National Library of Energy BETA

Sample records for unauthenticated remote attacker

  1. T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code

    Broader source: Energy.gov [DOE]

    Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers.

  2. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  3. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access

    Broader source: Energy.gov [DOE]

    Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition. Additionally, Cisco TelePresence TC Software contain an adjacent root access vulnerability that could allow an attacker on the same physical or logical Layer-2 network as the affected system to gain an unauthenticated root shell.

  4. U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks.

  5. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  6. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  7. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  8. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  9. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  10. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  11. T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise.

  12. U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.

  13. T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    IBM and Oracle Java products contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.

  14. V-209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system.

  15. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  16. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  17. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks...

  18. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information.

  19. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  20. T-546: Microsoft MHTML Input Validation Hole May Permit Cross-Site Scripting Attacks Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Microsoft MHTML. A remote user can conduct cross-site scripting attacks.

  1. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  2. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The Cisco Content Services Gateway: Second Generation provides intelligent network capabilities such as flexible policy management and billing based on deep-packet inspection, as well as subscriber and application awareness capabilities that enable mobile operators to quickly and easily offer value-added, differentiated services over their mobile data networks. A DoS vulnerability exists in the Cisco Content Services Gateway: Second Generation could allow an unauthenticated attacker to cause a device reload by sending crafted ICMP messages to the affected device. Note: The Cisco Gateway GPRS Support Node (GGSN), the Cisco Mobile Wireless Home Agent (HA), the Cisco Wireless Security Gateway (WSG), the Cisco Broadband Wireless Gateway and Cisco IP Transfer Point (ITP), and the Cisco Long Term Evolution (LTE) Gateway are not affected. This vulnerability is documented in Cisco bug ID CSCtl79577 ( registered customers only) and has been assigned CVE ID CVE-2011-2064.

  3. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain...

  4. V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks June 24, 2013 -...

  5. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Remote Users Conduct Cross-Site Scripting Attacks | Department of Energy 51: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks May 8, 2013 - 12:06am Addthis PROBLEM: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks

  6. U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

  7. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system.

  8. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect (OSTI)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  9. T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

  10. V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote...

  11. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code...

  12. WILD PIG ATTACKS ON HUMANS

    SciTech Connect (OSTI)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  13. U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands

    Broader source: Energy.gov [DOE]

    Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator.

  14. Research deciphers HIV attack plan

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Research deciphers HIV attack plan Research deciphers HIV attack plan These findings will help inform vaccine design and interpretation of vaccine trials, and provide new insights into the basic biology of viral/host dynamics of infection. March 29, 2013 Bette Korber Bette Korber Contact Nancy Ambrosiano Communications Office (505) 667-0471 Email The viruses that make it through transmission barriers to infect a new person are particularly infectious and resilient," said Los Alamos National

  15. Remote Connections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Remote Alaskan Communities Energy Efficiency Competition Remote Alaskan Communities Energy Efficiency Competition Remote Alaskan Communities Energy Efficiency Competition FAIRBANKS, AK: At the Rural Energy Conference in Fairbanks, AK, April 26, the U.S. Department of Energy (DOE) announced 13 recipients of Remote Alaska Communities Energy Efficiency (RACEE) technical assistance. The RACEE Competition is a $4 million joint effort between DOE's offices of Indian Energy (IE) and Energy

  16. Remote Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Access Remote Access Laboratory employees can access Research Library databases and products from offsite using our EZproxy service. This service is limited to LANL employees with active Z numbers and cryptocards. Access Electronic Collections with EZproxy Remote Access Journals - Books - Standards - Databases (WOK, etc) How to use EZproxy: From this page: Click on the icon above. From external site: Select "OFFSITE LANL Employee". Enter your Z number and Cryptocard passcode.

  17. U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  18. Science On Tap - Attack of the Drones

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science On Tap - Attack of the Drones Science On Tap - Attack of the Drones WHEN: May 21, 2015 5:30 PM - 7:00 PM WHERE: UnQuarked Wine Room 145 Central Park Square, Los Alamos, New...

  19. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  20. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  1. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  2. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect (OSTI)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  3. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  4. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect (OSTI)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  5. Signs of a Heart Attack - HPMC Occupational Health Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    attack. Heart Image Related Links: Presentation (pdf) Heart Attack Warning Signs Handout (pdf) "Cough CPR:" Urban Myth Heart Health Interactive Quizzes Last Updated 10202014 9:22...

  6. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system ...

  7. Multiple node remote messaging

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Ohmacht, Martin; Salapura, Valentina; Steinmacher-Burow, Burkhard; Vranas, Pavlos

    2010-08-31

    A method for passing remote messages in a parallel computer system formed as a network of interconnected compute nodes includes that a first compute node (A) sends a single remote message to a remote second compute node (B) in order to control the remote second compute node (B) to send at least one remote message. The method includes various steps including controlling a DMA engine at first compute node (A) to prepare the single remote message to include a first message descriptor and at least one remote message descriptor for controlling the remote second compute node (B) to send at least one remote message, including putting the first message descriptor into an injection FIFO at the first compute node (A) and sending the single remote message and the at least one remote message descriptor to the second compute node (B).

  8. Remotely Monitored Sealing Array Software

    Energy Science and Technology Software Center (OSTI)

    2012-09-12

    The Remotely Monitored Sealing Array (RMSA) utilizes the Secure Sensor Platform (SSP) framework to establish the fundamental operating capabilities for communication, security, power management, and cryptography. In addition to the SSP framework the RMSA software has unique capabilities to support monitoring a fiber optic seal. Fiber monitoring includes open and closed as well as parametric monitoring to detect tampering attacks. The fiber monitoring techniques, using the SSP power management processes, allow the seals to lastmore » for years while maintaining the security requirements of the monitoring application. The seal is enclosed in a tamper resistant housing with software to support active tamper monitoring. New features include LED notification of fiber closure, the ability to retrieve the entire fiber optic history via translator command, separate memory storage for fiber optic events, and a more robust method for tracking and resending failed messages.« less

  9. Remotely Monitored Sealing Array Software

    SciTech Connect (OSTI)

    2012-09-12

    The Remotely Monitored Sealing Array (RMSA) utilizes the Secure Sensor Platform (SSP) framework to establish the fundamental operating capabilities for communication, security, power management, and cryptography. In addition to the SSP framework the RMSA software has unique capabilities to support monitoring a fiber optic seal. Fiber monitoring includes open and closed as well as parametric monitoring to detect tampering attacks. The fiber monitoring techniques, using the SSP power management processes, allow the seals to last for years while maintaining the security requirements of the monitoring application. The seal is enclosed in a tamper resistant housing with software to support active tamper monitoring. New features include LED notification of fiber closure, the ability to retrieve the entire fiber optic history via translator command, separate memory storage for fiber optic events, and a more robust method for tracking and resending failed messages.

  10. Science On Tap - Attack of the Drones

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science On Tap - Attack of the Drones Science On Tap - Attack of the Drones WHEN: May 21, 2015 5:30 PM - 7:00 PM WHERE: UnQuarked Wine Room 145 Central Park Square, Los Alamos, New Mexico 87544, USA SPEAKER: James Privette, Unmanned Aerial Vehicles (UAV) Program Operations Lead CONTACT: Jessica Privette 505 667-0375 CATEGORY: Bradbury INTERNAL: Calendar Login Science on Tap series Event Description Science On Tap happens every third Thursday of the month, featuring a new topic each week. It

  11. When Utility Bills Attack! | Department of Energy

    Energy Savers [EERE]

    When Utility Bills Attack! When Utility Bills Attack! March 1, 2010 - 11:05am Addthis Amy Foster Parish It may come as a shock to my college math professor, but where my family's finances are concerned, I'm a budgeter. Just before a new month begins, I take some time to plan for the month's regular bills as well as any special events or holidays that might require setting some extra money aside. I even have a special notebook to track all this financial data (and shopping for a new notebook

  12. Method for detecting sophisticated cyber attacks

    SciTech Connect (OSTI)

    Potok, Thomas E. (Oak Ridge, TN)

    2008-11-18

    A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

  13. T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution

    Broader source: Energy.gov [DOE]

    Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement

  14. Remote reset circuit

    DOE Patents [OSTI]

    Gritzo, Russell E.

    1987-01-01

    A remote reset circuit acts as a stand-alone monitor and controller by clocking in each character sent by a terminal to a computer and comparing it to a given reference character. When a match occurs, the remote reset circuit activates the system's hardware reset line. The remote reset circuit is hardware based centered around monostable multivibrators and is unaffected by system crashes, partial serial transmissions, or power supply transients.

  15. Remote reset circuit

    DOE Patents [OSTI]

    Gritzo, R.E.

    1985-09-12

    A remote reset circuit acts as a stand-along monitor and controller by clocking in each character sent by a terminal to a computer and comparing it to a given reference character. When a match occurs, the remote reset circuit activates the system's hardware reset line. The remote reset circuit is hardware based centered around monostable multivibrators and is unaffected by system crashes, partial serial transmissions, or power supply transients. 4 figs.

  16. Remote Monitoring Transparency Program

    SciTech Connect (OSTI)

    Sukhoruchkin, V.K.; Shmelev, V.M.; Roumiantsev, A.N.; Croessmann, C.D.; Horton, R.D.; Matter, J.C.; Czajkowski, A.F.; Sheely, K.B.; Bieniawski, A.J.

    1996-12-31

    The objective of the Remote Monitoring Transparency Program is to evaluate and demonstrate the use of remote monitoring technologies to advance nonproliferation and transparency efforts that are currently being developed by Russia and the US without compromising the national security of the participating parties. Under a lab-to-lab transparency contract between Sandia National Laboratories (SNL) and the Kurchatov Institute (KI RRC), the Kurchatov Institute will analyze technical and procedural aspects of the application of remote monitoring as a transparency measure to monitor inventories of direct-use HEU and plutonium (e.g., material recovered from dismantled nuclear weapons). A goal of this program is to assist a broad range of political and technical experts in learning more about remote monitoring technologies that could be used to implement nonproliferation, arms control, and other security and confidence building measures. Specifically, this program will: (1) begin integrating Russian technologies into remote monitoring systems; (2) develop remote monitoring procedures that will assist in the application of remote monitoring techniques to monitor inventories of HEU and Pu from dismantled nuclear weapons; and (3) conduct a workshop to review remote monitoring fundamentals, demonstrate an integrated US/Russian remote monitoring will have on the national security of participating countries.

  17. Remote Systems Design & Deployment

    SciTech Connect (OSTI)

    Bailey, Sharon A.; Baker, Carl P.; Valdez, Patrick LJ

    2009-08-28

    The Pacific Northwest National Laboratory (PNNL) was tasked by Washington River Protection Solutions, LLC (WRPS) to provide information and lessons learned relating to the design, development and deployment of remote systems, particularly remote arm/manipulator systems. This report reflects PNNLs experience with remote systems and lays out the most important activities that need to be completed to successfully design, build, deploy and operate remote systems in radioactive and chemically contaminated environments. It also contains lessons learned from PNNLs work experiences, and the work of others in the national laboratory complex.

  18. T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured within named.conf or by disabling any features at compile-time or run-time. A remote attacker would need to be able to send a specially crafted packet directly to a server running a vulnerable version of BIND. There is also the potential for an indirect attack via malware that is inadvertently installed and run, where infected machines have direct access to an organization's nameservers.

  19. Remote actuated valve implant

    SciTech Connect (OSTI)

    McKnight, Timothy E; Johnson, Anthony; Moise, Jr., Kenneth J; Ericson, Milton Nance; Baba, Justin S; Wilgen, John B; Evans, III, Boyd McCutchen

    2014-02-25

    Valve implant systems positionable within a flow passage, the systems having an inlet, an outlet, and a remotely activatable valve between the inlet and outlet, with the valves being operable to provide intermittent occlusion of the flow path. A remote field is applied to provide thermal or magnetic activation of the valves.

  20. Capturing the uncertainty in adversary attack simulations.

    SciTech Connect (OSTI)

    Darby, John L.; Brooks, Traci N.; Berry, Robert Bruce

    2008-09-01

    This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a more realistic evaluation of PI, thereby requiring fewer resources to address scenarios and allowing resources to be used across more scenarios. For a given set of dversary resources, two types of uncertainty are associated with PI for a scenario: (1) aleatory (random) uncertainty for detection probabilities and time delays and (2) epistemic (state of knowledge) uncertainty for the adversary resources applied during an attack. Adversary esources consist of attributes (such as equipment and training) and knowledge about the security system; to date, most evaluations have assumed an adversary with very high resources, adding to the conservatism in the evaluation of PI. The aleatory uncertainty in PI is ddressed by assigning probability distributions to detection probabilities and time delays. A numerical sampling technique is used to evaluate PI, addressing the repeated variable dependence in the equation for PI.

  1. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  2. Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2008 | Department of Energy Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and

  3. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Steeves, Arthur F.; Buono, Donald P.

    1983-01-01

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  4. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  5. Trust Anchor Lifecycle Attack Protection | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cryptographically secure software providing independent testing, monitoring, and control of energy control system component operation PDF icon Trust Anchor Lifecycle Attack ...

  6. Remote Access | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ames Laboratory Information Systems supports VPN for remotely accessing internal computers and network services. These are: Once connected remotely to Ames Laboratory,...

  7. Remote Alaskan Communities Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Alaskan Communities Energy Efficiency Competition (RACEE) Technical Assistance Guide March 2016 2 Technical Assistance Table of Contents How to Use this Guide ......................................................... Page 2 Technical Assistance Provider Network ..........................................................Page 2 * Regional Liaisons ..........................................................Page 4 * Regional Liaison Contact List

  8. Remote Access Options

    Energy Savers [EERE]

    Remote Access Options November 2013 Remote Access Options for EITS Customers If access is required to DOE Headquarters internal network resources, such as messaging, productivity tools or network-stored files and folders while away from the DOE building, you can access them through a Virtual Private Network. Follow the instructions below. (Note: You must have access to the Internet to use these services) Virtual Private Network A Virtual Private Network (VPN) is a private connection between two

  9. Remote Sensor Placement

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Research Projects Remote Sensor Placement Collaboration between Los Alamos National Laboratory and the University of California at San Diego (UCSD) Jacobs School of Engineering Contact Institute Director Charles Farrar (505) 663-5330 Email UCSD EI Director Michael Todd (858) 534-5951 Professional Staff Assistant Ellie Vigil (505) 667-2818 Email Administrative Assistant Rebecca Duran (505) 665-8899 Email The goal of this work is to develop a new autonomous capability for remotely deploying

  10. Remote electrochemical sensor

    DOE Patents [OSTI]

    Wang, Joseph; Olsen, Khris; Larson, David

    1997-01-01

    An electrochemical sensor for remote detection, particularly useful for metal contaminants and organic or other compounds. The sensor circumvents technical difficulties that previously prevented in-situ remote operations. The microelectrode, connected to a long communications cable, allows convenient measurements of the element or compound at timed and frequent intervals and instrument/sample distances of ten feet to more than 100 feet. The sensor is useful for both downhole groundwater monitoring and in-situ water (e.g., shipboard seawater) analysis.

  11. Optimal response to attacks on the open science grids.

    SciTech Connect (OSTI)

    Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z.

    2011-01-01

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

  12. Remote radiation dosimetry

    DOE Patents [OSTI]

    Braunlich, P.F.; Tetzlaff, W.; Hegland, J.E.; Jones, S.C.

    1991-03-12

    Disclosed are methods and apparatus for remotely measuring radiation levels. Such are particularly useful for measuring relatively high levels or dosages of radiation being administered in radiation therapy. They are also useful for more general radiation level measurements where remote sensing from the remaining portions of the apparatus is desirable. The apparatus uses a beam generator, such as a laser beam, to provide a stimulating beam. The stimulating beam is preferably of wavelengths shorter than 6 microns, or more advantageously less than 2 microns. The stimulating beam is used to stimulate a remote luminescent sensor mounted in a probe which emits stored luminescent energy resulting from exposure of the sensor to ionizing radiation. The stimulating beam is communicated to the remote luminescent sensor via a transmissive fiber which also preferably serves to return the emission from the luminescent sensor. The stimulating beam is advantageously split by a beam splitter to create a detector beam which is measured for power during a reading period during which the luminescent phosphor is read. The detected power is preferably used to control the beam generator to thus produce desired beam power during the reading period. The luminescent emission from the remote sensor is communicated to a suitable emission detector, preferably after filtering or other selective treatment to better isolate the luminescent emission. 8 figures.

  13. Remote radiation dosimetry

    DOE Patents [OSTI]

    Braunlich, Peter F.; Tetzlaff, Wolfgang; Hegland, Joel E.; Jones, Scott C.

    1991-01-01

    Disclosed are methods and apparatus for remotely measuring radiation levels. Such are particularly useful for measuring relatively high levels or dosages of radiation being administered in radiation therapy. They are also useful for more general radiation level measurements where remote sensing from the remaining portions of the apparatus is desirable. The apparatus uses a beam generator, such as a laser beam, to provide a stimulating beam. The stimulating beam is preferably of wavelengths shorter than 6 microns, or more advantageously less than 2 microns. The stimulating beam is used to stimulate a remote luminescent sensor mounted in a probe which emits stored luminescent energy resulting from exposure of the sensor to ionizing radiation. The stimulating beam is communicated to the remote luminescent sensor via transmissive fiber which also preferably serves to return the emission from the luminescent sensor. The stimulating beam is advantageously split by a beam splitter to create a detector beam which is measured for power during a reading period during which the luminescent phosphor is read. The detected power is preferably used to control the beam generator to thus produce desired beam power during the reading period. The luminescent emission from the remote sensor is communicated to a suitable emission detector, preferably after filtering or other selective treatment to better isolate the luminescent emission.

  14. Remote electrochemical sensor

    DOE Patents [OSTI]

    Wang, J.; Olsen, K.; Larson, D.

    1997-10-14

    An electrochemical sensor is described for remote detection, particularly useful for metal contaminants and organic or other compounds. The sensor circumvents technical difficulties that previously prevented in-situ remote operations. The microelectrode, connected to a long communications cable, allows convenient measurements of the element or compound at timed and frequent intervals and instrument/sample distances of ten feet to more than 100 feet. The sensor is useful for both downhole groundwater monitoring and in-situ water (e.g., shipboard seawater) analysis. 21 figs.

  15. Modeling attacker-defender interactions in information networks.

    SciTech Connect (OSTI)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  16. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    SciTech Connect (OSTI)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-08-07

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  17. Remote Sensing Laboratory - RSL

    ScienceCinema (OSTI)

    None

    2015-01-09

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

  18. Remote Sensing Laboratory - RSL

    SciTech Connect (OSTI)

    2014-11-06

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

  19. Remote switch actuator

    DOE Patents [OSTI]

    Haas, Edwin Gerard; Beauman, Ronald; Palo, Jr., Stefan

    2013-01-29

    The invention provides a device and method for actuating electrical switches remotely. The device is removably attached to the switch and is actuated through the transfer of a user's force. The user is able to remain physically removed from the switch site obviating need for protective equipment. The device and method allow rapid, safe actuation of high-voltage or high-current carrying electrical switches or circuit breakers.

  20. Remote repair appliance

    DOE Patents [OSTI]

    Heumann, Frederick K.; Wilkinson, Jay C.; Wooding, David R.

    1997-01-01

    A remote appliance for supporting a tool for performing work at a worksite on a substantially circular bore of a workpiece and for providing video signals of the worksite to a remote monitor comprising: a baseplate having an inner face and an outer face; a plurality of rollers, wherein each roller is rotatably and adjustably attached to the inner face of the baseplate and positioned to roll against the bore of the workpiece when the baseplate is positioned against the mouth of the bore such that the appliance may be rotated about the bore in a plane substantially parallel to the baseplate; a tool holding means for supporting the tool, the tool holding means being adjustably attached to the outer face of the baseplate such that the working end of the tool is positioned on the inner face side of the baseplate; a camera for providing video signals of the worksite to the remote monitor; and a camera holding means for supporting the camera on the inner face side of the baseplate, the camera holding means being adjustably attached to the outer face of the baseplate. In a preferred embodiment, roller guards are provided to protect the rollers from debris and a bore guard is provided to protect the bore from wear by the rollers and damage from debris.

  1. Remote repair appliance

    DOE Patents [OSTI]

    Heumann, F.K.; Wilkinson, J.C.; Wooding, D.R.

    1997-12-16

    A remote appliance for supporting a tool for performing work at a work site on a substantially circular bore of a work piece and for providing video signals of the work site to a remote monitor comprises: a base plate having an inner face and an outer face; a plurality of rollers, wherein each roller is rotatably and adjustably attached to the inner face of the base plate and positioned to roll against the bore of the work piece when the base plate is positioned against the mouth of the bore such that the appliance may be rotated about the bore in a plane substantially parallel to the base plate; a tool holding means for supporting the tool, the tool holding means being adjustably attached to the outer face of the base plate such that the working end of the tool is positioned on the inner face side of the base plate; a camera for providing video signals of the work site to the remote monitor; and a camera holding means for supporting the camera on the inner face side of the base plate, the camera holding means being adjustably attached to the outer face of the base plate. In a preferred embodiment, roller guards are provided to protect the rollers from debris and a bore guard is provided to protect the bore from wear by the rollers and damage from debris. 5 figs.

  2. Advanced laser remote sensing

    SciTech Connect (OSTI)

    Schultz, J.; Czuchlewski, S.; Karl, R.

    1996-11-01

    This is the final report of a three-year, Laboratory-Directed Research and Development (LDRD) project at the Los Alamos National Laboratory. Remote measurement of wind velocities is critical to a wide variety of applications such as environmental studies, weather prediction, aircraft safety, the accuracy of projectiles, bombs, parachute drops, prediction of the dispersal of chemical and biological warfare agents, and the debris from nuclear explosions. Major programs to develop remote sensors for these applications currently exist in the DoD and NASA. At present, however, there are no real-time, three-dimensional wind measurement techniques that are practical for many of these applications and we report on two new promising techniques. The first new technique uses an elastic backscatter lidar to track aerosol patterns in the atmosphere and to calculate three dimensional wind velocities from changes in the positions of the aerosol patterns. This was first done by Professor Ed Eloranta of the University of Wisconsin using post processing techniques and we are adapting Professor Eloranta`s algorithms to a real-time data processor and installing it in an existing elastic backscatter lidar system at Los Alamos (the XM94 helicopter lidar), which has a compatible data processing and control system. The second novel wind sensing technique is based on radio-frequency (RF) modulation and spatial filtering of elastic backscatter lidars. Because of their compactness and reliability, solid state lasers are the lasers of choice for many remote sensing applications, including wind sensing.

  3. REMOTE CONTROLLED SWITCHING DEVICE

    DOE Patents [OSTI]

    Hobbs, J.C.

    1959-02-01

    An electrical switching device which can be remotely controlled and in which one or more switches may be accurately operated at predetermined times or with predetermined intervening time intervals is described. The switching device consists essentially of a deck, a post projecting from the deck at right angles thereto, cam means mounted for rotation around said posts and a switch connected to said deck and actuated by said cam means. Means is provided for rotating the cam means at a constant speed and the switching apparatus is enclosed in a sealed container with external adjusting means and electrical connection elements.

  4. Remote Desktop | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Desktop Use a remote desktop connection to access your work computer from home. Using Remote Desktop to Connect to Your Work Computer With Remote Desktop, you can have access to a computer at the Laboratory through another computer. For example, you can connect to your work computer from home and have access to all of your programs, files, and network resources as though you were sitting at your computer at work. You can leave programs running at work and see your work desktop displayed

  5. Remotely operated pipe connector

    DOE Patents [OSTI]

    Josefiak, Leonard J.; Cramer, Charles E.

    1988-01-01

    An apparatus for remotely assembling and disassembling a Graylock type coctor between a pipe and a closure for the pipe includes a base and a receptacle on the base for the closure. The pipe is moved into position vertically above the closure by a suitable positioning device such that the flange on the pipe is immediately adjacent and concentric with the flange on the closure. A moving device then moves two semicircular collars from a position free of the closure to a position such that the interior cam groove of each collar contacts the two flanges. Finally, a tensioning device automatically allows remote tightening and loosening of a nut and bolt assembly on each side of the collar to cause a seal ring located between the flanges to be compressed and to seal the closure. Release of the pipe and the connector is accomplished in the reverse order. Preferably, the nut and bolt assembly includes an elongate shaft portion on which a removable sleeve is located.

  6. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain...

  7. Measurement of intergranular attack in stainless steel using ultrasonic energy

    DOE Patents [OSTI]

    Mott, Gerry; Attaar, Mustan; Rishel, Rick D.

    1989-08-08

    Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

  8. Remote Alaskan Communities Energy Efficiency Competition Social...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Alaskan Communities Energy Efficiency Competition Social Media Kit Remote Alaskan Communities Energy Efficiency Competition Social Media Kit Alaska Stakeholders-Below you ...

  9. Sandia National Laboratories: Employee & Retiree Resources: Remote...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Announcements & Other Alerts Corporate Forms Technical Library Sandia Anywhere: Remote Access Sandia Anywhere: Remote Access Resources you can access directly with a CryptoCard...

  10. Hyperspectral Remote Sensing Techniques For Locating Geothermal...

    Open Energy Info (EERE)

    Remote Sensing Techniques For Locating Geothermal Resources Jump to: navigation, search OpenEI Reference LibraryAdd to library Poster: Hyperspectral Remote Sensing Techniques For...

  11. Remote direct memory access

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.

    2012-12-11

    Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

  12. REMOTE HANDLING ARRANGEMENTS

    DOE Patents [OSTI]

    Ginns, D.W.

    1958-04-01

    A means for handling remotely a sample pellet to be irradiated in a nuclear reactor is proposed. It is comprised essentially of an inlet tube extending through the outer shield of the reactor and being inclined so that its outer end is at a higher elevation than its inner end, an outlet tube extending through the outer shield being inclined so that its inner end is at a higher elevation than its outer end, the inner ends of these two tubes being interconnected, and a straight tube extending through the outer shield and into the reactor core between the inlet and outlet tubes and passing through the juncture of said inner ends. A rod-like member is rotatably and slidely operated within the central straight tube and has a receptacle on its inner end for receiving a sample pellet from the inlet tube. The rod member is operated to pick up a sample pellet from the inlet tube, carry the sample pellet into the irradiating position within the core, and return to the receiving position where it is rotated to dump the irradiated pellet into the outlet tube by which it is conveyed by gravity to the outside of the reactor. Stop members are provided in the inlet tube, and electrical operating devices are provided to control the sequence of the operation automatically.

  13. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code.

  14. Robotics and remote systems applications

    SciTech Connect (OSTI)

    Rabold, D.E.

    1996-05-01

    This article is a review of numerous remote inspection techniques in use at the Savannah River (and other) facilities. These include: (1) reactor tank inspection robot, (2) californium waste removal robot, (3) fuel rod lubrication robot, (4) cesium source manipulation robot, (5) tank 13 survey and decontamination robots, (6) hot gang valve corridor decontamination and junction box removal robots, (7) lead removal from deionizer vessels robot, (8) HB line cleanup robot, (9) remote operation of a front end loader at WIPP, (10) remote overhead video extendible robot, (11) semi-intelligent mobile observing navigator, (12) remote camera systems in the SRS canyons, (13) cameras and borescope for the DWPF, (14) Hanford waste tank camera system, (15) in-tank precipitation camera system, (16) F-area retention basin pipe crawler, (17) waste tank wall crawler and annulus camera, (18) duct inspection, and (19) deionizer resin sampling.

  15. Using the Domain Name System to Thwart Automated Client-Based Attacks

    SciTech Connect (OSTI)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  16. REMOTE ACCESS SERVICES | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    REMOTE ACCESS SERVICES REMOTE ACCESS SERVICES Three people holding signs that say "We Work Remotely." Three people holding signs that say "We Work Remotely." Energy IT Services (EITS) Remote Access Services: Outlook Web Access RSA Token Login RSA Token Instructions HSPD-12 Login HSPD-12 Badge Instructions Virtual Private Network As of May 1, 2014, only Government-Furnished Equipment (GFE) provisioned by EITS will be allowed to connect via EITS Virtual Private Networking (VPN)

  17. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  18. The REMOTE SENSlNf

    Office of Legacy Management (LM)

    REMOTE SENSlNf ' . 1 ARllRllRRv OF THE UNITED STATES DEPARTMENT OF ENERGY . . . . .a. * ~~&hrEAWWMms Gap ~~&hrEAwwMms Gap ECT FOLLdW-UP REPORT ECT FOLLdW-UP REPORT NOVEMBER 1979 NOVEMBER 1979 AN AERIAL RADIOLOGICAL SURVEY OF THE CURTIS BAY FACILITY OF THE W. FL GRACE COMPANY Baltimore, Maryland t. Kent Hilton Project Scientist APPROVED FORPUBLlCATlON ' : T. P. Stuart, Manager Remote Sensing Sciences Department ATTACHMENT 4- ECT Follow-Up Report AN AERIAL RADIOLOGICAL SURVEY OF THE

  19. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    SciTech Connect (OSTI)

    Cui, Xiaohui; Beaver, Justin M; Treadwell, Jim N

    2012-01-01

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  20. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  1. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    May 2008 | Department of Energy Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise systems,

  2. Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010

    Broader source: Energy.gov [DOE]

    This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for...

  3. Breaking into a computer : attack techniques and tools used by cyber-criminals

    ScienceCinema (OSTI)

    None

    2011-10-06

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  4. Connecting Remote Clusters with ATM

    SciTech Connect (OSTI)

    Hu, T.C.; Wyckoff, P.S.

    1998-10-01

    Sandia's entry into utilizing clusters of networked workstations is called Computational Plant or CPlant for short. The design of CPlant uses Ethernet to boot the individual nodes, Myrinet to communicate within a node cluster, and ATM to connect between remote clusters. This SAND document covers the work done to enable the use of ATM on the CPlant nodes in the Fall of 1997.

  5. Working with SRNL - Our Facilities - Remote Systems Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Systems Laboratory Remote Systems Laboratory Working with SRNL Our Facilities - Remote Systems Laboratory The Remote Systems Laboratory is used for the design, development, fabrication, and testing of unique equipment systems for use in radioactive, hazardous or inaccessible environments

  6. Aggregate Remote Memory Copy Interface

    Energy Science and Technology Software Center (OSTI)

    2006-02-23

    The purpose of the Aggregate Remote Memory Copy (ARMCI) library is to provide a general- purpose, efficient, and Widely portable remote memory access (RMA) operations (one-sided communication) optimized for Contiguous and noncontiguous (strided, scatter/gather, I/O vector) data transfers. In addition, ARMCI includes a set of atomic and mutual exclusion operations. The development ARMCI is driven by the need to support the global-addres space communication model in context of distributed regular or irregular distributed data structures,more » communication libraries, and compilers. ARMCI is a standalone system that could be used to support user-level libraries and applications that use MPI or PVM.« less

  7. Protecting Intelligent Distributed Power Grids against Cyber Attacks

    SciTech Connect (OSTI)

    Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

    2010-12-31

    Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

  8. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  9. Disposable remote zero headspace extractor

    DOE Patents [OSTI]

    Hand, Julie J.; Roberts, Mark P.

    2006-03-21

    The remote zero headspace extractor uses a sampling container inside a stainless steel vessel to perform toxicity characteristics leaching procedure to analyze volatile organic compounds. The system uses an in line filter for ease of replacement. This eliminates cleaning and disassembly of the extractor. All connections are made with quick connect fittings which can be easily replaced. After use, the bag can be removed and disposed of, and a new sampling container is inserted for the next extraction.

  10. A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    SciTech Connect (OSTI)

    Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.; Halappanavar, Mahantesh

    2015-12-28

    Quantification and propagation of uncertainties in cyber attacker payoffs is a key aspect within multiplayer, stochastic security games. These payoffs may represent penalties or rewards associated with player actions and are subject to various sources of uncertainty, including: (1) cyber-system state, (2) attacker type, (3) choice of player actions, and (4) cyber-system state transitions over time. Past research has primarily focused on representing defender beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and mathematical intervals. For cyber-systems, probability distributions may help address statistical (aleatory) uncertainties where the defender may assume inherent variability or randomness in the factors contributing to the attacker payoffs. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attackers payoff generation mechanism. Such epistemic uncertainties are more suitably represented as generalizations of probability boxes. This paper explores the mathematical treatment of such mixed payoff uncertainties. A conditional probabilistic reasoning approach is adopted to organize the dependencies between a cyber-systems state, attacker type, player actions, and state transitions. This also enables the application of probabilistic theories to propagate various uncertainties in the attacker payoffs. An example implementation of this probabilistic framework and resulting attacker payoff distributions are discussed. A goal of this paper is also to highlight this uncertainty quantification problem space to the cyber security research community and encourage further advancements in this area.

  11. T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks.

  12. Statement on the Eighth Anniversary of the 9/11 Attacks | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy on the Eighth Anniversary of the 9/11 Attacks Statement on the Eighth Anniversary of the 9/11 Attacks September 11, 2009 - 12:00am Addthis "Today, we pause to remember the nearly 3,000 men and women who lost their lives in the horrific attacks of 9/11 and to honor the heroes of that terrible day. The people we lost came from all walks of life, all parts of the country, and all corners of the world. What they had in common was their innocence and that they were loved by those they

  13. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks

    Broader source: Energy.gov [DOE]

    RSA Authentication Manager is prone to multiple security vulnerabilities because it fails to properly sanitize user-supplied input. Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be possible.

  14. Geographical Applications of Remote Sensing (Journal Article...

    Office of Scientific and Technical Information (OSTI)

    SciTech Connect Search Results Journal Article: Geographical Applications of Remote ... DOE Contract Number: AC05-76RL01830 Resource Type: Journal Article Resource Relation: ...

  15. Geobotanical Remote Sensing For Geothermal Exploration | Open...

    Open Energy Info (EERE)

    Exploration Jump to: navigation, search OpenEI Reference LibraryAdd to library Book: Geobotanical Remote Sensing For Geothermal Exploration Abstract This paper presents a...

  16. Remote Alaskan Communities Energy Efficiency Competition | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    solutions. With the release of Notice of Opportunity for Technical Assistance (NOTA) for Remote Alaska Communities Energy Efficiency Competition DE-FOA-0001479, the...

  17. Quick-connect coupler for remote manipulation

    DOE Patents [OSTI]

    Dobbins, James C. (Idaho Falls, ID)

    1990-01-01

    An adaptor for a single-point attachment, push-to-connect/pull-to-disconnect, quick-connect fluid coupler which enables the coupler to be remotely manipulated.

  18. Remote Alaskan Communities Energy Efficiency Competition

    Broader source: Energy.gov [DOE]

    New initiative aims significantly accelerate efforts by remote Alaskan communities to adopt sustainable energy strategies, through a competitive effort to elicit the best approaches.

  19. Remotely readable fiber optic compass

    DOE Patents [OSTI]

    Migliori, A.; Swift, G.W.; Garrett, S.L.

    1985-04-30

    A remotely readable fiber optic compass. A sheet polarizer is affixed to a magnet rotatably mounted in a compass body, such that the polarizer rotates with the magnet. The optical axis of the sheet polarizer is preferably aligned with the north-south axis of the magnet. A single excitation light beam is divided into four identical beams, two of which are passed through the sheet polarizer and through two fixed polarizing sheets which have their optical axes at right angles to one another. The angle of the compass magnet with respect to a fixed axis of the compass body can be determined by measuring the ratio of the intensities of the two light beams. The remaining ambiguity as to which of the four possible quadrants the magnet is pointing to is resolved by the second pair of light beams, which are passed through the sheet polarizer at positions which are transected by two semicircular opaque strips formed on the sheet polarizer. The incoming excitation beam and the four return beams are communicated by means of optical fibers, giving a remotely readable compass which has no electrical parts.

  20. Remotely readable fiber optic compass

    DOE Patents [OSTI]

    Migliori, Albert; Swift, Gregory W.; Garrett, Steven L.

    1986-01-01

    A remotely readable fiber optic compass. A sheet polarizer is affixed to a magnet rotatably mounted in a compass body, such that the polarizer rotates with the magnet. The optical axis of the sheet polarizer is preferably aligned with the north-south axis of the magnet. A single excitation light beam is divided into four identical beams, two of which are passed through the sheet polarizer and through two fixed polarizing sheets which have their optical axes at right angles to one another. The angle of the compass magnet with respect to a fixed axis of the compass body can be determined by measuring the ratio of the intensities of the two light beams. The remaining ambiguity as to which of the four possible quadrants the magnet is pointing to is resolved by the second pair of light beams, which are passed through the sheet polarizer at positions which are transected by two semicircular opaque strips formed on the sheet polarizer. The incoming excitation beam and the four return beams are communicated by means of optical fibers, giving a remotely readable compass which has no electrical parts.

  1. Detecting and Blocking Network Attacks at Ultra High Speeds

    SciTech Connect (OSTI)

    Paxson, Vern

    2010-11-29

    Stateful, in-depth, in-line traffic analysis for intrusion detection and prevention has grown increasingly more difficult as the data rates of modern networks rise. One point in the design space for high-performance network analysis - pursued by a number of commercial products - is the use of sophisticated custom hardware. For very high-speed processing, such systems often cast the entire analysis process in ASICs. This project pursued a different architectural approach, which we term Shunting. Shunting marries a conceptually quite simple hardware device with an Intrusion Prevention System (IPS) running on commodity PC hardware. The overall design goal is was to keep the hardware both cheap and readily scalable to future higher speeds, yet also retain the unparalleled flexibility that running the main IPS analysis in a full general-computing environment provides. The Shunting architecture we developed uses a simple in-line hardware element that maintains several large state tables indexed by packet header fields, including IP/TCP flags, source and destination IP addresses, and connection tuples. The tables yield decision values the element makes on a packet-by-packet basis: forward the packet, drop it, or divert ('shunt') it through the IPS (the default). By manipulating table entries, the IPS can, on a fine-grained basis: (i) specify the traffic it wishes to examine, (ii) directly block malicious traffic, and (iii) 'cut through' traffic streams once it has had an opportunity to 'vet' them, or (iv) skip over large items within a stream before proceeding to further analyze it. For the Shunting architecture to yield benefits, it needs to operate in an environment for which the monitored network traffic has the property that - after proper vetting - much of it can be safely skipped. This property does not universally hold. For example, if a bank needs to examine all Web traffic involving its servers for regulatory compliance, then a monitor in front of one of the bank's server farms cannot safely omit a subset of the traffic from analysis. In this environment, Shunting cannot realize its main performance benefits, and the monitoring task likely calls for using custom hardware instead. However, in many other environments we find Shunting holds promise for delivering major performance gains. This arises due to the the widely documented 'heavy tail' nature of most forms of network traffic, which we might express as 'a few of the connections carry just about all the bytes.' The key additional insight is '... and very often for these few large connections, the very beginning of the connection contains nearly all the information of interest from a security analysis perspective.' We argue that this second claim holds because it is at the beginning of connections that authentication exchanges occur, data or file names and types are specified, request and reply status codes conveyed, and encryption is negotiated. Once these occur, we have seen most of the interesting facets of the dialog. Certainly the remainder of the connection might also yield some grist for analysis, but this is generally less likely, and thus if we want to lower analysis load at as small a loss as possible of information relevant to security analysis, we might best do so by skipping the bulk of large connections. In a different context, the 'Time Machine' work by Kornexl and colleagues likewise shows that in some environments we can realize major reductions in the volume of network traffic processed, by limiting the processing to the first 10-20 KB of each connection. As a concrete example, consider an IPS that monitors SSH traffic. When a new SSH connection arrives and the Shunt fails to find an entry for it in any of its tables (per-address, per-port, per-connection), it executes the default action of diverting the connection through the IPS. The IPS analyzes the beginning of the connection in this fashion. As long as it is satisified with the dialog, it reinjects the packets forwarded to it so that the connection can continue. If the connection successfully negotiates encryption, the IPS can no longer profitably analyze it, so it downloads a per-connection table entry to the Shunt specifying that the action for the connection in the future is 'forward.' For heavy-tailed connections, this means a very large majority of the connection's packets will now pass through the Shunt device without burdening the IPS with any further analysis load. On the other hand, if the IPS is dissatisfied with some element of the initial dialog, it downloads a 'drop' entry to terminate the connection. Note that by providing for reinjection, we can promote an intrusion detection system into an intrusion prevention system, one that does not merely detect attacks but can block them before they complete. Reinjection also allows the IPS to normalize traffic to remove ambiguities that attackers can leverage to evade the IPS.

  2. Remote Whispering Applying Time Reversal

    SciTech Connect (OSTI)

    Anderson, Brian Eric

    2015-07-16

    The purpose of this project was to explore the use of time reversal technologies as a means for communication to a targeted individual or location. The idea is to have the privacy of whispering in one’s ear, but to do this remotely from loudspeakers not located near the target. Applications of this work include communicating with hostages and survivors in rescue operations, communicating imaging and operational conditions in deep drilling operations, monitoring storage of spent nuclear fuel in storage casks without wires, or clandestine activities requiring signaling between specific points. This technology provides a solution in any application where wires and radio communications are not possible or not desired. It also may be configured to self calibrate on a regular basis to adjust for changing conditions. These communications allow two people to converse with one another in real time, converse in an inaudible frequency range or medium (i.e. using ultrasonic frequencies and/or sending vibrations through a structure), or send information for a system to interpret (even allowing remote control of a system using sound). The time reversal process allows one to focus energy to a specific location in space and to send a clean transmission of a selected signal only to that location. In order for the time reversal process to work, a calibration signal must be obtained. This signal may be obtained experimentally using an impulsive sound, a known chirp signal, or other known signals. It may also be determined from a numerical model of a known environment in which the focusing is desired or from passive listening over time to ambient noise.

  3. T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Diagnostics. The vulnerability could be exploited remotely resulting in cross site scripting (XSS).

  4. Advanced polychromator systems for remote chemical sensing (LDRD...

    Office of Scientific and Technical Information (OSTI)

    Advanced polychromator systems for remote chemical sensing (LDRD project 52575). Citation Details In-Document Search Title: Advanced polychromator systems for remote chemical ...

  5. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June...

  6. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive...

  7. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated...

  8. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute...

  9. Hyperspectral Geobotanical Remote Sensing For Co2 Storage Monitoring...

    Open Energy Info (EERE)

    Hyperspectral Geobotanical Remote Sensing For Co2 Storage Monitoring Jump to: navigation, search OpenEI Reference LibraryAdd to library Book: Hyperspectral Geobotanical Remote...

  10. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication...

  11. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

  12. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

  13. Category:Remote Sensing Techniques | Open Energy Information

    Open Energy Info (EERE)

    Remote Sensing Techniques Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Geothermalpower.jpg Looking for the Remote Sensing Techniques page? For detailed information...

  14. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

  15. Methods, media, and systems for detecting attack on a digital processing device

    DOE Patents [OSTI]

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  16. Heating remote rooms in passive solar buildings

    SciTech Connect (OSTI)

    Balcomb, J.D.

    1981-01-01

    Remote rooms can be effectively heated by convection through a connecting doorway. A simple steady-state equation is developed for design purposes. Validation of a dynamic model is achieved using data obtained over a 13-day period. Dynamic effects are investigated using a simulation analysis for three different cases of driving temperature; the effect is to reduce the temperature difference between the driving room and the remote room compared to the steady-state model. For large temperature swings in the driving room a strategy which uses the intervening door in a diode mode is effective. The importance of heat-storing mass in the remote room is investigated.

  17. Remotely operated submersible underwater suction apparatus

    DOE Patents [OSTI]

    Kristan, Louis L. (2111 Brentwood Dr., Idaho Falls, ID 83402)

    1990-01-01

    A completely submersible, remotely operated underwater suction device for collection of irradiated materials in a nuclear pool is disclosed. The device includes a pump means for pumping water through the device, a filter means for capturing irradiated debris, remotely operated releasable connector means, a collection means and a means for remotely maneuvering the collection means. The components of the suction device may be changed and replaced underwater to take advantage of the excellent radiation shielding ability of water to thereby minimize exposure of personnel to radiation.

  18. Method for remote detection of trace contaminants

    DOE Patents [OSTI]

    Simonson, Robert J.; Hance, Bradley G.

    2003-09-09

    A method for remote detection of trace contaminants in a target area comprises applying sensor particles that preconcentrate the trace contaminant to the target area and detecting the contaminant-sensitive fluorescence from the sensor particles. The sensor particles can have contaminant-sensitive and contaminant-insensitive fluorescent compounds to enable the determination of the amount of trace contaminant present in the target are by relative comparison of the emission of the fluorescent compounds by a local or remote fluorescence detector. The method can be used to remotely detect buried minefields.

  19. Apparatus for remotely handling components

    DOE Patents [OSTI]

    Szkrybalo, Gregory A.; Griffin, Donald L.

    1994-01-01

    The inventive apparatus for remotely handling bar-like components which define a longitudinal direction includes a gripper mechanism for gripping the component including first and second gripper members longitudinally fixedly spaced from each other and oriented parallel to each other in planes transverse to the longitudinal direction. Each gripper member includes a jaw having at least one V-groove with opposing surfaces intersecting at a base and extending radially relative to the longitudinal direction for receiving the component in an open end between the opposing surfaces. The V-grooves on the jaw plate of the first and second gripper members are aligned in the longitudinal direction to support the component in the first and second gripper members. A jaw is rotatably mounted on and a part of each of the first and second gripper members for selectively assuming a retracted mode in which the open end of the V-groove is unobstructed and active mode in which the jaw spans the open end of the V-groove in the first and second gripper members. The jaw has a locking surface for contacting the component in the active mode to secure the component between the locking surface of the jaw and the opposing surfaces of the V-groove. The locking surface has a plurality of stepped portions, each defining a progressively decreasing radial distance between the base of the V-groove and the stepped portion opposing the base to accommodate varying sizes of components.

  20. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    SciTech Connect (OSTI)

    Hartman, Steven M

    2012-01-01

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  1. Machine Learning for Power System Disturbance and Cyber-attack Discrimination

    SciTech Connect (OSTI)

    Borges, Raymond Charles; Beaver, Justin M; Buckner, Mark A; Morris, Thomas; Adhikari, Uttam; Pan, Shengyi

    2014-01-01

    Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as a means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.

  2. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    SciTech Connect (OSTI)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  3. Request for Information -- Remote Alaskan Communities Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    As part of President Obama's commitment to fight climate change and assist remote Alaskan ... Responses to the RFI may be submitted directly by email to AlaskaCompetition@hq.doe.go...

  4. Solar Energy Prospecting in Remote Alaska

    Broader source: Energy.gov [DOE]

    This Office of Indian Energy report provides a high-level examination of the potential economics of solar energy in rural Alaska across a geographically diverse sample of remote Alaska Native villages throughout the state.

  5. Remote Alaskan Communities Energy Efficiency Competition

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy's (DOE's) Office of Indian Energy and Office of Energy Efficiency and Renewable Energy (EERE) have issued a Notice of Technical Assistance (NOTA) to significantly accelerate efforts by remote Alaskan communities to adopt sustainable energy strategies. The Remote Alaskan Communities Energy Efficiency Competition will empower Alaskan communities and Alaska Native villages to develop effective tools to advance the use of reliable, affordable, and energy efficient solutions that are replicable throughout Alaska and other Arctic regions.

  6. Energy Vampires are Attacking Your Home - Here's How to Stop Them |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Vampires are Attacking Your Home - Here's How to Stop Them Energy Vampires are Attacking Your Home - Here's How to Stop Them October 20, 2014 - 2:09pm Addthis Using a power strip to switch off appliances ensures your home won't be plagued by energy vampires. | Photo courtesy of ©iStockphoto.com/webking Using a power strip to switch off appliances ensures your home won't be plagued by energy vampires. | Photo courtesy of ©iStockphoto.com/webking Erik Hyrkas Erik

  7. U-176: Wireshark Multiple Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  8. Request for Information-- Remote Alaskan Communities Energy Efficiency Competition

    Broader source: Energy.gov [DOE]

    Download the request for information on the Remote Alaskan Communities Energy Efficiency Competition.

  9. U-203: HP Photosmart Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions.

  10. T-636: Wireshark Multiple Flaws Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  11. Fiber optically isolated and remotely stabilized data transmission system

    DOE Patents [OSTI]

    Nelson, Melvin A.

    1992-01-01

    A fiber optically isolated and remotely stabilized data transmission system s described wherein optical data may be transmitted over an optical data fiber from a remote source which includes a data transmitter and a power supply at the remote source. The transmitter may be remotely calibrated and stabilized via an optical control fiber, and the power source may be remotely cycled between duty and standby modes via an optical control fiber.

  12. Fiber optically isolated and remotely stabilized data transmission system

    DOE Patents [OSTI]

    Nelson, M.A.

    1992-11-10

    A fiber optically isolated and remotely stabilized data transmission systems described wherein optical data may be transmitted over an optical data fiber from a remote source which includes a data transmitter and a power supply at the remote source. The transmitter may be remotely calibrated and stabilized via an optical control fiber, and the power source may be remotely cycled between duty and standby modes via an optical control fiber. 3 figs.

  13. Regulating greenhouse gas 'leakage': how California can evade the impending constitutional attacks

    SciTech Connect (OSTI)

    Brian H. Potts

    2006-06-15

    Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation.

  14. U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  15. U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser.

  16. U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  17. Remote inspection system for hazardous sites

    SciTech Connect (OSTI)

    Redd, J.; Borst, C.; Volz, R.A.; Everett, L.J.

    1999-04-01

    Long term storage of special nuclear materials poses a number of problems. One of these is a need to inspect the items being stored from time to time. Yet the environment is hostile to man, with significant radiation exposure resulting from prolonged presence in the storage facility. This paper describes research to provide a remote inspection capability, which could lead to eliminating the need for humans to enter a nuclear storage facility. While there are many ways in which an RI system might be created, this paper describes the development of a prototype remote inspection system, which utilizes virtual reality technology along with robotics. The purpose of this system is to allow the operator to establish a safe and realistic telepresence in a remote environment. In addition, it was desired that the user interface for the system be as intuitive to use as possible, thus eliminating the need for extensive training. The goal of this system is to provide a robotic platform with two cameras, which are capable of providing accurate and reliable stereographic images of the remote environment. One application for the system is that it might be driven down the corridors of a nuclear storage facility and utilized to inspect the drums inside, all without the need for physical human presence. Thus, it is not a true virtual reality system providing simulated graphics, but rather an augmented reality system, which performs remote inspection of an existing, real environment.

  18. Remote/New sites: Many Field

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote two-wire data entry method and device Title: Remote two-wire data entry method and device This invention is comprised of a device for detecting switch closure such as in a keypad for entering data comprising a matrix of conductor pairs and switches, each pair of conductors shorted by the pressing of a particular switch, and current-regulating devices on each conductor for limiting current in one direction and passing it without limit in the other direction. The device is driven by

  19. Valve assembly having remotely replaceable bearings

    DOE Patents [OSTI]

    Johnson, Evan R.; Tanner, David E.

    1980-01-01

    A valve assembly having remotely replaceable bearings is disclosed wherein a valve disc is supported within a flow duct for rotation about a pair of axially aligned bearings, one of which is carried by a spindle received within a diametral bore in the valve disc, and the other of which is carried by a bearing support block releasably mounted on the duct circumferentially of an annular collar on the valve disc coaxial with its diametrical bore. The spindle and bearing support block are adapted for remote removal to facilitate servicing or replacement of the valve disc support bearings.

  20. Applying high resolution SyXRD analysis on sulfate attacked concrete field samples

    SciTech Connect (OSTI)

    Stroh, J.; Schlegel, M.-C.; Irassar, E.F.; Meng, B.; Emmerling, F.

    2014-12-15

    High resolution synchrotron X-ray diffraction (SyXRD) was applied for a microstructural profile analysis of concrete deterioration after sulfate attack. The cement matrices consist of ordinary Portland cement and different amounts of supplementary cementitious materials, such as fly ash, natural pozzolana and granulated blast furnace slag. The changes of the phase composition were determined along the direction of sulfate ingress. This approach allows the identification of reaction fronts and zones of different phase compositions and conclusions about the mechanisms of sulfate attack. Two reaction fronts were localized in the initial 4 mm from the sample surface. The mechanism of deterioration caused by the exposition in the sulfate-bearing soil is discussed. SyXRD is shown to be a reliable method for investigation of cementitious materials with aggregates embedded in natural environments.

  1. Remote Sensing Laboratory | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Remote Sensing Laboratory Department of Energy's chief risk officer visits Nevada National Security Site Earlier this month, Associate Deputy Secretary John MacWilliams visited the Nevada National Security Site (NNSS) in his role as Chief Risk Officer for the Department of Energy. He reviewed the various ways the NNSS contributes to the department's and NNSA's missions, including radiological

  2. Advanced signal processing in geophysical remote sensing

    SciTech Connect (OSTI)

    Witten, A.J.; King, W.C.

    1993-06-01

    This paper describes advanced signal processing methods which have improved the capabilities to detect and image the subsurface environment with geophysical remote sensing techniques. Field results are presented showing target detection, subsurface characterizations, and imaging of insitu waste treatment processes, all previously unachievable with such tools as ground penetrating radar, magnetometry and seismic.

  3. Advanced signal processing in geophysical remote sensing

    SciTech Connect (OSTI)

    Witten, A.J. ); King, W.C. . Dept. of Geography and Environmental Engineering)

    1993-01-01

    This paper describes advanced signal processing methods which have improved the capabilities to detect and image the subsurface environment with geophysical remote sensing techniques. Field results are presented showing target detection, subsurface characterizations, and imaging of insitu waste treatment processes, all previously unachievable with such tools as ground penetrating radar, magnetometry and seismic.

  4. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling

    SciTech Connect (OSTI)

    Flach, G. P.

    2015-05-12

    Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.

  5. V-127: Samba Bug Lets Remote Authenticated Users Modify Files...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was...

  6. Geothermal Exploration Using Aviris Remote Sensing Data Over...

    Open Energy Info (EERE)

    Aviris Remote Sensing Data Over Fish Lake Valley, Nv Jump to: navigation, search OpenEI Reference LibraryAdd to library Conference Paper: Geothermal Exploration Using Aviris Remote...

  7. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am...

  8. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

  9. V-218: HP Service Manager Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-029: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain Unauthorized Access...

  10. Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.

    SciTech Connect (OSTI)

    D.R. Coyle; D.C. Booth: M.S. Wallace

    2005-12-01

    ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the ????rst time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of the trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.

  11. T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks .

  12. Analysis of Bright Harvest Remote Analysis for Residential Solar Installations

    SciTech Connect (OSTI)

    Nangle, John; Simon, Joseph

    2015-06-17

    Bright Harvest provides remote shading analysis and design products for residential PV system installers. The National Renewable Energy Laboratory (NREL) through the NREL Commercialization Assistance Program, completed comparative assessments between on-site measurements and remotely calculated values to validate the accuracy of Bright Harvest’s remote shading and power generation.

  13. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent...

  14. U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

  15. Self-referencing remote optical probe

    DOE Patents [OSTI]

    O'Rourke, P.E.; Prather, W.S.; Livingston, R.R.

    1991-08-13

    A probe is described for remote spectrometric measurements of fluid samples having a hollow probe body with a sliding reflective plug therein and a lens at one end, ports for admitting and expelling the fluid sample and a means for moving the reflector so that reference measurement can be made with the reflector in a first position near the lens and a sample measurement can be made with the reflector away from the lens and the fluid sample between the reflector and the lens. Comparison of the two measurements will yield the composition of the fluid sample. The probe is preferably used for remote measurements and light is carried to and from the probe via fiber optic cables. 3 figures.

  16. Small geothermal electric systems for remote powering

    SciTech Connect (OSTI)

    Entingh, Daniel J.; Easwaran, Eyob.; McLarty, Lynn

    1994-08-08

    This report describes conditions and costs at which quite small (100 to 1,000 kilowatt) geothermal systems could be used for off-grid powering at remote locations. This is a first step in a larger process of determining locations and conditions at which markets for such systems could be developed. The results suggest that small geothermal systems offer substantial economic and environmental advantages for powering off-grid towns and villages. Geothermal power is most likely to be economic if the system size is 300 kW or greater, down to reservoir temperatures of 100{degree}C. For system sizes smaller than 300 kW, the economics can be favorable if the reservoir temperature is about 120{degree}C or above. Important markets include sites remote from grids in many developing and developed countries. Estimates of geothermal resources in many developing countries are shown.

  17. Self-referencing remote optical probe

    DOE Patents [OSTI]

    O'Rourke, Patrick E.; Prather, William S.; Livingston, Ronald R.

    1991-01-01

    A probe for remote spectrometric measurements of fluid samples having a hollow probe body with a sliding reflective plug therein and a lens at one end, ports for admitting and expelling the fluid sample and a means for moving the reflector so that reference measurement can be made with the reflector in a first position near the lens and a sample measurement can be made with the reflector away from the lens and the fluid sample between the reflector and the lens. Comparison of the two measurements will yield the composition of the fluid sample. The probe is preferably used for remote measurements and light is carried to and from the probe via fiber optic cables.

  18. U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks

    Broader source: Energy.gov [DOE]

    The 'public_html/lists/admin' pages do not properly validate user-supplied input in the 'sortby' parameter [CVE-2012-2740]. A remote authenticated administrative user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

  19. System for remote control of underground device

    DOE Patents [OSTI]

    Brumleve, T.D.; Hicks, M.G.; Jones, M.O.

    1975-10-21

    A system is described for remote control of an underground device, particularly a nuclear explosive. The system includes means at the surface of the ground for transmitting a seismic signal sequence through the earth having controlled and predetermined signal characteristics for initiating a selected action in the device. Additional apparatus, located with or adjacent to the underground device, produces electrical signals in response to the seismic signals received and compares these electrical signals with the predetermined signal characteristics.

  20. Aerosol Remote Sealing System - Energy Innovation Portal

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Aerosol Remote Sealing System Lawrence Berkeley National Laboratory Contact LBL About This Technology Technology Marketing SummaryMark Modera and Francois Remi Carrie from Berkeley National Laboratory have developed a rapid, economical technique to seal duct and other enclosed systems by means of an internally injected aerosol. DescriptionBerkeley National Laboratory's aerosol compound seals holes in enclosed systems and is effective even after bends and junctions. A unique, in situ aerosol

  1. Remote controlled vacuum joint closure mechanism

    DOE Patents [OSTI]

    Doll, David W. (San Diego, CA); Hager, E. Randolph (La Jolla, CA)

    1986-01-01

    A remotely operable and maintainable vacuum joint closure mechanism for a noncircular aperture is disclosed. The closure mechanism includes an extendible bellows coupled at one end to a noncircular duct and at its other end to a flange assembly having sealed grooves for establishing a high vacuum seal with the abutting surface of a facing flange which includes an aperture forming part of the system to be evacuated. A plurality of generally linear arrangements of pivotally coupled linkages and piston combinations are mounted around the outer surface of the duct and aligned along the length thereof. Each of the piston/linkage assemblies is adapted to engage the flange assembly by means of a respective piston and is further coupled to a remote controlled piston drive shaft to permit each of the linkages positioned on a respective flat outer surface of the duct to simultaneously and uniformly displace a corresponding piston and the flange assembly with which it is in contact along the length of the duct in extending the bellows to provide a high vacuum seal between the movable flange and the facing flange. A plurality of latch mechanisms are also pivotally mounted on the outside of the duct. A first end of each of the latch mechanisms is coupled to a remotely controlled latch control shaft for displacing the latch mechanism about its pivot point. In response to the pivoting displacement of the latch mechanism, a second end thereof is displaced so as to securely engage the facing flange.

  2. A remotely operated robot for decontamination tasks

    SciTech Connect (OSTI)

    Dudar, A.M.; Vandewalle, R.C.

    1994-02-01

    Engineers in the Robotics Development Group at the Westinghouse Savannah River Company (WSRC) have developed a robot which will be used to decontaminate a pipe gallery of a tank farm used for nuclear waste storage. Personnel access is required into this pipe gallery to inspect existing pipes and perform repairs to secondary containment walls around the tank farm. Presently, the pipe gallery is littered with debris of various sizes and its surface is contaminated with activity levels up to 2.5E6 DPM (disintegrations per minute) alpha and exposure levels as high as 20 Rad/hr. Cleaning up this pipe gallery win be the mission of an all-hydraulic robotic vehicle developed in-house at WSRC caged the ``Remote Decon`` robot. The Remote Decon is a tracked vehicle which utilizes skid steering and features a six-degree-of-freedom (DOF) manipulator arm, a five-DOF front end loader type bucket with a rotating brush for scrubbing and decontaminating surfaces, and a three-DOF pan/tilt mechanism with cameras and lights. The Remote Decon system is connected to a control console via a 200 foot tethered cable. The control console was designed with ergonomics and simplicity as the main design factors and features three joysticks, video monitors, LED panels, and audible alarms.

  3. ALSO: BUILDING A BETTER MICROSYSTEM SPRAY IT AGAIN, SAM VR Tool Helps Prepare for Terrorist Attacks

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1999 - 2000 ALSO: BUILDING A BETTER MICROSYSTEM SPRAY IT AGAIN, SAM VR Tool Helps Prepare for Terrorist Attacks A QUARTERLY RESEARCH & DEVELOPMENT JOURNAL VOLUME 1, NO. 4 Z MACHINE Providing Clues to Astronomical Mysteries S A N D I A T E C H N O L O G Y [ From atop a 25-foot ladder, Sandian Larry Shipers examines a pair of cameras that provide feedback to a computer system that controls Sandia's automated painting system for the F-117 Nighthawk, also known as Stealth. The system sprays a

  4. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote authenticated user can execute arbitrary code on the target system. A remote authenticated user can modify the configuration on the target system. A remote user can cause denial of service conditions.

  5. Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions

    SciTech Connect (OSTI)

    Hendryx, M.; Zullig, K.J.

    2009-11-15

    This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14-1.30), angina or CHO (OR = 1.29, 95% C1 = 1.19-1.39) and heart attack (OR = 1.19, 95% C1 = 1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

  6. Remote controlled vacuum joint closure mechanism

    DOE Patents [OSTI]

    Doll, D.W.; Hager, E.R.

    1984-02-22

    A remotely operable and maintainable vacuum joint closure mechanism for a noncircular aperture is disclosed. The closure mechanism includes an extendible bellows coupled at one end to a noncircular duct and at its other end to a flange assembly having sealed grooves for establishing a high vacuum seal with the abutting surface of a facing flange which includes an aperture forming part of the system to be evacuated. A plurality of generally linear arrangements of pivotally coupled linkages and piston combinations are mounted around the outer surface of the duct and aligned along the length thereof. Each of the piston/linkage assemblies is adapted to engage the flange assembly by means of a respective piston and is further coupled to a remote controlled piston drive shaft to permit each of the linkages positioned on a respective flat outer surface of the duct to simultaneously and uniformly displace a corresponding piston and the flange assembly with which it is in contact along the length of the duct in extending the bellows to provide a high vacuum seal between the movable flange and the facing flange. A plurality of latch mechanisms are also pivotally mounted on the outside of the duct. A first end of each of the latch mechanisms is coupled to a remotely controlled latch control shaft for displacing the latch mechanism about its pivot point. In response to the pivoting displacement of the latch mechanism, a second end thereof is displaced so as to securely engage the facing flange and maintain the high vacuum seal established by the displacement of the flange assembly and extension of the bellows without displacing the entire duct.

  7. Implantable, remotely-programmable insulin infusion system

    SciTech Connect (OSTI)

    Carlson, G.A.; Bair, R.E.; Gaona, J.I. Jr.; Love, J.T.; Urenda, R.S.

    1981-10-01

    An implantable, remotely-programmable insulin infusion system is described which has a mass of 280 grams and an implanted lifetime exceeding two years. The system uses a rotary solenoid-driven peristaltic pump controlled by low power CMOS timing circuitry which provides bimodal insulin delivery. Fifteen low rates from 0.39 to 5.9 units/hour and 15 high doses from 0.84 to 12.5 units are available using U100 insulin. The system has been tested in the laboratory, evaluated in diabetic dogs, and implanted in one diabetic human.

  8. REMOTE AREA RADIATION MONITORING (RARM) ALTERNATIVES ANALYSIS

    SciTech Connect (OSTI)

    NELSON RL

    2008-07-18

    The Remote Area Radiation Monitoring (RARM) system will be used to provide real-time radiation monitoring information to the operations personnel during tank retrieval and transfer operations. The primary focus of the system is to detect potential anomalous (waste leaks) or transient radiological conditions. This system will provide mobile, real-time radiological monitoring, data logging, and status at pre-selected strategic points along the waste transfer route during tank retrieval operations. The system will provide early detection and response capabilities for the Retrieval and Closure Operations organization and Radiological Control personnel.

  9. Remote vacuum compaction of compressible hazardous waste

    DOE Patents [OSTI]

    Coyne, M.J.; Fiscus, G.M.; Sammel, A.G.

    1998-10-06

    A system is described for remote vacuum compaction and containment of low-level radioactive or hazardous waste comprising a vacuum source, a sealable first flexible container, and a sealable outer flexible container for receiving one or more first flexible containers. A method for compacting low level radioactive or hazardous waste materials at the point of generation comprising the steps of sealing the waste in a first flexible container, sealing one or more first containers within an outer flexible container, breaching the integrity of the first containers, evacuating the air from the inner and outer containers, and sealing the outer container shut. 8 figs.

  10. Remote vacuum compaction of compressible hazardous waste

    DOE Patents [OSTI]

    Coyne, Martin J.; Fiscus, Gregory M.; Sammel, Alfred G.

    1998-01-01

    A system for remote vacuum compaction and containment of low-level radioactive or hazardous waste comprising a vacuum source, a sealable first flexible container, and a sealable outer flexible container for receiving one or more first flexible containers. A method for compacting low level radioactive or hazardous waste materials at the point of generation comprising the steps of sealing the waste in a first flexible container, sealing one or more first containers within an outer flexible container, breaching the integrity of the first containers, evacuating the air from the inner and outer containers, and sealing the outer container shut.

  11. PV Charging System for Remote Area Operations

    SciTech Connect (OSTI)

    Ilsemann, Frederick; Thompson, Roger

    2008-07-31

    The objective of this project is to provide the public with a study of new as well existing technology to recharge batteries used in the field. A new product(s) will also be built based upon the information ascertained. American Electric Vehicles, Inc. (AEV) developed systems and methods suitable for charging state-of-the-art lithium-ion batteries in remote locations under both ideal and cloudy weather conditions. Conceptual designs are described for existing and next generation technology, particularly as regards solar cells, peak power trackers and batteries. Prototype system tests are reported.

  12. High aspect ratio, remote controlled pumping assembly

    DOE Patents [OSTI]

    Brown, S.B.; Milanovich, F.P.

    1995-11-14

    A miniature dual syringe-type pump assembly is described which has a high aspect ratio and which is remotely controlled, for use such as in a small diameter penetrometer cone or well packer used in water contamination applications. The pump assembly may be used to supply and remove a reagent to a water contamination sensor, for example, and includes a motor, gearhead and motor encoder assembly for turning a drive screw for an actuator which provides pushing on one syringe and pulling on the other syringe for injecting new reagent and withdrawing used reagent from an associated sensor. 4 figs.

  13. High aspect ratio, remote controlled pumping assembly

    DOE Patents [OSTI]

    Brown, Steve B.; Milanovich, Fred P.

    1995-01-01

    A miniature dual syringe-type pump assembly which has a high aspect ratio and which is remotely controlled, for use such as in a small diameter penetrometer cone or well packer used in water contamination applications. The pump assembly may be used to supply and remove a reagent to a water contamination sensor, for example, and includes a motor, gearhead and motor encoder assembly for turning a drive screw for an actuator which provides pushing on one syringe and pulling on the other syringe for injecting new reagent and withdrawing used reagent from an associated sensor.

  14. Risk-based decision making for staggered bioterrorist attacks : resource allocation and risk reduction in "reload" scenarios.

    SciTech Connect (OSTI)

    Lemaster, Michelle Nicole; Gay, David M.; Ehlen, Mark Andrew; Boggs, Paul T.; Ray, Jaideep

    2009-10-01

    Staggered bioterrorist attacks with aerosolized pathogens on population centers present a formidable challenge to resource allocation and response planning. The response and planning will commence immediately after the detection of the first attack and with no or little information of the second attack. In this report, we outline a method by which resource allocation may be performed. It involves probabilistic reconstruction of the bioterrorist attack from partial observations of the outbreak, followed by an optimization-under-uncertainty approach to perform resource allocations. We consider both single-site and time-staggered multi-site attacks (i.e., a reload scenario) under conditions when resources (personnel and equipment which are difficult to gather and transport) are insufficient. Both communicable (plague) and non-communicable diseases (anthrax) are addressed, and we also consider cases when the data, the time-series of people reporting with symptoms, are confounded with a reporting delay. We demonstrate how our approach develops allocations profiles that have the potential to reduce the probability of an extremely adverse outcome in exchange for a more certain, but less adverse outcome. We explore the effect of placing limits on daily allocations. Further, since our method is data-driven, the resource allocation progressively improves as more data becomes available.

  15. Remote Alaska Communities Energy Efficiency (RACEE) Competition Fact Sheet

    Energy Savers [EERE]

    15 Remote Alaska Communities Energy Efficiency (RACEE) Competition Fact Sheet Background Remote Alaskan communities face a number of unique energy challenges, with the harsh climate and isolation combining to drive up energy costs. The remote locations, in many cases only reached by air or boat, add significant costs to any fuel imported to the communities which on the average are nearly double the medium amount spent throughout the United States, according to the U. S. Energy Information

  16. Remote Gas Well Monitoring Technology Applied to Marcellus Shale Site |

    Energy Savers [EERE]

    Energy Remote Duct Sealing in Residential and Commercial Buildings Remote Duct Sealing in Residential and Commercial Buildings Remote Duct Sealing in Residential and Commercial Buildings: "Saving Money, Saving Energy and Improving Performance," Lawrence Berkeley National Laboratory, presented by Dr. Mark Modera, staff scientist, Environmental Energy Technologies Division. PDF icon LBNL Duct Sealing Presentation More Documents & Publications Ventilation in Multifamily Buildings

  17. Estimation of the relationship between remotely sensed anthropogenic heat

    Office of Scientific and Technical Information (OSTI)

    discharge and building energy use (Journal Article) | SciTech Connect SciTech Connect Search Results Journal Article: Estimation of the relationship between remotely sensed anthropogenic heat discharge and building energy use Citation Details In-Document Search Title: Estimation of the relationship between remotely sensed anthropogenic heat discharge and building energy use This paper examined the relationship between remotely sensed anthropogenic heat discharge and energy use from

  18. Remote Duct Sealing in Residential and Commercial Buildings | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Remote Duct Sealing in Residential and Commercial Buildings Remote Duct Sealing in Residential and Commercial Buildings Remote Duct Sealing in Residential and Commercial Buildings: "Saving Money, Saving Energy and Improving Performance," Lawrence Berkeley National Laboratory, presented by Dr. Mark Modera, staff scientist, Environmental Energy Technologies Division. PDF icon LBNL Duct Sealing Presentation More Documents & Publications Ventilation in Multifamily Buildings

  19. Special Section Guest Editorial. Advances in Remote Sensing for Monitoring

    Office of Scientific and Technical Information (OSTI)

    Global Environmental Changes (Journal Article) | SciTech Connect Special Section Guest Editorial. Advances in Remote Sensing for Monitoring Global Environmental Changes Citation Details In-Document Search Title: Special Section Guest Editorial. Advances in Remote Sensing for Monitoring Global Environmental Changes This paper focuses on advances in remote sensing for monitoring global environmental changes, and discussed10 papers selected from a number of areas of expertise. Authors: Zhou,

  20. FACT SHEET: Remote Alaska Communities Energy Efficiency (RACEE) Competition

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy FACT SHEET: Remote Alaska Communities Energy Efficiency (RACEE) Competition FACT SHEET: Remote Alaska Communities Energy Efficiency (RACEE) Competition The Remote Alaska Communities Energy Efficiency Competition will empower Alaskan communities and native Alaskan villages to develop effective tools to advance the use of reliable, affordable, and energy efficient solutions that are replicable throughout Alaska and other Arctic regions. Download the fact sheet below for

  1. Special Section Guest Editorial. Advances in Remote Sensing for Monitoring

    Office of Scientific and Technical Information (OSTI)

    Global Environmental Changes (Journal Article) | SciTech Connect Special Section Guest Editorial. Advances in Remote Sensing for Monitoring Global Environmental Changes Citation Details In-Document Search Title: Special Section Guest Editorial. Advances in Remote Sensing for Monitoring Global Environmental Changes This paper focuses on advances in remote sensing for monitoring global environmental changes, and discussed10 papers selected from a number of areas of expertise. Authors: Zhou,

  2. JLab Guest Lecturer Discusses Hurricane Hunting - By Remote Control...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Guest Lecturer Discusses Hurricane Hunting - By Remote Control On April 14 NEWPORT NEWS, Va., March 2, 2009 - Learn how the National Oceanic and Atmospheric Administration and...

  3. Method of determining forest production from remotely sensed forest parameters

    DOE Patents [OSTI]

    Corey, J.C.; Mackey, H.E. Jr.

    1987-08-31

    A method of determining forest production entirely from remotely sensed data in which remotely sensed multispectral scanner (MSS) data on forest 5 composition is combined with remotely sensed radar imaging data on forest stand biophysical parameters to provide a measure of forest production. A high correlation has been found to exist between the remotely sensed radar imaging data and on site measurements of biophysical 10 parameters such as stand height, diameter at breast height, total tree height, mean area per tree, and timber stand volume.

  4. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute...

  5. An Integrated Mapping And Remote Sensing Investigation Of The...

    Open Energy Info (EERE)

    Mapping And Remote Sensing Investigation Of The Structural Control For Fumarole Location In The Eburru Volcanic Complex, Kenya Rift Jump to: navigation, search OpenEI Reference...

  6. Active and Passive Remote Sensing Diagram | Open Energy Information

    Open Energy Info (EERE)

    Active and Passive Remote Sensing Diagram Author National Aeronautics and Space Administration Published Nasa.gov, 2013 DOI Not Provided Check for DOI availability: http:...

  7. Processing and Disposition of Remote-Handled Transuranic Liquid...

    Office of Scientific and Technical Information (OSTI)

    Liquid Waste Generated at Oak Ridge National Laboratory Citation Details In-Document Search Title: Processing and Disposition of Remote-Handled Transuranic Liquid Waste Generated ...

  8. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were...

  9. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port 8443 to access administrative resources and gain administrative privileges....

  10. Remote Systems Experience at the Oak Ridge National Laboratory...

    Office of Scientific and Technical Information (OSTI)

    The final outcome is a summary paper outlining ORNL experiences and guidelines for transition of developmental remote systems to real-worldmore hazardous environments. less ...

  11. Evaporation a key mechanism for the thaumasite form of sulfate attack

    SciTech Connect (OSTI)

    Mittermayr, Florian; Baldermann, Andre; Kurta, Christoph; Observatoire Midi-Pyrnes, Laboratoire Gosciences Environnement Toulouse, 14, avenue Edouard Belin, 31400 TOULOUSE ; Klammer, Dietmar; Leis, Albrecht; Dietzel, Martin

    2013-07-15

    Understanding the mechanisms leading to chemical attack on concrete is crucial in order to prevent damage of concrete structures. To date, most studies on sulfate attack and thaumasite formation are based on empirical approaches, as the identification of associated reaction mechanisms and paths is known to be highly complex. In this study, sulfate damaged concrete from Austrian tunnels was investigated by mineralogical, chemical and isotope methods to identify the reactions which caused intense concrete alteration. Major, minor and trace elemental contents as well as isotope ratios of local ground water (GW), drainage water (DW) and interstitial solutions (IS), extracted from damaged concrete material, were analyzed. Locally occurring GW contained 3 to 545 mg L{sup ?1} of SO{sub 4} and is thus regarded as slightly aggressive to concrete in accordance to standard specifications (e.g. DIN EN 206-1). The concrete linings and drainage systems of the studied tunnels, however, have partly suffered from intensive sulfate attack. Heavily damaged concrete consisted mainly of thaumasite, secondary calcite, gypsum, and relicts of aggregates. Surprisingly, the concentrations of dissolved ions were extremely enriched in the IS with up to 30,000 and 12,000 mg L{sup ?1} of SO{sub 4} and Cl, respectively. Analyses of aqueous ions with a highly conservative behavior, e.g. K, Rb and Li, as well as {sup 2}H/H and {sup 18}O/{sup 16}O isotope ratios of H{sub 2}O of the IS showed an intensive accumulation of ions and discrimination of the light isotopes vs. the GW. These isotope signals of the IS clearly revealed evaporation at distinct relative humidities. From ion accumulation and isotope fractionation individual total and current evaporation degrees were estimated. Our combined elemental and isotopic approach verified wettingdrying cycles within a highly dynamic concrete-solution-atmosphere system. Based on these boundary conditions, key factors controlling thaumasite formation are discussed regarding the development of more sulfate-resistant concrete and concrete structures.

  12. System and method for controlling remote devices

    DOE Patents [OSTI]

    Carrender, Curtis Lee; Gilbert, Ronald W.; Scott, Jeff W.; Clark, David A.

    2006-02-07

    A system and method for controlling remote devices utilizing a radio frequency identification (RFID) tag device having a control circuit adapted to render the tag device, and associated objects, permanently inoperable in response to radio-frequency control signals. The control circuit is configured to receive the control signals that can include an enable signal, and in response thereto enable an associated object, such as a weapon; and in response to a disable signal, to disable the tag itself, or, if desired, to disable the associated weapon or both the device and the weapon. Permanent disabling of the tag can be accomplished by several methods, including, but not limited to, fusing a fusable link, breaking an electrically conductive path, permanently altering the modulation or backscattering characteristics of the antenna circuit, and permanently erasing an associated memory. In this manner, tags in the possession of unauthorized employees can be remotely disabled, and weapons lost on a battlefield can be easily tracked and enabled or disabled automatically or at will.

  13. Remote control for anode-cathode adjustment

    DOE Patents [OSTI]

    Roose, Lars D.

    1991-01-01

    An apparatus for remotely adjusting the anode-cathode gap in a pulse power machine has an electric motor located within a hollow cathode inside the vacuum chamber of the pulse power machine. Input information for controlling the motor for adjusting the anode-cathode gap is fed into the apparatus using optical waveguides. The motor, controlled by the input information, drives a worm gear that moves a cathode tip. When the motor drives in one rotational direction, the cathode is moved toward the anode and the size of the anode-cathode gap is diminished. When the motor drives in the other direction, the cathode is moved away from the anode and the size of the anode-cathode gap is increased. The motor is powered by batteries housed in the hollow cathode. The batteries may be rechargeable, and they may be recharged by a photovoltaic cell in combination with an optical waveguide that receives recharging energy from outside the hollow cathode. Alternatively, the anode-cathode gap can be remotely adjusted by a manually-turned handle connected to mechanical linkage which is connected to a jack assembly. The jack assembly converts rotational motion of the handle and mechanical linkage to linear motion of the cathode moving toward or away from the anode.

  14. Rate of H2S and CO2 attack on pozzolan-amended Class H well cement under

    Office of Scientific and Technical Information (OSTI)

    geologic sequestration conditions (Journal Article) | SciTech Connect Rate of H2S and CO2 attack on pozzolan-amended Class H well cement under geologic sequestration conditions Citation Details In-Document Search Title: Rate of H2S and CO2 attack on pozzolan-amended Class H well cement under geologic sequestration conditions Authors: Zhang, Liwei ; Dzombak, David A ; Nakles, David V ; Hawthorne, Steven B ; Miller, David J ; Kutchko, Barbara G ; Lopano, Christina L ; Strazisar, Brian R

  15. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates

    Broader source: Energy.gov [DOE]

    A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases.

  16. Conceptual design analyses for Hanford Site deployable remote spectroscopy systems

    SciTech Connect (OSTI)

    Philipp, B.L.; Reich, F.R.

    1994-09-01

    This document identifies potential remote, NIR spectroscopic waste surface moisture monitoring system design alternatives to be operated inside one of the Hanford Site, high level, nuclear waste storage tanks. Potential tank waste moisture data impacts from the remote NIR signal transfer through high humidity vapor space is evaluated.

  17. Remote adjustable focus Raman spectroscopy probe

    DOE Patents [OSTI]

    Schmucker, John E.; Blasi, Raymond J.; Archer, William B.

    1999-01-01

    A remote adjustable focus Raman spectroscopy probe allows for analyzing Raman scattered light from a point of interest external probe. An environmental barrier including at least one window separates the probe from the point of interest. An optical tube is disposed adjacent to the environmental barrier and includes a long working length compound lens objective next to the window. A beam splitter and a mirror are at the other end. A mechanical means is used to translated the prove body in the X, Y, and Z directions resulting in a variable focus optical apparatus. Laser light is reflected by the beam splitter and directed toward the compound lens objective, then through the window and focused on the point of interest. Raman scattered light is then collected by the compound lens objective and directed through the beam splitter to a mirror. A device for analyzing the light, such as a monochrometer, is coupled to the mirror.

  18. Remote direct memory access over datagrams

    DOE Patents [OSTI]

    Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

    2014-12-02

    A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

  19. Method to analyze remotely sensed spectral data

    DOE Patents [OSTI]

    Stork, Christopher L.; Van Benthem, Mark H.

    2009-02-17

    A fast and rigorous multivariate curve resolution (MCR) algorithm is applied to remotely sensed spectral data. The algorithm is applicable in the solar-reflective spectral region, comprising the visible to the shortwave infrared (ranging from approximately 0.4 to 2.5 .mu.m), midwave infrared, and thermal emission spectral region, comprising the thermal infrared (ranging from approximately 8 to 15 .mu.m). For example, employing minimal a priori knowledge, notably non-negativity constraints on the extracted endmember profiles and a constant abundance constraint for the atmospheric upwelling component, MCR can be used to successfully compensate thermal infrared hyperspectral images for atmospheric upwelling and, thereby, transmittance effects. Further, MCR can accurately estimate the relative spectral absorption coefficients and thermal contrast distribution of a gas plume component near the minimum detectable quantity.

  20. Remote shock sensing and notification system

    DOE Patents [OSTI]

    Muralidharan, Govindarajan [Knoxville, TN; Britton, Charles L. [Alcoa, TN; Pearce, James [Lenoir City, TN; Jagadish, Usha [Knoxville, TN; Sikka, Vinod K. [Oak Ridge, TN

    2010-11-02

    A low-power shock sensing system includes at least one shock sensor physically coupled to a chemical storage tank to be monitored for impacts, and an RF transmitter which is in a low-power idle state in the absence of a triggering signal. The system includes interface circuitry including or activated by the shock sensor, wherein an output of the interface circuitry is coupled to an input of the RF transmitter. The interface circuitry triggers the RF transmitter with the triggering signal to transmit an alarm message to at least one remote location when the sensor senses a shock greater than a predetermined threshold. In one embodiment the shock sensor is a shock switch which provides an open and a closed state, the open state being a low power idle state.

  1. Remote shock sensing and notification system

    DOE Patents [OSTI]

    Muralidharan, Govindarajan; Britton, Charles L.; Pearce, James; Jagadish, Usha; Sikka, Vinod K.

    2008-11-11

    A low-power shock sensing system includes at least one shock sensor physically coupled to a chemical storage tank to be monitored for impacts, and an RF transmitter which is in a low-power idle state in the absence of a triggering signal. The system includes interference circuitry including or activated by the shock sensor, wherein an output of the interface circuitry is coupled to an input of the RF transmitter. The interface circuitry triggers the RF transmitting with the triggering signal to transmit an alarm message to at least one remote location when the sensor senses a shock greater than a predetermined threshold. In one embodiment the shock sensor is a shock switch which provides an open and a closed state, the open state being a low power idle state.

  2. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    BSAFE SSL-C Lets Remote Users Decrypt SSLTLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSLTLS ...

  3. User guide for remote access to VDI and Workplace using RSA token...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and ...

  4. User Guide for Remote Access to VDI/Workplace Using PIV | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    User Guide for Remote Access to VDIWorkplace Using PIV User Guide for Remote Access to VDIWorkplace Using PIV User guide for remote access to VDIWorkplace using a PIV card . PDF ...

  5. Final report : impacts analysis for cyber attack on electric power systems (national SCADA test bed FY09).

    SciTech Connect (OSTI)

    Stamp, Jason Edwin; LaViolette, Randall A.; Gardiner, Judith D.

    2009-09-01

    The development continues for Finite State Abstraction (FSA) methods to enable Impacts Analysis (IA) for cyber attack against power grid control systems. Building upon previous work, we successfully demonstrated the addition of Bounded Model Checking (BMC) to the FSA method, which constrains grid conditions to reasonable behavior. The new FSA feature was successfully implemented and tested. FSA is an important part of IA for the power grid, complementing steady-state approaches. It enables the simultaneous evaluation of myriad dynamic trajectories for the system, which in turn facilitates IA for whole ranges of system conditions simultaneously. Given the potentially wide range and subtle nature of potential control system attacks, this is a promising research approach. In this report, we will explain the addition of BMC to the previous FSA work and some testing/simulation upon the implemented code using a two-bus test system. The current FSA approach and code allow the calculation of the acceptability of power grid conditions post-cyber attack (over a given time horizon and for a specific grid topology). Future work will enable analysis spanning various topologies (to account for switching events), as well as an understanding of the cyber attack stimuli that can lead to undesirable grid conditions.

  6. Intergranular attack and stress corrosion cracking of Alloy 600 in high-temperature caustic solutions containing contaminants

    SciTech Connect (OSTI)

    Bandy, R.; Roberge, R.; van Rooyen, D.

    1985-06-01

    Concentrated caustic is a primary cause of stress corrosion cracking and intergranular attack of Alloy 600 tubing in PWRs. However, temperature, electrochemical potential, stress, and metallurgical state all play a role. This study provides the quantitative evidence needed to develop models of crack growth and to devise effective countermeasures.

  7. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  8. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  9. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive Resolvers V-172: ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive...

  10. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code ...

  11. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote ... Vendor fixes are available at Cisco Support Addthis Related Articles V-048: Cisco Wireless ...

  12. U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6,...

  13. U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-046: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers November 28, 2011 -...

  14. Remote control of a scanning electron microscope aperture and gun alignment

    DOE Patents [OSTI]

    Cramer, Charles E.; Campchero, Robert J.

    2003-10-07

    This invention relates to a remote control system which through gear motors coupled to the scanning electron microscope (SEM) manual control knobs readily permits remote adjustments as necessary.

  15. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information

  16. Remote I/O : fast access to distant storage.

    SciTech Connect (OSTI)

    Foster, I.; Kohr, D., Jr.; Krishnaiyer, R.; Mogill, J.

    1997-12-17

    As high-speed networks make it easier to use distributed resources, it becomes increasingly common that applications and their data are not colocated. Users have traditionally addressed this problem by manually staging data to and from remote computers. We argue instead for a new remote I/O paradigm in which programs use familiar parallel I/O interfaces to access remote file systems. In addition to simplifying remote execution, remote I/O can improve performance relative to staging by overlapping computation and data transfer or by reducing communication requirements. However, remote I/O also introduces new technical challenges in the areas of portability, performance, and integration with distributed computing systems. We propose techniques designed to address these challenges and describe a remote I/O library called RIO that we have developed to evaluate the effectiveness of these techniques. RIO addresses issues of portability by adopting the quasi-standard MPI-IO interface and by defining a RIO device and RIO server within the ADIO abstract I/O device architecture. It addresses performance issues by providing traditional I/O optimizations such as asynchronous operations and through implementation techniques such as buffering and message forwarding to off load communication overheads. RIO uses the Nexus communication library to obtain access to configuration and security mechanisms provided by the Globus wide area computing tool kit. Microbenchmarks and application experiments demonstrate that our techniques achieve acceptable performance in most situations and can improve turnaround time relative to staging.

  17. Remote handling facility and equipment used for space truss assembly

    SciTech Connect (OSTI)

    Burgess, T.W.

    1987-01-01

    The ACCESS truss remote handling experiments were performed at Oak Ridge National Laboratory's (ORNL's) Remote Operation and Maintenance Demonstration (ROMD) facility. The ROMD facility has been developed by the US Department of Energy's (DOE's) Consolidated Fuel Reprocessing Program to develop and demonstrate remote maintenance techniques for advanced nuclear fuel reprocessing equipment and other programs of national interest. The facility is a large-volume, high-bay area that encloses a complete, technologically advanced remote maintenance system that first began operation in FY 1982. The maintenance system consists of a full complement of teleoperated manipulators, manipulator transport systems, and overhead hoists that provide the capability of performing a large variety of remote handling tasks. This system has been used to demonstrate remote manipulation techniques for the DOE, the Power Reactor and Nuclear Fuel Development Corporation (PNC) of Japan, and the US Navy in addition to the National Aeronautics and Space Administration. ACCESS truss remote assembly was performed in the ROMD facility using the Central Research Laboratory's (CRL) model M-2 servomanipulator. The model M-2 is a dual-arm, bilateral force-reflecting, master/slave servomanipulator which was jointly developed by CRL and ORNL and represents the state of the art in teleoperated manipulators commercially available in the United States today. The model M-2 servomanipulator incorporates a distributed, microprocessor-based digital control system and was the first successful implementation of an entirely digitally controlled servomanipulator. The system has been in operation since FY 1983. 3 refs., 2 figs.

  18. Remote Chemical Sensing Using Quantum Cascade Lasers

    SciTech Connect (OSTI)

    Harper, Warren W.; Strasburg, Jana D.; Aker, Pam M.; Schultz, John F.

    2004-01-20

    Research done by the IR sensors team at PNNL is focused on developing advanced spectroscopic methods for detecting signatures of nuclear, chemical, biological and explosives weapons or weapons production. The sensors we develop fall into two categories: remote sensors that can be operated at distances ranging from 150 m to 10 km, and point sensors that are used for in-situ inspection and detection. FY03 has seen an explosion in FM DIAL progress with the net result being solid confirmation that FM DIAL is a technique capable of remote chemical monitoring in a wide variety of venues. For example, FM DIAL was used to detect a small plume of hydrogen sulfide, a candidate CW agent, released in the desert environment of the Hanford 200 Area site. These experiments were conducted over a range of physical conditions including outside temperatures ranging from 70 F to 105 F and turbulence conditions ranging from quiescent to chaotic. We are now rapidly developing the information needed to design prototype FM DIAL systems that are optimized for specific applications that include scenarios such as fixed position stand-off detection and mobile UAV mounted remote monitoring. Just as an example, in FY04 we will use FM DIAL to detect both in-facility and outdoor release of enriched UF6. The rapid progress in FM DIAL research made in FY03 is attributed to several advances. First, final construction of a custom-designed trailer allowed the instrument to be housed in a mobile temperature-controlled environment. This allowed the experiment to be transported to several locations so that data could be collected under a range of physical conditions. This has led to a better understanding of a variety of experimental noise sources. With this knowledge, we have been able to implement several changes in the way the FM DIAL data is collected and processed, with the net result being a drastic improvement in our confidence of analyte concentration measurement and an improvement i n the instrument detection limit. The range of chemicals detectable by FM DIAL has also been extended. Prior to FY03 only water and nitrous oxide (N2O) had been seen. Experiments on extending the tuning range of the quantum cascade laser (QCL) currently used in the experiments demonstrate that many more species are now accessible including H2S, C2F4H2, and CH4. We additionally demonstrated that FM DIAL measurements can be made using short wave infrared (SWIR) telecommunications lasers. While measurements made using these components are noisier because turbulence and particulate matter cause more interference in this spectral region, monitoring in this region enables larger species to be detected simply because these lasers have a greater tuning range. In addition, SWIR monitoring also allows for the detection of second-row hydride species such as HF and HCl, which are important nuclear and CWA proliferation signatures.

  19. Project Plan Remote Target Fabrication Refurbishment Project

    SciTech Connect (OSTI)

    Bell, Gary L; Taylor, Robin D

    2009-08-01

    In early FY2009, the DOE Office of Science - Nuclear Physics Program reinstated a program for continued production of {sup 252}Cf and other transcurium isotopes at the Radiochemical Engineering Development Center (REDC) at Oak Ridge National Laboratory (ORNL). The FY2009 major elements of the workscope are as follows: (1) Recovery and processing of seven transuranium element targets undergoing irradiation at the High Flux Isotope Reactor (HFIR) at ORNL; (2) Development of a plan to manufacture new targets for irradiation beginning in early- to mid-FY10 to supply irradiated targets for processing Campaign 75 (TRU75); and (3) Refurbishment of the target manufacturing equipment to allow new target manufacture in early FY10 The {sup 252}Cf product from processing Campaign 74 (recently processed and currently shipping to customers) is expected to supply the domestic demands for a period of approximately two years. Therefore it is essential that new targets be introduced for irradiation by the second quarter of FY10 (HFIR cycle 427) to maintain supply of {sup 252}Cf; the average irradiation period is {approx}10 HFIR cycles, requiring about 1.5 calendar years. The strategy for continued production of {sup 252}Cf depends upon repairing and refurbishing the existing pellet and target fabrication equipment for one additional target production campaign. This equipment dates from the mid-1960s to the late 1980s, and during the last target fabrication campaign in 2005- 2006, a number of component failures and operations difficulties were encountered. It is expected that following the target fabrication and acceptance testing of the targets that will supply material for processing Campaign 75 a comprehensive upgrade and replacement of the remote hot-cell equipment will be required prior to subsequent campaigns. Such a major refit could start in early FY 2011 and would take about 2 years to complete. Scope and cost estimates for the repairs described herein were developed, and authorization for the work was received in July 2009 under the Remote Target Fabrication Refurbishment Task of the Enhanced Utilization of Isotope Facilities project (Project Identification Code 2005230) funded by the American Recovery and Reinvestment Act of 2009. The goal of this project is to recover the capability to produce 4-5 curium targets for the irradiation period starting with HFIR cycle 427, currently scheduled to begin 2/17/10. Assuming success, the equipment would then be used to fabricate 6-7 additional targets to hold for the next irradiation campaign specified by the program. Specific objectives are the return to functionality of the Cubicle 3 Pellet Fabrication Line; Cubicle 2 Target Assembly equipment; and Cubicle 1 Target Inspection and Final Assembly system.

  20. Remote-Handled Transuranic Content Codes

    SciTech Connect (OSTI)

    Washington TRU Solutions

    2006-12-01

    The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document describes the inventory of RH-TRU waste within the transportation parameters specified by the Remote-Handled Transuranic Waste Authorized Methods for Payload Control (RH-TRAMPAC).1 The RH-TRAMPAC defines the allowable payload for the RH-TRU 72-B. This document is a catalog of RH-TRU 72-B authorized contents by site. A content code is defined by the following components: A two-letter site abbreviation that designates the physical location of the generated/stored waste (e.g., ID for Idaho National Laboratory [INL]). The site-specific letter designations for each of the sites are provided in Table 1. A three-digit code that designates the physical and chemical form of the waste (e.g., content code 317 denotes TRU Metal Waste). For RH-TRU waste to be transported in the RH-TRU 72-B, the first number of this three-digit code is 3. The second and third numbers of the three-digit code describe the physical and chemical form of the waste. Table 2 provides a brief description of each generic code. Content codes are further defined as subcodes by an alpha trailer after the three-digit code to allow segregation of wastes that differ in one or more parameter(s). For example, the alpha trailers of the subcodes ID 322A and ID 322B may be used to differentiate between waste packaging configurations. As detailed in the RH-TRAMPAC, compliance with flammable gas limits may be demonstrated through the evaluation of compliance with either a decay heat limit or flammable gas generation rate (FGGR) limit per container specified in approved content codes. As applicable, if a container meets the watt*year criteria specified by the RH-TRAMPAC, the decay heat limits based on the dose-dependent G value may be used as specified in an approved content code. If a site implements the administrative controls outlined in the RH-TRAMPAC and Appendix 2.4 of the RH-TRU Payload Appendices, the decay heat or FGGR limits based on a 10-day shipping period (rather than the standard 60-day shipping period) may be used as specified in an approved content code.

  1. NREL: Technology Deployment - Remote Shading Tool Has Potential to Reduce

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Solar Soft Costs by 17 Cents/Watt Remote Shading Tool Has Potential to Reduce Solar Soft Costs by 17 Cents/Watt Publications Solar Census-Perfecting the Art of Automated, Remote Solar Shading Assessments Sponsors U.S. DOE SunShot Incubator Program Key Partners Solar Census Related Stories Solarize Contact Otto VanGeet, 303-384-7369 A solar heat map of a community from the new remote shading tool software The National Renewable Energy Laboratory (NREL), in partnership with Solar Census, and

  2. Massively Multi-core Acceleration of a Document-Similarity Classifier to Detect Web Attacks

    SciTech Connect (OSTI)

    Ulmer, C; Gokhale, M; Top, P; Gallagher, B; Eliassi-Rad, T

    2010-01-14

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37MB/s at slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  3. Tritium in the World Trade Center September 11, 2001 Terrorist Attack: It's Possible Sources and Fate

    SciTech Connect (OSTI)

    Parekh, P; Semkow, T; Husain, L; Haines, D; Woznial, G; Williams, P; Hafner, R; Rabun, R

    2002-05-03

    Traces of tritiated water (HTO) were determined at World Trade Center (WTC) ground zero after the 9/11/01 terrorist attack. A method of ultralow-background liquid scintillation counting was used after distilling HTO from the samples. A water sample from the WTC sewer, collected on 9/13/01, contained 0.174{plus_minus}0.074 (2{sigma}) nCi/L of HTO. A split water sample, collected on 9/21/01 from the basement of WTC Building 6, contained 3.53{plus_minus}0.17 and 2.83{plus_minus}0.15 nCi/L, respectively. Several water and vegetation samples were analyzed from areas outside the ground zero, located in Manhattan, Brooklyn, Queens, and Kensico Reservoir. No HTO above the background was found in those samples. All these results are well below the levels of concern to human exposure. Several tritium radioluminescent (RL) devices were investigated as possible sources of the traces of tritium at ground zero. Tritium is used in self-luminescent emergency EXIT signs. No such signs were present inside the WTC buildings. However, it was determined that Boeing 767-222 aircraft operated by the United Airlines that hit WTC Tower 2 as well as Boeing 767-223ER operated by the American Airlines, that hit WTC Tower 1, had a combined 34.3 Ci of tritium at the time of impact. Other possible sources of tritium include dials and lights of fire and emergency equipment, sights and scopes in weaponry, as well as time devices equipped with tritium dials. It was determined that emergency equipment was not a likely source. However, WTC hosted several law-enforcement agencies such as ATF, CIA, US Secret Service and US Customs. The ATF office had two weapon vaults in WTC Building 6. Also 63 Police Officers, possibly carrying handguns with tritium sights, died in the attack. The weaponry containing tritium was therefore a likely and significant source of tritium. It is possible that some of the 2830 victims carried tritium watches, however this source appears to be less significant that the other two. The fate of tritium in the attack depended on its chemistry. Any tritium present in the vicinity of jet-fuel explosion or fire would convert to HTO. The molecular tritium is also known to quickly exchange with water adsorbed on surfaces at ambient temperatures. Therefore, the end product of reacted tritium was HTO. A part of it would disperse into the atmosphere and a part would remain on site. The dynamic aspect of HTO removal was investigated taking into a consideration water flow at ground zero. Most of ground zero is encircled by the Slurry Wall, 70 ft deep underground, called a Bathtub. Approximately three million gallons of water were hosed on site in the fire-fighting efforts, and 1 million gallons fell as rainwater, between 9/11 and 9/21 (the day of the reported measurement). The combined water percolated through the debris down to the bottom of the Bathtub dissolving and removing HTO with it. That water would meet and combine with the estimated 26 million gallons of water that leaked from the Hudson River as well as broken mains, during the same period of 10 days after the attack. The combined water was collecting in the PATH train tunnel and continuously being pumped out to prevent flooding. A %Box model of water flow was developed to describe the above scenario. Considering the uncertainty in the amount of tritium present from sources other than the aircraft, as well as the dynamic character of tritium removal from the site, it is feasible to provide only a qualitative picture of the fate and behavior of tritium at WTC with the limited experimental data available. If the time history of tritium concentration at WTC had been measured, this study could have been a tracer study of water flow at WTC possibly useful to civil engineering.

  4. LNG links remote supplies and markets

    SciTech Connect (OSTI)

    Avidan, A.A.; Gardner, R.E.; Nelson, D.; Borrelli, E.N.; Rethore, T.J.

    1997-06-02

    Liquefied natural gas (LNG) has established a niche for itself by matching remote gas supplies to markets that both lacked indigenous gas reserves and felt threatened in the aftermath of the energy crises of the 1970s and 1980s. It has provided a cost-effective energy source for these markets, while also offering an environmentally friendly fuel long before that was fashionable. The introduction of natural-gas use via LNG in the early years (mostly into France and Japan) has also allowed LNG to play a major role in developing gas infrastructure. Today, natural gas, often supplied as LNG, is particularly well-suited for use in the combined cycle technology used in independent power generation projects (IPPs). Today, LNG players cannot simply focus on monetizing gas resources. Instead, they must adapt their projects to meet the needs of changing markets. The impact of these changes on the LNG industry has been felt throughout the value chain from finding and producing gas, gas treatment, liquefaction, transport as a liquid, receiving terminals and regasification, and finally, to consumption by power producers, industrial users, and households. These factors have influenced the evolution of the LNG industry and have implications for the future of LNG, particularly in the context of worldwide natural gas.

  5. Remote Alaskan Communities Energy Efficiency Competition Social Media Kit

    Broader source: Energy.gov [DOE]

    Alaska Stakeholders—Below you will find some pre-written Facebook post suggestions for getting the word out about the Remote Alaskan Communities Energy Efficiency Competition to communities. Please check back throughout the month for more updates.

  6. Energy Department Announces Request for Information on the Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Aligning with President Obama's commitment to combat climate change and assist remote Alaskan ... The full RFI and additional information can be found here. Responses are due by 5:00 ...

  7. Remote Area Modular Monitoring (RAMM) infographic | Argonne National

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Alaskan Communities Energy Efficiency Competition (RACEE) Technical Assistance Guide March 2016 2 Technical Assistance Table of Contents How to Use this Guide ......................................................... Page 2 Technical Assistance Provider Network ..........................................................Page 2 * Regional Liaisons ..........................................................Page 4 * Regional Liaison Contact List

  8. ARM - Field Campaign - Scintillometry and Soil Moisture Remote...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Send us a note below or call us at 1-888-ARM-DATA. Send Campaign : Scintillometry and Soil Moisture Remote Sensing 2015.06.01 - 2015.10.31 Lead Scientist : Jan Hendrickx...

  9. Gas Cleaning for Remote Solid Oxide Fuel Cell (SOFC) Applications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    opportunities and impurity issues Gas Cleaning for Remote SOFC Applications ... Sulfur Cleaning - Well head and Associated Gas Sulfur makeup g g g ge e e en n n ne e e er ...

  10. Remote hard copy. Volume 3. Systems programming manual

    SciTech Connect (OSTI)

    Simons, R.W.

    1980-03-01

    The software used to operate and maintain the remote hard copy is described. All operating software that runs in the NOVA minicomputers is covered as are various utility and diagnostic programs used for creating and checking this software. 2 figures.

  11. The Fundamental Limitation of Atmospheric Remote Sensing by Dissection...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Sensing by Dissection of Single-Photon State Space, and the Paradigms that Lie Beyond Illustrated with WAIL, O2 A-BandLine Spectroscopy, Etc. Davis, Anthony Los Alamos...

  12. ARM - Field Campaign - Remote Cloud Sensing (RCS) Field Evaluation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    govCampaignsRemote Cloud Sensing (RCS) Field Evaluation ARM Data Discovery Browse Data Comments? We would love to hear from you Send us a note below or call us at 1-888-ARM-DATA....

  13. Draft Environmental Assessment on the Remote-handled Waste Disposition...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Draft Environmental Assessment on the Remote-handled Waste Disposition Project available for public review and comment The U.S. Department of Energy invites the public to review...

  14. Powering Remote Northern Villages with the Midnight Sun

    Energy Savers [EERE]

    POWERING REMOTE POWERING REMOTE NORTHERN VILLAGES WITH NORTHERN VILLAGES WITH THE MIDNIGHT SUN THE MIDNIGHT SUN Lance Whitwell, Lance Whitwell, Tribal Energy Manager Tribal Energy Manager Marjorie John, Marjorie John, Assistant Energy Manager Assistant Energy Manager Myles O'Kelly, Myles O'Kelly, Independence Power & Energy Consulting Independence Power & Energy Consulting Department of Energy Office of Energy Efficiency and Renewable Energy TRIBAL ENERGY PROGRAM FY2004 Year End Project

  15. Remote System for Characterizing, Monitoring and Inspecting the Inside of

    Office of Scientific and Technical Information (OSTI)

    Contaminated Nuclear Stacks (Conference) | SciTech Connect Conference: Remote System for Characterizing, Monitoring and Inspecting the Inside of Contaminated Nuclear Stacks Citation Details In-Document Search Title: Remote System for Characterizing, Monitoring and Inspecting the Inside of Contaminated Nuclear Stacks The Stack Characterization System (SCS) is a collaborative project with the Robotics and Energetic Systems Group (RESG) at Oak Ridge National Laboratory (ORNL) and the Applied

  16. Mapping suitability areas for concentrated solar power plants using remote

    Office of Scientific and Technical Information (OSTI)

    sensing data (Journal Article) | DOE PAGES DOE PAGES Search Results Accepted Manuscript: Mapping suitability areas for concentrated solar power plants using remote sensing data Title: Mapping suitability areas for concentrated solar power plants using remote sensing data The political push to increase power generation from renewable sources such as solar energy requires knowing the best places to site new solar power plants with respect to the applicable regulatory, operational, engineering,

  17. Power plant emissions verified remotely at Four Corners sites

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Power plant emissions verified remotely Power plant emissions verified remotely at Four Corners sites The study is the first to show that space-based techniques can successfully verify international regulations on fossil energy emissions. May 19, 2014 The Four Corners coal-fired power plant, near Farmington, N.M. is a major source of pollutants, with measurements confirmed by Los Alamos National Laboratory researchers. The Four Corners coal-fired power plant, near Farmington, N.M. is a major

  18. Processing and Disposition of Remote-Handled Transuranic Liquid Waste

    Office of Scientific and Technical Information (OSTI)

    Generated at Oak Ridge National Laboratory (Conference) | SciTech Connect SciTech Connect Search Results Conference: Processing and Disposition of Remote-Handled Transuranic Liquid Waste Generated at Oak Ridge National Laboratory Citation Details In-Document Search Title: Processing and Disposition of Remote-Handled Transuranic Liquid Waste Generated at Oak Ridge National Laboratory Authors: Robinson, Sharon M [1] ; DePaoli, David W [1] ; Jubin, Robert Thomas [1] ; Patton, Bradley D [1] ;

  19. Solid state laser media driven by remote nuclear powered fluorescence

    DOE Patents [OSTI]

    Prelas, Mark A.

    1992-01-01

    An apparatus is provided for driving a solid state laser by a nuclear powered fluorescence source which is located remote from the fluorescence source. A nuclear reaction produced in a reaction chamber generates fluorescence or photons. The photons are collected from the chamber into a waveguide, such as a fiber optic waveguide. The waveguide transports the photons to the remote laser for exciting the laser.

  20. Remote Control of Laboratory Equipment for Educational Purposes | Princeton

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Plasma Physics Lab Remote Control of Laboratory Equipment for Educational Purposes This invention consists of a method to remote control many types of laboratory equipment that is typically found in an undergraduate science (physics, chemistry, biology, engineering, etc.) course. The invention uses a web browser to create a virtual interface to the equipment and a web cam to stream real-time video. . It is designed for educational purposes, either for universities or high schools that do not

  1. JLab Guest Lecturer Discusses Hurricane Hunting - By Remote Control! On

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    April 14 | Jefferson Lab JLab Guest Lecturer Discusses Hurricane Hunting - By Remote Control! On April 14 JLab Guest Lecturer Discusses Hurricane Hunting - By Remote Control! On April 14 NEWPORT NEWS, Va., March 2, 2009 - Learn how the National Oceanic and Atmospheric Administration and National Aeronautics and Space Administration are using an unmanned aircraft system to gain information never before gathered about tropical storm systems and how this data is helping them better understand

  2. Advanced Remote Maintenance Design for Pilot-Scale Centrifugal Contactors

    Office of Scientific and Technical Information (OSTI)

    (Journal Article) | SciTech Connect Journal Article: Advanced Remote Maintenance Design for Pilot-Scale Centrifugal Contactors Citation Details In-Document Search Title: Advanced Remote Maintenance Design for Pilot-Scale Centrifugal Contactors Advanced designs of used nuclear fuel recycling processes and radioactive waste treatment processes are expected to include more ambitious goals for aqueous based separations including; higher separations efficiency, high-level waste minimization, and

  3. Advanced polychromator systems for remote chemical sensing (LDRD project

    Office of Scientific and Technical Information (OSTI)

    52575). (Technical Report) | SciTech Connect Advanced polychromator systems for remote chemical sensing (LDRD project 52575). Citation Details In-Document Search Title: Advanced polychromator systems for remote chemical sensing (LDRD project 52575). The objective of this LDRD project was to develop a programmable diffraction grating fabricated in SUMMiT V{trademark}. Two types of grating elements (vertical and rotational) were designed and demonstrated. The vertical grating element utilized

  4. Remote Alaskan Communities Energy Efficiency Competition | Department of

    Office of Environmental Management (EM)

    Remote Access Options November 2013 Remote Access Options for EITS Customers If access is required to DOE Headquarters internal network resources, such as messaging, productivity tools or network-stored files and folders while away from the DOE building, you can access them through a Virtual Private Network. Follow the instructions below. (Note: You must have access to the Internet to use these services) Virtual Private Network A Virtual Private Network (VPN) is a private connection between two

  5. Visapult: A Prototype Remote and Distributed Visualization Application and

    Office of Scientific and Technical Information (OSTI)

    Framework (Conference) | SciTech Connect Conference: Visapult: A Prototype Remote and Distributed Visualization Application and Framework Citation Details In-Document Search Title: Visapult: A Prototype Remote and Distributed Visualization Application and Framework We describe an approach used for implementing a highly efficient and scalable method for direct volume rendering. Our approach uses a pipelined-parallel decomposition composed of parallel computers and commodity desktop hardware.

  6. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system.

  7. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information

    Broader source: Energy.gov [DOE]

    Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information.

  8. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service.

  9. Energy storage for hybrid remote power systems

    SciTech Connect (OSTI)

    Isherwood, W., LLNL

    1998-03-01

    Energy storage can be a cost-effective component of hybrid remote power systems. Storage serves the special role of taking advantage of intermittent renewable power sources. Traditionally this role has been played by lead-acid batteries, which have high life-cycle costs and pose special disposal problems. Hydrogen or zinc-air storage technologies can reduce life-cycle costs and environmental impacts. Using projected data for advanced energy storage technologies, LLNL ran an optimization for a hypothetical Arctic community with a reasonable wind resource (average wind speed 8 m/s). These simulations showed the life-cycle annualized cost of the total energy system (electric plus space heating) might be reduced by nearly 40% simply by adding wind power to the diesel system. An additional 20 to 40% of the wind-diesel cost might be saved by adding hydrogen storage or zinc-air fuel cells to the system. Hydrogen produced by electrolysis of water using intermittent, renewable power provides inexpensive long-term energy storage. Conversion back to electricity with fuel cells can be accomplished with available technology. The advantages of a hydrogen electrolysis/fuel cell system include low life-cycle costs for long term storage, no emissions of concern, quiet operation, high reliability with low maintenance, and flexibility to use hydrogen as a direct fuel (heating, transportation). Disadvantages include high capital costs, relatively low electrical turn-around efficiency, and lack of operating experience in utility settings. Zinc-air fuel cells can lower capital and life-cycle costs compared to hydrogen, with most of the same advantages. Like hydrogen systems, zinc-air technology promises a closed system for long-term storage of energy from intermittent sources. The turn around efficiency is expected to exceed 60%, while use of waste heat can potentially increase overall energy efficiency to over 80%.

  10. Final report : impacts analysis for cyber attack on electric power systems (National SCADA Test Bed FY08).

    SciTech Connect (OSTI)

    Phillips, Laurence R.; Richardson, Bryan T.; Stamp, Jason Edwin; LaViolette, Randall A.

    2009-02-01

    To analyze the risks due to cyber attack against control systems used in the United States electrical infrastructure, new algorithms are needed to determine the possible impacts. This research is studying the Reliability Impact of Cyber ttack (RICA) in a two-pronged approach. First, malevolent cyber actions are analyzed in terms of reduced grid reliability. Second, power system impacts are investigated using an abstraction of the grid's dynamic model. This second year of esearch extends the work done during the first year.

  11. High-Resolution Characterization of Intergranular Attack and Stress Corrosion Cracking of Alloy 600 in High-Temperature Primary Water

    SciTech Connect (OSTI)

    Thomas, Larry E.; Bruemmer, Stephen M.

    2000-06-01

    Intergranular (IG) attack regions and stress-corrosion cracks in alloy 600 U-bend samples tested in 330C, pressurized-water-reactor water have been characterized by analytical transmission electron microscopy (ATEM). Observations of cross-sectional samples revealed short oxidized zones preceding crack tips and narrow (10-nm wide), deeply penetrated, oxidized zones along grain boundaries exposed along open cracks. High-resolution TEM imaging and fine-probe analysis were used to determine the local chemistries and structures in these corrosion-affected zones. Matrix areas surrounding the crack tips appeared highly strained, whereas the IG penetrations generally did not. The predominant oxide structure found along crack walls and just ahead of crack tips was NiO with metal-atom ratios similar to the alloy. The attacked grain boundaries off open cracks contained similar fine-grained NiO-structure oxide together with local areas of Cr-rich oxide and Ni-rich metal. In contrast, Cr-rich oxide identified as Cr2O3 predominated at the leading edges of the IG attack. Stereoscopic imaging of these tip structures revealed nm-scale porosity and tunnels within the oxide and pores along the grain-boundary plane ahead of the oxide. The general interpretation of these results is that IG attack and cracking follows local dissolution or oxidation and the formation of pores at grain boundaries. This degradation occurs at the nanometer scale and therefore requires high-resolution ATEM methods to reveal detailed characteristics. Experimental support for several possible IG degradation mechanisms is considered.

  12. Remote sensing for wind power potential: a prospector's handbook

    SciTech Connect (OSTI)

    Wade, J.E.; Maule, P.A.; Bodvarsson, G.; Rosenfeld, C.L.; Woolley, S.G.; McClenahan, M.R.

    1983-02-01

    Remote sensing can aid in identifying and locating indicators of wind power potential from the terrestrial, marine, and atmospheric environments (i.e.: wind-deformed trees, white caps, and areas of thermal flux). It is not considered as a tool for determining wind power potential. A wide variety of remotely sensed evidence is described in terms of the scale at which evidence of wind power can be identified, and the appropriate remote sensors for finding such evidence. Remote sensing can be used for regional area prospecting using small-scale imagery. The information from such small-scale imagery is most often qualitative, and if it is transitory, examination of a number of images to verify presistence of the feature may be required. However, this evidence will allow rapid screening of a large area. Medium-scale imagery provides a better picture of the evidence obtained from small-scale imagery. At this level it is best to use existing imagery. Criteria relating to land use, accessibility, and proximity of candidate sites to nearby transmission lines can also be effectively evaluated from medium-scale imagery. Large-scale imagery provides the most quantitative evidence of the strength of wind. Wind-deformed trees can be identified at a large number of sites using only a few hours in locally chartered aircraft. A handheld 35mm camera can adequately document any evidence of wind. Three case studies that employ remote sensing prospecting techniques are described. Based on remotely sensed evidence, the wind power potential in three geographically and climatically diverse areas of the United States is estimated, and the estimates are compared to actual wind data in those regions. In addition, the cost of each survey is discussed. The results indicate that remote sensing for wind power potential is a quick, cost effective, and fairly reliable method for screening large areas for wind power potential.

  13. Snail/beta-catenin signaling protects breast cancer cells from hypoxia attack

    SciTech Connect (OSTI)

    Scherbakov, Alexander M.; Stefanova, Lidia B.; Sorokin, Danila V.; Semina, Svetlana E.; Berstein, Lev M.; Krasilnikov, Mikhail A.

    2013-12-10

    The tolerance of cancer cells to hypoxia depends on the combination of different factors from increase of glycolysis (Warburg Effect) to activation of intracellular growth/apoptotic pathways. Less is known about the influence of epithelialmesenchymal transition (EMT) and EMT-associated pathways on the cell sensitivity to hypoxia. The aim of this study was to explore the role of Snail signaling, one of the key EMT pathways, in the mediating of hypoxia response and regulation of cell sensitivity to hypoxia, using as a model in vitro cultured breast cancer cells. Earlier we have shown that estrogen-independent HBL-100 breast cancer cells differ from estrogen-dependent MCF-7 cells with increased expression of Snail1, and demonstrated Snail1 involvement into formation of hormone-resistant phenotype. Because Snail1 belongs to hypoxia-activated proteins, here we studied the influence of Snail1 signaling on the cell tolerance to hypoxia. We found that Snail1-enriched HBL-100 cells were less sensitive to hypoxia-induced growth suppression if compared with MCF-7 line (31% MCF-7 vs. 71% HBL-100 cell viability after 1% O{sub 2} atmosphere for 3 days). Snail1 knock-down enhanced the hypoxia-induced inhibition of cell proliferation giving the direct evidence of Snail1 involvement into cell protection from hypoxia attack. The protective effect of Snail1 was shown to be mediated, at least in a part, via beta-catenin which positively regulated expression of HIF-1-dependent genes. Finally, we found that cell tolerance to hypoxia was accompanied with the failure in the phosphorylation of AMPK the key energy sensor, and demonstrated an inverse relationship between AMPK and Snail/beta-catenin signaling. Totally, our data show that Snail1 and beta-catenin, besides association with loss of hormone dependence, protect cancer cells from hypoxia and may serve as an important target in the treatment of breast cancer. Moreover, we suggest that the level of these proteins as well the level of AMPK phosphorylation may be considered as predictors of the tumor sensitivity to anti-angiogenic drugs. - Highlights: Snail1 protects breast cancer cells from hypoxia. Protective effect of Snail1 is mediated via ?-catenin/HIF-1 pathway. Snail/?-catenin signaling is negatively controlled by the energy sensor AMPK. The failure in AMPK phosphorylation drives cells to the hypoxia-tolerant state.

  14. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service Against Recursive Resolvers

    Broader source: Energy.gov [DOE]

    A defect exists which allows an attacker to crash a BIND 9 recursive resolver with a RUNTIME_CHECK error in resolver.c

  15. Remote Engineering progress report, January-December 1984

    SciTech Connect (OSTI)

    Phillips, D.E.

    1985-12-23

    This report summarizes progress on work performed in the Remote Engineering group at Rocky Flats from January to December 1984. Remote Engineering's goals in all 1984 projects were to help increase production capacity, reduce radiation exposure, improve operation safety, improve product quality, or alleviate material-accounting errors. To convert manual operations to automated operations, Remote Engineering provided design, fabrication, and assembly of new equipment for varied plant operations. Seventeen separate projects were handled by Remote Engineering in 1984. Four of the projects automate related operations in Building 559, the Chemical Analytical Laboratory. In Building 559, the following operations needed mechanizing: Sample Cutting, Storage and Retrieval, Pneumatic Transfer System, and Chemical Operations Robotic System. Remote Engineering has completed the design of the hot-dip zinc-galvanizing furnace, and Maintenance will complete the assembly and installation. Three systems are in production use but are still undergoing development: the Unimate robot, the Laser Marker, and the Ingot Gripper. The Plutonium Oxide/Skull-Burn Furnace is awaiting installation. The other projects are at various states of design and development. These reports reflect the status of the projects as they existed December 31, 1984, except the Future Work sections which were updated August 27, 1985.

  16. U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the WebSVN software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

  17. T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user.

  18. T-722: IBM WebSphere Commerce Edition Input Validation Holes Permit Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the IBM WebSphere software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

  19. Remote Sealing of Canisters for Hot Isostatic Pressing

    SciTech Connect (OSTI)

    Wahlquist, Dennis; Bateman, Ken; Malewitz, Tim

    2015-03-01

    Battelle Energy Alliance, LLC, has successfully tested a remote welding process to seal radioactive waste containers prior to hot isostatic pressing (HIP). Since the 1990s, a variety of radioactive and hazardous waste forms have been remotely treated using HIP during trials within Idaho National Laboratory (INL) hot cells. For HIP treatment at INL, waste was loaded into a stainless-steel or aluminum canister, which was evacuated, seal welded, and placed in a HIP furnace. HIP simultaneously heats and pressurizes the waste, reducing its volume and increasing its stability, thus lowering the cost and risk associated with disposal. Weld integrity must be ensured in order to prevent the spread of contamination during HIP. This paper presents a process for sealing HIP canisters remotely using modified, commercially available equipment. This process includes evacuation, heating, welding, and weld inspection. The process and equipment have proven to reliably seal canisters in continued HIP trials.

  20. Remote-Handled Low Level Waste Disposal Project Alternatives Analysis

    SciTech Connect (OSTI)

    David Duncan

    2010-10-01

    This report identifies, evaluates, and compares alternatives for meeting the U.S. Department of Energy’s mission need for management of remote-handled low-level waste generated by the Idaho National Laboratory and its tenants. Each alternative identified in the Mission Need Statement for the Remote-Handled Low-Level Waste Treatment Project is described and evaluated for capability to fulfill the mission need. Alternatives that could meet the mission need are further evaluated and compared using criteria of cost, risk, complexity, stakeholder values, and regulatory compliance. The alternative for disposal of remote-handled low-level waste that has the highest confidence of meeting the mission need and represents best value to the government is to build a new disposal facility at the Idaho National Laboratory Site.

  1. JTAG-based remote configuration of FPGAs over optical fibers

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Deng, B.; Xu, H.; Liu, C.; Chen, J.; Chen, K.; Gong, D.; Guo, D.; Hou, S.; D. Huang; Liu, T.; et al

    2015-01-28

    In this study, a remote FPGA-configuration method based on JTAG extension over optical fibers is presented. The method takes advantage of commercial components and ready-to-use software such as iMPACT and does not require any hardware or software development. The method combines the advantages of the slow remote JTAG configuration and the fast local flash memory configuration. The method has been verified successfully and used in the Demonstrator of Liquid-Argon Trigger Digitization Board (LTDB) for the ATLAS liquid argon calorimeter Phase-I trigger upgrade. All components on the FPGA side are verified to meet the radiation tolerance requirements.

  2. Sustainable Energy in Remote Indonesian Grids. Accelerating Project Development

    SciTech Connect (OSTI)

    Hirsch, Brian; Burman, Kari; Davidson, Carolyn; Elchinger, Michael; Hardison, R.; Karsiwulan, D.; Castermans, B.

    2015-06-30

    Sustainable Energy for Remote Indonesian Grids (SERIG) is a U.S. Department of Energy (DOE) funded initiative to support Indonesia’s efforts to develop clean energy and increase access to electricity in remote locations throughout the country. With DOE support, the SERIG implementation team consists of the National Renewable Energy Laboratory (NREL) and Winrock International’s Jakarta, Indonesia office. Through technical assistance that includes techno-economic feasibility evaluation for selected projects, government-to-government coordination, infrastructure assessment, stakeholder outreach, and policy analysis, SERIG seeks to provide opportunities for individual project development and a collective framework for national replication office.

  3. T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System

    Broader source: Energy.gov [DOE]

    PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected.

  4. Proliferation detection using a remote resonance Raman chemical sensor

    SciTech Connect (OSTI)

    Sedlacek, A.J.; Chen, C.L.; Dougherty, D.R.

    1993-08-01

    The authors discussed the potential of the resonance Raman chemical sensor as a remote sensor that can be used for gases, liquids or solids. This spectroscopy has the fundamental advantage that it is based on optical fingerprints that are insensitive to environmental perturbations or excitation frequency. By taking advantage of resonance enhancement, the inelastic scattering cross-section can increase anywhere from 4 to 6 orders of magnitude which translates into increased sensing range or lower detection limits. It was also shown that differential cross-sections as small as 10{sup {minus}27} cm{sup 2}/sr do not preclude the use of this technique as being an important component in one`s remote-sensing arsenal. The results obtained in the early 1970s on various pollutants and the more recent work on atmospheric water cast a favorable light on the prospects for the successful development of a resonance Raman remote sensor. Currently, of the 20 CW agent-related {open_quotes}signature{close_quotes} chemicals that the authors have investigated, 18 show enhancements ranging from 3 to 6 orders of magnitude. The absolute magnitudes of the measured resonance enhanced Raman cross-sections for these 18 chemicals suggest that detection and identification of trace quantities of the {open_quotes}signature{close_quotes} chemicals, through a remote resonance Raman chemical sensor, could be achieved.

  5. Structural acceptance criteria Remote Handling Building Tritium Extraction Facility

    SciTech Connect (OSTI)

    Mertz, G.

    1999-12-16

    This structural acceptance criteria contains the requirements for the structural analysis and design of the Remote Handling Building (RHB) in the Tritium Extraction Facility (TEF). The purpose of this acceptance criteria is to identify the specific criteria and methods that will ensure a structurally robust building that will safely perform its intended function and comply with the applicable Department of Energy (DOE) structural requirements.

  6. Synthesis of the unmanned aerial vehicle remote control augmentation system

    SciTech Connect (OSTI)

    Tomczyk, Andrzej

    2014-12-10

    Medium size Unmanned Aerial Vehicle (UAV) usually flies as an autonomous aircraft including automatic take-off and landing phases. However in the case of the on-board control system failure, the remote steering is using as an emergency procedure. In this reason, remote manual control of unmanned aerial vehicle is used more often during take-of and landing phases. Depends on UAV take-off mass and speed (total energy) the potential crash can be very danger for airplane and environment. So, handling qualities of UAV is important from pilot-operator point of view. In many cases the dynamic properties of remote controlling UAV are not suitable for obtaining the desired properties of the handling qualities. In this case the control augmentation system (CAS) should be applied. Because the potential failure of the on-board control system, the better solution is that the CAS algorithms are placed on the ground station computers. The method of UAV handling qualities shaping in the case of basic control system failure is presented in this paper. The main idea of this method is that UAV reaction on the operator steering signals should be similar - almost the same - as reaction of the 'ideal' remote control aircraft. The model following method was used for controller parameters calculations. The numerical example concerns the medium size MP-02A UAV applied as an aerial observer system.

  7. Factors affecting the remotely sensed response of coniferous forest plantations

    SciTech Connect (OSTI)

    Danson, F.M. ); Curran, P.J. )

    1993-01-01

    Remote sensing of forest biophysical properties has concentrated upon forest sites with a wide range of green vegetation amount and thereby leaf area index and canopy cover. However, coniferous forest plantations, an important forest type in Europe, are managed to maintain a large amount of green vegetation with little spatial variation. Therefore, the strength of the remotely sensed signal will, it is hypothesized, be determined more by the structure of this forest than by its cover. Airborne Thematic Mapper (ATM) and SPOT-1 HRV data were used to determine the effects of this structural variation on the remotely sensed response of a coniferous forest plantation in the United Kingdom. Red and near infrared radiance were strongly and negatively correlated with a range of structural properties and with the age of the stands but weakly correlated with canopy cover. A composite variable, related to the volume of the canopy, accounted for over 75% of the variation in near infrared radiance. A simple model that related forest structural variables to the remotely sensed response was used to understand and explain this response from a coniferous forest plantation.

  8. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  9. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis...

  10. T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases.

  11. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle...

  12. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

  13. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote...

  14. U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis...

  15. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM:...

  16. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari...

  17. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

  18. V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service August 23, 2013 - 1:26am...

  19. V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Samba smbd CPU Processing Loop Lets Remote Users Deny Service V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service August 6, 2013 - 6:00am Addthis PROBLEM: A...

  20. V-166: HP-UX Directory Server Discloses Passwords to Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May...

  1. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls ...

  2. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code ... Lets Local Users Gain Elevated Privileges T-536: Cisco ASA Multiple Flaws Let Remote ...

  3. 0.4 kV remote control (Smart Grid Project) | Open Energy Information

    Open Energy Info (EERE)

    .4 kV remote control (Smart Grid Project) Jump to: navigation, search Project Name 0.4 kV remote control Country Denmark Coordinates 56.26392, 9.501785 Loading map......

  4. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote ... The vendor has issued a fix (5.3SP1). Addthis Related Articles V-084: RSA Archer eGRC ...

  5. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May ...

  6. Deadlock during first touch of upc_alloc'd remote memory when...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Reports Deadlock during first touch of upcalloc'd remote memory when target is in upcbarrier Deadlock during first touch of upcalloc'd remote memory when target is in...

  7. V-144: HP Printers Let Remote Users Access Files on the Printer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: HP Printers Let Remote Users Access Files on the Printer V-144: HP Printers Let Remote Users Access Files on the Printer April 29, 2013 - 12:27am Addthis PROBLEM: HP Printers...

  8. U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service.

  9. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code...

  10. T-685: Cisco Warranty CD May Load Malware From a Remote Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Cisco Warranty CD May Load Malware From a Remote Site T-685: Cisco Warranty CD May Load Malware From a Remote Site August 5, 2011 - 3:26pm Addthis PROBLEM: A vulnerability was...

  11. U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information.

  12. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or ...

  13. T-692: VMware vFabric tc Server Lets Remote Users Login Using...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords August 12, 2011 -...

  14. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  15. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  16. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  17. U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system.

  18. U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

  19. T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can cause the backend server to remain in an error state until the retry timeout expires.

  20. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Linux kexec. A remote or local user can obtain potentially sensitive information.

  1. U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases.

  2. U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target

  3. U-135: HP WBEM Discloses Diagnostic Data to Remote and Local Users

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP WBEM. A remote or local user can gain access to diagnostic data.

  4. U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions.

  5. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  6. DEVELOPMENT OF REMOTE HANFORD CONNECTOR GASKET REPLACEMENT TOOLING FOR DWPF

    SciTech Connect (OSTI)

    Krementz, D.; Coughlin, Jeffrey

    2009-05-05

    The Defense Waste Processing Facility (DWPF) requested the Savannah River National Laboratory (SRNL) to develop tooling and equipment to remotely replace gaskets in mechanical Hanford connectors to reduce personnel radiation exposure as compared to the current hands-on method. It is also expected that radiation levels will continually increase with future waste streams. The equipment is operated in the Remote Equipment Decontamination Cell (REDC), which is equipped with compressed air, two master-slave manipulators (MSM's) and an electro-mechanical manipulator (EMM) arm for operation of the remote tools. The REDC does not provide access to electrical power, so the equipment must be manually or pneumatically operated. The MSM's have a load limit at full extension of ten pounds, which limited the weight of the installation tool. In order to remotely replace Hanford connector gaskets several operations must be performed remotely, these include: removal of the spent gasket and retaining ring (retaining ring is also called snap ring), loading the new snap ring and gasket into the installation tool and installation of the new gasket into the Hanford connector. SRNL developed and tested tools that successfully perform all of the necessary tasks. Removal of snap rings from horizontal and vertical connectors is performed by separate air actuated retaining ring removal tools and is manipulated in the cell by the MSM. In order install a new gasket, the snap ring loader is used to load a new snap ring into a groove in the gasket installation tool. A new gasket is placed on the installation tool and retained by custom springs. An MSM lifts the installation tool and presses the mounted gasket against the connector block. Once the installation tool is in position, the gasket and snap ring are installed onto the connector by pneumatic actuation. All of the tools are located on a custom work table with a pneumatic valve station that directs compressed air to the desired tool and vents the tools as needed. Extensive testing of tooling operation was performed in the DWPF manipulator repair shop. This testing allowed the operators to gain confidence before the equipment was exposed to radioactive contamination. The testing also led to multiple design improvements. On July 17 and 29, 2008 the Remote Gasket Replacement Tooling was successfully demonstrated in the REDC at the DWPF of The Savannah River Site.

  7. Geotechnical applications of remote sensing and remote data transmission; Proceedings of the Symposium, Cocoa Beach, FL, Jan. 31-Feb. 1, 1986

    SciTech Connect (OSTI)

    Johnson, A.I.; Pettersson, C.B.

    1988-01-01

    Papers and discussions concerning the geotechnical applications of remote sensing and remote data transmission, sources of remotely sensed data, and glossaries of remote sensing and remote data transmission terms, acronyms, and abbreviations are presented. Aspects of remote sensing use covered include the significance of lineaments and their effects on ground-water systems, waste-site use and geotechnical characterization, the estimation of reservoir submerging losses using CIR aerial photographs, and satellite-based investigation of the significance of surficial deposits for surface mining operations. Other topics presented include the location of potential ground subsidence and collapse features in soluble carbonate rock, optical Fourier analysis of surface features of interest in geotechnical engineering, geotechnical applications of U.S. Government remote sensing programs, updating the data base for a Geographic Information System, the joint NASA/Geosat Test Case Project, the selection of remote data telemetry methods for geotechnical applications, the standardization of remote sensing data collection and transmission, and a comparison of airborne Goodyear electronic mapping system/SAR with satelliteborne Seasat/SAR radar imagery.

  8. Cooperative Remote Monitoring, Arms control and nonproliferation technologies: Fourth quarter 1995

    SciTech Connect (OSTI)

    Alonzo, G M

    1995-01-01

    The DOE`s Cooperative Remote Monitoring programs integrate elements from research and development and implementation to achieve DOE`s objectives in arms control and nonproliferation. The contents of this issue are: cooperative remote monitoring--trends in arms control and nonproliferation; Modular Integrated Monitoring System (MIMS); Authenticated Tracking and Monitoring Systems (ATMS); Tracking and Nuclear Materials by Wide-Area Nuclear Detection (WAND); Cooperative Monitoring Center; the International Remote Monitoring Project; international US and IAEA remote monitoring field trials; Project Dustcloud: monitoring the test stands in Iraq; bilateral remote monitoring: Kurchatov-Argonne-West Demonstration; INSENS Sensor System Project.

  9. Experimental data base for estimating the consequences from a hypothetical sabotage attack on a spent fuel shipping cask

    SciTech Connect (OSTI)

    Sandoval, R.P.; Luna, R.E.

    1986-01-01

    This paper describes the results of a program conducted at Sandia National Laboratories for the US Department of Energy to provide an experimental data base for estimating the radiological health effects that could result from the sabotage of a light water reactor spent fuel shipping cask. The primary objectives of the program were limited to: (1) evaluating the effectiveness of selected high energy devices (HED) in breaching full-scale spent fuel shipping casks, (2) quantifying and characterizing relevant aerosol and radiological properties of the released fuel, and (3) using the resulting experimental data to evaluate the radiological health effects resulting from a hypothetical attack on a spent fuel shipping cask in a densely populated urban area. 3 refs.

  10. Mechanisms of stress corrosion cracking and intergranular attack in Alloy 600 in high temperature caustic and pure water

    SciTech Connect (OSTI)

    Bandy, R.; van Rooyen, D.

    1984-01-01

    In recent years, several studies have been conducted on the intergranular stress corrosion cracking (SCC) and intergranular attack (IGA) of Alloy 600. A combination of SCC and IGA has been observed in Alloy 600 tubing on the hot leg of some operating steam generators in pressurized water reactor (PWR) nuclear power plants, and sodium hydroxide along with several other chemical species have been implicated in the tube degradations. SCC has been observed above and within the tube sheet, whereas IGA is generally localized within the tube sheet. Alloy 600 is also susceptible to SCC in pure and primary water. Various factors that influence SCC and IGA include metallurgical conditions of the alloy, concentrations of alkaline species, impurity content of the environment, temperature and stress. The mechanisms of these intergranular failures, however, are not well understood. Some of the possible mechanisms of the SCC and IGA in high temperature water and caustic are described in this paper.

  11. The Fermilab CMTF cryogenic distribution remote control system

    SciTech Connect (OSTI)

    Pei, L.; Theilacker, J.; Klebaner, A.; Martinez, A.; Bossert, R.

    2014-01-29

    The Cryomodule Test Facility (CMTF) is able to provide the necessary test bed for measuring the performance of Superconducting Radio Frequency (SRF) cavities in a cryomodule (CM). The CMTF have seven 300 KW screw compressors, two liquid helium refrigerators, and two Cryomodule Test Stands (CMTS). CMTS1 is designed for 1.3 GHz cryomodule operating in a pulsed mode (PM) and CMTS2 is for cryomodule operating in Half-Wave (HW) and Continuous Wave (CW) mode. Based on the design requirement, each subsystem has to be far away from each other and be placed in distant locations. Therefore choosing Siemens Process Control System 7-400, DL205 PLC, Synoptic and Fermilab ACNET are the ideal choices for CMTF cryogenic distribution real-time remote control system. This paper presents a method which has been successfully used by many Fermilab distribution cryogenic real-time remote control systems.

  12. A facility to remotely assemble radioisotope thermoelectric generators

    SciTech Connect (OSTI)

    Engstrom, J.W.; Goldmann, L.H.; Truitt, R.W.

    1992-07-01

    Radioisotope Thermoelectric Generators (RTGs) are electrical power sources that use heat from decaying radioisotopes to directly generate electrical power. The RTG assembly process is performed in an inert atmosphere inside a large glovebox, which is surrounded by radiation shielding to reduce exposure to neutron and gamma radiation from the radioisotope heat source. In the past, allowable dose rate limits have allowed direct, manual assembly methods; however, current dose rate limits require a thicker radiation shielding that makes direct, manual assembly infeasible. To minimize RTG assembly process modifications, telerobotic systems are being investigated to perform remote assembly tasks. Telerobotic systems duplicate human arm motion and incorporate force feedback sensitivity to handle objects and tools in a human-like manner. A telerobotic system with two arms and a three-dimensional (3-D) vision system can be used to perform remote RTG assembly tasks inside gloveboxes and cells using unmodified, normal hand tools.

  13. A facility to remotely assemble radioisotope thermoelectric generators

    SciTech Connect (OSTI)

    Engstrom, J.W.; Goldmann, L.H.; Truitt, R.W. )

    1993-01-15

    Radioisotope Thermoelectric Generators (RTGs) are electrical power sources that use heat from decaying radioisotopes to directly generate electrical power. The RTG assembly process is performed in an inert atmosphere inside a large glovebox, which is surrounded by radiation shielding to reduce exposure to neutron and gamma radiation from the radioisotope heat source. In the past, allowable dose rate limits have allowed direct, manual assembly methods; however, current dose rate limits require a thicker radiation shielding that makes direct, manual assembly infeasible. To minimize RTG assembly process modifications, telerobotic systems are being investigated to perform remote assembly tasks. Telerobotic systems duplicate human arm motion and incorporate force feedback sensitivity to handle objects and tools in a human-like manner. A telerobotic system with two arms and a three-dimensional (3-D) vision system can be used to perform remote RTG assembly tasks inside gloveboxes and cells using unmodified, normal hand tools.

  14. Preliminary Analysis of Remote Monitoring & Robotic Concepts for Performance Confirmation

    SciTech Connect (OSTI)

    D.A. McAffee

    1997-02-18

    As defined in 10 CFR Part 60.2, Performance Confirmation is the ''program of tests, experiments and analyses which is conducted to evaluate the accuracy and adequacy of the information used to determine with reasonable assurance that the performance objectives for the period after permanent closure will be met''. The overall Performance Confirmation program begins during site characterization and continues up to repository closure. The main purpose of this document is to develop, explore and analyze initial concepts for using remotely operated and robotic systems in gathering repository performance information during Performance Confirmation. This analysis focuses primarily on possible Performance Confirmation related applications within the emplacement drifts after waste packages have been emplaced (post-emplacement) and before permanent closure of the repository (preclosure). This will be a period of time lasting approximately 100 years and basically coincides with the Caretaker phase of the project. This analysis also examines, to a lesser extent, some applications related to Caretaker operations. A previous report examined remote handling and robotic technologies that could be employed during the waste package emplacement phase of the project (Reference 5.1). This analysis is being prepared to provide an early investigation of possible design concepts and technical challenges associated with developing remote systems for monitoring and inspecting activities during Performance Confirmation. The writing of this analysis preceded formal development of Performance Confirmation functional requirements and program plans and therefore examines, in part, the fundamental Performance Confirmation monitoring needs and operating conditions. The scope and primary objectives of this analysis are to: (1) Describe the operating environment and conditions expected in the emplacement drifts during the preclosure period. (Presented in Section 7.2). (2) Identify and discuss the main Performance Confirmation monitoring needs and requirements during the post-emplacement preclosure period. This includes radiological, non-radiological, host rock, and infrastructure performance monitoring needs. It also includes monitoring for possible off-normal events. (Presented in Section 7.3). (3) Identify general approaches and methods for obtaining performance information from within the emplacement drifts for Performance Confirmation. (Presented in Section 7.4) (4)Review and discuss available technologies and design strategies that may permit the use of remotely operated systems within the hostile thermal and radiation environment expected within the emplacement drifts. (Presented in Section 7.5). (5) Based on Performance Confirmation monitoring needs and available technologies, identify potential application areas for remote systems and robotics for post-emplacement preclosure Performance Confirmation activities (Presented in Section 7.6). (6) Develop preliminary remote monitoring and robotic concepts for post-emplacement, preclosure Performance Confirmation activities. (Presented in Section 7.7) This analysis is being performed very early in the systems engineering cycle, even as issues related to the Performance Confirmation program planning phase are being formulated and while the associated needs, constraints and objectives are yet to be fully determined and defined. This analysis is part of an issue formulation effort and is primarily concerned with identification and description of key issues related to remotely monitoring repository performance for Performance Confirmation. One of the purposes of this analysis is to provide an early investigation of potential design challenges that may have a high impact on future design concepts. This analysis can be used to guide future concept development and help access what is feasible and achievable by application of remote systems technology. Future design and systems engineering analysis with applicable iterations of modeling, optimizing, ranking and refinement of concepts will be needed to arrive at optimal design concepts.

  15. PCDAS Version 2. 2: Remote network control and data acquisition

    SciTech Connect (OSTI)

    Fishbaugher, M.J.

    1987-09-01

    This manual is intended for both technical and non-technical people who want to use the PCDAS remote network control and data acquisition software. If you are unfamiliar with remote data collection hardware systems designed at Pacific Northwest Laboratory (PNL), this introduction should answer your basic questions. Even if you have some experience with the PNL-designed Field Data Acquisition Systems (FDAS), it would be wise to review this material before attempting to set up a network. This manual was written based on the assumption that you have a rudimentary understanding of personal computer (PC) operations using Disk Operating System (DOS) version 2.0 or greater (IBM 1984). You should know how to create subdirectories and get around the subdirectory tree.

  16. Methods and systems for remote detection of gases

    DOE Patents [OSTI]

    Johnson, Timothy J

    2012-09-18

    Novel systems and methods for remotely detecting at least one constituent of a gas via infrared detection are provided. A system includes at least one extended source of broadband infrared radiation and a spectrally sensitive receiver positioned remotely from the source. The source and the receiver are oriented such that a surface of the source is in the field of view of the receiver. The source includes a heating component thermally coupled to the surface, and the heating component is configured to heat the surface to a temperature above ambient temperature. The receiver is operable to collect spectral infrared absorption data representative of a gas present between the source and the receiver. The invention advantageously overcomes significant difficulties associated with active infrared detection techniques known in the art, and provides an infrared detection technique with a much greater sensitivity than passive infrared detection techniques known in the art.

  17. Methods and systems for remote detection of gases

    DOE Patents [OSTI]

    Johnson, Timothy J.

    2007-11-27

    Novel systems and methods for remotely detecting at least one constituent of a gas via infrared detection are provided. A system includes at least one extended source of broadband infrared radiation and a spectrally sensitive receiver positioned remotely from the source. The source and the receiver are oriented such that a surface of the source is in the field of view of the receiver. The source includes a heating component thermally coupled to the surface, and the heating component is configured to heat the surface to a temperature above ambient temperature. The receiver is operable to collect spectral infrared absorption data representative of a gas present between the source and the receiver. The invention advantageously overcomes significant difficulties associated with active infrared detection techniques known in the art, and provides an infrared detection technique with a much greater sensitivity than passive infrared detection techniques known in the art.

  18. Remote sensing of soil radionuclide fluxes in a tropical ecosystem

    SciTech Connect (OSTI)

    Clegg, B.; Koranda, J.; Robinson, W.; Holladay, G.

    1980-11-06

    We are using a transponding geostationary satellite to collect surface environmental data to describe the fate of soil-borne radionuclides. The remote, former atomic testing grounds at the Eniwetok and Bikini Atolls present a difficult environment in which to collect continuous field data. Our land-based, solar-powered microprocessor and environmental data systems remotely acquire measurements of net and total solar radiation, rain, humidity, temperature, and soil-water potentials. For the past year, our water flux model predicts wet season plant transpiration rates nearly equal to the 6 to 7 mm/d evaporation pan rate, which decreases to 2 to 3 mm/d for the dry season. Radioisotopic analysis confirms the microclimate-estimated 1:3 to 1:20 soil to plant /sup 137/Cs dry matter concentration ratio. This ratio exacerbates the dose to man from intake of food plants. Nephelometer measurements of airborne particulates presently indicate a minimum respiratory radiological dose.

  19. Remote System Technologies for Deactivating Hanford Hot Cells

    SciTech Connect (OSTI)

    Berlin, G.; Walton, T.

    2003-02-25

    Remote system technologies are being deployed by Fluor Hanford to help accelerate the deactivation of highly-radioactive hot cell facilities. These technologies offer improved methods for accessing difficult-to-reach spaces and performing tasks such as visual inspection, radiological characterization, decontamination, waste handling, and size reduction. This paper is focused on the application of remote systems in support of deactivation work being performed in several legacy facilities at Hanford (i.e., the 324 and 327 Buildings). These facilities were previously used for fuel fabrication, materials examination, and the development of waste treatment processes. The technologies described in this paper represent significant improvements to Hanford's baseline methods, and may offer benefits to other U.S. Department of Energy (DOE) sites and commercial operations.

  20. Local intelligent electronic device (IED) rendering templates over limited bandwidth communication link to manage remote IED

    DOE Patents [OSTI]

    Bradetich, Ryan; Dearien, Jason A; Grussling, Barry Jakob; Remaley, Gavin

    2013-11-05

    The present disclosure provides systems and methods for remote device management. According to various embodiments, a local intelligent electronic device (IED) may be in communication with a remote IED via a limited bandwidth communication link, such as a serial link. The limited bandwidth communication link may not support traditional remote management interfaces. According to one embodiment, a local IED may present an operator with a management interface for a remote IED by rendering locally stored templates. The local IED may render the locally stored templates using sparse data obtained from the remote IED. According to various embodiments, the management interface may be a web client interface and/or an HTML interface. The bandwidth required to present a remote management interface may be significantly reduced by rendering locally stored templates rather than requesting an entire management interface from the remote IED. According to various embodiments, an IED may comprise an encryption transceiver.

  1. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, Allan M.

    1999-01-01

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.

  2. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, Allan M.

    1996-01-01

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.

  3. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, Allan M.

    1997-01-01

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.

  4. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, A.M.

    1996-08-06

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user`s local host, thereby providing ease of use and minimal software maintenance for users of that remote service. 16 figs.

  5. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, A.M.

    1997-12-09

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user`s local host, thereby providing ease of use and minimal software maintenance for users of that remote service. 16 figs.

  6. Researcher, Los Alamos National Laboratory - Space and Remote Sensing Group

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration Los Alamos National Laboratory - Space and Remote Sensing Group Patrick Colestock Patrick Colestock November 2009 Los Alamos National Laboratory Fellow Six Los Alamos scientists have been designated 2009 Los Alamos National Laboratory Fellows in recognition of sustained, outstanding scientific contributions and exceptional promise for continued professional achievement. The title of Fellow is bestowed on only about 2 percent of the Laboratory's

  7. Remote Visualization on Cooley Using VNC | Argonne Leadership Computing

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Facility Changes from Tukey to Cooley Compiling and Linking Using Cobalt on Cooley Visit on Cooley Paraview on Cooley ParaView Tutorial VNC on Cooley Policies Documentation Feedback Please provide feedback to help guide us as we continue to build documentation for our new computing resource. [Feedback Form] Remote Visualization on Cooley Using VNC When running graphics applications on Cooley, it is best to use the client/server mode, when available, where a lightweight client can run on

  8. NNSA Researchers Advance Technology for Remote Reactor Monitoring |

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration Researchers Advance Technology for Remote Reactor Monitoring Thursday, May 5, 2016 - 12:06pm New detector neutralizes neutron interference for nuclear detection. NNSA's Defense Nuclear Nonproliferation Research and Development Program drives the innovation of technical capabilities to detect, identify, and characterize foreign nuclear weapons development activities. To achieve this, NNSA leverages the unique capabilities of the national laboratories

  9. Remote video radioactive process evaluation, Savannah River Site

    SciTech Connect (OSTI)

    Heckendorn, F.M.

    1990-01-01

    Specialized miniature low cost video equipment has been effectively used in a number of remote, radioactive, and contaminated environments at the Savannah River Site (SRS). The equipment and related techniques have reduced the potential for personnel exposure to both radiation and physical hazards. The valuable process information thus provided would not have otherwise been available for use in improving the quality of operation at SRS.

  10. Remote video radioactive systems evaluation, Savannah River Site

    SciTech Connect (OSTI)

    Heckendorn, F.M.; Robinson, C.W.

    1991-12-31

    Specialized miniature low cost video equipment has been effectively used in a number of remote, radioactive, and contaminated environments at the Savannah River Site (SRS). The equipment and related techniques have reduced the potential for personnel exposure to both radiation and physical hazards. The valuable process information thus provided would not have otherwise been available for use in improving the quality of operation at SRS.

  11. Remote video radioactive process evaluation, Savannah River Site

    SciTech Connect (OSTI)

    Heckendorn, F.M.

    1990-12-31

    Specialized miniature low cost video equipment has been effectively used in a number of remote, radioactive, and contaminated environments at the Savannah River Site (SRS). The equipment and related techniques have reduced the potential for personnel exposure to both radiation and physical hazards. The valuable process information thus provided would not have otherwise been available for use in improving the quality of operation at SRS.

  12. Remote video radioactive systems evaluation, Savannah River Site

    SciTech Connect (OSTI)

    Heckendorn, F.M.; Robinson, C.W.

    1991-01-01

    Specialized miniature low cost video equipment has been effectively used in a number of remote, radioactive, and contaminated environments at the Savannah River Site (SRS). The equipment and related techniques have reduced the potential for personnel exposure to both radiation and physical hazards. The valuable process information thus provided would not have otherwise been available for use in improving the quality of operation at SRS.

  13. Televised remote control system of a continuous mining machine

    SciTech Connect (OSTI)

    Lansberry, J.B.

    1981-08-04

    A method of recovering particulate material from a seam of such material within the earth bounded above and below by different material which comprises the steps of positioning in mining relation to the seam a continuous mining machine having a power driven mechanism thereon for moving the machine through successive seam material cutting cycles which include an advancing movement along a mined entry within the seam in a direction toward the working face of the seam; illuminating portions of the space surrounding the continuous mining machine including portions of the working face disposed forwardly thereof and adjacent portions of the roof, floor and side walls of the mined entry rearwardly of the working face; establishing electromagnetic signals indicative of the appearance of the illuminated portions of the working face of the seam and the adjacent portions of the roof, floor and side walls; transmitting the established electromagnetic signals to a remote control station; converting at the remote control station the transmitted electromagnetic signals to a continuous picture of the appearance of at least a selected portion of the illuminated portions of the working face of the seam and the adjacent portions of the roof, floor and side walls; and controlling from the remote control station the cutting cycle of the continuous mining machine so that the material cut during a cycle is cut from the seam up to the different material defining the roof and down to the different material defining the floor based upon visually distinguishing between the material of the seam and the different material which forms the roof and floor by viewing the continuous picture provided at the remote control station and apparatus for carrying out the method.

  14. Testing a Cloud Condensation Nuclei Remote Sensing Method

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a Cloud Condensation Nuclei Remote Sensing Method S. J. Ghan Climate Dynamics Group Pacific Northwest National Laboratory Richland, Washington Introduction Under certain conditions vertical profiles of cloud condensation nuclei (CCN) spectra can be retrieved from ground-based measurements. Surface measurements of the CCN spectrum are scaled by the ratio of the backscatter (or extinction) profile to the surface backscatter (or extinction). The backscatter (or extinction) profile is measured by

  15. Testing a Cloud Condensation Nuclei Remote Sensing Method

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a Cloud Condensation Nuclei Remote Sensing Method S. J. Ghan Climate Physics Pacific Northwest National Laboratory Richland, Washington D. R. Collin Department of Atmospheric Sciences Texas A&M University College Station, Texas Introduction Under certain conditions vertical profiles of cloud condensation nuclei (CCN) spectra can be retrieved from ground-based measurements (Ghan and Collins 2003). Surface measurements of the CCN spectrum are scaled by the ratio of the 180 backscatter (or

  16. Photovoltaic (PV) Module Level Remote Safety Disconnect - Energy Innovation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Portal Find More Like This Return to Search Photovoltaic (PV) Module Level Remote Safety Disconnect National Renewable Energy Laboratory Contact NREL About This Technology Figure 1: System configuration of emergency module-level disconnect using module-level &lsquo;Isolation Detection Units&rsquo; (IDU).<br /> Figure 1: System configuration of emergency module-level disconnect using module-level 'Isolation Detection Units' (IDU). Technology Marketing Summary The ability to

  17. Contact-Handled and Remote-Handled Transuranic Waste Packaging

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-08-09

    Provides specific instructions for packaging and/or repackaging contact-handled transuranic (CH-TRU) and remote-handled transuranic (RH-TRU) waste in a manner consistent with DOE O 435.1, Radioactive Waste Management, DOE M 435.1-1 Chg 1, Radioactive Waste Management Manual, CH-TRU and RH-TRU waste transportation requirements, and Waste Isolation Pilot Plant (WIPP) programmatic requirements. Does not cancel/supersede other directives.

  18. Perm Web: remote parallel and distributed volume visualization

    SciTech Connect (OSTI)

    Wittenbrink, C.M.; Kim, K.; Story, J.; Pang, A.; Hollerbach, K.; Max, N.

    1997-01-01

    In this paper we present a system for visualizing volume data from remote supercomputers (PermWeb). We have developed both parallel volume rendering algorithms, and the World Wide Web software for accessing the data at the remote sites. The implementation uses Hypertext Markup Language (HTML), Java, and Common Gateway Interface (CGI) scripts to connect World Wide Web (WWW) servers/clients to our volume renderers. The front ends are interactive Java classes for specification of view, shading, and classification inputs. We present performance results, and implementation details for connections to our computing resources at the University of California Santa Cruz including a MasPar MP-2, SGI Reality Engine-RE2, and SGI Challenge machines. We apply the system to the task of visualizing trabecular bone from finite element simulations. Fast volume rendering on remote compute servers through a web interface allows us to increase the accessibility of the results to more users. User interface issues, overviews of parallel algorithm developments, and overall system interfaces and protocols are presented. Access is available through Uniform Resource Locator (URL) http://www.cse.ucsc.edu/research/slvg/. 26 refs., 7 figs.

  19. Amplification of Xenon NMR and MRI by remote detection

    SciTech Connect (OSTI)

    Moule, Adam J.; Spence, Megan M.; Han, Song-I.; Seeley, JulietteA.; Pierce, Kimberly L.; Saxena, Sunil; Pines, Alexander

    2003-03-31

    A novel technique is proposed in which a nuclear magneticresonance (NMR) spectrum or magnetic resonance image (MRI) is encoded andstored as spin polarization and is then moved to a different physicallocation to be detected. Remote detection allows the separateoptimization of the encoding and detection steps, permitting theindependent choice of experimental conditions, and excitation anddetection methodologies. In the first experimental demonstration of thistechnique, we show that NMR signal can be amplified by taking diluted129Xe from a porous sample placed inside a large encoding coil, andconcentrating it into a smaller detection coil. In general, the study ofNMR active molecules at low concentration that have low physical fillingfactor is facilitated by remote detection. In the second experiment, MRIinformation encoded in a very low field magnet (4-7mT) is transferred toa high field magnet (4.2 T) in order to be detected under optimizedconditions. Furthermore, remote detection allows the utilization ofultra-sensitive optical or superconducting detection techniques, whichbroadens the horizon of NMR experimentation.

  20. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  1. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  2. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buffer Overflow Lets Remote Users Execute Arbitrary Code | Department of Energy 59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute

  3. Wellhead to wire utilization of remote gas resources

    SciTech Connect (OSTI)

    Harris, R.A.; Hines, T.L.

    1998-12-31

    Utilization of remote gas resources in developing countries continues to offer challenges and opportunities to producers and contractors. The Aguaytia Gas and Power Project is an example where perseverance and creativity resulted in successful utilization of natural gas resources in the Ucayali Region of Central Peru, a country which previously had no natural gas infrastructure. The resource for the project was first discovered by Mobil in 1961, and remained undeveloped for over thirty years due to lack of infrastructure and markets. Maple Gas won a competitively bid contract to develop the Aguaytia gas reserves in March of 1993. The challenges facing Maple Gas were to develop downstream markets for the gas, execute contracts with Perupetro S.A. and other Peruvian government entities, raise financing for the project, and solicit and execute engineering procurement and construction (EPC) contracts for the execution of the project. The key to development of the downstream markets was the decision to generate electric power and transmit the power over the Andes to the main electrical grid along the coast of Peru. Supplemental revenue could be generated by gas sales to a small regional power plant and extraction of LPG and natural gasoline for consumption in the Peruvian market. Three separate lump sum contracts were awarded to Asea Brown Boveri (ABB) companies for the gas project, power project and transmission project. Each project presented its unique challenges, but the commonalities were the accelerated schedule, high rainfall in a prolonged wet season and severe logistics due to lack of infrastructure in the remote region. This presentation focuses on how the gas plant contractor, ABB Randall, working in harmony with the developer, Maple Gas, tackled the challenges to monetize a remote gas resource.

  4. Frequency Modulation Spectroscopy Modeling for Remote Chemical Detection

    SciTech Connect (OSTI)

    Sheen, David M.

    2000-09-30

    Frequency modulation (FM) spectroscopy techniques show promise for active infrared remote chemical sensing. FM spectroscopy techniques have reduced sensitivity to optical and electronic noise, and are relatively immune to the effects of various electronic and mechanical drifts. FM systems are responsive to sharp spectral features and can therefore reduce the effects of spectral clutter due to interfering chemicals in the plume or in the atmosphere. The relatively high modulation frequencies used for FM also reduces the effects of albedo (reflectance) and plume variations. Conventional differential absorption lidar (DIAL) systems are performance limited by the noise induced by speckle. Analysis presented in this report shows that FM based sensors may reduce the effects of speckle by one to two orders of magnitude. This can result in reduced dwell times and faster area searches, as well as reducing various forms of spatial clutter. FM systems will require a laser system that is continuously tunable at relatively high frequencies (0.1 to 20 MHz). One promising candidate is the quantum-cascade (QC) laser [1, 2]. The QC laser is potentially capable of power levels on the order of 1 Watt and frequency tuning on the order of 3 - 6 GHz, which is the performance level required for FM spectroscopy based remote sensing. In this report we describe a high-level numerical model for an FM spectroscopy based remote sensing system, and application to two unmanned airborne vehicle (UAV) scenarios. A Predator scenario operating at a slant range of 6.5 km with a 10 cm diameter telescope, and a Global Hawk scenario operating at a range of 30 km with a 20 cm diameter telescope, has been assumed to allow estimation of the performance of potential FM systems.

  5. Remote-site power generation opportunities for Alaska

    SciTech Connect (OSTI)

    Jones, M.L.

    1997-03-01

    The Energy and Environmental Research Center (EERC) has been working with the Federal Energy Technology Center in Morgantown, West Virginia, to assess options for small, low-cost, environmental acceptable power generation for application in remote areas of Alaska. The goal of this activity was to reduce the use of fuel in Alaskan villages by developing small, low-cost power generation applications. Because of the abundance of high-quality coal throughout Alaska, emphasis was placed on clean coal applications, but other energy sources, including geothermal, wind, hydro, and coalbed methane, were also considered. The use of indigenous energy sources would provide cheaper cleaner power, reduce the need for PCE (Power Cost Equalization program) subsidies, increase self-sufficiency, and retain hard currency in the state while at the same time creating jobs in the region. The introduction of economical, small power generation systems into Alaska by US equipment suppliers and technology developers aided by the EERC would create the opportunities for these companies to learn how to engineer, package, transport, finance, and operate small systems in remote locations. All of this experience would put the US developers and equipment supply companies in an excellent position to export similar types of small power systems to rural areas or developing countries. Thus activities in this task that relate to determining the generic suitability of these technologies for other countries can increase US competitiveness and help US companies sell these technologies in foreign countries, increasing the number of US jobs. The bulk of this report is contained in the two appendices: Small alternative power workshop, topical report and Global market assessment of coalbed methane, fluidized-bed combustion, and coal-fired diesel technologies in remote applications.

  6. Remote power systems with advanced storage technologies for Alaskan villages

    SciTech Connect (OSTI)

    Isherwood, W.; Smith, R.; Aceves, S.; Berry, G.; Clark, W.; Johnson, R.; Das, D.; Goering, D.; Seifert, R.

    1997-12-01

    Remote Alaskan communities pay economic and environmental penalties for electricity, because they must import diesel as their primary fuel for electric power production, paying heavy transportation costs and potentially causing environmental damage with empty drums, leakage, and spills. For these reasons, remote villages offer a viable niche market where sustainable energy systems based on renewable resources and advanced energy storage technologies can compete favorably on purely economic grounds, while providing environmental benefits. These villages can also serve as a robust proving ground for systematic analysis, study, improvement, and optimization of sustainable energy systems with advanced technologies. This paper presents an analytical optimization of a remote power system for a hypothetical Alaskan village. The analysis considers the potential of generating renewable energy (e.g., wind and solar), along with the possibility of using energy storage to take full advantage of the intermittent renewable sources available to these villages. Storage in the form of either compressed hydrogen or zinc pellets can then provide electricity from hydrogen or zinc-air fuel cells when renewable sources are unavailable.The analytical results show a great potential to reduce fossil fuel consumption and costs basing renewable energy combined with advanced energy storage devices. The best solution for our hypothetical village appears to be a hybrid energy system, which can reduce consumption of diesel fuel by over 50% with annualized cost savings by over 30% by adding wind turbines to the existing diesel generators. When energy storage devices are added, diesel fuel consumption and costs can be reduced substantially more. With optimized energy storage, use of the diesel generatorss can be reduced to almost zero, with the existing equipment only maintained for added reliability. However about one quarter of the original diesel consumption is still used for heating purposes. (We use the term diesel to encompass the fuel, often called heating or fuel oil, of similar or identical properties.)

  7. An Assessment of Remote Visual Testing System Capabilities for the Detection of Service Induced Cracking

    SciTech Connect (OSTI)

    Anderson, Michael T.; Cumblidge, Stephen E.; Doctor, Steven R.

    2005-09-01

    Remote visual testing is typically employed to ascertain the condition of materials in components that are inaccessible for direct examination. In the power and petrochemical industries, remote visual testing is used to assess whether service-related degradation is being manifested that, if left unchecked, may eventually impair the structural reliability of a component. Several codes and standards require that visual examinations be periodically conducted. Many of these inspections must be performed remotely due to harsh environments or design geometries of the subject components. This paper describes the attributes and limitations of remote visual testing, performance demonstration standards for camera systems, typical dimensions for service-induced cracking phenomena, and an assessment of the reliability of remote video camera systems at finding cracks. Because many forms of service-induced cracks have very small crack opening dimensions, the reliability of remote visual testing may not be adequate to ensure component integrity, given the capabilities of current camera systems and application practices.

  8. Advanced spent fuel conditioning process (ACP) progress with respect to remote operation and maintenance

    SciTech Connect (OSTI)

    Lee, Hyo Jik; Lee, Jong Kwang; Park, Byung Suk; Yoon, Ji Sup

    2007-07-01

    Korea Atomic Energy Research Institute (KAERI) has been developing an Advanced Spent Fuel Conditioning Process (ACP) to reduce the volume of spent fuel, and the construction of the ACP facility (ACPF) for a demonstration of its technical feasibility has been completed. In 2006 two inactive demonstrations were performed with simulated fuels in the ACPF. Accompanied by process equipment performance tests, its remote operability and maintainability were also tested during that time. Procedures for remote operation tasks are well addressed in this study and evaluated thoroughly. Also, remote maintenance and repair tasks are addressed regarding some important modules with a high priority order. The above remote handling test's results provided a lot of information such as items to be revised to improve the efficiency of the remote handling tasks. This paper deals with the current status of ACP and the progress of remote handling of ACPF. (authors)

  9. SMALL SCALE FUEL CELL AND REFORMER SYSTEMS FOR REMOTE POWER

    SciTech Connect (OSTI)

    Dennis Witmer

    2003-12-01

    New developments in fuel cell technologies offer the promise of clean, reliable affordable power, resulting in reduced environmental impacts and reduced dependence on foreign oil. These developments are of particular interest to the people of Alaska, where many residents live in remote villages, with no roads or electrical grids and a very high cost of energy, where small residential power systems could replace diesel generators. Fuel cells require hydrogen for efficient electrical production, however. Hydrogen purchased through conventional compressed gas suppliers is very expensive and not a viable option for use in remote villages, so hydrogen production is a critical piece of making fuel cells work in these areas. While some have proposed generating hydrogen from renewable resources such as wind, this does not appear to be an economically viable alternative at this time. Hydrogen can also be produced from hydrocarbon feed stocks, in a process known as reforming. This program is interested in testing and evaluating currently available reformers using transportable fuels: methanol, propane, gasoline, and diesel fuels. Of these, diesel fuels are of most interest, since the existing energy infrastructure of rural Alaska is based primarily on diesel fuels, but this is also the most difficult fuel to reform, due to the propensity for coke formation, due to both the high vaporization temperature and to the high sulfur content in these fuels. There are several competing fuel cell technologies being developed in industry today. Prior work at UAF focused on the use of PEM fuel cells and diesel reformers, with significant barriers identified to their use for power in remote areas, including stack lifetime, system efficiency, and cost. Solid Oxide Fuel Cells have demonstrated better stack lifetime and efficiency in demonstrations elsewhere (though cost still remains an issue), and procuring a system for testing was pursued. The primary function of UAF in the fuel cell industry is in the role of third party independent testing. In order for tests to be conducted, hardware must be purchased and delivered. The fuel cell industry is still in a pre-commercial state, however. Commercial products are defined as having a fixed set of specifications, fixed price, fixed delivery date, and a warrantee. Negotiations with fuel cell companies over these issues are often complex, and the results of these discussions often reveal much about the state of development of the technology. This work includes some of the results of these procurement experiments. Fuel cells may one day replace heat engines as the source of electrical power in remote areas. However, the results of this program to date indicate that currently available hardware is not developed sufficiently for these environments, and that significant time and resources will need to be committed for this to occur.

  10. Administering an epoch initiated for remote memory access

    DOE Patents [OSTI]

    Blocksome, Michael A; Miller, Douglas R

    2012-10-23

    Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

  11. Administering an epoch initiated for remote memory access

    DOE Patents [OSTI]

    Blocksome, Michael A.; Miller, Douglas R.

    2013-01-01

    Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

  12. Administering an epoch initiated for remote memory access

    DOE Patents [OSTI]

    Blocksome, Michael A; Miller, Douglas R

    2014-03-18

    Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

  13. Continuous remote unattended monitoring for safeguards data collection systems

    SciTech Connect (OSTI)

    Klosterbuer, S.F.; Halbig, J.K.; Harker, W.C.; Menlove, H.O.; Painter, J.A.; Stewart, J.E.

    1994-02-01

    To meet increased inspection requirements, unattended and remote monitoring systems have been developed and installed in several large facilities to perform safeguards functions. These unattended monitoring systems are based on instruments originally developed for traditional safeguards and the domestic nuclear industry to nondestructively assay nuclear materials. Through specialized measurement procedures, these instruments have been adapted to be unattended monitors. This paper defines the parts of these unattended monitoring systems, describes the systems that have been installed in the field and their status, and discusses future trends for unattended systems.

  14. Nuclear reactor remote disconnect control rod coupling indicator

    DOE Patents [OSTI]

    Vuckovich, Michael

    1977-01-01

    A coupling indicator for use with nuclear reactor control rod assemblies which have remotely disengageable couplings between the control rod and the control rod drive shaft. The coupling indicator indicates whether the control rod and the control rod drive shaft are engaged or disengaged. A resistive network, utilizing magnetic reed switches, senses the position of the control rod drive mechanism lead screw and the control rod position indicating tube, and the relative position of these two elements with respect to each other is compared to determine whether the coupling is engaged or disengaged.

  15. Remote Systems Experience at the Oak Ridge National Laboratory--A Summary

    Office of Scientific and Technical Information (OSTI)

    of Lessons Learned (Conference) | SciTech Connect Conference: Remote Systems Experience at the Oak Ridge National Laboratory--A Summary of Lessons Learned Citation Details In-Document Search Title: Remote Systems Experience at the Oak Ridge National Laboratory--A Summary of Lessons Learned Oak Ridge National Laboratory (ORNL) has a long history in the development of remote systems to support the nuclear environment. ORNL, working in conjunction with Central Research Laboratories, created

  16. Development of a Remote Monitoring Sensor Network for In-Situ Decommissioned Structures

    Office of Environmental Management (EM)

    10-01666, Revision 0 Key Words: in situ decommissioning sensor remote monitoring end state Retention: Permanent DEVELOPMENT OF A REMOTE MONITORING SENSOR NETWORK FOR IN SITU DECOMMISSIONED STRUCTURES Panel Report November 2010 Savannah River National Laboratory Savannah River Nuclear Solutions Aiken, SC 29808 Prepared for the U.S. Department of Energy Under Contract Number DE-AC09-08SR22470 Development of a Remote Monitoring Sensor Network Page 2 of 34 for In Situ Decommissioned Structures

  17. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Controls | Department of Energy 6: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple

  18. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Arbitrary Code and Deny Service | Department of Energy 79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall

  19. V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected

  20. OE Announces Awardees Under the Remote Off-Grid Microgrid Design Support

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Tool Research Call | Department of Energy Awardees Under the Remote Off-Grid Microgrid Design Support Tool Research Call OE Announces Awardees Under the Remote Off-Grid Microgrid Design Support Tool Research Call September 15, 2015 - 9:50am Addthis The Office of Electricity Delivery and Energy Reliability has selected Lawrence Berkeley National Laboratory (LBNL) and Oak Ridge National Laboratory (ORNL) as awardees under the Remote Off-Grid Microgrid Design Support Tool Research Call. The

  1. V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Login Anonymously | Department of Energy 5: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously September 5, 2013 - 12:33am Addthis PROBLEM: A vulnerability was reported in Cisco Mobility Services Engine. A remote user can login anonymously. PLATFORM: Cisco Mobility Services Engine ABSTRACT: A vulnerability in Cisco Mobility Services Engine could allow an

  2. ARG-US Remote Area Modular Monitoring (RAMM) | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ARG-US Remote Area Modular Monitoring (RAMM) ARG-US Remote Area Modular Monitoring (RAMM) Scientists at Argonne National Laboratory have developed a technology to make nuclear and radiological facilities safer by better monitoring both plant conditions as well as the most sensitive materials onsite. The patent-pending system, called ARG-US Remote Area Modular Monitoring, or RAMM, uses hig- tech sensors paired with redundant, self-healing communications platforms that can work even in the most

  3. Intergranular attack and stress corrosion cracking propagation behavior of alloy 600 in high-temperature caustic solution

    SciTech Connect (OSTI)

    Kawamura, H.; Hirano, H. . Komae Research Lab.)

    1999-06-01

    The effect of stress intensity factors (K) at the intergranular attack and stress corrosion crack (IGA/SCC) tips on the IGA/SCC propagation behavior of steam generator (SG) tubing was studied under accelerated test conditions. Values of K at the IGA/SCC crack tips were calculated using the statically indeterminate model. Based upon analysis of those factors, the double-cantilever beam (DCB) and SG model boiler tests were carried out to evaluate the effect of stress intensity on IGA/SCC crack propagation. K at the crack tips increased with increasing crack length. For a long crack, K decreased with an increasing number of cracks. However, for a short crack, K decreased slightly with an increasing number of cracks. DCB test results showed the IGA/SCC crack velocity of alloy 600 (UNS N06600) increased gradually with increasing K in the range from 15 MPa[radical]m to [approximately]60 MPa[radical]m. This is the range relevant to IGA/SCC crack tips of typical SG tubes under operating conditions of Pressurized-water reactors. Metallographic examination of tubes removed from the SG model boiler, fouled with 10 ppm sodium hydroxide (NaOH), showed IGA/SCC propagation rates were almost constant in the tested range of K.

  4. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  5. U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  6. U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system

  7. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  8. U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  9. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Articles U-083:Oracle Critical Patch Update Advisory - January 2012 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-576: Oracle Solaris Adobe Flash Player...

  10. U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system.

  11. U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP IBRIX X9000 Storage. The vulnerability could be remotely exploited to allow disclosure of information.

  12. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-727:Microsoft Windows SSLTLS Protocol Flaw Lets Remote Users Decryption Sessions ... U-033: Microsoft Security Bulletin Summary for November 2011 T-706: Microsoft Fraudulent ...

  13. U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.

  14. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration.

  15. T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges.

  16. MHK ISDB/Instruments/HOBO RX3000 Remote Monitoring System | Open...

    Open Energy Info (EERE)

    Pro processing software recommended. Weatherproof enclosure ( NEMA 4x), powered by ONSET solar panel, AC adapter, or DC power supply. Ethernet, WiFi, and Cellular remote...

  17. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  18. Sandia to Partner with MOgene Green Chemicals on ARPA-E REMOTE...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Partner with MOgene Green Chemicals on ARPA-E REMOTE Project - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & ...

  19. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) ...

  20. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  1. Using remote sensing to quantify albedo of roofs in seven California...

    Office of Scientific and Technical Information (OSTI)

    2: Results and application to climate modeling Citation Details In-Document Search This content will become publicly available on February 23, 2017 Title: Using remote sensing to ...

  2. U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

  3. U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system.

  4. Remote-Handled Low-Level Waste (RHLLW) Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2010-10-01

    The Remote-Handled Low-Level Waste Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of fiscal year 2015). Development of a new onsite disposal facility, the highest ranked alternative, will provide necessary remote handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability.

  5. Antitrust implications of utility participation in the market for remote photovoltaic systems

    SciTech Connect (OSTI)

    Starrs, T.J.

    1994-12-31

    Remote photovoltaic systems are an important niche market in the development of a viable photovoltaics industry. Electric utilities in the US have started offering remote photovoltaic service. Utilities have the potential to use their monopoly power in regulated markets to unfair competitive advantage in competitive markets. Therefore, utility participation in remote photovoltaic markets raises potentially significant issues of antitrust law and policy. This paper describes some of the legal and factual criteria that US courts and regulatory agencies are likely to use in assessing the antitrust implications of utility participation in the market for remote photovoltaic systems.

  6. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands

    Broader source: Energy.gov [DOE]

    A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system.

  7. T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

  8. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system.

  9. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Password | Department of Energy 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker

  10. U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 91: cURL Lets Remote Users Decrypt SSL/TLS Traffic U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic January 30, 2012 - 6:45am Addthis PROBLEM: A vulnerability was reported in cURL. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) : Version(s): 7.10.6 through 7.23.1 ABSTRACT: A remote user can decrypt SSL/TLS sessions in certain cases. reference LINKS: CVE-2011-3389 SecurityTracker Alert ID: 1026587 Vendor Advisory IMPACT ASSESSMENT: Moderate Discussion: A remote user with the

  11. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco

  12. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addresses | Department of Energy 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com

  13. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  14. U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  15. U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  16. Energy Department Announces Request for Information on the Remote Alaskan Communities Energy Efficiency Competition

    Broader source: Energy.gov [DOE]

    The Energy Department announced today a Request for Information (RFI) to help shape the design of a newly proposed initiative - a Remote Alaskan Communities Energy Efficiency Competition.

  17. First Oak Ridge Remote-Handled Transuranic Waste Shipment Arrives Safely at WIPP

    Broader source: Energy.gov [DOE]

    DOE achieved a major environmental cleanup milestone this week with the first shipment of remote-handled TRU waste leaving DOE’s Oak Ridge Reservation.

  18. T-598: Apache Tomcat HTTP BIO Connector Error Discloses Information From Different Requests to Remote Users

    Broader source: Energy.gov [DOE]

    When using HTTP pipelining, the system may return information from a different request to a remote user. The vulnerability resides in the HTTP BIO connector.

  19. V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data.

  20. Increasing the effectiveness of reachback and remote command and control

    SciTech Connect (OSTI)

    McGee, David R.

    2002-12-02

    Commanders and their staff, when geographically dispersed, continue to choose what they find to be the most effective remote collaboration tools: email and radio messages. Even command and control systems that provide a unified view of the battlefield among remote collaborators are often supplanted by more traditional tools, such as a large paper map (McGee, Cohen & Wu, 2000). Indeed, today's computer interfaces often impose too high a barrier for the capture and delivery of situational assessment (McGee, Cohen, Wesson & Horman, 2002). To compensate, commanders traditionally meet face-to-face at least once daily to debrief each other on the outcome of the day's fight and to coordinate a strategy for the next day's engagement. Each of these meetings presents a risk to commanders, in addition to lost time during travel and various other concerns. Ongoing activity at higher echelons may consist of this activity continuously. At lower echelons, coordination is typically mediated by a radio or other messaging platform. Common to each of these scenarios, the coordination and collaboration is mediated by physical tools, e.g., an up-to-date common operational picture. Much of the promise of collaboration technology, from video-conferencing to realtime collaboration tools, is meant to alleviate the need for face-to-face meetings and improve moment-to-moment coordination. However, these tools fall woefully short of meeting the needs of commanders in the battlefield.

  1. Cooling tower and plume modeling for satellite remote sensing applications

    SciTech Connect (OSTI)

    Powers, B.J.

    1995-05-01

    It is often useful in nonproliferation studies to be able to remotely estimate the power generated by a power plant. Such information is indirectly available through an examination of the power dissipated by the plant. Power dissipation is generally accomplished either by transferring the excess heat generated into the atmosphere or into bodies of water. It is the former method with which we are exclusively concerned in this report. We discuss in this report the difficulties associated with such a task. In particular, we primarily address the remote detection of the temperature associated with the condensed water plume emitted from the cooling tower. We find that the effective emissivity of the plume is of fundamental importance for this task. Having examined the dependence of the plume emissivity in several IR bands and with varying liquid water content and droplet size distributions, we conclude that the plume emissivity, and consequently the plume brightness temperature, is dependent upon not only the liquid water content and band, but also upon the droplet size distribution. Finally, we discuss models dependent upon a detailed point-by-point description of the hydrodynamics and thermodynamics of the plume dynamics and those based upon spatially integrated models. We describe in detail a new integral model, the LANL Plume Model, which accounts for the evolution of the droplet size distribution. Some typical results obtained from this model are discussed.

  2. Deterministic generation of remote entanglement with active quantum feedback

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Martin, Leigh; Motzoi, Felix; Li, Hanhan; Sarovar, Mohan; Whaley, K. Birgitta

    2015-12-10

    We develop and study protocols for deterministic remote entanglement generation using quantum feedback, without relying on an entangling Hamiltonian. In order to formulate the most effective experimentally feasible protocol, we introduce the notion of average-sense locally optimal feedback protocols, which do not require real-time quantum state estimation, a difficult component of real-time quantum feedback control. We use this notion of optimality to construct two protocols that can deterministically create maximal entanglement: a semiclassical feedback protocol for low-efficiency measurements and a quantum feedback protocol for high-efficiency measurements. The latter reduces to direct feedback in the continuous-time limit, whose dynamics can bemore » modeled by a Wiseman-Milburn feedback master equation, which yields an analytic solution in the limit of unit measurement efficiency. Our formalism can smoothly interpolate between continuous-time and discrete-time descriptions of feedback dynamics and we exploit this feature to derive a superior hybrid protocol for arbitrary nonunit measurement efficiency that switches between quantum and semiclassical protocols. Lastly, we show using simulations incorporating experimental imperfections that deterministic entanglement of remote superconducting qubits may be achieved with current technology using the continuous-time feedback protocol alone.« less

  3. Deterministic generation of remote entanglement with active quantum feedback

    SciTech Connect (OSTI)

    Martin, Leigh; Motzoi, Felix; Li, Hanhan; Sarovar, Mohan; Whaley, K. Birgitta

    2015-12-10

    We develop and study protocols for deterministic remote entanglement generation using quantum feedback, without relying on an entangling Hamiltonian. In order to formulate the most effective experimentally feasible protocol, we introduce the notion of average-sense locally optimal feedback protocols, which do not require real-time quantum state estimation, a difficult component of real-time quantum feedback control. We use this notion of optimality to construct two protocols that can deterministically create maximal entanglement: a semiclassical feedback protocol for low-efficiency measurements and a quantum feedback protocol for high-efficiency measurements. The latter reduces to direct feedback in the continuous-time limit, whose dynamics can be modeled by a Wiseman-Milburn feedback master equation, which yields an analytic solution in the limit of unit measurement efficiency. Our formalism can smoothly interpolate between continuous-time and discrete-time descriptions of feedback dynamics and we exploit this feature to derive a superior hybrid protocol for arbitrary nonunit measurement efficiency that switches between quantum and semiclassical protocols. Lastly, we show using simulations incorporating experimental imperfections that deterministic entanglement of remote superconducting qubits may be achieved with current technology using the continuous-time feedback protocol alone.

  4. Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack

    SciTech Connect (OSTI)

    Stein, Steven L.; Lesperance, Ann M.; Upton, Jaki F.

    2010-02-01

    On October 9, 2008, federal, state and local policy makers, emergency managers, and medical and public health officials convened in Seattle, Washington, for a workshop on Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack. The day-long symposium was aimed at generating a dialogue about recovery and restoration through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems. The Principal Federal Official (PFO) provided an overview of the role of the PFO in a catastrophic event. A high-level summary of an anthrax scenario was presented. The remainder of the day was focused on interactive discussions among federal, state and local emergency management experts in the areas of: • Decision-making, prioritization, and command and control • Public health/medical services • Community resiliency and continuity of government. Key topics and issues that resulted from discussions included: • Local representation in the Joint Field Office (JFO) • JFO transition to the Long-Term Recovery Office • Process for prioritization of needs • Process for regional coordination • Prioritization - process and federal/military intervention • Allocation of limited resources • Re-entry decision and consistency • Importance of maintaining a healthy hospital system • Need for a process to establish a consensus on when it is safe to re-enter. This needs to be across all jurisdictions including the military. • Insurance coverage for both private businesses and individuals • Interaction between the government and industry. The symposium was sponsored by the Interagency Biological Restoration Demonstration, a collaborative regional program jointly funded by the U.S. Department of Homeland Security and the U.S. Department of Defense. To aid the program’s efforts and inform the development of blueprint for recovery from a biological incident, this report presents the key issues identified at the symposium.

  5. Inhibitory effect of boric acid on intergranular attack and stress corrosion cracking of Alloy 600 in high temperature water

    SciTech Connect (OSTI)

    Kawamura, H.; Hirano, H.; Koike, M.; Suda, M.

    1995-09-01

    The inhibitory effect of boric acid on the Intergranular Attack and Stress Corrosion Cracking (IGA/SCC) propagation behavior of steam generator (SG) tubing was studied under accelerated test conditions. Based on the analysis results of stress intensity factors at IGA/SCC crack tips, the notched C-ring tests were carried out to evaluate the effect of stress intensity and boric acid on the IGA/SCC crack propagation. The A.C. impedance measurement and Auger electron spectroscopy (AES) were also conducted to clarify the inhibitory effect of boric acid. Notched C-ring test results indicated that IGA/SCC crack velocity of alloy 600 increased gradually with increasing stress intensity factor in the range 4 to about 26 MPa{center_dot}m{sup 1/2}, which might be loaded on the IGA/SCC crack tips of actual SG tubes under PWR secondary conditions. Adding boric acid slightly retarded the crack velocity in both all volatile treatment (AVT) water and caustic solutions. IGA/SCC crack velocities were lower in nearly neutral solutions than in alkali or acidic solutions. Furthermore, A.C. impedance studies showed that the polarization resistances of oxide films formed in boric acid solutions were higher than those of films formed in acidic and alkali solutions. AES analysis revealed that boron content in the oxide films formed in acidic solution containing boric acid was lowest. Good agreement was obtained between the IGA/SCC inhibitory effect of boric acid and the formation of the stable oxide films containing boron.

  6. Developing health-based pre-planning clearance goals for airport remediation following a chemical terrorist attack: Decision criteria for multipathway exposure routes

    SciTech Connect (OSTI)

    Watson, Annetta Paule; Dolislager, Frederick; Hall, Dr. Linda; Hauschild, Veronique; Raber, Ellen; Love, Dr. Adam

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and decision criteria to facilitate post-attack and post-decontamination consequence management activities. Decision criteria analysis presented here provides first-time, open-literature documentation of multi-pathway, health-based remediation exposure guidelines for selected toxic industrial compounds, chemical warfare agents, and agent degradation products for pre-planning application in anticipation of a chemical terrorist attack. Guideline values are provided for inhalation and direct ocular vapor exposure routes as well as percutaneous vapor, surface contact, and ingestion. Target populations include various employees as well as transit passengers. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

  7. System, method, and apparatus for remote measurement of terrestrial biomass

    DOE Patents [OSTI]

    Johnson, Patrick W

    2011-04-12

    A system, method, and/or apparatus for remote measurement of terrestrial biomass contained in vegetative elements, such as large tree boles or trunks present in an area of interest, are provided. The method includes providing an airborne VHF radar system in combination with a LiDAR system, overflying the area of interest while directing energy toward the area of interest, using the VHF radar system to collect backscatter data from the trees as a function of incidence angle and frequency, and determining a magnitude of the biomass from the backscatter data and data from the laser radar system for each radar resolution cell. A biomass map is generated showing the magnitude of the biomass of the vegetative elements as a function of location on the map by using each resolution cell as a unique location thereon. In certain preferred embodiments, a single frequency is used with a linear array antenna.

  8. Remote multi-position information gathering system and method

    DOE Patents [OSTI]

    Hirschfeld, Tomas B. (Livermore, CA)

    1986-01-01

    A technique for gathering specific information from various remote locations, especially fluorimetric information characteristic of particular materials at the various locations is disclosed herein. This technique uses a single source of light disposed at still a different, central location and an overall optical network including an arrangement of optical fibers cooperating with the light source for directing individual light beams into the different information bearing locations. The incoming light beams result in corresponding displays of light, e.g., fluorescent light, containing the information to be obtained. The optical network cooperates with these light displays at the various locations for directing ongoing light beams containing the same information as their cooperating displays from these locations to the central location. Each of these outgoing beams is applied to a detection arrangement, e.g., a fluorescence spectroscope, for retrieving the information contained thereby.

  9. Reliability review of the remote tool delivery system locomotor

    SciTech Connect (OSTI)

    Chesser, J.B.

    1999-04-01

    The locomotor being built by RedZone Robotics is designed to serve as a remote tool delivery (RID) system for waste retrieval, tank cleaning, viewing, and inspection inside the high-level waste tanks 8D-1 and 8D-2 at West Valley Nuclear Services (WVNS). The RTD systm is to be deployed through a tank riser. The locomotor portion of the RTD system is designed to be inserted into the tank and is to be capable of moving around the tank by supporting itself and moving on the tank internal structural columns. The locomotor will serve as a mounting platform for a dexterous manipulator arm. The complete RTD system consists of the locomotor, dexterous manipulator arm, cameras, lights, cables, hoses, cable/hose management system, power supply, and operator control station.

  10. Remote multi-position information gathering system and method

    DOE Patents [OSTI]

    Hirschfeld, Tomas B. (Livermore, CA)

    1989-01-01

    A technique for gathering specific information from various remote locations, especially fluorimetric information characteristic of particular materials at the various locations is disclosed herein. This technique uses a single source of light disposed at still a different, central location and an overall optical network including an arrangement of optical fibers cooperating with the light source for directing individual light beams into the different information bearing locations. The incoming light beams result in corresponding displays of light, e.g., fluorescent light, containing the information to be obtained. The optical network cooperates with these light displays at the various locations for directing outgoing light beams containing the same information as their cooperating displays from these locations to the central location. Each of these outgoing beams is applied to a detection arrangement, e.g., a fluorescence spectroscope, for retrieving the information contained thereby.

  11. Remote multi-position information gathering system and method

    DOE Patents [OSTI]

    Hirschfeld, T.B.

    1986-12-02

    A technique for gathering specific information from various remote locations, especially fluorimetric information characteristic of particular materials at the various locations is disclosed herein. This technique uses a single source of light disposed at still a different, central location and an overall optical network including an arrangement of optical fibers cooperating with the light source for directing individual light beams into the different information bearing locations. The incoming light beams result in corresponding displays of light, e.g., fluorescent light, containing the information to be obtained. The optical network cooperates with these light displays at the various locations for directing outgoing light beams containing the same information as their cooperating displays from these locations to the central location. Each of these outgoing beams is applied to a detection arrangement, e.g., a fluorescence spectroscope, for retrieving the information contained thereby. 9 figs.

  12. Remote NMR/MRI detection of laser polarized gases

    DOE Patents [OSTI]

    Pines, Alexander; Saxena, Sunil; Moule, Adam; Spence, Megan; Seeley, Juliette A.; Pierce, Kimberly L.; Han, Song-I; Granwehr, Josef

    2006-06-13

    An apparatus and method for remote NMR/MRI spectroscopy having an encoding coil with a sample chamber, a supply of signal carriers, preferably hyperpolarized xenon and a detector allowing the spatial and temporal separation of signal preparation and signal detection steps. This separation allows the physical conditions and methods of the encoding and detection steps to be optimized independently. The encoding of the carrier molecules may take place in a high or a low magnetic field and conventional NMR pulse sequences can be split between encoding and detection steps. In one embodiment, the detector is a high magnetic field NMR apparatus. In another embodiment, the detector is a superconducting quantum interference device. A further embodiment uses optical detection of Rb--Xe spin exchange. Another embodiment uses an optical magnetometer using non-linear Faraday rotation. Concentration of the signal carriers in the detector can greatly improve the signal to noise ratio.

  13. Magnetic resonance imaging of living systems by remote detection

    DOE Patents [OSTI]

    Wemmer, David; Pines, Alexander; Bouchard, Louis; Xu, Shoujun; Harel, Elad; Budker, Dmitry; Lowery, Thomas; Ledbetter, Micah

    2013-10-29

    A novel approach to magnetic resonance imaging is disclosed. Blood flowing through a living system is prepolarized, and then encoded. The polarization can be achieved using permanent or superconducting magnets. The polarization may be carried out upstream of the region to be encoded or at the place of encoding. In the case of an MRI of a brain, polarization of flowing blood can be effected by placing a magnet over a section of the body such as the heart upstream of the head. Alternatively, polarization and encoding can be effected at the same location. Detection occurs at a remote location, using a separate detection device such as an optical atomic magnetometer, or an inductive Faraday coil. The detector may be placed on the surface of the skin next to a blood vessel such as a jugular vein carrying blood away from the encoded region.

  14. System and method for inventorying multiple remote objects

    DOE Patents [OSTI]

    Carrender, Curtis L.; Gilbert, Ronald W.

    2007-10-23

    A system and method of inventorying multiple objects utilizing a multi-level or a chained radio frequency identification system. The system includes a master tag and a plurality of upper level tags and lower level tags associated with respective objects. The upper and lower level tags communicate with each other and the master tag so that reading of the master tag reveals the presence and absence of upper and lower level tags. In the chained RF system, the upper and lower level tags communicate locally with each other in a manner so that more remote tags that are out of range of some of the upper and lower level tags have their information relayed through adjacent tags to the master tag and thence to a controller.

  15. System and method for inventorying multiple remote objects

    DOE Patents [OSTI]

    Carrender, Curtis L.; Gilbert, Ronald W.

    2009-12-29

    A system and method of inventorying multiple objects utilizing a multi-level or a chained radio frequency identification system. The system includes a master tag and a plurality of upper level tags and lower level tags associated with respective objects. The upper and lower level tags communicate with each other and the master tag so that reading of the master tag reveals the presence and absence of upper and lower level tags. In the chained RF system, the upper and lower level tags communicate locally with each other in a manner so that more remote tags that are out of range of some of the upper and lower level tags have their information relayed through adjacent tags to the master tag and thence to a controller.

  16. Field Deployable Tritium Assay System Remote Control Software

    SciTech Connect (OSTI)

    1998-05-12

    The FDTASREM software is a command control based application for the Field Deployable Tritium Assay System (FDTAS-Invention Disclosure SRS-96-091 has been submitted). The program runs on the Remote computer which is located at the field site with the FDTAS sampling and analysis components. The application executes commands received over the connected phone line from the operator via the FDTAS Host GUI running in the laboratory some distance away. The FDTASREM controls interface with the FDTAS auto sampler and the analysis systems. It tells the sampler to take a sample from a specified location and send it to the analyzer. Once the sample is sent to the analyzer, FDTASREM sequences the internal valves and pumps to deliver the sample and cocktail to the counting chamber. Once the analysis is complete, the program can execute the clean command and prepare the system for the next sample.

  17. Remote high-temperature insulatorless heat-flux gauge

    DOE Patents [OSTI]

    Noel, Bruce W. (Espanola, NM)

    1993-01-01

    A remote optical heat-flux gauge for use in extremely high temperature environments is described. This application is possible because of the use of thermographic phosphors as the sensing media, and the omission of the need for an intervening layer of insulator between phosphor layers. The gauge has no electrical leads, but is interrogated with ultraviolet or laser light. The luminescence emitted by the two phosphor layers, which is indicative of the temperature of the layers, is collected and analyzed in order to determine the heat flux incident on the surface being investigated. The two layers of thermographic phosphor must be of different materials to assure that the spectral lines collected will be distinguishable. Spatial heat-flux measurements can be made by scanning the light across the surface of the gauge.

  18. Remote high-temperature insulatorless heat-flux gauge

    DOE Patents [OSTI]

    Noel, B.W.

    1993-12-28

    A remote optical heat-flux gauge for use in extremely high temperature environments is described. This application is possible because of the use of thermographic phosphors as the sensing media, and the omission of the need for an intervening layer of insulator between phosphor layers. The gauge has no electrical leads, but is interrogated with ultraviolet or laser light. The luminescence emitted by the two phosphor layers, which is indicative of the temperature of the layers, is collected and analyzed in order to determine the heat flux incident on the surface being investigated. The two layers of thermographic phosphor must be of different materials to assure that the spectral lines collected will be distinguishable. Spatial heat-flux measurements can be made by scanning the light across the surface of the gauge. 3 figures.

  19. Remote multi-position information gathering system and method

    DOE Patents [OSTI]

    Hirschfeld, T.B.

    1989-01-24

    A technique for gathering specific information from various remote locations, especially fluorimetric information characteristic of particular materials at the various locations is disclosed herein. This technique uses a single source of light disposed at still a different, central location and an overall optical network including an arrangement of optical fibers cooperating with the light source for directing individual light beams into the different information bearing locations. The incoming light beams result in corresponding displays of light, e.g., fluorescent light, containing the information to be obtained. The optical network cooperates with these light displays at the various locations for directing outgoing light beams containing the same information as their cooperating displays from these locations to the central location. Each of these outgoing beams is applied to a detection arrangement, e.g., a fluorescence spectroscope, for retrieving the information contained thereby. 9 figs.

  20. Remote visual inspection for NDE in power plants

    SciTech Connect (OSTI)

    Samsonov, P. )

    1993-06-01

    Remote visual inspection equipment such as borescopes, and video scopes give power plant nondestructive examination (NDE) groups the necessary tools to establish superior corrective and preventive plant maintenance programs. These scopes allow the user to evaluate the condition of pipes, boilers, turbines, heat exchangers, and other critical machinery without costly and time-consuming disassembly. Overall plant efficiency is increased and the likelihood of catastrophic failure is reduced significantly. Insertion diameters vary from 0.6 mm to 20 mm and come in lengths of just a few inches to as long as 100 ft. (30 m). Ancillary equipment such as video and digital processors provides a permanent record of the inspection and uses sophisticated three-dimensional (3-D) measurement, trend analysis, documentation, and image manipulation.

  1. Field Deployable Tritium Assay System Remote Control Software

    Energy Science and Technology Software Center (OSTI)

    1998-05-12

    The FDTASREM software is a command control based application for the Field Deployable Tritium Assay System (FDTAS-Invention Disclosure SRS-96-091 has been submitted). The program runs on the Remote computer which is located at the field site with the FDTAS sampling and analysis components. The application executes commands received over the connected phone line from the operator via the FDTAS Host GUI running in the laboratory some distance away. The FDTASREM controls interface with the FDTASmore » auto sampler and the analysis systems. It tells the sampler to take a sample from a specified location and send it to the analyzer. Once the sample is sent to the analyzer, FDTASREM sequences the internal valves and pumps to deliver the sample and cocktail to the counting chamber. Once the analysis is complete, the program can execute the clean command and prepare the system for the next sample.« less

  2. REMOTE FIELD EDDY CURRENT INSPECTION OF UNPIGGABLE PIPELINES

    SciTech Connect (OSTI)

    Albert Teitsma

    2004-03-01

    The Remote Field Eddy Current (RFEC) technique is ideal for inspecting unpiggable pipelines because all its components can be made much smaller than the diameter of the pipe to be inspected. We reviewed the technique, and used demonstrations from prior work by others in presentations on the technique and how we plan to develop it. Coils were wound; a jig for pulling the coils through the pipe was manufactured; defects were machined in one six-inch diameter, ten-foot long pipe; and the equipment was assembled. After completing first crude pullout test to show that RFEC inspection would work, we repeated the experiment with a proper jig and got excellent results. The test showed the expected behavior, with the direct field dominating the signal to about two pipe diameters from the drive coil, and the remote field dominating for greater separations between the drive coil and the sensing coils. Response of RFEC to a typical defect was measured, as was the sensitivity to defect size. Before manufacturing defects in the pipe, we measured the effect of defect separation and concluded that defects separated by 18 inches or 1/3rd of the pipe diameter did not interfere with each other. We manufactured a set of 13 defects, and measured the RFEC signals. We found a background variation that was eventually attributed to permeability variations in the seamless pipe. We scanned all thirteen defects and got satisfactory results. The two smallest defects did not show a signal, but these were much too small to be reported in a pipeline inspection. We acquired a ten-foot seam welded pipe that has much less background variation. We are measuring the sensitivity of RFEC signals to mechanical variations between the exciter and sensing coils.

  3. U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause the target application to execute arbitrary code on the target user's system.

  4. Preliminary Hazard Analysis for the Remote-Handled Low-Level Waste Disposal Facility

    SciTech Connect (OSTI)

    Lisa Harvego; Mike Lehto

    2010-02-01

    The need for remote handled low level waste (LLW) disposal capability has been identified. A new onsite, remote-handled LLW disposal facility has been identified as the highest ranked alternative for providing continued, uninterrupted remote-handled LLW disposal capability for remote-handled LLW that is generated as part of the nuclear mission of the Idaho National Laboratory and from spent nuclear fuel processing activities at the Naval Reactors Facility. Historically, this type of waste has been disposed of at the Radioactive Waste Management Complex. Disposal of remote-handled LLW in concrete disposal vaults at the Radioactive Waste Management Complex will continue until the facility is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). This document supports the conceptual design for the proposed remote-handled LLW disposal facility by providing an initial nuclear facility hazard categorization and by identifying potential hazards for processes associated with onsite handling and disposal of remote-handled LLW.

  5. Preliminary Hazard Analysis for the Remote-Handled Low-Level Waste Disposal Facility

    SciTech Connect (OSTI)

    Lisa Harvego; Mike Lehto

    2010-05-01

    The need for remote handled low level waste (LLW) disposal capability has been identified. A new onsite, remote-handled LLW disposal facility has been identified as the highest ranked alternative for providing continued, uninterrupted remote-handled LLW disposal capability for remote-handled LLW that is generated as part of the nuclear mission of the Idaho National Laboratory and from spent nuclear fuel processing activities at the Naval Reactors Facility. Historically, this type of waste has been disposed of at the Radioactive Waste Management Complex. Disposal of remote-handled LLW in concrete disposal vaults at the Radioactive Waste Management Complex will continue until the facility is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). This document supports the conceptual design for the proposed remote-handled LLW disposal facility by providing an initial nuclear facility hazard categorization and by identifying potential hazards for processes associated with onsite handling and disposal of remote-handled LLW.

  6. Preliminary Hazard Analysis for the Remote-Handled Low-Level Waste Disposal Project

    SciTech Connect (OSTI)

    Lisa Harvego; Mike Lehto

    2010-10-01

    The need for remote handled low level waste (LLW) disposal capability has been identified. A new onsite, remote-handled LLW disposal facility has been identified as the highest ranked alternative for providing continued, uninterrupted remote-handled LLW disposal capability for remote-handled LLW that is generated as part of the nuclear mission of the Idaho National Laboratory and from spent nuclear fuel processing activities at the Naval Reactors Facility. Historically, this type of waste has been disposed of at the Radioactive Waste Management Complex. Disposal of remote-handled LLW in concrete disposal vaults at the Radioactive Waste Management Complex will continue until the facility is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). This document supports the conceptual design for the proposed remote-handled LLW disposal facility by providing an initial nuclear facility hazard categorization and by identifying potential hazards for processes associated with onsite handling and disposal of remote-handled LLW.

  7. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Arbitrary Code and Local Users Gain Elevated Privileges | Department of Energy 5: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges June 2, 2011 - 4:38pm Addthis PROBLEM: The Cisco AnyConnect Secure Mobility Client is the Cisco next-generation VPN client, which provides remote users with secure

  8. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sessions | Department of Energy 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows

  9. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Commands on the Target System | Department of Energy 49: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System December 1, 2011 - 9:00am Addthis PROBLEM: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System. PLATFORM: IBM Tivoli Netcool Reporter prior to 2.2.0.8 ABSTRACT: A vulnerability was reported in IBM Tivoli Netcool

  10. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Address Bar URLs | Department of Energy 5: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs May 9, 2012 - 7:00am Addthis PROBLEM: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs PLATFORM: prior to 5.1.1; iPhone 3GS, iPhone 4, iPhone 4S, iPod touch (3rd generation) and later, iPad, iPad 2 ABSTRACT: Two vulnerabilities were reported in

  11. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE

  12. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Deny Service | Department of Energy 1: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall

  13. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Spoof the Server | Department of Energy 65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May 28, 2013 - 12:46am Addthis PROBLEM: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server PLATFORM: Cisco WebEx for iOS 4.1, Other versions may also be affected. ABSTRACT: A vulnerability was reported in Cisco WebEx for iOS. REFERENCE LINKS:

  14. Vegetation Cover Analysis of Hazardous Waste Sites in Utah and Arizona Using Hyperspectral Remote Sensing

    Energy Savers [EERE]

    Remote Sens. 2012, 4, 327-353; doi:10.3390/rs4020327 Remote Sensing ISSN 2072-4292 www.mdpi.com/journal/remotesensing Article Vegetation Cover Analysis of Hazardous Waste Sites in Utah and Arizona Using Hyperspectral Remote Sensing Jungho Im 1, *, John R. Jensen 2 , Ryan R. Jensen 3 , John Gladden 4 , Jody Waugh 5 and Mike Serrato 4 1 Department of Environmental Resources Engineering, College of Environmental Science and Forestry, State University of New York, Syracuse, NY 13210, USA 2

  15. V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Execute Arbitrary Code | Department of Energy 8: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code August 27, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities were reported in RealPlayer PLATFORM: RealPlayer 16.0.2.32 and prior ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system REFERENCE LINKS:

  16. Project Execution Plan for the Remote Handled Low-Level Waste Disposal Project

    SciTech Connect (OSTI)

    Danny Anderson

    2014-07-01

    As part of ongoing cleanup activities at the Idaho National Laboratory (INL), closure of the Radioactive Waste Management Complex (RWMC) is proceeding under the Comprehensive Environmental Response, Compensation, and Liability Act (42 USC 9601 et seq. 1980). INL-generated radioactive waste has been disposed of at RWMC since 1952. The Subsurface Disposal Area (SDA) at RWMC accepted the bulk of INL’s contact and remote-handled low-level waste (LLW) for disposal. Disposal of contact-handled LLW and remote-handled LLW ion-exchange resins from the Advanced Test Reactor in the open pit of the SDA ceased September 30, 2008. Disposal of remote-handled LLW in concrete disposal vaults at RWMC will continue until the facility is full or until it must be closed in preparation for final remediation of the SDA (approximately at the end of fiscal year FY 2017). The continuing nuclear mission of INL, associated ongoing and planned operations, and Naval spent fuel activities at the Naval Reactors Facility (NRF) require continued capability to appropriately dispose of contact and remote handled LLW. A programmatic analysis of disposal alternatives for contact and remote-handled LLW generated at INL was conducted by the INL contractor in Fiscal Year 2006; subsequent evaluations were completed in Fiscal Year 2007. The result of these analyses was a recommendation to the Department of Energy (DOE) that all contact-handled LLW generated after September 30, 2008, be disposed offsite, and that DOE proceed with a capital project to establish replacement remote-handled LLW disposal capability. An analysis of the alternatives for providing replacement remote-handled LLW disposal capability has been performed to support Critical Decision-1. The highest ranked alternative to provide this required capability has been determined to be the development of a new onsite remote-handled LLW disposal facility to replace the existing remote-handled LLW disposal vaults at the SDA. Several offsite DOE and commercial disposal options exist for contact-handled LLW; however, offsite disposal options are either not currently available (i.e., commercial disposal facilities), practical, or cost-effective for all remote-handled LLW streams generated at INL. Offsite disposal of all INL and tenant-generated remote-handled waste is further complicated by issues associated with transporting highly radioactive waste in commerce; and infrastructure and processing changes at the generating facilities, specifically NRF, that would be required to support offsite disposal. The INL Remote-Handled LLW Disposal Project will develop a new remote handled LLW disposal facility to meet mission-critical, remote-handled LLW disposal needs. A formal DOE decision to proceed with the project has been made in accordance with the requirements of National Environmental Policy Act (42 USC§ 4321 et seq.). Remote-handled LLW is generated from nuclear programs conducted at INL, including spent nuclear fuel handling and operations at NRF and operations at the Advanced Test Reactor. Remote-handled LLW also will be generated by new INL programs and from segregation and treatment (as necessary) of remote handled scrap and waste currently stored in the Radioactive Scrap and Waste Facility at the Materials and Fuels Complex.

  17. GMG: A Guaranteed, Efficient Global Optimization Algorithm for Remote Sensing.

    SciTech Connect (OSTI)

    D'Helon, CD

    2004-08-18

    The monocular passive ranging (MPR) problem in remote sensing consists of identifying the precise range of an airborne target (missile, plane, etc.) from its observed radiance. This inverse problem may be set as a global optimization problem (GOP) whereby the difference between the observed and model predicted radiances is minimized over the possible ranges and atmospheric conditions. Using additional information about the error function between the predicted and observed radiances of the target, we developed GMG, a new algorithm to find the Global Minimum with a Guarantee. The new algorithm transforms the original continuous GOP into a discrete search problem, thereby guaranteeing to find the position of the global minimum in a reasonably short time. The algorithm is first applied to the golf course problem, which serves as a litmus test for its performance in the presence of both complete and degraded additional information. GMG is further assessed on a set of standard benchmark functions and then applied to various realizations of the MPR problem.

  18. Remotely Interrogated Passive Polarizing Dosimeter (RIPPeD).

    SciTech Connect (OSTI)

    Kemme, Shanalyn A.; Buller, Daniel L.; Dirk, Shawn M.; Boye, Robert R.; Samora, Sally; Washburn, Cody M.; Wheeler, David Roger

    2008-09-01

    Conductive polymers have become an extremely useful class of materials for many optical applications. We have developed an electrochemical growth method for depositing highly conductive ({approx}100 S/cm) polypyrrole. Additionally, we have adapted advanced fabrication methods for use with the polypyrrole resulting in gratings with submicron features. This conductive polymer micro-wire grid provides an optical polarizer with unique properties. When the polymer is exposed to ionizing radiation, its conductivity is affected and the polarization properties of the device, specifically the extinction ratio, change in a corresponding manner. This change in polarization properties can be determined by optically interrogating the device, possibly from a remote location. The result is a passive radiation-sensitive sensor with very low optical visibility. The ability to interrogate the device from a safe standoff distance provides a device useful in potentially dangerous environments. Also, the passive nature of the device make it applicable in applications where external power is not available. We will review the polymer deposition, fabrication methods and device design and modeling. The characterization of the polymer's sensitivity to ionizing radiation and optical testing of infrared polarizers before and after irradiation will also be presented. These experimental results will highlight the usefulness of the conductive infrared polarizer to many security and monitoring applications.

  19. Establishing a Secure Data Center with Remote Access: Preprint

    SciTech Connect (OSTI)

    Gonder, J.; Burton, E.; Murakami, E.

    2012-04-01

    Access to existing travel data is critical for many analysis efforts that lack the time or resources to support detailed data collection. High-resolution data sets provide particular value, but also present a challenge for preserving the anonymity of the original survey participants. To address this dilemma of providing data access while preserving privacy, the National Renewable Energy Laboratory and the U.S. Department of Transportation have launched the Transportation Secure Data Center (TSDC). TSDC data sets include those from regional travel surveys and studies that increasingly use global positioning system devices. Data provided by different collecting agencies varies with respect to formatting, elements included and level of processing conducted in support of the original purpose. The TSDC relies on a number of geospatial and other analysis tools to ensure data quality and to generate useful information outputs. TSDC users can access the processed data in two different ways. The first is by downloading summary results and second-by-second vehicle speed profiles (with latitude/longitude information removed) from a publicly-accessible website. The second method involves applying for a remote connection account to a controlled-access environment where spatial analysis can be conducted, but raw data cannot be removed.

  20. Prediction of hydrocarbon-bearing structures based on remote sensing

    SciTech Connect (OSTI)

    Smirnova, I.; Gololobov, Yu.; Rusanova, A. )

    1993-09-01

    The technology we developed is based on the use of remotely sensed data and has proved to be effective for identification of structures that appear promising for oil and gas, in particular, reefs in the hydrocarbon-bearing basin of central Asia (Turkmenistan and Uzbekistan). It implements the [open quotes]geoindication[close quotes] concept, the main idea being that landscape components (geoindicators) and subsurface geological features are correlated and depend on each other. Subsurface features (uplifts, depressions, faults, reefs, and other lithological and structural heterogeneities) cause physical and chemical alterations in overlying rocks up to the land surface; thus, they are reflected in distribution of landscape components and observed on airborne and satellite images as specific patterns. The following identified geoindicators are related to different subsurface geological features: definite formations, anticlines, and reefs (barrier, atoll, and bioherm). The geoindicators are extracted from images either visually or by using computer systems. Specially developed software is applied to analyze geoindicator distribution and calculate their characteristics. In the course of processing, it is possible to distinguish folds from reefs. Distribution of geoindicator characteristics is examined on the well studied reefs, and from the regularities, established promising areas with reefs are revealed. When applying the technology in central Asia, the results were successfully verified by field works, seismic methods, and drilling.

  1. Remote Area Power Supply (RAPS) load and resource profiles.

    SciTech Connect (OSTI)

    Giles, Lauren; Skolnik, Edward G.; Marchionini, Brian; Fall, Ndeye K.

    2007-07-01

    In 1997, an international team interested in the development of Remote Area Power Supply (RAPS) systems for rural electrification projects around the world was organized by the International Lead Zinc Research Organization (ILZRO) with the support of Sandia National Laboratories (SNL). The team focused on defining load and resource profiles for RAPS systems. They identified single family homes, small communities, and villages as candidates for RAPS applications, and defined several different size/power requirements for each. Based on renewable energy and resource data, the team devised a ''strawman'' series of load profiles. A RAPS system typically consists of a renewable and/or conventional generator, power conversion equipment, and a battery. The purpose of this report is to present data and information on insolation levels and load requirements for ''typical'' homes, small communities, and larger villages around the world in order to facilitate the development of robust design practices for RAPS systems, and especially for the storage battery component. These systems could have significant impact on areas of the world that would otherwise not be served by conventional electrical grids.

  2. Laser remote sensing of backscattered light from a target sample

    DOE Patents [OSTI]

    Sweatt, William C.; Williams, John D.

    2008-02-26

    A laser remote sensing apparatus comprises a laser to provide collimated excitation light at a wavelength; a sensing optic, comprising at least one optical element having a front receiving surface to focus the received excitation light onto a back surface comprising a target sample and wherein the target sample emits a return light signal that is recollimated by the front receiving surface; a telescope for collecting the recollimated return light signal from the sensing optic; and a detector for detecting and spectrally resolving the return light signal. The back surface further can comprise a substrate that absorbs the target sample from an environment. For example the substrate can be a SERS substrate comprising a roughened metal surface. The return light signal can be a surface-enhanced Raman signal or laser-induced fluorescence signal. For fluorescence applications, the return signal can be enhanced by about 10.sup.5, solely due to recollimation of the fluorescence return signal. For SERS applications, the return signal can be enhanced by 10.sup.9 or more, due both to recollimation and to structuring of the SERS substrate so that the incident laser and Raman scattered fields are in resonance with the surface plasmons of the SERS substrate.

  3. NMR analysis on microfluidic devices by remote detection

    SciTech Connect (OSTI)

    McDonnell, Erin E.; Han, SongI; Hilty, Christian; Pierce,Kimberly; Pines, Alexander

    2005-08-15

    We present a novel approach to perform high-sensitivity NMR imaging and spectroscopic analysis on microfluidic devices. The application of NMR, the most information rich spectroscopic technique, to microfluidic devices remains a challenge because the inherently low sensitivity of NMR is aggravated by small fluid volumes leading to low NMR signal, and geometric constraints resulting in poor efficiency for inductive detection. We address the latter by physically separating signal detection from encoding of information with remote detection. Thereby, we use a commercial imaging probe with sufficiently large diameter to encompass the entire device, enabling encoding of NMR information at any location on the chip. Because large-diameter coils are too insensitive for detection, we store the encoded information as longitudinal magnetization and flow it into the outlet capillary. There, we detect the signal with optimal sensitivity using a solenoidal microcoil, and reconstruct the information encoded in the fluid. We present a generally applicable design for a detection-only microcoil probe that can be inserted into the bore of a commercial imaging probe. Using hyperpolarized 129Xe gas, we show that this probe enables sensitive reconstruction of NMR spectroscopic information encoded by the large imaging probe while keeping the flexibility of a large coil.

  4. Microfluidic gas flow profiling using remote detection NMR

    SciTech Connect (OSTI)

    Hilty, Christian; McDonnell, Erin; Granwehr, Josef; Pierce,Kimberly; Han, Song-I Han; Pines, Alexander

    2005-05-06

    Miniaturized fluid handling devices have recently attracted considerable interest in many areas of science1. Such microfluidic chips perform a variety of functions, ranging from analysis of biological macromolecules2,3 to catalysis of reactions and sensing in the gas phase4,5. To enable precise fluid handling, accurate knowledge of the flow properties within these devices is important. Due to low Reynolds numbers, laminar flow is usually assumed. However, either by design or unintentionally, the flow characteristic in small channels is often altered, for example by surface interactions, viscous and diffusional effects, or electrical potentials. Therefore, its prediction is not always straight-forward6-8. Currently, most microfluidic flow measurements rely on optical detection of markers9,10, requiring the injection of tracers and transparent devices. Here, we show profiles of microfluidic gas flow in capillaries and chip devices obtained by NMR in the remote detection modality11,12. Through the transient measurement of dispersion13, NMR is well adaptable for non-invasive, yet sensitive determination of the flow field and provides a novel and potentially more powerful tool to profile flow in capillaries and miniaturized flow devices.

  5. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  6. T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6.

  7. T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A buffer overflow exists when creating or verifying XML signatures with RSA keys of sizes on the order of 8192 or more bits. This typically results in a crash and denial of service in applications that verify signatures using keys that could be supplied by an attacker.

  8. Mechanisms of intergranular attack and stress corrosion cracking of Alloy 600 by high-temperature caustic solutions containing impurities: Final report

    SciTech Connect (OSTI)

    Van Rooyen, D.; Bandy, R.

    1987-07-01

    The mechanisms of intergranular attack (IGA) and intergranular stress corrosion cracking (SCC) of Alloy 600 are investigated in high temperature sodium hydroxide environments contaminated with impurities such as carbonate, sulfate, silicate, magnetite, and chromic oxide. Results show that caustic alone can cause both IGA and SCC. The effects of electrochemical potential, stress, time, temperature and the metallurgical state of Alloy 600 on the IGA and SCC are discussed. It appears that both IGA and SCC are manifestations of a general intergranular failure process. In the presence of adverse potential, stress, strain rate and temperature, the slower IGA process is generally replaced by the faster SCC process.

  9. T-648: Avaya IP Office Manager TFTP Server Lets Remote Users Traverse the Directory

    Broader source: Energy.gov [DOE]

    The software does not properly validate user-supplied input. A remote user can supply a specially crafted request to view files on target system running the IP Office Manager software.

  10. Remote-Handled Low-Level Waste Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2014-06-01

    The Remote-Handled Low-Level Waste (LLW) Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). Development of a new onsite disposal facility will provide necessary remote-handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability. The report is owned by the Design Authority, who can authorize revisions and exceptions. This report will be retained for the lifetime of the facility.

  11. U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444 Bugtraq ID: 55184 CVE-2012-4595, CVE-2012-4596, CVE-2012-4597 IMPACT ASSESSMENT: Medium Discussion A remote...

  12. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can spoof the address bar URL. reference LINKS: SecurityTracker Alert ID: ... the target user to a spoofed site with a URL that appears to be a legitimate domain. ...

  13. Using remote sensing to quantify albedo of roofs in seven California...

    Office of Scientific and Technical Information (OSTI)

    1: Methods Citation Details In-Document Search This content will become publicly available on March 14, 2017 Title: Using remote sensing to quantify albedo of roofs in seven ...

  14. U-088: Symantec pcAnywhere Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Symantec pcAnywhere. A remote user can execute arbitrary code on the target system. A local user can obtain elevated privileges on the target system.

  15. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    overflow CVE-2012-0670. A specially crafted '.pict' file can trigger a memory corruption error CVE-2012-0671. Impact: A remote user can create a file that, when loaded by...

  16. Remote-Handled Low-Level Waste Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2012-04-01

    The Remote-Handled Low-Level Waste (LLW) Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). Development of a new onsite disposal facility will provide necessary remote-handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability. The report is owned by the Design Authority, who can authorize revisions and exceptions. This report will be retained for the lifetime of the facility.

  17. Remote-Handled Low-Level Waste Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2011-04-01

    The Remote-Handled Low-Level Waste (LLW) Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). Development of a new onsite disposal facility, the highest ranked alternative, will provide necessary remote-handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability. The report is owned by the Design Authority, who can authorize revisions and exceptions. This report will be retained for the lifetime of the facility.

  18. Remote-Handled Low-Level Waste Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2011-01-01

    The Remote-Handled Low-Level Waste (LLW) Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). Development of a new onsite disposal facility, the highest ranked alternative, will provide necessary remote-handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability. The report is owned by the Design Authority, who can authorize revisions and exceptions. This report will be retained for the lifetime of the facility.

  19. Remote vacuum or pressure sealing device and method for critical isolated systems

    DOE Patents [OSTI]

    Brock, James David (Newport News, VA); Keith, Christopher D. (Newport News, VA)

    2012-07-10

    A remote vacuum or pressure sealing apparatus and method for making a radiation tolerant, remotely prepared seal that maintains a vacuum or pressure tight seal throughout a wide temperature range. The remote sealing apparatus includes a fixed threaded sealing surface on an isolated system, a gasket, and an insert consisting of a plug with a protruding sample holder. An insert coupling device, provided for inserting samples within the isolated system, includes a threaded fastener for cooperating with the fixed threaded sealing surface on the isolated system. The insert coupling device includes a locating pin for azimuthal orientation, coupling pins, a tooted coaxial socket wrench, and an insert coupling actuator for actuating the coupling pins. The remote aspect of the sealing apparatus maintains the isolation of the system from the user's environment, safely preserving the user and the system from detrimental effect from each respectively.

  20. T-654: Apple QuickTime Multiple Bugs Let Remote Users Execute Arbitrary

    Broader source: Energy.gov [DOE]

    A remote user can create a specially crafted file that, when loaded by the target user, will execute arbitrary code on the target system. The code will run with the privileges of the target user.

  1. V-109: Google Chrome WebKit Type Confusion Error Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Google Chrome WebKit Type Confusion Error Lets Remote Users Execute Arbitrary Code PLATFORM: Google Chrome prior to 25.0.1364.160 ABSTRACT: A vulnerability was reported in...

  2. Lidar for remote sensing; Proceedings of the Meeting, Berlin, Germany, June 24-26, 1992

    SciTech Connect (OSTI)

    Becherer, R.J.; Werner, C.

    1992-01-01

    The present volume on lidar for remote sensing discusses lidar system techniques for remote sensing of atmospheric pollution, airborne and surface-based lidar for environmental sensing of water and oceans, Doppler lidar for wind sensing and related measurement, aerosol measurements using lidar, ozone, water vapor, temperature, and density sensing with lidar systems, and new lidar technology systems and concepts. Attention is given to remote sensing of air pollution over large European cities by lidar, differential absorption lidar monitoring of atmospheric atomic mercury, an experimental evaluation of an airborne depth-sounding lidar, and remote sensing of the sea by tunable multichannel lidar. Topics addressed include recent developments in lidar techniques to measure the wind in the middle atmosphere, recent stratospheric aerosol measurements with a combined Raman elastic-backscatter lidar, the development of an eye-safe IR aerosol lidar, and temperature measurement by rotational Raman lidar.

  3. U-192: VMware Workstation/Player VM Remote Device Bug Lets Local...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    aBSTRACT: A local or remote user can cause denial of service conditions on the target virtual system. reference LINKS: Vendor Advisory Security Tracker ID 1027173 CVE-2012-3289...

  4. U-111: IBM AIX ICMP Processing Flaw Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    aixefixessecurityicmpfix.tar Addthis Related Articles U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service V-031: IBM WebSphere DataPower...

  5. U-119: Blackberry PlayBook Unspecified WebKit Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7.1, and BlackBerry PlayBook tablet software ABSTRACT: A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's...

  6. Remote-Handled Low-Level Waste Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2012-06-01

    The Remote-Handled Low-Level Waste (LLW) Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). Development of a new onsite disposal facility will provide necessary remote-handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability. The report is owned by the Design Authority, who can authorize revisions and exceptions. This report will be retained for the lifetime of the facility.

  7. Remote-Handled Low-Level Waste Disposal Project Code of Record

    SciTech Connect (OSTI)

    Austad, S. L.; Guillen, L. E.; McKnight, C. W.; Ferguson, D. S.

    2015-04-01

    The Remote-Handled Low-Level Waste (LLW) Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). Development of a new onsite disposal facility will provide necessary remote-handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability. The report is owned by the Design Authority, who can authorize revisions and exceptions. This report will be retained for the lifetime of the facility.

  8. Surface-Based Remote Sensing of the Aerosol Indirect Effect at Southern Great Plains

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Surface-Based Remote Sensing of the Aerosol Indirect Effect at Southern Great Plains G. Feingold and W. L. Eberhard National Oceanic and Atmospheric Administration Environmental Technology Laboratory Boulder, Colorado D. E. Vernon and M. Previdi Rutgers University New Brunswick, New Jersey Abstract We have demonstrated first measurements of the aerosol indirect effect using ground-based remote sensors at the Southern Great Plains (SGP) site. The response of non-precipitating, ice-free clouds to

  9. Apparatus for detecting a magnetic anomaly contiguous to remote location by squid gradiometer and magnetometer systems

    DOE Patents [OSTI]

    Overton, Jr., William C.; Steyert, Jr., William A.

    1984-01-01

    A superconducting quantum interference device (SQUID) magnetic detection apparatus detects magnetic fields, signals, and anomalies at remote locations. Two remotely rotatable SQUID gradiometers may be housed in a cryogenic environment to search for and locate unambiguously magnetic anomalies. The SQUID magnetic detection apparatus can be used to determine the azimuth of a hydrofracture by first flooding the hydrofracture with a ferrofluid to create an artificial magnetic anomaly therein.

  10. Remote Sensing Observations from MTI Satellites and GMS Over Tropical Island of Nauru

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Sensing Laboratory Department of Energy's chief risk officer visits Nevada National Security Site Earlier this month, Associate Deputy Secretary John MacWilliams visited the Nevada National Security Site (NNSS) in his role as Chief Risk Officer for the Department of Energy. He reviewed the various ways the NNSS contributes to the department's and NNSA's missions, including radiological

    Remote Sensing Observations from MTI Satellites and GMS Over Tropical Island of Nauru W. M. Porch, P.

  11. WIPP Receives First Remote-Handled Waste Shipment From Sandia Labs

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    For immediate release WIPP Receives First Remote-Handled Waste Shipment From Sandia Labs CARLSBAD, N.M., December 21, 2011 - The U.S. Department of Energy's (DOE) Waste Isolation Pilot Plant (WIPP) has received the first of eight planned defense-related remote- handled transuranic (RH-TRU) waste shipments from Sandia National Laboratories (SNL) in Albuquerque. The shipment arrived December 16 for permanent disposal in WIPP's underground repository. DOE National TRU Program Director J.R. Stroble

  12. Preliminary Safety Design Report for Remote Handled Low-Level Waste Disposal Facility

    SciTech Connect (OSTI)

    Timothy Solack; Carol Mason

    2012-03-01

    A new onsite, remote-handled low-level waste disposal facility has been identified as the highest ranked alternative for providing continued, uninterrupted remote-handled low-level waste disposal for remote-handled low-level waste from the Idaho National Laboratory and for nuclear fuel processing activities at the Naval Reactors Facility. Historically, this type of waste has been disposed of at the Radioactive Waste Management Complex. Disposal of remote-handled low-level waste in concrete disposal vaults at the Radioactive Waste Management Complex will continue until the facility is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). This preliminary safety design report supports the design of a proposed onsite remote-handled low-level waste disposal facility by providing an initial nuclear facility hazard categorization, by discussing site characteristics that impact accident analysis, by providing the facility and process information necessary to support the hazard analysis, by identifying and evaluating potential hazards for processes associated with onsite handling and disposal of remote-handled low-level waste, and by discussing the need for safety features that will become part of the facility design.

  13. Conceptual Safety Design Report for the Remote Handled Low-Level Waste Disposal Facility

    SciTech Connect (OSTI)

    Boyd D. Christensen

    2010-02-01

    A new onsite, remote-handled LLW disposal facility has been identified as the highest ranked alternative for providing continued, uninterrupted remote-handled LLW disposal for remote-handled LLW from the Idaho National Laboratory and for spent nuclear fuel processing activities at the Naval Reactors Facility. Historically, this type of waste has been disposed of at the Radioactive Waste Management Complex. Disposal of remote-handled LLW in concrete disposal vaults at the Radioactive Waste Management Complex will continue until the facility is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). This conceptual safety design report supports the design of a proposed onsite remote-handled LLW disposal facility by providing an initial nuclear facility hazard categorization, by identifying potential hazards for processes associated with onsite handling and disposal of remote-handled LLW, by evaluating consequences of postulated accidents, and by discussing the need for safety features that will become part of the facility design.

  14. Conceptual Safety Design Report for the Remote Handled Low-Level Waste Disposal Facility

    SciTech Connect (OSTI)

    Boyd D. Christensen

    2010-05-01

    A new onsite, remote-handled LLW disposal facility has been identified as the highest ranked alternative for providing continued, uninterrupted remote-handled LLW disposal for remote-handled LLW from the Idaho National Laboratory and for spent nuclear fuel processing activities at the Naval Reactors Facility. Historically, this type of waste has been disposed of at the Radioactive Waste Management Complex. Disposal of remote-handled LLW in concrete disposal vaults at the Radioactive Waste Management Complex will continue until the facility is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). This conceptual safety design report supports the design of a proposed onsite remote-handled LLW disposal facility by providing an initial nuclear facility hazard categorization, by identifying potential hazards for processes associated with onsite handling and disposal of remote-handled LLW, by evaluating consequences of postulated accidents, and by discussing the need for safety features that will become part of the facility design.

  15. Five Kilowatt Fuel Cell Demonstration for Remote Power Applications

    SciTech Connect (OSTI)

    Dennis Witmer; Tom Johnson; Jack Schmid

    2008-12-31

    While most areas of the US are serviced by inexpensive, dependable grid connected electrical power, many areas of Alaska are not. In these areas, electrical power is provided with Diesel Electric Generators (DEGs), at much higher cost than in grid connected areas. The reasons for the high cost of power are many, including the high relative cost of diesel fuel delivered to the villages, the high operational effort required to maintain DEGs, and the reverse benefits of scale for small utilities. Recent progress in fuel cell technologies have lead to the hope that the DEGs could be replaced with a more efficient, reliable, environmentally friendly source of power in the form of fuel cells. To this end, the University of Alaska Fairbanks has been engaged in testing early fuel cell systems since 1998. Early tests were conducted on PEM fuel cells, but since 2001, the focus has been on Solid Oxide Fuel Cells. In this work, a 5 kW fuel cell was delivered to UAF from Fuel Cell Technologies of Kingston, Ontario. The cell stack is of a tubular design, and was built by Siemens Westinghouse Fuel Cell division. This stack achieved a run of more than 1 year while delivering grid quality electricity from natural gas with virtually no degradation and at an electrical efficiency of nearly 40%. The project was ended after two control system failures resulted in system damage. While this demonstration was successful, considerable additional product development is required before this technology is able to provide electrical energy in remote Alaska. The major issue is cost, and the largest component of system cost currently is the fuel cell stack cost, although the cost of the balance of plant is not insignificant. While several manufactures are working on schemes for significant cost reduction, these systems do not as yet provide the same level of performance and reliability as the larger scale Siemens systems, or levels that would justify commercial deployment.

  16. Defense Remote Handled Transuranic Waste Cost/Schedule Optimization Study

    SciTech Connect (OSTI)

    Pierce, G.D. . Joint Integration Office); Beaulieu, D.H. ); Wolaver, R.W.; Carson, P.H. Corp., Boulder, CO )

    1986-11-01

    The purpose of this study is to provide the DOE information with which it can establish the most efficient program for the long management and disposal, in the Waste Isolation Pilot Plant (WIPP), of remote handled (RH) transuranic (TRU) waste. To fulfill this purpose, a comprehensive review of waste characteristics, existing and projected waste inventories, processing and transportation options, and WIPP requirements was made. Cost differences between waste management alternatives were analyzed and compared to an established baseline. The result of this study is an information package that DOE can use as the basis for policy decisions. As part of this study, a comprehensive list of alternatives for each element of the baseline was developed and reviewed with the sites. The principle conclusions of the study follow. A single processing facility for RH TRU waste is both necessary and sufficient. The RH TRU processing facility should be located at Oak Ridge National Laboratory (ORNL). Shielding of RH TRU to contact handled levels is not an economic alternative in general, but is an acceptable alternative for specific waste streams. Compaction is only cost effective at the ORNL processing facility, with a possible exception at Hanford for small compaction of paint cans of newly generated glovebox waste. It is more cost effective to ship certified waste to WIPP in 55-gal drums than in canisters, assuming a suitable drum cask becomes available. Some waste forms cannot be packaged in drums, a canister/shielded cask capability is also required. To achieve the desired disposal rate, the ORNL processing facility must be operational by 1996. Implementing the conclusions of this study can save approximately $110 million, compared to the baseline, in facility, transportation, and interim storage costs through the year 2013. 10 figs., 28 tabs.

  17. Developing health-based pre-planning clearance goals for airport remediation following chemical terrorist attack: Introduction and key assessment considerations

    SciTech Connect (OSTI)

    Watson, Annetta Paule; Raber, Ellen; Dolislager, Frederick; Hauschild, Veronique; Hall, Dr. Linda; Love, Dr. Adam

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While restoration timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical terrorist release. What follows is the first of a two-part analysis identifying key considerations, critical information, and decision criteria to facilitate post-attack and post-decontamination consequence management activities. A conceptual site model and human health-based exposure guidelines are developed and reported as an aid to site-specific pre-planning in the current absence of U.S. state or Federal values designated as compound-specific remediation or re-entry concentrations, and to safely expedite facility recovery to full operational status. Chemicals of concern include chemical warfare nerve and vesicant agents and the toxic industrial compounds phosgene, hydrogen cyanide, and cyanogen chloride. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

  18. On the feasibility of comprehensive high-resolution 3D remote dosimetry

    SciTech Connect (OSTI)

    Juang, Titania; Grant, Ryan; Adamovics, John; Ibbott, Geoffrey; Oldham, Mark

    2014-07-15

    Purpose: This study investigates the feasibility of remote high-resolution 3D dosimetry with the PRESAGE/Optical-CT system. In remote dosimetry, dosimeters are shipped out from a central base institution to a remote institution for irradiation, then shipped back to the base institution for subsequent readout and analysis. Methods: Two nominally identical optical-CT scanners for 3D dosimetry were constructed and placed at the base (Duke University) and remote (Radiological Physics Center) institutions. Two formulations of PRESAGE (SS1, SS2) radiochromic dosimeters were investigated. Higher sensitivity was expected in SS1, which had higher initiator content (0.25% bromotrichloromethane), while greater temporal stability was expected in SS2. Four unirradiated PRESAGE dosimeters (two per formulation, cylindrical dimensions 11 cm diameter, 8.59.5 cm length) were imaged at the base institution, then shipped to the remote institution for planning and irradiation. Each dosimeter was irradiated with the same simple treatment plan: an isocentric 3-field cross arrangement of 4 4 cm open 6 MV beams configured as parallel opposed laterals with an anterior beam. This simple plan was amenable to accurate and repeatable setup, as well as accurate dose modeling by a commissioned treatment planning system (Pinnacle). After irradiation and subsequent (within 1 h) optical-CT readout at the remote institution, the dosimeters were shipped back to the base institution for remote dosimetry readout 3 days postirradiation. Measured on-site and remote relative 3D dose distributions were registered to the Pinnacle dose calculation, which served as the reference distribution for 3D gamma calculations with passing criteria of 5%/2 mm, 3%/3 mm, and 3%/2 mm with a 10% dose threshold. Gamma passing rates, dose profiles, and color-maps were all used to assess and compare the performance of both PRESAGE formulations for remote dosimetry. Results: The best agreements between the Pinnacle plan and dosimeter readout were observed in PRESAGE formulation SS2. Under 3%/3 mm 3D gamma passing criteria, passing rates were 91.5% 3.6% (SS1) and 97.4% 2.2% (SS2) for immediate on-site dosimetry, 96.7% 2.4% (SS1) and 97.6% 0.6% (SS2) for remote dosimetry. These passing rates are well within TG119 recommendations (88%90% passing). Under the more stringent criteria of 3%/2 mm, there is a pronounced difference [8.0 percentage points (pp)] between SS1 formulation passing rates for immediate and remote dosimetry while the SS2 formulation maintains both higher passing rates and consistency between immediate and remote results (differences ? 1.2 pp) at all metrics. Both PRESAGE formulations under study maintained high linearity of dose response (R{sup 2} > 0.996) for 18 Gy over 14 days with response slope consistency within 4.9% (SS1) and 6.6% (SS2), and a relative dose distribution that remained stable over time was demonstrated in the SS2 dosimeters. Conclusions: Remote 3D dosimetry was shown to be feasible with a PRESAGE dosimeter formulation (SS2) that exhibited relative temporal stability and high accuracy when read off-site 3 days postirradiation. Characterization of the SS2 dose response demonstrated linearity (R{sup 2} > 0.998) over 14 days and suggests accurate readout over longer periods of time would be possible. This result provides a foundation for future investigations using remote dosimetry to study the accuracy of advanced radiation treatments. Further work is planned to characterize dosimeter reproducibility and dose response over longer periods of time.

  19. Fuel Cell Demonstration Program - Central and Remote Sites 2003

    SciTech Connect (OSTI)

    Gerald Brun

    2006-09-15

    In an effort to promote clean energy projects and aid in the commercialization of new fuel cell technologies, the Long Island Power Authority (LIPA) initiated a Fuel Cell Demonstration Program in 1999 with six month deployments of Proton Exchange Membrane (PEM) non-commercial Beta model systems at partnering sites throughout Long Island. These projects facilitated significant developments in the technology, providing operating experience that allowed the manufacturer to produce fuel cells that were half the size of the Beta units and suitable for outdoor installations. In 2001, LIPA embarked on a large-scale effort to identify and develop measures that could improve the reliability and performance of future fuel cell technologies for electric utility applications and the concept to establish a fuel cell farm (Farm) of 75 units was developed. By the end of October of 2001, 75 Lorax 2.0 fuel cells had been installed at the West Babylon substation on Long Island, making it the first fuel cell demonstration of its kind and size anywhere in the world at the time. Designed to help LIPA study the feasibility of using fuel cells to operate in parallel with LIPA's electric grid system, the Farm operated 120 fuel cells over its lifetime of over 3 years including 3 generations of Plug Power fuel cells (Lorax 2.0, Lorax 3.0, Lorax 4.5). Of these 120 fuel cells, 25 Lorax 4.5 units operated under this Award from April 2003 to December 2004. In parallel with the operation of the Farm, LIPA recruited government, commercial, and residential customers to demonstrate fuel cells as on-site distributed generation. The deployment of the 20 Lorax 4.5 units for the Remote Sites phase of the project began in October 2004. To date, 10 fuel cells have completed their demonstrations while 10 fuel cells are currently being monitored at various customer sites throughout Long Island. As of June 30, 2006 the 45 fuel cells operating under this Award produced a total of 1,585,093 kWh. As fuel cell technology became more mature, performance improvements included increases in system efficiency and availability. Including equipment, design, fuel, maintenance, installation, and decommissioning the total project budget was approximately $3.7 million.

  20. Evaluation of a New Remote Handling Design for High Throughput Annular Centrifugal Contactors

    SciTech Connect (OSTI)

    David H. Meikrantz; Troy G. Garn; Jack D. Law; Lawrence L. Macaluso

    2009-09-01

    Advanced designs of nuclear fuel recycling plants are expected to include more ambitious goals for aqueous based separations including; higher separations efficiency, high-level waste minimization, and a greater focus on continuous processes to minimize cost and footprint. Therefore, Annular Centrifugal Contactors (ACCs) are destined to play a more important role for such future processing schemes. Previous efforts defined and characterized the performance of commercial 5 cm and 12.5 cm single-stage ACCs in a cold environment. The next logical step, the design and evaluation of remote capable pilot scale ACCs in a hot or radioactive environment was reported earlier. This report includes the development of remote designs for ACCs that can process the large throughput rates needed in future nuclear fuel recycling plants. Novel designs were developed for the remote interconnection of contactor units, clean-in-place and drain connections, and a new solids removal collection chamber. A three stage, 12.5 cm diameter rotor module has been constructed and evaluated for operational function and remote handling in highly radioactive environments. This design is scalable to commercial CINC ACC models from V-05 to V-20 with total throughput rates ranging from 20 to 650 liters per minute. The V-05R three stage prototype was manufactured by the commercial vendor for ACCs in the U.S., CINC mfg. It employs three standard V-05 clean-in-place (CIP) units modified for remote service and replacement via new methods of connection for solution inlets, outlets, drain and CIP. Hydraulic testing and functional checks were successfully conducted and then the prototype was evaluated for remote handling and maintenance suitability. Removal and replacement of the center position V-05R ACC unit in the three stage prototype was demonstrated using an overhead rail mounted PaR manipulator. This evaluation confirmed the efficacy of this innovative design for interconnecting and cleaning individual stages while retaining the benefits of commercially reliable ACC equipment for remote applications in the nuclear industry. Minor modifications and suggestions for improved manual remote servicing by the remote handling specialists were provided but successful removal and replacement was demonstrated in the first prototype.