National Library of Energy BETA

Sample records for time voltage security

  1. Time's Ontic Voltage Craig Callender

    E-Print Network [OSTI]

    Callender, Craig

    Time's Ontic Voltage Craig Callender Philosophy of time, as practiced throughout the last hundred venue for attacking questions about the nature of time--in sharp contrast to the primary venue slowly in philosophy of time.1 Since twentieth-century analytic philosophy as a whole often drew

  2. Re-Dispatching Generation to Increase Power System Security Margin and Support Low Voltage Bus

    E-Print Network [OSTI]

    Re-Dispatching Generation to Increase Power System Security Margin and Support Low Voltage Bus by re-dispatching generator outputs, using a normal vector found at a voltage collapse boundary or a low voltage boundary (LVB). This method uses the normal vector as an indicator to change the generation

  3. Time varying voltage combustion control and diagnostics sensor

    DOE Patents [OSTI]

    Chorpening, Benjamin T. (Morgantown, WV); Thornton, Jimmy D. (Morgantown, WV); Huckaby, E. David (Morgantown, WV); Fincham, William (Fairmont, WV)

    2011-04-19

    A time-varying voltage is applied to an electrode, or a pair of electrodes, of a sensor installed in a fuel nozzle disposed adjacent the combustion zone of a continuous combustion system, such as of the gas turbine engine type. The time-varying voltage induces a time-varying current in the flame which is measured and used to determine flame capacitance using AC electrical circuit analysis. Flame capacitance is used to accurately determine the position of the flame from the sensor and the fuel/air ratio. The fuel and/or air flow rate (s) is/are then adjusted to provide reduced flame instability problems such as flashback, combustion dynamics and lean blowout, as well as reduced emissions. The time-varying voltage may be an alternating voltage and the time-varying current may be an alternating current.

  4. High voltage electrical amplifier having a short rise time

    DOE Patents [OSTI]

    Christie, David J. (Pleasanton, CA); Dallum, Gregory E. (Livermore, CA)

    1991-01-01

    A circuit, comprising an amplifier and a transformer is disclosed that produces a high power pulse having a fast response time, and that responds to a digital control signal applied through a digital-to-analog converter. The present invention is suitable for driving a component such as an electro-optic modulator with a voltage in the kilovolt range. The circuit is stable at high frequencies and during pulse transients, and its impedance matching circuit matches the load impedance with the output impedance. The preferred embodiment comprises an input stage compatible with high-speed semiconductor components for amplifying the voltage of the input control signal, a buffer for isolating the input stage from the output stage; and a plurality of current amplifiers connected to the buffer. Each current amplifier is connected to a field effect transistor (FET), which switches a high voltage power supply to a transformer which then provides an output terminal for driving a load. The transformer comprises a plurality of transmission lines connected to the FETs and the load. The transformer changes the impedance and voltage of the output. The preferred embodiment also comprises a low voltage power supply for biasing the FETs at or near an operational voltage.

  5. Statistical Estimation of Circuit Timing Vulnerability Due to Leakage-Induced Power Grid Voltage Drop

    E-Print Network [OSTI]

    Najm, Farid N.

    Statistical Estimation of Circuit Timing Vulnerability Due to Leakage-Induced Power Grid Voltage voltage drops on the power grid that can affect circuit timing. We propose a statistical analysis supply voltage to circuit devices is referred to as the power grid. The consequences of power grid

  6. Abstract--The transfer capability on a transmission path is limited by constraints on acceptability, voltage security, small-

    E-Print Network [OSTI]

    Venkatasubramanian, Mani V.

    State University, Pullman, WA 99163 USA (Email: mani@eecs.wsu.edu). utilization of the grid and security on acceptability, voltage security, small- signal stability and transient stability. For a large interconnected power grid, these constraints are influenced significantly by the interactions among path flows

  7. Energy-Aware Modeling and Scheduling of Real-Time Tasks for Dynamic Voltage Scaling

    E-Print Network [OSTI]

    Xu, Cheng-Zhong

    scaling (DVS) is an effective approach to power reduction by scaling the processor voltage and frequency the voltage accordingly. On the other hand, a reduction of the operating frequency leads to an increaseEnergy-Aware Modeling and Scheduling of Real-Time Tasks for Dynamic Voltage Scaling Xiliang Zhong

  8. PreDVS: Preemptive Dynamic Voltage Scaling for Real-time Systems using Approximation Scheme

    E-Print Network [OSTI]

    Mishra, Prabhat

    , dynamic voltage scal- ing, approximation algorithm 1. INTRODUCTION Energy conservation has been the main to save energy is that linear reduction in the supply voltage leads to approximately linear slow downPreDVS: Preemptive Dynamic Voltage Scaling for Real-time Systems using Approximation Scheme Weixun

  9. Energy Aware Dynamic Voltage and Frequency Selection for Real-Time Systems with Energy Harvesting

    E-Print Network [OSTI]

    Qiu, Qinru

    Energy Aware Dynamic Voltage and Frequency Selection for Real-Time Systems with Energy Harvesting}@binghamton.edu Abstract In this paper, an energy aware dynamic voltage and frequency selection (EA-DVFS) algorithm energy and the harvested energy in a future duration. Specifically, if the system has sufficient energy

  10. Cryptanalyzing a discrete-time chaos synchronization secure communication system

    E-Print Network [OSTI]

    Gonzalo Alvarez; Fausto Montoya; Miguel Romera; Gerardo Pastor

    2003-11-21

    This paper describes the security weakness of a recently proposed secure communication method based on discrete-time chaos synchronization. We show that the security is compromised even without precise knowledge of the chaotic system used. We also make many suggestions to improve its security in future versions.

  11. Incorporating voltage security into the planning, operation and monitoring of restructured electric energy markets 

    E-Print Network [OSTI]

    Nair, Nirmal-Kumar

    2006-04-12

    state voltage stability index to detect potential dynamic voltage collapse. Finally, this dissertation examines developments in representation, standardization, communication and exchange of power system data. Power system data is the key input to all...

  12. Z .Bioelectrochemistry and Bioenergetics 45 1998 316 Time course of transmembrane voltage induced by time-varying electric

    E-Print Network [OSTI]

    Ljubljana, University of

    Z .Bioelectrochemistry and Bioenergetics 45 1998 3­16 Time course of transmembrane voltage induced.rBioelectrochemistry and Bioenergetics 45 1998 3­164 Fig. 1. The model on which the calculations were based. The cell is a sphere

  13. Extremum seeking-based optimization of high voltage converter modulator rise-time

    SciTech Connect (OSTI)

    Scheinker, Alexander; Bland, Michael; Krstic, Miroslav; Audia, Jeff

    2013-02-01

    We digitally implement an extremum seeking (ES) algorithm, which optimizes the rise time of the output voltage of a high voltage converter modulator (HVCM) at the Los Alamos Neutron Science Center (LANSCE) HVCM test stand by iteratively, simultaneously tuning the first 8 switching edges of each of the three phase drive waveforms (24 variables total). We achieve a 50 ?s rise time, which is reduction in half compared to the 100 ?s achieved at the Spallation Neutron Source (SNS) at Oak Ridge National Laboratory. Considering that HVCMs typically operate with an output voltage of 100 kV, with a 60Hz repetition rate, the 50 ?s rise time reduction will result in very significant energy savings. The ES algorithm will prove successful, despite the noisy measurements and cost calculations, confirming the theoretical results that the algorithm is not affected by noise whose frequency components are independent of the perturbing frequencies.

  14. Extremum seeking-based optimization of high voltage converter modulator rise-time

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Scheinker, Alexander; Bland, Michael; Krstic, Miroslav; Audia, Jeff

    2013-02-01

    We digitally implement an extremum seeking (ES) algorithm, which optimizes the rise time of the output voltage of a high voltage converter modulator (HVCM) at the Los Alamos Neutron Science Center (LANSCE) HVCM test stand by iteratively, simultaneously tuning the first 8 switching edges of each of the three phase drive waveforms (24 variables total). We achieve a 50 ?s rise time, which is reduction in half compared to the 100 ?s achieved at the Spallation Neutron Source (SNS) at Oak Ridge National Laboratory. Considering that HVCMs typically operate with an output voltage of 100 kV, with a 60Hz repetitionmore »rate, the 50 ?s rise time reduction will result in very significant energy savings. The ES algorithm will prove successful, despite the noisy measurements and cost calculations, confirming the theoretical results that the algorithm is not affected by noise whose frequency components are independent of the perturbing frequencies.« less

  15. Letters to Analytical Chemistry Effects of Constant Voltage on Time Evolution of

    E-Print Network [OSTI]

    Santiago, Juan G.

    Letters to Analytical Chemistry Effects of Constant Voltage on Time Evolution of Propagating, California 94305 We extend the analytical theory of propagating concentra- tion polarization (CP) to describe which has a significant influence on analyte concentrations and electric fields in these devices.10

  16. REAL TIME SYSTEM OPERATIONS 2006-2007

    E-Print Network [OSTI]

    Eto, Joseph H.

    2008-01-01

    for grid topology changes (implying online  security and Security Constrained Economic Dispatch (SCED) procedures.   Built upon GRID-grid, reliability, real?time operator tools, time synchronized phasor  measurements, voltage security.  

  17. Real-Time Security Assessment of Angle Stability Using Synchrophasors

    E-Print Network [OSTI]

    -time operations, be it angle stability or voltage stability. PMU deployment is becoming a common practice across of ap- plications to make use of PMU data has not been at the same pace. This project also analyzes how PMU data can be used to

  18. Time Capsule Signature: Efficient and Provably Secure Constructions

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Time Capsule Signature: Efficient and Provably Secure Constructions Bessie C. Hu1 , Duncan S. Wong1. Time Capsule Signature, first formalized by Dodis and Yum in Financial Cryptography 2005, is a digital signature scheme which al- lows a signature to bear a (future) time t so that the signature will only

  19. Effects of Impulse Voltage Polarity, Peak Amplitude, and Rise Time on Streamers Initiated From a Needle Electrode in Transformer Oil

    E-Print Network [OSTI]

    Jadidian, Jouya

    An electrothermal hydrodynamic model is presented to evaluate effects of the applied lightning impulse voltage parameters such as polarity, magnitude, and rise time on the initiation and propagation of the streamers formed ...

  20. Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems Kyoung-Don Kang

    E-Print Network [OSTI]

    Kang, Kyoung-Don

    security requirements in soft real-time applications such as battlefield monitoring and target track- ing

  1. Voltage and Timing Adaptation for Variation and Aging Tolerance in Nanometer VLSI Circuits 

    E-Print Network [OSTI]

    Shim, Kyu-Nam 1978-

    2012-09-10

    . Adaptive supply voltage (ASV) is one of the effective adaptation approaches for power-performance tuning. ASV has advantages on controlling dynamic and leakage power, while voltage generation and delivery overheads from conventional ASV systems make...

  2. Enhancing Security of Real-Time Applications on Grids through Dynamic Scheduling

    E-Print Network [OSTI]

    Feitelson, Dror

    Enhancing Security of Real-Time Applications on Grids through Dynamic Scheduling Tao Xie Xiao Qin on Grids require security protections to completely fulfill their security-critical needs. Unfortunately to seamlessly integrate security into real-time scheduling for applications running on Grids. In this paper we

  3. Time Scaling of Chaotic Systems: Application to Secure Communications

    E-Print Network [OSTI]

    Donatello Materassi; Michele Basso

    2007-10-25

    The paper deals with time-scaling transformations of dynamical systems. Such scaling functions operate a change of coordinates on the time axis of the system trajectories preserving its phase portrait. Exploiting this property, a chaos encryption technique to transmit a binary signal through an analog channel is proposed. The scheme is based on a suitable time-scaling function which plays the role of a private key. The encoded transmitted signal is proved to resist known decryption attacks offering a secure and reliable communication.

  4. Security Games with Surveillance Cost and Optimal Timing of Attack Execution

    E-Print Network [OSTI]

    Vorobeychik, Eugene

    of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. Appears inSecurity Games with Surveillance Cost and Optimal Timing of Attack Execution Bo An1 , Matthew Brown Terms Algorithm, Security Keywords Game Theory, Security, Optimization, Stackelberg Games 1

  5. A DSP based real time power quality measurement system with voltage distortion improvement capability 

    E-Print Network [OSTI]

    Gou, Jian

    1992-01-01

    have been established to specify the limitation on the magnitudes of both harmonic currents and harmonic voltage distortion at different frequencies. Among these the "IEEE Guide for Harmonic Control and Reactive Compensation of Static Power... by the utility and by the electricity consumer has arrived. These measurements include: current and voltage harmonics, input power 1'actor, reactive power, real power, total harmonic distortion (THD), percentage load unbalance, etc. The measured data can...

  6. Privacy Act Fees and Time Limits | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPosterNational NuclearSecurityDisclosures |Fees and Time

  7. Multiversion Locking Protocol with Freezing for Secure Real-Time Database Systems

    E-Print Network [OSTI]

    Stankovic, John A.

    Multiversion Locking Protocol with Freezing for Secure Real-Time Database Systems Chanjung Park constraints and security requirements, a new method, called the freezing method, is proposed. In order to show

  8. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  9. Developing and Implementing an Institution-Wide Introductory Cyber-Security Course in Record Time

    E-Print Network [OSTI]

    Crabbe, Frederick

    Developing and Implementing an Institution-Wide Introductory Cyber-Security Course in Record Time foundations of cyber security. This decision triggered our attempt to set an "academic world security, as cyber attacks and cyber crime become greater threats to the health and preservation

  10. Integrating Security and Real-Time Requirements Using Covert

    E-Print Network [OSTI]

    Son, Sang H.

    is stated in terms of subjects and objects. An object is understood to be a data file, record, or a field to be made between security and timeliness. We first define mutual information, a measure of the degree showing the efficacy of the scheme obtained through simulation experiments are also discussed. Index Terms

  11. Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

    E-Print Network [OSTI]

    Zhang, Zheshen

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous ...

  12. Unconditional Security of Time-energy Entanglement Quantum Key Distribution using Dual-basis Interferometry

    E-Print Network [OSTI]

    Zheshen Zhang; Jacob Mower; Dirk Englund; Franco N. C. Wong; Jeffrey H. Shapiro

    2014-01-23

    High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric downconversion, and show that it is secure against collective attacks. Its security rests upon visibility data -- obtained from Franson and conjugate-Franson interferometers -- that probe photon-pair frequency correlations and arrival-time correlations. From these measurements an upper bound can be established on the eavesdropper's Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over 200\\,km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700 bit/sec secure-key rate, and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with 15% system efficiency.

  13. Provably secure time distribution for the electric grid

    SciTech Connect (OSTI)

    Smith IV, Amos M; Evans, Philip G; Williams, Brian P; Grice, Warren P

    2015-01-01

    We demonstrate a quantum time distribution (QTD) method that combines the precision of optical timing techniques with the integrity of quantum key distribution (QKD). Critical infrastructure is dependent on microprocessor- and programmable logic-based monitoring and control systems. The distribution of timing information across the electric grid is accomplished by GPS signals which are known to be vulnerable to spoofing. We demonstrate a method for synchronizing remote clocks based on the arrival time of photons in a modifed QKD system. This has the advantage that the signal can be veried by examining the quantum states of the photons similar to QKD.

  14. PACE: Pattern Accurate Computationally Efficient Bootstrapping for Timely Discovery of Cyber-Security Concepts

    SciTech Connect (OSTI)

    McNeil, Nikki C; Bridges, Robert A; Iannacone, Michael D; Czejdo, Bogdan; Perez, Nicolas E; Goodall, John R

    2013-01-01

    Public disclosure of important security information, such as knowledge of vulnerabilities or exploits, often occurs in blogs, tweets, mailing lists, and other online sources significantly before proper classification into structured databases. In order to facilitate timely discovery of such knowledge, we propose a novel semi-supervised learning algorithm, PACE, for identifying and classifying relevant entities in text sources. The main contribution of this paper is an enhancement of the traditional bootstrapping method for entity extraction by employing a time-memory trade-off that simultaneously circumvents a costly corpus search while strengthening pattern nomination, which should increase accuracy. An implementation in the cyber-security domain is discussed as well as challenges to Natural Language Processing imposed by the security domain.

  15. The causal structure of Minkowski space time: possibilities and impossibilities of secure positioning

    E-Print Network [OSTI]

    Muhammad Nadeem

    2015-05-07

    Secure positioning, a prover located at a specified position convinces a set of verifiers at distant reference stations that he/she is indeed at the specific position, is considered to be impossible if the prover and verifiers have no pre-shared data while dishonest provers have an arbitrary amount of pre-shared entanglement [Nature 479, 307-308 (2011)]. We argue here that current impossibility results for secure positioning are the upshot of not utilizing full powers of relativistic quantum information theory and show that secure positioning and hence position-based quantum cryptography is possible if causal structure of Minkowski space time and quantum non-locality is used properly.

  16. A Real-Time Testbed Environment for Cyber-Physical Security on the Power Grid

    E-Print Network [OSTI]

    Koutsandria, Georgia; Gentz, Reinhard; Jamei, Mahdi; Peisert, Sean; Scaglione, Anna; McParland, Chuck

    2015-01-01

    and D. Nicol. SCADA Cyber Security Testbed Development. InOperation, Control and Cyber Security. In Proc. of the Northfully simulated testbed for cyber security of SCADA systems.

  17. Low-voltage gyrotrons

    SciTech Connect (OSTI)

    Glyavin, M. Yu.; Zavolskiy, N. A.; Sedov, A. S. [Institute of Applied Physics RAS, N. Novgorod 603600 (Russian Federation); Nusinovich, G. S. [IREAP, University of Maryland, College Park, Maryland 20742-3511 (United States)

    2013-03-15

    For a long time, the gyrotrons were primarily developed for electron cyclotron heating and current drive of plasmas in controlled fusion reactors where a multi-megawatt, quasi-continuous millimeter-wave power is required. In addition to this important application, there are other applications (and their number increases with time) which do not require a very high power level, but such issues as the ability to operate at low voltages and have compact devices are very important. For example, gyrotrons are of interest for a dynamic nuclear polarization, which improves the sensitivity of the nuclear magnetic resonance spectroscopy. In this paper, some issues important for operation of gyrotrons driven by low-voltage electron beams are analyzed. An emphasis is made on the efficiency of low-voltage gyrotron operation at the fundamental and higher cyclotron harmonics. These efficiencies calculated with the account for ohmic losses were, first, determined in the framework of the generalized gyrotron theory based on the cold-cavity approximation. Then, more accurate, self-consistent calculations for the fundamental and second harmonic low-voltage sub-THz gyrotron designs were carried out. Results of these calculations are presented and discussed. It is shown that operation of the fundamental and second harmonic gyrotrons with noticeable efficiencies is possible even at voltages as low as 5-10 kV. Even the third harmonic gyrotrons can operate at voltages about 15 kV, albeit with rather low efficiency (1%-2% in the submillimeter wavelength region).

  18. A Real-Time Testbed Environment for Cyber-Physical Security on the Power Grid

    E-Print Network [OSTI]

    Koutsandria, Georgia; Gentz, Reinhard; Jamei, Mahdi; Peisert, Sean; Scaglione, Anna; McParland, Chuck

    2015-01-01

    T. Overbye, and D. Nicol. SCADA Cyber Security TestbedA Testbed for Secure and Robust SCADA Systems. SIGBED Rev. ,for Analyzing Security of SCADA Control Systems (TASSCS). In

  19. A Real-Time Testbed Environment for Cyber-Physical Security on the Power Grid

    E-Print Network [OSTI]

    Koutsandria, Georgia; Gentz, Reinhard; Jamei, Mahdi; Peisert, Sean; Scaglione, Anna; McParland, Chuck

    2015-01-01

    Physical Security on the Power Grid Georgia KoutsandriaSecurity Testbeds: Architecture, Application, and Evaluation for Smart Grid.and security of cyber-physical systems (CPSs), such as the power grid,

  20. High voltage pulse conditioning

    DOE Patents [OSTI]

    Springfield, Ray M. (Sante Fe, NM); Wheat, Jr., Robert M. (Los Alamos, NM)

    1990-01-01

    Apparatus for conditioning high voltage pulses from particle accelerators in order to shorten the rise times of the pulses. Flashover switches in the cathode stalk of the transmission line hold off conduction for a determinable period of time, reflecting the early portion of the pulses. Diodes upstream of the switches divert energy into the magnetic and electrostatic storage of the capacitance and inductance inherent to the transmission line until the switches close.

  1. Synchronization of time delay systems using variable delay with reset for enhanced security in communication

    E-Print Network [OSTI]

    G. Ambika; R. E. Amritkar

    2010-07-01

    We have introduced a mechanism for synchronizing chaotic systems by one way coupling with a variable delay that is reset at finite intervals. Here we extend this method to time delay systems and suggest a new cryptosystem based on this. We present the stability analysis as applied to time delay systems and supplement this by numerical simulations in a standard time delay system like Mackey Glass system. We extend the theory to multi- delay systems and propose a bi channel scheme for the implementation of the scheme for communication with enhanced security. We show that since the synchronizing channel carries information from transmitter only at intervals of reset time, it is not susceptible to reconstruction. The message channel being separate can be made complex by linear combination of transmitter variable at different delay times using mutiple delay systems. This method has the additional advantage that it can be adjusted to be delay or anticipatory in synchronization and these provide two additional basic keys that are independent of system delay.

  2. Wide Area Security Region Final Report

    SciTech Connect (OSTI)

    Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin; Gronquist, James; Du, Pengwei; Nguyen, Tony B.; Burns, J. W.

    2010-03-31

    This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of system parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed technology. Recommendations for the future work have also been formulated.

  3. Dielectric-wall linear accelerator with a high voltage fast rise time switch that includes a pair of electrodes between which are laminated alternating layers of isolated conductors and insulators

    DOE Patents [OSTI]

    Caporaso, G.J.; Sampayan, S.E.; Kirbie, H.C.

    1998-10-13

    A dielectric-wall linear accelerator is improved by a high-voltage, fast rise-time switch that includes a pair of electrodes between which are laminated alternating layers of isolated conductors and insulators. A high voltage is placed between the electrodes sufficient to stress the voltage breakdown of the insulator on command. A light trigger, such as a laser, is focused along at least one line along the edge surface of the laminated alternating layers of isolated conductors and insulators extending between the electrodes. The laser is energized to initiate a surface breakdown by a fluence of photons, thus causing the electrical switch to close very promptly. Such insulators and lasers are incorporated in a dielectric wall linear accelerator with Blumlein modules, and phasing is controlled by adjusting the length of fiber optic cables that carry the laser light to the insulator surface. 12 figs.

  4. Dielectric-wall linear accelerator with a high voltage fast rise time switch that includes a pair of electrodes between which are laminated alternating layers of isolated conductors and insulators

    DOE Patents [OSTI]

    Caporaso, George J. (Livermore, CA); Sampayan, Stephen E. (Manteca, CA); Kirbie, Hugh C. (Dublin, CA)

    1998-01-01

    A dielectric-wall linear accelerator is improved by a high-voltage, fast rise-time switch that includes a pair of electrodes between which are laminated alternating layers of isolated conductors and insulators. A high voltage is placed between the electrodes sufficient to stress the voltage breakdown of the insulator on command. A light trigger, such as a laser, is focused along at least one line along the edge surface of the laminated alternating layers of isolated conductors and insulators extending between the electrodes. The laser is energized to initiate a surface breakdown by a fluence of photons, thus causing the electrical switch to close very promptly. Such insulators and lasers are incorporated in a dielectric wall linear accelerator with Blumlein modules, and phasing is controlled by adjusting the length of fiber optic cables that carry the laser light to the insulator surface.

  5. Langmuir probe measurements in a time-fluctuating-highly ionized non-equilibrium cutting arc: Analysis of the electron retarding part of the time-averaged current-voltage characteristic of the probe

    SciTech Connect (OSTI)

    Prevosto, L.; Mancinelli, B.; Kelly, H.; Instituto de Física del Plasma , Departamento de Física, Facultad de Ciencias Exactas y Naturales Ciudad Universitaria Pab. I, 1428 Buenos Aires

    2013-12-15

    This work describes the application of Langmuir probe diagnostics to the measurement of the electron temperature in a time-fluctuating-highly ionized, non-equilibrium cutting arc. The electron retarding part of the time-averaged current-voltage characteristic of the probe was analysed, assuming that the standard exponential expression describing the electron current to the probe in collision-free plasmas can be applied under the investigated conditions. A procedure is described which allows the determination of the errors introduced in time-averaged probe data due to small-amplitude plasma fluctuations. It was found that the experimental points can be gathered into two well defined groups allowing defining two quite different averaged electron temperature values. In the low-current region the averaged characteristic was not significantly disturbed by the fluctuations and can reliably be used to obtain the actual value of the averaged electron temperature. In particular, an averaged electron temperature of 0.98 ± 0.07 eV (= 11400 ± 800 K) was found for the central core of the arc (30 A) at 3.5 mm downstream from the nozzle exit. This average included not only a time-average over the time fluctuations but also a spatial-average along the probe collecting length. The fitting of the high-current region of the characteristic using such electron temperature value together with the corrections given by the fluctuation analysis showed a relevant departure of local thermal equilibrium in the arc core.

  6. Automatic voltage imbalance detector

    DOE Patents [OSTI]

    Bobbett, Ronald E. (Los Alamos, NM); McCormick, J. Byron (Los Alamos, NM); Kerwin, William J. (Tucson, AZ)

    1984-01-01

    A device for indicating and preventing damage to voltage cells such as galvanic cells and fuel cells connected in series by detecting sequential voltages and comparing these voltages to adjacent voltage cells. The device is implemented by using operational amplifiers and switching circuitry is provided by transistors. The device can be utilized in battery powered electric vehicles to prevent galvanic cell damage and also in series connected fuel cells to prevent fuel cell damage.

  7. Experimental validation of a high voltage pulse measurement method.

    SciTech Connect (OSTI)

    Cular, Stefan; Patel, Nishant Bhupendra; Branch, Darren W.

    2013-09-01

    This report describes X-cut lithium niobate's (LiNbO3) utilization for voltage sensing by monitoring the acoustic wave propagation changes through LiNbO3 resulting from applied voltage. Direct current (DC), alternating current (AC) and pulsed voltage signals were applied to the crystal. Voltage induced shift in acoustic wave propagation time scaled quadratically for DC and AC voltages and linearly for pulsed voltages. The measured values ranged from 10 - 273 ps and 189 ps - 2 ns for DC and non-DC voltages, respectively. Data suggests LiNbO3 has a frequency sensitive response to voltage. If voltage source error is eliminated through physical modeling from the uncertainty budget, the sensor's U95 estimated combined uncertainty could decrease to ~0.025% for DC, AC, and pulsed voltage measurements.

  8. 770 IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 A Resilient Real-Time System Design for a Secure

    E-Print Network [OSTI]

    Tolbert, Leon M.

    Design for a Secure and Reconfigurable Power Grid Hairong Qi, Senior Member, IEEE, Xiaorui Wang, Member architecture design that can help assure the security and reliability of the power grid. In this paper, we770 IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 A Resilient Real-Time System

  9. Voltage Converter TYPICAL APPLICATION

    E-Print Network [OSTI]

    Berns, Hans-Gerd

    1 LTC660 100mA CMOS Voltage Converter TYPICAL APPLICATION U s Simple Conversion of 5V to ­5V Supply s Output Drive: 100mA s ROUT: 6.5 (0.65V Loss at 100mA) s BOOST Pin (Pin 1) for Higher Switching Frequency-capacitor voltage converter. It performs supply voltage conversion from positive to negative from an input range

  10. Optical voltage reference

    DOE Patents [OSTI]

    Rankin, R.; Kotter, D.

    1994-04-26

    An optical voltage reference for providing an alternative to a battery source is described. The optical reference apparatus provides a temperature stable, high precision, isolated voltage reference through the use of optical isolation techniques to eliminate current and impedance coupling errors. Pulse rate frequency modulation is employed to eliminate errors in the optical transmission link while phase-lock feedback is employed to stabilize the frequency to voltage transfer function. 2 figures.

  11. Optical voltage reference

    DOE Patents [OSTI]

    Rankin, Richard (Ammon, ID); Kotter, Dale (Bingham County, ID)

    1994-01-01

    An optical voltage reference for providing an alternative to a battery source. The optical reference apparatus provides a temperature stable, high precision, isolated voltage reference through the use of optical isolation techniques to eliminate current and impedance coupling errors. Pulse rate frequency modulation is employed to eliminate errors in the optical transmission link while phase-lock feedback is employed to stabilize the frequency to voltage transfer function.

  12. Eliminate Voltage Unbalance

    SciTech Connect (OSTI)

    Not Available

    2000-01-01

    This two-page abstract provides tips for plant managers on checking and monitoring motor voltage unbalance to improve performance and life-span of industrial motors.

  13. Eliminate Voltage Unbalance

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to the voltage unbalance. Unbalanced currents lead to torque pulsations, increased vibrations and mechanical stresses, increased losses resulting in lower efficiency, and...

  14. Voltage Control Technical Conference

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1-08-Voltage-Control-Technical-Conference Sign In About | Careers | Contact | Investors | bpa.gov Search News & Us Expand News & Us Projects & Initiatives Expand Projects &...

  15. Voltage verification unit

    DOE Patents [OSTI]

    Martin, Edward J. (Virginia Beach, VA)

    2008-01-15

    A voltage verification unit and method for determining the absence of potentially dangerous potentials within a power supply enclosure without Mode 2 work is disclosed. With this device and method, a qualified worker, following a relatively simple protocol that involves a function test (hot, cold, hot) of the voltage verification unit before Lock Out/Tag Out and, and once the Lock Out/Tag Out is completed, testing or "trying" by simply reading a display on the voltage verification unit can be accomplished without exposure of the operator to the interior of the voltage supply enclosure. According to a preferred embodiment, the voltage verification unit includes test leads to allow diagnostics with other meters, without the necessity of accessing potentially dangerous bus bars or the like.

  16. Systematic Security and Timeliness Tradeoffs in Real-Time Embedded Systems Kyoung-Don Kang

    E-Print Network [OSTI]

    Son, Sang H.

    -time applications such as battlefield monitoring and target track- ing. To this end, we define a quantitative metric

  17. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  18. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  19. Voltage balanced multilevel voltage source converter system

    DOE Patents [OSTI]

    Peng, F.Z.; Lai, J.S.

    1997-07-01

    Disclosed is a voltage balanced multilevel converter for high power AC applications such as adjustable speed motor drives and back-to-back DC intertie of adjacent power systems. This converter provides a multilevel rectifier, a multilevel inverter, and a DC link between the rectifier and the inverter allowing voltage balancing between each of the voltage levels within the multilevel converter. The rectifier is equipped with at least one phase leg and a source input node for each of the phases. The rectifier is further equipped with a plurality of rectifier DC output nodes. The inverter is equipped with at least one phase leg and a load output node for each of the phases. The inverter is further equipped with a plurality of inverter DC input nodes. The DC link is equipped with a plurality of rectifier charging means and a plurality of inverter discharging means. The plurality of rectifier charging means are connected in series with one of the rectifier charging means disposed between and connected in an operable relationship with each adjacent pair of rectifier DC output nodes. The plurality of inverter discharging means are connected in series with one of the inverter discharging means disposed between and connected in an operable relationship with each adjacent pair of inverter DC input nodes. Each of said rectifier DC output nodes are individually electrically connected to the respective inverter DC input nodes. By this means, each of the rectifier DC output nodes and each of the inverter DC input nodes are voltage balanced by the respective charging and discharging of the rectifier charging means and the inverter discharging means. 15 figs.

  20. High voltage DC power supply

    DOE Patents [OSTI]

    Droege, Thomas F. (Batavia, IL)

    1989-01-01

    A high voltage DC power supply having a first series resistor at the output for limiting current in the event of a short-circuited output, a second series resistor for sensing the magnitude of output current, and a voltage divider circuit for providing a source of feedback voltage for use in voltage regulation is disclosed. The voltage divider circuit is coupled to the second series resistor so as to compensate the feedback voltage for a voltage drop across the first series resistor. The power supply also includes a pulse-width modulated control circuit, having dual clock signals, which is responsive to both the feedback voltage and a command voltage, and also includes voltage and current measuring circuits responsive to the feedback voltage and the voltage developed across the second series resistor respectively.

  1. High voltage DC power supply

    DOE Patents [OSTI]

    Droege, T.F.

    1989-12-19

    A high voltage DC power supply having a first series resistor at the output for limiting current in the event of a short-circuited output, a second series resistor for sensing the magnitude of output current, and a voltage divider circuit for providing a source of feedback voltage for use in voltage regulation is disclosed. The voltage divider circuit is coupled to the second series resistor so as to compensate the feedback voltage for a voltage drop across the first series resistor. The power supply also includes a pulse-width modulated control circuit, having dual clock signals, which is responsive to both the feedback voltage and a command voltage, and also includes voltage and current measuring circuits responsive to the feedback voltage and the voltage developed across the second series resistor respectively. 7 figs.

  2. Device for monitoring cell voltage

    SciTech Connect (OSTI)

    Doepke, Matthias; Eisermann, Henning

    2012-08-21

    A device for monitoring a rechargeable battery having a number of electrically connected cells includes at least one current interruption switch for interrupting current flowing through at least one associated cell and a plurality of monitoring units for detecting cell voltage. Each monitoring unit is associated with a single cell and includes a reference voltage unit for producing a defined reference threshold voltage and a voltage comparison unit for comparing the reference threshold voltage with a partial cell voltage of the associated cell. The reference voltage unit is electrically supplied from the cell voltage of the associated cell. The voltage comparison unit is coupled to the at least one current interruption switch for interrupting the current of at least the current flowing through the associated cell, with a defined minimum difference between the reference threshold voltage and the partial cell voltage.

  3. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  4. Sharp interface and voltage conservation in the phase field method

    E-Print Network [OSTI]

    2007-07-14

    of rabbit ventricles, with a corresponding reduction in simulation time. ... applied to cardiac tissue modeling and examine voltage conservation when using this.

  5. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  6. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    2011-01-01

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  7. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  8. Security and Privacy for Partial Order Time Sean W. Smith J.D. Tygar

    E-Print Network [OSTI]

    Tygar, Doug

    and privacy risks. Se- cure partial order clocks provide a general method to develop application protocols time service simpli es and clari es the This research was sponsored in part by the Advanced Re- search Projects Agency under contract number F19628-93-C- 0193, IBM, Motorola, the National Science Foundation

  9. High voltage coaxial switch

    DOE Patents [OSTI]

    Rink, John P. (Los Alamos, NM)

    1983-07-19

    A coaxial high voltage, high current switch having a solid cylindrical cold cathode coaxially surrounded by a thin hollow cylindrical inner electrode and a larger hollow cylindrical outer electrode. A high voltage trigger between the cathode and the inner electrode causes electrons to be emitted from the cathode and flow to the inner electrode preferably through a vacuum. Some of the electrons penetrate the inner electrode and cause a volumetric discharge in the gas (which may be merely air) between the inner and outer electrodes. The discharge provides a low impedance path between a high voltage charge placed on the outer electrode and a load (which may be a high power laser) coupled to the inner electrode. For high repetition rate the gas between the inner and outer electrodes may be continuously exchanged or refreshed under pressure.

  10. High voltage coaxial switch

    DOE Patents [OSTI]

    Rink, J.P.

    1983-07-19

    A coaxial high voltage, high current switch having a solid cylindrical cold cathode coaxially surrounded by a thin hollow cylindrical inner electrode and a larger hollow cylindrical outer electrode. A high voltage trigger between the cathode and the inner electrode causes electrons to be emitted from the cathode and flow to the inner electrode preferably through a vacuum. Some of the electrons penetrate the inner electrode and cause a volumetric discharge in the gas (which may be merely air) between the inner and outer electrodes. The discharge provides a low impedance path between a high voltage charge placed on the outer electrode and a load (which may be a high power laser) coupled to the inner electrode. For high repetition rate the gas between the inner and outer electrodes may be continuously exchanged or refreshed under pressure. 3 figs.

  11. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY

  12. A Framework of Concurrent Task Scheduling and Dynamic Voltage and Frequency Scaling in Real-Time Embedded Systems with Energy Harvesting

    E-Print Network [OSTI]

    Pedram, Massoud

    harvesting is a promising technique to overcome the limitation imposed by the finite energy capacity harvesting module is comprised of a Photovoltaic (PV) panel for harvesting energy and a supercapacitor, photovoltaic, real-time embedded system, supercapacitor 1. Introduction Minimizing power consumption remains

  13. COSC 472 Network Security Annie Lu 1 COSC 472 Network Security

    E-Print Network [OSTI]

    Lu, Enyue "Annie"

    Network Security Annie Lu Background · Information Security requirements have changed in recent times to protect data during transmission #12;COSC 472 Network Security Annie Lu 6 Security · Information Security Security Annie Lu Computer Security · the protection afforded to an automated information system in order

  14. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  15. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  16. Charge-pump voltage converter

    DOE Patents [OSTI]

    Brainard, John P. (Albuquerque, NM); Christenson, Todd R. (Albuquerque, NM)

    2009-11-03

    A charge-pump voltage converter for converting a low voltage provided by a low-voltage source to a higher voltage. Charge is inductively generated on a transfer rotor electrode during its transit past an inductor stator electrode and subsequently transferred by the rotating rotor to a collector stator electrode for storage or use. Repetition of the charge transfer process leads to a build-up of voltage on a charge-receiving device. Connection of multiple charge-pump voltage converters in series can generate higher voltages, and connection of multiple charge-pump voltage converters in parallel can generate higher currents. Microelectromechanical (MEMS) embodiments of this invention provide a small and compact high-voltage (several hundred V) voltage source starting with a few-V initial voltage source. The microscale size of many embodiments of this invention make it ideally suited for MEMS- and other micro-applications where integration of the voltage or charge source in a small package is highly desirable.

  17. Protocol, Security Assistance- January 2007

    Broader source: Energy.gov [DOE]

    Provide timely technical assistance and system support to Field and HQ Elements to enhance site safeguards and security.

  18. DECENTRALIZED CONTROL ARCHITECTURE FOR COUPLING MICROGRIDS INTO DISTRIBUTION NETWORKS 1 Task 1: Coupling Low-Voltage Microgrids into

    E-Print Network [OSTI]

    Lemmon, Michael

    DECENTRALIZED CONTROL ARCHITECTURE FOR COUPLING MICROGRIDS INTO DISTRIBUTION NETWORKS 1 Task 1: Coupling Low-Voltage Microgrids into Mid-Voltage Distribution Systems Zhao Wang, Student Member, IEEE-voltage (LV) microgrids. At the same time, reactive power is dispatched coordinatively so that voltage

  19. High-output microwave detector using voltage-induced ferromagnetic resonance

    SciTech Connect (OSTI)

    Shiota, Yoichi Suzuki, Yoshishige; Miwa, Shinji; Tamaru, Shingo; Nozaki, Takayuki; Kubota, Hitoshi; Fukushima, Akio; Yuasa, Shinji

    2014-11-10

    We investigated the voltage-induced ferromagnetic resonance (FMR) with various DC bias voltage and input RF power in magnetic tunnel junctions. We found that the DC bias monotonically increases the homodyne detection voltage due to the nonlinear FMR originating in an asymmetric magnetization-potential in the free layer. In addition, the linear increase of an output voltage to the input RF power in the voltage-induced FMR is more robust than that in spin-torque FMR. These characteristics enable us to obtain an output voltage more than ten times than that of microwave detectors using spin-transfer torque.

  20. Temperature controlled high voltage regulator

    DOE Patents [OSTI]

    Chiaro, Jr., Peter J. (Clinton, TN); Schulze, Gerald K. (Knoxville, TN)

    2004-04-20

    A temperature controlled high voltage regulator for automatically adjusting the high voltage applied to a radiation detector is described. The regulator is a solid state device that is independent of the attached radiation detector, enabling the regulator to be used by various models of radiation detectors, such as gas flow proportional radiation detectors.

  1. Voltage sensor and dielectric material

    DOE Patents [OSTI]

    Yakymyshyn, Christopher Paul; Yakymyshyn, Pamela Jane; Brubaker, Michael Allen

    2006-10-17

    A voltage sensor is described that consists of an arrangement of impedance elements. The sensor is optimized to provide an output ratio that is substantially immune to changes in voltage, temperature variations or aging. Also disclosed is a material with a large and stable dielectric constant. The dielectric constant can be tailored to vary with position or direction in the material.

  2. Scaling Analysis of On-Chip Power Grid Voltage Variations in Nanometer Scale ULSI

    E-Print Network [OSTI]

    Pedram, Massoud

    Scaling Analysis of On-Chip Power Grid Voltage Variations in Nanometer Scale ULSI AMIR H. AJAMI, 1 be insufficient to limit the voltage fluctuations over the power grid for future technologies. It is also shown voltage drop in the power grid may result in a functional failure in dynamic logic and a timing violation

  3. Postal Security Device Security Policy

    E-Print Network [OSTI]

    Postal Security Device Security Policy FRAMA AG PSD - I Version: R01.06 Date: 25.05.2007 Doc.-ID: DE_FNKPSD_510_SPE File name: DE_FNKPSD_510_SPE_R0106_EN.Security Policy PSD Author: Bernd Zinke, Timo » Non-Confidential « #12;Security Policy FRAMA AG CH-3438 LAUPERSWIL / BERN TITLE: POSTAL SECURITY

  4. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  5. Method of Controlling Corona Effects and Breakdown Voltage of Small Air Gaps Stressed by Impulse Voltages

    E-Print Network [OSTI]

    Athanasios Maglaras; Trifon Kousiouris; Frangiskos Topalis; Dimitrios Katsaros; Leandros A. Maglaras; Konstantina Giannakopoulou

    2014-10-15

    This paper investigates the influence of a resistor on the dielectric behavior of an air gap. The resistor is connected in series with the air gap and the latter is stressed by impulse voltage. Air gap arrangements of different geometry with either the rod or the plate grounded are stressed with impulse voltages of both positive and negative polarity. The resistor is connected in series with the air gap in the return circuit connecting the gap with the impulse generator. The method followed involves the investigation of the graphs of the charging time concerning the air gaps capacitances, in connection to the value of the resistor, the geometry of the gap, the effect of grounding and the polarity effect. It is determined that the charging time of the air gap increases, as the value of the resistor increases. It is also determined that the peak voltage value of the fully charged air gap decreases as the value of the resistor increases. The results of the mathematical and simulation analysis are compared with the results of the oscillograms taken from experimental work. In addition and consequently to the above results it is concluded from the experimental work that the in series connection of the resistor in the circuit has significant influence on corona pulses (partial discharges) occurring in the gap and on the breakdown voltage of the gap. A new method of controlling the corona effects and consequently the breakdown voltage of small air gaps stressed by impulse voltage of short duration in connection to the ground effect and the polarity effect has arisen. Furthermore through mathematical analysis of the charging graphs obtained from simulation and experimental oscillograms there was a calculation of the values of the capacitance of the air gaps in relation to their geometry and the results were compared to the values calculated with mathematical analysis.

  6. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 supersedes DOE O 472.2 Admin Chg 1.

  7. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  8. Voltage Regulation PHYS 309 Name

    E-Print Network [OSTI]

    Herman, Rhett

    an regulated output of 5. It will also put out up to 1.5 yielding a power of 7.5. Obviously there are some LED circuits is to be used as a switch. Use 6 identical LEDs in this circuit. Use a multimeter to check that the LEDs all activate at the same voltage. Record the value of the LED voltage and your Zener

  9. Smallholder farmer welfare in a time of changing climate: the role of cropping decisions in local food security in the Nainital District of Uttarakhand, India

    E-Print Network [OSTI]

    Lin, Marena

    2013-01-01

    geting and the functional reduction in food subsidies, atof food security, the PDS appears at least functional. This

  10. PREDICTING VOLTAGE DROOPS USING RECURRING PROGRAM

    E-Print Network [OSTI]

    Brooks, David

    ($200 mV for a nominal volt- age of 1.1 V).1 Such conservative operating voltage margins guarantee VOLTAGE DROOPS USING RECURRING PROGRAM AND MICROARCHITECTURAL EVENT ACTIVITY .......................................................................................................................................................................................................................... SHRINKING FEATURE SIZE AND DIMINISHING SUPPLY VOLTAGE ARE MAKING CIRCUITS MORE SENSITIVE TO SUPPLY VOLTAGE

  11. Voltage, energy and power in electric circuits

    E-Print Network [OSTI]

    Haase, Markus

    Voltage, energy and power in electric circuits Science teaching unit #12;Disclaimer The Department-2008DVD-EN Voltage, energy and power in electric circuits #12;#12;© Crown copyright 2008 1The National Strategies | Secondary Voltage, energy and power in electric circuits 00094-2008DVD-EN Contents Voltage

  12. Information Security: Coordination of Federal Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Information Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO...

  13. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  14. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    through these relationships that will transition into technologies that address DOE Roadmap challenges. R&D Activities: Real-time digital simulator Advanced security...

  15. High voltage MOSFET switching circuit

    DOE Patents [OSTI]

    McEwan, Thomas E. (Livermore, CA)

    1994-01-01

    The problem of source lead inductance in a MOSFET switching circuit is compensated for by adding an inductor to the gate circuit. The gate circuit inductor produces an inductive spike which counters the source lead inductive drop to produce a rectangular drive voltage waveform at the internal gate-source terminals of the MOSFET.

  16. Saving Megawatts with Voltage Optimization 

    E-Print Network [OSTI]

    Wilson, T.; Bell, D.

    2010-01-01

    In September 2008, PCS UtiliData commissioned an Industrial Voltage Optimization system at the Plum Creek Timber Medium Density Fiberboard facility in Columbia Falls, Montana. The system was based upon the AdaptiVolt(TM) Volt/VAR Optimization system...

  17. Current vs. Voltage Feedback Amplifiers

    E-Print Network [OSTI]

    Papavassiliou, Christos

    ?' In most applications, the differences between current feedback (CFB) and voltage feedback (VFB) are not apparent. Today's CFB and VFB amplifiers have comparable performance, but there are cer- tain unique Performance · Feedback Freedom Aside from the well-known attribute of CFB amplifiers, gain

  18. High voltage MOSFET switching circuit

    DOE Patents [OSTI]

    McEwan, T.E.

    1994-07-26

    The problem of source lead inductance in a MOSFET switching circuit is compensated for by adding an inductor to the gate circuit. The gate circuit inductor produces an inductive spike which counters the source lead inductive drop to produce a rectangular drive voltage waveform at the internal gate-source terminals of the MOSFET. 2 figs.

  19. Secure control systems with application to cyber-physical systems

    SciTech Connect (OSTI)

    Dong, Jin; Djouadi, Seddik M; Nutaro, James J; Kuruganti, Phani Teja

    2014-01-01

    Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

  20. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  1. High voltage photovoltaic power converter

    DOE Patents [OSTI]

    Haigh, Ronald E. (Arvada, CO); Wojtczuk, Steve (Cambridge, MA); Jacobson, Gerard F. (Livermore, CA); Hagans, Karla G. (Livermore, CA)

    2001-01-01

    An array of independently connected photovoltaic cells on a semi-insulating substrate contains reflective coatings between the cells to enhance efficiency. A uniform, flat top laser beam profile is illuminated upon the array to produce electrical current having high voltage. An essentially wireless system includes a laser energy source being fed through optic fiber and cast upon the photovoltaic cell array to prevent stray electrical signals prior to use of the current from the array. Direct bandgap, single crystal semiconductor materials, such as GaAs, are commonly used in the array. Useful applications of the system include locations where high voltages are provided to confined spaces such as in explosive detonation, accelerators, photo cathodes and medical appliances.

  2. Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    weapons from the James Martin center for Nonproliferation Studies Homeland Security Digital Library HSDL is the nation's premier research collection of open-source resources...

  3. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  4. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  5. Safeguards and Security and Cyber Security RM

    Office of Environmental Management (EM)

    using security measures such as badging, pre-employment investigation and fitness for duty, training, and security awareness? Cyber Security CS-1 Has the project...

  6. Primary Voltage Control in Active Distribution Networks via Broadcast Signals

    E-Print Network [OSTI]

    Diggavi, Suhas

    energy storage. We show that it is possible to use the same broadcast signal deployed for controlling) for real-time demand response developed by the authors in a previous contribution. We estimate the energy--Active distribution network, ancillary services, primary voltage control, electrical energy storage systems, broad

  7. Control and Protection Cooperation Strategy for Voltage Instability

    E-Print Network [OSTI]

    Chen, Zhe

    are caused by unexpected backup relay operations due to low voltage or overload state caused by post fault load restoration dynamics. If such state can be sensed and adjusted appropriately prior to those relay adopted to save the system from severe states. A test system is built in real time digital simulator (RTDS

  8. Low power, scalable multichannel high voltage controller

    DOE Patents [OSTI]

    Stamps, James Frederick (Livermore, CA); Crocker, Robert Ward (Fremont, CA); Yee, Daniel Dadwa (Dublin, CA); Dils, David Wright (Fort Worth, TX)

    2006-03-14

    A low voltage control circuit is provided for individually controlling high voltage power provided over bus lines to a multitude of interconnected loads. An example of a load is a drive for capillary channels in a microfluidic system. Control is distributed from a central high voltage circuit, rather than using a number of large expensive central high voltage circuits to enable reducing circuit size and cost. Voltage is distributed to each individual load and controlled using a number of high voltage controller channel switches connected to high voltage bus lines. The channel switches each include complementary pull up and pull down photo isolator relays with photo isolator switching controlled from the central high voltage circuit to provide a desired bus line voltage. Switching of the photo isolator relays is further controlled in each channel switch using feedback from a resistor divider circuit to maintain the bus voltage swing within desired limits. Current sensing is provided using a switched resistive load in each channel switch, with switching of the resistive loads controlled from the central high voltage circuit.

  9. Low power, scalable multichannel high voltage controller

    DOE Patents [OSTI]

    Stamps, James Frederick (Livermore, CA); Crocker, Robert Ward (Fremont, CA); Yee, Daniel Dadwa (Dublin, CA); Dils, David Wright (Fort Worth, TX)

    2008-03-25

    A low voltage control circuit is provided for individually controlling high voltage power provided over bus lines to a multitude of interconnected loads. An example of a load is a drive for capillary channels in a microfluidic system. Control is distributed from a central high voltage circuit, rather than using a number of large expensive central high voltage circuits to enable reducing circuit size and cost. Voltage is distributed to each individual load and controlled using a number of high voltage controller channel switches connected to high voltage bus lines. The channel switches each include complementary pull up and pull down photo isolator relays with photo isolator switching controlled from the central high voltage circuit to provide a desired bus line voltage. Switching of the photo isolator relays is further controlled in each channel switch using feedback from a resistor divider circuit to maintain the bus voltage swing within desired limits. Current sensing is provided using a switched resistive load in each channel switch, with switching of the resistive loads controlled from the central high voltage circuit.

  10. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System-of-systems analysis Visualization tools for complex information Next-generation smart grid technologies Quantum computing, security, and data fusion For more information,...

  11. Dynamic voltage-current characteristics for a water jet plasma arc

    SciTech Connect (OSTI)

    Yang Jiaxiang; Lan Sheng; Xu Zuoming

    2008-05-05

    A virtual instrument technology is used to measure arc current, arc voltage, dynamic V-I characteristics, and nonlinear conductance for a cone-shaped water jet plasma arc under ac voltage. Experimental results show that ac arc discharge mainly happens in water vapor evaporated from water when heated. However, due to water's cooling effect and its conductance, arc conductance, reignition voltage, extinguish voltage, and current zero time are very different from those for ac arc discharge in gas work fluid. These can be valuable to further studies on mechanism and characteristics of plasma ac discharge in water, and even in gas work fluid.

  12. Voltage Vehicles | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-EnhancingEt Al.,Turin,Village of Wellington,FL LLC Jump to:EnergyVogt SolarVoltage

  13. STAR: Secure RealTime Transaction Processing with Timeliness Guarantees \\Lambda KyoungDon Kang Sang H. Son John A. Stankovic

    E-Print Network [OSTI]

    Son, Sang H.

    to objects. Data and transactions are classified into several security levels, e.g., Top Secret, Secret of sensitive data, e.g., secret trade, manufacturing, or operational data, between transactions belonging

  14. STAR: Secure RealTime Transaction Processing with Timeliness Guarantees \\Lambday KyoungDon Kang Sang H. Son John A. Stankovic

    E-Print Network [OSTI]

    Kang, Kyoung-Don

    to objects. Data and transactions are classified into several security levels, e.g., Top Secret, Secret of sensitive data, e.g., secret trade, manufacturing, or operational data, between transactions belonging

  15. Voltage-dependent behavior of a "ball-and-chain" gramicidin channel

    E-Print Network [OSTI]

    Woolley, G. Andrew; Zunic, Valentin; Karanicolas, John; Jaikaran, Anna S. I.; Starostin, Andrei V.

    1997-11-01

    -trans isomerization on the 10–100-ms time scale. The conductance behavior of gram-EDA is found to be markedly voltage dependent, whereas the behavior of gram-DMEDA is not. In addition, voltage affects the cis-trans ratios of the carbamate groups of gram...

  16. Towards predicting voltage dependences of electrode/electrolyte...

    Office of Scientific and Technical Information (OSTI)

    voltage dependences of electrodeelectrolyte interfacial processesnin lithium ion batteries. Citation Details In-Document Search Title: Towards predicting voltage dependences...

  17. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  18. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  19. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  20. Secure PVM

    SciTech Connect (OSTI)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  1. Wind Power Plant Voltage Stability Evaluation: Preprint

    SciTech Connect (OSTI)

    Muljadi, E.; Zhang, Y. C.

    2014-09-01

    Voltage stability refers to the ability of a power system to maintain steady voltages at all buses in the system after being subjected to a disturbance from a given initial operating condition. Voltage stability depends on a power system's ability to maintain and/or restore equilibrium between load demand and supply. Instability that may result occurs in the form of a progressive fall or rise of voltages of some buses. Possible outcomes of voltage instability are the loss of load in an area or tripped transmission lines and other elements by their protective systems, which may lead to cascading outages. The loss of synchronism of some generators may result from these outages or from operating conditions that violate a synchronous generator's field current limit, or in the case of variable speed wind turbine generator, the current limits of power switches. This paper investigates the impact of wind power plants on power system voltage stability by using synchrophasor measurements.

  2. Aviation security: A system's perspective

    SciTech Connect (OSTI)

    Martin, J.P.

    1988-01-01

    For many years the aviation industry and airports operated with security methods and equipment common to most other large industrial complexes. At that time, the security systems primarily provided asset and property protection. However, soon after the first aircraft hijacking the focus of security shifted to emphasize the security requirements necessary for protecting the traveling public and the one feature of the aviation industry that makes it unique---the airplane. The airplane and its operation offered attractive opportunities for the homesick refugee, the mentally unstable person and the terrorist wanting to make a political statement. The airport and its aircraft were the prime targets requiring enhanced security against this escalated threat. In response, the FAA, airport operators and air carriers began to develop plans for increasing security and assigning responsibilities for implementation.

  3. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  4. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  5. Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity Security

  6. High voltage load resistor array

    DOE Patents [OSTI]

    Lehmann, Monty Ray (Smithfield, VA)

    2005-01-18

    A high voltage resistor comprising an array of a plurality of parallel electrically connected resistor elements each containing a resistive solution, attached at each end thereof to an end plate, and about the circumference of each of the end plates, a corona reduction ring. Each of the resistor elements comprises an insulating tube having an electrode inserted into each end thereof and held in position by one or more hose clamps about the outer periphery of the insulating tube. According to a preferred embodiment, the electrode is fabricated from stainless steel and has a mushroom shape at one end, that inserted into the tube, and a flat end for engagement with the end plates that provides connection of the resistor array and with a load.

  7. Group 3: Humidity, Temperature, and Voltage (Presentation)

    SciTech Connect (OSTI)

    Wohlgemuth, J.

    2013-05-01

    Group 3 is chartered to develop accelerated stress tests that can be used as comparative predictors of module lifetime versus stresses associated with humidity, temperature and voltage.

  8. REAL TIME SYSTEM OPERATIONS 2006-2007

    SciTech Connect (OSTI)

    Eto, Joseph H.; Parashar, Manu; Lewis, Nancy Jo

    2008-08-15

    The Real Time System Operations (RTSO) 2006-2007 project focused on two parallel technical tasks: (1) Real-Time Applications of Phasors for Monitoring, Alarming and Control; and (2) Real-Time Voltage Security Assessment (RTVSA) Prototype Tool. The overall goal of the phasor applications project was to accelerate adoption and foster greater use of new, more accurate, time-synchronized phasor measurements by conducting research and prototyping applications on California ISO's phasor platform - Real-Time Dynamics Monitoring System (RTDMS) -- that provide previously unavailable information on the dynamic stability of the grid. Feasibility assessment studies were conducted on potential application of this technology for small-signal stability monitoring, validating/improving existing stability nomograms, conducting frequency response analysis, and obtaining real-time sensitivity information on key metrics to assess grid stress. Based on study findings, prototype applications for real-time visualization and alarming, small-signal stability monitoring, measurement based sensitivity analysis and frequency response assessment were developed, factory- and field-tested at the California ISO and at BPA. The goal of the RTVSA project was to provide California ISO with a prototype voltage security assessment tool that runs in real time within California ISO?s new reliability and congestion management system. CERTS conducted a technical assessment of appropriate algorithms, developed a prototype incorporating state-of-art algorithms (such as the continuation power flow, direct method, boundary orbiting method, and hyperplanes) into a framework most suitable for an operations environment. Based on study findings, a functional specification was prepared, which the California ISO has since used to procure a production-quality tool that is now a part of a suite of advanced computational tools that is used by California ISO for reliability and congestion management.

  9. The Constant Voltage Transformer (CVT) for Mitigating Effects of Voltage Sags on Industrial Equipment 

    E-Print Network [OSTI]

    Ferraro, R. J.; Osborne, R.; Stephens, R.

    2000-01-01

    , Sizing Constant Voltage Transformers to Maximize Voltage Regulationfor Process Control Devices. 4. EPRl PEAC, 1997, PQTN Application Brochure #Io-Tutorial; Inrush Current Measurement 5. Basic Measuring Instruments, Inc., Alex McEachern, power...

  10. Voltage Collapse SimulationVoltage Collapse Simulation (Eastern Interconnection(Eastern Interconnection

    E-Print Network [OSTI]

    .) · Pie chart: gives percent power flow is of the line's rating 3 #12;Base Case Voltage Contours Area

  11. Current mode integrators and their applications in low-voltage high frequency CMOS signal processing 

    E-Print Network [OSTI]

    Smith, Sterling Lane

    1993-01-01

    Low voltage CMOS fully differential integrators for high frequency continuous-time filters using current-mode techniques are presented.. Current mode techniques are employed to avoid the use of the floating differential ...

  12. Voltage regulation in linear induction accelerators

    DOE Patents [OSTI]

    Parsons, W.M.

    1992-12-29

    Improvement in voltage regulation in a linear induction accelerator wherein a varistor, such as a metal oxide varistor, is placed in parallel with the beam accelerating cavity and the magnetic core is disclosed. The non-linear properties of the varistor result in a more stable voltage across the beam accelerating cavity than with a conventional compensating resistance. 4 figs.

  13. Voltage regulation in linear induction accelerators

    DOE Patents [OSTI]

    Parsons, William M. (Santa Fe, NM)

    1992-01-01

    Improvement in voltage regulation in a Linear Induction Accelerator wherein a varistor, such as a metal oxide varistor, is placed in parallel with the beam accelerating cavity and the magnetic core. The non-linear properties of the varistor result in a more stable voltage across the beam accelerating cavity than with a conventional compensating resistance.

  14. Production of high voltage by ion bombardment 

    E-Print Network [OSTI]

    Phinney, Lucas Carter

    2003-01-01

    and was embedded in a Teflon rod. The beam energies were varied between 30 and 100 kV. A maximum voltage of approximately 90 kV was achieved on the target, and at this voltage, the power efficiency was approximately 85 percent. This power efficiency was greater...

  15. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio August 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Security

  16. INSTITUTE FOR CYBER SECURITY Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Cyber Security: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio August-world impact #12;INSTITUTE FOR CYBER SECURITY Institute for Cyber Security Founded June 2007: still in start

  17. NSM Secure UI Crypto Module Security Policy

    E-Print Network [OSTI]

    NSM Secure UI Crypto Module Security Policy Version: 1.4 Revision Date: April 1, 2010 This document. #12;McAfee, Inc NSM Secure UI Crypto Module Security Policy Page 2 of 15 CHANGE RECORD Revision Date Module Security Policy Page 3 of 15 Contents 1 Module Overview

  18. Security for grids

    E-Print Network [OSTI]

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-01-01

    differences between Grid security and host or site securityof requirements for Grid security in order to achieve thecompletely. Index Terms — Grid security, authentication,

  19. Voltage controlled spintronic devices for logic applications

    DOE Patents [OSTI]

    You, Chun-Yeol (Naperville, IL); Bader, Samuel D. (Oak Park, IL)

    2001-01-01

    A reprogrammable logic gate comprising first and second voltage-controlled rotation transistors. Each transistor comprises three ferromagnetic layers with a spacer and insulating layer between the first and second ferromagnetic layers and an additional insulating layer between the second and third ferromagnetic layers. The third ferromagnetic layer of each transistor is connected to each other, and a constant external voltage source is applied to the second ferromagnetic layer of the first transistor. As input voltages are applied to the first ferromagnetic layer of each transistor, the relative directions of magnetization of the ferromagnetic layers and the magnitude of the external voltage determines the output voltage of the gate. By altering these parameters, the logic gate is capable of behaving as AND, OR, NAND, or NOR gates.

  20. Non-contact current and voltage sensor

    DOE Patents [OSTI]

    Carpenter, Gary D; El-Essawy, Wael; Ferreira, Alexandre Peixoto; Keller, Thomas Walter; Rubio, Juan C; Schappert, Michael A

    2014-03-25

    A detachable current and voltage sensor provides an isolated and convenient device to measure current passing through a conductor such as an AC branch circuit wire, as well as providing an indication of an electrostatic potential on the wire, which can be used to indicate the phase of the voltage on the wire, and optionally a magnitude of the voltage. The device includes a housing that contains the current and voltage sensors, which may be a ferrite cylinder with a hall effect sensor disposed in a gap along the circumference to measure current, or alternative a winding provided through the cylinder along its axis and a capacitive plate or wire disposed adjacent to, or within, the ferrite cylinder to provide the indication of the voltage.

  1. Flexible method for monitoring fuel cell voltage

    DOE Patents [OSTI]

    Mowery, Kenneth D. (Noblesville, IN); Ripley, Eugene V. (Russiaville, IN)

    2002-01-01

    A method for equalizing the measured voltage of each cluster in a fuel cell stack wherein at least one of the clusters has a different number of cells than the identical number of cells in the remaining clusters by creating a pseudo voltage for the different cell numbered cluster. The average cell voltage of the all of the cells in the fuel cell stack is calculated and multiplied by a constant equal to the difference in the number of cells in the identical cell clusters and the number of cells in the different numbered cell cluster. The resultant product is added to the actual voltage measured across the different numbered cell cluster to create a pseudo voltage which is equivalent in cell number to the number of cells in the other identical numbered cell clusters.

  2. Low Beam Voltage, 10 MW, L-Band Cluster Klystron

    SciTech Connect (OSTI)

    Teryaev, V.; /Novosibirsk, IYF; Yakovlev, V.P.; /Fermilab; Kazakov, S.; /KEK, Tsukuba; Hirshfield, J.L.; /Yale U. /Omega-P, New Haven

    2009-05-01

    Conceptual design of a multi-beam klystron (MBK) for possible ILC and Project X applications is presented. The chief distinction between this MBK design and existing 10-MW MBK's is the low operating voltage of 60 kV. There are at least four compelling reasons that justify development at this time of a low-voltage MBK, namely (1) no pulse transformer; (2) no oil tank for high-voltage components and for the tube socket; (3) no high-voltage cables; and (4) modulator would be a compact 60-kV IGBT switching circuit. The proposed klystron consists of four clusters containing six beams each. The tube has common input and output cavities for all 24 beams, and individual gain cavities for each cluster. A closely related optional configuration, also for a 10 MW tube, would involve four totally independent cavity clusters with four independent input cavities and four 2.5 MW output ports, all within a common magnetic circuit. This option has appeal because the output waveguides would not require a controlled atmosphere, and because it would be easier to achieve phase and amplitude stability as required in individual SC accelerator cavities.

  3. Timing discriminator using leading-edge extrapolation

    DOE Patents [OSTI]

    Gottschalk, B.

    1981-07-30

    A discriminator circuit to recover timing information from slow-rising pulses by means of an output trailing edge, a fixed time after the starting corner of the input pulse, which is nearly independent of risetime and threshold setting is described. This apparatus comprises means for comparing pulses with a threshold voltage; a capacitor to be charged at a certain rate when the input signal is one-third threshold voltage, and at a lower rate when the input signal is two-thirds threshold voltage; current-generating means for charging the capacitor; means for comparing voltage capacitor with a bias voltage; a flip-flop to be set when the input pulse reaches threshold voltage and reset when capacitor voltage reaches the bias voltage; and a clamping means for discharging the capacitor when the input signal returns below one-third threshold voltage.

  4. Neutron burst form a high-voltage discharge between palladium electrodes in D sub 2 gas

    SciTech Connect (OSTI)

    Kim, Y.E. . Dept. of Physics)

    1990-12-01

    In this paper a recent experimental observation of a neutron flux burst at a rate of 2 {times} 10{sup 4} times the background rate during a high ac voltage stimulation between two deuterated palladium electrodes in D{sub 2} gas is explained in terms of the experimentally measured deuterium-deuterium (D-D) fusion cross sections. Theoretical criteria and experimental conditions for improving D-D fusion rates with the use of pulsed high-dc voltages are described.

  5. Fiber-optic voltage sensor with cladded fiber and evanescent wave variation detection

    DOE Patents [OSTI]

    Wood, C.B.

    1992-12-15

    A fiber optic voltage sensor is described which includes a source of light, a reference fiber for receiving a known percentage of the light and an electrostrictive element having terminals across which is applied, a voltage to be measured. The electrostrictive element is responsive to the applied voltage to assume an altered physical state. A measuring fiber also receives a known percentage of light from the light source and is secured about the electrostrictive element. The measuring fiber is provided with a cladding and exhibits an evanescent wave in the cladding. The measuring fiber has a known length which is altered when the electrostrictive element assumes its altered physical state. A differential sensor is provided which senses the intensity of light in both the reference fiber and the measuring fiber and provides an output indicative of the difference between the intensities. 3 figs.

  6. Lockout device for high voltage circuit breaker

    DOE Patents [OSTI]

    Kozlowski, L.J.; Shirey, L.A.

    1993-01-26

    An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the respective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.

  7. Lookout device for high voltage circuit breaker

    SciTech Connect (OSTI)

    Kozlowski, L.J.; Shirey, L.A.

    1991-12-31

    An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the respective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.

  8. Lockout device for high voltage circuit breaker

    SciTech Connect (OSTI)

    Kozlowski, Lawrence J. (New Kensington, PA); Shirey, Lawrence A. (North Huntingdon, PA)

    1993-01-01

    An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the repsective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.

  9. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  11. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6. Canceled by Admin Chg 2 dated 5-15-15.

  12. Fiber optic current monitor for high-voltage applications

    DOE Patents [OSTI]

    Renda, G.F.

    1992-04-21

    A current monitor which derives its power from the conductor being measured for bidirectionally measuring the magnitude of current (from DC to above 50 khz) flowing through a conductor across which a relatively high level DC voltage is applied, includes a pair of identical transmitter modules connected in opposite polarity to one another in series with the conductor being monitored, for producing from one module a first light signal having an intensity directly proportional to the magnitude of current flowing in one direction through the conductor during one period of time, and from the other module a second light signal having an intensity directly proportional to the magnitude of current flowing in the opposite direction through the conductor during another period of time, and a receiver located in a safe area remote from the high voltage area for receiving the first and second light signals, and converting the same to first and second voltage signals having levels indicative of the magnitude of current being measured at a given time. 6 figs.

  13. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  14. Faculty Information Security Guide

    E-Print Network [OSTI]

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  15. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  16. Electro-optical voltage sensor head

    DOE Patents [OSTI]

    Woods, Gregory K. (Idaho Falls, ID)

    1998-01-01

    A miniature electro-optic voltage sensor system capable of accurate operation at high voltages. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam's polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured.

  17. Electro-optical voltage sensor head

    DOE Patents [OSTI]

    Woods, G.K.

    1998-03-24

    A miniature electro-optic voltage sensor system capable of accurate operation at high voltages is disclosed. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam`s polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured. 6 figs.

  18. Welcome to the High Voltage Laboratory The EEH -High Voltage Laboratory is part of the Energy Transmission and High Voltage Laboratory

    E-Print Network [OSTI]

    Grabner, Helmut

    Welcome to the High Voltage Laboratory The EEH - High Voltage Laboratory is part of the Energy Transmission and High Voltage Laboratory (EEH) of the Department of Information Technology and Electrical focus of the high voltage laboratory is in the area of technologies for a future sustainable electric

  19. Security Issues in OpenStack Rostyslav Slipetskyy

    E-Print Network [OSTI]

    specification for security assessment of cloud computing services. At the same time different organizations try to create their own guidelines for cloud security. We start our work with comparing available cloud security. Trondheim, June 2011 Rostyslav Slipetskyy iii #12;iv #12;List of Tables 3.1 Cloud Computing Security Issues

  20. Low-Voltage Switched-Capacitor Circuits Emad Bidari

    E-Print Network [OSTI]

    Moon, Un-Ku

    Low-Voltage Switched-Capacitor Circuits by Emad Bidari A THESIS submitted to Oregon State . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2. THE OPERATION AND IMPLEMENTATION OF THE LOW-VOLTAGE INTEGRA- TOR. LOW-VOLTAGE SC FILTER STAGES

  1. Non-iterative Voltage Stability

    SciTech Connect (OSTI)

    Makarov, Yuri V.; Vyakaranam, Bharat; Hou, Zhangshuan; Wu, Di; Meng, Da; Wang, Shaobu; Elbert, Stephen T.; Miller, Laurie E.; Huang, Zhenyu

    2014-09-30

    This report demonstrates promising capabilities and performance characteristics of the proposed method using several power systems models. The new method will help to develop a new generation of highly efficient tools suitable for real-time parallel implementation. The ultimate benefit obtained will be early detection of system instability and prevention of system blackouts in real time.

  2. Modular high voltage power supply for chemical analysis

    DOE Patents [OSTI]

    Stamps, James F. (Livermore, CA); Yee, Daniel D. (Dublin, CA)

    2007-01-09

    A high voltage power supply for use in a system such as a microfluidics system, uses a DC--DC converter in parallel with a voltage-controlled resistor. A feedback circuit provides a control signal for the DC--DC converter and voltage-controlled resistor so as to regulate the output voltage of the high voltage power supply, as well as, to sink or source current from the high voltage supply.

  3. Modular high voltage power supply for chemical analysis

    DOE Patents [OSTI]

    Stamps, James F. (Livermore, CA); Yee, Daniel D. (Dublin, CA)

    2008-07-15

    A high voltage power supply for use in a system such as a microfluidics system, uses a DC-DC converter in parallel with a voltage-controlled resistor. A feedback circuit provides a control signal for the DC-DC converter and voltage-controlled resistor so as to regulate the output voltage of the high voltage power supply, as well as, to sink or source current from the high voltage supply.

  4. Modular high voltage power supply for chemical analysis

    DOE Patents [OSTI]

    Stamps, James F. (Livermore, CA); Yee, Daniel D. (Dublin, CA)

    2010-05-04

    A high voltage power supply for use in a system such as a microfluidics system, uses a DC-DC converter in parallel with a voltage-controlled resistor. A feedback circuit provides a control signal for the DC-DC converter and voltage-controlled resistor so as to regulate the output voltage of the high voltage power supply, as well as, to sink or source current from the high voltage supply.

  5. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  6. Low voltage arc formation in railguns

    DOE Patents [OSTI]

    Hawke, Ronald S. (Livermore, CA)

    1987-01-01

    A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile.

  7. Low voltage arc formation in railguns

    DOE Patents [OSTI]

    Hawke, R.S.

    1985-08-05

    A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile.

  8. Low voltage arc formation in railguns

    DOE Patents [OSTI]

    Hawke, R.S.

    1987-11-17

    A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile. 2 figs.

  9. Electro-optic high voltage sensor

    DOE Patents [OSTI]

    Davidson, James R.; Seifert, Gary D.

    2003-09-16

    A small sized electro-optic voltage sensor capable of accurate measurement of high voltages without contact with a conductor or voltage source is provided. When placed in the presence of an electric field, the sensor receives an input beam of electromagnetic radiation. A polarization beam displacer separates the input beam into two beams with orthogonal linear polarizations and causes one linearly polarized beam to impinge a crystal at a desired angle independent of temperature. The Pockels effect elliptically polarizes the beam as it travels through the crystal. A reflector redirects the beam back through the crystal and the beam displacer. On the return path, the polarization beam displacer separates the elliptically polarized beam into two output beams of orthogonal linear polarization. The system may include a detector for converting the output beams into electrical signals and a signal processor for determining the voltage based on an analysis of the output beams.

  10. Voltage Management of Networks with Distributed Generation. 

    E-Print Network [OSTI]

    O'Donnell, James

    2008-01-01

    At present there is much debate about the impacts and benefits of increasing the amount of generation connected to the low voltage areas of the electricity distribution network. The UK government is under political ...

  11. A 1-V series-array Josephson voltage standard operated at 35 GHz

    SciTech Connect (OSTI)

    Mueller, F.; Koehler, H.; Weber, P.; Bluethner, K.; Meyer, H. )

    1990-11-01

    Josephson voltage standards utilize microwave-induced constant voltage steps in the dc characteristic of Josephson tunnel junctions. This paper describes the design and operation of array circuits with 108 and 2000 junctions connected in series. In contrast with similar realizations, simple {ital Q}-band equipment is used for the microwave supply. The microwave attenuation of 1000 junctions was about 1 dB. The version with 2000 junctions generated Josephson voltages up to 1.2 V when operated at 35 GHz. The stability times of the quantized levels were, under normal laboratory conditions (unshielded room), better than 10 min.

  12. Electrochemical Characterization of Voltage Fade in LMR-NMC cells...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Characterization of Voltage Fade in LMR-NMC cells Electrochemical Characterization of Voltage Fade in LMR-NMC cells 2013 DOE Hydrogen and Fuel Cells Program and Vehicle...

  13. Addressing the Voltage Fade Issue with Lithium-Manganese-Rich...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials Addressing the Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials 2012 DOE Hydrogen and...

  14. Eliminate Excessive In-Plant Distribution System Voltage Drops

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Undervoltage operation can result in increased currents, reduced starting torque, and lower efficiency. Suggested Actions Conduct a voltage drop survey. Voltage drop...

  15. Constant voltage electro-slag remelting control

    DOE Patents [OSTI]

    Schlienger, M.E.

    1996-10-22

    A system for controlling electrode gap in an electro-slag remelt furnace has a constant regulated voltage and an electrode which is fed into the slag pool at a constant rate. The impedance of the circuit through the slag pool is directly proportional to the gap distance. Because of the constant voltage, the system current changes are inversely proportional to changes in gap. This negative feedback causes the gap to remain stable. 1 fig.

  16. Constant voltage electro-slag remelting control

    DOE Patents [OSTI]

    Schlienger, Max E. (Albuquerque, NM)

    1996-01-01

    A system for controlling electrode gap in an electro-slag remelt furnace has a constant regulated voltage and an eletrode which is fed into the slag pool at a constant rate. The impedance of the circuit through the slag pool is directly proportional to the gap distance. Because of the constant voltage, the system current changes are inversely proportional to changes in gap. This negative feedback causes the gap to remain stable.

  17. Group 3: Humidity, Temperature, and Voltage

    Broader source: Energy.gov [DOE]

    This PowerPoint presentation, focused on humidity, temperature and voltage testing, was originally presented by John Wohlgemuth at the NREL 2013 PV Module Reliability Workshop on Feb. 26-27, 2013 in Denver, CO. It summarizes the activities of a working group chartered to develop accelerated stress tests that can be used as comparative predictors of module life versus stresses associated with humidity, temperature and voltage.

  18. Nuclear security

    SciTech Connect (OSTI)

    Not Available

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected.

  19. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  20. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. (The original DOE O 471.6 canceled DOE M 470.4-4A, except for Section D). Admin Chg 2, dated 5-15-15, supersedes Admin Chg 1. Certified 5-21-2015.

  1. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  2. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  3. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  4. 2014 Headquarters Facilities Master Security Plan- Chapter 14, Cyber Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security Describes the DOE Headquarters Cyber Security Program.

  5. McMaster University Security Services

    E-Print Network [OSTI]

    Thompson, Michael

    transport unit. Since that time we have been undergoing a departmental review. It is a great time to expand in Review #12;Annual Report 2004 Page -1- 2004 was another great year for McMaster Security Services and improve our Security Services commitment to McMaster University. In 2004, we were honoured with receiving

  6. 2014 Headquarters Facilities Master Security Plan- Chapter 3, Personnel Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security Describes DOE Headquarters Personnel Security procedures for acquiring, maintaining, and passing security clearances.

  7. Using Operational Security (OPSEC) to Support a Cyber Security...

    Energy Savers [EERE]

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  8. Thermally-induced voltage alteration for integrated circuit analysis

    DOE Patents [OSTI]

    Cole, Jr., Edward I. (Albuquerque, NM)

    2000-01-01

    A thermally-induced voltage alteration (TIVA) apparatus and method are disclosed for analyzing an integrated circuit (IC) either from a device side of the IC or through the IC substrate to locate any open-circuit or short-circuit defects therein. The TIVA apparatus uses constant-current biasing of the IC while scanning a focused laser beam over electrical conductors (i.e. a patterned metallization) in the IC to produce localized heating of the conductors. This localized heating produces a thermoelectric potential due to the Seebeck effect in any conductors with open-circuit defects and a resistance change in any conductors with short-circuit defects, both of which alter the power demand by the IC and thereby change the voltage of a source or power supply providing the constant-current biasing. By measuring the change in the supply voltage and the position of the focused and scanned laser beam over time, any open-circuit or short-circuit defects in the IC can be located and imaged. The TIVA apparatus can be formed in part from a scanning optical microscope, and has applications for qualification testing or failure analysis of ICs.

  9. Low Voltage Operational Amplifier Design for Energy Harvesting Applications

    E-Print Network [OSTI]

    Collins, Gary S.

    Low Voltage Operational Amplifier Design for Energy Harvesting Applications Brisa Calderon, Dr provide low voltages, all the components in a PMS must be able to operate at low voltages. Optimizing these components to operate at low voltages in turn contributes to the optimization of the PMS as a whole. Theory

  10. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Infrastructure Demonstration for Energy reliability and Security) (web link) program to demonstrate: · Cyber-securityEnergy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  11. Principles of ground relaying for high voltage and extra high voltage transmission lines

    SciTech Connect (OSTI)

    Griffin, C.H.

    1983-02-01

    This paper is a tutorial discussion of the basic principles of ground relaying for high voltage and extra high voltage transmission lines. Three different HV configurations are considered: Long lines, lines with a weak mid-point station, and mutually-coupled lines. Application criteria for EHV circuits are also discussed, and specific setting calculations are included where appropriate.

  12. Electronic circuit for measuring series connected electrochemical cell voltages

    DOE Patents [OSTI]

    Ashtiani, Cyrus N. (West Bloomfield, MI); Stuart, Thomas A. (Toledo, OH)

    2000-01-01

    An electronic circuit for measuring voltage signals in an energy storage device is disclosed. The electronic circuit includes a plurality of energy storage cells forming the energy storage device. A voltage divider circuit is connected to at least one of the energy storage cells. A current regulating circuit is provided for regulating the current through the voltage divider circuit. A voltage measurement node is associated with the voltage divider circuit for producing a voltage signal which is proportional to the voltage across the energy storage cell.

  13. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr.

    2005-09-01

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  14. TiN coated aluminum electrodes for DC high voltage electron guns

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Mamun, Md Abdullah A.; Elmustafa, Abdelmageed A.; Taus, Rhys; Forman, Eric; Poelker, Matthew

    2015-05-01

    Preparing electrodes made of metals like stainless steel, for use inside DC high voltage electron guns, is a labor-intensive and time-consuming process. In this paper, the authors report the exceptional high voltage performance of aluminum electrodes coated with hard titanium nitride (TiN). The aluminum electrodes were comparatively easy to manufacture and required only hours of mechanical polishing using silicon carbide paper, prior to coating with TiN by a commercial vendor. The high voltage performance of three TiN-coated aluminum electrodes, before and after gas conditioning with helium, was compared to that of bare aluminum electrodes, and electrodes manufactured from titanium alloymore »(Ti-6AI-4V). Following gas conditioning, each TiN-coated aluminum electrode reached -225 kV bias voltage while generating less than 100 pA of field emission (« less

  15. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia, and reactorsystemoverviews. Training in Action: Gulf Nuclear Energy InfrastructureInstitute In2011,SandiateamedwiththeNuclearSecurity energy safety, security,safeguards,andnonproliferation. Training Sandia National Laboratories experts

  16. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  17. Sacramento Area Voltage Support Final Environmental Impact Statement

    SciTech Connect (OSTI)

    N /A

    2003-09-19

    The Western Area Power Administration's Central Valley Project transmission system forms an integral part of the interconnected Sacramento area transmission grid. Western is contractually responsible to oversee that the system is operated in accordance with strict reliability standards. Growth in the greater Sacramento, California area and power imported from generation outside the region, have increased the demand on the interconnected electric transmission system, leading to transmission system overloads and reducing the reliability and security of the area power system. Western has prepared this Sacramento Area Voltage Support (SVS) Draft Environmental Impact Statement (EIS) in compliance with Federal laws, regulations and guidelines, principally the National Environmental Policy Act (NEPA). This Draft EIS evaluates the potential environmental effects of physical improvements to the area's power system. Enhancements are needed to improve system reliability and provide voltage support for the Sacramento area. The results of public scoping meetings, workshops, meetings with agencies, and earlier studies by Western and area utilities helped to develop a range of alternatives for analysis. The Proposed Action involves: (1) Constructing a new double-circuit, 230-kV transmission line paralleling the existing double-circuit, 230-kV line from the O'Banion Substation to the Elverta Substation; (2) Realigning a portion of the existing Cottonwood-Roseville single-circuit, 230-kV transmission line north of Elverta Substation; and (3) Reconductoring the existing double-circuit, 230-kV transmission line from the Elverta Substation to the Tracy Substation. Public Hearings on the Draft EIS will be held between December 9-12, 2002. Comments on this Draft EIS are encouraged and should be sent to Ms. Loreen McMahon (above). Comments must be received by December 30, 2002.

  18. Outdoor PV Module Degradation of Current-Voltage Parameters: Preprint

    SciTech Connect (OSTI)

    Smith, R. M.; Jordan, D. C.; Kurtz, S. R.

    2012-04-01

    Photovoltaic (PV) module degradation rate analysis quantifies the loss of PV power output over time and is useful for estimating the impact of degradation on the cost of energy. An understanding of the degradation of all current-voltage (I-V) parameters helps to determine the cause of the degradation and also gives useful information for the design of the system. This study reports on data collected from 12 distinct mono- and poly-crystalline modules deployed at the National Renewable Energy Laboratory (NREL) in Golden, Colorado. Most modules investigated showed < 0.5%/year decrease in maximum power due to short-circuit current decline.

  19. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  20. Security | Department of Energy

    Office of Environmental Management (EM)

    Security Security Preventing nuclear weapons materials and technologies from falling into the hands of adversaries seeking to develop weapons of mass destruction is the top...

  1. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  2. Electro-optic voltage sensor for sensing voltage in an E-field

    DOE Patents [OSTI]

    Woods, G.K.; Renak, T.W.

    1999-04-06

    A miniature electro-optic voltage sensor system capable of accurate operation at high voltages is disclosed. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam`s polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured. 18 figs.

  3. Electro-optic voltage sensor for sensing voltage in an E-field

    DOE Patents [OSTI]

    Woods, Gregory K. (Idaho Falls, ID); Renak, Todd W. (Idaho Falls, ID)

    1999-01-01

    A miniature electro-optic voltage sensor system capable of accurate operation at high voltages. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam's polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured.

  4. Group 3: Humidity, Temperature and Voltage (Presentation)

    SciTech Connect (OSTI)

    Wohlgemuth, J.

    2013-09-01

    This is a summary of the work of Group 3 of the International PV QA Task Force. Group 3 is chartered to develop accelerated stress tests that can be used as comparative predictors of module lifetime versus stresses associated with humidity, temperature and voltage.

  5. Voltage control on a train system

    DOE Patents [OSTI]

    Gordon, Susanna P.; Evans, John A.

    2004-01-20

    The present invention provides methods for preventing low train voltages and managing interference, thereby improving the efficiency, reliability, and passenger comfort associated with commuter trains. An algorithm implementing neural network technology is used to predict low voltages before they occur. Once voltages are predicted, then multiple trains can be controlled to prevent low voltage events. Further, algorithms for managing inference are presented in the present invention. Different types of interference problems are addressed in the present invention such as "Interference During Acceleration", "Interference Near Station Stops", and "Interference During Delay Recovery." Managing such interference avoids unnecessary brake/acceleration cycles during acceleration, immediately before station stops, and after substantial delays. Algorithms are demonstrated to avoid oscillatory brake/acceleration cycles due to interference and to smooth the trajectories of closely following trains. This is achieved by maintaining sufficient following distances to avoid unnecessary braking/accelerating. These methods generate smooth train trajectories, making for a more comfortable ride, and improve train motor reliability by avoiding unnecessary mode-changes between propulsion and braking. These algorithms can also have a favorable impact on traction power system requirements and energy consumption.

  6. Noise Secured Internet

    E-Print Network [OSTI]

    Geraldo A. Barbosa

    2006-02-28

    This work shows how a secure Internet can be implemented through a fast key distribution system that uses physical noise to protect the transmitted information. Starting from a shared random sequence $K_0$ between two (or more) users, longsequences $R$ of random bits can be shared. The signals sent over the Internet are deterministic but have a built-in Nature-made uncertainty that protects the shared sequences. After privacy amplification the shared $R$ random bits --encrypted by noise-- are subsequently utilized in one-time-pad data ciphering.

  7. Preventing Delayed Voltage Recovery with Voltage-Regulating Distributed Energy Resources

    SciTech Connect (OSTI)

    Adhikari, Sarina; Li, Fangxing; Li, Huijuan; Xu, Yan; Kueck, John D; Rizy, D Tom

    2009-01-01

    With the large use of residential air conditioner (A/C) motors during the summer peaks, the potential of motor stalling events have increased in the recent years. The stalled motor loads have been found to be the most important cause of delayed voltage recovery following severe system disturbances, such as a subtransmission fault. The proper modeling of the stalled motors is a very important factor in identifying the effect of these motors in voltage recovery after the fault. This paper presents a methodology for modeling the stalled low inertia induction motors based on a sample utility system and a small primary distribution circuit. The prevention of the stalling of motors plays an important role in maintaining the voltage profile of the system after system disturbances. Distributed Energy Resource (DER) is used to prevent the motor stalling events so that the delayed voltage recovery of the system may be avoided.

  8. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    society. www.ists.dartmouth.edu THE DARTMOUTH CYBER SECURITY INITIATIVE The Dartmouth Cyber Security, TECHNOLOGY, AND SOCIETY THE DARTMOUTH CYBER SECURITY INITIATIVE #12;The number of laptop thefts at Dartmouth, and Society; and the Dartmouth Cyber Security Initiative offer the following solutions: · Whole

  9. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  10. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  11. Multi-GPU Computing for Achieving Speedup in Real-time Aggregate Risk Analysis Center for Security, Theory and Algorithmic Research

    E-Print Network [OSTI]

    Rau-Chaplin, Andrew

    Multi-GPU Computing for Achieving Speedup in Real-time Aggregate Risk Analysis A. K. Bahl Center.whiteway@dal.ca Abstract--Stochastic simulation techniques employed for portfolio risk analysis, often referred to as Aggregate Risk Analysis, can benefit from exploiting state-of-the-art high- performance computing platforms

  12. Security & Sustainability College of Charleston

    E-Print Network [OSTI]

    Young, Paul Thomas

    Security & Sustainability POLI 399 College of Charleston Fall 2013 Day/Time: T/H; 10@cofc.edu Office: 284 King Street, #206 (Office of Sustainability) Office Hours: by appt or virtual apt Instructor is that if sustained well-being and prosperity of human and ecological systems is the goal of sustainability

  13. Page 1Securing the Microsoft Cloud Securing the

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Page 1Securing the Microsoft Cloud Securing the Microsoft Cloud #12;Page 2Securing the Microsoft to have confidence in Microsoft as their preferred cloud provider. Our security policies and practices their security and compliance related needs. Securing the Microsoft Cloud #12;Page 3Securing the Microsoft Cloud

  14. Low voltage amplifier architecture for high speed switched capacitor circuits 

    E-Print Network [OSTI]

    Shankar, Asit

    2001-01-01

    This work concentrates on circuit realization of high speed and low voltage switched capacitor circuits, with emphasis on the operational transconductance amplifier (OTA). An overview of switched capacitor circuits is given. Speed and voltage...

  15. Electrical system architecture having high voltage bus

    DOE Patents [OSTI]

    Hoff, Brian Douglas (East Peoria, IL); Akasam, Sivaprasad (Peoria, IL)

    2011-03-22

    An electrical system architecture is disclosed. The architecture has a power source configured to generate a first power, and a first bus configured to receive the first power from the power source. The architecture also has a converter configured to receive the first power from the first bus and convert the first power to a second power, wherein a voltage of the second power is greater than a voltage of the first power, and a second bus configured to receive the second power from the converter. The architecture further has a power storage device configured to receive the second power from the second bus and deliver the second power to the second bus, a propulsion motor configured to receive the second power from the second bus, and an accessory motor configured to receive the second power from the second bus.

  16. Low Voltage White Phosphorescent OLED Achievements

    Broader source: Energy.gov [DOE]

    Universal Display Corporation (UDC) and its research partners at Princeton University and the University of Southern California have succeeded in developing a white phosphorescent OLED (PHOLED™) that achieved a record efficiency of 20 lumens per watt. This achievement is the result of the team's collaborative efforts to increase the efficiency of PHOLED lighting by focusing on two critical factors: lowering the drive voltages and increasing the amount of light extracted.

  17. Privacy-Preserving Public Auditing for Secure Cloud Storage

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    1 Privacy-Preserving Public Auditing for Secure Cloud Storage Cong Wang, Student Member, IEEE burden to user. In this paper, we propose a secure cloud storage system supporting privacy for data integrity. Examples of outages and security breaches of noteworthy cloud services appear from time

  18. Long term voltage stability analysis for small disturbances 

    E-Print Network [OSTI]

    Men, Kun

    2009-05-15

    design and optimize the system. ?? Challenge 2, accurately estimating voltage stability margin online remains as a dream for industry. So far, due to heavy computation burden, the major thrust in voltage stability analysis, especially for large... of load dynamics to restore power consumption beyond the capability of the combined transmission and generation system. ? This definition try to emphasize that load is the main driving force of a voltage collapse, and voltage stability is a stuctural...

  19. Field Optimization of Three Dimensional High Voltage C. Trinitis

    E-Print Network [OSTI]

    Stamatakis, Alexandros

    The design of high voltage systems and their com­ ponents (e.g. gas insulated switchgear, trans­ formers etc

  20. Electro-optic voltage sensor head

    DOE Patents [OSTI]

    Crawford, T.M.; Davidson, J.R.; Woods, G.K.

    1999-08-17

    The invention is an electro-optic voltage sensor head designed for integration with existing types of high voltage transmission and distribution apparatus. The sensor head contains a transducer, which comprises a transducing material in which the Pockels electro-optic effect is observed. In the practice of the invention at least one beam of electromagnetic radiation is routed into the transducing material of the transducer in the sensor head. The beam undergoes an electro-optic effect in the sensor head when the transducing material is subjected to an E-field. The electro-optic effect is observed as a differential phase a shift, also called differential phase modulation, of the beam components in orthogonal planes of the electromagnetic radiation. In the preferred embodiment the beam is routed through the transducer along an initial axis and then reflected by a retro-reflector back substantially parallel to the initial axis, making a double pass through the transducer for increased measurement sensitivity. The preferred embodiment of the sensor head also includes a polarization state rotator and at least one beam splitter for orienting the beam along major and minor axes and for splitting the beam components into two signals which are independent converse amplitude-modulated signals carrying E-field magnitude and hence voltage information from the sensor head by way of optic fibers. 6 figs.

  1. Electrostatically screened, voltage-controlled electrostatic chuck

    DOE Patents [OSTI]

    Klebanoff, Leonard Elliott (San Ramon, CA)

    2001-01-01

    Employing an electrostatically screened, voltage-controlled electrostatic chuck particularly suited for holding wafers and masks in sub-atmospheric operations will significantly reduce the likelihood of contaminant deposition on the substrates. The electrostatic chuck includes (1) an insulator block having a outer perimeter and a planar surface adapted to support the substrate and comprising at least one electrode (typically a pair of electrodes that are embedded in the insulator block), (2) a source of voltage that is connected to the at least one electrode, (3) a support base to which the insulator block is attached, and (4) a primary electrostatic shield ring member that is positioned around the outer perimeter of the insulator block. The electrostatic chuck permits control of the voltage of the lithographic substrate; in addition, it provides electrostatic shielding of the stray electric fields issuing from the sides of the electrostatic chuck. The shielding effectively prevents electric fields from wrapping around to the upper or front surface of the substrate, thereby eliminating electrostatic particle deposition.

  2. Aalborg Universitet Current-voltage model of LED light sources

    E-Print Network [OSTI]

    Munk-Nielsen, Stig

    Aalborg Universitet Current-voltage model of LED light sources Beczkowski, Szymon; Munk version (APA): Beczkowski, S., & Munk-Nielsen, S. (2012). Current-voltage model of LED light sources from vbn.aau.dk on: juli 06, 2015 #12;Current-voltage model of LED light sources Szymon Bczkowski, Stig

  3. LOW VOLTAGE ANALOG CIRCUITS USING STANDARD CMOS TECHNOLOGY

    E-Print Network [OSTI]

    Rincon-Mora, Gabriel A.

    LOW VOLTAGE ANALOG CIRCUITS USING STANDARD CMOS TECHNOLOGY Phillip E. Allen, Benjamin J. Blalock implies battery operation which favors low voltage and low power circuits. These factors and others have of the magnitudes of the n-channel and p-channel thresholds [4]. This implies that low voltage analog circuits

  4. System for increasing corona inception voltage of insulating oils

    DOE Patents [OSTI]

    Rohwein, G.J.

    1998-05-19

    The Corona Inception Voltage of insulating oils is increased by repetitive cycles of prestressing the oil with a voltage greater than the corona inception voltage, and either simultaneously or serially removing byproducts of corona by evacuation and heating the oil. 5 figs.

  5. Electrical Circuit Flashover Model of Polluted Insulators under AC Voltage Based on the Arc Root Voltage Gradient Criterion

    E-Print Network [OSTI]

    Yang, Qing

    In order to study the flashover mechanism of polluted insulators under AC voltage, a new arc propagation criterion which is based on an arc root voltage gradient is proposed. This criterion can explain the variation of the ...

  6. Preproposal Conference & Site Tour | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    the Offeror intent form identified at Section L, L-33, Offeror Intention to Submit an Offer may attend the briefing and tour. To allow time for security clearance and other...

  7. Nuclear Security Summit | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Summit | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  8. Building Extensible and Secure Networks

    E-Print Network [OSTI]

    Popa, Lucian

    2011-01-01

    adoption of cloud computing is security, as customers oftenpreserving security when migrating to the cloud computingto the security principals used in the cloud access control

  9. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    for Environment and National Security Scripps Institution ofMultiplying Threats to National Security Higher temperaturesefforts to protect national security. Page 2 The U.S. Armed

  10. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  11. Climate-derived tensions in Arctic security.

    SciTech Connect (OSTI)

    Backus, George A.; Strickland, James Hassler

    2008-09-01

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  12. An accurate continuous calibration system for high voltage current transformer

    SciTech Connect (OSTI)

    Tong Yue; Li Binhong [College of Electrical and Electronic Engineering, Huazhong University of Science and Technology, Wuhan 430074, Hubei Province (China)

    2011-02-15

    A continuous calibration system for high voltage current transformers is presented in this paper. The sensor of this system is based on a kind of electronic instrument current transformer, which is a clamp-shape air core coil. This system uses an optical fiber transmission system for its signal transmission and power supply. Finally the digital integrator and fourth-order convolution window algorithm as error calculation methods are realized by the virtual instrument with a personal computer. It is found that this system can calibrate a high voltage current transformer while energized, which means avoiding a long calibrating period in the power system and the loss of power metering expense. At the same time, it has a wide dynamic range and frequency band, and it can achieve a high accuracy measurement in a complex electromagnetic field environment. The experimental results and the on-site operation results presented in the last part of the paper, prove that it can reach the 0.05 accuracy class and is easy to operate on site.

  13. Strongly nonlinear dynamics of electrolytes in large ac voltages Laurits Hjgaard Olesen,1,2

    E-Print Network [OSTI]

    the results have been developed for over a century 1 . Current applications include energy storage; published 2 July 2010 We study the response of a model microelectrochemical cell to a large ac voltage of frequency comparable to the inverse cell relaxation time. To bring out the basic physics, we consider

  14. Recently, a new Dynamic Voltage Scaling (DVS) scheme has been proposed that increases energy efficiency

    E-Print Network [OSTI]

    Austin, Todd M.

    energy efficiency significantly by allowing the processor to operate at or slightly below the minimum the point of timing failure can yield significant energy sav- ings. Razor [1] is one such example padding in the operating voltage, which in turn increases the energy consumption of designs. Since

  15. Measurement based Voltage Stability Monitoring of Power system Garng M. Huang

    E-Print Network [OSTI]

    factors for the voltage stability problem, etc. II. FUNDAMENTALS: SIGLE GENERATOR AND LOAD SYSTEM #12;A@ee.tamu.edu Liang Zhao bennyz@ee.tamu.edu Department of Electrical Engineering Texas A & M University College is derived from the fundamental Kirchoff-Laws. Since in the transient process, at any time point

  16. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  17. Hybrid Design Optimization of High Voltage Pulse Transformers for Klystron Modulators

    E-Print Network [OSTI]

    Sylvain, Candolfi; Davide, Aguglia; Jerome, Cros

    2015-01-01

    This paper presents a hybrid optimization methodology for the design of high voltage pulse transformers used in klystron modulators. The optimization process is using simplified 2D FEA design models of the 3D transformer structure. Each intermediate optimal solution is evaluated by 3D FEA and correction coefficients of the 2D FEA models are derived. A new optimization process using 2D FEA models is then performed. The convergence of this hybrid optimal design methodology is obtained with a limited number of time consuming 3D FEA simulations. The method is applied to the optimal design of a monolithic high voltage pulse transformer for the CLIC klystron modulator.

  18. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  19. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  20. nevada national security site

    National Nuclear Security Administration (NNSA)

    7%2A en Nevada National Security Site operator recognized for green fleet http:www.nnsa.energy.govblognevada-national-security-site-operator-recognized-green-fleet

    The...

  1. Apparatus for producing voltage and current pulses

    DOE Patents [OSTI]

    Kirbie, Hugh (Los Alamos, NM); Dale, Gregory E. (Los Alamos, NM)

    2010-12-21

    An apparatus having one or more modular stages for producing voltage and current pulses. Each module includes a diode charging means to charge a capacitive means that stores energy. One or more charging impedance means are connected to the diode charging means to provide a return current pathway. A solid-state switch discharge means, with current interruption capability, is connected to the capacitive means to discharge stored energy. Finally, a control means is provided to command the switching action of the solid-state switch discharge means.

  2. Eliminate Voltage Unbalance | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyTher i n cEnergy (AZ,Local GovernmentofVoltage unbalance degrades the performance

  3. Optimizing performance per watt on GPUs in High Performance Computing: temperature, frequency and voltage effects

    E-Print Network [OSTI]

    Price, D C; Barsdell, B R; Babich, R; Greenhill, L J

    2014-01-01

    The magnitude of the real-time digital signal processing challenge attached to large radio astronomical antenna arrays motivates use of high performance computing (HPC) systems. The need for high power efficiency (performance per watt) at remote observatory sites parallels that in HPC broadly, where efficiency is an emerging critical metric. We investigate how the performance per watt of graphics processing units (GPUs) is affected by temperature, core clock frequency and voltage. Our results highlight how the underlying physical processes that govern transistor operation affect power efficiency. In particular, we show experimentally that GPU power consumption grows non-linearly with both temperature and supply voltage, as predicted by physical transistor models. We show lowering GPU supply voltage and increasing clock frequency while maintaining a low die temperature increases the power efficiency of an NVIDIA K20 GPU by up to 37-48% over default settings when running xGPU, a compute-bound code used in radio...

  4. Time Consistent Risk Measure Under Stopping Time Framework ...

    E-Print Network [OSTI]

    2015-02-13

    to the stochastic volatility of security markets and constantly change of economic and financial information, the earliest target reaching time is random, it then ...

  5. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  6. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  7. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01

    Pew Project on National Security, Energy and Climate http://of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.

  8. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  9. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  10. cyber security guru

    E-Print Network [OSTI]

    Sandhu, Ravi

    cyber security guru By: Virginia Scott Posted: 4/17/07 UTSA has received a grant from the Texas Emerging Fund to create an institute for cyber security research. According to UTSA industry and educational initiatives in Texas. The creation of UTSA's Institute for Cyber Security Research

  11. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W to enhance the nation's security

  12. Safe epoxy encapsulant for high voltage magnetics

    SciTech Connect (OSTI)

    Sanchez, R.O.; Archer, W.E.

    1998-01-01

    This paper describes the use of Formula 456, an aliphatic amine cured epoxy for impregnating coils and high voltage transformers. Sandia has evaluated a number of MDA-free epoxy encapsulants which relied on either anhydride or other aromatic amine curing agents. The use of aliphatic amine curing agents was more recently evaluated and has resulted in the definition of Formula 456 resin. Methylene dianiline (MDA) has been used for more than 20 years as the curing agent for various epoxy formulations throughout the Department of Energy and much of industry. Sandia National Laboratories began the process of replacing MDA with other formulations because of regulations imposed by OSHA on the use of MDA. OSHA has regulated MDA because it is a suspect carcinogen. Typically the elimination of OSHA-regulated materials provides a rare opportunity to qualify new formulations in a range of demanding applications. It was important to take full advantage of that opportunity, although the associated materials qualification effort was costly. Small high voltage transformers are one of those demanding applications. The successful implementation of the new formulation for high reliability transformers will be described. The test results that demonstrate the parts are qualified for use in DOE weapon systems will be presented.

  13. An Experience Report on Undergraduate Cyber-Security Education and Outreach

    E-Print Network [OSTI]

    An Experience Report on Undergraduate Cyber-Security Education and Outreach Michael E. Locasto Terms Security Keywords cyber security training, SISMAT 1. INTRODUCTION Organizations face a critical training in cyber security tools. At the same time, information secu- rity problems (e.g., recovering from

  14. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W.

    2014-10-15

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  15. Planar LTCC transformers for high voltage flyback converters.

    SciTech Connect (OSTI)

    Schofield, Daryl (NASCENT Technology Inc. , Watertown, SD); Schare, Joshua M.; Glass, Sarah Jill; Roesler, Alexander William; Ewsuk, Kevin Gregory; Slama, George (NASCENT Technology Inc. , Watertown, SD); Abel, Dave (NASCENT Technology Inc. , Watertown, SD)

    2007-06-01

    This paper discusses the design and use of low-temperature (850 C to 950 C) co-fired ceramic (LTCC) planar magnetic flyback transformers for applications that require conversion of a low voltage to high voltage (> 100V) with significant volumetric constraints. Measured performance and modeling results for multiple designs showed that the LTCC flyback transformer design and construction imposes serious limitations on the achievable coupling and significantly impacts the transformer performance and output voltage. This paper discusses the impact of various design factors that can provide improved performance by increasing transformer coupling and output voltage. The experiments performed on prototype units demonstrated LTCC transformer designs capable of greater than 2 kV output. Finally, the work investigated the effect of the LTCC microstructure on transformer insulation. Although this paper focuses on generating voltages in the kV range, the experimental characterization and discussion presented in this work applies to designs requiring lower voltage.

  16. Voltage measurements at the vacuum post-hole convolute of the Z pulsed-power accelerator

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Waisman, E. M.; McBride, R. D.; Cuneo, M. E.; Wenger, D. F.; Fowler, W. E.; Johnson, W. A.; Basilio, L. I.; Coats, R. S.; Jennings, C. A.; Sinars, D. B.; et al

    2014-12-08

    Presented are voltage measurements taken near the load region on the Z pulsed-power accelerator using an inductive voltage monitor (IVM). Specifically, the IVM was connected to, and thus monitored the voltage at, the bottom level of the accelerator’s vacuum double post-hole convolute. Additional voltage and current measurements were taken at the accelerator’s vacuum-insulator stack (at a radius of 1.6 m) by using standard D-dot and B-dot probes, respectively. During postprocessing, the measurements taken at the stack were translated to the location of the IVM measurements by using a lossless propagation model of the Z accelerator’s magnetically insulated transmission lines (MITLs)more »and a lumped inductor model of the vacuum post-hole convolute. Across a wide variety of experiments conducted on the Z accelerator, the voltage histories obtained from the IVM and the lossless propagation technique agree well in overall shape and magnitude. However, large-amplitude, high-frequency oscillations are more pronounced in the IVM records. It is unclear whether these larger oscillations represent true voltage oscillations at the convolute or if they are due to noise pickup and/or transit-time effects and other resonant modes in the IVM. Results using a transit-time-correction technique and Fourier analysis support the latter. Regardless of which interpretation is correct, both true voltage oscillations and the excitement of resonant modes could be the result of transient electrical breakdowns in the post-hole convolute, though more information is required to determine definitively if such breakdowns occurred. Despite the larger oscillations in the IVM records, the general agreement found between the lossless propagation results and the results of the IVM shows that large voltages are transmitted efficiently through the MITLs on Z. These results are complementary to previous studies [R. D. McBride et al., Phys. Rev. ST Accel. Beams 13, 120401 (2010)] that showed efficient transmission of large currents through the MITLs on Z. Altogether, the two studies demonstrate the overall efficient delivery of very large electrical powers through the MITLs on Z.« less

  17. Voltage measurements at the vacuum post-hole convolute of the ? pulsed-power accelerator

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Waisman, E.? M.; McBride, R. D.; Cuneo, M.? E.; Wenger, D.? F.; Fowler, W.? E.; Johnson, W.? A.; Basilio, L.? I.; Coats, R.? S.; Jennings, C.? A.; Sinars, D.? B.; et al

    2014-11-08

    Presented are voltage measurements taken near the load region on the Z pulsed-power accelerator using an inductive voltage monitor (IVM). Specifically, the IVM was connected to, and thus monitored the voltage at, the bottom level of the accelerator’s vacuum double post-hole convolute. Additional voltage and current measurements were taken at the accelerator’s vacuum-insulator stack (at a radius of 1.6 m) by using standard D-dot and B-dot probes, respectively. During postprocessing, the measurements taken at the stack were translated to the location of the IVM measurements by using a lossless propagation model of the Z accelerator’s magnetically insulated transmission lines (MITLs)more »and a lumped inductor model of the vacuum post-hole convolute. Across a wide variety of experiments conducted on the Z accelerator, the voltage histories obtained from the IVM and the lossless propagation technique agree well in overall shape and magnitude. However, large-amplitude, high-frequency oscillations are more pronounced in the IVM records. It is unclear whether these larger oscillations represent true voltage oscillations at the convolute or if they are due to noise pickup and/or transit-time effects and other resonant modes in the IVM. Results using a transit-time-correction technique and Fourier analysis support the latter. Regardless of which interpretation is correct, both true voltage oscillations and the excitement of resonant modes could be the result of transient electrical breakdowns in the post-hole convolute, though more information is required to determine definitively if such breakdowns occurred. Despite the larger oscillations in the IVM records, the general agreement found between the lossless propagation results and the results of the IVM shows that large voltages are transmitted efficiently through the MITLs on Z. These results are complementary to previous studies [R.D. McBride et al., Phys. Rev. ST Accel. Beams 13, 120401 (2010)] that showed efficient transmission of large currents through the MITLs on Z. Taken together, the two studies demonstrate the overall efficient delivery of very large electrical powers through the MITLs on Z.« less

  18. Voltage measurements at the vacuum post-hole convolute of the Z pulsed-power accelerator

    SciTech Connect (OSTI)

    Waisman, E. M.; McBride, R. D.; Cuneo, M. E.; Wenger, D. F.; Fowler, W. E.; Johnson, W. A.; Basilio, L. I.; Coats, R. S.; Jennings, C. A.; Sinars, D. B.; Vesey, R. A.; Jones, B.; Ampleford, D. J.; Lemke, R. W.; Martin, M. R.; Schrafel, P. C.; Lewis, S. A.; Moore, J. K.; Savage, M. E.; Stygar, W. A.

    2014-12-08

    Presented are voltage measurements taken near the load region on the Z pulsed-power accelerator using an inductive voltage monitor (IVM). Specifically, the IVM was connected to, and thus monitored the voltage at, the bottom level of the accelerator’s vacuum double post-hole convolute. Additional voltage and current measurements were taken at the accelerator’s vacuum-insulator stack (at a radius of 1.6 m) by using standard D-dot and B-dot probes, respectively. During postprocessing, the measurements taken at the stack were translated to the location of the IVM measurements by using a lossless propagation model of the Z accelerator’s magnetically insulated transmission lines (MITLs) and a lumped inductor model of the vacuum post-hole convolute. Across a wide variety of experiments conducted on the Z accelerator, the voltage histories obtained from the IVM and the lossless propagation technique agree well in overall shape and magnitude. However, large-amplitude, high-frequency oscillations are more pronounced in the IVM records. It is unclear whether these larger oscillations represent true voltage oscillations at the convolute or if they are due to noise pickup and/or transit-time effects and other resonant modes in the IVM. Results using a transit-time-correction technique and Fourier analysis support the latter. Regardless of which interpretation is correct, both true voltage oscillations and the excitement of resonant modes could be the result of transient electrical breakdowns in the post-hole convolute, though more information is required to determine definitively if such breakdowns occurred. Despite the larger oscillations in the IVM records, the general agreement found between the lossless propagation results and the results of the IVM shows that large voltages are transmitted efficiently through the MITLs on Z. These results are complementary to previous studies [R. D. McBride et al., Phys. Rev. ST Accel. Beams 13, 120401 (2010)] that showed efficient transmission of large currents through the MITLs on Z. Altogether, the two studies demonstrate the overall efficient delivery of very large electrical powers through the MITLs on Z.

  19. Real Time Grid Reliability Management 2005

    SciTech Connect (OSTI)

    Eto, Joe; Eto, Joe; Lesieutre, Bernard; Lewis, Nancy Jo; Parashar, Manu

    2008-07-07

    The increased need to manage California?s electricity grid in real time is a result of the ongoing transition from a system operated by vertically-integrated utilities serving native loads to one operated by an independent system operator supporting competitive energy markets. During this transition period, the traditional approach to reliability management -- construction of new transmission lines -- has not been pursued due to unresolved issues related to the financing and recovery of transmission project costs. In the absence of investments in new transmission infrastructure, the best strategy for managing reliability is to equip system operators with better real-time information about actual operating margins so that they can better understand and manage the risk of operating closer to the edge. A companion strategy is to address known deficiencies in offline modeling tools that are needed to ground the use of improved real-time tools. This project: (1) developed and conducted first-ever demonstrations of two prototype real-time software tools for voltage security assessment and phasor monitoring; and (2) prepared a scoping study on improving load and generator response models. Additional funding through two separate subsequent work authorizations has already been provided to build upon the work initiated in this project.

  20. Design of a Solid-State Fast Voltage Compensator for klystron modulators requiring constant AC power consumption

    E-Print Network [OSTI]

    Davide, Aguglia; Philippe, Viarouge; Jerome, Cros

    2015-01-01

    This paper proposes a novel topological solution for klystron modulators integrating a Fast Voltage Compensator which allows an operation at constant power consumption from the utility grid. This kind of solution is mandatory for the CLIC project under study, which requires several hundreds of synchronously operated klystron modulators for a total pulsed power of 39 GW. The topology is optimized for the challenging CLIC specifications, which require a very precise output voltage flat-top as well as fast rise and fall times (3µs). The Fast Voltage Compensator is integrated in the modulator such that it only has to manage the capacitor charger current and a fraction of the charging voltage. Consequently, its dimensioning power and cost is minimized.

  1. Sequential circuit design for radiation hardened multiple voltage integrated circuits

    DOE Patents [OSTI]

    Clark, Lawrence T. (Phoenix, AZ); McIver, III, John K. (Albuquerque, NM)

    2009-11-24

    The present invention includes a radiation hardened sequential circuit, such as a bistable circuit, flip-flop or other suitable design that presents substantial immunity to ionizing radiation while simultaneously maintaining a low operating voltage. In one embodiment, the circuit includes a plurality of logic elements that operate on relatively low voltage, and a master and slave latches each having storage elements that operate on a relatively high voltage.

  2. Method for voltage-gated protein fractionation

    DOE Patents [OSTI]

    Hatch, Anson (Tracy, CA); Singh, Anup K. (Danville, CA)

    2012-04-24

    We report unique findings on the voltage dependence of protein exclusion from the pores of nanoporous polymer exclusion membranes. The pores are small enough that proteins are excluded from passage with low applied electric fields, but increasing the field enables proteins to pass through. The requisite field necessary for a change in exclusion is protein-specific with a correlation to protein size. The field-dependence of exclusion is important to consider for preconcentration applications. The ability to selectively gate proteins at exclusion membranes is also a promising means for manipulating and characterizing proteins. We show that field-gated exclusion can be used to selectively remove proteins from a mixture, or to selectively trap protein at one exclusion membrane in a series.

  3. Arnold Schwarzenegger REAL-TIME GRID RELIABILITY

    E-Print Network [OSTI]

    Energy Research (PIER) California Energy Commission Beth Chambers Contract Manager Jamie Patterson (VSA) prototype to monitor system voltage conditions and provide real time dispatchers with reliabilityArnold Schwarzenegger Governor REAL-TIME GRID RELIABILITY MANAGEMENT California ISO Real

  4. Voltage-controlled entanglement and quantum-information transfer...

    Office of Scientific and Technical Information (OSTI)

    external gate voltage in our schemes. Moreover, proposed schemes are robust against the noise of system parameters. Authors: Lue Xinyou ; Zheng Lili 1 ; Wu, Jing 2 ; Zhan...

  5. Fault-induced delayed voltage recovery in a long inhomogeneous...

    Office of Scientific and Technical Information (OSTI)

    Article: Fault-induced delayed voltage recovery in a long inhomogeneous power-distribution feeder Citation Details In-Document Search This content will become publicly...

  6. A multilevel voltage-source inverter with separate dc sources...

    Office of Scientific and Technical Information (OSTI)

    conditioning, series compensation, phase shifting, voltage balancing, fuel cell and photovoltaic utility systems interfacing, etc. The new M-level inverter consists of (M-1)2...

  7. Triple voltage dc-to-dc converter and method

    DOE Patents [OSTI]

    Su, Gui-Jia (Knoxville, TN)

    2008-08-05

    A circuit and method of providing three dc voltage buses and transforming power between a low voltage dc converter and a high voltage dc converter, by coupling a primary dc power circuit and a secondary dc power circuit through an isolation transformer; providing the gating signals to power semiconductor switches in the primary and secondary circuits to control power flow between the primary and secondary circuits and by controlling a phase shift between the primary voltage and the secondary voltage. The primary dc power circuit and the secondary dc power circuit each further comprising at least two tank capacitances arranged in series as a tank leg, at least two resonant switching devices arranged in series with each other and arranged in parallel with the tank leg, and at least one voltage source arranged in parallel with the tank leg and the resonant switching devices, said resonant switching devices including power semiconductor switches that are operated by gating signals. Additional embodiments having a center-tapped battery on the low voltage side and a plurality of modules on both the low voltage side and the high voltage side are also disclosed for the purpose of reducing ripple current and for reducing the size of the components.

  8. Addressing the Voltage Fade Issue with Lithium-Manganese-Rich...

    Energy Savers [EERE]

    the Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials 2013 DOE Hydrogen and Fuel Cells Program and Vehicle Technologies Program Annual Merit Review and Peer...

  9. Towards First Principles prediction of Voltage Dependences of...

    Office of Scientific and Technical Information (OSTI)

    Voltage Dependences of ElectrolyteElectrolyte Interfacial Processes in Lithium Ion Batteries. Citation Details In-Document Search Title: Towards First Principles prediction of...

  10. High-Voltage Solid Polymer Batteries for Electric Drive Vehicles...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Solid Polymer Batteries for Electric Drive Vehicles High-Voltage Solid Polymer Batteries for Electric Drive Vehicles 2012 DOE Hydrogen and Fuel Cells Program and Vehicle...

  11. Nanoscale Morphological and Chemical Changes of High Voltage...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nanoscale Morphological and Chemical Changes of High Voltage Lithium-Manganese Rich NMC Composite Cathodes with Cycling Friday, August 29, 2014 Renewable energy is critical for the...

  12. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  13. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  14. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  15. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important is critical October 7, 2009 GAANN ­ Computer Systems Security 1 #12;GAANN - Computer Systems Security

  16. Federated Cloud Security Architecture for Secure and Agile Clouds

    E-Print Network [OSTI]

    Xu, Shouhuai

    Federated Cloud Security Architecture for Secure and Agile Clouds Weiliang Luo, Li Xu, Zhenxin Zhan. This chapter introduces the novel federated cloud security architecture that includes proactive cloud defense technologies for secure and agile cloud development. The federated security architecture consists of a set

  17. Where computer security meets national security1 Helen Nissenbaum

    E-Print Network [OSTI]

    Nissenbaum, Helen

    of International Relations. Key words: cyber-security, computer security, securitization Introduction OverWhere computer security meets national security1 Helen Nissenbaum Department of Culture conceptions of security in contemporary concerns over the vulnerability of computers and networks to hostile

  18. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu, Ram Krishnan and Gregory B. White Institute for Cyber Security University of Texas at San Antonio #12;Secure Information ­ Security mechanisms such as authentication, cryptography, trusted hardware, etc. #12;Community Cyber

  19. Implementing Advances in Transport Security Technologies | Department...

    Office of Environmental Management (EM)

    Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies Implementing Advances in Transport Security Technologies More...

  20. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01

    and interoperability ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Vulnerabilities In The Legacy Power Grid ? SCADA Security ? Supervisory Control and Data Acquisition (SCADA) systems are used extensively to control and monitor the national... & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart Grid Networks...

  1. Supervisory Industrial Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as the Deputy Assistant Manager for Safeguards, Security, and Emergency Management sharing the overall responsibility for execution of the...

  2. Oil Security Metrics Model

    SciTech Connect (OSTI)

    Greene, David L.; Leiby, Paul N.

    2005-03-06

    A presentation to the IWG GPRA USDOE, March 6, 2005, Washington, DC. OSMM estimates oil security benefits of changes in the U.S. oil market.

  3. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  4. defense nuclear security

    National Nuclear Security Administration (NNSA)

    3%2A en Defense Nuclear Security http:www.nnsa.energy.govaboutusourprogramsnuclearsecurity

  5. Natlonal Nuclear Security Admlnlstratlon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Natlonal Nuclear Security Admlnlstratlon Washington, DC 20585 January 18, 2007 OFFICE OF THE ADMINISTRATOR MEMORANDUM FOR The Deputy Secretary FROM: SUBJECT: Linton F. Brooks...

  6. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Washington, DC 20585 MEMORANDUM FOR THE ADMINISTRATOR FROM: THEODORE D. SHERRY II 4 flA. * -. SUBJECT: REFERENCE: NATIONAL SECURITY ENTI's'E FIELD COUNCIL CHAIR ACTION:...

  7. Alamos National Security, LLC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    30 nonprofit organizations to receive monetary donations from Los Alamos National Security, LLC June 25, 2012 Recognizing employee and retiree volunteer efforts LOS ALAMOS, NEW...

  8. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  9. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  10. Cloud Security by Max Garvey

    E-Print Network [OSTI]

    Tolmach, Andrew

    Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service, performance SECaaS - Cloud hosted security measures Certifications - measurements for cloud security. #12;Cloud Questions If you have $0 security budget, could cloud be a security improvement? Who owns the data

  11. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    research programs. These programs, which include Cyber Security, Pervasive Information TechnologiesComputer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security

  12. Stability issues in IC Low Drop Out voltage regulators 

    E-Print Network [OSTI]

    Chava, Krishna Chaitanya

    2002-01-01

    . The problem of instability of the LDO voltage regulator at low Electo Static Resistance (ESR) of the load capacitors and the consequences of this problem are highlighted. As a solution to some of the discussed problems, an alternate LDO voltage regulator...

  13. CLNS 03/1827 VERY HIGH VOLTAGE PHOTOEMISSION ELECTRON GUNS*

    E-Print Network [OSTI]

    CLNS 03/1827 VERY HIGH VOLTAGE PHOTOEMISSION ELECTRON GUNS* Charles K. Sinclair # , Cornell voltage DC electron guns with photoemission cathodes are a natural choice for generating the beams gradient in these guns. The photocathode operational lifetime is limited by the gun vacuum and by ion back

  14. Aalborg Universitet Secondary Control for Voltage Quality Enhancement in Microgrids

    E-Print Network [OSTI]

    Vasquez, Juan Carlos

    Aalborg Universitet Secondary Control for Voltage Quality Enhancement in Microgrids Savaghebi). Secondary Control for Voltage Quality Enhancement in Microgrids. I E E E Transactions on Smart Grid, 3 in Microgrids," Smart Grid, IEEE Transactions on , vol.3, no.4, pp.1893-1902, Dec. 2012. doi: 10.1109/TSG.2012

  15. Measurement of high voltage using Rutherford backscattering spectrometry 

    E-Print Network [OSTI]

    Abrego, Celestino Pete

    2007-04-25

    A novel variation of Rutherford Backscattering Spectrometry (RBS) has been utilized to measure a high voltage collected on an aluminum target by Direct Energy Conversion. The maximum high voltage on the target was measured to be 97.5 kV +/- 2 k...

  16. 2014 Headquarters Facilities Master Security Plan- Chapter 1, Physical Security

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security Describes DOE Headquarters Physical Security procedures related to badges, inspections, access controls, visitor controls, and removal of government property.

  17. Headquarters Facilities Master Security Plan - Chapter 10, Security...

    Office of Environmental Management (EM)

    be completed each year by all those who hold a security clearance; and the Security Termination Briefing, which is conducted when a person no longer requires a security clearance....

  18. E-beam high voltage switching power supply

    DOE Patents [OSTI]

    Shimer, D.W.; Lange, A.C.

    1996-10-15

    A high-power power supply produces a controllable, constant high voltage output under varying and arcing loads. The power supply includes a voltage regulator, an inductor, an inverter for producing a high frequency square wave current of alternating polarity, an improved inverter voltage clamping circuit, a step up transformer, an output rectifier for producing a dc voltage at the output of each module, and a current sensor for sensing output current. The power supply also provides dynamic response to varying loads by controlling the voltage regulator duty cycle and circuitry is provided for sensing incipient arc currents at the output of the power supply to simultaneously decouple the power supply circuitry from the arcing load. The power supply includes a plurality of discrete switching type dc--dc converter modules. 5 figs.

  19. E-beam high voltage switching power supply

    DOE Patents [OSTI]

    Shimer, Daniel W. (Danville, CA); Lange, Arnold C. (Livermore, CA)

    1996-01-01

    A high-power power supply produces a controllable, constant high voltage put under varying and arcing loads. The power supply includes a voltage regulator, an inductor, an inverter for producing a high frequency square wave current of alternating polarity, an improved inverter voltage clamping circuit, a step up transformer, an output rectifier for producing a dc voltage at the output of each module, and a current sensor for sensing output current. The power supply also provides dynamic response to varying loads by controlling the voltage regulator duty cycle and circuitry is provided for sensing incipient arc currents at the output of the power supply to simultaneously decouple the power supply circuitry from the arcing load. The power supply includes a plurality of discrete switching type dc--dc converter modules.

  20. Bonfire-safe low-voltage detonator

    DOE Patents [OSTI]

    Lieberman, Morton L. (Albuquerque, NM)

    1990-01-01

    A column of explosive in a low-voltage detonator which makes it bonfire-safe includes a first layer of an explosive charge of CP, or a primary explosive, and a second layer of a secondary organic explosive charge, such as PETN, which has a degradation temperature lower than the autoignition temperature of the CP or primary explosives. The first layer is composed of a pair of increments disposed in a bore of a housing of the detonator in an ignition region of the explosive column and adjacent to and in contact with an electrical ignition device at one end of the bore. The second layer is composed of a plurality of increments disposed in the housing bore in a transition region of the explosive column next to and in contact with the first layer on a side opposite from the ignition device. The first layer is loaded under a sufficient high pressure, 25 to 40 kpsi, to achieve ignition, whereas the second layer is loaded under a sufficient low pressure, about 10 kpsi, to allow occurrence of DDT. Each increment of the first and second layers has an axial length-to-diameter ratio of one-half.

  1. Bonfire-safe low-voltage detonator

    DOE Patents [OSTI]

    Lieberman, M.L.

    1988-07-01

    A column of explosive in a low-voltage detonator which makes it bonfire-safe includes a first layer of an explosive charge of CP, or a primary explosive, and a second layer of a secondary organic explosive charge, such as PETN, which has a degradation temperature lower than the autoignition temperature of the CP or primary explosives. The first layer is composed of a pair of increments disposed in a bore of a housing of the detonator in an ignition region of the explosive column and adjacent to and in contact with an electrical ignition device at one end of the bore. The second layer is composed of a plurality of increments disposed in the housing bore in a transition region of the explosive column next to and in contact with the first layer on a side opposite from the ignition device. The first layer is loaded under a sufficient high pressure, 25 to 40 kpsi, to achieve ignition, whereas the second layer is loaded under a sufficient low pressure, about 10 kpsi, to allow occurrence of DDT. Each increment of the first and second layers has an axial length-to-diameter ratio of one-half. 2 figs.

  2. Spark-safe low-voltage detonator

    DOE Patents [OSTI]

    Lieberman, Morton L. (Albuquerque, NM)

    1989-01-01

    A column of explosive in a low-voltage detonator which makes it spark-safe ncludes an organic secondary explosive charge of HMX in the form of a thin pad disposed in a bore of a housing of the detonator in an ignition region of the explosive column and adjacent to an electrical ignition device at one end of the bore. The pad of secondary charge has an axial thickness within the range of twenty to thirty percent of its diameter. The explosive column also includes a first explosive charge of CP disposed in the housing bore in the ignition region of the explosive column next to the secondary charge pad on a side opposite from the ignition device. The first CP charge is loaded under sufficient pressure, 25 to 40 kpsi, to provide mechanical confinement of the pad of secondary charge and physical coupling thereof with the ignition device. The explosive column further includes a second explosive charge of CP disposed in the housing bore in a transition region of the explosive column next to the first CP charge on a side opposite from the pad of secondary charge. The second CP charge is loaded under sufficient pressure, about 10 kpsi, to allow occurrence of DDT. The first explosive CP charge has an axial thickness within the range of twenty to thirty percent of its diameter, whereas the second explosive CP charge contains a series of increments (nominally 4) each of which has an axial thickness-to-diameter ratio of one to two.

  3. The Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure Computing Corporation

    E-Print Network [OSTI]

    Andersen, Dave

    Computing Corporation Stephen Smalley, Peter Loscocco National Security Agency Mike Hibler, David AndersenThe Flask Security Architecture: System Support for Diverse Security Policies Ray Spencer Secure be flexible in their support for security policies, providing sufficient mechanisms for supporting the wide

  4. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDid you not findGeoscience/EnvironmentGlobal Security Global Security We

  5. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Exchange of Information Develop security tools that: · Integrate information from different communication channels · Provide flexible reporting (reports adapted to the recipient) · Communicate security information Security practitioners perform many activities: · Information exchanged in different formats across

  6. Security Cases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Cases Security Cases RSS June 19, 2015 PSH-15-0011 - In the Matter of Personnel Security Hearing On June 19, 2015, an OHA Administrative Judge (AJ) issued a decision in...

  7. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    Computer Security Incident Handling Guide Recommendationsof the National Institute of Standards Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD Tom Millar United States Computer Emergency Readiness Team National Cyber Security Division

  8. Security Policy: Radio Network Controller

    E-Print Network [OSTI]

    Security Policy: Radio Network Controller Encryption Module Controller (RNC EMC) Cryptographic, 2007 Security Policy: RNC EMC Page 1 of 22 #12;Security Policy: RNC EMC Page 2 of 22 #12;Table...........................................................14 7. IDENTIFICATION AND AUTHENTICATION POLICY

  9. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  10. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  11. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND 2012-1670P Ensuring the Safe Containment

  12. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear

  13. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  14. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Supersedes DOE P 470.1.

  15. CIOs Uncensored: Security Smarts.

    SciTech Connect (OSTI)

    Johnson, Gerald R.

    2008-02-25

    This commentary for the CIOs Uncensored section of InformationWeek will discuss PNNL’s “defense in depth” approach to cyber security. It will cover external and internal safeguards, as well as the all-important role of employees in the cyber security equation. For employees are your greatest vulnerability – and your last line of defense.

  16. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01

    -the-fact fixes in the form of software patches. The root causes for security problems in software are explored. A survey of research attempts at engineering secure software is presented. The techniques discussed range from those that are very similar...

  17. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  18. Energy, Climate, & Infrastructure Security

    E-Print Network [OSTI]

    Siefert, Chris

    Energy, Climate, & Infrastructure Security ExCEptIonal SErvICE In thE natIonal IntErESt Sandia owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. SAND2013-7809W the computational, physics

  19. High voltage dc--dc converter with dynamic voltage regulation and decoupling during load-generated arcs

    DOE Patents [OSTI]

    Shimer, D.W.; Lange, A.C.

    1995-05-23

    A high-power power supply produces a controllable, constant high voltage output under varying and arcing loads. The power supply includes a voltage regulator, an inductor, an inverter for producing a high frequency square wave current of alternating polarity, an improved inverter voltage clamping circuit, a step up transformer, an output rectifier for producing a dc voltage at the output of each module, and a current sensor for sensing output current. The power supply also provides dynamic response to varying loads by controlling the voltage regulator duty cycle and circuitry is provided for sensing incipient arc currents at the output of the power supply to simultaneously decouple the power supply circuitry from the arcing load. The power supply includes a plurality of discrete switching type dc--dc converter modules. 5 Figs.

  20. High voltage dc-dc converter with dynamic voltage regulation and decoupling during load-generated arcs

    DOE Patents [OSTI]

    Shimer, Daniel W. (Danville, CA); Lange, Arnold C. (Livermore, CA)

    1995-01-01

    A high-power power supply produces a controllable, constant high voltage output under varying and arcing loads. The power supply includes a voltage regulator, an inductor, an inverter for producing a high frequency square wave current of alternating polarity, an improved inverter voltage clamping circuit, a step up transformer, an output rectifier for producing a dc voltage at the output of each module, and a current sensor for sensing output current. The power supply also provides dynamic response to varying loads by controlling the voltage regulator duty cycle and circuitry is provided for sensing incipient arc currents at the output of the power supply to simultaneously decouple the power supply circuitry from the arcing load. The power supply includes a plurality of discrete switching type dc--dc converter modules.

  1. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E.

    2012-08-14

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  2. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  3. Secure Virtualization with Formal Methods

    E-Print Network [OSTI]

    Sturton, Cynthia

    2013-01-01

    cloud computing, virtualization software has a variety of security-cloud computing, researchers have proposed using system virtualization software as a platform to increase the security

  4. Program Areas | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Organizations National Security Home | Science & Discovery | National Security | Program Areas SHARE Program Areas image Oak Ridge National Laboratory (ORNL) has a robust...

  5. Office of Secure Transportation Activities

    Office of Environmental Management (EM)

    6th, 2012 WIPP Knoxville, TN OFFICE OF SECURE TRANSPORTATION Agency Integration Briefing Our Mission To provide safe and secure ground and air transportation of nuclear weapons,...

  6. Security Rulemaking | Department of Energy

    Office of Environmental Management (EM)

    Activities Transportation Security Rulemaking Activities at the U.S. Nuclear Regulatory Commission NRC Transportation Security (Part 73 SNF Update and Part 37 Category 1...

  7. National Nuclear Security Administration Overview

    Office of Environmental Management (EM)

    May 11, 2011 Ahmad Al-Daouk Manager, National Security Department (NSD) National Nuclear Security Administration (NNSA) Service Center - Albuquerque, NM May 11, 2011 - Page 2...

  8. Electro-optic voltage sensor with beam splitting

    DOE Patents [OSTI]

    Woods, Gregory K. (Cornelius, OR); Renak, Todd W. (Idaho Falls, ID); Davidson, James R. (Idaho Falls, ID); Crawford, Thomas M. (Idaho Falls, ID)

    2002-01-01

    The invention is a miniature electro-optic voltage sensor system capable of accurate operation at high voltages without use of the dedicated voltage dividing hardware typically found in the prior art. The invention achieves voltage measurement without significant error contributions from neighboring conductors or environmental perturbations. The invention employs a transmitter, a sensor, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor. Within the sensor the beam undergoes the Pockels electro-optic effect. The electro-optic effect produces a modulation of the beam's polarization, which is in turn converted to a pair of independent conversely-amplitude-modulated signals, from which the voltage of the E-field is determined by the signal processor. The use of converse AM signals enables the signal processor to better distinguish signal from noise. The sensor converts the beam by splitting the beam in accordance with the axes of the beam's polarization state (an ellipse) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured.

  9. Electro-optic voltage sensor with Multiple Beam Splitting

    DOE Patents [OSTI]

    Woods, Gregory K. (Cornelius, OR); Renak, Todd W. (Idaho Falls, ID); Crawford, Thomas M. (Idaho Falls, ID); Davidson, James R. (Idaho Falls, ID)

    2000-01-01

    A miniature electro-optic voltage sensor system capable of accurate operation at high voltages without use of the dedicated voltage dividing hardware. The invention achieves voltage measurement without significant error contributions from neighboring conductors or environmental perturbations. The invention employs a transmitter, a sensor, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor. Within the sensor the beam undergoes the Pockels electro-optic effect. The electro-optic effect produces a modulation of the beam's polarization, which is in turn converted to a pair of independent conversely-amplitude-modulated signals, from which the voltage of the E-field is determined by the signal processor. The use of converse AM signals enables the signal processor to better distinguish signal from noise. The sensor converts the beam by splitting the beam in accordance with the axes of the beam's polarization state (an ellipse) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured.

  10. Spark-safe low-voltage detonator

    DOE Patents [OSTI]

    Lieberman, M.L.

    1988-07-01

    A column of explosive in a low-voltage detonator which makes it spark-safe includes an organic secondary explosive charge of HMX in the form of a thin pad disposed in a bore of a housing of the detonator in an ignition region of the explosive column and adjacent to an electrical ignition device at one end of the bore. The pad of secondary charge has an axial thickness within the range of twenty to thirty percent of its diameter. The explosive column also includes a first explosive charge of CP disposed in the housing bore in the ignition region of the explosive column next to the secondary charge pad on a side opposite from the ignition device. The first CP charge is loaded under sufficient pressure, 25 to 40 kpsi, to provide mechanical confinement of the pad of secondary charge and physical coupling thereof with the ignition device. The explosive column further includes a second explosive charge of CP disposed in the housing bore in a transition region of the explosive column next to the first CP charge on a side opposite from the pad of secondary charge. The second CP charge is loaded under sufficient pressure, about 10 kpsi, to allow occurrence of DDT. The first explosive CP charge has an axial thickness within the range of twenty to thirty percent of its diameter, whereas the second explosive CP charge contains a series of increments (nominally 4), each of which has an axial thickness-to-diameter ratio of one to two. 2 figs.

  11. TiN coated aluminum electrodes for DC high voltage electron guns

    SciTech Connect (OSTI)

    Mamun, Md Abdullah A.; Elmustafa, Abdelmageed A.; Taus, Rhys; Forman, Eric; Poelker, Matthew

    2015-05-15

    Preparing electrodes made of metals like stainless steel, for use inside DC high voltage electron guns, is a labor-intensive and time-consuming process. In this paper, the authors report the exceptional high voltage performance of aluminum electrodes coated with hard titanium nitride (TiN). The aluminum electrodes were comparatively easy to manufacture and required only hours of mechanical polishing using silicon carbide paper, prior to coating with TiN by a commercial vendor. The high voltage performance of three TiN-coated aluminum electrodes, before and after gas conditioning with helium, was compared to that of bare aluminum electrodes, and electrodes manufactured from titanium alloy (Ti-6Al-4V). Following gas conditioning, each TiN-coated aluminum electrode reached ?225?kV bias voltage while generating less than 100?pA of field emission (<10?pA) using a 40?mm cathode/anode gap, corresponding to field strength of 13.7?MV/m. Smaller gaps were studied to evaluate electrode performance at higher field strength with the best performing TiN-coated aluminum electrode reaching ?22.5 MV/m with field emission less than 100?pA. These results were comparable to those obtained from our best-performing electrodes manufactured from stainless steel, titanium alloy and niobium, as reported in references cited below. The TiN coating provided a very smooth surface and with mechanical properties of the coating (hardness and modulus) superior to those of stainless steel, titanium-alloy, and niobium electrodes. These features likely contributed to the improved high voltage performance of the TiN-coated aluminum electrodes.

  12. TiN coated aluminum electrodes for DC high voltage electron guns

    SciTech Connect (OSTI)

    Mamun, Md Abdullah A.; Elmustafa, Abdelmageed A.; Taus, Rhys; Forman, Eric; Poelker, Matthew

    2015-05-01

    Preparing electrodes made of metals like stainless steel, for use inside DC high voltage electron guns, is a labor-intensive and time-consuming process. In this paper, the authors report the exceptional high voltage performance of aluminum electrodes coated with hard titanium nitride (TiN). The aluminum electrodes were comparatively easy to manufacture and required only hours of mechanical polishing using silicon carbide paper, prior to coating with TiN by a commercial vendor. The high voltage performance of three TiN-coated aluminum electrodes, before and after gas conditioning with helium, was compared to that of bare aluminum electrodes, and electrodes manufactured from titanium alloy (Ti-6AI-4V). Following gas conditioning, each TiN-coated aluminum electrode reached -225 kV bias voltage while generating less than 100 pA of field emission (<10 pA) using a 40 mm cathode/anode gap, corresponding to field strength of 13.7 MV/m. Smaller gaps were studied to evaluate electrode performance at higher field strength with the best performing TiN-coated aluminum electrode reaching ~22.5 MV/m with field emission less than 100 pA. These results were comparable to those obtained from our best-performing electrodes manufactured from stainless steel, titanium alloy and niobium, as reported in references cited below. The TiN coating provided a very smooth surface and with mechanical properties of the coating (hardness and modulus) superior to those of stainless steel, titanium-alloy, and niobium electrodes. These features likely contributed to the improved high voltage performance of the TiN-coated aluminum electrodes.

  13. Optically triggered high voltage switch network and method for switching a high voltage

    DOE Patents [OSTI]

    El-Sharkawi, Mohamed A. (Renton, WA); Andexler, George (Everett, WA); Silberkleit, Lee I. (Mountlake Terrace, WA)

    1993-01-19

    An optically triggered solid state switch and method for switching a high voltage electrical current. A plurality of solid state switches (350) are connected in series for controlling electrical current flow between a compensation capacitor (112) and ground in a reactive power compensator (50, 50') that monitors the voltage and current flowing through each of three distribution lines (52a, 52b and 52c), which are supplying three-phase power to one or more inductive loads. An optical transmitter (100) controlled by the reactive power compensation system produces light pulses that are conveyed over optical fibers (102) to a switch driver (110') that includes a plurality of series connected optical triger circuits (288). Each of the optical trigger circuits controls a pair of the solid state switches and includes a plurality of series connected resistors (294, 326, 330, and 334) that equalize or balance the potential across the plurality of trigger circuits. The trigger circuits are connected to one of the distribution lines through a trigger capacitor (340). In each switch driver, the light signals activate a phototransistor (300) so that an electrical current flows from one of the energy reservoir capacitors through a pulse transformer (306) in the trigger circuit, producing gate signals that turn on the pair of serially connected solid state switches (350).

  14. On Building Secure SCADA Systems using Security Eduardo B. Fernandez

    E-Print Network [OSTI]

    Wu, Jie

    On Building Secure SCADA Systems using Security Patterns Eduardo B. Fernandez Dept. of Comp. Sci, also known as the supervisory, control, and data acquisition (SCADA) system. On the other hand systems. This paper aims to propose methods to build a secure SCADA system using security patterns

  15. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  16. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  17. Towards Secure Information Sharing Models for Community Cyber Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    Towards Secure Information Sharing Models for Community Cyber Security Ravi Sandhu Dept. of Computer Science Institute for Cyber Security University of Texas at San Antonio Email: ravi.sandhu@utsa.edu Ram Krishnan Dept. of Electrical and Computer Engineering Institute for Cyber Security University

  18. INSTITUTE FOR CYBER SECURITY Application-Centric Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Application-Centric Security Models Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio June 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY Dr. Robert W. Gracy Vice President

  19. 1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE

    E-Print Network [OSTI]

    Upadhyaya, Shambhu

    , there are 100+ centers ­ Based on curriculum mapping to CNSS (committee of National Security Standards) 4011 at Google (2010) · Threats to national security ­ Insider attacks ­ Examples: Bradley Manning leaked1Computer Security Shambhu Upadhyaya Cyber Security @CEISARE Professor S. Upadhyaya Department

  20. A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY

    E-Print Network [OSTI]

    Sussex, University of

    EN A SECURE EUROPE IN A BETTER WORLD EUROPEAN SECURITY STRATEGY Brussels, 12 December 2003 #12;1 EN's complex problems on its own Introduction Europe has never been so prosperous, so secure nor so free problems on its own. Europe still faces security threats and challenges. The outbreak of conflict

  1. Security Technology Demonstration and Validation Sustainability Plan

    SciTech Connect (OSTI)

    2008-08-31

    This report describes the process of creating continuity and sustainability for demonstration and validation (DEMVAL) assets at the National Security Technology Incubator (NSTI). The DEMVAL asset program is being developed as part of the National Security Preparedness Project (NSPP), funded by Department of Energy (DOE)/National Nuclear Security Administration (NNSA). The mission of the NSTI program is to identify, incubate, and accelerate technologies with national security applications at various stages of development by providing hands-on mentoring and business assistance to small businesses and emerging or growing companies. Part of this support is envisioned to be research and development of companies’ technology initiatives, at the same time providing robust test and evaluation of actual development activities. This program assists companies in developing technologies under the NSTI program through demonstration and validation of technologies applicable to national security created by incubators and other sources. The NSPP also will support the creation of an integrated demonstration and validation environment. Development of the commercial potential for national security technologies is a significant NSTI focus. As part of the process of commercialization, a comprehensive DEMVAL program has been recognized as an essential part of the overall incubator mission. A number of resources have been integrated into the NSTI program to support such a DEMVAL program.

  2. Transmission Line Security Monitor: Final Report

    SciTech Connect (OSTI)

    John Svoboda

    2011-04-01

    The Electric Power Transmission Line Security Monitor System Operational Test is a project funded by the Technical Support Working Group (TSWG). TSWG operates under the Combating Terrorism Technical Support Office that functions under the Department of Defense. The Transmission Line Security Monitor System is based on technology developed by Idaho National Laboratory. The technology provides a means for real-time monitoring of physical threats and/or damage to electrical transmission line towers and conductors as well as providing operational parameters to transmission line operators to optimize transmission line operation. The end use is for monitoring long stretches of transmission lines that deliver electrical power from remote generating stations to cities and industry. These transmission lines are generally located in remote transmission line corridors where security infrastructure may not exist. Security and operational sensors in the sensor platform on the conductors take power from the transmission line and relay security and operational information to operations personnel hundreds of miles away without relying on existing infrastructure. Initiated on May 25, 2007, this project resulted in pre-production units tested in realistic operational environments during 2010. A technology licensee, Lindsey Manufacturing of Azusa California, is assisting in design, testing, and ultimately production. The platform was originally designed for a security monitoring mission, but it has been enhanced to include important operational features desired by electrical utilities.

  3. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D mSecurity SecuritySecuritySmart

  4. 2014 Headquarters Facilities Master Security Plan- Chapter 8, Operations Security Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program Describes the DOE Headquarters Operations Security (OPSEC) Program.

  5. 2014 Headquarters Facilities Master Security Plan- Chapter 10, Security Awareness Program

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program Describes the DOE Headquarters Security Awareness Program

  6. IEEE 342 Node Low Voltage Networked Test System

    SciTech Connect (OSTI)

    Schneider, Kevin P.; Phanivong, Phillippe K.; Lacroix, Jean-Sebastian

    2014-07-31

    The IEEE Distribution Test Feeders provide a benchmark for new algorithms to the distribution analyses community. The low voltage network test feeder represents a moderate size urban system that is unbalanced and highly networked. This is the first distribution test feeder developed by the IEEE that contains unbalanced networked components. The 342 node Low Voltage Networked Test System includes many elements that may be found in a networked system: multiple 13.2kV primary feeders, network protectors, a 120/208V grid network, and multiple 277/480V spot networks. This paper presents a brief review of the history of low voltage networks and how they evolved into the modern systems. This paper will then present a description of the 342 Node IEEE Low Voltage Network Test System and power flow results.

  7. IMPACT OF DYNAMIC VOLTAGE SCALING (DVS) ON CIRCUIT OPTIMIZATION 

    E-Print Network [OSTI]

    Esquit Hernandez, Carlos A.

    2010-01-16

    Circuit designers perform optimization procedures targeting speed and power during the design of a circuit. Gate sizing can be applied to optimize for speed, while Dual-VT and Dynamic Voltage Scaling (DVS) can be applied to optimize for leakage...

  8. High frequency AC power converter for low voltage circuits

    E-Print Network [OSTI]

    Salazar, Nathaniel Jay Tobias

    2012-01-01

    This thesis presents a novel AC power delivery architecture that is suitable for VHF frequency (50-100MHz) polyphase AC/DC power conversion in low voltage integrated circuits. A complete AC power delivery architecture was ...

  9. Modeling the operating voltage of liquid metal battery cells

    E-Print Network [OSTI]

    Newhouse, Jocelyn Marie

    2014-01-01

    A one-dimensional, integrative model of the voltage during liquid metal battery operation has been developed to enhance the understanding of performance at the cell level. Two liquid metal batteries were studied: Mg-Sb for ...

  10. Unravelling the Performance Degradation Mechanisms in High-voltage...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Unravelling the Performance Degradation Mechanisms in High-voltage Lithium-ion Battery Composite Oxide Electrodes Apr 11 2014 02:00 PM - 03:00 PM Debasish Mohanty, ORNL, Oak Ridge...

  11. Design & Fabrication of a High-Voltage Photovoltaic Cell

    SciTech Connect (OSTI)

    Felder, Jennifer; /North Carolina State U. /SLAC

    2012-09-05

    Silicon photovoltaic (PV) cells are alternative energy sources that are important in sustainable power generation. Currently, applications of PV cells are limited by the low output voltage and somewhat low efficiency of such devices. In light of this fact, this project investigates the possibility of fabricating high-voltage PV cells on float-zone silicon wafers having output voltages ranging from 50 V to 2000 V. Three designs with different geometries of diffusion layers were simulated and compared in terms of metal coverage, recombination, built-in potential, and conduction current density. One design was then chosen and optimized to be implemented in the final device design. The results of the simulation serve as a feasibility test for the design concept and provide supportive evidence of the effectiveness of silicon PV cells as high-voltage power supplies.

  12. Multilevel cascade voltage source inverter with separate DC sources

    DOE Patents [OSTI]

    Peng, F.Z.; Lai, J.S.

    1997-06-24

    A multilevel cascade voltage source inverter having separate DC sources is described herein. This inverter is applicable to high voltage, high power applications such as flexible AC transmission systems (FACTS) including static VAR generation (SVG), power line conditioning, series compensation, phase shifting and voltage balancing and fuel cell and photovoltaic utility interface systems. The M-level inverter consists of at least one phase wherein each phase has a plurality of full bridge inverters equipped with an independent DC source. This inverter develops a near sinusoidal approximation voltage waveform with only one switching per cycle as the number of levels, M, is increased. The inverter may have either single-phase or multi-phase embodiments connected in either wye or delta configurations. 15 figs.

  13. Multilevel cascade voltage source inverter with seperate DC sources

    DOE Patents [OSTI]

    Peng, Fang Zheng (Oak Ridge, TN); Lai, Jih-Sheng (Knoxville, TN)

    1997-01-01

    A multilevel cascade voltage source inverter having separate DC sources is described herein. This inverter is applicable to high voltage, high power applications such as flexible AC transmission systems (FACTS) including static VAR generation (SVG), power line conditioning, series compensation, phase shifting and voltage balancing and fuel cell and photovoltaic utility interface systems. The M-level inverter consists of at least one phase wherein each phase has a plurality of full bridge inverters equipped with an independent DC source. This inverter develops a near sinusoidal approximation voltage waveform with only one switching per cycle as the number of levels, M, is increased. The inverter may have either single-phase or multi-phase embodiments connected in either wye or delta configurations.

  14. Multilevel cascade voltage source inverter with seperate DC sources

    DOE Patents [OSTI]

    Peng, Fang Zheng; Lai, Jih-Sheng

    2001-04-03

    A multilevel cascade voltage source inverter having separate DC sources is described herein. This inverter is applicable to high voltage, high power applications such as flexible AC transmission systems (FACTS) including static VAR generation (SVG), power line conditioning, series compensation, phase shifting and voltage balancing and fuel cell and photovoltaic utility interface systems. The M-level inverter consists of at least one phase wherein each phase has a plurality of full bridge inverters equipped with an independent DC source. This inverter develops a near sinusoidal approximation voltage waveform with only one switching per cycle as the number of levels, M, is increased. The inverter may have either single-phase or multi-phase embodiments connected in either wye or delta configurations.

  15. Multilevel cascade voltage source inverter with seperate DC sources

    DOE Patents [OSTI]

    Peng, Fang Zheng (Knoxville, TN); Lai, Jih-Sheng (Blacksburg, VA)

    2002-01-01

    A multilevel cascade voltage source inverter having separate DC sources is described herein. This inverter is applicable to high voltage, high power applications such as flexible AC transmission systems (FACTS) including static VAR generation (SVG), power line conditioning, series compensation, phase shifting and voltage balancing and fuel cell and photovoltaic utility interface systems. The M-level inverter consists of at least one phase wherein each phase has a plurality of full bridge inverters equipped with an independent DC source. This inverter develops a near sinusoidal approximation voltage waveform with only one switching per cycle as the number of levels, M, is increased. The inverter may have either single-phase or multi-phase embodiments connected in either wye or delta configurations.

  16. Voltage-matched configurations for multijunction solar cells

    SciTech Connect (OSTI)

    Gee, J.M.

    1987-01-01

    Novel methods for interconnecting the subcells of a multijunction solar cell are investigated. The subcells are connected in parallel in these new methods. The bandgaps of the subcells must be selected for matched voltages when operated in parallel. We refer to multijunction solar cells with the subcells connected in parallel as having a voltage-matched configuration. Computer analyses of multijunction solar cells with a voltage-matched configuration and with series-connected subcells were performed. Roughly, the same performance with either approach for a multijunction cell with optimized bandgaps was found. Several advantages for the voltage-matched configuration relative to multijunction solar cells with series-connected subcells were identified, including wider selection of bandgaps for optimal performance, less sensitivity to radiation damage, and less sensitivity to spectral variations.

  17. High-Voltage Solid Polymer Batteries for Electric Drive Vehicles...

    Office of Scientific and Technical Information (OSTI)

    Voltage Solid Polymer Batteries for Electric Drive Vehicles Eitouni, Hany; Yang, Jin; Pratt, Russell; Wang, Xiao; Grape, Ulrik The purpose of this project was for Seeo to develop a...

  18. High-voltage air-core pulse transformers

    SciTech Connect (OSTI)

    Rohwein, G. J.

    1981-01-01

    General types of air core pulse transformers designed for high voltage pulse generation and energy transfer applications are discussed with special emphasis on pulse charging systems which operate up to the multi-megavolt range. The design, operation, dielectric materials, and performance are described. It is concluded that high voltage air core pulse transformers are best suited to applications outside the normal ranges of conventional magnetic core transformers. In general these include charge transfer at high power levels and fast pulse generation with comparatively low energy. When properly designed and constructed, they are capable of delivering high energy transfer efficiency and have demonstrated superior high voltage endurance. The principal disadvantage of high voltage air core transformers is that they are not generally available from commercial sources. Consequently, the potential user must become thoroughly familiar with all aspects of design, fabrication and system application before he can produce a high performance transformer system. (LCL)

  19. Fusing strategies for the dual-voltage fault

    E-Print Network [OSTI]

    Shrivastava, Rupam, 1981-

    2005-01-01

    This thesis focuses on the 42V - 14V fault in a dual voltage system and discusses the possibility of effective fusing. A simple model for the system had been created from technical documentation. Based on the model and the ...

  20. Voltage Dependent Charge Storage Modes and Capacity in Subnanometer Pores

    SciTech Connect (OSTI)

    Qiao, Rui; Meunier, V.; Huang, Jingsong; Wu, Peng; Sumpter, Bobby G

    2012-01-01

    Using molecular dynamics simulations, we show that charge storage in subnanometer pores follows a distinct voltage-dependent behavior. Specifically, at lower voltages, charge storage is achieved by swapping co-ions in the pore with counterions in the bulk electrolyte. As voltage increases, further charge storage is due mainly to the removal of co-ions from the pore, leading to a capacitance increase. The capacitance eventually reaches a maximum when all co-ions are expelled from the pore. At even higher electrode voltages, additional charge storage is realized by counterion insertion into the pore, accompanied by a reduction of capacitance. The molecular mechanisms of these observations are elucidated and provide useful insight for optimizing energy storage based on supercapacitors.

  1. High voltage series connected tandem junction solar battery

    DOE Patents [OSTI]

    Hanak, Joseph J. (Lawrenceville, NJ)

    1982-01-01

    A high voltage series connected tandem junction solar battery which comprises a plurality of strips of tandem junction solar cells of hydrogenated amorphous silicon having one optical path and electrically interconnected by a tunnel junction. The layers of hydrogenated amorphous silicon, arranged in a tandem configuration, can have the same bandgap or differing bandgaps. The tandem junction strip solar cells are series connected to produce a solar battery of any desired voltage.

  2. Measuring Helical FCG Voltage with an Electric Field Antenna

    SciTech Connect (OSTI)

    White, A D; Anderson, R A; Javedani, J B; Reisman, D B; Goerz, D A; Ferriera, A J; Speer, R D

    2011-08-01

    A method of measuring the voltage produced by a helical explosive flux compression generator using a remote electric field antenna is described in detail. The diagnostic has been successfully implemented on several experiments. Measured data from the diagnostic compare favorably with voltages predicted using the code CAGEN, validating our predictive modeling tools. The measured data is important to understanding generator performance, and is measured with a low-risk, minimally intrusive approach.

  3. Micro helical polymeric structures produced by variable voltage direct electrospinning

    E-Print Network [OSTI]

    S. P. Shariatpanahi; A. Iraji zad; I. Abdollahzadeh; R. Shirsavar; D. Bonn; R. Ejtehadi

    2011-09-12

    Direct near field electrospinning is used to produce very long helical polystyrene microfibers in water. The pitch length of helices can be controlled by changing the applied voltage, allowing to produce both micro springs and microchannels. Using a novel high frequency variable voltage electrospinning method we found the helix formation speed and compared the experimental buckling frequency to theoretical expressions for viscous and elastic buckling. Finally we showed that the newmethod can be used to produce new periodic micro and nano structures.

  4. BROADER National Security Missions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Metal Chips (U) Uranium Trioxide (UO 3 ) UO 2 (NO 3 ) 2 Ur anyl Nitrate Ammonium Uranyl Carbonate (NH 4 ) 2 UO 2 (CO 3 ) 4 DEVELOP NEW NATIONAL SECURITY MISSIONS Y-12 has...

  5. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  6. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  7. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  8. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  9. High-Voltage Terminal Test of Test Stand for 1-MV Electrostatic Accelerator

    E-Print Network [OSTI]

    Park, Sae-Hoon

    2015-01-01

    The Korea Multipurpose Accelerator Complex (KOMAC) has been developing a 300-kV test stand for a 1-MV electrostatic accelerator ion source. The ion source and accelerating tube will be installed in a high-pressure vessel. The ion source in the high-pressure vessel is required to have a high reliability. The test stand has been proposed and developed to confirm the stable operating conditions of the ion source. The ion source will be tested at the test stand to verify the long-time operating conditions. The test stand comprises a 300-kV high-voltage terminal, a battery for the ion-source power, a 60-Hz inverter, 200-MHz RF power, a 5-kV extraction power supply, a 300-kV accelerating tube, and a vacuum system. The results of the 300-kV high-voltage terminal tests are presented in this paper.

  10. Optimizing the CEBAF Injector for Beam Operation with a Higher Voltage Electron Gun

    SciTech Connect (OSTI)

    F.E. Hannon, A.S. Hofler, R. Kazimi

    2011-03-01

    Recent developments in the DC gun technology used at CEBAF have allowed an increase in operational voltage from 100kV to 130kV. In the near future this will be extended further to 200kV with the purchase of a new power supply. The injector components and layout at this time have been designed specifically for 100kV operation. It is anticipated that with an increase in gun voltage and optimization of the layout and components for 200kV operation, that the electron bunch length and beam brightness can be improved upon. This paper explores some upgrade possibilities for a 200kV gun CEBAF injector through beam dynamic simulations.

  11. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  12. Policy Paper 35: Energy and Security in Northeast Asia: Fueling Security

    E-Print Network [OSTI]

    Calder, Kent; Fesharaki, Fereidun; Shirk, Susan L.; Stankiewicz, Michael

    1998-01-01

    Deese (editors). Energy and Security. 3. Fereidun Fesharaki,Energy and Security in Northeast Asia: Fueling Security Anrising energy demand. Energy and Security in Northeast Asia

  13. Secure Quantum Key Distribution

    E-Print Network [OSTI]

    Hoi-Kwong Lo; Marcos Curty; Kiyoshi Tamaki

    2015-05-20

    Secure communication plays a crucial role in the Internet Age. Quantum mechanics may revolutionise cryptography as we know it today. In this Review Article, we introduce the motivation and the current state of the art of research in quantum cryptography. In particular, we discuss the present security model together with its assumptions, strengths and weaknesses. After a brief introduction to recent experimental progress and challenges, we survey the latest developments in quantum hacking and counter-measures against it.

  14. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  15. Security systems engineering overview

    SciTech Connect (OSTI)

    Steele, B.J.

    1996-12-31

    Crime prevention is on the minds of most people today. The concern for public safety and the theft of valuable assets are being discussed at all levels of government and throughout the public sector. There is a growing demand for security systems that can adequately safeguard people and valuable assets against the sophistication of those criminals or adversaries who pose a threat. The crime in this country has been estimated at $70 billion in direct costs and up to $300 billion in indirect costs. Health insurance fraud alone is estimated to cost American businesses $100 billion. Theft, warranty fraud, and counterfeiting of computer hardware totaled $3 billion in 1994. A threat analysis is a prerequisite to any security system design to assess the vulnerabilities with respect to the anticipated threat. Having established a comprehensive definition of the threat, crime prevention, detection, and threat assessment technologies can be used to address these criminal activities. This talk will outline the process used to design a security system regardless of the level of security. This methodology has been applied to many applications including: government high security facilities; residential and commercial intrusion detection and assessment; anti-counterfeiting/fraud detection technologies (counterfeit currency, cellular phone billing, credit card fraud, health care fraud, passport, green cards, and questionable documents); industrial espionage detection and prevention (intellectual property, computer chips, etc.); and security barrier technology (creation of delay such as gates, vaults, etc.).

  16. Voltages across assembly joints due to direct-strike lightning currents

    SciTech Connect (OSTI)

    Dinallo, M.S. [Quatro Corp., Albuquerque, NM (United States); Fisher, R.J. [Sandia National Labs., Albuquerque, NM (United States)

    1994-08-01

    An extensive set of direct-strike lightning tests has been carried out on a set of facsimile assembly joints of the kinds employed in the design of nuclear weapon cases. Taken as a whole, the test hardware included all the conceptual design elements that are embodied, either singly or in combination, in any specific assembly joint incorporated into any stockpiled weapon. During the present testing, the effects of all key design parameters on the voltages developed across the interior of the joints were investigated under a range of lightning stroke current parameter values. Design parameter variations included the types and number of joint fasteners, mechanical preload, surface finish tolerance and coatings, and the material from which the joint assembly was fabricated. Variations of the simulated lightning stroke current included amplitude (30-, 100-, and 200-kA peak), rise time, and decay time. The maximum voltage observed on any of the test joints that incorporated proper metal-to-metal surface contact was 65 V. Typical response values were more on the order of 20 V. In order to assess the effect of the presence of a dielectric coating (either intentional or as a result of corrosion) between the mating surfaces of a joint, a special configuration was tested in which the mating parts of the test assembly were coated with a 1-mil-thick dielectric anodizing layer. First strokes to these test assemblies resulted in very narrow voltage spikes of amplitudes up to 900 V. The durations of these spikes were less than 0.1 {mu}s. However, beyond these initial spikes, the voltages typically had amplitudes of up to 400 V for durations of 3 to 5 {mu}s.

  17. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  18. Perfectly Secure Encryption of Individual Sequences

    E-Print Network [OSTI]

    Merhav, Neri

    key rate LZ compressibility. Encrypter/decrypter have unlimited resources, whereas eavesdropper Direct: LZ compression + one­time pad encryption ­ (x) = (x). Natural individual­sequence counterpart, ki, si) zi+1 = g(zi, xi, si) Perfect security: Pr(yn |x, s) ­ independent of x. Info losslessness

  19. Development of high-voltage pulse-slicer unit with variable pulse duration for pulse radiolysis system

    SciTech Connect (OSTI)

    Upadhyay, J.; Sharma, M. L.; Navathe, C. P. [Laser Electronic Support Division, Raja Ramanna Centre for Advanced Technology, Indore, Madhya Pradesh 452013 (India); Toley, M. A.; Shinde, S. J.; Nadkarni, S. A.; Sarkar, S. K. [Radiation and Photochemistry Division, Bhabha Atomic Research Centre, Trombay, Mumbai 400085 (India)

    2012-02-15

    A high-voltage pulse-slicer unit with variable pulse duration has been developed and integrated with a 7 MeV linear electron accelerator (LINAC) for pulse radiolysis investigation. The pulse-slicer unit provides switching voltage from 1 kV to 10 kV with rise time better than 5 ns. Two MOSFET based 10 kV switches were configured in differential mode to get variable duration pulses. The high-voltage pulse has been applied to the deflecting plates of the LINAC for slicing of electron beam of 2 {mu}s duration. The duration of the electron beam has been varied from 30 ns to 2 {mu}s with the optimized pulse amplitude of 7 kV to get corresponding radiation doses from 6 Gy to 167 Gy.

  20. Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture

    DOE Patents [OSTI]

    Muller, George; Perkins, Casey J.; Lancaster, Mary J.; MacDonald, Douglas G.; Clements, Samuel L.; Hutton, William J.; Patrick, Scott W.; Key, Bradley Robert

    2015-07-28

    Computer-implemented security evaluation methods, security evaluation systems, and articles of manufacture are described. According to one aspect, a computer-implemented security evaluation method includes accessing information regarding a physical architecture and a cyber architecture of a facility, building a model of the facility comprising a plurality of physical areas of the physical architecture, a plurality of cyber areas of the cyber architecture, and a plurality of pathways between the physical areas and the cyber areas, identifying a target within the facility, executing the model a plurality of times to simulate a plurality of attacks against the target by an adversary traversing at least one of the areas in the physical domain and at least one of the areas in the cyber domain, and using results of the executing, providing information regarding a security risk of the facility with respect to the target.

  1. REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE IN BOTH

    E-Print Network [OSTI]

    REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE and expanded its catalog of security controls to help organizations protect their information and information, the revised catalog brings together, for the first time, comprehensive information about security controls

  2. Minimizing Market Operation Costs Using A Security-Constrained Unit Commitment Approach

    E-Print Network [OSTI]

    McCalley, James D.

    Minimizing Market Operation Costs Using A Security-Constrained Unit Commitment Approach Qin Zhou that is currently in place. It uses a Security Constrained Unit Commitment application to commit enough units the specified time period. A post Must Offer Waiver procedure utilizing the Security Constrained Unit Commitment

  3. E-beam high voltage switching power supply

    DOE Patents [OSTI]

    Shimer, D.W.; Lange, A.C.

    1997-03-11

    A high power, solid state power supply is described for producing a controllable, constant high voltage output under varying and arcing loads suitable for powering an electron beam gun or other ion source. The present power supply is most useful for outputs in a range of about 100-400 kW or more. The power supply is comprised of a plurality of discrete switching type dc-dc converter modules, each comprising a voltage regulator, an inductor, an inverter for producing a high frequency square wave current of alternating polarity, an improved inverter voltage clamping circuit, a step up transformer, and an output rectifier for producing a dc voltage at the output of each module. The inputs to the converter modules are fed from a common dc rectifier/filter and are linked together in parallel through decoupling networks to suppress high frequency input interactions. The outputs of the converter modules are linked together in series and connected to the input of the transmission line to the load through a decoupling and line matching network. The dc-dc converter modules are phase activated such that for n modules, each module is activated equally 360{degree}/n out of phase with respect to a successive module. The phased activation of the converter modules, combined with the square current waveforms out of the step up transformers, allows the power supply to operate with greatly reduced output capacitance values which minimizes the stored energy available for discharge into an electron beam gun or the like during arcing. The present power supply also provides dynamic response to varying loads by controlling the voltage regulator duty cycle using simulated voltage feedback signals and voltage feedback loops. Circuitry is also provided for sensing incipient arc currents reflected at the output of the power supply and for simultaneously decoupling the power supply circuitry from the arcing load. 7 figs.

  4. E-beam high voltage switching power supply

    DOE Patents [OSTI]

    Shimer, Daniel W. (Danville, CA); Lange, Arnold C. (Livermore, CA)

    1997-01-01

    A high power, solid state power supply is described for producing a controllable, constant high voltage output under varying and arcing loads suitable for powering an electron beam gun or other ion source. The present power supply is most useful for outputs in a range of about 100-400 kW or more. The power supply is comprised of a plurality of discrete switching type dc-dc converter modules, each comprising a voltage regulator, an inductor, an inverter for producing a high frequency square wave current of alternating polarity, an improved inverter voltage clamping circuit, a step up transformer, and an output rectifier for producing a dc voltage at the output of each module. The inputs to the converter modules are fed from a common dc rectifier/filter and are linked together in parallel through decoupling networks to suppress high frequency input interactions. The outputs of the converter modules are linked together in series and connected to the input of the transmission line to the load through a decoupling and line matching network. The dc-dc converter modules are phase activated such that for n modules, each module is activated equally 360.degree./n out of phase with respect to a successive module. The phased activation of the converter modules, combined with the square current waveforms out of the step up transformers, allows the power supply to operate with greatly reduced output capacitance values which minimizes the stored energy available for discharge into an electron beam gun or the like during arcing. The present power supply also provides dynamic response to varying loads by controlling the voltage regulator duty cycle using simulated voltage feedback signals and voltage feedback loops. Circuitry is also provided for sensing incipient arc currents reflected at the output of the power supply and for simultaneously decoupling the power supply circuitry from the arcing load.

  5. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  6. Unconditionally Secure Quantum Signatures

    E-Print Network [OSTI]

    Ryan Amiri; Erika Andersson

    2015-08-08

    Signature schemes, proposed in 1976 by Diffie and Hellman, have become ubiquitous across modern communications. They allow for the exchange of messages from one sender to multiple recipients, with the guarantees that messages cannot be forged or tampered with and that messages also can be forwarded from one recipient to another without compromising their validity. Signatures are different from, but no less important than encryption, which ensures the privacy of a message. Commonly used signature protocols - signatures based on the Rivest-Adleman-Shamir (RSA) algorithm, the digital signature algorithm (DSA), and the elliptic curve digital signature algorithm (ECDSA) - are only computationally secure, similar to public key encryption methods. In fact, since these rely on the difficulty of finding discrete logarithms or factoring large primes, it is known that they will become completely insecure with the emergence of quantum computers. We may therefore see a shift towards signature protocols that will remain secure even in a post-quantum world. Ideally, such schemes would provide unconditional or information-theoretic security. In this paper, we aim to provide an accessible and comprehensive review of existing unconditionally secure signature schemes for signing classical messages, with a focus on unconditionally secure quantum signature schemes.

  7. Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefieldSulfateSciTechtail.Theory ofDidDevelopment Top Scientific Impact Since its SearchSecurity

  8. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345 UnlimitedSecure

  9. national security campus | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal Gas &SCE-SessionsSouthReporteeo | National Nuclear Securityhr | Nationalnational security

  10. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorking With U.S. Coal StocksSuppliers Tag: Supplierssecurity Tag: security

  11. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust,Field-effectWorkingLosThe 26thI D- 6 0 4 2 r m m m m port m fm f mphysical security |

  12. Low voltage supply system for the very front end readout electronics of the CMS electromagnetic calorimeter

    E-Print Network [OSTI]

    Lustermann, W; Denes, P; Djambazov, L; Dröge, M; Faure, J L; Iliev, Bozhidar Z; Nanov, I; Raykov, P; Shivarov, N

    1999-01-01

    Low voltage supply system for the very front end readout electronics of the CMS electromagnetic calorimeter

  13. Requirements for a Standard Test to Rate the Durability of PV Modules at System Voltage (Presentation)

    SciTech Connect (OSTI)

    Hacke, P.; Terwilliger, K.; Glick, S.; Kempe, M.; Kurtz, S.; Bennett, I.; Kloos, M.

    2011-02-01

    Degradation modes in photovoltaic modules under system bias voltage stress are described and classified.

  14. Ultra-Low Voltage VCO Design Using Schmitt Trigger on SOI

    E-Print Network [OSTI]

    Ayers, Joseph

    Ultra-Low Voltage VCO Design Using Schmitt Trigger on SOI Kyung Ki Kim Department of Electrical trigger and an ultra low voltage current source on PD-SOI with low temperature and supply voltage oscillator based VCOs on SOI CMOS [4][5] have been reported. However, VCO with ultra low voltage less than 0

  15. Elevated voltage level I.sub.DDQ failure testing of integrated circuits

    DOE Patents [OSTI]

    Righter, Alan W. (Albuquerque, NM)

    1996-01-01

    Burn in testing of static CMOS IC's is eliminated by I.sub.DDQ testing at elevated voltage levels. These voltage levels are at least 25% higher than the normal operating voltage for the IC but are below voltage levels that would cause damage to the chip.

  16. Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

    Office of Environmental Management (EM)

    4, Cyber Security Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2015 2015 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security...

  17. Voltage sensing in ion channels: Mesoscale simulations of biological devices

    E-Print Network [OSTI]

    Peyser, Alexander

    2012-01-01

    Electrical signaling via voltage-gated ion channels depends upon the function of a voltage sensor (VS), identified with the S1-S4 domain in voltage-gated K+ channels. Here we investigate some energetic aspects of the sliding-helix model of the VS using simulations based on VS charges, linear dielectrics and whole-body motion. Model electrostatics in voltage-clamped boundary conditions are solved using a boundary element method. The statistical mechanical consequences of the electrostatic configurational energy are computed to gain insight into the sliding-helix mechanism and to predict experimentally measured ensemble properties such as gating charge displaced by an applied voltage. Those consequences and ensemble properties are investigated for two alternate S4 configurations, \\alpha- and 3(10)-helical. Both forms of VS are found to have an inherent electrostatic stability. Maximal charge displacement is limited by geometry, specifically the range of movement where S4 charges and counter-charges overlap in t...

  18. Voltage control in pulsed system by predict-ahead control

    DOE Patents [OSTI]

    Payne, A.N.; Watson, J.A.; Sampayan, S.E.

    1994-09-13

    A method and apparatus for predict-ahead pulse-to-pulse voltage control in a pulsed power supply system is disclosed. A DC power supply network is coupled to a resonant charging network via a first switch. The resonant charging network is coupled at a node to a storage capacitor. An output load is coupled to the storage capacitor via a second switch. A de-Q-ing network is coupled to the resonant charging network via a third switch. The trigger for the third switch is a derived function of the initial voltage of the power supply network, the initial voltage of the storage capacitor, and the present voltage of the storage capacitor. A first trigger closes the first switch and charges the capacitor. The third trigger is asserted according to the derived function to close the third switch. When the third switch is closed, the first switch opens and voltage on the node is regulated. The second trigger may be thereafter asserted to discharge the capacitor into the output load. 4 figs.

  19. A statistical approach to designing mitigation for induced ac voltages

    SciTech Connect (OSTI)

    Dabkowski, J. [Electro Sciences, Inc., Crystal Lake, IL (United States)

    1996-08-01

    Induced voltage levels on buried pipelines collocated with overhead electric power transmission lines are usually mitigated by means of grounding the pipeline. Maximum effectiveness is obtained when grounds are placed at discrete locations along the pipeline where the peak induced voltages occur. The degree of mitigation achieved is dependent upon the local soil resistivity at these locations. On occasion it may be necessary to employ an extensive distributed grounding system, for example, a parallel buried wire connected to the pipe at periodic intervals. In this situation the a priori calculation of mitigated voltage levels is sometimes made assuming an average value for the soil resistivity. Over long distances, however, the soil resistivity generally varies as a log-normally distributed random variable. The effect of this variability upon the predicted mitigated voltage levels is examined. It is found that the predicted levels exhibit a statistical variability which precludes a precise determination of the mitigated voltage levels. Thus, post commissioning testing of the emplaced mitigation system is advisable.

  20. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  1. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  2. Securities Class Actions and Bankrupt Companies

    E-Print Network [OSTI]

    Park, James J.

    2014-01-01

    the utility of securities class actions. Certainly, contextthe merit of securities class actions. UCLA | SCHOOL OF LAWof James J. Park, Securities Class Actions and Bankrupt

  3. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  4. Review of digital image security in Dermatology

    E-Print Network [OSTI]

    Nielson, Colton; West, Cameron; Shimizu, Ikue

    2015-01-01

    encrypted communications, cloud security breaches, and phonebreaches in security demonstrate, such cloud storage ofand security rules 22 Audits of CSP data center operations and cloud

  5. Integrated Security System | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security System A security platform providing multi-layer intrusion detection and security management for a networked energy control systems architecture Integrated...

  6. Data security on the national fusion grid

    E-Print Network [OSTI]

    Burruss, Justine R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  7. Security on the US Fusion Grid

    E-Print Network [OSTI]

    Burruss, Justin R.; Fredian, Tom W.; Thompson, Mary R.

    2005-01-01

    of any computational grid is security. Effective sharing oflike ITER. Keywords: security, FusionGrid, grid computing 1.A Security Architecture for Computational Grids,” Proc. 5th

  8. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01

    CERT. (2010, Dec) Technical Cyber Security Alerts. [Online].a broad overview of cyber security incidents in the laststrategic war and viable cyber security solutions should be

  9. Mathematical and Statistical Opportunities in Cyber Security

    E-Print Network [OSTI]

    Meza, Juan

    2009-01-01

    development approach to cyber security. Report submitted to2007. Committee on Improving Cyber- security Research in theOpportunities in Cyber Security ? Juan Meza † Scott

  10. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01

    2009 [1981]. American National Security, 6th ed. Baltimore,1977. Economic Issues and National Security. Lawrence, KS:Immigration and National Security. Westport, CT: Praeger

  11. Office of Security Assessments | Department of Energy

    Energy Savers [EERE]

    Security Assessments Office of Security Assessments MISSION The Office of Security Assessments is responsible for the independent evaluation of the effectiveness of safeguards and...

  12. Towards Efficient Collaboration in Cyber Security

    SciTech Connect (OSTI)

    Hui, Peter SY; Bruce, Joseph R.; Fink, Glenn A.; Gregory, Michelle L.; Best, Daniel M.; McGrath, Liam R.; Endert, Alexander

    2010-06-03

    Cyber security analysts in different geographical and organizational domains are often largely tasked with similar duties, albeit with domain-specific variations. These analysts necessarily perform much of the same work independently— for instance, analyzing the same list of security bulletins released by largely the same set of software vendors. As such, communication and collaboration between such analysts would be mutually beneficial to the analysts involved, potentially reducing redundancy and offering the opportunity to preemptively alert each other to high-severity security alerts in a more timely fashion. However, several barriers to practical and efficient collaboration exist, and as such, no such framework exists to support such efforts. In this paper, we discuss the inherent difficulties which make efficient collaboration between cyber security analysts a difficult goal to achieve. We discuss preliminary ideas and concepts towards a collaborative cyber-security framework currently under development, whose goal is to facilitate analyst collaboration across these boundaries. While still in its early stages, we describe work-in-progress towards achieving this goal, including motivation, functionality, concepts, and a high-level description of the proposed system architecture.

  13. A study of temperature compensating circuits for voltage references which use negative temperature coefficient zener diodes 

    E-Print Network [OSTI]

    Coleman, Spencer Delano

    1961-01-01

    OF FIGURES Figure Page Zener Diode Voltage vs Current Characteristics. Zener Diode Breakdown Voltage vs Temperature Coefficient . 3a. 1N746 Zener Diode Voltage vs Current Character- istics in Breakdown Region 3b. 1N747 Zener Diode Voltage vs Current... Character- istics in Breakdown Region 10 3c. 1N748 Zener Diode Voltage vs Current Character- istics in Breakdown Region 3d. 1N749 Zener Diode Voltage vs Current Character- istics in Breakdown Region . 12 3e. IN750 Zener Diode Voltage vs Current...

  14. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Broader source: Energy.gov (indexed) [DOE]

    A vulnerability was reported in Cisco Secure Access Control System. A remote user can change the passwords of arbitrary users. PLATFORM: Cisco Secure ACS versions 5.1 patch 3, 4,...

  15. AUDIT REPORT Security at the Nevada National Security Site

    Broader source: Energy.gov (indexed) [DOE]

    Security at the Nevada National Security Site OAS-L-15-06 May 2015 U.S. Department of Energy Office of Inspector General Office of Audits and Inspections . Department of Energy...

  16. Security Requirements Engineering Support for Security-Annotated Business Processes

    E-Print Network [OSTI]

    Security Requirements Engineering Support for Security-Annotated Business Processes Elda Paja1 that business analysts are not secu- rity experts and assume that this will be bolted on later. Fortunately

  17. Technical Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2015-09-02

    This order implements the Department of Energy (DOE) Technical Security Program (TSP). This program represents the convergence of two distinct disciplines: Counterintelligence (CI) and Security Countermeasures. The elements of the TSP are driven by national level, interagency programs that are codified in various laws, Executive Orders, national polices and directives. Supersedes DOE M 470.4-4A Chg 1, dated 10-12-2010, Section D – Technical Surveillance Countermeasures (Official Use Only) and classified annex (Secret); and DOE M 205.1-3 (Official Use Only) and Part II (Secret), dated 4-17-2006.

  18. Nevada National Security Site

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal of HonorPoster Session |SecurityNSDD |UpdatedSecurity|National

  19. Global Material Security

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of NaturalDukeWakefield Municipal GasAdministration Medal01 Sandia NationalSecurityNuclear SecurityOfficesPrograms

  20. Voltage Impacts of Utility-Scale Distributed Wind

    SciTech Connect (OSTI)

    Allen, A.

    2014-09-01

    Although most utility-scale wind turbines in the United States are added at the transmission level in large wind power plants, distributed wind power offers an alternative that could increase the overall wind power penetration without the need for additional transmission. This report examines the distribution feeder-level voltage issues that can arise when adding utility-scale wind turbines to the distribution system. Four of the Pacific Northwest National Laboratory taxonomy feeders were examined in detail to study the voltage issues associated with adding wind turbines at different distances from the sub-station. General rules relating feeder resistance up to the point of turbine interconnection to the expected maximum voltage change levels were developed. Additional analysis examined line and transformer overvoltage conditions.

  1. Digital measurement system for the LHC klystron high voltage modulator.

    E-Print Network [OSTI]

    Mikkelsen, Anders

    Accelerating voltage in the Large Hadron Collider (LHC) is created by a means of 16 superconducting standing wave RF cavities, each fed by a 400MHz/300kW continuous wave klystron amplifier. Part of the upgrade program for the LHC long shutdown one is to replace the obsolete analogue current and voltage measurement circuitry located in the high voltage bunkers by a new, digital system, using ADCs and optical fibres. A digital measurement card is implemented and integrated into the current HV modulator oil tank (floating at -58kV) and interfaced to the existing digital VME boards collecting the data for several klystrons at the ground potential. Measured signals are stored for the logging, diagnostics and post-mortem analysis purposes.

  2. Quis Custodiet ipsos Custodes? A New Paradigm for Analyzing Security Paradigms

    E-Print Network [OSTI]

    Peisert, Sean; Bishop, Matt; Corris, Laura; Greenwald, Steven J

    2009-01-01

    World renowned playboy, reformed hacker, founder and CEO ofweeks entered the security community and hacker culture ata time when “hacker” did not mean “cracker. ” In his early

  3. Method of determining the open circuit voltage of a battery in a closed circuit

    DOE Patents [OSTI]

    Brown, William E. (Walnut Creek, CA)

    1980-01-01

    The open circuit voltage of a battery which is connected in a closed circuit is determined without breaking the circuit or causing voltage upsets therein. The closed circuit voltage across the battery and the current flowing through it are determined under normal load and then a fractional change is made in the load and the new current and voltage values determined. The open circuit voltage is then calculated, according to known principles, from the two sets of values.

  4. Secure Storage Architectures

    SciTech Connect (OSTI)

    Aderholdt, Ferrol; Caldwell, Blake A; Hicks, Susan Elaine; Koch, Scott M; Naughton, III, Thomas J; Pogge, James R; Scott, Stephen L; Shipman, Galen M; Sorrillo, Lawrence

    2015-01-01

    The purpose of this report is to clarify the challenges associated with storage for secure enclaves. The major focus areas for the report are: - review of relevant parallel filesystem technologies to identify assets and gaps; - review of filesystem isolation/protection mechanisms, to include native filesystem capabilities and auxiliary/layered techniques; - definition of storage architectures that can be used for customizable compute enclaves (i.e., clarification of use-cases that must be supported for shared storage scenarios); - investigate vendor products related to secure storage. This study provides technical details on the storage and filesystem used for HPC with particular attention on elements that contribute to creating secure storage. We outline the pieces for a a shared storage architecture that balances protection and performance by leveraging the isolation capabilities available in filesystems and virtualization technologies to maintain the integrity of the data. Key Points: There are a few existing and in-progress protection features in Lustre related to secure storage, which are discussed in (Chapter 3.1). These include authentication capabilities like GSSAPI/Kerberos and the in-progress work for GSSAPI/Host-keys. The GPFS filesystem provides native support for encryption, which is not directly available in Lustre. Additionally, GPFS includes authentication/authorization mechanisms for inter-cluster sharing of filesystems (Chapter 3.2). The limitations of key importance for secure storage/filesystems are: (i) restricting sub-tree mounts for parallel filesystem (which is not directly supported in Lustre or GPFS), and (ii) segregation of hosts on the storage network and practical complications with dynamic additions to the storage network, e.g., LNET. A challenge for VM based use cases will be to provide efficient IO forwarding of the parallel filessytem from the host to the guest (VM). There are promising options like para-virtualized filesystems to help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to include evaluation of performance/protection of select products. (Note, we are investigation the opti

  5. High power impulse magnetron sputtering: Current-voltage-timecharacteristics indicate the onset of sustained self-sputtering

    SciTech Connect (OSTI)

    Anders, Andre; Andersson, Joakim; Ehiasarian, Arutiun

    2007-08-03

    The commonly used current-voltage characteristics are foundinadequate for describing the pulsed nature of the high power impulsemagnetron sputtering (HIPIMS) discharge, rather, the description needs tobe expanded to current-voltage-time characteristics for each initial gaspressure. Using different target materials (Cu, Ti, Nb, C, W, Al, Cr) anda pulsed constant-voltage supply it is shown that the HIPIMS dischargestypically exhibit an initial pressure dependent current peak followed bya second phase that is power and material dependent. This suggests thatthe initial phase of a HIPIMS discharge pulse is dominated by gas ionswhereas the later phase has a strong contribution from self-sputtering.For some materials the discharge switches into a mode of sustainedself-sputtering. The very large differences between materials cannot beascribed to the different sputter yields but they indicate thatgeneration and trapping ofsecondary electrons plays a major role forcurrent-voltage-time characteristics. In particular, it is argued thatthe sustained self-sputtering phase is associated with thegeneration ofmultiply charged ions because only they can cause potential emission ofsecondary electrons whereas the yield caused by singly charged metal ionsis negligibly small.

  6. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  7. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science kory.kirk@villanova.edu www.korykirk.com/ Abstract Due to the increasing amount of wireless, train stations and cafes, there is a need for a wireless protocol that allows public access to secure

  8. Low-voltage ultra-low-poweranalog IC design -djmamic translinearcircuits 1.3.1 1.3 Low-voltage ultra-low-power analog IC design

    E-Print Network [OSTI]

    Serdijn, Wouter A.

    Low-voltage ultra-low-poweranalog IC design -djmamic translinearcircuits 1.3.1 1.3 Low-voltage ultra-low-power analog IC design -dynamic translinear circuits 0 (rg G x m .- E . . . . . a r, a" P, 44' s" +N m - _ c o3 #12;Low-voltage ultra-low-power analog IC design -dynamic translinear circuits I

  9. High voltage switch triggered by a laser-photocathode subsystem

    DOE Patents [OSTI]

    Chen, Ping; Lundquist, Martin L.; Yu, David U. L.

    2013-01-08

    A spark gap switch for controlling the output of a high voltage pulse from a high voltage source, for example, a capacitor bank or a pulse forming network, to an external load such as a high gradient electron gun, laser, pulsed power accelerator or wide band radar. The combination of a UV laser and a high vacuum quartz cell, in which a photocathode and an anode are installed, is utilized as triggering devices to switch the spark gap from a non-conducting state to a conducting state with low delay and low jitter.

  10. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  11. NISTIR 7497 Security Architecture Design

    E-Print Network [OSTI]

    NISTIR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) Matthew Scholl Kevin Stine Kenneth Lin Daniel Steinberg #12;NISTIR 7497 Security Architecture Design Process Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 Kenneth Lin

  12. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  13. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  14. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  15. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  16. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  17. Research Data Data Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    Research Data Data Security Survey Collection FAQs Q: I am not a UConn Health Center employee; can multiple projects that share common data? Yes. As long as the projects have common fields as you would in SurveyMonkey; data forms, e.g. Case Report Forms (CRF); or a combination of both. For any

  18. ARMY Energy Security Considerations

    E-Print Network [OSTI]

    energy waste in existing facilities; Increase energy efficiency in renovation and new constructionARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2

  19. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  20. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  1. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  2. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  3. Supporting Organizations | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the following three organizations: Measurement Science and Systems Engineering Division Nuclear Security and Isotope Technology Division Computational Sciences and Engineering...

  4. Critical Infrastructure and Cyber Security 

    E-Print Network [OSTI]

    Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

    2011-01-01

    cyber security. They designated responsibility for cyber-security to the newly formed Department of Homeland Security, a duty that has continued to today 3. The group was tasked with creating a method of protecting the critical components.... 2010. 15 Mar. 2011. http://www.d tic.mil/doctrine/new_pubs/jp1_02.pdf 10 Comments on the Economic and Security Implications Of Recent Developments in the World Oil Market , 107th Cong. (2000) (testimony of Robert E. Ebel). http...

  5. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  6. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  7. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Victoria, University of

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  8. Improving Control System Security through the Evaluation of Current Trends in Computer Security Research

    SciTech Connect (OSTI)

    Rolston

    2005-03-01

    At present, control system security efforts are primarily technical and reactive in nature. What has been overlooked is the need for proactive efforts, focused on the IT security research community from which new threats might emerge. Evaluating cutting edge IT security research and how it is evolving can provide defenders with valuable information regarding what new threats and tools they can anticipate in the future. Only known attack methodologies can be blocked, and there is a gap between what is known to the general security community and what is being done by cutting edge researchers --both those trying to protect systems and those trying to compromise them. The best security researchers communicate with others in their field; they know what cutting edge research is being done; what software can be penetrated via this research; and what new attack techniques and methodologies are being circulated in the black hat community. Standardization of control system applications, operating systems, and networking protocols is occurring at a rapid rate, following a path similar to the standardization of modern IT networks. Many attack methodologies used on IT systems can be ported over to the control system environment with little difficulty. It is extremely important to take advantage of the lag time between new research, its use on traditional IT networks, and the time it takes to port the research over for use on a control system network. Analyzing nascent trends in IT security and determining their applicability to control system networks provides significant information regarding defense mechanisms needed to secure critical infrastructure more effectively. This work provides the critical infrastructure community with a better understanding of how new attacks might be launched, what layers of defense will be needed to deter them, how the attacks could be detected, and how their impact could be limited.

  9. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  10. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  11. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    in a cost- effective manner. The implementation of IT security and capital planning practices withinJanuary 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS released Special Publication (SP) 800-65, Inte grating IT Security into the Capital Planning and Investment

  12. Guidelines on Security and Privacy

    E-Print Network [OSTI]

    Guidelines on Security and Privacy in Public Cloud Computing WayneJansen TimothyGrance Special Publication 800-144 #12;ii NIST Special Publication 800-144 Guidelines on Security and Privacy in Public Cloud and Ramaswamy Chandramouli, also from NIST, provided input on cloud security in early drafts. Thanks also go

  13. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  14. Waste Isolation Pilot Plant Transportation Security

    Office of Environmental Management (EM)

    Senior Management Operational Management Implementation OOB NTP Transportation Logistics OSO Operations Management Organization Security WIPP Security Conditions * TRU Waste...

  15. National Nuclear Security Administration Overview | Department...

    Office of Environmental Management (EM)

    Administration Overview National Nuclear Security Administration Overview National Nuclear Security Administration Overview More Documents & Publications National Transportation...

  16. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  17. Independent Oversight Review, National Nuclear Security Administration...

    Office of Environmental Management (EM)

    Nuclear Security Administration Production Office - February 2014 Independent Oversight Review, National Nuclear Security Administration Production Office - February 2014 February...

  18. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  19. CONSIDERATION OF SECURITY IN TELEHEALTH WIRELESS SENSOR NETWORK MONITORING SYSTEMS

    E-Print Network [OSTI]

    in the security of data transmission through wire- less sensor networks (WSN). Each individual node in a WSN. The Flooding Time Synchronization Protocol (FTSP) [5] is proposed to ensure time sychrony in the telehealh WSN to investigate the effects of injecting bad time synchroniza- tion messages into a WSN implemented with the FTSP

  20. Simplified VO M&V Protocol Simplified Voltage Optimization (VO)

    E-Print Network [OSTI]

    modeling is mentioned, it refers to using industry accepted distribution system power flow simulation tools the verification process. · Calculations of all system improvements (reduction of line losses and no-load lossesSimplified VO M&V Protocol 1 Simplified Voltage Optimization (VO) Measurement and Verification

  1. Smart Grid Voltage Sag Detection using Instantaneous Features Extraction

    E-Print Network [OSTI]

    Boyer, Edmond

    encountered power quality disturbances. Index Terms--Smart grid, voltage sag detection, power quality (PQ as the generation system is moved nearby the distribution level and this is achieved by using a set of micro grids grids are their availability, reliability, and profitability; in order to fulfill power demand according

  2. DEVELOPMENT OF BROADBAND LOW-VOLTAGE RF MEM SWITCHES

    E-Print Network [OSTI]

    Shen, Shyh-Chiang

    DEVELOPMENT OF BROADBAND LOW-VOLTAGE RF MEM SWITCHES S.C. Shen, D. T. Becher, D. C. Caruth, and M)333-4054 Fax: (217) 244-6375 Abstract We present novel RF switches using micro-electro- mechanical (MEM) technology. These MEM switches are built on GaAs substrates using GaAs MESFET MMIC- compatible processes

  3. CompilerDirected Dynamic Voltage Scaling Based on Program Regions

    E-Print Network [OSTI]

    Kremer, Ulrich

    '' the degraded CPU performance behind the memory hierarchy accesses which are on the critical path. The compiler. processor that can operate over a wide voltage range. The operating system controls the processor speed user environment, but not in a multi­user environment where the CPU is scheduled across di#erent active

  4. High Voltage DC Transmission 1.0 Introduction

    E-Print Network [OSTI]

    McCalley, James D.

    1 High Voltage DC Transmission 1.0 Introduction HVDC has been applied in electric power systems Supplier: ABB Railroa d DC Tie USA - Mission, TX 26°1001N9 8°1925W USA - Mission, TX 26°1001N9 8°1925W 21

  5. High Voltage DC Transmission 2 1.0 Introduction

    E-Print Network [OSTI]

    McCalley, James D.

    1 High Voltage DC Transmission 2 1.0 Introduction Interconnecting HVDC within an AC system requires conversion from AC to DC and inversion from DC to AC. We refer to the circuits which provide conversion from AC to DC as rectifiers and the circuits which provide conversion from DC to AC as inverters. The term

  6. Chronic Benzodiazepine Administration Potentiates High Voltage-Activated Calcium Currents

    E-Print Network [OSTI]

    Abraham, Nader G.

    effects from drug withdrawal phenomena to dependence on a variety of drugs of abuse. High voltage benzodiazepine physical dependence. Benzodiazepines, a group of positive allosteric modulators of GABAA receptors legitimate prescription of benzodiazepines increases the proportion of patients who develop dependence

  7. Topical Review Voltage Dependence of the Na/K Pump

    E-Print Network [OSTI]

    Gadsby, David

    Topical Review Voltage Dependence of the Na/K Pump R.F. Rakowski1 , D.C. Gadsby2 , P. De Weer3 1, Philadelphia, PA 19104, USA Received: 2 August 1996/Revised: 13 September 1996 Introduction Whether Na/K pump & Rakowski, 1988). While it follows from first principles that the rate of net forward Na/K pumping must

  8. Coupled Dual Interleaved Flyback Converter for High Input Voltage Application

    E-Print Network [OSTI]

    Lehman, Brad

    proposed integrated boost converters [7] that are beginning to see applications in automotive power buck-boost (Flyback) power converter [9,10] that utilizes one magnetic core to integrate two FlybackCoupled Dual Interleaved Flyback Converter for High Input Voltage Application Ting Qian, Brad

  9. Energy Optimization of Subthreshold-Voltage Sensor Network Processors

    E-Print Network [OSTI]

    Dutta, Prabal

    network processor results. This design, accompanied by bulk-silicon solar cells for energy scavenging, hasEnergy Optimization of Subthreshold-Voltage Sensor Network Processors Leyla Nazhandali, Bo ZhaiV and be- low) lends itself well to the performance and energy demands of sensor network processors

  10. Load Balancing in Wireless Sensor Networks using Kirchhoff's Voltage Law

    E-Print Network [OSTI]

    Toumpis, Stavros

    Load Balancing in Wireless Sensor Networks using Kirchhoff's Voltage Law Stavros Toumpis Electrical balancing in wireless networks with a single class of traffic, focusing our attention on an important example, i.e., Wireless Sensor Networks. The analysis is based on the Wireless Minimum Cost Problem

  11. Enhanced Archaerhodopsin Fluorescent Protein Voltage Yiyang Gong1,2*

    E-Print Network [OSTI]

    Ferrari, Silvia

    Enhanced Archaerhodopsin Fluorescent Protein Voltage Indicators Yiyang Gong1,2* , Jin Zhong Li1 by nearly three-fold in comparison to Arch-D95N. Citation: Gong Y, Li JZ, Schnitzer MJ (2013) Enhanced; Published June 19, 2013 Copyright: © 2013 Gong et al. This is an open-access article distributed under

  12. Energy Efficiency in Low Voltage Hall Thrusters Jerry L. Ross

    E-Print Network [OSTI]

    King, Lyon B.

    Energy Efficiency in Low Voltage Hall Thrusters Jerry L. Ross Lyon B. King Energy efficiency/s of xenon. Acceleration and current efficiencies were compared to thrust efficiency over a range of magnet coil current values of 0 A - 2.5 A. Acceleration efficiencies were obtained with a 4-grid Retarding

  13. Standby Voltage Scaling for Reduced Power B. Calhoun, A. Chandrakasan

    E-Print Network [OSTI]

    Calhoun, Benton H.

    Engineering Massachusetts Institute of Technology, Cambridge, MA Abstract Lowering VDD during standby mode leakage, gate leakage, GIDL, and forward biased diode leak- age[2]. At the 0.13 m technology node to pinch in the rail voltages during standby[5]. The quantity and sizes of the devices used in the diode

  14. Optical Spectra of the High Voltage Erosive Water Discharge

    E-Print Network [OSTI]

    Pirozerski, A L

    2008-01-01

    In the present paper kinetics of emission spectra of the high voltage erosive water discharge at near ultraviolet and visible spectral ranges has been investigated. Obtained results show a similarity of physical properties of this discharge (and of corresponding plasmoids) to that of some other types of erosional discharges which also result in the formation of dust-gas fireballs.

  15. Ultra-compact Marx-type high-voltage generator

    DOE Patents [OSTI]

    Goerz, David A. (Brentwood, CA); Wilson, Michael J. (Modesto, CA)

    2000-01-01

    An ultra-compact Marx-type high-voltage generator includes individual high-performance components that are closely coupled and integrated into an extremely compact assembly. In one embodiment, a repetitively-switched, ultra-compact Marx generator includes low-profile, annular-shaped, high-voltage, ceramic capacitors with contoured edges and coplanar extended electrodes used for primary energy storage; low-profile, low-inductance, high-voltage, pressurized gas switches with compact gas envelopes suitably designed to be integrated with the annular capacitors; feed-forward, high-voltage, ceramic capacitors attached across successive switch-capacitor-switch stages to couple the necessary energy forward to sufficiently overvoltage the spark gap of the next in-line switch; optimally shaped electrodes and insulator surfaces to reduce electric field stresses in the weakest regions where dissimilar materials meet, and to spread the fields more evenly throughout the dielectric materials, allowing them to operate closer to their intrinsic breakdown levels; and uses manufacturing and assembly methods to integrate the capacitors and switches into stages that can be arranged into a low-profile Marx generator.

  16. Power Grid Voltage Integrity Verification Department of ECE

    E-Print Network [OSTI]

    Najm, Farid N.

    Power Grid Voltage Integrity Verification Maha Nizam Department of ECE University of Toronto devgan@magma-da.com ABSTRACT Full-chip verification requires one to check if the power grid is safe, i of the circuit attached to the grid, thereby precluding early verification of the grid. We propose a power grid

  17. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  18. Security and Privacy in the Networked World

    E-Print Network [OSTI]

    Sandhu, Ravi

    -World Impact! Perennial State of Cyber Security Micro-security Macro-security #12; What is the value of being Cyber Security Conundrum #12;Cyber security as reconciliation of tradeoffs Finding Goldilocks Holistic1 Security and Privacy in the Networked World Prof. Ravi Sandhu Executive Director and Endowed

  19. The unreasonable ineffectiveness of security engineering

    E-Print Network [OSTI]

    Pavlovic, Dusko

    of security does not apply only to software, as we also speak of bank security, national security, secureThe unreasonable ineffectiveness of security engineering: An overview Dusko Pavlovic Kestrel" [32]. After several decades of security research, we are tempted to ask the opposite question: Are we

  20. IY5512: Part 2 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    ; ­ introduction to security evaluation criteria. Information Security Group Agenda · Design principles · DesignIY5512: Part 2 1 Information Security Group IY5512 Computer Security Part 2: Design & evaluation · This part of the course covers: ­ fundamental security design principles; ­ a security design methodology

  1. Real time automated inspection

    DOE Patents [OSTI]

    Fant, K.M.; Fundakowski, R.A.; Levitt, T.S.; Overland, J.E.; Suresh, B.R.; Ulrich, F.W.

    1985-05-21

    A method and apparatus are described relating to the real time automatic detection and classification of characteristic type surface imperfections occurring on the surfaces of material of interest such as moving hot metal slabs produced by a continuous steel caster. A data camera transversely scans continuous lines of such a surface to sense light intensities of scanned pixels and generates corresponding voltage values. The voltage values are converted to corresponding digital values to form a digital image of the surface which is subsequently processed to form an edge-enhanced image having scan lines characterized by intervals corresponding to the edges of the image. The edge-enhanced image is thresholded to segment out the edges and objects formed by the edges by interval matching and bin tracking. Features of the objects are derived and such features are utilized to classify the objects into characteristic type surface imperfections. 43 figs.

  2. Securing Single Points of Compromise (SPoC)

    SciTech Connect (OSTI)

    Belangia, David Warren

    2015-06-25

    Securing the Single Points of Compromise that provide central services to the institution’s environment is paramount to success when trying to protect the business. (Fisk, 2014) Time Based Security mandates protection (erecting and ensuring effective controls) that last longer than the time to detect and react to a compromise. When enterprise protections fail, providing additional layered controls for these central services provides more time to detect and react. While guidance is readily available for securing the individual critical asset, protecting these assets as a group is not often discussed. Using best business practices to protect these resources as individual assets while leveraging holistic defenses for the group increases the opportunity to maximize protection time, allowing detection and reaction time for the SPoCs that is commensurate with the inherent risk of these centralized services.

  3. The Cyber Security Crisis

    ScienceCinema (OSTI)

    Spafford, Eugene [Purdue University, West Lafayette, Indiana, United States

    2009-09-01

    Despite considerable activity and attention, the overall state of information security continues to get worse. Attacks are increasing, fraud and theft are rising, and losses may exceed $100 billion per year worldwide. Many factors contribute to this, including misplaced incentives for industry, a lack of attention by government, ineffective law enforcement, and an uninformed image of who the perpetrators really are. As a result, many of the intended attempts at solutions are of limited (if any) overall effectiveness. This presentation will illustrate some key aspects of the cyber security problem and its magnitude, as well as provide some insight into causes and enabling factors. The talk will conclude with some observations on how the computing community can help improve the situation, as well as some suggestions for 'cyber self-defense.'

  4. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  5. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power AdministrationRobust, High-ThroughputUpcomingmagnetoresistanceand Governmentm D m r345Secure

  6. Research progress in dynamic security assessment

    SciTech Connect (OSTI)

    Not Available

    1982-12-01

    Areas discussed are power system modeling, state estimation, structure decomposition, state forecasting, clustering and security measure development. A detailed dynamic model of a multi-machine power system has been developed. A process state estimator was developed to estimate the long-term dynamic behavior of the power system. The algorithm is identical to the extended Kalman filter but has a modified process noise driving term. A two-stage structure estimation technique was proposed for identifying the power system network configuration. Two approaches to structure decomposition were investigated. A time-scale decomposition of the system equations, based on a singular perturbation approach, was evaluated using a detailed model of a generating system. Spatial decomposition was examined by applying an optimal network decomposition technique to a 39-bus test system. Stochastic approximation based approaches to estimator simplification were examined. Explicit expressions were obtained for the evolution of the first and second moments of the system state. Research into security measures proceeded in three directions. The first area involves viewing the security assessment problem as a hyperplane crossing problem for a stochastic process. The second approach examined the stability of an unforced linear system where the system coefficients are subject to future jumps. The third area of research has led to the formulation of a security measure suitable for on-line assessment of transient stability.

  7. Department of Energy award DE-SC0004164 Climate and National Security: Securing Better Forecasts

    SciTech Connect (OSTI)

    Reno Harnish

    2011-08-16

    The Climate and National Security: Securing Better Forecasts symposium was attended by senior policy makers and distinguished scientists. The juxtaposition of these communities was creative and fruitful. They acknowledged they were speaking past each other. Scientists were urged to tell policy makers about even improbable outcomes while articulating clearly the uncertainties around the outcomes. As one policy maker put it, we are accustomed to making these types of decisions. These points were captured clearly in an article that appeared on the New York Times website and can be found with other conference materials most easily on our website, www.scripps.ucsd.edu/cens/. The symposium, generously supported by the NOAA/JIMO, benefitted the public by promoting scientifically informed decision making and by the transmission of objective information regarding climate change and national security.

  8. 2014 Headquarters Facilities Master Security Plan- Chapter 11, Incidents of Security Concern

    Broader source: Energy.gov [DOE]

    2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern Describes DOE Headquarters procedures for reporting, investigating, and correcting Incidents of Security Concern.

  9. NNSA Co-Hosts Nuclear Security Summit Workshop on Maritime Security...

    National Nuclear Security Administration (NNSA)

    Co-Hosts Nuclear Security Summit Workshop on Maritime Security with UK | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  10. TED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY

    E-Print Network [OSTI]

    Ha, Dong S.

    Networks, Crypto, Formal Methods, Cloud, IPv6, Hardware Security, Visualization, Policy/Law Applications Security IPv6 Security Cloud Security and Privacy Secure Virtualization Anonymous Computation VisualizationTED AND KARYN HUME CENTER FOR NATIONAL SECURITY AND TECHNOLOGY Cybersecurity: Observations

  11. Novel techniques for fault location, voltage profile calculation and visualization of transients 

    E-Print Network [OSTI]

    Evrenosoglu, Cansin Yaman

    2009-05-15

    techniques of voltage profiles along transmission lines. A simple yet effective approach to accurately and rapidly obtain the voltage profile along a transmission line during fault transients is presented. The objective of the presented method is to eliminate...

  12. Switched-capacitor step-down rectifier for low-voltage power conversion

    E-Print Network [OSTI]

    Li, Wei

    This paper presents a switched-capacitor rectifier that provides step down voltage conversion from an ac input voltage to a dc output. Coupled with current-drive source, low-loss and high step-down rectification is realized. ...

  13. Improve Motor Operation at Off-Design Voltages - Motor Tip Sheet #9

    SciTech Connect (OSTI)

    2008-07-01

    Motors are designed to operate within +/- 10% of their nameplate rated voltages. When motors operate at conditions of over- or under-voltage, motor efficiency and other performance parameters are degraded.

  14. Voltage Control of Distribution Networks with Distributed Generation using Reactive Power

    E-Print Network [OSTI]

    Pota, Himanshu Roy

    , photovoltaics, and synchronous generators. I. INTRODUCTION Penetration of DG into distribution network in terms of voltage profile improvement, line-loss reduction, and environmental impact reductionVoltage Control of Distribution Networks with Distributed Generation using Reactive Power

  15. Interline photovoltaic (I-PV) power plants for voltage unbalance compensation

    E-Print Network [OSTI]

    Moawwad, Ahmed

    This paper proposes a stationary-frame control method for voltage unbalance compensation using Interline Photovoltaic (I-PV) power system. I-PV power systems are controlled to compensate voltage unbalance autonomously. The ...

  16. Importance of the Equlibrium Node in Preventing the Voltage Collapse Occurs in the Wind Power System

    E-Print Network [OSTI]

    Lavaei, Javad

    or insufficient reactive power supplies may also contribute to voltage collapse and blackouts. In recent years, the voltage collapse or blackouts have occurred worldwide, such as the blackout in France at 1978 and blackout

  17. Optimal Distributed Voltage Regulation in Power Distribution Networks

    E-Print Network [OSTI]

    Lam, Albert Y S; Dominguez-Garcia, Alejandro; Tse, David

    2012-01-01

    In this paper, we address the problem of voltage regulation in power distribution networks with deep-penetration of distributed energy resources (DERs), e.g., renewable-based generation, and storage-capable loads such as plug-in hybrid electric vehicles. We cast the problem as an optimization program, where the objective is to minimize the losses in the network subject to constraints on bus voltage magnitudes, limits on active and reactive power injections, transmission line thermal limits and losses. We provide sufficient conditions under which the optimization problem can be solved via its convex relaxation. Using data from existing networks, we show that the conditions are expected to be satisfied by most networks. We also provide an efficient distributed algorithm to solve the problem. The algorithm is asynchronous, with a communication topology that is the same as the electrical network topology. We illustrate the algorithm's performance in the IEEE 34-bus and the 123-bus feeder test systems.

  18. Intermodulation electrostatic force microscopy for imaging surface photo-voltage

    SciTech Connect (OSTI)

    Borgani, Riccardo Forchheimer, Daniel; Thorén, Per-Anders; Haviland, David B.; Bergqvist, Jonas; Inganäs, Olle

    2014-10-06

    We demonstrate an alternative to Kelvin Probe Force Microscopy for imaging surface potential. The open-loop, single-pass technique applies a low-frequency AC voltage to the atomic force microscopy tip while driving the cantilever near its resonance frequency. Frequency mixing due to the nonlinear capacitance gives intermodulation products of the two drive frequencies near the cantilever resonance, where they are measured with high signal to noise ratio. Analysis of this intermodulation response allows for quantitative reconstruction of the contact potential difference. We derive the theory of the method, validate it with numerical simulation and a control experiment, and we demonstrate its utility for fast imaging of the surface photo-voltage on an organic photo-voltaic material.

  19. Analysis of Solar Cell Quality Using Voltage Metrics: Preprint

    SciTech Connect (OSTI)

    Toberer, E. S.; Tamboli, A. C.; Steiner, M.; Kurtz, S.

    2012-06-01

    The highest efficiency solar cells provide both excellent voltage and current. Of these, the open-circuit voltage (Voc) is more frequently viewed as an indicator of the material quality. However, since the Voc also depends on the band gap of the material, the difference between the band gap and the Voc is a better metric for comparing material quality of unlike materials. To take this one step further, since Voc also depends on the shape of the absorption edge, we propose to use the ultimate metric: the difference between the measured Voc and the Voc calculated from the external quantum efficiency using a detailed balance approach. This metric is less sensitive to changes in cell design and definition of band gap. The paper defines how to implement this metric and demonstrates how it can be useful in tracking improvements in Voc, especially as Voc approaches its theoretical maximum.

  20. Magnetic shielding of Hall thrusters at high discharge voltages

    SciTech Connect (OSTI)

    Mikellides, Ioannis G., E-mail: Ioannis.G.Mikellides@jpl.nasa.gov; Hofer, Richard R.; Katz, Ira; Goebel, Dan M. [Jet Propulsion Laboratory, California Institute of Technology, Pasadena, California 91109 (United States)

    2014-08-07

    A series of numerical simulations and experiments have been performed to assess the effectiveness of magnetic shielding in a Hall thruster operating in the discharge voltage range of 300–700?V (I{sub sp}???2000–2700?s) at 6?kW, and 800?V (I{sub sp} ? 3000) at 9?kW. At 6?kW, the magnetic field topology with which highly effective magnetic shielding was previously demonstrated at 300?V has been retained for all other discharge voltages; only the magnitude of the field has been changed to achieve optimum thruster performance. It is found that magnetic shielding remains highly effective for all discharge voltages studied. This is because the channel is long enough to allow hot electrons near the channel exit to cool significantly upon reaching the anode. Thus, despite the rise of the maximum electron temperature in the channel with discharge voltage, the electrons along the grazing lines of force remain cold enough to eliminate or reduce significantly parallel gradients of the plasma potential near the walls. Computed maximum erosion rates in the range of 300–700?V are found not to exceed 10{sup ?2}?mm/kh. Such rates are ?3 orders of magnitude less than those observed in the unshielded version of the same thruster at 300?V. At 9?kW and 800?V, saturation of the magnetic circuit did not allow for precisely the same magnetic shielding topology as that employed during the 6-kW operation since this thruster was not designed to operate at this condition. Consequently, the maximum erosion rate at the inner wall is found to be ?1 order of magnitude higher (?10{sup ?1}?mm/kh) than that at 6?kW. At the outer wall, the ion energy is found to be below the sputtering yield threshold so no measurable erosion is expected.