imaizumi, Mitsuru

    2015-01-05

    Conventional external quantum-efficiency measurement of solar cells provides charge-collection efficiency for approximate short-circuit conditions. Because this differs from actual operating voltages, the optimization of high-quality tandem solar cells is especially complicated. Here, we propose a contactless method, which allows for the determination of the voltage dependence of charge-collection efficiency for each subcell independently. By investigating the power dependence of photoluminescence decays, charge-separation and recombination-loss time constants are obtained. The upper limit of the charge-collection efficiencies at the operating points is then obtained by applying the uniform field model. This technique may complement electrical characterization of the voltage dependence of charge collection, since subcells are directly accessible.

  18. VOLTAGE REGULATOR

    DOE Patents [OSTI]

    Von Eschen, R.L.; Scheele, P.F.

    1962-04-24

    A transistorized voltage regulator which provides very close voitage regulation up to about 180 deg F is described. A diode in the positive line provides a constant voltage drop from the input to a regulating transistor emitter. An amplifier is coupled to the positive line through a resistor and is connected between a difference circuit and the regulating transistor base which is negative due to the difference in voltage drop across thc diode and the resistor so that a change in the regulator output causes the amplifier to increase or decrease the base voltage and current and incrcase or decrease the transistor impedance to return the regulator output to normal. (AEC)

  19. High voltage pulse generator

    DOE Patents [OSTI]

    Fasching, George E.

    1977-03-08

    An improved high-voltage pulse generator has been provided which is especially useful in ultrasonic testing of rock core samples. An N number of capacitors are charged in parallel to V volts and at the proper instance are coupled in series to produce a high-voltage pulse of N times V volts. Rapid switching of the capacitors from the paralleled charging configuration to the series discharging configuration is accomplished by using silicon-controlled rectifiers which are chain self-triggered following the initial triggering of a first one of the rectifiers connected between the first and second of the plurality of charging capacitors. A timing and triggering circuit is provided to properly synchronize triggering pulses to the first SCR at a time when the charging voltage is not being applied to the parallel-connected charging capacitors. Alternate circuits are provided for controlling the application of the charging voltage from a charging circuit to be applied to the parallel capacitors which provides a selection of at least two different intervals in which the charging voltage is turned "off" to allow the SCR's connecting the capacitors in series to turn "off" before recharging begins. The high-voltage pulse-generating circuit including the N capacitors and corresponding SCR's which connect the capacitors in series when triggered "on" further includes diodes and series-connected inductors between the parallel-connected charging capacitors which allow sufficiently fast charging of the capacitors for a high pulse repetition rate and yet allow considerable control of the decay time of the high-voltage pulses from the pulse-generating circuit.

  20. Y-12 Times, newsletter for employees and friends of the Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ideas spark inventions (pages 4 and 5) Y-12 inventors were awarded 11 patents in fi scal 2012. These guys have totally lost it! (page 6) Three Y-12ers share their advice for getting fi t. October 2012 Visit us! Following the July 28 trespassing inci- dent at the Y-12 National Security Complex, B&W Y-12 has moved quickly to improve security and maintenance. "All of us at B&W Y-12 appreciate the Inspector General's work in assessing the event of July 28 and making recommen- dations

  1. Voltage controlled current source

    DOE Patents [OSTI]

    Casne, Gregory M.

    1992-01-01

    A seven decade, voltage controlled current source is described for use in testing intermediate range nuclear instruments that covers the entire test current range of from 10 picoamperes to 100 microamperes. High accuracy is obtained throughout the entire seven decades of output current with circuitry that includes a coordinated switching scheme responsive to the input signal from a hybrid computer to control the input voltage to an antilog amplifier, and to selectively connect a resistance to the antilog amplifier output to provide a continuous output current source as a function of a preset range of input voltage. An operator controlled switch provides current adjustment for operation in either a real-time simulation test mode or a time response test mode.

  2. Use of external cavity quantum cascade laser compliance voltage in real-time trace gas sensing of multiple chemicals

    SciTech Connect (OSTI)

    Phillips, Mark C.; Taubman, Matthew S.; Kriesel, Jason M.

    2015-02-08

    We describe a prototype trace gas sensor designed for real-time detection of multiple chemicals. The sensor uses an external cavity quantum cascade laser (ECQCL) swept over its tuning range of 940-1075 cm-1 (9.30-10.7 µm) at a 10 Hz repetition rate.

  3. Wide Area Security Region Final Report

    SciTech Connect (OSTI)

    Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin; Gronquist, James; Du, Pengwei; Nguyen, Tony B.; Burns, J. W.

    2010-03-31

    This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of system parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed

  4. High voltage pulse conditioning

    DOE Patents [OSTI]

    Springfield, Ray M.; Wheat, Jr., Robert M.

    1990-01-01

    Apparatus for conditioning high voltage pulses from particle accelerators in order to shorten the rise times of the pulses. Flashover switches in the cathode stalk of the transmission line hold off conduction for a determinable period of time, reflecting the early portion of the pulses. Diodes upstream of the switches divert energy into the magnetic and electrostatic storage of the capacitance and inductance inherent to the transmission line until the switches close.

  5. the Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    0 November 2011 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 2 Y-12 and UT get their game on Page 3 HVAC mechanics on the scene in minutes Pages 4 and 5 Y-12's FY 2011 Top Ten Page 6 Learn about "The Y-12 Scientist" B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and

  6. the Y-12 times, a newsletter for employees and friends of the Y-12 National Security Complex, February 2012

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 February 2012 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 3 A creek runs through it Page 4 Laundry team gives safety a clean scrub Page 5 Catchy sound bites Page 7 1980s: A decade of change Page 8 Lesson in American history B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and

  7. MEDIUM VOLTAGE INTEGRATED DRIVE AND MOTOR

    Broader source: Energy.gov [DOE]

    Calnetix Technologies – Cerritos, CA This project will focus on integrating a high voltage SiC device with advanced high-speed machine technology, medium voltage stators, high efficiency magnetic bearings and sensor high frequency drive technology that can work directly with high voltages, switch at high frequencies for low machine losses, and do so very efficiently. The new medium voltage motors are expected to achieve up to eight times the power density of similar traditional systems. Fact sheet coming soon.

  8. Langmuir probe measurements in a time-fluctuating-highly ionized non-equilibrium cutting arc: Analysis of the electron retarding part of the time-averaged current-voltage characteristic of the probe

    SciTech Connect (OSTI)

    Prevosto, L.; Mancinelli, B.; Kelly, H.; Instituto de Fsica del Plasma , Departamento de Fsica, Facultad de Ciencias Exactas y Naturales Ciudad Universitaria Pab. I, 1428 Buenos Aires

    2013-12-15

    This work describes the application of Langmuir probe diagnostics to the measurement of the electron temperature in a time-fluctuating-highly ionized, non-equilibrium cutting arc. The electron retarding part of the time-averaged current-voltage characteristic of the probe was analysed, assuming that the standard exponential expression describing the electron current to the probe in collision-free plasmas can be applied under the investigated conditions. A procedure is described which allows the determination of the errors introduced in time-averaged probe data due to small-amplitude plasma fluctuations. It was found that the experimental points can be gathered into two well defined groups allowing defining two quite different averaged electron temperature values. In the low-current region the averaged characteristic was not significantly disturbed by the fluctuations and can reliably be used to obtain the actual value of the averaged electron temperature. In particular, an averaged electron temperature of 0.98 0.07 eV (= 11400 800 K) was found for the central core of the arc (30 A) at 3.5 mm downstream from the nozzle exit. This average included not only a time-average over the time fluctuations but also a spatial-average along the probe collecting length. The fitting of the high-current region of the characteristic using such electron temperature value together with the corrections given by the fluctuation analysis showed a relevant departure of local thermal equilibrium in the arc core.

  9. Dielectric-wall linear accelerator with a high voltage fast rise time switch that includes a pair of electrodes between which are laminated alternating layers of isolated conductors and insulators

    DOE Patents [OSTI]

    Caporaso, George J.; Sampayan, Stephen E.; Kirbie, Hugh C.

    1998-01-01

    A dielectric-wall linear accelerator is improved by a high-voltage, fast rise-time switch that includes a pair of electrodes between which are laminated alternating layers of isolated conductors and insulators. A high voltage is placed between the electrodes sufficient to stress the voltage breakdown of the insulator on command. A light trigger, such as a laser, is focused along at least one line along the edge surface of the laminated alternating layers of isolated conductors and insulators extending between the electrodes. The laser is energized to initiate a surface breakdown by a fluence of photons, thus causing the electrical switch to close very promptly. Such insulators and lasers are incorporated in a dielectric wall linear accelerator with Blumlein modules, and phasing is controlled by adjusting the length of fiber optic cables that carry the laser light to the insulator surface.

  10. Dielectric-wall linear accelerator with a high voltage fast rise time switch that includes a pair of electrodes between which are laminated alternating layers of isolated conductors and insulators

    DOE Patents [OSTI]

    Caporaso, G.J.; Sampayan, S.E.; Kirbie, H.C.

    1998-10-13

    A dielectric-wall linear accelerator is improved by a high-voltage, fast rise-time switch that includes a pair of electrodes between which are laminated alternating layers of isolated conductors and insulators. A high voltage is placed between the electrodes sufficient to stress the voltage breakdown of the insulator on command. A light trigger, such as a laser, is focused along at least one line along the edge surface of the laminated alternating layers of isolated conductors and insulators extending between the electrodes. The laser is energized to initiate a surface breakdown by a fluence of photons, thus causing the electrical switch to close very promptly. Such insulators and lasers are incorporated in a dielectric wall linear accelerator with Blumlein modules, and phasing is controlled by adjusting the length of fiber optic cables that carry the laser light to the insulator surface. 12 figs.

  11. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  12. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A.; LeBlanc, Edward J.; Griffin, Jeffrey W.

    1992-01-01

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  13. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  14. HIGH VOLTAGE GENERATOR

    DOE Patents [OSTI]

    Zito, G.V.

    1959-04-21

    This patent relates to high voltage supply circuits adapted for providing operating voltages for GeigerMueller counter tubes, and is especially directed to an arrangement for maintaining uniform voltage under changing conditions of operation. In the usual power supply arrangement for counter tubes the counter voltage is taken from across the power supply output capacitor. If the count rate exceeds the current delivering capaciiy of the capacitor, the capacitor voltage will drop, decreasing the counter voltage. The present invention provides a multivibrator which has its output voltage controlled by a signal proportional to the counting rate. As the counting rate increases beyond the current delivering capacity of the capacitor, the rectified voltage output from the multivibrator is increased to maintain uniform counter voltage.

  15. Eliminate Voltage Unbalance

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Voltage unbalance degrades the performance and shortens the life of a three-phase motor. Voltage unbalance at the motor terminals can cause current unbalance that is far out of ...

  16. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  17. Automatic voltage imbalance detector

    DOE Patents [OSTI]

    Bobbett, Ronald E.; McCormick, J. Byron; Kerwin, William J.

    1984-01-01

    A device for indicating and preventing damage to voltage cells such as galvanic cells and fuel cells connected in series by detecting sequential voltages and comparing these voltages to adjacent voltage cells. The device is implemented by using operational amplifiers and switching circuitry is provided by transistors. The device can be utilized in battery powered electric vehicles to prevent galvanic cell damage and also in series connected fuel cells to prevent fuel cell damage.

  18. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  19. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  20. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  1. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  2. Optical voltage reference

    DOE Patents [OSTI]

    Rankin, R.; Kotter, D.

    1994-04-26

    An optical voltage reference for providing an alternative to a battery source is described. The optical reference apparatus provides a temperature stable, high precision, isolated voltage reference through the use of optical isolation techniques to eliminate current and impedance coupling errors. Pulse rate frequency modulation is employed to eliminate errors in the optical transmission link while phase-lock feedback is employed to stabilize the frequency to voltage transfer function. 2 figures.

  3. Optical voltage reference

    DOE Patents [OSTI]

    Rankin, Richard; Kotter, Dale

    1994-01-01

    An optical voltage reference for providing an alternative to a battery source. The optical reference apparatus provides a temperature stable, high precision, isolated voltage reference through the use of optical isolation techniques to eliminate current and impedance coupling errors. Pulse rate frequency modulation is employed to eliminate errors in the optical transmission link while phase-lock feedback is employed to stabilize the frequency to voltage transfer function.

  4. Voltage Control Technical Conference

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1-08-Voltage-Control-Technical-Conference Sign In About | Careers | Contact | Investors | bpa.gov Search News & Us Expand News & Us Projects & Initiatives Expand Projects &...

  5. Eliminate Voltage Unbalance

    SciTech Connect (OSTI)

    Not Available

    2000-01-01

    This two-page abstract provides tips for plant managers on checking and monitoring motor voltage unbalance to improve performance and life-span of industrial motors.

  6. the Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, March 2012

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    W H A T ' S I N S I D E Page 2 Employees embrace the VPP culture Page 3 Discipline and rules Page 5 Graham receives several accolades Page 7 Flashback to the 1980s Page 8 Helping others with an Extreme Makeover B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National Security Complex. A newsletter for employees and friends of the Y-12 National Security Complex Managing Editors Amy Alley:

  7. Experimental validation of a high voltage pulse measurement method.

    SciTech Connect (OSTI)

    Cular, Stefan; Patel, Nishant Bhupendra; Branch, Darren W.

    2013-09-01

    This report describes X-cut lithium niobate's (LiNbO3) utilization for voltage sensing by monitoring the acoustic wave propagation changes through LiNbO3 resulting from applied voltage. Direct current (DC), alternating current (AC) and pulsed voltage signals were applied to the crystal. Voltage induced shift in acoustic wave propagation time scaled quadratically for DC and AC voltages and linearly for pulsed voltages. The measured values ranged from 10 - 273 ps and 189 ps - 2 ns for DC and non-DC voltages, respectively. Data suggests LiNbO3 has a frequency sensitive response to voltage. If voltage source error is eliminated through physical modeling from the uncertainty budget, the sensor's U95 estimated combined uncertainty could decrease to ~0.025% for DC, AC, and pulsed voltage measurements.

  8. Voltage verification unit

    DOE Patents [OSTI]

    Martin, Edward J.

    2008-01-15

    A voltage verification unit and method for determining the absence of potentially dangerous potentials within a power supply enclosure without Mode 2 work is disclosed. With this device and method, a qualified worker, following a relatively simple protocol that involves a function test (hot, cold, hot) of the voltage verification unit before Lock Out/Tag Out and, and once the Lock Out/Tag Out is completed, testing or "trying" by simply reading a display on the voltage verification unit can be accomplished without exposure of the operator to the interior of the voltage supply enclosure. According to a preferred embodiment, the voltage verification unit includes test leads to allow diagnostics with other meters, without the necessity of accessing potentially dangerous bus bars or the like.

  9. the Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Buttons, pg. 2 Buttons aren't only for the clothing industry. STEM, pg. 8 Y-12's contributions to Knoxville's L&N STEM Academy are a sound investment. Film crews from national television stations don't usually go on classified missions. How- ever, MSNBC's Rachel Maddow was granted special access to report on the successful removal of highly enriched uranium from Mexico's National Institute for Nuclear Research in February. Y-12 was tasked by the National Nuclear Security Administration's

  10. Voltage balanced multilevel voltage source converter system

    DOE Patents [OSTI]

    Peng, F.Z.; Lai, J.S.

    1997-07-01

    Disclosed is a voltage balanced multilevel converter for high power AC applications such as adjustable speed motor drives and back-to-back DC intertie of adjacent power systems. This converter provides a multilevel rectifier, a multilevel inverter, and a DC link between the rectifier and the inverter allowing voltage balancing between each of the voltage levels within the multilevel converter. The rectifier is equipped with at least one phase leg and a source input node for each of the phases. The rectifier is further equipped with a plurality of rectifier DC output nodes. The inverter is equipped with at least one phase leg and a load output node for each of the phases. The inverter is further equipped with a plurality of inverter DC input nodes. The DC link is equipped with a plurality of rectifier charging means and a plurality of inverter discharging means. The plurality of rectifier charging means are connected in series with one of the rectifier charging means disposed between and connected in an operable relationship with each adjacent pair of rectifier DC output nodes. The plurality of inverter discharging means are connected in series with one of the inverter discharging means disposed between and connected in an operable relationship with each adjacent pair of inverter DC input nodes. Each of said rectifier DC output nodes are individually electrically connected to the respective inverter DC input nodes. By this means, each of the rectifier DC output nodes and each of the inverter DC input nodes are voltage balanced by the respective charging and discharging of the rectifier charging means and the inverter discharging means. 15 figs.

  11. Voltage balanced multilevel voltage source converter system

    DOE Patents [OSTI]

    Peng, Fang Zheng; Lai, Jih-Sheng

    1997-01-01

    A voltage balanced multilevel converter for high power AC applications such as adjustable speed motor drives and back-to-back DC intertie of adjacent power systems. This converter provides a multilevel rectifier, a multilevel inverter, and a DC link between the rectifier and the inverter allowing voltage balancing between each of the voltage levels within the multilevel converter. The rectifier is equipped with at least one phase leg and a source input node for each of the phases. The rectifier is further equipped with a plurality of rectifier DC output nodes. The inverter is equipped with at least one phase leg and a load output node for each of the phases. The inverter is further equipped with a plurality of inverter DC input nodes. The DC link is equipped with a plurality of rectifier charging means and a plurality of inverter discharging means. The plurality of rectifier charging means are connected in series with one of the rectifier charging means disposed between and connected in an operable relationship with each adjacent pair of rectifier DC output nodes. The plurality of inverter discharging means are connected in series with one of the inverter discharging means disposed between and connected in an operable relationship with each adjacent pair of inverter DC input nodes. Each of said rectifier DC output nodes are individually electrically connected to the respective inverter DC input nodes. By this means, each of the rectifier DC output nodes and each of the inverter DC input nodes are voltage balanced by the respective charging and discharging of the rectifier charging means and the inverter discharging means.

  12. The Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, July 2012

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Star shines on Y-12 A newsletter for employees and friends of the Y-12 National Security Complex Inside ... Anatomy of a weapon (pg. 2) New technology reveals what's inside without destroying weapon components. LINKS to a new generation (pg. 5) Atlanta STEM students visit Y-12, ORNL and ORAU. July 2012 Visit us! Y-12's Safety for Life journey is now lighted by the U.S. Department of Energy Voluntary Protection Program Star. The flag was presented to Y-12 June 5 by the then Acting Manager of the

  13. High voltage DC power supply

    DOE Patents [OSTI]

    Droege, Thomas F.

    1989-01-01

    A high voltage DC power supply having a first series resistor at the output for limiting current in the event of a short-circuited output, a second series resistor for sensing the magnitude of output current, and a voltage divider circuit for providing a source of feedback voltage for use in voltage regulation is disclosed. The voltage divider circuit is coupled to the second series resistor so as to compensate the feedback voltage for a voltage drop across the first series resistor. The power supply also includes a pulse-width modulated control circuit, having dual clock signals, which is responsive to both the feedback voltage and a command voltage, and also includes voltage and current measuring circuits responsive to the feedback voltage and the voltage developed across the second series resistor respectively.

  14. High voltage DC power supply

    DOE Patents [OSTI]

    Droege, T.F.

    1989-12-19

    A high voltage DC power supply having a first series resistor at the output for limiting current in the event of a short-circuited output, a second series resistor for sensing the magnitude of output current, and a voltage divider circuit for providing a source of feedback voltage for use in voltage regulation is disclosed. The voltage divider circuit is coupled to the second series resistor so as to compensate the feedback voltage for a voltage drop across the first series resistor. The power supply also includes a pulse-width modulated control circuit, having dual clock signals, which is responsive to both the feedback voltage and a command voltage, and also includes voltage and current measuring circuits responsive to the feedback voltage and the voltage developed across the second series resistor respectively. 7 figs.

  15. Security Officer

    Broader source: Energy.gov [DOE]

    This position is located in the Security and Continuity of Operations (NN) organization of the Chief Administrative Office (N), Bonneville Power Administration. The Security and Continuity of...

  16. Protocol, Security Assistance- January 2007

    Broader source: Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  17. National Security and Cyber Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security and Cyber Security National Security and Cyber Security National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. Contact thumbnail of Business Development Business Development Richard P. Feynman Center for Innovation (505) 665-9090 Email National security and weapons science at the laboratory spans essentially all the

  18. Device for monitoring cell voltage

    DOE Patents [OSTI]

    Doepke, Matthias; Eisermann, Henning

    2012-08-21

    A device for monitoring a rechargeable battery having a number of electrically connected cells includes at least one current interruption switch for interrupting current flowing through at least one associated cell and a plurality of monitoring units for detecting cell voltage. Each monitoring unit is associated with a single cell and includes a reference voltage unit for producing a defined reference threshold voltage and a voltage comparison unit for comparing the reference threshold voltage with a partial cell voltage of the associated cell. The reference voltage unit is electrically supplied from the cell voltage of the associated cell. The voltage comparison unit is coupled to the at least one current interruption switch for interrupting the current of at least the current flowing through the associated cell, with a defined minimum difference between the reference threshold voltage and the partial cell voltage.

  19. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  20. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Safety, Security Safety, Security The Lab's mission is to develop and apply science and technology to ensure the safety, security, and reliability of the U.S. nuclear deterrent; reduce global threats; and solve other emerging national security and energy challenges. Contact Operator Los Alamos National Laboratory (505) 667-5061 We do not compromise safety for personal, programmatic, or operational reasons. Safety: we integrate safety, security, and environmental concerns into every step of our

  1. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Perimeter Security Perimeter Protecting the Laboratory against threats and vulnerabilities. Contact Security Perimeter Coordinators Email The security perimeter helps to protect the Laboratory Vehicle Access Portal graphic The security perimeter is intended to protect the Laboratory against the possibility of terrorist attacks. At each point of the perimeter, access is controlled by vehicle access portals (VAPs) at the following locations: East Jemez Road VAPs (pdf) (shown above) West

  2. High voltage coaxial switch

    DOE Patents [OSTI]

    Rink, John P.

    1983-07-19

    A coaxial high voltage, high current switch having a solid cylindrical cold cathode coaxially surrounded by a thin hollow cylindrical inner electrode and a larger hollow cylindrical outer electrode. A high voltage trigger between the cathode and the inner electrode causes electrons to be emitted from the cathode and flow to the inner electrode preferably through a vacuum. Some of the electrons penetrate the inner electrode and cause a volumetric discharge in the gas (which may be merely air) between the inner and outer electrodes. The discharge provides a low impedance path between a high voltage charge placed on the outer electrode and a load (which may be a high power laser) coupled to the inner electrode. For high repetition rate the gas between the inner and outer electrodes may be continuously exchanged or refreshed under pressure.

  3. High voltage coaxial switch

    DOE Patents [OSTI]

    Rink, J.P.

    1983-07-19

    A coaxial high voltage, high current switch having a solid cylindrical cold cathode coaxially surrounded by a thin hollow cylindrical inner electrode and a larger hollow cylindrical outer electrode. A high voltage trigger between the cathode and the inner electrode causes electrons to be emitted from the cathode and flow to the inner electrode preferably through a vacuum. Some of the electrons penetrate the inner electrode and cause a volumetric discharge in the gas (which may be merely air) between the inner and outer electrodes. The discharge provides a low impedance path between a high voltage charge placed on the outer electrode and a load (which may be a high power laser) coupled to the inner electrode. For high repetition rate the gas between the inner and outer electrodes may be continuously exchanged or refreshed under pressure. 3 figs.

  4. Electron launching voltage monitor

    DOE Patents [OSTI]

    Mendel, C.W.; Savage, M.E.

    1992-03-17

    An electron launching voltage monitor measures MITL voltage using a relationship between anode electric field and electron current launched from a cathode-mounted perturbation. An electron launching probe extends through and is spaced from the edge of an opening in a first MITL conductor, one end of the launching probe being in the gap between the MITL conductor, the other end being adjacent a first side of the first conductor away from the second conductor. A housing surrounds the launching probe and electrically connects the first side of the first conductor to the other end of the launching probe. A detector detects the current passing through the housing to the launching probe, the detected current being representative of the voltage between the conductors. 5 figs.

  5. Electron launching voltage monitor

    DOE Patents [OSTI]

    Mendel, Clifford W.; Savage, Mark E.

    1992-01-01

    An electron launching voltage monitor measures MITL voltage using a relationship between anode electric field and electron current launched from a cathode-mounted perturbation. An electron launching probe extends through and is spaced from the edge of an opening in a first MITL conductor, one end of the launching probe being in the gap between the MITL conductor, the other end being adjacent a first side of the first conductor away from the second conductor. A housing surrounds the launching probe and electrically connects the first side of the first conductor to the other end of the launching probe. A detector detects the current passing through the housing to the launching probe, the detected current being representative of the voltage between the conductors.

  6. Application of Newton's optimal power flow in voltage/reactive power control

    SciTech Connect (OSTI)

    Bjelogrlic, M.; Babic, B.S. ); Calovic, M.S. ); Ristanovic, P. )

    1990-11-01

    This paper considers an application of Newton's optimal power flow to the solution of the secondary voltage/reactive power control in transmission networks. An efficient computer program based on the latest achievements in the sparse matrix/vector techniques has been developed for this purpose. It is characterized by good robustness, accuracy and speed. A combined objective function appropriate for various system load levels with suitable constraints, for treatment of the power system security and economy is also proposed. For the real-time voltage/reactive power control, a suboptimal power flow procedure has been derived by using the reduced set of control variables. This procedure is based on the sensitivity theory applied to the determination of zones for the secondary voltage/reactive power control and corresponding reduced set of regulating sources, whose reactive outputs represent control variables in the optimal power flow program. As a result, the optimal power flow program output becomes a schedule to be used by operators in the process of the real-time voltage/reactive power control in both normal and emergency operating states.

  7. High voltage variable diameter insulator

    DOE Patents [OSTI]

    Vanacek, D.L.; Pike, C.D.

    1982-07-13

    A high voltage feedthrough assembly having a tubular insulator extending between the ground plane ring and the high voltage ring. The insulator is made of Pyrex and decreases in diameter from the ground plane ring to the high voltage ring, producing equipotential lines almost perpendicular to the wall of the insulator to optimize the voltage-holding capability of the feedthrough assembly.

  8. security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security NNSA Announces 2015 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards WASHINGTON, D.C. - The Department of Energy's National Nuclear Security Administration (DOE/NNSA) announced the recipients of the Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Joseph Houghton from the Los Alamos Field Office will receive... Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit

  9. Security Forms and Information | Department of Energy

    Office of Environmental Management (EM)

    New Employee Orientation Security Forms and Information Security Forms and Information ... Until such time as the new employee receives a permanent photo identification badge, the ...

  10. Small Electric Voltage Alters Conductivity in Key Materials

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Electric Voltage Alters Conductivity in Key Materials - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste

  11. Secure video communications system

    DOE Patents [OSTI]

    Smith, Robert L.

    1991-01-01

    A secure video communications system having at least one command network formed by a combination of subsystems. The combination of subsystems to include a video subsystem, an audio subsystem, a communications subsystem, and a control subsystem. The video communications system to be window driven and mouse operated, and having the ability to allow for secure point-to-point real-time teleconferencing.

  12. Water Security Toolkit

    Energy Science and Technology Software Center (OSTI)

    2012-09-11

    The Water Security Toolkit (WST) provides software for modeling and analyzing water distribution systems to minimize the potential impact of contamination incidents. WST wraps capabilities for contaminant transport, impact assessment, and sensor network design with response action plans, including source identification, rerouting, and decontamination, to provide a range of water security planning and real-time applications.

  13. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SunShot Grand Challenge: Regional Test Centers Water Security HomeTag:Water Security Electricity use by water service sector and county. Shown are electricity use by (a) ...

  14. Lowering of the firing voltage and reducing of the discharge delay time in alternating current plasma display panels by a discontinuous spin-coated LaB{sub 6} film on the MgO protective layer

    SciTech Connect (OSTI)

    Deng, Jiang; Zeng, Baoqing; Zhongshan Institute, University of Electronic Science and Technology of China, 528402 zhongshan ; Wang, Xiaoju; Lin, Zulun; Qi, Kangcheng; Cao, Guichuan

    2014-03-15

    A spin coated LaB{sub 6} discontinuous film is covered on MgO protective layer to improve the discharge performance of alternating current plasma display panels. Under the premise of high transmittance of more than 90%, a very small amount of polycrystal LaB{sub 6} powders added in an organic solvent are chosen as the coating solution. The discharge characteristics results show that with 250 torr 5% Xe-Ne pressure, the firing voltage and discharge delay time of the test panel with LaB{sub 6}/MgO double protective layer are decreased by 13.4% and 36.5%, respectively, compared with that of conventional MgO protective layer, likely owing to the low work function of LaB{sub 6.} Furthermore, the aging time of the proposed structure is comparable to that of pure MgO protective layer. Therefore, it will not increase the production costs and is highly suitable to be applied for alternating current plasma display panels with low electrical power consumption.

  15. HIGH VOLTAGE GENERATOR

    DOE Patents [OSTI]

    Schwemin, A.J.

    1959-03-17

    A generator is presented for producing relatively large currents at high voltages. In general, the invention comprises a plurality of capacitors connected in series by a plurality of switches alternately disposed with the capacitors. The circuit is mounted for movement with respect to contact members and switch closure means so that a load device and power supply are connected across successive numbers of capacitors, while the other capacitors are successively charged with the same power supply.

  16. High Voltage Connector

    SciTech Connect (OSTI)

    Kurita, C.H.; /Fermilab

    1987-03-06

    The originally designed high voltage connectors were to be made of brass. However, if treated like a Bellevile spring with the initially given dimensions, the stresses of the connector when crimped were calculated to be much higher than the yield stress of brass. Since the flange and outer diameters of the connector are to remain small, it was necessary to alter the other dimensions and choice of material in order to bring down the stresses applied to the connector.

  17. HIGH VOLTAGE ION SOURCE

    DOE Patents [OSTI]

    Luce, J.S.

    1960-04-19

    A device is described for providing a source of molecular ions having a large output current and with an accelerated energy of the order of 600 kv. Ions are produced in an ion source which is provided with a water-cooled source grid of metal to effect maximum recombination of atomic ions to molecular ions. A very high accelerating voltage is applied to withdraw and accelerate the molecular ions from the source, and means are provided for dumping the excess electrons at the lowest possible potentials. An accelerating grid is placed adjacent to the source grid and a slotted, grounded accelerating electrode is placed adjacent to the accelerating grid. A potential of about 35 kv is maintained between the source grid and accelerating grid, and a potential of about 600 kv is maintained between the accelerating grid and accelerating electrode. In order to keep at a minimum the large number of oscillating electrons which are created when such high voltages are employed in the vicinity of a strong magnetic field, a plurality of high voltage cascaded shields are employed with a conventional electron dumping system being employed between each shield so as to dump the electrons at the lowest possible potential rather than at 600 kv.

  18. APPARATUS FOR REGULATING HIGH VOLTAGE

    DOE Patents [OSTI]

    Morrison, K.G.

    1951-03-20

    This patent describes a high-voltage regulator of the r-f type wherein the modulation of the r-f voltage is accomplished at a high level, resulting in good stabilization over a large range of load conditions.

  19. the Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    6 July 2011 www.y12.doe.gov/news/times.php P.O. Box 2009 Oak Ridge, TN 37831-8245 W H A T ' S I N S I D E Page 2 Y-12 submits Voluntary Protection Program application Page 3 Preparing for the big freeze while temperatures soar Page 4 Quitters setting an example Page 5 Meet the YES board Page 8 Apprentices compete in Nashville B&W Technical Services Y-12, LLC, a partnership between Babcock & Wilcox Technical Services Group Inc. and Bechtel National Inc., operates the Y-12 National

  20. the Y-12 Times, a newsletter for employees and friends of the Y-12 National Security Complex, September 2012

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Operations resume (pg. 2) Y-12 resumes nuclear operations Aug. 15. Phased Array (pg. 5) A Y-12 project brings sweet success to weld inspections. September 2012 Visit us! Whether you've been a Y-12 employee for one year or 40 years, the events of July 28 had an effect on your time here. Y-12ers have always considered themselves a family, and like family, we must work together to regain the confidence of interested groups. We know three people cut through fences and vandalized the Highly Enriched

  1. High voltage variable diameter insulator

    DOE Patents [OSTI]

    Vanecek, David L.; Pike, Chester D.

    1984-01-01

    A high voltage feedthrough assembly (10) having a tubular insulator (15) extending between the ground plane ring (16) and the high voltage ring (30). The insulator (15) is made of Pyrex and decreases in diameter from the ground plane ring (16) to the high voltage ring (30), producing equipotential lines almost perpendicular to the wall (27) of the insulator (15) to optimize the voltage-holding capability of the feedthrough assembly (10).

  2. Charge-pump voltage converter

    DOE Patents [OSTI]

    Brainard, John P.; Christenson, Todd R.

    2009-11-03

    A charge-pump voltage converter for converting a low voltage provided by a low-voltage source to a higher voltage. Charge is inductively generated on a transfer rotor electrode during its transit past an inductor stator electrode and subsequently transferred by the rotating rotor to a collector stator electrode for storage or use. Repetition of the charge transfer process leads to a build-up of voltage on a charge-receiving device. Connection of multiple charge-pump voltage converters in series can generate higher voltages, and connection of multiple charge-pump voltage converters in parallel can generate higher currents. Microelectromechanical (MEMS) embodiments of this invention provide a small and compact high-voltage (several hundred V) voltage source starting with a few-V initial voltage source. The microscale size of many embodiments of this invention make it ideally suited for MEMS- and other micro-applications where integration of the voltage or charge source in a small package is highly desirable.

  3. Radiological Security Partnership | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Programs / Nonproliferation / Global Material Security / Radiological Security Radiological Security Partnership Radiological Security Partnership Secure Your Business, Your Community, and Your Country. Sign Up Today for Services Provided by the Radiological Security Partnership. RSP Logo Initiative of the Global Material Security Program Formerly the Global Threat Reduction Initiative RSP Registration RSP More Info Learn More Radiological Security Partnership

  4. National Security Complex | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Complex Y-12 National Security Complex Completes W69 Dismantlement

  5. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  6. physical security

    National Nuclear Security Administration (NNSA)

    5%2A en Physical Security Systems http:nnsa.energy.govaboutusourprogramsnuclearsecurityphysicalsecuritysystems

  7. Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Water Security - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us ... Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 ...

  8. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and Small Modular reactors projects. the collaboration takes place under the umbrella of a joint oUSnl "Center for Energy, Security and Society". the Center serves to...

  9. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  10. Security Specialist

    Broader source: Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will rovide technical assistance to the Director,...

  11. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    all of our reactor designs employ a concurrent engineering approach that addresses the integration of safety, operations, security, and safeguards from the conceptual design level. Capabilities include core design, thermal hydraulics, waste characterization, simulator development, and severe service and accident testing. Design assessments include: safety, security, vulnerability, siting, emergency planning, and fuel cycle impact. organization 6221 serves as a window to sister organizations

  12. Physical Security

    SciTech Connect (OSTI)

    2008-01-01

    The future of physical security at government facilities and national laboratories is rapidly progressing beyond the cliché of gates, guns and guards, and is quickly being replaced by radars, sensors and cameras. Learn more about INL's security research at http://www.facebook.com/idahonationallaboratory.

  13. High voltage feedthrough bushing

    DOE Patents [OSTI]

    Brucker, John P.

    1993-01-01

    A feedthrough bushing for a high voltage diode provides for using compression sealing for all sealing surfaces. A diode assembly includes a central conductor extending through the bushing and a grading ring assembly circumferentially surrounding and coaxial with the central conductor. A flexible conductive plate extends between and compressively seals against the central conductor and the grading ring assembly, wherein the flexibility of the plate allows inner and outer portions of the plate to axially translate for compression sealing against the central conductor and the grading ring assembly, respectively. The inner portion of the plate is bolted to the central conductor for affecting sealing. A compression beam is also bolted to the central conductor and engages the outer portion of the plate to urge the outer portion toward the grading ring assembly to obtain compression sealing therebetween.

  14. Wide-range voltage modulation

    SciTech Connect (OSTI)

    Rust, K.R.; Wilson, J.M.

    1992-06-01

    The Superconducting Super Collider`s Medium Energy Booster Abort (MEBA) kicker modulator will supply a current pulse to the abort magnets which deflect the proton beam from the MEB ring into a designated beam stop. The abort kicker will be used extensively during testing of the Low Energy Booster (LEB) and the MEB rings. When the Collider is in full operation, the MEBA kicker modulator will abort the MEB beam in the event of a malfunction during the filling process. The modulator must generate a 14-{mu}s wide pulse with a rise time of less than 1 {mu}s, including the delay and jitter times. It must also be able to deliver a current pulse to the magnet proportional to the beam energy at any time during ramp-up of the accelerator. Tracking the beam energy, which increases from 12 GeV at injection to 200 GeV at extraction, requires the modulator to operate over a wide range of voltages (4 kV to 80 kV). A vacuum spark gap and a thyratron have been chosen for test and evaluation as candidate switches for the abort modulator. Modulator design, switching time delay, jitter and pre-fire data are presented.

  15. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  16. High voltage pulse generator. [Patent application

    DOE Patents [OSTI]

    Fasching, G.E.

    1975-06-12

    An improved high-voltage pulse generator is described which is especially useful in ultrasonic testing of rock core samples. An N number of capacitors are charged in parallel to V volts and at the proper instance are coupled in series to produce a high-voltage pulse of N times V volts. Rapid switching of the capacitors from the paralleled charging configuration to the series discharging configuration is accomplished by using silicon-controlled rectifiers which are chain self-triggered following the initial triggering of the first rectifier connected between the first and second capacitors. A timing and triggering circuit is provided to properly synchronize triggering pulses to the first SCR at a time when the charging voltage is not being applied to the parallel-connected charging capacitors. The output voltage can be readily increased by adding additional charging networks. The circuit allows the peak level of the output to be easily varied over a wide range by using a variable autotransformer in the charging circuit.

  17. Radiological Security Program | National Nuclear Security Administrati...

    National Nuclear Security Administration (NNSA)

    Radiological Security Program Armenia Secures Dangerous Radioactive Sources in Cooperation with NNSA The Department of Energy's National Nuclear Security Administration (NNSA) ...

  18. Nuclear Security Enterprise | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About Our Programs Defense Programs Nuclear Security Enterprise The Nuclear Security Enterprise (NSE) mission is to ensure the Nation sustains a safe, secure, and effective ...

  19. Voltage Vehicles | Open Energy Information

    Open Energy Info (EERE)

    distributor specializing in the full spectrum of electric vehicles (EV) and full-performance alternative fuel vehicles (AFV). References: Voltage Vehicles1 This article is a...

  20. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  1. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    computer security Computer Security All JLF participants must fully comply with all LLNL computer security regulations and procedures. A laptop entering or leaving B-174 for the sole use by a US citizen and so configured, and requiring no IP address, need not be registered for use in the JLF. By September 2009, it is expected that computers for use by Foreign National Investigators will have no special provisions. Notify maricle1@llnl.gov of all other computers entering, leaving, or being moved

  2. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  3. Security Specialist

    Broader source: Energy.gov [DOE]

    These positions are located in the Office of Enterprise Assessments (EA), Office of Security Enforcement. A successful candidate in this position will serve as a senior staff member of the Office...

  4. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  5. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  6. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear Energy

  7. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision Important applications of these capabilities include performing assessment of facility vulnerabilities and resultant consequences of a range of attack scenarios related to nuclear facilities after

  8. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to enhance the nation's security and prosperity through sustainable, transformative approaches to our most challenging energy, climate, and infrastructure problems. vision the capability set needed to address safe and secure management of these radioactive materials includes a broad set of engineering and scientific disciplines such as physics; nuclear, mechanical, civil, and systems engineering; and chemistry. In addition, Sandia has a tool set that enhances the ability to perform high level

  9. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  10. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced Nuclear Energy Nuclear

  11. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Two-hundred twenty-five nonprofit organizations receive monetary donations from Los Alamos National Security, LLC September 21, 2015 Recognizing employee and retiree volunteer efforts LOS ALAMOS, N.M., Sept. 21, 2015-More than 225 nonprofit organizations received $162,650 from Los Alamos National Security, LLC, which manages Los Alamos National Laboratory. The LANS contributions are determined by the number of volunteer hours logged by Laboratory employees and retirees through an organization

  12. Requirements for security signalling

    SciTech Connect (OSTI)

    Pierson, L.G.; Tarman, T.D.

    1995-02-05

    There has been some interest lately in the need for ``authenticated signalling``, and the development of signalling specifications by the ATM Forum that support this need. The purpose of this contribution is to show that if authenticated signalling is required, then supporting signalling facilities for directory services (i.e. key management) are also required. Furthermore, this contribution identifies other security related mechanisms that may also benefit from ATM-level signalling accommodations. For each of these mechanisms outlined here, an overview of the signalling issues and a rough cut at the required fields for supporting Information Elements are provided. Finally, since each of these security mechanisms are specified by a number of different standards, issues pertaining to the selection of a particular security mechanism at connection setup time (i.e. specification of a required ``Security Quality of Service``) are also discussed.

  13. Voltage sensor and dielectric material

    DOE Patents [OSTI]

    Yakymyshyn, Christopher Paul; Yakymyshyn, Pamela Jane; Brubaker, Michael Allen

    2006-10-17

    A voltage sensor is described that consists of an arrangement of impedance elements. The sensor is optimized to provide an output ratio that is substantially immune to changes in voltage, temperature variations or aging. Also disclosed is a material with a large and stable dielectric constant. The dielectric constant can be tailored to vary with position or direction in the material.

  14. Temperature controlled high voltage regulator

    DOE Patents [OSTI]

    Chiaro, Jr., Peter J.; Schulze, Gerald K.

    2004-04-20

    A temperature controlled high voltage regulator for automatically adjusting the high voltage applied to a radiation detector is described. The regulator is a solid state device that is independent of the attached radiation detector, enabling the regulator to be used by various models of radiation detectors, such as gas flow proportional radiation detectors.

  15. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  16. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Security The Y-12 National Security Complex places the highest priority on maintaining and improving its security posture. We employ security police officers, cyber security specialists, and other personnel to safeguard our security assets. Y-12 continuously monitors local and world events to prepare for potential risks to the site, our information and our employees. Security personnel also participate in numerous assessments each year to ensure readiness in protecting the site's vital

  17. Radiological Security Partnership Information | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Programs / Nonproliferation / Global Material Security / Radiological Security / Radiological Security Partnership Radiological Security Partnership Information Radioactive sources play an important role in a number of commercial, medical, and research facilities. The benefits of these sources must be balanced with proper security. The Department of Energy's (DOE) National Nuclear Security Administration (NNSA) is working with the Nuclear Regulatory Commission and

  18. PSH-12-0053 - In the Matter of Personnel Security Hearing | Department...

    Broader source: Energy.gov (indexed) [DOE]

    in connection with her security clearance, the Local Security Office (LSO) ... DOE Ex. 14. The Individual's security clearance was continued at that time. DOE Ex. 6. ...

  19. Low voltage nonprimary explosive detonator

    DOE Patents [OSTI]

    Dinegar, Robert H.; Kirkham, John

    1982-01-01

    A low voltage, electrically actuated, nonprimary explosive detonator is disclosed wherein said detonation is achieved by means of an explosive train in which a deflagration-to-detonation transition is made to occur. The explosive train is confined within a cylindrical body and positioned adjacent to low voltage ignition means have electrical leads extending outwardly from the cylindrical confining body. Application of a low voltage current to the electrical leads ignites a self-sustained deflagration in a donor portion of the explosive train which then is made to undergo a transition to detonation further down the train.

  20. cdns | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    cdns Design Basis Threat NNSA has taken aggressive action to improve the security of its nuclear weapons material (often referred to as special nuclear material, or SNM) and nuclear weapons in its custody. One major challenge has been, and remains, ensuring that SNM is well protected, while at the same time,... Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by statutes,

  1. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  2. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  3. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  4. High-output microwave detector using voltage-induced ferromagnetic resonance

    SciTech Connect (OSTI)

    Shiota, Yoichi Suzuki, Yoshishige; Miwa, Shinji; Tamaru, Shingo; Nozaki, Takayuki; Kubota, Hitoshi; Fukushima, Akio; Yuasa, Shinji

    2014-11-10

    We investigated the voltage-induced ferromagnetic resonance (FMR) with various DC bias voltage and input RF power in magnetic tunnel junctions. We found that the DC bias monotonically increases the homodyne detection voltage due to the nonlinear FMR originating in an asymmetric magnetization-potential in the free layer. In addition, the linear increase of an output voltage to the input RF power in the voltage-induced FMR is more robust than that in spin-torque FMR. These characteristics enable us to obtain an output voltage more than ten times than that of microwave detectors using spin-transfer torque.

  5. Monitoring Current, Voltage and Power

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Monitoring Current, Voltage and Power in Photovoltaic Systems Anton Driesse 1 , Joshua S. Stein 2 , Daniel Riley 2 , Craig Carmignani 2 1 PV Performance Labs, Freiburg, Germany 2 Sandia National Laboratories, Albuquerque, New Mexico Abstract - Accurate photovoltaic system performance monitoring is critical for profitable long-term operation. Irradiance, temperature, power, current and voltage signals contain rapid fluctuations that are not observable by typical monitoring systems. Nevertheless

  6. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  7. A Matter of Quantum Voltages

    SciTech Connect (OSTI)

    Sellner, Bernhard; Kathmann, Shawn M.

    2014-11-14

    Voltages inside matter are relevant to crystallization, materials science, biology, catalysis, and aqueous chemistry. Electron holography is able to measure the variation of voltages in matter and modern supercomputers allow the calculation of quantum voltages with practically unlimited spatial and temporal resolution of bulk systems. Of particular interest is the Mean Inner Potential (Vo) - the spatial average of these voltages. Voltages are very sensitive to the distribution of electrons and provide metrics to understand interactions in condensed phases. In the present study, we find excellent agreement with measurements of Vo for vitrified water and salt crystals and demonstrate the impact of covalent and ionic bonding as well as intermolecular/atomic interactions. Furthermore, we predict Vo as well as the fluctuations of these voltages in aqueous NaCl electrolytes and characterize the changes in their behavior as the resolution increases below the size of atoms. This work was supported by the U.S. Department of Energy, Office of Basic Energy Sciences, Division of Chemical Sciences, Geosciences & Biosciences. Pacific Northwest National Laboratory (PNNL) is a multiprogram national laboratory operated for DOE by Battelle. This research used resources of the National Energy Research Scientific Computing Center, which is supported by the Office of Science of the U.S. Department of Energy under Contract No. DE-AC02-05CH11231.

  8. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Rulemaking Security Rulemaking Transportation Security Rulemaking Activities PDF icon Security Rulemaking More Documents & Publications Transportation Security Rulemaking...

  9. Secure control systems with application to cyber-physical systems

    SciTech Connect (OSTI)

    Dong, Jin; Djouadi, Seddik M; Nutaro, James J; Kuruganti, Phani Teja

    2014-01-01

    Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

  10. inspection | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    inspection NNSA hosts international CTBT on-site inspection experts at Nevada National Security Site This month, NNSA hosted a Comprehensive Nuclear-Test-Ban Treaty (CTBT) on-site inspection activity at the Nevada National Security Site (NNSS). For the first time, CTBT surrogate inspectors and other inspection experts were able to visit NNSS, a former nuclear explosive test site that now supports

  11. PANTHER | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    PANTHER Managing the data deluge for national security analysts ALBUQUERQUE, N.M. - After a disaster or national tragedy, bits of information often are found afterward among vast amounts of available data that might have mitigated or even prevented what happened, had they been recognized ahead of time. In this information age, national security analysts often

  12. surveillance | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    surveillance Managing the data deluge for national security analysts ALBUQUERQUE, N.M. - After a disaster or national tragedy, bits of information often are found afterward among vast amounts of available data that might have mitigated or even prevented what happened, had they been recognized ahead of time. In this information age, national security analysts often

  13. Aviation security: A system's perspective

    SciTech Connect (OSTI)

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  14. NREL: Measurements and Characterization - Current Versus Voltage

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of devices, including: open-circuit voltage (Voc), short-circuit current (Isc), fill factor (FF), maximum power output of the device (Pmax), voltage at maximum power...

  15. Time

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 4 5 6 7 8 9 10 Time with respect to the BNB Trigger Time [µs] 0.9 1.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 Fractional Flash Count per 0.15 µs with respect to Cosmic Background Measured Cosmic Rate (Beam-Off) BNB Trigger Data (Beam-On) [4.51E18 POT]

  16. Time

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    10 15 20 Time with respect to the NuMI Trigger Time [µs] 0.9 1.0 1.1 1.2 1.3 1.4 1.5 Fractional Flash Count per 0.5 µs with respect to Cosmic Background Measured Cosmic Rate (Beam-Off) NuMI Trigger Data (Beam-On) [4.83E18 POT]

  17. National Security Science Archive

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science NSS Archive National Security Science Latest Issue:July 2015 past issues All Issues submit National Security Science Archive National Security Science magazine...

  18. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Security Council Reliable, secure, sustainable carbon energy solutions for the ... new ideas for reliable, secure and sustainable carbon neutral energy solutions for the ...

  19. ENERGY SUPPLY SECURITY 2014

    Broader source: Energy.gov (indexed) [DOE]

    Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries Secure Sustainable Together ENERGY SUPPLY SECURITY 2014 Emergency Response of IEA Countries ...

  20. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  1. Biological and Chemical Security

    SciTech Connect (OSTI)

    Fitch, P J

    2002-12-19

    The LLNL Chemical & Biological National Security Program (CBNP) provides science, technology and integrated systems for chemical and biological security. Our approach is to develop and field advanced strategies that dramatically improve the nation's capabilities to prevent, prepare for, detect, and respond to terrorist use of chemical or biological weapons. Recent events show the importance of civilian defense against terrorism. The 1995 nerve gas attack in Tokyo's subway served to catalyze and focus the early LLNL program on civilian counter terrorism. In the same year, LLNL began CBNP using Laboratory-Directed R&D investments and a focus on biodetection. The Nunn-Lugar-Domenici Defense Against Weapons of Mass Destruction Act, passed in 1996, initiated a number of U.S. nonproliferation and counter-terrorism programs including the DOE (now NNSA) Chemical and Biological Nonproliferation Program (also known as CBNP). In 2002, the Department of Homeland Security was formed. The NNSA CBNP and many of the LLNL CBNP activities are being transferred as the new Department becomes operational. LLNL has a long history in national security including nonproliferation of weapons of mass destruction. In biology, LLNL had a key role in starting and implementing the Human Genome Project and, more recently, the Microbial Genome Program. LLNL has over 1,000 scientists and engineers with relevant expertise in biology, chemistry, decontamination, instrumentation, microtechnologies, atmospheric modeling, and field experimentation. Over 150 LLNL scientists and engineers work full time on chemical and biological national security projects.

  2. Security system

    DOE Patents [OSTI]

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  3. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  4. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the computational, physics, and engineering capability spans multiple physics phenomenologies, engineering disciplines, and brings to bear massively parallel processing computational power to solve very complex problems that result in realistic estimates of potential consequences resulting from these types of postulated accidents. the Sar that is developed must go through rigorous external review before it goes to the national Security Council for approval prior to launch. this process provides

  5. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2014-0985P Sandia National Laboratories is introducing a binder- free pelletization process to fabricate industrially relevant pellets of porous catalysts and separations materials. This process enables the implementation of

  6. Security Rulemaking

    Office of Environmental Management (EM)

    Securing America's Clean Energy Future The Office of Energy Efficiency and Renewable Energy (EERE) invests in clean energy technologies that strengthen the economy, reduce dependence on foreign oil, and protect the environment. EERE leverages partnerships with the private sector, state and local governments, DOE national laboratories, and universities to transform the nation's economic engine to one powered by clean energy. EERE Programs 2011 Budget (in $ millions) EERE operates with $1.8

  7. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  8. Price Incentivised Electric Vehicle Charge Control for Community Voltage Regulation

    SciTech Connect (OSTI)

    Kelly, Damian; Baroncelli, Fabio; Fowler, Christopher; Boundy, David; Pratt, Annabelle

    2014-11-03

    With the growing availability of Electric Vehicles, there is a significant opportunity to use battery 'smart-charging' for voltage regulation. This work designs and experimentally evaluates a system for price-incentivised electric vehicle charging. The system is designed to eliminate negative impacts to the user while minimising the cost of charging and achieving a more favourable voltage behaviour throughout the local grid over time. The practical issues associated with a real-life deployment are identified and resolved. The efficacy of the system is evaluated in the challenging scenario in which EVs are deployed in six closely distributed homes, serviced by the same low voltage residential distribution feeder.

  9. Headquarters Security Quick Reference Book Headquarters Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Directive HSS Office of Health, Safety and Security HQ ... Regulations 707, a negative drug test result is required ... knowledgeable of security policy at HQ. Consult the HQFMSP ...

  10. Nuclear Security Enterprise | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    Nuclear Security Enterprise The Nuclear Security Enterprise ... efficient 21stcentury NSE with less environmental impact. ... is referred to as Stockpile Stewardship and Management. ...

  11. HIGH VOLTAGE ELECTRODES

    DOE Patents [OSTI]

    Murray, J.J.

    1963-04-23

    S>This patent relates to electrode structure for creating an intense direct current electric field which may have a field strength of the order of two to three times that heretofore obtained, with automatic suppression of arcing. The positive electrode is a conventional conductive material such as copper while the negative electrode is made from a special material having a resistivity greater than that of good conductors and less than that of good insulators. When an incipient arc occurs, the moderate resistivity of the negative electrode causes a momentary, localized decrease in the electric field intensity, thus suppressing the flow of electrons and avoiding arcing. Heated glass may be utilized for the negative electrode, since it provides the desired combination of resistivity, capacity, dielectric strength, mechani-cal strength, and thermal stability. (AEC)

  12. Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W Current work is centered on development of the Supercritical Carbon Dioxide (sCo2) Closed Brayton Cycle. Using supercritical fluids, Brayton Cycles can achieve higher energy conversion efficiencies in 1/100th of the volume and 1/10th the cost of comparable steam rankine cycles. the technology is being demonstrated in the nuclear Energy Systems laboratory/Brayton lab

  13. High voltage MOSFET switching circuit

    DOE Patents [OSTI]

    McEwan, T.E.

    1994-07-26

    The problem of source lead inductance in a MOSFET switching circuit is compensated for by adding an inductor to the gate circuit. The gate circuit inductor produces an inductive spike which counters the source lead inductive drop to produce a rectangular drive voltage waveform at the internal gate-source terminals of the MOSFET. 2 figs.

  14. High voltage MOSFET switching circuit

    DOE Patents [OSTI]

    McEwan, Thomas E.

    1994-01-01

    The problem of source lead inductance in a MOSFET switching circuit is compensated for by adding an inductor to the gate circuit. The gate circuit inductor produces an inductive spike which counters the source lead inductive drop to produce a rectangular drive voltage waveform at the internal gate-source terminals of the MOSFET.

  15. defense nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    defense nuclear security NNSA Announces 2014 Security Professional of the Year Awards WASHINGTON, D.C. - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards. Pamela Valdez from the Los Alamos Field Office will receive the federal award and Randy Fraser from... Michael Lempke receives NNSA's Gold Medal of Excellence DOE Undersecretary for Nuclear Security and NNSA

  16. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Notice Security Notice Security Information This website is part of a federal computer system used to accomplish federal functions. Y-12 uses software programs to monitor this website for security purposes to ensure it remains available to all users and to protect information in the system. By accessing this website, you are expressly consenting to these monitoring activities. Unauthorized attempts to defeat or circumvent security features; to use the system for other than intended

  17. International Nuclear Security | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) International Nuclear Security The International Nuclear Security program collaborates with partners world-wide to improve the security of proliferation-sensitive materials, particularly weapons-usable nuclear material in both civilian and non-civilian use in key countries. As part of these efforts, INS works with partner countries to: Upgrade and sustain physical security and material control and accounting systems; Develop national-level nuclear security infrastructure in areas such

  18. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  19. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1989-09-01

    Certain governmental information must be classified for national security reasons. However, the national security benefits from classifying information are usually accompanied by significant costs -- those due to a citizenry not fully informed on governmental activities, the extra costs of operating classified programs and procuring classified materials (e.g., weapons), the losses to our nation when advances made in classified programs cannot be utilized in unclassified programs. The goal of a classification system should be to clearly identify that information which must be protected for national security reasons and to ensure that information not needing such protection is not classified. This document was prepared to help attain that goal. This document is the first of a planned four-volume work that comprehensively discusses the security classification of information. Volume 1 broadly describes the need for classification, the basis for classification, and the history of classification in the United States from colonial times until World War 2. Classification of information since World War 2, under Executive Orders and the Atomic Energy Acts of 1946 and 1954, is discussed in more detail, with particular emphasis on the classification of atomic energy information. Adverse impacts of classification are also described. Subsequent volumes will discuss classification principles, classification management, and the control of certain unclassified scientific and technical information. 340 refs., 6 tabs.

  20. Job Types | National Nuclear Security Administration | (NNSA...

    National Nuclear Security Administration (NNSA)

    Protection * Civil * Environmental * Electrical Science ... Security * Nuclear Security * Personnel Security * Physical Security * Emergency Management * Intelligence Operations ...

  1. NERSC Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security NERSC Computer Security NERSC computer security efforts are aimed at protecting NERSC systems and its users' intellectual property from unauthorized access or modification. Among NERSC's security goal are: 1. To protect NERSC systems from unauthorized access. 2. To prevent the interruption of services to its users. 3. To prevent misuse or abuse of NERSC resources. Security Incidents If you think there has been a computer security incident you should contact NERSC Security as soon as

  2. National Critical Infrastructure Security and Resilience Month...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Assistant Secretary, Office of Electricity Delivery & Energy Reliability November is National Critical Infrastructure Security and Resilience Month, a time during which we ...

  3. Preproposal Conference & Site Tour | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    To allow time for security clearance and other administrative processing, Offerors must provide the requested information for the tour and briefing as soon as possible, but no ...

  4. High voltage photovoltaic power converter

    DOE Patents [OSTI]

    Haigh, Ronald E.; Wojtczuk, Steve; Jacobson, Gerard F.; Hagans, Karla G.

    2001-01-01

    An array of independently connected photovoltaic cells on a semi-insulating substrate contains reflective coatings between the cells to enhance efficiency. A uniform, flat top laser beam profile is illuminated upon the array to produce electrical current having high voltage. An essentially wireless system includes a laser energy source being fed through optic fiber and cast upon the photovoltaic cell array to prevent stray electrical signals prior to use of the current from the array. Direct bandgap, single crystal semiconductor materials, such as GaAs, are commonly used in the array. Useful applications of the system include locations where high voltages are provided to confined spaces such as in explosive detonation, accelerators, photo cathodes and medical appliances.

  5. Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  6. TRANSISTOR HIGH VOLTAGE POWER SUPPLY

    DOE Patents [OSTI]

    Driver, G.E.

    1958-07-15

    High voltage, direct current power supplies are described for use with battery powered nuclear detection equipment. The particular advantages of the power supply described, are increased efficiency and reduced size and welght brought about by the use of transistors in the circuit. An important feature resides tn the employment of a pair of transistors in an alternatefiring oscillator circuit having a coupling transformer and other circuit components which are used for interconnecting the various electrodes of the transistors.

  7. Security for grids

    SciTech Connect (OSTI)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  8. Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  9. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    receives hisher security clearance; the Annual Security Refresher Briefing, which must be completed each year by all those who hold a security clearance; and the Security ...

  10. CTBT | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    CTBT NNSA hosts international CTBT on-site inspection experts at Nevada National Security Site This month, NNSA hosted a Comprehensive Nuclear-Test-Ban Treaty (CTBT) on-site inspection activity at the Nevada National Security Site (NNSS). For the first time, CTBT surrogate inspectors and other inspection experts were able to visit NNSS, a former nuclear explosive test site that now supports... Head of Comprehensive Nuclear-Test-Ban Treaty Organization (CTBTO) Preparatory Commission Visits NNSA's

  11. National Security Science July 2014

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    July 2014 Also in this issue What's in the U.S. Nuclear Stockpile? Secrecy and Surveillance: Threats to National Security? July 2014 Los Alamos National Laboratory Los Alamos National Laboratory This issue presents three very personal and timely perspectives on current national security topics. The first perspective regards the events leading up to the birth of the Stockpile Stewardship Program and follows with a personal assessment of the program's current health. As seen by Joe Martz, a Los

  12. intelligence | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    intelligence Managing the data deluge for national security analysts ALBUQUERQUE, N.M. - After a disaster or national tragedy, bits of information often are found afterward among vast amounts of available data that might have mitigated or even prevented what happened, had they been recognized ahead of time. In this information age, national security analysts often... Bruce Held Announces Retirement After Nearly 40 Years of Public Service After nearly four decades of public service, Bruce Held,

  13. Eliminate Voltage Unbalance | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Voltage unbalance degrades the performance and shortens the life of a three-phase motor. Voltage unbalance at the motor terminals can cause current unbalance that is far out of ...

  14. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6

  15. Voltage Control Devices on the IEEE 8500 Node Test Feeder

    SciTech Connect (OSTI)

    Schneider, Kevin P.; Fuller, Jason C.

    2010-01-06

    The IEEE Test Cases provide researchers with distribution system models that can be used to validate new analytic methods. The newest of these models is the 8500-node test feeder which contains multiple devices for voltage control. In addition to a substation regulator there are multiple inline regulators as well as capacitor banks. This paper will discuss the detail in which voltage control devises should be modeled when examining large distribution systems. This discussion will include issues associated with power flow analysis for a single time step as well as for time series analysis.

  16. Radiological Security | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Nonproliferation / Global Material Security Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned radioactive sources; promoting the replacement of radioactive sources with non-isotopic technologies, where feasible; and increasing security where

  17. national security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security Klotz visits Y-12 to see progress on new projects and ongoing work on NNSA's national security missions Last week, NNSA Administrator Lt. Gen. Frank Klotz (Ret.) visited the Y-12 National Security Complex to check on the status of ongoing projects like the Uranium Processing Facility as well as the site's continuing uranium operations. He also met with the Region 2 volunteers of the Radiogical... Managing the data deluge for national security analysts ALBUQUERQUE, N.M. - After a

  18. Defense Nuclear Security | National Nuclear Security Administration...

    National Nuclear Security Administration (NNSA)

    This responsibility includes the physical, materials control and accounting, classified and sensitive information protection, personnel, technical, and cyber security programs. ...

  19. Security guide for subcontractors

    SciTech Connect (OSTI)

    Adams, R.C.

    1991-01-01

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  20. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Secure Manufacturing Secure Manufacturing The depth and breadth of Y-12's manufacturing capabilities and expertise enable Y-12 to address current and emerging national security challenges by providing leadership and direction to perform the following activities: solving unique, high-risk manufacturing problems; eliminating the most difficult manufacturability and development obstacles; protecting classified and proprietary materials, components, and information; developing unique technologies to

  1. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  2. National Security Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science National Security Science Latest Issue:July 2015 past issues All Issues submit National Security Science Showcasing Los Alamos National Laboratory's work on nuclear...

  3. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    This position is located in the Office of Associate Under Secretary for Environment, Health, Safety, and Security (AU), Office of Headquarters Personnel Security Operations. A successful candidate...

  4. Information Technology Specialist (Security)

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as an Information Technology Specialist (Security) responsible for providing technical support in the information security environment which...

  5. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration Office of ...

  6. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical Services Y-12, LLC Performance Evaluation Report NNSA Production Office Y-12 Nuclear Security Complex ...

  7. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    U.S. Department of Energy National Nuclear Security Administration Federal Equal ... A. Name and Address of Agency National Nuclear Security Administration 1000 Independence ...

  8. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    15 National Nuclear Security Administration FY 2013 PER Babcock & Wilcox Technical ... The National Nuclear Security Administration (NNSA) Production Office (NPO) took into ...

  9. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  10. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    We use our nuclear materials and forensics expertise to help solve national security ... materials, security and consequence management, and manufacturing and technical ...

  11. Office of Security Assessments

    Broader source: Energy.gov [DOE]

    The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and security policies and programs throughout the Department, including...

  12. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Prepared by U.S. Department of Energy National Nuclear Security Administration Nevada Field Office . Environmental Management Operations February 2015 Nevada National Security ...

  13. VOLTAGE-CONTROLLED TRANSISTOR OSCILLATOR

    DOE Patents [OSTI]

    Scheele, P.F.

    1958-09-16

    This patent relates to transistor oscillators and in particular to those transistor oscillators whose frequencies vary according to controlling voltages. A principal feature of the disclosed transistor oscillator circuit resides in the temperature compensation of the frequency modulating stage by the use of a resistorthermistor network. The resistor-thermistor network components are selected to have the network resistance, which is in series with the modulator transistor emitter circuit, vary with temperature to compensate for variation in the parameters of the transistor due to temperature change.

  14. High voltage RF feedthrough bushing

    DOE Patents [OSTI]

    Grotz, Glenn F.

    1984-01-01

    Described is a multi-element, high voltage radio frequency bushing for trmitting RF energy to an antenna located in a vacuum container. The bushing includes a center conductor of complex geometrical shape, an outer coaxial shield conductor, and a thin-walled hollow truncated cone insulator disposed between central and outer conductors. The shape of the center conductor, which includes a reverse curvature portion formed of a radially inwardly directed shoulder and a convex portion, controls the uniformity of the axial surface gradient on the insulator cone. The outer shield has a first substantially cylindrical portion and a second radially inwardly extending truncated cone portion.

  15. High Voltage GaN Schottky Rectifiers

    SciTech Connect (OSTI)

    CAO,X.A.; CHO,H.; CHU,S.N.G.; CHUO,C.-C.; CHYI,J.-I.; DANG,G.T.; HAN,JUNG; LEE,C.-M.; PEARTON,S.J.; REN,F.; WILSON,R.G.; ZHANG,A.P.

    1999-10-25

    Mesa and planar GaN Schottky diode rectifiers with reverse breakdown voltages (V{sub RB}) up to 550V and >2000V, respectively, have been fabricated. The on-state resistance, R{sub ON}, was 6m{Omega}{center_dot} cm{sup 2} and 0.8{Omega}cm{sup 2}, respectively, producing figure-of-merit values for (V{sub RB}){sup 2}/R{sub ON} in the range 5-48 MW{center_dot}cm{sup -2}. At low biases the reverse leakage current was proportional to the size of the rectifying contact perimeter, while at high biases the current was proportional to the area of this contact. These results suggest that at low reverse biases, the leakage is dominated by the surface component, while at higher biases the bulk component dominates. On-state voltages were 3.5V for the 550V diodes and {ge}15 for the 2kV diodes. Reverse recovery times were <0.2{micro}sec for devices switched from a forward current density of {approx}500A{center_dot}cm{sup -2} to a reverse bias of 100V.

  16. Predictive Dynamic Security Assessment through Advanced Computing

    SciTech Connect (OSTI)

    Huang, Zhenyu; Diao, Ruisheng; Jin, Shuangshuang; Chen, Yousu

    2014-11-30

    Abstract— Traditional dynamic security assessment is limited by several factors and thus falls short in providing real-time information to be predictive for power system operation. These factors include the steady-state assumption of current operating points, static transfer limits, and low computational speed. This addresses these factors and frames predictive dynamic security assessment. The primary objective of predictive dynamic security assessment is to enhance the functionality and computational process of dynamic security assessment through the use of high-speed phasor measurements and the application of advanced computing technologies for faster-than-real-time simulation. This paper presents algorithms, computing platforms, and simulation frameworks that constitute the predictive dynamic security assessment capability. Examples of phasor application and fast computation for dynamic security assessment are included to demonstrate the feasibility and speed enhancement for real-time applications.

  17. Addressing Security and Reliability Concerns of Large Power Transformers |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Services » Addressing Security and Reliability Concerns of Large Power Transformers Addressing Security and Reliability Concerns of Large Power Transformers Large power transformers (LPTs) are critical to the nation's power grid, with more than 90 percent of consumed power passing through high-voltage transformers at some point. LPTs, however, face a number of challenges that make them one of the most vulnerable components on the grid. They are expensive, difficult to

  18. Method for voltage-gated protein fractionation (Patent) | DOEPatents

    Office of Scientific and Technical Information (OSTI)

    Method for voltage-gated protein fractionation Title: Method for voltage-gated protein fractionation We report unique findings on the voltage dependence of protein exclusion from ...

  19. Low power, scalable multichannel high voltage controller

    DOE Patents [OSTI]

    Stamps, James Frederick; Crocker, Robert Ward; Yee, Daniel Dadwa; Dils, David Wright

    2008-03-25

    A low voltage control circuit is provided for individually controlling high voltage power provided over bus lines to a multitude of interconnected loads. An example of a load is a drive for capillary channels in a microfluidic system. Control is distributed from a central high voltage circuit, rather than using a number of large expensive central high voltage circuits to enable reducing circuit size and cost. Voltage is distributed to each individual load and controlled using a number of high voltage controller channel switches connected to high voltage bus lines. The channel switches each include complementary pull up and pull down photo isolator relays with photo isolator switching controlled from the central high voltage circuit to provide a desired bus line voltage. Switching of the photo isolator relays is further controlled in each channel switch using feedback from a resistor divider circuit to maintain the bus voltage swing within desired limits. Current sensing is provided using a switched resistive load in each channel switch, with switching of the resistive loads controlled from the central high voltage circuit.

  20. Low power, scalable multichannel high voltage controller

    DOE Patents [OSTI]

    Stamps, James Frederick; Crocker, Robert Ward; Yee, Daniel Dadwa; Dils, David Wright

    2006-03-14

    A low voltage control circuit is provided for individually controlling high voltage power provided over bus lines to a multitude of interconnected loads. An example of a load is a drive for capillary channels in a microfluidic system. Control is distributed from a central high voltage circuit, rather than using a number of large expensive central high voltage circuits to enable reducing circuit size and cost. Voltage is distributed to each individual load and controlled using a number of high voltage controller channel switches connected to high voltage bus lines. The channel switches each include complementary pull up and pull down photo isolator relays with photo isolator switching controlled from the central high voltage circuit to provide a desired bus line voltage. Switching of the photo isolator relays is further controlled in each channel switch using feedback from a resistor divider circuit to maintain the bus voltage swing within desired limits. Current sensing is provided using a switched resistive load in each channel switch, with switching of the resistive loads controlled from the central high voltage circuit.

  1. Comparative study of 0° X-cut and Y+36°-cut lithium niobate high-voltage sensing

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Patel, N.; Branch, D. W.; Schamiloglu, E.; Cular, S.

    2015-08-11

    A comparison study between Y+36° and 0° X-cut lithium niobate (LiNbO3) was performed to evaluate the influence of crystal cut on the acoustic propagation to realize a piezoelectric high-voltage sensor. The acoustic time-of-flight for each crystal cut was measured when applying direct current (DC), alternating current (AC), and pulsed voltages. Results show that the voltage-induced shift in the acoustic wave propagation time scaled quadratically with voltage for DC and AC voltages applied to X-cut crystals. For the Y+36° crystal, the voltage-induced shift scales linearly with DC voltages and quadratically with AC voltages. When applying 5 μs voltage pulses to bothmore »crystals, the voltage-induced shift scaled linearly with voltage. For the Y+36° cut, the voltage-induced shift from applying DC voltages ranged from 10 to 54 ps and 35 to 778 ps for AC voltages at 640 V over the frequency range of 100 Hz–100 kHz. Using the same conditions as the Y+36° cut, the 0° X-cut crystal sensed a shift of 10–273 ps for DC voltages and 189–813 ps for AC voltage application. For 5 μs voltage pulses, the 0° X-cut crystal sensed a voltage induced shift of 0.250–2 ns and the Y+36°-cut crystal sensed a time shift of 0.115–1.6 ns. This suggests a frequency sensitive response to voltage where the influence of the crystal cut was not a significant contributor under DC, AC, or pulsed voltage conditions. The measured DC data were compared to a 1-D impedance matrix model where the predicted incremental length changed as a function of voltage. Furthermore, when the voltage source error was eliminated through physical modeling from the uncertainty budget, the combined uncertainty of the sensor (within a 95% confidence interval) decreased to 0.0033% using a Y + 36°-cut crystal and 0.0032% using an X-cut crystal for all the voltage conditions used in this experiment.« less

  2. Comparative study of 0° X-cut and Y + 36°-cut lithium niobate high-voltage sensing

    SciTech Connect (OSTI)

    Patel, N.; Branch, D. W.; Cular, S.; Schamiloglu, E.

    2015-08-15

    A comparison study between Y + 36° and 0° X-cut lithium niobate (LiNbO{sub 3}) was performed to evaluate the influence of crystal cut on the acoustic propagation to realize a piezoelectric high-voltage sensor. The acoustic time-of-flight for each crystal cut was measured when applying direct current (DC), alternating current (AC), and pulsed voltages. Results show that the voltage-induced shift in the acoustic wave propagation time scaled quadratically with voltage for DC and AC voltages applied to X-cut crystals. For the Y + 36° crystal, the voltage-induced shift scales linearly with DC voltages and quadratically with AC voltages. When applying 5 μs voltage pulses to both crystals, the voltage-induced shift scaled linearly with voltage. For the Y + 36° cut, the voltage-induced shift from applying DC voltages ranged from 10 to 54 ps and 35 to 778 ps for AC voltages at 640 V over the frequency range of 100 Hz–100 kHz. Using the same conditions as the Y + 36° cut, the 0° X-cut crystal sensed a shift of 10–273 ps for DC voltages and 189–813 ps for AC voltage application. For 5 μs voltage pulses, the 0° X-cut crystal sensed a voltage induced shift of 0.250–2 ns and the Y + 36°-cut crystal sensed a time shift of 0.115–1.6 ns. This suggests a frequency sensitive response to voltage where the influence of the crystal cut was not a significant contributor under DC, AC, or pulsed voltage conditions. The measured DC data were compared to a 1-D impedance matrix model where the predicted incremental length changed as a function of voltage. When the voltage source error was eliminated through physical modeling from the uncertainty budget, the combined uncertainty of the sensor (within a 95% confidence interval) decreased to 0.0033% using a Y + 36°-cut crystal and 0.0032% using an X-cut crystal for all the voltage conditions used in this experiment.

  3. Comparative study of 0° X-cut and Y+36°-cut lithium niobate high-voltage sensing

    SciTech Connect (OSTI)

    Patel, N.; Branch, D. W.; Schamiloglu, E.; Cular, S.

    2015-08-11

    A comparison study between Y+36° and 0° X-cut lithium niobate (LiNbO3) was performed to evaluate the influence of crystal cut on the acoustic propagation to realize a piezoelectric high-voltage sensor. The acoustic time-of-flight for each crystal cut was measured when applying direct current (DC), alternating current (AC), and pulsed voltages. Results show that the voltage-induced shift in the acoustic wave propagation time scaled quadratically with voltage for DC and AC voltages applied to X-cut crystals. For the Y+36° crystal, the voltage-induced shift scales linearly with DC voltages and quadratically with AC voltages. When applying 5 μs voltage pulses to both crystals, the voltage-induced shift scaled linearly with voltage. For the Y+36° cut, the voltage-induced shift from applying DC voltages ranged from 10 to 54 ps and 35 to 778 ps for AC voltages at 640 V over the frequency range of 100 Hz–100 kHz. Using the same conditions as the Y+36° cut, the 0° X-cut crystal sensed a shift of 10–273 ps for DC voltages and 189–813 ps for AC voltage application. For 5 μs voltage pulses, the 0° X-cut crystal sensed a voltage induced shift of 0.250–2 ns and the Y+36°-cut crystal sensed a time shift of 0.115–1.6 ns. This suggests a frequency sensitive response to voltage where the influence of the crystal cut was not a significant contributor under DC, AC, or pulsed voltage conditions. The measured DC data were compared to a 1-D impedance matrix model where the predicted incremental length changed as a function of voltage. Furthermore, when the voltage source error was eliminated through physical modeling from the uncertainty budget, the combined uncertainty of the sensor (within a 95% confidence interval) decreased to 0.0033% using a Y + 36°-cut crystal and 0.0032% using an X-cut crystal for all the voltage conditions used in this experiment.

  4. Comparative study of 0° X-cut and Y+36°-cut lithium niobate high-voltage sensing

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Patel, N.; Branch, D. W.; Schamiloglu, E.; Cular, S.

    2015-08-11

    A comparison study between Y+36° and 0° X-cut lithium niobate (LiNbO3) was performed to evaluate the influence of crystal cut on the acoustic propagation to realize a piezoelectric high-voltage sensor. The acoustic time-of-flight for each crystal cut was measured when applying direct current (DC), alternating current (AC), and pulsed voltages. Results show that the voltage-induced shift in the acoustic wave propagation time scaled quadratically with voltage for DC and AC voltages applied to X-cut crystals. For the Y+36° crystal, the voltage-induced shift scales linearly with DC voltages and quadratically with AC voltages. When applying 5 μs voltage pulses to bothmore » crystals, the voltage-induced shift scaled linearly with voltage. For the Y+36° cut, the voltage-induced shift from applying DC voltages ranged from 10 to 54 ps and 35 to 778 ps for AC voltages at 640 V over the frequency range of 100 Hz–100 kHz. Using the same conditions as the Y+36° cut, the 0° X-cut crystal sensed a shift of 10–273 ps for DC voltages and 189–813 ps for AC voltage application. For 5 μs voltage pulses, the 0° X-cut crystal sensed a voltage induced shift of 0.250–2 ns and the Y+36°-cut crystal sensed a time shift of 0.115–1.6 ns. This suggests a frequency sensitive response to voltage where the influence of the crystal cut was not a significant contributor under DC, AC, or pulsed voltage conditions. The measured DC data were compared to a 1-D impedance matrix model where the predicted incremental length changed as a function of voltage. Furthermore, when the voltage source error was eliminated through physical modeling from the uncertainty budget, the combined uncertainty of the sensor (within a 95% confidence interval) decreased to 0.0033% using a Y + 36°-cut crystal and 0.0032% using an X-cut crystal for all the voltage conditions used in this experiment.« less

  5. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  6. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  7. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  8. Chapter 3: Energy Security

    SciTech Connect (OSTI)

    Foust, Thomas D.; Arent, Doug; de Carvalho Macedo, Isaias; Goldemberg, Jose; Hoysala, Chanakya; Filho, Rubens Maciel; Nigro, Francisco E. B.; Richard, Tom L.; Saddler, Jack; Samseth, Jon; Somerville, Chris R.

    2015-04-01

    This chapter considers the energy security implications and impacts of bioenergy. We provide an assessment to answer the following questions: What are the implications for bioenergy and energy security within the broader policy environment that includes food and water security, development, economic productivity, and multiple foreign policy aspects? What are the conditions under which bioenergy contributes positively to energy security?

  9. INDUCTIVE VOLTAGE ADDER NETWORK ANALYSIS AND MODEL SIMPLIFICATION.

    SciTech Connect (OSTI)

    ZHANG,W.; NG, W.; PAI, C.; SANDBERG, J.; TAN, Y.; TIAN, Y.

    2007-06-17

    Inductive voltage adder topology has attracted great attentions in pulse power community for near two decades. However, there has been lack of literatures on inductive voltage adder network analysis and circuit design model. We have recently developed a simplified model and a set of simple formulas. An expanded model and more detailed analysis are presented in this paper. Our model reveals the relationship of output waveform parameters and hardware designs. Computer simulations have demonstrated that parameter estimation based on this approach is accurate. This approach can be used in early stages of project development to assist feasibility study, geometry selection in engineering design, and parameter selection of critical components. A set of fundamental estimation formulas including system impedance, rise time, and number of stages are presented. This approach is also applicable to induction LINAC design. In addition, the model presented in this paper shows a new topology of high voltage waveform generator.

  10. High voltage load resistor array

    DOE Patents [OSTI]

    Lehmann, Monty Ray

    2005-01-18

    A high voltage resistor comprising an array of a plurality of parallel electrically connected resistor elements each containing a resistive solution, attached at each end thereof to an end plate, and about the circumference of each of the end plates, a corona reduction ring. Each of the resistor elements comprises an insulating tube having an electrode inserted into each end thereof and held in position by one or more hose clamps about the outer periphery of the insulating tube. According to a preferred embodiment, the electrode is fabricated from stainless steel and has a mushroom shape at one end, that inserted into the tube, and a flat end for engagement with the end plates that provides connection of the resistor array and with a load.

  11. High voltage feed through bushing

    DOE Patents [OSTI]

    Brucker, J.P.

    1993-04-06

    A feed through bushing for a high voltage diode provides for using compression sealing for all sealing surfaces. A diode assembly includes a central conductor extending through the bushing and a grading ring assembly circumferentially surrounding and coaxial with the central conductor. A flexible conductive plate extends between and compressively seals against the central conductor and the grading ring assembly, wherein the flexibility of the plate allows inner and outer portions of the plate to axially translate for compression sealing against the central conductor and the grading ring assembly, respectively. The inner portion of the plate is bolted to the central conductor for affecting sealing. A compression beam is also bolted to the central conductor and engages the outer portion of the plate to urge the outer portion toward the grading ring assembly to obtain compression sealing therebetween.

  12. REAL TIME SYSTEM OPERATIONS 2006-2007

    SciTech Connect (OSTI)

    Eto, Joseph H.; Parashar, Manu; Lewis, Nancy Jo

    2008-08-15

    The Real Time System Operations (RTSO) 2006-2007 project focused on two parallel technical tasks: (1) Real-Time Applications of Phasors for Monitoring, Alarming and Control; and (2) Real-Time Voltage Security Assessment (RTVSA) Prototype Tool. The overall goal of the phasor applications project was to accelerate adoption and foster greater use of new, more accurate, time-synchronized phasor measurements by conducting research and prototyping applications on California ISO's phasor platform - Real-Time Dynamics Monitoring System (RTDMS) -- that provide previously unavailable information on the dynamic stability of the grid. Feasibility assessment studies were conducted on potential application of this technology for small-signal stability monitoring, validating/improving existing stability nomograms, conducting frequency response analysis, and obtaining real-time sensitivity information on key metrics to assess grid stress. Based on study findings, prototype applications for real-time visualization and alarming, small-signal stability monitoring, measurement based sensitivity analysis and frequency response assessment were developed, factory- and field-tested at the California ISO and at BPA. The goal of the RTVSA project was to provide California ISO with a prototype voltage security assessment tool that runs in real time within California ISO?s new reliability and congestion management system. CERTS conducted a technical assessment of appropriate algorithms, developed a prototype incorporating state-of-art algorithms (such as the continuation power flow, direct method, boundary orbiting method, and hyperplanes) into a framework most suitable for an operations environment. Based on study findings, a functional specification was prepared, which the California ISO has since used to procure a production-quality tool that is now a part of a suite of advanced computational tools that is used by California ISO for reliability and congestion management.

  13. Personnel Security Program | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Personnel Security Program NNSA is responsible for managing national nuclear security and supports several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and Administration and the Office of the Administrator. Each program area is focused on specific challenges. The Office of Personnel & Facility Clearances & Classification (OPFCC) is part of the NNSA, Office of

  14. physical security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    physical security Sandia employee dubbed a master at locking down NNSA's enterprise NNSA's primary missions include keeping dangerous materials out of the wrong hands while protecting and maintaining the nation's nuclear deterrent. It's no surprise, then, that NNSA's labs and sites employ the best experts available in security. At NNSA's Sandia... DOE, NNSA leaders open summit on the physical security of nuclear weapons Deputy Secretary of Energy Elizabeth Sherwood-Randall, NNSA Principal Deputy

  15. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Security Summit U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA Hosts 11th U.S.-China Peaceful Uses of Nuclear Technology Meeting at Savannah River National Laboratory in Aiken, South Carolina (Aiken, South Carolina) - On May 10-11, 2016 the U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) and the China... Statement on Signing of the Administrative Arrangement to the Agreement for

  16. nuclear security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security U.S. and China Continue Cooperative Partnership to Advance Safe, Secure Civil Nuclear Energy for Clean Energy Future DOE/NNSA Hosts 11th U.S.-China Peaceful Uses of Nuclear Technology Meeting at Savannah River National Laboratory in Aiken, South Carolina (Aiken, South Carolina) - On May 10-11, 2016 the U.S. Department of Energy's (DOE) National Nuclear Security Administration (NNSA) and the China... Secretary Moniz awards Hutcheon memorial nonproliferation fellowship to Thomas Gray

  17. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security We train nuclear industry professionals, emergency responders and security forces from around the world to safeguard vulnerable materials. Nuclear nonproliferation - stopping the spread of nuclear materials - is a critical part of creating a safer world. Y-12 has been working in nonproliferation since the early 1990s in more than 25 countries. As the nation reduces the size of its arsenal, Y-12 will play a central role in decommissioning weapons systems and

  18. Security Forms | National Nuclear Security Administration | (NNSA)

    National Nuclear Security Administration (NNSA)

    Security Forms U.S. Department of Energy / U.S. Nuclear Regulatory Commission Nuclear Materials Management & Safeguards System Security Forms Federal Information Processing Standards Publications (FIPS PUBS) FIPS-Associated Documents FIPS 140-2 Security Requirements for Cryptograhic Modules FIPS 185 Escrowed Encryption Standard (EES) FIPS 186-2 Digital Signature Standard (DSS) From Microsoft From VeriSign Managing Contacts' Digital Certificates with Netscape Communicator Managing Contacts'

  19. protective forces | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    protective forces Design Basis Threat NNSA has taken aggressive action to improve the security of its nuclear weapons material (often referred to as special nuclear material, or SNM) and nuclear weapons in its custody. One major challenge has been, and remains, ensuring that SNM is well protected, while at the same time,... Information Security Information security deals with requirements for the protection and control of information and matter required to be classified or controlled by

  20. Presidential Initiatives | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Home Presidential Initiatives Bratislava Nuclear Security Initiative: President Putin and President Bush agreed to pursue an initiative on nuclear security cooperation at a February 2005 summit in Bratislava, Slovak Republic. This agreement includes for the first time a comprehensive joint action plan for the cooperation on security upgrades of Russian nuclear facilities at Rosatom and Ministry of Defense sites, and cooperation in the areas of nuclear regulatory development,

  1. Dynamic voltage-current characteristics for a water jet plasma arc

    SciTech Connect (OSTI)

    Yang Jiaxiang; Lan Sheng; Xu Zuoming

    2008-05-05

    A virtual instrument technology is used to measure arc current, arc voltage, dynamic V-I characteristics, and nonlinear conductance for a cone-shaped water jet plasma arc under ac voltage. Experimental results show that ac arc discharge mainly happens in water vapor evaporated from water when heated. However, due to water's cooling effect and its conductance, arc conductance, reignition voltage, extinguish voltage, and current zero time are very different from those for ac arc discharge in gas work fluid. These can be valuable to further studies on mechanism and characteristics of plasma ac discharge in water, and even in gas work fluid.

  2. Wind Power Plant Voltage Stability Evaluation: Preprint

    SciTech Connect (OSTI)

    Muljadi, E.; Zhang, Y. C.

    2014-09-01

    Voltage stability refers to the ability of a power system to maintain steady voltages at all buses in the system after being subjected to a disturbance from a given initial operating condition. Voltage stability depends on a power system's ability to maintain and/or restore equilibrium between load demand and supply. Instability that may result occurs in the form of a progressive fall or rise of voltages of some buses. Possible outcomes of voltage instability are the loss of load in an area or tripped transmission lines and other elements by their protective systems, which may lead to cascading outages. The loss of synchronism of some generators may result from these outages or from operating conditions that violate a synchronous generator's field current limit, or in the case of variable speed wind turbine generator, the current limits of power switches. This paper investigates the impact of wind power plants on power system voltage stability by using synchrophasor measurements.

  3. port security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA Transfers Responsibility for Radiation Detection System to China Customs SHANGHAI, CHINA - Today, the Nuclear Security Administration's (NNSA) Principal Assistant Deputy ...

  4. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    our website, please follow these instructions. More... Category: Security Emergency Vocabulary These are terms you might hear during an emergency situation. More... Category:...

  5. Physical Security Systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NNSA uses, for example, concrete blocks, razor-wire barriers, and steel-plated fighting positions to upgrade its physical security features. It has eliminated public access to ...

  6. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Highly Enriched Uranium Materials Facility is a massive concrete and steel structure ... HEUMF is a massive concrete and steel structure that provides maximum security for the ...

  7. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    ... non-classified portion of the review process. The Federal Project Director and appropriate DOEEM-HQ line management and security representatives must coordinate the classified ...

  8. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to repositories. In commenting on a draft ...

  9. National Nuclear Security Administration | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) National Nuclear Security Administration FY15 Year End Report Semi Annual Report FY14 Year End Report Semi Annual

  10. Security Policy, Guidance & Reports

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive. The Office is responsible for the principal personnel security information processing activities of the Department and personnel security administrative review process. The Office of Headquarters Security Operations provides oversight and direction support to all Headquarters security operations to include physical protection, information security, personnel security, and guidance to the Headquarters Security Officers (HSO).

  11. Group 3: Humidity, Temperature, and Voltage (Presentation)

    SciTech Connect (OSTI)

    Wohlgemuth, J.

    2013-05-01

    Group 3 is chartered to develop accelerated stress tests that can be used as comparative predictors of module lifetime versus stresses associated with humidity, temperature and voltage.

  12. TIME CALIBRATED OSCILLOSCOPE SWEEP

    DOE Patents [OSTI]

    Owren, H.M.; Johnson, B.M.; Smith, V.L.

    1958-04-22

    The time calibrator of an electric signal displayed on an oscilloscope is described. In contrast to the conventional technique of using time-calibrated divisions on the face of the oscilloscope, this invention provides means for directly superimposing equal time spaced markers upon a signal displayed upon an oscilloscope. More explicitly, the present invention includes generally a generator for developing a linear saw-tooth voltage and a circuit for combining a high-frequency sinusoidal voltage of a suitable amplitude and frequency with the saw-tooth voltage to produce a resultant sweep deflection voltage having a wave shape which is substantially linear with respect to time between equal time spaced incremental plateau regions occurring once each cycle of the sinusoidal voltage. The foregoing sweep voltage when applied to the horizontal deflection plates in combination with a signal to be observed applied to the vertical deflection plates of a cathode ray oscilloscope produces an image on the viewing screen which is essentially a display of the signal to be observed with respect to time. Intensified spots, or certain other conspicuous indications corresponding to the equal time spaced plateau regions of said sweep voltage, appear superimposed upon said displayed signal, which indications are therefore suitable for direct time calibration purposes.

  13. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Global Material Security NNSA Provides Tajikistan Specialized Vehicles to Transport Radiological Materials NNSA Program Manager Nick Cavellero, right, and NRSA Director of the Department of Information and International Relations Ilkhom Mirsaidov, left, with two specialized vehicles purchased by NNSA for Tajikistan. WASHINGTON - The Department of Energy's National Nuclear Security Administration (DOE/

  14. SECURITY AND CYBER REPORTS | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    SECURITY AND CYBER REPORTS SECURITY AND CYBER REPORTS Office of Security Assessments Office of Security Assessments - Report Titles

  15. Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security by Website Administrator Back

  16. ANL | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    ANL First-of-its-Kind NNSA Capability to Support Study of Materials at Extreme Conditions for Stockpile Stewardship WASHINGTON - A new first-of-its-kind-worldwide research capability will help unravel the mysteries of material behavior at extreme conditions and short time scales in support of the Department of Energy's National Nuclear Security Administration's (DOE/NNSA's) vital

  17. Interfacial morphology of low-voltage anodic aluminium oxide

    SciTech Connect (OSTI)

    Hu, Naiping; Dongcinn, Xuecheng; He, Xueying; Argekar, Sandip; Zhang, Yan; Browning, Jim; Schaefer, Dale

    2013-01-01

    X-ray reflectivity (XRR) and neutron reflectivity (NR), as well as ultra-smallangle X-ray scattering (USAXS), are used to examine the in-plane and surfacenormal structure of anodic films formed on aluminium alloy AA2024 and pure aluminium. Aluminium and alloy films up to 3500 A thick were deposited on Si wafers by electron beam evaporation of ingots. Porous anodic aluminium oxide (AAO) films are formed by polarizing at constant voltage up to 20 V noble to the open circuit potential. The voltage sweet spot (5 V) appropriate for constant-voltage anodization of such thin films was determined for both alloy and pure Al. In addition, a new concurrent voltage- and current-control protocol was developed to prepare films with larger pores (voltages higher than 5 V), but formed at a controlled current so that pore growth is slow enough to avoid stripping the aluminium substrate layer. USAXS shows that the pore size and interpore spacing are fixed in the first 10 s after initiation of anodization. Pores then grow linearly in time, at constant radius and interpore spacing. Using a combination of XRR and NR, the film density and degree of hydration of the films were determined from the ratio of scattering length densities. Assuming a chemical formula Al2O3xH2O, it was found that x varies from 0.29 for the native oxide to 1.29 for AAO grown at 20 V under concurrent voltage and current control. The average AAO film density of the porous film at the air surface is 2.45 (20) g cm3. The density of the barrier layer at the metal interface is 2.9 (4) g cm3, which indicates that this layer is also quite porous

  18. data analysis | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    data analysis Managing the data deluge for national security analysts ALBUQUERQUE, N.M. - After a disaster or national tragedy, bits of information often are found afterward among vast amounts of available data that might have mitigated or even prevented what happened, had they been recognized ahead of time. In this information age, national security analysts often

  19. Lockout device for high voltage circuit breaker

    DOE Patents [OSTI]

    Kozlowski, Lawrence J.; Shirey, Lawrence A.

    1993-01-01

    An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the repsective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.

  20. Lockout device for high voltage circuit breaker

    DOE Patents [OSTI]

    Kozlowski, L.J.; Shirey, L.A.

    1993-01-26

    An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the respective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.

  1. Macro Security Methodology for Conducting Facility Security and Sustainability Assessments

    SciTech Connect (OSTI)

    Herdes, Greg A.; Freier, Keith D.; Wright, Kyle A.

    2007-07-09

    Pacific Northwest National Laboratory (PNNL) has developed a macro security strategy that not only addresses traditional physical protection systems, but also focuses on sustainability as part of the security assessment and management process. This approach is designed to meet the needs of virtually any industry or environment requiring critical asset protection. PNNL has successfully demonstrated the utility of this macro security strategy through its support to the NNSA Office of Global Threat Reduction implementing security upgrades at international facilities possessing high activity radioactive sources that could be used in the assembly of a radiological dispersal device, commonly referred to as a dirty bomb. Traditional vulnerability assessments provide a snap shot in time of the effectiveness of a physical protection system without significant consideration to the sustainability of the component elements that make up the system. This paper describes the approach and tools used to integrate technology, plans and procedures, training, and sustainability into a simple, quick, and easy-to-use security assessment and management tool.

  2. Nevada National Security Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    April 24, 2014 Cultural Artifacts Cross Eras at the Nevada National Security Site It is well known that the Nevada National Security Site (NNSS) is home to many artifacts from the ...

  3. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  4. Security Clearances; Limitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    may not grant or renew a security clearance for a covered person who is an unlawful ... may not grant or renew a security clearance described in paragraph (3) for a covered ...

  5. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  6. Office of Security Policy

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  7. Voltage regulation in linear induction accelerators

    DOE Patents [OSTI]

    Parsons, William M.

    1992-01-01

    Improvement in voltage regulation in a Linear Induction Accelerator wherein a varistor, such as a metal oxide varistor, is placed in parallel with the beam accelerating cavity and the magnetic core. The non-linear properties of the varistor result in a more stable voltage across the beam accelerating cavity than with a conventional compensating resistance.

  8. Voltage regulation in linear induction accelerators

    DOE Patents [OSTI]

    Parsons, W.M.

    1992-12-29

    Improvement in voltage regulation in a linear induction accelerator wherein a varistor, such as a metal oxide varistor, is placed in parallel with the beam accelerating cavity and the magnetic core is disclosed. The non-linear properties of the varistor result in a more stable voltage across the beam accelerating cavity than with a conventional compensating resistance. 4 figs.

  9. CTBTO | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    CTBTO NNSA hosts international CTBT on-site inspection experts at Nevada National Security Site This month, NNSA hosted a Comprehensive Nuclear-Test-Ban Treaty (CTBT) on-site inspection activity at the Nevada National Security Site (NNSS). For the first time, CTBT surrogate inspectors and other inspection experts were able to visit NNSS, a former nuclear explosive test site that now supports... Ambassador Ensher visits Y-12 and NNSS Ambassador Henry S. Ensher, the top U.S. diplomat at the United

  10. Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Y-12 National Security Complex Home Nuclear Deterrence Global Security Naval Reactors Partnerships Security News Search form Search... Search Latest News | CNS, UT chemical...

  11. Energy Security Center

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Security Center Energy Security Center Developing new ideas for reliable, secure, and sustainable carbon neutral energy solutions for the nation-the portal to LANL's diverse energy security research enterprise. Contact Leader Steven Buelow (505) 663 5629 Email Program Administrator Jutta Kayser (505) 663-5649 Email Research focus areas Materials and concepts for clean energy Science for renewable energy sources Superconducting cables Energy storage Fuel cells Mitigating impacts of global

  12. Security's (DHS) Domestic Nuclear

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    and mobile detection systems), and the ... Homeland Security Technology Program. "With its remote location, highly ... Infrastructure Resilience Conference and Expo. ...

  13. Lab announces security changes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lab announces security changes Lab announces security changes The Laboratory is implementing several changes to its security procedures as the result of a recent security assessment conducted jointly by the Department of Defense and Department of Energy. February 23, 2012 Aerial view of Los Alamos National Laboratory Aerial view of Los Alamos National Laboratory. Contact Kevin Roark Communications Office (505) 665-9202 Email LOS ALAMOS, New Mexico, February 23, 2012-Los Alamos National

  14. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  15. Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable ... Arctic Climate Measurements Global Climate Models Software Sustainable Subsurface ...

  16. Lemnos Interoperable Security Program

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Lemnos Interoperable Security Program Creating common language and metrics for describing functions of network security tools and testing for interoperability As energy control systems employ more Internet-based features and routable communication methods, the need grows for enhanced security functions, such as frewalls, virtual private networks (VPNs), and intrusion detection systems. When purchasing network security products, today's control systems users cannot adequately compare products

  17. Corona and Motor Voltage Interim Report

    SciTech Connect (OSTI)

    Hsu, J.S.

    2005-05-06

    It has been suggested that to meet the FreedomCAR objectives for cost, size, weight, efficiency, and reliability higher buss voltages be utilized in HEV and FC automotive applications. The reasoning is that since electric power is equal to the product of voltage and current for a given power a higher voltage and lower current would result in smaller cable and inverter switching components. Consequently, the system can be lighter and smaller. On the other hand, higher voltages are known to require better and thicker electrical insulation that reduce the available slot area for motor windings. One cause of slow insulation breakdown is corona that gradually erodes the insulation and shortens the life expectancy of the motor. This study reports on the results of a study on corona initiating voltages for mush-wound and bobbin-wound stators. A unique testing method is illustrated.

  18. Flexible method for monitoring fuel cell voltage

    DOE Patents [OSTI]

    Mowery, Kenneth D.; Ripley, Eugene V.

    2002-01-01

    A method for equalizing the measured voltage of each cluster in a fuel cell stack wherein at least one of the clusters has a different number of cells than the identical number of cells in the remaining clusters by creating a pseudo voltage for the different cell numbered cluster. The average cell voltage of the all of the cells in the fuel cell stack is calculated and multiplied by a constant equal to the difference in the number of cells in the identical cell clusters and the number of cells in the different numbered cell cluster. The resultant product is added to the actual voltage measured across the different numbered cell cluster to create a pseudo voltage which is equivalent in cell number to the number of cells in the other identical numbered cell clusters.

  19. Voltage controlled spintronic devices for logic applications

    DOE Patents [OSTI]

    You, Chun-Yeol; Bader, Samuel D.

    2001-01-01

    A reprogrammable logic gate comprising first and second voltage-controlled rotation transistors. Each transistor comprises three ferromagnetic layers with a spacer and insulating layer between the first and second ferromagnetic layers and an additional insulating layer between the second and third ferromagnetic layers. The third ferromagnetic layer of each transistor is connected to each other, and a constant external voltage source is applied to the second ferromagnetic layer of the first transistor. As input voltages are applied to the first ferromagnetic layer of each transistor, the relative directions of magnetization of the ferromagnetic layers and the magnitude of the external voltage determines the output voltage of the gate. By altering these parameters, the logic gate is capable of behaving as AND, OR, NAND, or NOR gates.

  20. Non-contact current and voltage sensor

    DOE Patents [OSTI]

    Carpenter, Gary D; El-Essawy, Wael; Ferreira, Alexandre Peixoto; Keller, Thomas Walter; Rubio, Juan C; Schappert, Michael A

    2014-03-25

    A detachable current and voltage sensor provides an isolated and convenient device to measure current passing through a conductor such as an AC branch circuit wire, as well as providing an indication of an electrostatic potential on the wire, which can be used to indicate the phase of the voltage on the wire, and optionally a magnitude of the voltage. The device includes a housing that contains the current and voltage sensors, which may be a ferrite cylinder with a hall effect sensor disposed in a gap along the circumference to measure current, or alternative a winding provided through the cylinder along its axis and a capacitive plate or wire disposed adjacent to, or within, the ferrite cylinder to provide the indication of the voltage.

  1. Timing discriminator using leading-edge extrapolation

    DOE Patents [OSTI]

    Gottschalk, Bernard

    1983-01-01

    A discriminator circuit to recover timing information from slow-rising pulses by means of an output trailing edge, a fixed time after the starting corner of the input pulse, which is nearly independent of risetime and threshold setting. This apparatus comprises means for comparing pulses with a threshold voltage; a capacitor to be charged at a certain rate when the input signal is one-third threshold voltage, and at a lower rate when the input signal is two-thirds threshold voltage; current-generating means for charging the capacitor; means for comparing voltage capacitor with a bias voltage; a flip-flop to be set when the input pulse reaches threshold voltage and reset when capacitor voltage reaches the bias voltage; and a clamping means for discharging the capacitor when the input signal returns below one-third threshold voltage.

  2. Timing discriminator using leading-edge extrapolation

    DOE Patents [OSTI]

    Gottschalk, B.

    1981-07-30

    A discriminator circuit to recover timing information from slow-rising pulses by means of an output trailing edge, a fixed time after the starting corner of the input pulse, which is nearly independent of risetime and threshold setting is described. This apparatus comprises means for comparing pulses with a threshold voltage; a capacitor to be charged at a certain rate when the input signal is one-third threshold voltage, and at a lower rate when the input signal is two-thirds threshold voltage; current-generating means for charging the capacitor; means for comparing voltage capacitor with a bias voltage; a flip-flop to be set when the input pulse reaches threshold voltage and reset when capacitor voltage reaches the bias voltage; and a clamping means for discharging the capacitor when the input signal returns below one-third threshold voltage.

  3. Security of databases

    SciTech Connect (OSTI)

    Yeh, Y.S.

    1985-01-01

    In this thesis, the security of databases using cryptographic methods is considered. An algebra for encrypted relational databases is considered and examined. Other database cryptosystems are presented, namely multilevel secure databases including three different approaches; multikey multilevel, cumulative key multilevel, and permutational multilevel secure databases. Finally, entity-relationship encryption is examined.

  4. Klotz | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Klotz Labor Day Weekend 2015 Labor Day is dedicated to the achievements of American workers and the contributions they made to the strength, prosperity, and well-being of our country. Labor Day weekend also unofficially marks the end of summer and unfortunately is a time historically associated with increased mishaps.... Under Secretary Klotz packs last crate at Kansas City Plant DOE Under Secretary for Nuclear Security and NNSA Administrator Frank Klotz visited Kansas City today just in time to

  5. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  6. Low Beam Voltage, 10 MW, L-Band Cluster Klystron

    SciTech Connect (OSTI)

    Teryaev, V.; Yakovlev, V.P.; Kazakov, S.; Hirshfield, J.L.; /Yale U. /Omega-P, New Haven

    2009-05-01

    Conceptual design of a multi-beam klystron (MBK) for possible ILC and Project X applications is presented. The chief distinction between this MBK design and existing 10-MW MBK's is the low operating voltage of 60 kV. There are at least four compelling reasons that justify development at this time of a low-voltage MBK, namely (1) no pulse transformer; (2) no oil tank for high-voltage components and for the tube socket; (3) no high-voltage cables; and (4) modulator would be a compact 60-kV IGBT switching circuit. The proposed klystron consists of four clusters containing six beams each. The tube has common input and output cavities for all 24 beams, and individual gain cavities for each cluster. A closely related optional configuration, also for a 10 MW tube, would involve four totally independent cavity clusters with four independent input cavities and four 2.5 MW output ports, all within a common magnetic circuit. This option has appeal because the output waveguides would not require a controlled atmosphere, and because it would be easier to achieve phase and amplitude stability as required in individual SC accelerator cavities.

  7. Fiber-optic voltage sensor with cladded fiber and evanescent wave variation detection

    DOE Patents [OSTI]

    Wood, Charles B.

    1992-01-01

    A fiber optic voltage sensor is described which includes a source of light, a reference fiber for receiving a known percentage of the light and an electrostrictive element having terminals across which is applied, a voltage to be measured. The electrostrictive element is responsive to the applied voltage to assume an altered physical state. A measuring fiber also receives a known percentage of light from the light source and is secured about the electrostrictive element. The measuring fiber is provided with a cladding and exhibits an evanescent wave in the cladding. The measuring fiber has a known length which is altered when the electrostrictive element assumes its altered physical state. A differential sensor is provided which senses the intensity of light in both the reference fiber and the measuring fiber and provides an output indicative of the difference between the intensities.

  8. Fiber-optic voltage sensor with cladded fiber and evanescent wave variation detection

    DOE Patents [OSTI]

    Wood, C.B.

    1992-12-15

    A fiber optic voltage sensor is described which includes a source of light, a reference fiber for receiving a known percentage of the light and an electrostrictive element having terminals across which is applied, a voltage to be measured. The electrostrictive element is responsive to the applied voltage to assume an altered physical state. A measuring fiber also receives a known percentage of light from the light source and is secured about the electrostrictive element. The measuring fiber is provided with a cladding and exhibits an evanescent wave in the cladding. The measuring fiber has a known length which is altered when the electrostrictive element assumes its altered physical state. A differential sensor is provided which senses the intensity of light in both the reference fiber and the measuring fiber and provides an output indicative of the difference between the intensities. 3 figs.

  9. NATIONAL SECURITY TECHNOLOGIES - NEVADA NATIONAL SECURITY SITE

    National Nuclear Security Administration (NNSA)

    - NEVADA NATIONAL SECURITY SITE FISCAL YEARS 2009 THRU 2015 SMALL BUSINESS PROGRAM RESULTS & FORECAST CATEGORY Total Procurement Total SB Small Disad. Bus Woman-Owned SB Hub-Zone ...

  10. Electro-optical voltage sensor head

    DOE Patents [OSTI]

    Woods, Gregory K.

    1998-01-01

    A miniature electro-optic voltage sensor system capable of accurate operation at high voltages. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam's polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured.

  11. Electro-optical voltage sensor head

    DOE Patents [OSTI]

    Woods, G.K.

    1998-03-24

    A miniature electro-optic voltage sensor system capable of accurate operation at high voltages is disclosed. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam`s polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured. 6 figs.

  12. Securing collaborative environments

    SciTech Connect (OSTI)

    Agarwal, Deborah; Jackson, Keith; Thompson, Mary

    2002-05-16

    The diverse set of organizations and software components involved in a typical collaboratory make providing a seamless security solution difficult. In addition, the users need support for a broad range of frequency and locations for access to the collaboratory. A collaboratory security solution needs to be robust enough to ensure that valid participants are not denied access because of its failure. There are many tools that can be applied to the task of securing collaborative environments and these include public key infrastructure, secure sockets layer, Kerberos, virtual and real private networks, grid security infrastructure, and username/password. A combination of these mechanisms can provide effective secure collaboration capabilities. In this paper, we discuss the requirements of typical collaboratories and some proposals for applying various security mechanisms to collaborative environments.

  13. safeguards and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safeguards and security ProForce marks 65 years protecting Sandia resources, facilities, people Current and former members of the Lab's Protective Force gathered to reflect on and recognize the contributions ProForce has made to securing Sandia National Laboratory's resources, facilities, and people. Over the past 65 years, the force has changed in size and structure but its mission has... Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction

  14. Non-iterative Voltage Stability

    SciTech Connect (OSTI)

    Makarov, Yuri V.; Vyakaranam, Bharat; Hou, Zhangshuan; Wu, Di; Meng, Da; Wang, Shaobu; Elbert, Stephen T.; Miller, Laurie E.; Huang, Zhenyu

    2014-09-30

    This report demonstrates promising capabilities and performance characteristics of the proposed method using several power systems models. The new method will help to develop a new generation of highly efficient tools suitable for real-time parallel implementation. The ultimate benefit obtained will be early detection of system instability and prevention of system blackouts in real time.

  15. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Safety, Security & Resilience of Energy Infrastructure Grid Modernization Resilient Electric Infrastructures Military...

  16. Climate-derived tensions in Arctic security.

    SciTech Connect (OSTI)

    Backus, George A.; Strickland, James Hassler

    2008-09-01

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  17. Nanoscale Morphological and Chemical Changes of High Voltage

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Lithium-Manganese Rich NMC Composite Cathodes with Cycling | Stanford Synchrotron Radiation Lightsource Nanoscale Morphological and Chemical Changes of High Voltage Lithium-Manganese Rich NMC Composite Cathodes with Cycling Friday, August 29, 2014 Renewable energy is critical for the future of humankind. One bottleneck is energy storage because the harvest and consumption of energy are typically separated in time and/or location. Hence, efficient, low-cost, safe and durable batteries are

  18. Neutron burst form a high-voltage discharge between palladium electrodes in D sub 2 gas

    SciTech Connect (OSTI)

    Kim, Y.E. . Dept. of Physics)

    1990-12-01

    In this paper a recent experimental observation of a neutron flux burst at a rate of 2 {times} 10{sup 4} times the background rate during a high ac voltage stimulation between two deuterated palladium electrodes in D{sub 2} gas is explained in terms of the experimentally measured deuterium-deuterium (D-D) fusion cross sections. Theoretical criteria and experimental conditions for improving D-D fusion rates with the use of pulsed high-dc voltages are described.

  19. Voltage switching of a VO{sub 2} memory metasurface using ionic gel

    SciTech Connect (OSTI)

    Goldflam, M. D.; Liu, M. K.; Chapler, B. C.; Stinson, H. T.; Sternbach, A. J.; McLeod, A. S.; Basov, D. N.; Zhang, J. D.; Geng, K.; Royal, M.; Jokerst, N. M.; Smith, D. R.; Kim, Bong-Jun; Averitt, R. D.; Kim, H-T.

    2014-07-28

    We demonstrate an electrolyte-based voltage tunable vanadium dioxide (VO{sub 2}) memory metasurface. Large spatial scale, low voltage, non-volatile switching of terahertz (THz) metasurface resonances is achieved through voltage application using an ionic gel to drive the insulator-to-metal transition in an underlying VO{sub 2} layer. Positive and negative voltage application can selectively tune the metasurface resonance into the “off” or “on” state by pushing the VO{sub 2} into a more conductive or insulating regime respectively. Compared to graphene based control devices, the relatively long saturation time of resonance modification in VO{sub 2} based devices suggests that this voltage-induced switching originates primarily from electrochemical effects related to oxygen migration across the electrolyte–VO{sub 2} interface.

  20. Fiber optic current monitor for high-voltage applications

    DOE Patents [OSTI]

    Renda, George F.

    1992-01-01

    A current monitor which derives its power from the conductor being measured for bidirectionally measuring the magnitude of current (from DC to above 50 khz) flowing through a conductor across which a relatively high level DC voltage is applied, includes a pair of identical transmitter modules connected in opposite polarity to one another in series with the conductor being monitored, for producing from one module a first light signal having an intensity directly proportional to the magnitude of current flowing in one direction through the conductor during one period of time, and from the other module a second light signal having an intensity directly proportional to the magnitude of current flowing in the opposite direction through the conductor during another period of time, and a receiver located in a safe area remote from the high voltage area for receiving the first and second light signals, and converting the same to first and second voltage signals having levels indicative of the magnitude of current being measured at a given time.

  1. Fiber optic current monitor for high-voltage applications

    DOE Patents [OSTI]

    Renda, G.F.

    1992-04-21

    A current monitor which derives its power from the conductor being measured for bidirectionally measuring the magnitude of current (from DC to above 50 khz) flowing through a conductor across which a relatively high level DC voltage is applied, includes a pair of identical transmitter modules connected in opposite polarity to one another in series with the conductor being monitored, for producing from one module a first light signal having an intensity directly proportional to the magnitude of current flowing in one direction through the conductor during one period of time, and from the other module a second light signal having an intensity directly proportional to the magnitude of current flowing in the opposite direction through the conductor during another period of time, and a receiver located in a safe area remote from the high voltage area for receiving the first and second light signals, and converting the same to first and second voltage signals having levels indicative of the magnitude of current being measured at a given time. 6 figs.

  2. Electro-optic high voltage sensor

    DOE Patents [OSTI]

    Davidson, James R.; Seifert, Gary D.

    2003-09-16

    A small sized electro-optic voltage sensor capable of accurate measurement of high voltages without contact with a conductor or voltage source is provided. When placed in the presence of an electric field, the sensor receives an input beam of electromagnetic radiation. A polarization beam displacer separates the input beam into two beams with orthogonal linear polarizations and causes one linearly polarized beam to impinge a crystal at a desired angle independent of temperature. The Pockels effect elliptically polarizes the beam as it travels through the crystal. A reflector redirects the beam back through the crystal and the beam displacer. On the return path, the polarization beam displacer separates the elliptically polarized beam into two output beams of orthogonal linear polarization. The system may include a detector for converting the output beams into electrical signals and a signal processor for determining the voltage based on an analysis of the output beams.

  3. Low voltage arc formation in railguns

    DOE Patents [OSTI]

    Hawke, R.S.

    1985-08-05

    A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile.

  4. Low voltage arc formation in railguns

    DOE Patents [OSTI]

    Hawke, Ronald S.

    1987-01-01

    A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile.

  5. Low voltage arc formation in railguns

    DOE Patents [OSTI]

    Hawke, R.S.

    1987-11-17

    A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile. 2 figs.

  6. Joint voltages resulting from lightning currents.

    SciTech Connect (OSTI)

    Johnson, William Arthur; Warne, Larry Kevin; Merewether, Kimball O.; Chen, Kenneth C.

    2007-03-01

    Simple formulas are given for the interior voltages appearing across bolted joints from exterior lightning currents. External slot and bolt inductances as well as internal slot and bolt diffusion effects are included. Both linear and ferromagnetic wall materials are considered. A useful simplification of the slot current distribution into linear stripline and cylindrical parts (near the bolts) allows the nonlinear voltages to be estimated in closed form.

  7. Spark gap with low breakdown voltage jitter

    DOE Patents [OSTI]

    Rohwein, Gerald J.; Roose, Lars D.

    1996-01-01

    Novel spark gap devices and electrodes are disclosed. The novel spark gap devices and electrodes are suitable for use in a variety of spark gap device applications. The shape of the electrodes gives rise to local field enhancements and reduces breakdown voltage jitter. Breakdown voltage jitter of approximately 5% has been measured in spark gaps according the invention. Novel electrode geometries and materials are disclosed.

  8. Spark gap with low breakdown voltage jitter

    DOE Patents [OSTI]

    Rohwein, G.J.; Roose, L.D.

    1996-04-23

    Novel spark gap devices and electrodes are disclosed. The novel spark gap devices and electrodes are suitable for use in a variety of spark gap device applications. The shape of the electrodes gives rise to local field enhancements and reduces breakdown voltage jitter. Breakdown voltage jitter of approximately 5% has been measured in spark gaps according the invention. Novel electrode geometries and materials are disclosed. 13 figs.

  9. Constant voltage electro-slag remelting control

    DOE Patents [OSTI]

    Schlienger, M.E.

    1996-10-22

    A system for controlling electrode gap in an electro-slag remelt furnace has a constant regulated voltage and an electrode which is fed into the slag pool at a constant rate. The impedance of the circuit through the slag pool is directly proportional to the gap distance. Because of the constant voltage, the system current changes are inversely proportional to changes in gap. This negative feedback causes the gap to remain stable. 1 fig.

  10. Constant voltage electro-slag remelting control

    SciTech Connect (OSTI)

    Schlienger, Max E.

    1996-01-01

    A system for controlling electrode gap in an electro-slag remelt furnace has a constant regulated voltage and an eletrode which is fed into the slag pool at a constant rate. The impedance of the circuit through the slag pool is directly proportional to the gap distance. Because of the constant voltage, the system current changes are inversely proportional to changes in gap. This negative feedback causes the gap to remain stable.

  11. Improve Motor Operation at Off-Design Voltages | Department of...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Motor Operation at Off-Design Voltages Improve Motor Operation at Off-Design Voltages Motors are designed to operate within 10% of their nameplate rated voltages. When motors ...

  12. System for increasing corona inception voltage of insulating oils

    DOE Patents [OSTI]

    Rohwein, Gerald J.

    1998-01-01

    The Corona Inception Voltage of insulating oils is increased by repetitive cycles of prestressing the oil with a voltage greater than the corona inception voltage, and either simultaneously or serially removing byproducts of corona by evacuation and heating the oil.

  13. Integrating Safeguards, Security, & Emergency Services at CNS | Y-12

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security Complex Integrating Safeguards, ... Integrating Safeguards, Security, & Emergency Services at CNS Posted: October 14, 2015 - 5:34pm Lindy Pyatt, Y-12 S&S Performance Assurance Issues Management, assists Gannon Tucker, the CNS SS&ES change control administrator based at Pantex, with consolidating security's document control. Integrating organizations across two states (and two time zones) can be complex. The divisions within the Safeguards, Security, &

  14. High-voltage miniature igniter development

    SciTech Connect (OSTI)

    Willkens, C.A.; Axelson, S.R.; Bateman, L.S.; Croucher, D.D.

    1996-09-01

    In 1988, Norton introduced its line of low-voltage 12- and 24-V miniature igniters made from a patented ceramic/intermetallic material. These igniters demonstrated superior strength and speed in a compact low-wattage assembly for gas-fired ignition. High-voltage igniters are being developed to complete the family of igniters for gas-fired ignition. These igniters have extremely low power requirements in the range of 50--100 W, are designed to operate at line voltages of 120 V, and are leading to designs for operation up to 230 V. These were developed using compositional and dimensional changes to the low voltage igniters. The 120 V igniter has exceeded 200,000 cycles in life testing and has been submitted for agency approval. These igniters are also undergoing field testing in various demanding gas-fired appliances. The evolution of the low-voltage igniter into the high-voltage model, as well as performance and material development issues are discussed.

  15. Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security 2016 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security HQ cyber security activities are managed by the Cyber Support Division (IM-622) within the Office of Chief Information Officer (IM-1). This chapter only covers the requirement for each HQ program element to appoint an Information Systems Security Officer (ISSO) to act as the point of contact between the

  16. Modular high voltage power supply for chemical analysis

    DOE Patents [OSTI]

    Stamps, James F.; Yee, Daniel D.

    2007-01-09

    A high voltage power supply for use in a system such as a microfluidics system, uses a DC--DC converter in parallel with a voltage-controlled resistor. A feedback circuit provides a control signal for the DC--DC converter and voltage-controlled resistor so as to regulate the output voltage of the high voltage power supply, as well as, to sink or source current from the high voltage supply.

  17. Modular high voltage power supply for chemical analysis

    DOE Patents [OSTI]

    Stamps, James F.; Yee, Daniel D.

    2010-05-04

    A high voltage power supply for use in a system such as a microfluidics system, uses a DC-DC converter in parallel with a voltage-controlled resistor. A feedback circuit provides a control signal for the DC-DC converter and voltage-controlled resistor so as to regulate the output voltage of the high voltage power supply, as well as, to sink or source current from the high voltage supply.

  18. Modular high voltage power supply for chemical analysis

    DOE Patents [OSTI]

    Stamps, James F.; Yee, Daniel D.

    2008-07-15

    A high voltage power supply for use in a system such as a microfluidics system, uses a DC-DC converter in parallel with a voltage-controlled resistor. A feedback circuit provides a control signal for the DC-DC converter and voltage-controlled resistor so as to regulate the output voltage of the high voltage power supply, as well as, to sink or source current from the high voltage supply.

  19. National Security, Weapons Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security, Weapons Science National Security, Weapons Science National security depends on science and technology. The United States relies on Los Alamos National Laboratory for the best of both. No place on Earth pursues a broader array of world-class scientific endeavors. CoMuEx» Explosives Center» Dual-Axis Radiographic Hydrodynamic Test Facility (DARHT) The Dual-Axis Radiographic Hydrodynamic Test Facility at Los Alamos National Laboratory is part of the DOE's stockpile stewardship

  20. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Enhancing national and homeland security requires technological advancements in everything from biosensors to risk assessments. Game-changing scientific discovery is required for the development of sensors, detectors and other technological advancements used to protect and defend our country. At Argonne, our highly collaborative community of scientists and engineers discover and develop critical security and defense technologies to prevent and mitigate events with the potential for mass

  1. Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas Safety, Security & Resilience of the Energy Infrastructure Energy Storage Nuclear Power & Engineering Grid Modernization Battery Testing Nuclear Energy Defense Waste Management Programs Advanced

  2. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Eleven nonprofit organizations receive community giving grants from Los Alamos National Security, LLC December 15, 2009 Los Alamos, New Mexico, December 15, 2009- Eleven local nonprofit organizations with projects supported by Los Alamos National Laboratory employee volunteers received $75,000 in Community Giving grants from Los Alamos National Security, LLC, the company that manages the Lab for the National Nuclear Security Administration. The organizations are located in Los Alamos, Española,

  3. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    House); * TA-00, Bldg. 760 (Legal Counsel); and * TA-3, Bldg. 1411 (Occupational Medicine). All other buildings in non-secure areas must be individually accounted for in...

  4. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  5. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration Savannah River Site 1 NNSA Budget ( Millions) By Program Office FY 2015 Enacted FY 2016 Enacted FY 2017 President Request Delta FY Request Weapon ...

  6. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    aspects relating to the Materials Security and Consolidation Project includine Energy Systems Acquisition Advisory Board equivalents, Critical Decisions, and Quarterly Project...

  7. Supervisory Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the LFO subject matter expert on assigned safeguards and security functional and topical areas.

  8. National Security Education Center

    SciTech Connect (OSTI)

    Hurd, Alan J.

    2015-04-22

    Information about the National Security Education Center is given. Information about the Center’s history and current practices, including its facilities and its practicality are outlined.

  9. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  10. Nuclear Security Summit

    National Nuclear Security Administration (NNSA)

    Joint Research Centre and the United States Department of Energy's National Nuclear Security Administration regarding the reduction of excess nuclear material http:...

  11. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    preparedness Read More NSC leader recognized as community role model Read More Apex Gold discussion fosters international cooperation in run-up to 2016 Nuclear Security Summit...

  12. Office of Radiological Security

    National Nuclear Security Administration (NNSA)

    of physical security of radiological materials;

  13. Provision of mobile and man-portable radiation detection equipment;
  14. Regional cooperation on safeguards...

  15. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    ... and Beyond - National Security - Non-Proliferation - Environmental Management Defense ... explosive devices and to detect the proliferation of weapons of mass destruction. * ...

  16. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy & Climate Secure & Sustainable Energy Future Stationary Power Energy Conversion Efficiency Solar Energy Wind Energy Water Power Supercritical CO2 Geothermal Natural Gas...

  17. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  18. National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    The Department of Energy (DOE), the National Nuclear Security Administration (NNSA) and the University of California (UC) have agreed on new management and operations contracts for ...

  19. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The Secretary described Oak Ridge as a place where DOE's chief missions of nuclear security, environmental management and science play out. He talked about the importance of the ...

  20. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  21. Sandia Energy - Water Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Home Analysis Permalink Gallery Climate Change Is the Subject of a New Book Analysis, Climate, Global Climate & Energy, Monitoring, News, News & Events, Sensing, Sensing &...

  22. High-Voltage Solid Polymer Batteries for Electric Drive Vehicles...

    Office of Scientific and Technical Information (OSTI)

    Technical Report: High-Voltage Solid Polymer Batteries for Electric Drive Vehicles Citation Details In-Document Search Title: High-Voltage Solid Polymer Batteries for Electric ...

  1. VPhase plc formerly Energetix Voltage Control | Open Energy Informatio...

    Open Energy Info (EERE)

    VPhase plc formerly Energetix Voltage Control Jump to: navigation, search Name: VPhase plc formerly Energetix Voltage Control Place: Capenhurst, United Kingdom Zip: CH1 6EH...

  2. High-Voltage Solid Polymer Batteries for Electric Drive Vehicles...

    Broader source: Energy.gov (indexed) [DOE]

    More Documents & Publications High-Voltage Solid Polymer Batteries for Electric Drive Vehicles Vehicle Technologies Office Merit Review 2014: High-Voltage Solid Polymer Batteries ...

  3. Voltage Quench Dynamics of a Kondo System (Journal Article) ...

    Office of Scientific and Technical Information (OSTI)

    Voltage Quench Dynamics of a Kondo System This content will become publicly available on January 18, 2017 Prev Next Title: Voltage Quench Dynamics of a Kondo System Authors: ...

  4. Multilevel cascade voltage source inverter with seperate DC sources...

    Office of Scientific and Technical Information (OSTI)

    Multilevel cascade voltage source inverter with seperate DC sources Citation Details In-Document Search Title: Multilevel cascade voltage source inverter with seperate DC sources ...

  5. Towards First Principles prediction of Voltage Dependences of...

    Office of Scientific and Technical Information (OSTI)

    Towards First Principles prediction of Voltage Dependences of ElectrolyteElectrolyte ... Title: Towards First Principles prediction of Voltage Dependences of Electrolyte...

  6. Multilevel cascade voltage source inverter with seperate DC sources...

    Office of Scientific and Technical Information (OSTI)

    Multilevel cascade voltage source inverter with seperate DC sources Citation Details In-Document Search Title: Multilevel cascade voltage source inverter with seperate DC sources A ...

  7. Electrochemical Characterization of Voltage Fade in LMR-NMC cells...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Characterization of Voltage Fade in LMR-NMC cells Electrochemical Characterization of Voltage Fade in LMR-NMC cells 2013 DOE Hydrogen and Fuel Cells Program and Vehicle ...

  8. Eliminate Excessive In-Plant Distribution System Voltage Drops

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Excessive In-Plant Distribution System Voltage Drops Studies indicate that in-plant electrical distribution system losses-due to voltage unbalance, over- and undervoltage, low ...

  9. meetamachine | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    meetamachine Meet a Machine: AMS is NNSA's eye in the sky The Aerial Measuring System (AMS) provides a sophisticated radiation detection system that supports NNSA's mission to prepare for, respond to, and mitigate nuclear and radiological accidents and incidents globally. AMS provides real-time measurements of ground contamination. By quickly... Meet a Machine: Explosive science is booming at Livermore Lab's Contained Firing Facility A key mission of the National Nuclear Security Administration

  10. Los Alamos National Security awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    grants to 24 nonprofits in Northern New Mexico February 5, 2009 LOS ALAMOS, New Mexico, February 5, 2009 - Local nonprofit organizations that benefit from volunteer efforts by employees of Los Alamos National Laboratory received an additional assist: $265,000 in special one-time Community Giving grants from Los Alamos National Security, LLC (LANS), the company that manages the Laboratory. Twenty-four nonprofit organizations from Los Alamos, Española, Taos, Santa Fe, Albuquerque, and Carlsbad

  11. Office of Global Material Security | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration Global Material Security NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In

  12. Shaping the future of nuclear detection | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    reactor, and spending time analyzing radiation detection methods in a state-of-the-art ... in at the third annual Radiation Detection for Nuclear Security Summer School. ...

  13. CNS veterans greet Honor Air veterans | Y-12 National Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    service remain strong long after the conflicts have finished. Two Consolidated Nuclear Security managers and veterans, Ken Freeman and Gene Sievers, have volunteered their time...

  14. Experimental investigation of breakdown voltage characteristics of single-gap and multigap pseudosparks

    SciTech Connect (OSTI)

    Liu, C.J.; Rhee, M.J.

    1995-06-01

    Simple empirical scaling laws that can be applied universally are determined for breakdown voltage characteristics of single-gap and multigap pseudosparks. For the single-gap pseudospark, the breakdown voltage is found to be a function of the product of the gas pressure squared, the anode-cathode gap distance, and the hollow cavity diameter, p{sup 2}dD, and a function of the product pd for a gap distance less than and greater than three times the cavity diameter, respectively. For the multigap pseudospark, however, the breakdown voltage is found to be only a function of the product p{sup 2}dD.

  15. A 1-V series-array Josephson voltage standard operated at 35 GHz

    SciTech Connect (OSTI)

    Mueller, F.; Koehler, H.; Weber, P.; Bluethner, K.; Meyer, H. )

    1990-11-01

    Josephson voltage standards utilize microwave-induced constant voltage steps in the dc characteristic of Josephson tunnel junctions. This paper describes the design and operation of array circuits with 108 and 2000 junctions connected in series. In contrast with similar realizations, simple {ital Q}-band equipment is used for the microwave supply. The microwave attenuation of 1000 junctions was about 1 dB. The version with 2000 junctions generated Josephson voltages up to 1.2 V when operated at 35 GHz. The stability times of the quantized levels were, under normal laboratory conditions (unshielded room), better than 10 min.

  16. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2016-02-10

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property and facilities, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1A.

  17. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  18. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  19. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNLs defense in depth approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability and your last line of defense.

  20. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  1. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  2. international security policy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security policy Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency

  3. international security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    security Nuclear Verification Challenge: Maintain the U.S. ability to monitor and verify nuclear reduction agreements and detect violations of treaties and other nuclear nonproliferation commitments. Solution: Develop and deploy measures to ensure verifiable compliance with treaties and other international agreements,... International Nuclear Safeguards Challenge: Detect/deter undeclared nuclear materials and activities. Solution: Build capacity of the International Atomic Energy Agency and

  4. safety and security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    safety and security NNSA chief visits New Mexico laboratories NNSA Administrator Lt. Gen. Frank Klotz (Ret.) visited NNSA's New Mexico laboratories last week. At Sandia National Laboratories (SNL) and Los Alamos National Laboratory (LANL), Klotz addressed the workforces of both labs on how the FY17 budget request supports NNSA's missions, and he got a first-

  5. High voltage testing for the Majorana Demonstrator

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Abgrall, N.; Arnquist, I. J.; Avignone, III, F. T.; Barabash, A. S.; Bertrand, F. E.; Bradley, A. W.; Brudanin, V.; Busch, M.; Buuck, M.; Byram, D.; et al

    2016-04-04

    The Majorana Collaboration is constructing the Majorana Demonstrator, an ultra-low background, 44-kg modular high-purity Ge (HPGe) detector array to search for neutrinoless double-beta decay in 76Ge. The phenomenon of surface micro-discharge induced by high-voltage has been studied in the context of the Majorana Demonstrator. This effect can damage the front-end electronics or mimic detector signals. To ensure the correct performance, every high-voltage cable and feedthrough must be capable of supplying HPGe detector operating voltages as high as 5 kV without exhibiting discharge. R&D measurements were carried out to understand the testing system and determine the optimum design configuration of themore » high-voltage path, including different improvements of the cable layout and feedthrough flange model selection. Every cable and feedthrough to be used at the Majorana Demonstrator was characterized and the micro-discharge effects during the Majorana Demonstrator commissioning phase were studied. Furthermore, a stable configuration has been achieved, and the cables and connectors can supply HPGe detector operating voltages without exhibiting discharge.« less

  6. Secure Transportation of HEU in Romania

    SciTech Connect (OSTI)

    2009-07-06

    The National Nuclear Security Administration has announced the final shipments of Russian-origin highly enriched uranium (HEU) nuclear fuel from Romania. The material was removed and returned to Russia by air for storage at two secure nuclear facilities, making Romania the first country to remove all HEU since President Obama outlined his commitment to securing all vulnerable nuclear material around the world within four years. This was also the first time NNSA has shipped spent HEU by airplane, a development that will help accelerate efforts to meet the Presidents objective.

  7. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  8. Indirection and computer security.

    SciTech Connect (OSTI)

    Berg, Michael J.

    2011-09-01

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  9. Intelligent mobile security systems

    SciTech Connect (OSTI)

    Allen, M.S. )

    1991-01-01

    This paper reports that mobile security systems are becoming increasingly important to military (Army, Air Force) and non-military (Drug Enforcement Agency, Border Patrol) organizations as the level and sophistication of terrorist activity increases. Frequently, organizations are required to deploy at remote sites on little notice. To ensure protection of life and equipment, security systems are sometimes required. Often, the personnel deployed on these missions are not adequately trained in the selection, installation, and operation of today's complex security equipment. The Intelligent Mobile Security System (IMSS) concept, as being developed by Sandia National Laboratories (SNL), allows untrained, non-technical personnel to configure, deploy, operate, and troubleshoot temporary/mobile physical security system. The IMSS may be used at nuclear facilities.

  10. Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    2016 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  11. Principles of ground relaying for high voltage and extra high voltage transmission lines

    SciTech Connect (OSTI)

    Griffin, C.H.

    1983-02-01

    This paper is a tutorial discussion of the basic principles of ground relaying for high voltage and extra high voltage transmission lines. Three different HV configurations are considered: Long lines, lines with a weak mid-point station, and mutually-coupled lines. Application criteria for EHV circuits are also discussed, and specific setting calculations are included where appropriate.

  12. ESR melting under constant voltage conditions

    SciTech Connect (OSTI)

    Schlienger, M.E.

    1997-02-01

    Typical industrial ESR melting practice includes operation at a constant current. This constant current operation is achieved through the use of a power supply whose output provides this constant current characteristic. Analysis of this melting mode indicates that the ESR process under conditions of constant current is inherently unstable. Analysis also indicates that ESR melting under the condition of a constant applied voltage yields a process which is inherently stable. This paper reviews the process stability arguments for both constant current and constant voltage operation. Explanations are given as to why there is a difference between the two modes of operation. Finally, constant voltage process considerations such as melt rate control, response to electrode anomalies and impact on solidification will be discussed.

  13. Compact high voltage solid state switch

    DOE Patents [OSTI]

    Glidden, Steven C.

    2003-09-23

    A compact, solid state, high voltage switch capable of high conduction current with a high rate of current risetime (high di/dt) that can be used to replace thyratrons in existing and new applications. The switch has multiple thyristors packaged in a single enclosure. Each thyristor has its own gate drive circuit that circuit obtains its energy from the energy that is being switched in the main circuit. The gate drives are triggered with a low voltage, low current pulse isolated by a small inexpensive transformer. The gate circuits can also be triggered with an optical signal, eliminating the trigger transformer altogether. This approach makes it easier to connect many thyristors in series to obtain the hold off voltages of greater than 80 kV.

  14. Information Security: Coordination of Federal Cyber Security Research and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Development | Department of Energy Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that the Office of Science and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue guidance to agencies for providing cyber security research data to

  15. Effects of moisture on the life of power plant cables: Part 1, Medium-voltage cables; Part 2, Low-voltage cables. Final report

    SciTech Connect (OSTI)

    Toman, G.J.; Morris, G.W.; Holzman, P.

    1994-08-01

    Motivated by the concern that in-service moisture may decrease the useful life of medium and low-voltage electrical cables in power plants, EPRI investigators surveyed plant operators, examined cable failure experience, and assessed the need to develop unproved life prediction techniques. The survey revealed that only 34 medium-voltage cable failures have occurred in the more than 1000 plant-years of experience represented. In addition, moisture effects such as voltage-induced water-freeing have not been the primary cause of the failures but are one contributor among several, including manufacturing defects, installation damage, and inadvertent damage to cable by field equipment the study concludes that medium-voltage cables are rehable and there is insufficient interest on the part of surveyed utilities to warrant further R&D on cable condition evaluation techniques at this time. In addition, moisture-related degradation is not a significant concern for low-voltage cables. This two-part report discusses,the limitations of existing cable field testing techniques and highlights measures for maximizing the useful life of medium- and low-voltage power plant cables.

  16. Emergency Response | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Emergency Response Department of Energy's chief risk officer visits Nevada National Security Site Earlier this month, Associate Deputy Secretary John MacWilliams visited the Nevada National Security Site (NNSS) in his role as Chief Risk Officer for the Department of Energy. He reviewed the various ways the NNSS contributes to the department's and NNSA's missions, including radiological... NNSA sites prepared for disasters using real-time response management system Pantex Emergency Services now

  17. emergency communications | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    communications NNSA administrator visits NNSS to meet team, see national security work Last month, Department of Energy Under Secretary for Nuclear Security and NNSA Administrator Lt. Gen. Frank G. Klotz (Ret.) visited NNSA's Nevada Field Office where he hosted an all-hands for NNSA-Nevada staff and presented several service awards. During the trip he visited the NNSA... NNSA sites prepared for disasters using real-time response management system Pantex Emergency Services now uses the Emergency

  18. federal budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    federal budget FY2015 Budget Request: Preserving President Obama's Nuclear Security Vision WASHINGTON, D.C. - The President's FY2015 Budget Request for the National Nuclear Security Administration (NNSA), delivered to Congress today, includes $11.7 billion to support NNSA's continued efforts to keep the American people safe by modernizing the U.S. nuclear stockpile, executing an... Management and Budget The organization provides timely, cost-effective, and efficient administrative and financial

  19. Page 10, Security Forms and Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    10 of 11 Previous Page Security Forms and Information Building Access and DOE Badges Employees entering DOE facilities must have either a DOE photo identification Security Badge or a DOE Temporary Badge. Either badge must be displayed above the waist in plain view at all times while in DOE facilities. Employees must present said badges to Protective Force personnel for inspection prior to entry into the facilities. You should have been provided instruction by email regarding training that must

  20. Secure Policy-Based Configuration Framework (PBCONF)

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Policy-Based Configuration Framework (PBCONF) Interoperable, open-source framework for secure remote configuration of modern and legacy devices Background Energy delivery devices are dispersed throughout the electric grid and are an integral part of real-time power transmission and distribution. As today's cyber threats continue to advance, ensuring the security and resiliency of these digital devices is critical to ensuring the continuous delivery of power to consumers. Incorrect or

  1. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  2. Distribution System Voltage Performance Analysis for High-Penetration Photovoltaics

    SciTech Connect (OSTI)

    Liu, E.; Bebic, J.

    2008-02-01

    This report examines the performance of commonly used distribution voltage regulation methods under reverse power flow.

  3. Thermally-induced voltage alteration for integrated circuit analysis

    DOE Patents [OSTI]

    Cole, Jr., Edward I.

    2000-01-01

    A thermally-induced voltage alteration (TIVA) apparatus and method are disclosed for analyzing an integrated circuit (IC) either from a device side of the IC or through the IC substrate to locate any open-circuit or short-circuit defects therein. The TIVA apparatus uses constant-current biasing of the IC while scanning a focused laser beam over electrical conductors (i.e. a patterned metallization) in the IC to produce localized heating of the conductors. This localized heating produces a thermoelectric potential due to the Seebeck effect in any conductors with open-circuit defects and a resistance change in any conductors with short-circuit defects, both of which alter the power demand by the IC and thereby change the voltage of a source or power supply providing the constant-current biasing. By measuring the change in the supply voltage and the position of the focused and scanned laser beam over time, any open-circuit or short-circuit defects in the IC can be located and imaged. The TIVA apparatus can be formed in part from a scanning optical microscope, and has applications for qualification testing or failure analysis of ICs.

  4. Tag: Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Security Global Security Analysis and Training Program Sr. Manager Toby Williams describes the GSAT program and its important role to combat radiological terrorism....

  5. Office of Radiological Security | National Nuclear Security Administra...

    National Nuclear Security Administration (NNSA)

    Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home Office of Radiological Security Office of Radiological Security NNSA Provides Tajikistan...

  6. Office of Radiological Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Office of Radiological ... Office of Radiological Security Read more about Y-12's contributions of the Global Threat Reduction Initiative to secure the world's most vulnerable...

  7. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability March 31, ...

  8. National Security Technology Center | Y-12 National Security...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to NSTC. Global Security Cooley joins Y-12's Global Security and Strategic Partnerships Manufacturing and Technical Services Nuclear Material Recovery Nuclear Detection and...

  9. Electronic circuit for measuring series connected electrochemical cell voltages

    DOE Patents [OSTI]

    Ashtiani, Cyrus N.; Stuart, Thomas A.

    2000-01-01

    An electronic circuit for measuring voltage signals in an energy storage device is disclosed. The electronic circuit includes a plurality of energy storage cells forming the energy storage device. A voltage divider circuit is connected to at least one of the energy storage cells. A current regulating circuit is provided for regulating the current through the voltage divider circuit. A voltage measurement node is associated with the voltage divider circuit for producing a voltage signal which is proportional to the voltage across the energy storage cell.

  10. Distribution capacitor automation that controls voltage and saves energy

    SciTech Connect (OSTI)

    Williams, B.R.

    1994-12-31

    The Electric Distribution Business Line of Southern California Edison Company (SCE) has begun a program to improve the distribution system operations and electrical efficiency. The program, called the Distribution System Efficiency Enhancement Program (DSEEP), consists of five principal projects: Automated Switching, Circuit Lock-Out Alarming, Substation Monitoring and Control, Outage Management, and Distribution Capacitor Automation Project (DCAP). DCAP is the largest and most sophisticated of the projects being implemented. The project takes advantage of fine-tuning customer voltages for conservation voltage regulation (CVR) benefits as well as minimizes line losses by reducing unnecessary reactive power flow. DCAP can also help to increase transmission line and substation capacity by improving system power factor. The DCAP system takes advantage of the distributed processing capability of meters, capacitor controllers, radios, and substation processors. DCAP uses two-way packet radios and new electronic meters that read real-time customer voltages as well as energy consumption. The radios transmit customer meter voltage information and capacitor status to substation processors, where a control algorithm runs to determine which capacitors should be turned on or off. The objective of DCAP is to reduce over-all net energy transfer from the substation to the customer and meet system VAR requirements. SCE has tested the system on 66 circuit capacitors (including 3 substation capacitors) on 18 circuits served from two substations. The positive results of the DCAP demonstrations has led to an aggressive roll-out plan for system-wide implementation of automating over 7600 switched capacitors by year-end 1995.

  11. hrp | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    hrp Personnel Security Program NNSA is responsible for managing national nuclear security and supports several key program areas including Defense, Nuclear Nonproliferation, Naval Reactors, Emergency Operations, Infrastructure and Environment, Nuclear Security, Management and Administration and the Office of the Administrator.

  12. Office of Departmental Personnel Security

    Office of Energy Efficiency and Renewable Energy (EERE)

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  13. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  14. Inverter Load Rejection Over-Voltage Testing: SolarCity CRADA Task 1a Final Report

    SciTech Connect (OSTI)

    Nelson, A.; Hoke, A.; Chakraborty, S.; Chebahtah, J.; Wang, T.; Zimmerly, B.

    2015-02-01

    Various interconnection challenges exist when connecting distributed PV into the electrical distribution grid in terms of safety, reliability, and stability of electric power systems. One of the urgent areas for additional research - as identified by inverter manufacturers, installers, and utilities - is the potential for transient over-voltage from PV inverters. In one stage of a cooperative tests were repeated a total of seven times. The maximum over-voltage measured in any test did not exceed 200% of nominal, and typical over-voltage levels were significantly lower. The total voltage duration and the maximum continuous time above each threshold are presented here, as well as the time to disconnect for each test. Finally, we present a brief investigation into the effect of DC input voltage as well as a series of no-load tests. This report describes testing conducted at NREL to determine the duration and magnitude of transient over-voltages created by several commercial PV inverters during load-rejection conditions. For this work, a test plan that is currently under development by the Forum on Inverter Grid Integration Issues (FIGII) has been implemented in a custom test setup at NREL. Through a cooperative research and development agreement, NREL is working with SolarCity to address two specific types of transient overvoltage: load rejection overvoltage (LRO) and ground fault overvoltage (GFO). Additional partners in this effort include the Hawaiian Electric Companies, Northern Plains Power Technologies, and the Electric Power Research Institute.

  15. Security Review Processing Form | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Review Processing Form Security Review Processing Form Security Review Process - Please review carefully. Security Acknowledge Form - Complete and return immediately. ...

  16. Voluntary Protection Program Onsite Review, National Security...

    Broader source: Energy.gov (indexed) [DOE]

    Recertification of National Security Technologies, LLCNevada National Security Site as a ... of National Security Technologies, LLCNevada National Security Site during the period ...

  17. PIA - Richland Personal Security Clearance Record | Department...

    Energy Savers [EERE]

    Personal Security Clearance Record PIA - Richland Personal Security Clearance Record PIA - Richland Personal Security Clearance Record PIA - Richland Personal Security Clearance ...

  18. Security and Cyber Guidance | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security and Cyber Guidance Security and Cyber Guidance Appraisal Process Guides Security Evaluations Appraisal Process Guide - April 2008 Cyber Security Evaluations Appraisal ...

  19. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    Nevada National Security Site Proud Past, Exciting Future Nevada National Security Site Pre-Proposal Meeting November 19, 2015 Agenda * 8:30 am Welcome * 9:00 am Overview of NNSS and NFO * 10:00 am Break * 10:30 am NNSS Video * 11:00 am Questions * 11:30 am Lunch * 1:00 pm Solicitation Overview * 2:15 pm Break * 2:45 pm Questions * 4:00 pm Conclusion The Nevada National Security Site * Large geographically diverse outdoor laboratory - 1,360 square miles of federally owned and controlled land -

  20. PRIVACY/SECURITY NOTICE

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PRIVACY/SECURITY NOTICE By continuing to use this system you indicate your awareness of and consent to the following terms and conditions of use. LOG OFF IMMEDIATELY if you do not agree to the conditions stated in this warning. SECURITY NOTICE This Web site is part of a Federal computer system used to accomplish Federal functions. The Department of Energy monitors this Web site for security purposes to ensure it remains available to all users and to protect information in the system. The system

  1. Sacramento Area Voltage Support Draft Environmental Impact Statement

    SciTech Connect (OSTI)

    N /A

    2002-11-15

    The Western Area Power Administration's Central Valley Project transmission system forms an integral part of the interconnected Sacramento area transmission grid. Western is contractually responsible to oversee that the system is operated in accordance with strict reliability standards. Growth in the greater Sacramento, California area and power imported from generation outside the region, have increased the demand on the interconnected electric transmission system, leading to transmission system overloads and reducing the reliability and security of the area power system. Western has prepared this Sacramento Area Voltage Support (SVS) Draft Environmental Impact Statement (EIS) in compliance with Federal laws, regulations and guidelines, principally the ''National Environmental Policy Act'' (NEPA). This Draft EIS evaluates the potential environmental effects of physical improvements to the area's power system. Enhancements are needed to improve system reliability and provide voltage support for the Sacramento area. The results of public scoping meetings, workshops, meetings with agencies, and earlier studies by Western and area utilities helped to develop a range of alternatives for analysis. The Proposed Action involves: Constructing a new double-circuit, 230-kV transmission line paralleling the existing double-circuit, 230-kV line from the O'Banion Substation to the Elverta Substation; Realigning a portion of the existing Cottonwood-Roseville single-circuit, 230-kV transmission line north of Elverta Substation; and Reconductoring the existing double-circuit, 230-kV transmission line from the Elverta Substation to the Tracy Substation. Public Hearings on the Draft EIS will be held between December 9-12, 2002. Comments on this Draft EIS are encouraged and should be sent to Ms. Loreen McMahon (above). Comments must be received by December 30, 2002.

  2. Sacramento Area Voltage Support Final Environmental Impact Statement

    SciTech Connect (OSTI)

    N /A

    2003-09-19

    The Western Area Power Administration's Central Valley Project transmission system forms an integral part of the interconnected Sacramento area transmission grid. Western is contractually responsible to oversee that the system is operated in accordance with strict reliability standards. Growth in the greater Sacramento, California area and power imported from generation outside the region, have increased the demand on the interconnected electric transmission system, leading to transmission system overloads and reducing the reliability and security of the area power system. Western has prepared this Sacramento Area Voltage Support (SVS) Draft Environmental Impact Statement (EIS) in compliance with Federal laws, regulations and guidelines, principally the National Environmental Policy Act (NEPA). This Draft EIS evaluates the potential environmental effects of physical improvements to the area's power system. Enhancements are needed to improve system reliability and provide voltage support for the Sacramento area. The results of public scoping meetings, workshops, meetings with agencies, and earlier studies by Western and area utilities helped to develop a range of alternatives for analysis. The Proposed Action involves: (1) Constructing a new double-circuit, 230-kV transmission line paralleling the existing double-circuit, 230-kV line from the O'Banion Substation to the Elverta Substation; (2) Realigning a portion of the existing Cottonwood-Roseville single-circuit, 230-kV transmission line north of Elverta Substation; and (3) Reconductoring the existing double-circuit, 230-kV transmission line from the Elverta Substation to the Tracy Substation. Public Hearings on the Draft EIS will be held between December 9-12, 2002. Comments on this Draft EIS are encouraged and should be sent to Ms. Loreen McMahon (above). Comments must be received by December 30, 2002.

  3. Microsoft Word - BPD Security - PM

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Building Performance Database Security (Updated 2015-02) The Department of Energy (DOE) ... controls to ensure the security of data stored in the Building Performance Database (BPD). ...

  4. cygnus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    and operated with National Securities Technologies and Los Alamos National Laboratory (LANL) at the Nevada National Security Site (NNSS), has fired its 3,000th shot. Originally...

  5. Budget | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    7 budget for NNSA are available here. National Nuclear Security Administration Highlights FY'17 Budget Request Budget Request Reflects Commitment to Maintain a Safe, Secure, and...

  6. SSIP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  7. DNS | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  8. contractor | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  9. NMSSUP | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    - The National Nuclear Security Administration (NNSA) today announced the recipients of the 2014 Bradley A. Peterson Federal and Contractor Security Professional of the Year Awards...

  10. Los Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    applying science and technology to homeland security challenges, and safety and security. ... through the Board of Governors, and functional managers of the parent organization ...

  11. Security Cases | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    raised concerns about the individual's eligibility to maintain a security clearance. ... and (l), the individual's security clearance was suspended, and he requested a hearing. ...

  12. Chapter_3_Personnel_Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ... Security Acknowledgement * DOE F 472.1, Fair Credit Reporting Act Release Authorization ... Security Acknowledgement * DOE F 472.1, Fair Credit Reporting Act Release Authorization ...

  13. About SRNL - Directorates - National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Security Environmental Stewardship Science and Technology Clean Energy Nuclear Materials Program Integration Strategic Development and Innovation Global Security SRNL Home ...

  14. Facility Security Officer Contractor Toolcart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2015) Special Message from the Corporate Investigations Office REPORTING PERSONNEL SECURITY CONCERNS If you report an incident of security concern involving yourself or a...

  15. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  16. Electro-optic voltage sensor for sensing voltage in an E-field

    DOE Patents [OSTI]

    Woods, G.K.; Renak, T.W.

    1999-04-06

    A miniature electro-optic voltage sensor system capable of accurate operation at high voltages is disclosed. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam`s polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured. 18 figs.

  17. Electro-optic voltage sensor for sensing voltage in an E-field

    DOE Patents [OSTI]

    Woods, Gregory K.; Renak, Todd W.

    1999-01-01

    A miniature electro-optic voltage sensor system capable of accurate operation at high voltages. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam's polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured.

  18. Group 3: Humidity, Temperature and Voltage (Presentation)

    SciTech Connect (OSTI)

    Wohlgemuth, J.

    2013-09-01

    This is a summary of the work of Group 3 of the International PV QA Task Force. Group 3 is chartered to develop accelerated stress tests that can be used as comparative predictors of module lifetime versus stresses associated with humidity, temperature and voltage.

  19. Voltage control on a train system

    DOE Patents [OSTI]

    Gordon, Susanna P.; Evans, John A.

    2004-01-20

    The present invention provides methods for preventing low train voltages and managing interference, thereby improving the efficiency, reliability, and passenger comfort associated with commuter trains. An algorithm implementing neural network technology is used to predict low voltages before they occur. Once voltages are predicted, then multiple trains can be controlled to prevent low voltage events. Further, algorithms for managing inference are presented in the present invention. Different types of interference problems are addressed in the present invention such as "Interference During Acceleration", "Interference Near Station Stops", and "Interference During Delay Recovery." Managing such interference avoids unnecessary brake/acceleration cycles during acceleration, immediately before station stops, and after substantial delays. Algorithms are demonstrated to avoid oscillatory brake/acceleration cycles due to interference and to smooth the trajectories of closely following trains. This is achieved by maintaining sufficient following distances to avoid unnecessary braking/accelerating. These methods generate smooth train trajectories, making for a more comfortable ride, and improve train motor reliability by avoiding unnecessary mode-changes between propulsion and braking. These algorithms can also have a favorable impact on traction power system requirements and energy consumption.

  20. Cognitive Computing for Security.

    SciTech Connect (OSTI)

    Debenedictis, Erik; Rothganger, Fredrick; Aimone, James Bradley; Marinella, Matthew; Evans, Brian Robert; Warrender, Christina E.; Mickel, Patrick

    2015-12-01

    Final report for Cognitive Computing for Security LDRD 165613. It reports on the development of hybrid of general purpose/ne uromorphic computer architecture, with an emphasis on potential implementation with memristors.

  1. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  2. national security campus

    National Nuclear Security Administration (NNSA)

    1%2A en National Security Campus http:nnsa.energy.govaboutusourlocationsnsc

    Page...

  3. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes responsibilities and program planning and management requirements for the Safeguards and Security Program. Admin Chg 1, dated 2-15-13, supersedes DOE O 470.4B.

  4. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  5. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:nnsa.energy.govaboutusourprogramsnuclearsecurity

    Page...

  6. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  7. Nevada National Security Site

    Office of Energy Efficiency and Renewable Energy (EERE)

    HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities.  In support of national defense initiatives...

  8. Energy Security Council

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Council Reliable, secure, sustainable carbon energy solutions for the nation. Contact Albert Migliori (505) 663-5627 Email David Morris (505) 665 6487 Email David Watkins (50)5...

  9. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security, LLC during a recognition event beginning at 9:30 a.m. Thursday, June 28, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  10. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security (LANS), LLC during a recognition event beginning at 9:30 a.m. June 12, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of...

  11. Safety and Security Officer

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-07-20

    Designated as the DOE official responsible for enforcement of 10 CFR 824 pertaining to the assessment of civil penalties for classified information security violations, and the management and administration of agency occupational safety and health program pursuant to EO 12196

  12. Electro-optic high voltage sensor

    DOE Patents [OSTI]

    Davidson, James R.; Seifert, Gary D.

    2002-01-01

    A small sized electro-optic voltage sensor capable of accurate measurement of high levels of voltages without contact with a conductor or voltage source is provided. When placed in the presence of an electric field, the sensor receives an input beam of electromagnetic radiation into the sensor. A polarization beam displacer serves as a filter to separate the input beam into two beams with orthogonal linear polarizations. The beam displacer is oriented in such a way as to rotate the linearly polarized beams such that they enter a Pockels crystal having at a preferred angle of 45 degrees. The beam displacer is therefore capable of causing a linearly polarized beam to impinge a crystal at a desired angle independent of temperature. The Pockels electro-optic effect induces a differential phase shift on the major and minor axes of the input beam as it travels through the Pockels crystal, which causes the input beam to be elliptically polarized. A reflecting prism redirects the beam back through the crystal and the beam displacer. On the return path, the polarization beam displacer separates the elliptically polarized beam into two output beams of orthogonal linear polarization representing the major and minor axes. The system may include a detector for converting the output beams into electrical signals, and a signal processor for determining the voltage based on an analysis of the output beams. The output beams are amplitude modulated by the frequency of the electric field and the amplitude of the output beams is proportional to the magnitude of the electric field, which is related to the voltage being measured.

  13. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    Stewart, John; Halbgewachs, Ron; Chavez, Adrian; Smith, Rhett; Teumim, David

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or tunnels , to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock

  14. Infrastructure Security Executive Summary

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Summary Energy, Climate, and Infrastructure Executive Summary / 3 Message from the VP Rick Stulen, Vice President Energy, Climate, & Infrastructure Security SMU Access to reliable, affordable, and sustainable sources of energy is essential for all modern economies. Since the late 1950s, we Americans have not been energy self-sufficient. Our addiction to foreign oil and fossil fuels puts our economy, our environment, and ultimately our national security at risk. Furthermore, there

  15. Alamos National Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    companies get boost from Los Alamos National Security November 19, 2012 Venture Acceleration Fund awards help region's businesses grow LOS ALAMOS, New Mexico, November 19, 2012- Two local biotech start ups, a water and power company and a hardware inventor are the latest recipients of $165,000 in Venture Acceleration Fund (VAF) awards from Los Alamos National Security, LLC. Mustomo, Inc., IX Power, Synfolia, and Tape-Ease will receive funding to take their products and services to the next

  16. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    200 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 7, 2010 Employee volunteer efforts to be recognized LOS ALAMOS, New Mexico, June 7, 2010-Nonprofit organizations are receiving more than $117,000 from Los Alamos National Security, LLC during a recognition event beginning at 9 a.m. Wednesday at Fuller Lodge in downtown Los Alamos. The monetary donations are being made to the nonprofits as a result of the volunteer efforts of Los Alamos National

  17. Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    8, 2006, the National Nuclear Security Administration (NNSA) announced the selection of National Security Technologies, LLC (NSTec) to manage and operate the Nevada Test Site (NTS) for the NNSA Nevada Site Office. The contract, valued at approxi- mately $500 million annually, is for five years. There are poten- tially five additional perform- ance-based award-term years available under this contract. NSTec is made up of Northrop Grumman, AECOM, CH2M Hill, and Nuclear Fuel Services. Dr. James E.

  18. Secure Sensor Platform

    Energy Science and Technology Software Center (OSTI)

    2010-08-25

    The Secure Sensor Platform (SSP) software provides a framework of functionality to support the development of low-power autonomous sensors for nuclear safeguards. This framework provides four primary functional blocks of capabilities required to implement autonomous sensors. The capabilities are: communications, security, power management, and cryptography. Utilizing this framework establishes a common set of functional capabilities for seamless interoperability of any sensor based upon the SSP concept.

  19. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  20. New technique for improving voltage regulation in Li/FeS/sub 2/ thermal batteries

    SciTech Connect (OSTI)

    Godshall, N.A.; Baldwin, A.R.

    1986-01-01

    Lithiation of the FeS/sub 2/ cathode material lowers the voltage of the initial discharge (which is often too high for many applications) and raises the voltage of the battery at the end of discharge (which is often too low due to a second voltage plateau). In the example of the Sandia ten-cell Li(Si)/FeS/sub 2/ long-life thermal battery, lithiating the cathode improves the voltage regulation from 12.8 to 0.5% during the initial 5 minutes of discharge and from 38 to 12% over the entire 60 minute discharge time. Batteries employing the new lithiated cathode material were also subjected to dynamic mechanical environments, both before and during electrochemical discharge. No adverse changes in either the electrical or mechanical properties of these batteries was observed, relative to standard composition batteries.

  1. Lithium/fluorinated carbon battery with no voltage delay

    SciTech Connect (OSTI)

    Tung, H.S.; Friedland, D.J.; Sukornick, B.; Mc Curry, L.E.; Eibeck, R.E.; Lockyer, G.D.

    1987-07-21

    A method is described for producing an improved fluorinated carbon, for use as a cathode active material in a lithium fluorinated carbon battery, which inhibits initial voltage delay upon discharge, which comprises: (a) introducing a comminuted carbon into a static bed reactor; (b) foring a bed of the carbon to a depth of at least 0.5 cm; and (c) subjecting the carbon bed to a fluorination reaction under controlled reaction time with fluorine to produce an inhomogeneous fluorinated carbon product and until the carbon attains a weight gain of at least 10 percent.

  2. Outdoor PV Module Degradation of Current-Voltage Parameters: Preprint

    SciTech Connect (OSTI)

    Smith, R. M.; Jordan, D. C.; Kurtz, S. R.

    2012-04-01

    Photovoltaic (PV) module degradation rate analysis quantifies the loss of PV power output over time and is useful for estimating the impact of degradation on the cost of energy. An understanding of the degradation of all current-voltage (I-V) parameters helps to determine the cause of the degradation and also gives useful information for the design of the system. This study reports on data collected from 12 distinct mono- and poly-crystalline modules deployed at the National Renewable Energy Laboratory (NREL) in Golden, Colorado. Most modules investigated showed < 0.5%/year decrease in maximum power due to short-circuit current decline.

  3. Denial technology, the neglected security element

    SciTech Connect (OSTI)

    Mauney, C.H.

    1982-01-01

    Even though there has been an increased concern over providing adequate security during the past decade, and even though some aspects of existing security systems have been enhanced during this period, much remains to be done to provide that balance which is so necessary to have all elements function as an effective unit. The area that primarily has been neglected is the delay element - the part of the system which makes possible the needed time for the security force to respond after an intrustion is detected and prior to the adversary attaining his desired goal. The purpose of this paper is to address the vulnerabilities of a security system which exist without the proper delay elements and to suggest how current technology can provide, through the use of activated barriers, that needed delay time to bring the system into balance. Security managers desire reliability and effectiveness; plant managers require safety, non-interference with operations, cost considerate capability, and aesthetic application - these characteristics will be addressed in the context of providing the required delay. This paper, hopefully, will set the stage for dialogue between developer and user, yielding a mutally acceptable approach to balanced security protection.

  4. Well Logging Security Initiatives | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Well Logging Security ... Well Logging Security Initiatives The mp4 video format is not supported by this browser. Download video Captions: On Watch as GTRI demonstrates the threat to the security of (oil) well logging systems and outlines the initiatives that are enhancing the security of these sources worldwide

  5. Secure communications using quantum cryptography

    SciTech Connect (OSTI)

    Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.

    1997-08-01

    The secure distribution of the secret random bit sequences known as {open_quotes}key{close_quotes} material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is an emerging technology for secure key distribution with single-photon transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non-orthogonal single-photon states to generate shared key material over multi-kilometer optical fiber paths and over line-of-sight links. In both cases, key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. In our optical fiber experiment we have performed quantum key distribution over 24-km of underground optical fiber using single-photon interference states, demonstrating that secure, real-time key generation over {open_quotes}open{close_quotes} multi-km node-to-node optical fiber communications links is possible. We have also constructed a quantum key distribution system for free-space, line-of-sight transmission using single-photon polarization states, which is currently undergoing laboratory testing. 7 figs.

  6. Preventing Delayed Voltage Recovery with Voltage-Regulating Distributed Energy Resources

    SciTech Connect (OSTI)

    Adhikari, Sarina; Li, Fangxing; Li, Huijuan; Xu, Yan; Kueck, John D; Rizy, D Tom

    2009-01-01

    With the large use of residential air conditioner (A/C) motors during the summer peaks, the potential of motor stalling events have increased in the recent years. The stalled motor loads have been found to be the most important cause of delayed voltage recovery following severe system disturbances, such as a subtransmission fault. The proper modeling of the stalled motors is a very important factor in identifying the effect of these motors in voltage recovery after the fault. This paper presents a methodology for modeling the stalled low inertia induction motors based on a sample utility system and a small primary distribution circuit. The prevention of the stalling of motors plays an important role in maintaining the voltage profile of the system after system disturbances. Distributed Energy Resource (DER) is used to prevent the motor stalling events so that the delayed voltage recovery of the system may be avoided.

  7. Nevada National Security Site | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Nevada National Security Site The Nevada National Security Site (NNSS) safely conducts high-hazard operations, testing, and training in support of NNSA, the U.S. Department of Defense, and other agencies. NNSS is run by National Security Technologies, LLC. Visit our website NNSS NNSS Related News NNSA Statement Regarding Nevada National Security Site Management & Operating Contract NNSA Awards Nevada National Security Site Management & Operating Contract to NVS3T NNSA

  8. Office of Secure Transportation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    | (NNSA) Office of Secure Transportation The Office of Secure Transportation (OST) is managed by the National Nuclear Security Administration within the U. S. Department of Energy. OST is responsible for the safe and secure transport in the contiguous United States of government-owned special nuclear materials. These classified shipments can contain nuclear weapons or components, enriched uranium, or plutonium. The cargo is transported in highly modified secure tractor-trailers and escorted

  9. nevada national security site | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nevada national security site NNSA Statement Regarding Nevada National Security Site Management & Operating Contract WASHINGTON - On August 26, 2016, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) awarded the contract for the management and operation of the Nevada National Security Site (NNSS) to Nevada Site Science Support and Technologies Corporation (NVS3T). The... NNSA Awards Nevada National Security Site Management & Operating Contract to NVS3T

  10. Department of Homeland Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Department of Homeland Security NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts... NNSA to Participate in Aerial Radiation Training Exercise in Philadelphia, Pennsylvania (WASHINGTON, D.C.) - On

  11. Broader National Security Missions | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Broader National Security ... Broader National Security Missions Learn more For 70 years, the Y-12 National Security Complex has transformed in response to changing national security priorities and assigned missions, evolving technological opportunities, and growing concerns regarding health and public safety. As the global security situation has changed, the site has adapted - beginning as a uranium enrichment facility, transforming to a weapons manufacturing facility, and accepting new

  12. Security and Training | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security and Training Security and Training Instability in parts of the world and increased terrorist activities worldwide intensify security concerns in protecting personnel, materials and infrastructure. As a globally recognized leader in safeguards and security, Y-12 provides immediate and deployable solutions to mitigate these risks. We provide security solutions to other federal customers, other countries, commercial entities, universities and medical institutions, among others, and provide

  13. Hawaii | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Hawaii NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  14. NRC | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    NRC NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  15. containers | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    containers NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK WASHINGTON - This week, the Department of Energy's National Nuclear Security Administration (DOE/NNSA) and the U.K. Department of Energy and Climate Change concluded a workshop at Wilton Park, United Kingdom, on the growing challenge of securing the global maritime supply chain. In

  16. material | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    material NNSA Receives Excellence Award for Radiological Security Enhancements in Hawaii HONOLULU - At an official event this week, the City and County of Honolulu presented the Department of Energy's (DOE) National Nuclear Security Administration (NNSA) with the Homeland Security Excellence Award for DOE/NNSA's Office of Radiological Security's (ORS) efforts

  17. Security News | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security News Security News January 14, 2016 A Centerra Protective Force employee uses a mirror to check the undercarriage of a transport trailer before it enters a Savannah River Site Limited Area. EM Headquarters Office Ensures Safeguards, Security, Emergency Preparedness WASHINGTON, D.C. - The Office of Safeguards, Security and Emergency Preparedness has a unique function supporting the EM mission

  18. BPD Security | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security BPD Security Information related to the Building Performance Database (BPD) security and software controls. Building Performance Database (BPD) Security (140.29 KB) More Documents & Publications Buildings Performance Database - 2013 BTO Peer Review BPD Webinar: Analyze Building Energy Data, Understand Market Trends, Inform Decisions Buildings Performance Database (BPD) - 2014

  19. Headquarters Security Quick Reference Book

    Office of Energy Efficiency and Renewable Energy (EERE)

    This quick reference book provides an overview of Department of Energy (DOE) Headquarters (HQ) security programs.

  20. Distribution System Voltage Regulation by Distributed Energy Resources

    SciTech Connect (OSTI)

    Ceylan, Oguzhan; Liu, Guodong; Xu, Yan; Tomsovic, Kevin

    2014-01-01

    This paper proposes a control method to regulate voltages in 3 phase unbalanced electrical distribution systems. A constrained optimization problem to minimize voltage deviations and maximize distributed energy resource (DER) active power output is solved by harmony search algorithm. IEEE 13 Bus Distribution Test System was modified to test three different cases: a) only voltage regulator controlled system b) only DER controlled system and c) both voltage regulator and DER controlled system. The simulation results show that systems with both voltage regulators and DER control provide better voltage profile.

  1. High voltage supply for neutron tubes in well logging applications

    DOE Patents [OSTI]

    Humphreys, D. Russell

    1989-01-01

    A high voltage supply is provided for a neutron tube used in well logging. The "biased pulse" supply of the invention combines DC and "full pulse" techniques and produces a target voltage comprising a substantial negative DC bias component on which is superimposed a pulse whose negative peak provides the desired negative voltage level for the neutron tube. The target voltage is preferably generated using voltage doubling techniques and employing a voltage source which generates bipolar pulse pairs having an amplitude corresponding to the DC bias level.

  2. Security Review Process | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Review Process Security Review Process Security Review Process (107.09 KB) More Documents & Publications Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Headquarters Facilities Master Security Plan - Chapter 1, Physical Security PSH-14-0092 - In the Matter of Personnel Security

  3. Safety and Security Enforcement Coordinator Handbook

    Broader source: Energy.gov (indexed) [DOE]

    & III-4) ......9 * Classified Information Security Noncompliance ... * Additional Guidance Unique to Classified Information Security Enforcement ...

  4. LOW VOLTAGE 14 Mev NEUTRON SOURCE

    DOE Patents [OSTI]

    Little, R.N. Jr.; Graves, E.R.

    1959-09-29

    An apparatus yielding high-energy neutrons at the rate of 10/sup 8/ or more per second by the D,T or D,D reactions is described. The deuterium gas filling is ionized by electrons emitted from a filament, and the resulting ions are focused into a beam and accelerated against a fixed target. The apparatus is built in accordance with the relationship V/sub s/ = A--B log pd, where V/sub s/ is the sparking voltage, p the gas pressure, and d the gap length between the high voltage electrodes. Typical parameters to obtain the high neutron yields are 55 to 80 kv, 0.5 to 7.0 ma beam current, 5 to 12 microns D/sub 2/, and a gap length of 1 centimeter.

  5. High voltage electric substation performance in earthquakes

    SciTech Connect (OSTI)

    Eidinger, J.; Ostrom, D.; Matsuda, E.

    1995-12-31

    This paper examines the performance of several types of high voltage substation equipment in past earthquakes. Damage data is provided in chart form. This data is then developed into a tool for estimating the performance of a substation subjected to an earthquake. First, suggests are made about the development of equipment class fragility curves that represent the expected earthquake performance of different voltages and types of equipment. Second, suggestions are made about how damage to individual pieces of equipment at a substation likely affects the post-earthquake performance of the substation as a whole. Finally, estimates are provided as to how quickly a substation, at various levels of damage, can be restored to operational service after the earthquake.

  6. Electrical system architecture having high voltage bus

    DOE Patents [OSTI]

    Hoff, Brian Douglas; Akasam, Sivaprasad

    2011-03-22

    An electrical system architecture is disclosed. The architecture has a power source configured to generate a first power, and a first bus configured to receive the first power from the power source. The architecture also has a converter configured to receive the first power from the first bus and convert the first power to a second power, wherein a voltage of the second power is greater than a voltage of the first power, and a second bus configured to receive the second power from the converter. The architecture further has a power storage device configured to receive the second power from the second bus and deliver the second power to the second bus, a propulsion motor configured to receive the second power from the second bus, and an accessory motor configured to receive the second power from the second bus.

  7. Sealed Bids | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sealed Bids Sealed Bids Consolidated Nuclear Security, L.L.C., acting on behalf of the National Nuclear Security Administration (NNSA)/U.S. Department of Energy (DOE), under Government Contract DE-AC05-00OR22800, from time to time solicits sealed bids for the purchase of government-owned used and unused industrial equipment items as further described on Schedule A of the posted Sale of Government-Owned Property Bid and Award document. Bidding opportunities are posted on this website as they

  8. Secure Information Sharing

    Energy Science and Technology Software Center (OSTI)

    2005-09-09

    We are develoing a peer-to-peer system to support secure, location independent information sharing in the scientific community. Once complete, this system will allow seamless and secure sharing of information between multiple collaborators. The owners of information will be able to control how the information is stored, managed. ano shared. In addition, users will have faster access to information updates within a collaboration. Groups collaborating on scientific experiments have a need to share information and data.more » This information and data is often represented in the form of files and database entries. In a typical scientific collaboration, there are many different locations where data would naturally be stored. This makes It difficult for collaborators to find and access the information they need. Our goal is to create a lightweight file-sharing system that makes it’easy for collaborators to find and use the data they need. This system must be easy-to-use, easy-to-administer, and secure. Our information-sharing tool uses group communication, in particular the InterGroup protocols, to reliably deliver each query to all of the current participants in a scalable manner, without having to discover all of their identities. We will use the Secure Group Layer (SGL) and Akenti to provide security to the participants of our environment, SGL will provide confldentiality, integrity, authenticity, and authorization enforcement for the InterGroup protocols and Akenti will provide access control to other resources.« less

  9. Computer Security Risk Assessment

    Energy Science and Technology Software Center (OSTI)

    1992-02-11

    LAVA/CS (LAVA for Computer Security) is an application of the Los Alamos Vulnerability Assessment (LAVA) methodology specific to computer and information security. The software serves as a generic tool for identifying vulnerabilities in computer and information security safeguards systems. Although it does not perform a full risk assessment, the results from its analysis may provide valuable insights into security problems. LAVA/CS assumes that the system is exposed to both natural and environmental hazards and tomore » deliberate malevolent actions by either insiders or outsiders. The user in the process of answering the LAVA/CS questionnaire identifies missing safeguards in 34 areas ranging from password management to personnel security and internal audit practices. Specific safeguards protecting a generic set of assets (or targets) from a generic set of threats (or adversaries) are considered. There are four generic assets: the facility, the organization''s environment; the hardware, all computer-related hardware; the software, the information in machine-readable form stored both on-line or on transportable media; and the documents and displays, the information in human-readable form stored as hard-copy materials (manuals, reports, listings in full-size or microform), film, and screen displays. Two generic threats are considered: natural and environmental hazards, storms, fires, power abnormalities, water and accidental maintenance damage; and on-site human threats, both intentional and accidental acts attributable to a perpetrator on the facility''s premises.« less

  10. Chapter_14_Cyber_Security

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4 Cyber Security The DOE Cyber Security Program aims to protect the Department's diverse missions in a cost- effective manner; identify threats, risks, and mitigations; and remain flexible in a changing environment. Key Departmental directives, policies, and procedures governing the implementation of the Cyber Security Program at DOE HQ are: * DOE Order 205.1B, Department of Energy Cyber Security Management * DOE Policy 205.1, Department of Energy Cyber Security Management Policy * Headquarters

  11. IT | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    IT NNSA Demonstrates its Commitment to Small Business The National Nuclear Security Administration (NNSA) recently selected three small businesses for its new Information Technology (IT) Infrastructure and Cyber Security Support Blanket Purchase Agreement. The contract covers a wide spectrum of IT and Cyber Security support for NNSA's Office of... Information Security Information security deals with requirements for the protection and control of information and matter required to be classified

  12. Italy | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Italy NNSA keeps the promises borne out of the Nuclear Security Summit On Thursday and Friday President Obama will host his fourth and final Nuclear Security Summit in Washington, D.C. Leaders from 53 nations and four international agencies will come together to discuss nuclear security challenges as well as demonstrate measurable progress toward securing nuclear... Joint Statement by the United States and Italy on the 2014 Nuclear Security Summit See a fact sheet here. The White HouseOffice of

  13. nopnproliferation | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    nopnproliferation Radiological Security The program collaborates with domestic and international partners to address the threat of illicit use of high-priority radiological materials in the United States and abroad. The Radiological Security program accomplishes its mission by removing and disposing of excess or orphaned... International Nuclear Security The International Nuclear Security program collaborates with partners world-wide to improve the security of proliferation-sensitive materials,

  14. Low Voltage White Phosphorescent OLED Achievements

    Broader source: Energy.gov [DOE]

    Universal Display Corporation (UDC) and its research partners at Princeton University and the University of Southern California have succeeded in developing a white phosphorescent OLED (PHOLED™) that achieved a record efficiency of 20 lumens per watt. This achievement is the result of the team's collaborative efforts to increase the efficiency of PHOLED lighting by focusing on two critical factors: lowering the drive voltages and increasing the amount of light extracted.

  15. HIGH VOLTAGE, HIGH CURRENT SPARK GAP SWITCH

    DOE Patents [OSTI]

    Dike, R.S.; Lier, D.W.; Schofield, A.E.; Tuck, J.L.

    1962-04-17

    A high voltage and current spark gap switch comprising two main electrodes insulatingly supported in opposed spaced relationship and a middle electrode supported medially between the main electrodes and symmetrically about the median line of the main electrodes is described. The middle electrode has a perforation aligned with the median line and an irradiation electrode insulatingly supported in the body of the middle electrode normal to the median line and protruding into the perforation. (AEC)

  16. Electrostatically screened, voltage-controlled electrostatic chuck

    DOE Patents [OSTI]

    Klebanoff, Leonard Elliott

    2001-01-01

    Employing an electrostatically screened, voltage-controlled electrostatic chuck particularly suited for holding wafers and masks in sub-atmospheric operations will significantly reduce the likelihood of contaminant deposition on the substrates. The electrostatic chuck includes (1) an insulator block having a outer perimeter and a planar surface adapted to support the substrate and comprising at least one electrode (typically a pair of electrodes that are embedded in the insulator block), (2) a source of voltage that is connected to the at least one electrode, (3) a support base to which the insulator block is attached, and (4) a primary electrostatic shield ring member that is positioned around the outer perimeter of the insulator block. The electrostatic chuck permits control of the voltage of the lithographic substrate; in addition, it provides electrostatic shielding of the stray electric fields issuing from the sides of the electrostatic chuck. The shielding effectively prevents electric fields from wrapping around to the upper or front surface of the substrate, thereby eliminating electrostatic particle deposition.

  17. Electro-optic voltage sensor head

    DOE Patents [OSTI]

    Crawford, Thomas M.; Davidson, James R.; Woods, Gregory K.

    1999-01-01

    The invention is an electro-optic voltage sensor head designed for integration with existing types of high voltage transmission and distribution apparatus. The sensor head contains a transducer, which comprises a transducing material in which the Pockels electro-optic effect is observed. In the practice of the invention at least one beam of electromagnetic radiation is routed into the transducing material of the transducer in the sensor head. The beam undergoes an electro-optic effect in the sensor head when the transducing material is subjected to an E-field. The electro-optic effect is observed as a differential phase a shift, also called differential phase modulation, of the beam components in orthogonal planes of the electromagnetic radiation. In the preferred embodiment the beam is routed through the transducer along an initial axis and then reflected by a retro-reflector back substantially parallel to the initial axis, making a double pass through the transducer for increased measurement sensitivity. The preferred embodiment of the sensor head also includes a polarization state rotator and at least one beam splitter for orienting the beam along major and minor axes and for splitting the beam components into two signals which are independent converse amplitude-modulated signals carrying E-field magnitude and hence voltage information from the sensor head by way of optic fibers.

  18. Electro-optic voltage sensor head

    DOE Patents [OSTI]

    Crawford, T.M.; Davidson, J.R.; Woods, G.K.

    1999-08-17

    The invention is an electro-optic voltage sensor head designed for integration with existing types of high voltage transmission and distribution apparatus. The sensor head contains a transducer, which comprises a transducing material in which the Pockels electro-optic effect is observed. In the practice of the invention at least one beam of electromagnetic radiation is routed into the transducing material of the transducer in the sensor head. The beam undergoes an electro-optic effect in the sensor head when the transducing material is subjected to an E-field. The electro-optic effect is observed as a differential phase a shift, also called differential phase modulation, of the beam components in orthogonal planes of the electromagnetic radiation. In the preferred embodiment the beam is routed through the transducer along an initial axis and then reflected by a retro-reflector back substantially parallel to the initial axis, making a double pass through the transducer for increased measurement sensitivity. The preferred embodiment of the sensor head also includes a polarization state rotator and at least one beam splitter for orienting the beam along major and minor axes and for splitting the beam components into two signals which are independent converse amplitude-modulated signals carrying E-field magnitude and hence voltage information from the sensor head by way of optic fibers. 6 figs.

  19. Security Technology Demonstration and Validation Sustainability Plan

    SciTech Connect (OSTI)

    2008-08-31

    This report describes the process of creating continuity and sustainability for demonstration and validation (DEMVAL) assets at the National Security Technology Incubator (NSTI). The DEMVAL asset program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The mission of the NSTI program is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. Part of this support is envisioned to be research and development of companies technology initiatives, at the same time providing robust test and evaluation of actual development activities. This program assists companies in developing technologies under the NSTI program through demonstration and validation of technologies applicable to national security created by incubators and other sources. The NSPP also will support the creation of an integrated demonstration and validation environment. Development of the commercial potential for national security technologies is a significant NSTI focus. As part of the process of commercialization, a comprehensive DEMVAL program has been recognized as an essential part of the overall incubator mission. A number of resources have been integrated into the NSTI program to support such a DEMVAL program.

  20. Transmission Line Security Monitor: Final Report

    SciTech Connect (OSTI)

    John Svoboda

    2011-04-01

    The Electric Power Transmission Line Security Monitor System Operational Test is a project funded by the Technical Support Working Group (TSWG). TSWG operates under the Combating Terrorism Technical Support Office that functions under the Department of Defense. The Transmission Line Security Monitor System is based on technology developed by Idaho National Laboratory. The technology provides a means for real-time monitoring of physical threats and/or damage to electrical transmission line towers and conductors as well as providing operational parameters to transmission line operators to optimize transmission line operation. The end use is for monitoring long stretches of transmission lines that deliver electrical power from remote generating stations to cities and industry. These transmission lines are generally located in remote transmission line corridors where security infrastructure may not exist. Security and operational sensors in the sensor platform on the conductors take power from the transmission line and relay security and operational information to operations personnel hundreds of miles away without relying on existing infrastructure. Initiated on May 25, 2007, this project resulted in pre-production units tested in realistic operational environments during 2010. A technology licensee, Lindsey Manufacturing of Azusa California, is assisting in design, testing, and ultimately production. The platform was originally designed for a security monitoring mission, but it has been enhanced to include important operational features desired by electrical utilities.

  1. Best Practices for the Security of Radioactive Materials

    SciTech Connect (OSTI)

    Coulter, D.T.; Musolino, S.

    2009-05-01

    This work is funded under a grant provided by the US Department of Health and Human Services, Centers for Disease Control. The Department of Health and Mental Hygiene (DOHMH) awarded a contract to Brookhaven National Laboratory (BNL) to develop best practices guidance for Office of Radiological Health (ORH) licensees to increase on-site security to deter and prevent theft of radioactive materials (RAM). The purpose of this document is to describe best practices available to manage the security of radioactive materials in medical centers, hospitals, and research facilities. There are thousands of such facilities in the United States, and recent studies suggest that these materials may be vulnerable to theft or sabotage. Their malevolent use in a radiological-dispersion device (RDD), viz., a dirty bomb, can have severe environmental- and economic- impacts, the associated area denial, and potentially large cleanup costs, as well as other effects on the licensees and the public. These issues are important to all Nuclear Regulatory Commission and Agreement State licensees, and to the general public. This document outlines approaches for the licensees possessing these materials to undertake security audits to identify vulnerabilities in how these materials are stored or used, and to describe best practices to upgrade or enhance their security. Best practices can be described as the most efficient (least amount of effort/cost) and effective (best results) way of accomplishing a task and meeting an objective, based on repeatable procedures that have proven themselves over time for many people and circumstances. Best practices within the security industry include information security, personnel security, administrative security, and physical security. Each discipline within the security industry has its own 'best practices' that have evolved over time into common ones. With respect to radiological devices and radioactive-materials security, industry best practices encompass

  2. Secure content objects

    DOE Patents [OSTI]

    Evans, William D.

    2009-02-24

    A secure content object protects electronic documents from unauthorized use. The secure content object includes an encrypted electronic document, a multi-key encryption table having at least one multi-key component, an encrypted header and a user interface device. The encrypted document is encrypted using a document encryption key associated with a multi-key encryption method. The encrypted header includes an encryption marker formed by a random number followed by a derivable variation of the same random number. The user interface device enables a user to input a user authorization. The user authorization is combined with each of the multi-key components in the multi-key encryption key table and used to try to decrypt the encrypted header. If the encryption marker is successfully decrypted, the electronic document may be decrypted. Multiple electronic documents or a document and annotations may be protected by the secure content object.

  3. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E.

    1997-06-01

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  4. Workers Across the Nuclear Security Enterprise Give Back This Holiday

    National Nuclear Security Administration (NNSA)

    Season | National Nuclear Security Administration | (NNSA) Workers Across the Nuclear Security Enterprise Give Back This Holiday Season December 23, 2009 This holiday season, employees from across the nuclear security enterprise have found countless ways to make this time of year more cheerful by lending a helping hand to the less fortunate in their communities. The following is a short summary of some of those efforts: Kansas City Plant (KCP) off site link Through the Salvation Army's Angel

  5. Underground Facility at Nevada National Security Site | National Nuclear

    National Nuclear Security Administration (NNSA)

    Security Administration | (NNSA) Underground Facility at Nevada National Security Site The U1a Complex is an underground laboratory at the Nevada National Security Site used for dynamic experiments with special nuclear material (SNM) and other weapon materials. The Complex provides an infrastructure of high-bandwidth diagnostics, data acquisition, timing and firing, control and monitor systems capable of supporting experiments designed to acquire information on fundamental materials

  6. Employees from Throughout the Nuclear Security Enterprise Give Back this

    National Nuclear Security Administration (NNSA)

    Holiday Season | National Nuclear Security Administration | (NNSA) Employees from Throughout the Nuclear Security Enterprise Give Back this Holiday Season December 15, 2010 This holiday season, employees from across the nuclear security enterprise have found countless ways to make this time of year more cheerful by lending a helping hand to the less fortunate in their communities. The following is a summary of some of those efforts: Kansas City Plant Kansas City Plant (KCP) employees gave

  7. Solid Electrolyte: the Key for High-Voltage Lithium Batteries...

    Office of Scientific and Technical Information (OSTI)

    Solid Electrolyte: the Key for High-Voltage Lithium Batteries Citation Details In-Document Search Title: Solid Electrolyte: the Key for High-Voltage Lithium Batteries Authors: Li, ...

  8. Cyber Security Evaluation Tool

    Energy Science and Technology Software Center (OSTI)

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization’s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied tomore » enhance cybersecurity controls.« less

  9. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  10. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    More than 240 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 10, 2013 Employees and retirees perform 270,000 volunteer hours LOS ALAMOS, N.M., June 10, 2013-Nonprofit organizations will receive more than $180,000 from Los Alamos National Security (LANS), LLC during a recognition event beginning at 9:30 a.m. June 12, at Fuller Lodge in downtown Los Alamos. LANS contributions are determined by the number of volunteer hours logged by Los Alamos

  11. Nevada National Security Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Proud Past, Exciting Future Nevada National Security Site Pre-Proposal Meeting November 19, 2015 Agenda * 8:30 am Welcome * 9:00 am Overview of NNSS and NFO * 10:00 am Break * 10:30 am NNSS Video * 11:00 am Questions * 11:30 am Lunch * 1:00 pm Solicitation Overview * 2:15 pm Break * 2:45 pm Questions * 4:00 pm Conclusion The Nevada National Security Site * Large geographically diverse outdoor laboratory - 1,360 square miles of federally owned and controlled land - Surrounded by 4,500 square

  12. Cyber Security Evaluation Tool

    SciTech Connect (OSTI)

    2009-08-03

    CSET is a desktop software tool that guides users through a step-by-step process to assess their control system network security practices against recognized industry standards. The output from CSET is a prioritized list of recommendations for improving the cyber security posture of your organization?¢????s ICS or enterprise network. CSET derives the recommendations from a database of cybersecurity standards, guidelines, and practices. Each recommendation is linked to a set of actions that can be applied to enhance cybersecurity controls.

  13. Securing Infrastructure from High Explosive Threats

    SciTech Connect (OSTI)

    Glascoe, L; Noble, C; Reynolds, J; Kuhl, A; Morris, J

    2009-03-20

    Lawrence Livermore National Laboratory (LLNL) is working with the Department of Homeland Security's Science and Technology Directorate, the Transportation Security Administration, and several infrastructure partners to characterize and help mitigate principal structural vulnerabilities to explosive threats. Given the importance of infrastructure to the nation's security and economy, there is a clear need for applied research and analyses (1) to improve understanding of the vulnerabilities of these systems to explosive threats and (2) to provide decision makers with time-critical technical assistance concerning countermeasure and mitigation options. Fully-coupled high performance calculations of structural response to ideal and non-ideal explosives help bound and quantify specific critical vulnerabilities, and help identify possible corrective schemes. Experimental validation of modeling approaches and methodologies builds confidence in the prediction, while advanced stochastic techniques allow for optimal use of scarce computational resources to efficiently provide infrastructure owners and decision makers with timely analyses.

  14. Voltage modulation of propagating spin waves in Fe

    SciTech Connect (OSTI)

    Nawaoka, Kohei; Shiota, Yoichi; Miwa, Shinji; Tamura, Eiiti; Tomita, Hiroyuki; Mizuochi, Norikazu; Shinjo, Teruya; Suzuki, Yoshishige

    2015-05-07

    The effect of a voltage application on propagating spin waves in single-crystalline 5?nm-Fe layer was investigated. Two micro-sized antennas were employed to excite and detect the propagating spin waves. The voltage effect was characterized using AC lock-in technique. As a result, the resonant field of the magnetostatic surface wave in the Fe was clearly modulated by the voltage application. The modulation is attributed to the voltage induced magnetic anisotropy change in ferromagnetic metals.

  15. Towards predicting voltage dependences of electrode/electrolyte...

    Office of Scientific and Technical Information (OSTI)

    Towards predicting voltage dependences of electrodeelectrolyte interfacial processesnin lithium ion batteries. Citation Details In-Document Search Title: Towards predicting ...

  16. Model Repair Specifications for Low Voltage Induction Motors | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy Repair Specifications for Low Voltage Induction Motors Model Repair Specifications for Low Voltage Induction Motors These Model Repair Specifications are intended to cover routine repair and rewind of low-voltage random-wound three-phase AC squirrel cage induction motors. Model Repair Specifications for Low Voltage Induction Motors (November 1999) (1.31 MB) More Documents & Publications DOE Navigant Master Presentation Improving Motor and Drive System Performance - A Sourcebook

  17. Re-designing the PhEDEx Security Model

    SciTech Connect (OSTI)

    Huang, C.-H.; Wildish, T.; Zhang, X.

    2014-01-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.

  18. NATIONAL SECURITY TECHNOLOGIES - NEVADA NATIONAL SECURITY SITE

    National Nuclear Security Administration (NNSA)

    - NEVADA NATIONAL SECURITY SITE FISCAL YEARS 2009 THRU 2015 SMALL BUSINESS PROGRAM RESULTS & FORECAST CATEGORY Total Procurement Total SB Small Disad. Bus Woman-Owned SB Hub-Zone SB Veteran-Owned SB Service Disabled Vet. SB FY 2009 Dollars Goal (projected) $210,000,000 $139,860,000 $12,600,000 $14,700,000 $6,300,000 $42,000,000 $4,200,000 FY 2009 Dollars Accomplished $222,209,712 $142,098,377 $7,570,924 $11,761,989 $3,243,572 $79,415,951 $2,797,603 FY 2009 % Goal 66.60% 6.00% 7.00% 3.00%

  19. System for increasing corona inception voltage of insulating oils

    DOE Patents [OSTI]

    Rohwein, G.J.

    1998-05-19

    The Corona Inception Voltage of insulating oils is increased by repetitive cycles of prestressing the oil with a voltage greater than the corona inception voltage, and either simultaneously or serially removing byproducts of corona by evacuation and heating the oil. 5 figs.

  20. PRECISION TIME-DELAY CIRCUIT

    DOE Patents [OSTI]

    Creveling, R.

    1959-03-17

    A tine-delay circuit which produces a delay time in d. The circuit a capacitor, an te back resistance, connected serially with the anode of the diode going to ground. At the start of the time delay a negative stepfunction is applied to the series circuit and initiates a half-cycle transient oscillatory voltage terminated by a transient oscillatory voltage of substantially higher frequency. The output of the delay circuit is taken at the junction of the inductor and diode where a sudden voltage rise appears after the initiation of the higher frequency transient oscillations.

  1. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  2. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  3. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  4. Headquarters Security Operations

    Broader source: Energy.gov [DOE]

    DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

  5. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  6. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  7. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  8. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  9. Y-12 National Security Complex | National Nuclear Security Administrat...

    National Nuclear Security Administration (NNSA)

    Y-12 National Security Complex Y-12 National Security Complex DE-AC05-00OR22800 Operated by Babcock & Wilcox Technical Services Y-12, LLC Updated to Modification 297 dated 0930...

  10. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  11. Voltage and current transducer harmonic sensitivity analysis

    SciTech Connect (OSTI)

    Domijan, A. Jr.

    1998-10-01

    This work presents the results of a study on the sensitivity of real power as a function of harmonic magnitudes and angles. These transducers are ones that are typical of those used, in combination with metering instruments, to measure the performance of variable-speed drives. Frequency response tests were performed on two different signal transducers (voltage and current) up to the 50th harmonic in accordance with Institute of Electrical and Electronics engineers (IEEE) Standard 519-1992. Results from these tests gave maximum magnitude percentage errors of {minus}2.2% (at 15th harmonic) and maximum phase shifts of +3.3 (at 50th harmonic) for voltage (at 120 V) and maximum percentage error of {minus}1.9% (at 2d harmonic) and maximum phase shift of {minus}4.3 for current (at 5 A). Using the percentage errors at 120 V and 5 A throughout the 60 Hz through 3,000 Hz range, in harmonic magnitudes and harmonic angles exhibited by the transducers, mathematical analysis was done on two sets of distorted signals and a sensitivity analysis was done to determine what would be the impact of the actual transducers` errors on the final calculation of real power. Variations of {minus}1.48% and {minus}1.60% were obtained. Then, assuming a maximum 5% change in current harmonic magnitudes and angles, a maximum real power percent variation of 0.02% and 2.47% were obtained for the same two sets of field-recorded voltage and current waveforms sets.

  12. Nuclear Security 101 | National Nuclear Security Administration | (NNSA)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security 101 March 23, 2012 The goal of United States Government's nuclear security programs is to prevent the illegal possession, use or transfer of nuclear material, technology and expertise or radioactive material. Successful nuclear security relies on the integration of technology, policy, operational concepts and international collaboration to prevent acts of nuclear terrorism. The Basics of Nuclear Security include: Removing or Eliminating Highly Enriched Uranium (HEU) and

  13. Nevada National Security Site | National Nuclear Security Administration |

    National Nuclear Security Administration (NNSA)

    (NNSA) Nevada National Security Site August 23, 2010 The primary mission of the National Nuclear Security Administration (NNSA) is to maintain the safety, security and effectiveness of the nation's nuclear deterrent through surveillance programs and life extension campaigns. Exercising the skills and capabilities required to accomplish that mission provide the nation with a unique capability to support a wide variety of additional national security missions. To maximize this potential, NNSA

  14. Security for Radioactive Sources: Fact Sheet | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Security for Radioactive Sources: Fact Sheet March 23, 2012 Radioactive materials are a critical and beneficial component of global medical, industrial, and academic efforts. The possibility that these materials could be used by terrorists is a national security concern. The National Nuclear Security Administration (NNSA), along with international and domestic partners, addresses radiological material security as part of its nuclear nonproliferation mission. US

  15. Argonne National Laboratory | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Argonne National Laboratory First-of-its-Kind NNSA Capability to Support Study of Materials at Extreme Conditions for Stockpile Stewardship WASHINGTON - A new first-of-its-kind-worldwide research capability will help unravel the mysteries of material behavior at extreme conditions and short time scales in support of the Department of Energy's National Nuclear Security Administration's (DOE/NNSA's) vital

  16. Apparatus for producing voltage and current pulses

    DOE Patents [OSTI]

    Kirbie, Hugh; Dale, Gregory E.

    2010-12-21

    An apparatus having one or more modular stages for producing voltage and current pulses. Each module includes a diode charging means to charge a capacitive means that stores energy. One or more charging impedance means are connected to the diode charging means to provide a return current pathway. A solid-state switch discharge means, with current interruption capability, is connected to the capacitive means to discharge stored energy. Finally, a control means is provided to command the switching action of the solid-state switch discharge means.

  17. An accurate continuous calibration system for high voltage current transformer

    SciTech Connect (OSTI)

    Tong Yue; Li Binhong

    2011-02-15

    A continuous calibration system for high voltage current transformers is presented in this paper. The sensor of this system is based on a kind of electronic instrument current transformer, which is a clamp-shape air core coil. This system uses an optical fiber transmission system for its signal transmission and power supply. Finally the digital integrator and fourth-order convolution window algorithm as error calculation methods are realized by the virtual instrument with a personal computer. It is found that this system can calibrate a high voltage current transformer while energized, which means avoiding a long calibrating period in the power system and the loss of power metering expense. At the same time, it has a wide dynamic range and frequency band, and it can achieve a high accuracy measurement in a complex electromagnetic field environment. The experimental results and the on-site operation results presented in the last part of the paper, prove that it can reach the 0.05 accuracy class and is easy to operate on site.

  18. Capacitively coupled RF voltage probe having optimized flux linkage

    DOE Patents [OSTI]

    Moore, James A.; Sparks, Dennis O.

    1999-02-02

    An RF sensor having a novel current sensing probe and a voltage sensing probe to measure voltage and current. The current sensor is disposed in a transmission line to link all of the flux generated by the flowing current in order to obtain an accurate measurement. The voltage sensor is a flat plate which operates as a capacitive plate to sense voltage on a center conductor of the transmission line, in which the measured voltage is obtained across a resistance leg of a R-C differentiator circuit formed by the characteristic impedance of a connecting transmission line and a capacitance of the plate, which is positioned proximal to the center conductor.

  19. Y-12 National Security Campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Y-12 National Security Campus Ambassador Ensher visits Y-12 and NNSS Ambassador Henry S. Ensher, the top U.S. diplomat at the United States Mission to International Organizations in Vienna, Austria, recently visited two facilities to understand NNSA's mission better: the Y-12 National Security Complex and the Nevada National Security Site (NNSS). At Y-12, he

  20. V-130: Microsoft Security Bulletin Advance Notification for April 2013

    Broader source: Energy.gov [DOE]

    Microsoft Security Bulletin Advance Notification for April 2013. Microsoft has posted 2 Critical Bulletins and 7 Important Bulletins. Bulletins with the Maximum Severity Rating and Vulnerability Impact of "Critical" may allow remote execution of code. Microsoft will host a webcast to address customer questions on the security bulletins on April 10, 2013, at 11:00 AM Pacific Time (US & Canada).