National Library of Energy BETA

Sample records for unauthenticated remote attacker

  1. T-725: Cisco Unified Service Monitor and Cisco Unified Operations Manager Remote Code Execution Vulnerabilitiry Code

    Broader source: Energy.gov [DOE]

    Successful exploitation of these vulnerabilities could allow an unauthenticated, remote attacker to execute arbitrary code on affected servers.

  2. T-560: Cisco Security Advisory: Management Center for Cisco Security Agent Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    The Management Center for Cisco Security Agent is affected by a vulnerability that may allow an unauthenticated attacker to perform remote code execution on the affected device.

  3. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access

    Broader source: Energy.gov [DOE]

    Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition. Additionally, Cisco TelePresence TC Software contain an adjacent root access vulnerability that could allow an attacker on the same physical or logical Layer-2 network as the affected system to gain an unauthenticated root shell.

  4. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    Cisco AnyConnect Secure Mobility Client contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system. The vulnerability exists due to improper validation of program executables downloaded by the Cisco AnyConnect Secure Mobility Client. An unauthenticated, remote attacker could exploit the vulnerability by convincing the targeted user to view a malicious website. If successful, the attacker could execute arbitrary code on the system with the privileges of the user. Cisco confirmed the vulnerability in a security advisory and released software updates.

  5. U-006:Cisco Network Admission Control Manager Directory Traversal Flaw Lets Remote Users Obtain Potentially Sensitive Information

    Office of Energy Efficiency and Renewable Energy (EERE)

    An unauthenticated attacker could exploit this vulnerability to access sensitive information, including password files and system logs, that could be leveraged to launch subsequent attacks.

  6. T-673: Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Apple Safari Multiple Flaws Let Remote Users Execute Arbitrary Code, Conduct Cross-Site Scripting Attacks

  7. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  8. T-554: Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code

    Broader source: Energy.gov [DOE]

    Race condition in Google Chrome before 9.0.597.84 allows remote attackers to execute arbitrary code via vectors related to audio.

  9. V-012: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    PROBLEM: Mozilla Firefox 'window.location' Bugs Permit Cross-Site Scripting Attacks and May Let Remote Users Execute Arbitrary Code

  10. T-656: Microsoft Office Visio DXF File Handling Arbitrary Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Microsoft Office Visio contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on a targeted system.

  11. U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

  12. U-093: Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Mozilla Firefox Multiple Flaws Permit Remote Code Execution, Information Disclosure, and Cross-Site Scripting.

  13. T-539: Adobe Acrobat, Reader, and Flash Player Arbitrary Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    An unauthenticated, remote attacker could exploit this vulnerability to execute arbitrary code with the privileges of the user. If the user holds elevated privileges, the attacker could execute arbitrary code that results in complete system compromise.

  14. V-209:Cisco WAAS (Wide Area Application Services) Arbitrary Code Execution Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco Wide Area Application Services (WAAS) when configured as Central Manager (CM), contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code on the affected system.

  15. T-561: IBM and Oracle Java Binary Floating-Point Number Conversion Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    IBM and Oracle Java products contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.

  16. T-723:Adobe Flash Player Multiple Bugs Let Remote Users Obtain Information, Conduct Cross-Site Scripting Attacks, and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    An attacker can exploit this issue by enticing an unsuspecting victim into visiting a malicious website.

  17. U-073: Bugzilla Flaws Permit Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Bugzilla. A remote user can conduct cross-site scripting attacks.

  18. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks...

  19. U-206: WordPress Flaws Permit Cross-Site Scripting, Cross-Site Request Forgery, and Information Disclosure Attacks

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in WordPress. A remote authenticated user can conduct cross-site scripting attacks. A remote user can conduct cross-site request forgery attacks. A remote authenticated user can obtain potentially sensitive information.

  20. T-720: Blue Coat Director HTTP Trace Processing Flaw Permits Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in Blue Coat Director. A remote user can conduct cross-site scripting attacks.

  1. T-622: Adobe Acrobat and Reader Unspecified Memory Corruption Vulnerability

    Broader source: Energy.gov [DOE]

    The vulnerability is due to an unspecified error in the affected software when it processes .pdf files. An unauthenticated, remote attacker could exploit this vulnerability by convincing a user to view a malicious .pdf file. When viewed, the file could trigger a memory corruption error that could allow the attacker to execute arbitrary code on the system with the privileges of the user.

  2. T-663: Cisco Content Services Gateway ICMP Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The Cisco Content Services Gateway: Second Generation provides intelligent network capabilities such as flexible policy management and billing based on deep-packet inspection, as well as subscriber and application awareness capabilities that enable mobile operators to quickly and easily offer value-added, differentiated services over their mobile data networks. A DoS vulnerability exists in the Cisco Content Services Gateway: Second Generation could allow an unauthenticated attacker to cause a device reload by sending crafted ICMP messages to the affected device. Note: The Cisco Gateway GPRS Support Node (GGSN), the Cisco Mobile Wireless Home Agent (HA), the Cisco Wireless Security Gateway (WSG), the Cisco Broadband Wireless Gateway and Cisco IP Transfer Point (ITP), and the Cisco Long Term Evolution (LTE) Gateway are not affected. This vulnerability is documented in Cisco bug ID CSCtl79577 ( registered customers only) and has been assigned CVE ID CVE-2011-2064.

  3. Seven Deadliest Network Attacks

    SciTech Connect (OSTI)

    Prowell, Stacy J; Borkin, Michael; Kraus, Robert

    2010-05-01

    Do you need to keep up with the latest hacks, attacks, and exploits effecting networks? Then you need "Seven Deadliest Network Attacks". This book pinpoints the most dangerous hacks and exploits specific to networks, laying out the anatomy of these attacks including how to make your system more secure. You will discover the best ways to defend against these vicious hacks with step-by-step instruction and learn techniques to make your computer and network impenetrable. Attacks detailed in this book include: Denial of Service; War Dialing; Penetration 'Testing'; Protocol Tunneling; Spanning Tree Attacks; Man-in-the-Middle; and, Password Replay. Knowledge is power, find out about the most dominant attacks currently waging war on computers and networks globally. Discover the best ways to defend against these vicious attacks; step-by-step instruction shows you how. Institute countermeasures, don't be caught defenseless again, learn techniques to make your computer and network impenetrable.

  4. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: HP Onboard Administrator Bugs Let Remote Users Gain Access, Obtain Information, and Conduct URL Redirection Attacks U-142: HP Onboard Administrator Bugs Let Remote Users Gain...

  5. V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks V-184: Google Chrome Flash Plug-in Lets Remote Users Conduct Clickjacking Attacks June 24, 2013 -...

  6. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Remote Users Conduct Cross-Site Scripting Attacks | Department of Energy 51: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks May 8, 2013 - 12:06am Addthis PROBLEM: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks

  7. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Energy Savers [EERE]

    Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users ...

  8. U-184: Mozilla Firefox Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause arbitrary code to be executed on the target user's system. A remote user can conduct cross-site scripting attacks. A remote user can obtain potentially sensitive information.

  9. U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Several vulnerabilities were reported in RSA enVision. A remote user can access the system. A remote authenticated user can conduct cross-site scripting attacks. A remote authenticated user can inject SQL commands. A remote authenticated user can view files on the target system.

  10. Metrics for Assessment of Smart Grid Data Integrity Attacks

    SciTech Connect (OSTI)

    Annarita Giani; Miles McQueen; Russell Bent; Kameshwar Poolla; Mark Hinrichs

    2012-07-01

    There is an emerging consensus that the nation’s electricity grid is vulnerable to cyber attacks. This vulnerability arises from the increasing reliance on using remote measurements, transmitting them over legacy data networks to system operators who make critical decisions based on available data. Data integrity attacks are a class of cyber attacks that involve a compromise of information that is processed by the grid operator. This information can include meter readings of injected power at remote generators, power flows on transmission lines, and relay states. These data integrity attacks have consequences only when the system operator responds to compromised data by redispatching generation under normal or contingency protocols. These consequences include (a) financial losses from sub-optimal economic dispatch to service loads, (b) robustness/resiliency losses from placing the grid at operating points that are at greater risk from contingencies, and (c) systemic losses resulting from cascading failures induced by poor operational choices. This paper is focused on understanding the connections between grid operational procedures and cyber attacks. We first offer two examples to illustrate how data integrity attacks can cause economic and physical damage by misleading operators into taking inappropriate decisions. We then focus on unobservable data integrity attacks involving power meter data. These are coordinated attacks where the compromised data are consistent with the physics of power flow, and are therefore passed by any bad data detection algorithm. We develop metrics to assess the economic impact of these attacks under re-dispatch decisions using optimal power flow methods. These metrics can be use to prioritize the adoption of appropriate countermeasures including PMU placement, encryption, hardware upgrades, and advance attack detection algorithms.

  11. T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities

    Broader source: Energy.gov [DOE]

    Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

  12. V-140: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apache ActiveMQ Bugs Let Remote Users Conduct Cross-Site Scripting Attacks, Deny Service, and Obtain Potentially Sensitive Information V-140: Apache ActiveMQ Bugs Let Remote...

  13. V-203: HP LoadRunner Multiple Bugs Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-171: Apple Safari Bugs Let Remote Users Execute Arbitrary Code and Conduct Cross-Site Scripting Attacks V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code...

  14. Finite Energy and Bounded Actuator Attacks on Cyber-Physical Systems

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A; Dong, Jin; Drira, Anis

    2015-01-01

    As control system networks are being connected to enterprise level networks for remote monitoring, operation, and system-wide performance optimization, these same connections are providing vulnerabilities that can be exploited by malicious actors for attack, financial gain, and theft of intellectual property. Much effort in cyber-physical system (CPS) protection has focused on protecting the borders of the system through traditional information security techniques. Less effort has been applied to the protection of cyber-physical systems from intelligent attacks launched after an attacker has defeated the information security protections to gain access to the control system. In this paper, attacks on actuator signals are analyzed from a system theoretic context. The threat surface is classified into finite energy and bounded attacks. These two broad classes encompass a large range of potential attacks. The effect of theses attacks on a linear quadratic (LQ) control are analyzed, and the optimal actuator attacks for both finite and infinite horizon LQ control are derived, therefore the worst case attack signals are obtained. The closed-loop system under the optimal attack signals is given and a numerical example illustrating the effect of an optimal bounded attack is provided.

  15. WILD PIG ATTACKS ON HUMANS

    SciTech Connect (OSTI)

    Mayer, J.

    2013-04-12

    Attacks on humans by wild pigs (Sus scrofa) have been documented since ancient times. However, studies characterizing these incidents are lacking. In an effort to better understand this phenomenon, information was collected from 412 wild pig attacks on humans. Similar to studies of large predator attacks on humans, data came from a variety of sources. The various attacks compiled occurred in seven zoogeographic realms. Most attacks occurred within the species native range, and specifically in rural areas. The occurrence was highest during the winter months and daylight hours. Most happened under non-hunting circumstances and appeared to be unprovoked. Wounded animals were the chief cause of these attacks in hunting situations. The animals involved were typically solitary, male and large in size. The fate of the wild pigs involved in these attacks varied depending upon the circumstances, however, most escaped uninjured. Most human victims were adult males traveling on foot and alone. The most frequent outcome for these victims was physical contact/mauling. The severity of resulting injuries ranged from minor to fatal. Most of the mauled victims had injuries to only one part of their bodies, with legs/feet being the most frequent body part injured. Injuries were primarily in the form of lacerations and punctures. Fatalities were typically due to blood loss. In some cases, serious infections or toxemia resulted from the injuries. Other species (i.e., pets and livestock) were also accompanying some of the humans during these attacks. The fates of these animals varied from escaping uninjured to being killed. Frequency data on both non-hunting and hunting incidents of wild pig attacks on humans at the Savannah River Site, South Carolina, showed quantitatively that such incidents are rare.

  16. U-015: CiscoWorks Common Services Home Page Input Validation Flaw Lets Remote Users Execute Arbitrary Commands

    Broader source: Energy.gov [DOE]

    Successful exploitation of this vulnerability may allow an authenticated, remote attacker to execute arbitrary commands on the affected system with the privileges of a system administrator.

  17. Remote Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Access Remote Access Laboratory employees can access Research Library databases and products from offsite using our EZproxy service. This service is limited to LANL employees with active Z numbers and cryptocards. Access Electronic Collections with EZproxy Remote Access Journals - Books - Standards - Databases (WOK, etc) How to use EZproxy: From this page: Click on the icon above. From external site: Select "OFFSITE LANL Employee". Enter your Z number and Cryptocard passcode.

  18. U-238: HP Service Manager Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Cross-site scripting (XSS) vulnerability in HP Service Manager Web Tier 7.11, 9.21, and 9.30, and HP Service Center Web Tier 6.28, allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.

  19. Science On Tap - Attack of the Drones

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science On Tap - Attack of the Drones Science On Tap - Attack of the Drones WHEN: May 21, 2015 5:30 PM - 7:00 PM WHERE: UnQuarked Wine Room 145 Central Park Square, Los Alamos, New...

  20. T-557: Microsoft Office Excel Office Art Object Parsing Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Microsoft Office Excel. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

  1. T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

  2. T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability

    Broader source: Energy.gov [DOE]

    Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

  3. Smart Grid Integrity Attacks: Characterizations and Countermeasures

    SciTech Connect (OSTI)

    Annarita Giani; Eilyan Bitar; Miles McQueen; Pramod Khargonekar; Kameshwar Poolla

    2011-10-01

    Real power injections at loads and generators, and real power flows on selected lines in a transmission network are monitored, transmitted over a SCADA network to the system operator, and used in state estimation algorithms to make dispatch, re-balance and other energy management system [EMS] decisions. Coordinated cyber attacks of power meter readings can be arranged to be undetectable by any bad data detection algorithm. These unobservable attacks present a serious threat to grid operations. Of particular interest are sparse attacks that involve the compromise of a modest number of meter readings. An efficient algorithm to find all unobservable attacks [under standard DC load flow approximations] involving the compromise of exactly two power injection meters and an arbitrary number of power meters on lines is presented. This requires O(n2m) flops for a power system with n buses and m line meters. If all lines are metered, there exist canonical forms that characterize all 3, 4, and 5-sparse unobservable attacks. These can be quickly detected in power systems using standard graph algorithms. Known secure phase measurement units [PMUs] can be used as countermeasures against an arbitrary collection of cyber attacks. Finding the minimum number of necessary PMUs is NP-hard. It is shown that p + 1 PMUs at carefully chosen buses are sufficient to neutralize a collection of p cyber attacks.

  4. T-616: PHP Stream Component Remote Denial of Service Vulnerability

    Broader source: Energy.gov [DOE]

    PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

  5. Cyber Security Audit and Attack Detection Toolkit

    SciTech Connect (OSTI)

    Peterson, Dale

    2012-05-31

    This goal of this project was to develop cyber security audit and attack detection tools for industrial control systems (ICS). Digital Bond developed and released a tool named Bandolier that audits ICS components commonly used in the energy sector against an optimal security configuration. The Portaledge Project developed a capability for the PI Historian, the most widely used Historian in the energy sector, to aggregate security events and detect cyber attacks.

  6. Signs of a Heart Attack - HPMC Occupational Health Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    attack. Heart Image Related Links: Presentation (pdf) Heart Attack Warning Signs Handout (pdf) "Cough CPR:" Urban Myth Heart Health Interactive Quizzes Last Updated 10202014 9:22...

  7. Cyber Security Audit and Attack Detection Toolkit: National SCADA...

    Energy Savers [EERE]

    Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of ...

  8. Remotely Monitored Sealing Array Software

    SciTech Connect (OSTI)

    2012-09-12

    The Remotely Monitored Sealing Array (RMSA) utilizes the Secure Sensor Platform (SSP) framework to establish the fundamental operating capabilities for communication, security, power management, and cryptography. In addition to the SSP framework the RMSA software has unique capabilities to support monitoring a fiber optic seal. Fiber monitoring includes open and closed as well as parametric monitoring to detect tampering attacks. The fiber monitoring techniques, using the SSP power management processes, allow the seals to last for years while maintaining the security requirements of the monitoring application. The seal is enclosed in a tamper resistant housing with software to support active tamper monitoring. New features include LED notification of fiber closure, the ability to retrieve the entire fiber optic history via translator command, separate memory storage for fiber optic events, and a more robust method for tracking and resending failed messages.

  9. Remotely Monitored Sealing Array Software

    Energy Science and Technology Software Center (OSTI)

    2012-09-12

    The Remotely Monitored Sealing Array (RMSA) utilizes the Secure Sensor Platform (SSP) framework to establish the fundamental operating capabilities for communication, security, power management, and cryptography. In addition to the SSP framework the RMSA software has unique capabilities to support monitoring a fiber optic seal. Fiber monitoring includes open and closed as well as parametric monitoring to detect tampering attacks. The fiber monitoring techniques, using the SSP power management processes, allow the seals to lastmore » for years while maintaining the security requirements of the monitoring application. The seal is enclosed in a tamper resistant housing with software to support active tamper monitoring. New features include LED notification of fiber closure, the ability to retrieve the entire fiber optic history via translator command, separate memory storage for fiber optic events, and a more robust method for tracking and resending failed messages.« less

  10. Multiple node remote messaging

    DOE Patents [OSTI]

    Blumrich, Matthias A.; Chen, Dong; Gara, Alan G.; Giampapa, Mark E.; Heidelberger, Philip; Ohmacht, Martin; Salapura, Valentina; Steinmacher-Burow, Burkhard; Vranas, Pavlos

    2010-08-31

    A method for passing remote messages in a parallel computer system formed as a network of interconnected compute nodes includes that a first compute node (A) sends a single remote message to a remote second compute node (B) in order to control the remote second compute node (B) to send at least one remote message. The method includes various steps including controlling a DMA engine at first compute node (A) to prepare the single remote message to include a first message descriptor and at least one remote message descriptor for controlling the remote second compute node (B) to send at least one remote message, including putting the first message descriptor into an injection FIFO at the first compute node (A) and sending the single remote message and the at least one remote message descriptor to the second compute node (B).

  11. Science On Tap - Attack of the Drones

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science On Tap - Attack of the Drones Science On Tap - Attack of the Drones WHEN: May 21, 2015 5:30 PM - 7:00 PM WHERE: UnQuarked Wine Room 145 Central Park Square, Los Alamos, New Mexico 87544, USA SPEAKER: James Privette, Unmanned Aerial Vehicles (UAV) Program Operations Lead CONTACT: Jessica Privette 505 667-0375 CATEGORY: Bradbury INTERNAL: Calendar Login Science on Tap series Event Description Science On Tap happens every third Thursday of the month, featuring a new topic each week. It

  12. Intergranular attack of Alloy 600: simulation tests

    SciTech Connect (OSTI)

    Daret, J.

    1985-06-01

    In some steam generators, intergranular attack (IGA) has been detected on Alloy 600 tubes within or near the tubesheet crevice region. In order to reproduce IGA in an experimental device, refreshed autoclave simulation tests were performed with caustic pollution or river water in-leakage. During three runs of three tests each, chemical parameter and test procedures were adjusted to finally obtain a representative corrosion attack of tubing within the tubesheet crevice for the case of a caustic pollution. IGA was not detected for the river water in-leakage case.

  13. Method for detecting sophisticated cyber attacks

    SciTech Connect (OSTI)

    Potok, Thomas E. (Oak Ridge, TN)

    2008-11-18

    A method of analyzing computer intrusion detection information that looks beyond known attacks and abnormal access patterns to the critical information that an intruder may want to access. Unique target identifiers and type of work performed by the networked targets is added to audit log records. Analysis using vector space modeling, dissimilarity matrix comparison, and clustering of the event records is then performed.

  14. T-559: Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution

    Broader source: Energy.gov [DOE]

    Stack-based buffer overflow in oninit in IBM Informix Dynamic Server (IDS) 11.50 allows remote execution attackers to execute arbitrary code via crafted arguments in the USELASTCOMMITTED session environment option in a SQL SET ENVIRONMENT statement

  15. Cyber Security Audit and Attack Detection Toolkit: Bandolier and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Portaledge, March 2010 | Department of Energy Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 Cyber Security Audit and Attack Detection Toolkit: Bandolier and Portaledge, March 2010 This project of the cyber security audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. By building configuration audit and attack detection capabilities into

  16. Assessing Terrorist Motivations for Attacking Critical Infrastructure

    SciTech Connect (OSTI)

    Ackerman, G; Abhayaratne, P; Bale, J; Bhattacharjee, A; Blair, C; Hansell, L; Jayne, A; Kosal, M; Lucas, S; Moran, K; Seroki, L; Vadlamudi, S

    2006-12-04

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security and way of life. These complex and often interconnected systems have become so ubiquitous and essential to day-to-day life that they are easily taken for granted. Often it is only when the important services provided by such infrastructure are interrupted--when we lose easy access to electricity, health care, telecommunications, transportation or water, for example--that we are conscious of our great dependence on these networks and of the vulnerabilities that stem from such dependence. Unfortunately, it must be assumed that many terrorists are all too aware that CI facilities pose high-value targets that, if successfully attacked, have the potential to dramatically disrupt the normal rhythm of society, cause public fear and intimidation, and generate significant publicity. Indeed, revelations emerging at the time of this writing about Al Qaida's efforts to prepare for possible attacks on major financial facilities in New York, New Jersey, and the District of Columbia remind us just how real and immediate such threats to CI may be. Simply being aware that our nation's critical infrastructure presents terrorists with a plethora of targets, however, does little to mitigate the dangers of CI attacks. In order to prevent and preempt such terrorist acts, better understanding of the threats and vulnerabilities relating to critical infrastructure is required. The Center for Nonproliferation Studies (CNS) presents this document as both a contribution to the understanding of such threats and an initial effort at ''operationalizing'' its findings for use by analysts who work on issues of critical infrastructure protection. Specifically, this study focuses on a subsidiary aspect of CI threat assessment that has thus far remained largely unaddressed by contemporary terrorism research: the motivations and related factors that determine whether a terrorist

  17. When Stars Attack! In Search of

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Stars Attack! In Search of Near-Earth Supernova Explosions Brian Fields University of Illinois January 27, 2016 4:00 p.m. - Wilson Hall, One West The most massive stars are the celebrities of the cosmos: they are rare, but live extravagantly and die in spectacular and violent supernova explosions. These awesome events take a sinister shade when they occur close to home, because an explosion very nearby would pose a grave threat to Earthlings. We will discuss these cosmic insults to life, and

  18. Remote reset circuit

    DOE Patents [OSTI]

    Gritzo, Russell E.

    1987-01-01

    A remote reset circuit acts as a stand-alone monitor and controller by clocking in each character sent by a terminal to a computer and comparing it to a given reference character. When a match occurs, the remote reset circuit activates the system's hardware reset line. The remote reset circuit is hardware based centered around monostable multivibrators and is unaffected by system crashes, partial serial transmissions, or power supply transients.

  19. Remote reset circuit

    DOE Patents [OSTI]

    Gritzo, R.E.

    1985-09-12

    A remote reset circuit acts as a stand-along monitor and controller by clocking in each character sent by a terminal to a computer and comparing it to a given reference character. When a match occurs, the remote reset circuit activates the system's hardware reset line. The remote reset circuit is hardware based centered around monostable multivibrators and is unaffected by system crashes, partial serial transmissions, or power supply transients. 4 figs.

  20. Remote Systems Design & Deployment

    SciTech Connect (OSTI)

    Bailey, Sharon A.; Baker, Carl P.; Valdez, Patrick LJ

    2009-08-28

    The Pacific Northwest National Laboratory (PNNL) was tasked by Washington River Protection Solutions, LLC (WRPS) to provide information and lessons learned relating to the design, development and deployment of remote systems, particularly remote arm/manipulator systems. This report reflects PNNL’s experience with remote systems and lays out the most important activities that need to be completed to successfully design, build, deploy and operate remote systems in radioactive and chemically contaminated environments. It also contains lessons learned from PNNL’s work experiences, and the work of others in the national laboratory complex.

  1. Remote Monitoring Transparency Program

    SciTech Connect (OSTI)

    Sukhoruchkin, V.K.; Shmelev, V.M.; Roumiantsev, A.N.; Croessmann, C.D.; Horton, R.D.; Matter, J.C.; Czajkowski, A.F.; Sheely, K.B.; Bieniawski, A.J.

    1996-12-31

    The objective of the Remote Monitoring Transparency Program is to evaluate and demonstrate the use of remote monitoring technologies to advance nonproliferation and transparency efforts that are currently being developed by Russia and the US without compromising the national security of the participating parties. Under a lab-to-lab transparency contract between Sandia National Laboratories (SNL) and the Kurchatov Institute (KI RRC), the Kurchatov Institute will analyze technical and procedural aspects of the application of remote monitoring as a transparency measure to monitor inventories of direct-use HEU and plutonium (e.g., material recovered from dismantled nuclear weapons). A goal of this program is to assist a broad range of political and technical experts in learning more about remote monitoring technologies that could be used to implement nonproliferation, arms control, and other security and confidence building measures. Specifically, this program will: (1) begin integrating Russian technologies into remote monitoring systems; (2) develop remote monitoring procedures that will assist in the application of remote monitoring techniques to monitor inventories of HEU and Pu from dismantled nuclear weapons; and (3) conduct a workshop to review remote monitoring fundamentals, demonstrate an integrated US/Russian remote monitoring will have on the national security of participating countries.

  2. Remote Alaskan Communities Energy

    Broader source: Energy.gov (indexed) [DOE]

    Remote Alaskan Communities Energy Efficiency Competition (RACEE) Technical Assistance ... X Alaska Sea Grant Marine Advisory Program Seafood processor plant energy audits, ...

  3. T-662: ISC BIND Packet Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A defect in the affected BIND 9 versions allows an attacker to remotely cause the "named" process to exit using a specially crafted packet. This defect affects both recursive and authoritative servers. The code location of the defect makes it impossible to protect BIND using ACLs configured within named.conf or by disabling any features at compile-time or run-time. A remote attacker would need to be able to send a specially crafted packet directly to a server running a vulnerable version of BIND. There is also the potential for an indirect attack via malware that is inadvertently installed and run, where infected machines have direct access to an organization's nameservers.

  4. Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2008 | Department of Energy Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Protecting Intelligent Distributed Power Grids Against Cyber Attacks - May 2008 Development of a novel distributed and hierarchical security layer specific to intelligent grid design will help protect intelligent distributed power grids from cyber attacks. Intelligent power grids are interdependent energy management systems-encompassing generation, distribution, IT networks, and

  5. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Steeves, Arthur F.; Buono, Donald P.

    1983-01-01

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels. The chemical attack polish comprises Fe(NO.sub.3).sub.3, concentrated CH.sub.3 COOH, concentrated H.sub.2 SO.sub.4 and H.sub.2 O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  6. Non-harmful insertion of data mimicking computer network attacks

    DOE Patents [OSTI]

    Neil, Joshua Charles; Kent, Alexander; Hash, Jr, Curtis Lee

    2016-06-21

    Non-harmful data mimicking computer network attacks may be inserted in a computer network. Anomalous real network connections may be generated between a plurality of computing systems in the network. Data mimicking an attack may also be generated. The generated data may be transmitted between the plurality of computing systems using the real network connections and measured to determine whether an attack is detected.

  7. Attack polish for nickel-base alloys and stainless steels

    DOE Patents [OSTI]

    Not Available

    1980-05-28

    A chemical attack polish and polishing procedure for use on metal surfaces such as nickel base alloys and stainless steels is described. The chemical attack polich comprises FeNO/sub 3/, concentrated CH/sub 3/COOH, concentrated H/sub 2/SO/sub 4/ and H/sub 2/O. The polishing procedure includes saturating a polishing cloth with the chemical attack polish and submicron abrasive particles and buffing the metal surface.

  8. Capturing the uncertainty in adversary attack simulations.

    SciTech Connect (OSTI)

    Darby, John L.; Brooks, Traci N.; Berry, Robert Bruce

    2008-09-01

    This work provides a comprehensive uncertainty technique to evaluate uncertainty, resulting in a more realistic evaluation of PI, thereby requiring fewer resources to address scenarios and allowing resources to be used across more scenarios. For a given set of dversary resources, two types of uncertainty are associated with PI for a scenario: (1) aleatory (random) uncertainty for detection probabilities and time delays and (2) epistemic (state of knowledge) uncertainty for the adversary resources applied during an attack. Adversary esources consist of attributes (such as equipment and training) and knowledge about the security system; to date, most evaluations have assumed an adversary with very high resources, adding to the conservatism in the evaluation of PI. The aleatory uncertainty in PI is ddressed by assigning probability distributions to detection probabilities and time delays. A numerical sampling technique is used to evaluate PI, addressing the repeated variable dependence in the equation for PI.

  9. Remote actuated valve implant

    DOE Patents [OSTI]

    McKnight, Timothy E; Johnson, Anthony; Moise, Jr., Kenneth J; Ericson, Milton Nance; Baba, Justin S; Wilgen, John B; Evans, III, Boyd McCutchen

    2014-02-25

    Valve implant systems positionable within a flow passage, the systems having an inlet, an outlet, and a remotely activatable valve between the inlet and outlet, with the valves being operable to provide intermittent occlusion of the flow path. A remote field is applied to provide thermal or magnetic activation of the valves.

  10. T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Access or Modify SSL/TLS Sessions | Department of Energy 76: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or Modify SSL/TLS Sessions July 26, 2011 - 1:06am Addthis PROBLEM: A vulnerability was reported in Apple iOS. A remote user with the ability to conduct a man-in-the-middle attack can access or modify SSL/TLS sessions. PLATFORM: iOS 4.2.5

  11. Cyber Security Audit and Attack Detection Toolkit: Bandolier...

    Energy Savers [EERE]

    audit and attack detection toolkit will employ Bandolier Audit Files for optimizing security configurations and the Portaledge event detection capability for energy control systems. ...

  12. Finite Energy and Bounded Attacks on Control System Sensor Signals

    SciTech Connect (OSTI)

    Djouadi, Seddik M; Melin, Alexander M; Ferragut, Erik M; Laska, Jason A

    2014-01-01

    Control system networks are increasingly being connected to enterprise level networks. These connections leave critical industrial controls systems vulnerable to cyber-attacks. Most of the effort in protecting these cyber-physical systems (CPS) has been in securing the networks using information security techniques and protection and reliability concerns at the control system level against random hardware and software failures. However, besides these failures the inability of information security techniques to protect against all intrusions means that the control system must be resilient to various signal attacks for which new analysis and detection methods need to be developed. In this paper, sensor signal attacks are analyzed for observer-based controlled systems. The threat surface for sensor signal attacks is subdivided into denial of service, finite energy, and bounded attacks. In particular, the error signals between states of attack free systems and systems subject to these attacks are quantified. Optimal sensor and actuator signal attacks for the finite and infinite horizon linear quadratic (LQ) control in terms of maximizing the corresponding cost functions are computed. The closed-loop system under optimal signal attacks are provided. Illustrative numerical examples are provided together with an application to a power network with distributed LQ controllers.

  13. Remote Access | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ames Laboratory Information Systems supports VPN for remotely accessing internal computers and network services. These are: Once connected remotely to Ames Laboratory,...

  14. Remote Alaskan Communities Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Alaskan Communities Energy Efficiency Competition (RACEE) Technical Assistance Guide March 2016 2 Technical Assistance Table of Contents How to Use this Guide ......................................................... Page 2 Technical Assistance Provider Network ..........................................................Page 2 * Regional Liaisons ..........................................................Page 4 * Regional Liaison Contact List

  15. Remote Sensor Placement

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Research Projects Remote Sensor Placement Collaboration between Los Alamos National Laboratory and the University of California at San Diego (UCSD) Jacobs School of Engineering Contact Institute Director Charles Farrar (505) 663-5330 Email UCSD EI Director Michael Todd (858) 534-5951 Professional Staff Assistant Ellie Vigil (505) 667-2818 Email Administrative Assistant Rebecca Duran (505) 665-8899 Email The goal of this work is to develop a new autonomous capability for remotely deploying

  16. Remote electrochemical sensor

    DOE Patents [OSTI]

    Wang, Joseph; Olsen, Khris; Larson, David

    1997-01-01

    An electrochemical sensor for remote detection, particularly useful for metal contaminants and organic or other compounds. The sensor circumvents technical difficulties that previously prevented in-situ remote operations. The microelectrode, connected to a long communications cable, allows convenient measurements of the element or compound at timed and frequent intervals and instrument/sample distances of ten feet to more than 100 feet. The sensor is useful for both downhole groundwater monitoring and in-situ water (e.g., shipboard seawater) analysis.

  17. Optimal response to attacks on the open science grids.

    SciTech Connect (OSTI)

    Altunay, M.; Leyffer, S.; Linderoth, J. T.; Xie, Z.

    2011-01-01

    Cybersecurity is a growing concern, especially in open grids, where attack propagation is easy because of prevalent collaborations among thousands of users and hundreds of institutions. The collaboration rules that typically govern large science experiments as well as social networks of scientists span across the institutional security boundaries. A common concern is that the increased openness may allow malicious attackers to spread more readily around the grid. We consider how to optimally respond to attacks in open grid environments. To show how and why attacks spread more readily around the grid, we first discuss how collaborations manifest themselves in the grids and form the collaboration network graph, and how this collaboration network graph affects the security threat levels of grid participants. We present two mixed-integer program (MIP) models to find the optimal response to attacks in open grid environments, and also calculate the threat level associated with each grid participant. Given an attack scenario, our optimal response model aims to minimize the threat levels at unaffected participants while maximizing the uninterrupted scientific production (continuing collaborations). By adopting some of the collaboration rules (e.g., suspending a collaboration or shutting down a site), the model finds optimal response to subvert an attack scenario.

  18. Remote radiation dosimetry

    DOE Patents [OSTI]

    Braunlich, P.F.; Tetzlaff, W.; Hegland, J.E.; Jones, S.C.

    1991-03-12

    Disclosed are methods and apparatus for remotely measuring radiation levels. Such are particularly useful for measuring relatively high levels or dosages of radiation being administered in radiation therapy. They are also useful for more general radiation level measurements where remote sensing from the remaining portions of the apparatus is desirable. The apparatus uses a beam generator, such as a laser beam, to provide a stimulating beam. The stimulating beam is preferably of wavelengths shorter than 6 microns, or more advantageously less than 2 microns. The stimulating beam is used to stimulate a remote luminescent sensor mounted in a probe which emits stored luminescent energy resulting from exposure of the sensor to ionizing radiation. The stimulating beam is communicated to the remote luminescent sensor via a transmissive fiber which also preferably serves to return the emission from the luminescent sensor. The stimulating beam is advantageously split by a beam splitter to create a detector beam which is measured for power during a reading period during which the luminescent phosphor is read. The detected power is preferably used to control the beam generator to thus produce desired beam power during the reading period. The luminescent emission from the remote sensor is communicated to a suitable emission detector, preferably after filtering or other selective treatment to better isolate the luminescent emission. 8 figures.

  19. Remote radiation dosimetry

    DOE Patents [OSTI]

    Braunlich, Peter F.; Tetzlaff, Wolfgang; Hegland, Joel E.; Jones, Scott C.

    1991-01-01

    Disclosed are methods and apparatus for remotely measuring radiation levels. Such are particularly useful for measuring relatively high levels or dosages of radiation being administered in radiation therapy. They are also useful for more general radiation level measurements where remote sensing from the remaining portions of the apparatus is desirable. The apparatus uses a beam generator, such as a laser beam, to provide a stimulating beam. The stimulating beam is preferably of wavelengths shorter than 6 microns, or more advantageously less than 2 microns. The stimulating beam is used to stimulate a remote luminescent sensor mounted in a probe which emits stored luminescent energy resulting from exposure of the sensor to ionizing radiation. The stimulating beam is communicated to the remote luminescent sensor via transmissive fiber which also preferably serves to return the emission from the luminescent sensor. The stimulating beam is advantageously split by a beam splitter to create a detector beam which is measured for power during a reading period during which the luminescent phosphor is read. The detected power is preferably used to control the beam generator to thus produce desired beam power during the reading period. The luminescent emission from the remote sensor is communicated to a suitable emission detector, preferably after filtering or other selective treatment to better isolate the luminescent emission.

  20. Remote electrochemical sensor

    DOE Patents [OSTI]

    Wang, J.; Olsen, K.; Larson, D.

    1997-10-14

    An electrochemical sensor is described for remote detection, particularly useful for metal contaminants and organic or other compounds. The sensor circumvents technical difficulties that previously prevented in-situ remote operations. The microelectrode, connected to a long communications cable, allows convenient measurements of the element or compound at timed and frequent intervals and instrument/sample distances of ten feet to more than 100 feet. The sensor is useful for both downhole groundwater monitoring and in-situ water (e.g., shipboard seawater) analysis. 21 figs.

  1. Risk Due to Radiological Terror Attacks With Natural Radionuclides

    SciTech Connect (OSTI)

    Friedrich, Steinhaeusler; Lyudmila, Zaitseva; Stan, Rydell

    2008-08-07

    The naturally occurring radionuclides radium (Ra-226) and polonium (Po-210) have the potential to be used for criminal acts. Analysis of international incident data contained in the Database on Nuclear Smuggling, Theft and Orphan Radiation Sources (CSTO), operated at the University of Salzburg, shows that several acts of murder and terrorism with natural radionuclides have already been carried out in Europe and Russia. Five different modes of attack (T) are possible: (1) Covert irradiation of an individual in order to deliver a high individual dose; (2) Covert irradiation of a group of persons delivering a large collective dose; (3) Contamination of food or drink; (4) Generation of radioactive aerosols or solutions; (5) Combination of Ra-226 with conventional explosives (Dirty Bomb).This paper assesses the risk (R) of such criminal acts in terms of: (a) Probability of terrorist motivation deploying a certain attack mode T; (b) Probability of success by the terrorists for the selected attack mode T; (c) Primary damage consequence (C) to the attacked target (activity, dose); (d) Secondary damage consequence (C') to the attacked target (psychological and socio-economic effects); (e) Probability that the consequences (C, C') cannot be brought under control, resulting in a failure to manage successfully the emergency situation due to logistical and/or technical deficits in implementing adequate countermeasures. Extensive computer modelling is used to determine the potential impact of such a criminal attack on directly affected victims and on the environment.

  2. Modeling attacker-defender interactions in information networks.

    SciTech Connect (OSTI)

    Collins, Michael Joseph

    2010-09-01

    The simplest conceptual model of cybersecurity implicitly views attackers and defenders as acting in isolation from one another: an attacker seeks to penetrate or disrupt a system that has been protected to a given level, while a defender attempts to thwart particular attacks. Such a model also views all non-malicious parties as having the same goal of preventing all attacks. But in fact, attackers and defenders are interacting parts of the same system, and different defenders have their own individual interests: defenders may be willing to accept some risk of successful attack if the cost of defense is too high. We have used game theory to develop models of how non-cooperative but non-malicious players in a network interact when there is a substantial cost associated with effective defensive measures. Although game theory has been applied in this area before, we have introduced some novel aspects of player behavior in our work, including: (1) A model of how players attempt to avoid the costs of defense and force others to assume these costs; (2) A model of how players interact when the cost of defending one node can be shared by other nodes; and (3) A model of the incentives for a defender to choose less expensive, but less effective, defensive actions.

  3. Remote Sensing Laboratory - RSL

    SciTech Connect (OSTI)

    2014-11-06

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

  4. Remote Sensing Laboratory - RSL

    ScienceCinema (OSTI)

    None

    2015-01-09

    One of the primary resources supporting homeland security is the Remote Sensing Laboratory, or RSL. The Laboratory creates advanced technologies for emergency response operations, radiological incident response, and other remote sensing activities. RSL emergency response teams are on call 24-hours a day, and maintain the capability to deploy domestically and internationally in response to threats involving the loss, theft, or release of nuclear or radioactive material. Such incidents might include Nuclear Power Plant accidents, terrorist incidents involving nuclear or radiological materials, NASA launches, and transportation accidents involving nuclear materials. Working with the US Department of Homeland Security, RSL personnel equip, maintain, and conduct training on the mobile detection deployment unit, to provide nuclear radiological security at major national events such as the super bowl, the Indianapolis 500, New Year's Eve celebrations, presidential inaugurations, international meetings and conferences, just about any event where large numbers of people will gather.

  5. Remote switch actuator

    DOE Patents [OSTI]

    Haas, Edwin Gerard; Beauman, Ronald; Palo, Jr., Stefan

    2013-01-29

    The invention provides a device and method for actuating electrical switches remotely. The device is removably attached to the switch and is actuated through the transfer of a user's force. The user is able to remain physically removed from the switch site obviating need for protective equipment. The device and method allow rapid, safe actuation of high-voltage or high-current carrying electrical switches or circuit breakers.

  6. Remote repair appliance

    DOE Patents [OSTI]

    Heumann, Frederick K.; Wilkinson, Jay C.; Wooding, David R.

    1997-01-01

    A remote appliance for supporting a tool for performing work at a worksite on a substantially circular bore of a workpiece and for providing video signals of the worksite to a remote monitor comprising: a baseplate having an inner face and an outer face; a plurality of rollers, wherein each roller is rotatably and adjustably attached to the inner face of the baseplate and positioned to roll against the bore of the workpiece when the baseplate is positioned against the mouth of the bore such that the appliance may be rotated about the bore in a plane substantially parallel to the baseplate; a tool holding means for supporting the tool, the tool holding means being adjustably attached to the outer face of the baseplate such that the working end of the tool is positioned on the inner face side of the baseplate; a camera for providing video signals of the worksite to the remote monitor; and a camera holding means for supporting the camera on the inner face side of the baseplate, the camera holding means being adjustably attached to the outer face of the baseplate. In a preferred embodiment, roller guards are provided to protect the rollers from debris and a bore guard is provided to protect the bore from wear by the rollers and damage from debris.

  7. Remote repair appliance

    DOE Patents [OSTI]

    Heumann, F.K.; Wilkinson, J.C.; Wooding, D.R.

    1997-12-16

    A remote appliance for supporting a tool for performing work at a work site on a substantially circular bore of a work piece and for providing video signals of the work site to a remote monitor comprises: a base plate having an inner face and an outer face; a plurality of rollers, wherein each roller is rotatably and adjustably attached to the inner face of the base plate and positioned to roll against the bore of the work piece when the base plate is positioned against the mouth of the bore such that the appliance may be rotated about the bore in a plane substantially parallel to the base plate; a tool holding means for supporting the tool, the tool holding means being adjustably attached to the outer face of the base plate such that the working end of the tool is positioned on the inner face side of the base plate; a camera for providing video signals of the work site to the remote monitor; and a camera holding means for supporting the camera on the inner face side of the base plate, the camera holding means being adjustably attached to the outer face of the base plate. In a preferred embodiment, roller guards are provided to protect the rollers from debris and a bore guard is provided to protect the bore from wear by the rollers and damage from debris. 5 figs.

  8. Advanced laser remote sensing

    SciTech Connect (OSTI)

    Schultz, J.; Czuchlewski, S.; Karl, R.

    1996-11-01

    This is the final report of a three-year, Laboratory-Directed Research and Development (LDRD) project at the Los Alamos National Laboratory. Remote measurement of wind velocities is critical to a wide variety of applications such as environmental studies, weather prediction, aircraft safety, the accuracy of projectiles, bombs, parachute drops, prediction of the dispersal of chemical and biological warfare agents, and the debris from nuclear explosions. Major programs to develop remote sensors for these applications currently exist in the DoD and NASA. At present, however, there are no real-time, three-dimensional wind measurement techniques that are practical for many of these applications and we report on two new promising techniques. The first new technique uses an elastic backscatter lidar to track aerosol patterns in the atmosphere and to calculate three dimensional wind velocities from changes in the positions of the aerosol patterns. This was first done by Professor Ed Eloranta of the University of Wisconsin using post processing techniques and we are adapting Professor Eloranta`s algorithms to a real-time data processor and installing it in an existing elastic backscatter lidar system at Los Alamos (the XM94 helicopter lidar), which has a compatible data processing and control system. The second novel wind sensing technique is based on radio-frequency (RF) modulation and spatial filtering of elastic backscatter lidars. Because of their compactness and reliability, solid state lasers are the lasers of choice for many remote sensing applications, including wind sensing.

  9. Assessing Terrorist Motivations for Attacking Critical "Chemical" Infrastructure

    SciTech Connect (OSTI)

    Ackerman, G; Bale, J; Moran, K

    2004-12-14

    Certain types of infrastructure--critical infrastructure (CI)--play vital roles in underpinning our economy, security, and way of life. One particular type of CI--that relating to chemicals--constitutes both an important element of our nation's infrastructure and a particularly attractive set of potential targets. This is primarily because of the large quantities of toxic industrial chemicals (TICs) it employs in various operations and because of the essential economic functions it serves. This study attempts to minimize some of the ambiguities that presently impede chemical infrastructure threat assessments by providing new insight into the key motivational factors that affect terrorist organizations propensity to attack chemical facilities. Prepared as a companion piece to the Center for Nonproliferation Studies August 2004 study--''Assessing Terrorist Motivations for Attacking Critical Infrastructure''--it investigates three overarching research questions: (1) why do terrorists choose to attack chemical-related infrastructure over other targets; (2) what specific factors influence their target selection decisions concerning chemical facilities; and (3) which, if any, types of groups are most inclined to attack chemical infrastructure targets? The study involved a multi-pronged research design, which made use of four discrete investigative techniques to answer the above questions as comprehensively as possible. These include: (1) a review of terrorism and threat assessment literature to glean expert consensus regarding terrorist interest in targeting chemical facilities; (2) the preparation of case studies to help identify internal group factors and contextual influences that have played a significant role in leading some terrorist groups to attack chemical facilities; (3) an examination of data from the Critical Infrastructure Terrorist Incident Catalog (CrITIC) to further illuminate the nature of terrorist attacks against chemical facilities to date; and (4

  10. Attack Methodology Analysis: Emerging Trends in Computer-Based Attack Methodologies and Their Applicability to Control System Networks

    SciTech Connect (OSTI)

    Bri Rolston

    2005-06-01

    Threat characterization is a key component in evaluating the threat faced by control systems. Without a thorough understanding of the threat faced by critical infrastructure networks, adequate resources cannot be allocated or directed effectively to the defense of these systems. Traditional methods of threat analysis focus on identifying the capabilities and motivations of a specific attacker, assessing the value the adversary would place on targeted systems, and deploying defenses according to the threat posed by the potential adversary. Too many effective exploits and tools exist and are easily accessible to anyone with access to an Internet connection, minimal technical skills, and a significantly reduced motivational threshold to be able to narrow the field of potential adversaries effectively. Understanding how hackers evaluate new IT security research and incorporate significant new ideas into their own tools provides a means of anticipating how IT systems are most likely to be attacked in the future. This research, Attack Methodology Analysis (AMA), could supply pertinent information on how to detect and stop new types of attacks. Since the exploit methodologies and attack vectors developed in the general Information Technology (IT) arena can be converted for use against control system environments, assessing areas in which cutting edge exploit development and remediation techniques are occurring can provide significance intelligence for control system network exploitation, defense, and a means of assessing threat without identifying specific capabilities of individual opponents. Attack Methodology Analysis begins with the study of what exploit technology and attack methodologies are being developed in the Information Technology (IT) security research community within the black and white hat community. Once a solid understanding of the cutting edge security research is established, emerging trends in attack methodology can be identified and the gap between

  11. Fact Sheet: Protecting Intelligent Distributed Power Grids Against Cyber Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Protecting Intelligent Distributed Power Grids Against Cyber Attacks Development of a novel distributed and hierarchical security layer specific to intelligent grid design Intelligent power grids are interdependent energy management systems- encompassing generation, distribution, IT networks, and control systems-that use automated data analysis and demand response capabilities to increase system functionality, effciency, and reliability. But increased interconnection and automation over a large

  12. REMOTE CONTROLLED SWITCHING DEVICE

    DOE Patents [OSTI]

    Hobbs, J.C.

    1959-02-01

    An electrical switching device which can be remotely controlled and in which one or more switches may be accurately operated at predetermined times or with predetermined intervening time intervals is described. The switching device consists essentially of a deck, a post projecting from the deck at right angles thereto, cam means mounted for rotation around said posts and a switch connected to said deck and actuated by said cam means. Means is provided for rotating the cam means at a constant speed and the switching apparatus is enclosed in a sealed container with external adjusting means and electrical connection elements.

  13. Remote multiple string well completion

    SciTech Connect (OSTI)

    Kirkland, K.G.

    1981-04-21

    Method and apparatus for multiple string well completions by remote operations in underwater installations, by which the tubing strings are installed independently rather than simultaneously.

  14. Remote Desktop | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Desktop Use a remote desktop connection to access your work computer from home. Using Remote Desktop to Connect to Your Work Computer With Remote Desktop, you can have access to a computer at the Laboratory through another computer. For example, you can connect to your work computer from home and have access to all of your programs, files, and network resources as though you were sitting at your computer at work. You can leave programs running at work and see your work desktop displayed

  15. Remotely operated pipe connector

    DOE Patents [OSTI]

    Josefiak, Leonard J.; Cramer, Charles E.

    1988-01-01

    An apparatus for remotely assembling and disassembling a Graylock type coctor between a pipe and a closure for the pipe includes a base and a receptacle on the base for the closure. The pipe is moved into position vertically above the closure by a suitable positioning device such that the flange on the pipe is immediately adjacent and concentric with the flange on the closure. A moving device then moves two semicircular collars from a position free of the closure to a position such that the interior cam groove of each collar contacts the two flanges. Finally, a tensioning device automatically allows remote tightening and loosening of a nut and bolt assembly on each side of the collar to cause a seal ring located between the flanges to be compressed and to seal the closure. Release of the pipe and the connector is accomplished in the reverse order. Preferably, the nut and bolt assembly includes an elongate shaft portion on which a removable sleeve is located.

  16. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain...

  17. Measurement of intergranular attack in stainless steel using ultrasonic energy

    DOE Patents [OSTI]

    Mott, Gerry; Attaar, Mustan; Rishel, Rick D.

    1989-08-08

    Ultrasonic test methods are used to measure the depth of intergranular attack (IGA) in a stainless steel specimen. The ultrasonic test methods include a pitch-catch surface wave technique and a through-wall pulse-echo technique. When used in combination, these techniques can establish the extent of IGA on both the front and back surfaces of a stainless steel specimen from measurements made on only one surface.

  18. Remote Alaskan Communities Energy Efficiency Competition Social...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Alaskan Communities Energy Efficiency Competition Social Media Kit Remote Alaskan Communities Energy Efficiency Competition Social Media Kit Alaska Stakeholders-Below you ...

  19. Hyperspectral Remote Sensing Techniques For Locating Geothermal...

    Open Energy Info (EERE)

    Remote Sensing Techniques For Locating Geothermal Resources Jump to: navigation, search OpenEI Reference LibraryAdd to library Poster: Hyperspectral Remote Sensing Techniques For...

  20. REMOTE ACCESS SERVICES | Department of Energy

    Office of Environmental Management (EM)

    Energy IT Services (EITS) Remote Access Services: Outlook Web Access RSA Token Login RSA ... Energy Information Administration (EIA) Remote Access Services Outlook Web Access EIA VPN ...

  1. Remote direct memory access

    DOE Patents [OSTI]

    Archer, Charles J.; Blocksome, Michael A.

    2012-12-11

    Methods, parallel computers, and computer program products are disclosed for remote direct memory access. Embodiments include transmitting, from an origin DMA engine on an origin compute node to a plurality target DMA engines on target compute nodes, a request to send message, the request to send message specifying a data to be transferred from the origin DMA engine to data storage on each target compute node; receiving, by each target DMA engine on each target compute node, the request to send message; preparing, by each target DMA engine, to store data according to the data storage reference and the data length, including assigning a base storage address for the data storage reference; sending, by one or more of the target DMA engines, an acknowledgment message acknowledging that all the target DMA engines are prepared to receive a data transmission from the origin DMA engine; receiving, by the origin DMA engine, the acknowledgement message from the one or more of the target DMA engines; and transferring, by the origin DMA engine, data to data storage on each of the target compute nodes according to the data storage reference using a single direct put operation.

  2. REMOTE HANDLING ARRANGEMENTS

    DOE Patents [OSTI]

    Ginns, D.W.

    1958-04-01

    A means for handling remotely a sample pellet to be irradiated in a nuclear reactor is proposed. It is comprised essentially of an inlet tube extending through the outer shield of the reactor and being inclined so that its outer end is at a higher elevation than its inner end, an outlet tube extending through the outer shield being inclined so that its inner end is at a higher elevation than its outer end, the inner ends of these two tubes being interconnected, and a straight tube extending through the outer shield and into the reactor core between the inlet and outlet tubes and passing through the juncture of said inner ends. A rod-like member is rotatably and slidely operated within the central straight tube and has a receptacle on its inner end for receiving a sample pellet from the inlet tube. The rod member is operated to pick up a sample pellet from the inlet tube, carry the sample pellet into the irradiating position within the core, and return to the receiving position where it is rotated to dump the irradiated pellet into the outlet tube by which it is conveyed by gravity to the outside of the reactor. Stop members are provided in the inlet tube, and electrical operating devices are provided to control the sequence of the operation automatically.

  3. T-568: Mozilla Firefox Bugs Let Remote Users Conduct Cross-Site Request Forgery Attacks and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Mozilla developers identified and fixed several memory safety bugs in the browser engine used in Firefox and other Mozilla-based products. Some of these bugs showed evidence of memory corruption under certain circumstances, and Mozilla presume that with enough effort at least some of these could be exploited to run arbitrary code.

  4. Robotics and remote systems applications

    SciTech Connect (OSTI)

    Rabold, D.E.

    1996-05-01

    This article is a review of numerous remote inspection techniques in use at the Savannah River (and other) facilities. These include: (1) reactor tank inspection robot, (2) californium waste removal robot, (3) fuel rod lubrication robot, (4) cesium source manipulation robot, (5) tank 13 survey and decontamination robots, (6) hot gang valve corridor decontamination and junction box removal robots, (7) lead removal from deionizer vessels robot, (8) HB line cleanup robot, (9) remote operation of a front end loader at WIPP, (10) remote overhead video extendible robot, (11) semi-intelligent mobile observing navigator, (12) remote camera systems in the SRS canyons, (13) cameras and borescope for the DWPF, (14) Hanford waste tank camera system, (15) in-tank precipitation camera system, (16) F-area retention basin pipe crawler, (17) waste tank wall crawler and annulus camera, (18) duct inspection, and (19) deionizer resin sampling.

  5. Using the Domain Name System to Thwart Automated Client-Based Attacks

    SciTech Connect (OSTI)

    Taylor, Curtis R; Shue, Craig A

    2011-09-01

    On the Internet, attackers can compromise systems owned by other people and then use these systems to launch attacks automatically. When attacks such as phishing or SQL injections are successful, they can have negative consequences including server downtime and the loss of sensitive information. Current methods to prevent such attacks are limited in that they are application-specific, or fail to block attackers. Phishing attempts can be stopped with email filters, but if the attacker manages to successfully bypass these filters, then the user must determine if the email is legitimate or not. Unfortunately, they often are unable to do so. Since attackers have a low success rate, they attempt to compensate for it in volume. In order to have this high throughput, attackers take shortcuts and break protocols. We use this knowledge to address these issues by implementing a system that can detect malicious activity and use it to block attacks. If the client fails to follow proper procedure, they can be classified as an attacker. Once an attacker has been discovered, they will be isolated and monitored. This can be accomplished using existing software in Ubuntu Linux applications, along with our custom wrapper application. After running the system and seeing its performance on three popular Web browsers Chromium, Firefox and Internet Explorer as well as two popular email clients, Thunderbird and Evolution, we found that not only is this system conceivable, it is effective and has low overhead.

  6. Remote Sensing R. E. Mcintosh

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    R. E. Mcintosh University of Massachusetts Amherst, MA 01003 Introd uction complete and ready to participate in an intensive operation period (lOP) planned for June 1993. The Microwave Remote Sensing Laboratory (MIRSL) is developing a mobile, scanning millimeter-wave radar for the Atmospheric Radiation Measurement (ARM) Program. This project is intended to fill the void for instrumentation that can remotely measure the physical boundaries and phase of cloud particles in three dimensions. ~t

  7. ShadowNet: An Active Defense Infrastructure for Insider Cyber Attack Prevention

    SciTech Connect (OSTI)

    Cui, Xiaohui; Beaver, Justin M; Treadwell, Jim N

    2012-01-01

    The ShadowNet infrastructure for insider cyber attack prevention is comprised of a tiered server system that is able to dynamically redirect dangerous/suspicious network traffic away from production servers that provide web, ftp, database and other vital services to cloned virtual machines in a quarantined environment. This is done transparently from the point of view of both the attacker and normal users. Existing connections, such as SSH sessions, are not interrupted. Any malicious activity performed by the attacker on a quarantined server is not reflected on the production server. The attacker is provided services from the quarantined server, which creates the impression that the attacks performed are successful. The activities of the attacker on the quarantined system are able to be recorded much like a honeypot system for forensic analysis.

  8. T-573: Windows Remote Desktop Client DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Windows Remote Desktop Client. A remote user can cause arbitrary code to be executed on the target user's system.

  9. Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    May 2008 | Department of Energy Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 Cyber Security Audit and Attack Detection Toolkit: National SCADA Test Bed May 2008 This project of the cyber security audit and attack detection toolkit is adding control system intelligence to widely deployed enterprise vulnerability scanners and security event managers While many energy utilities employ vulnerability scanners and security event managers (SEM) on their enterprise

  10. V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    and Let Local Users Bypass Security Restrictions | Department of Energy 26: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions V-026: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions November 16, 2012 - 6:00am Addthis PROBLEM: RSA Data Protection Manager Bugs Permit Cross-Site Scripting Attacks and Let Local Users Bypass Security Restrictions. PLATFORM: RSA

  11. Intergranular attack of alloy 600 tubing: Simulation tests: Interim report

    SciTech Connect (OSTI)

    Daret, J.

    1987-08-01

    In some steam generators, intergranular attack (IGA) has been detected on alloy 600 tubes within or near the tube sheet crevice region. Refreshed autoclave tests were performed to simulate caustic or river water in-leakage. The objective of the caustic tests was to perfect the test methodology, in order to closely simulate IGA that occurs in an actual steam generator, to identify causes and to test countermeasures in future tests. Tests with caustic pollution succeeded in producing representative IGA, and the test method is now believed applicable for studying countermeasures. The continuation of a river water fault test already tested for 4500 hours was aimed at checking if IGA was producible with only fresh water in-leakage, or if other deleterious species were involved in the cause of phenomenon. IGA was not detected for this case, which tends to indicate that another (not yet identified) specie acts as either a depassivating agent or a corrosion initiator in actual steam generators.

  12. Breaking into a computer : attack techniques and tools used by cyber-criminals

    ScienceCinema (OSTI)

    None

    2011-10-06

    Oral presentation in English, slides in English. We will show you how and why cyber-criminals attack your computers: their motives, methods and tools.

  13. Connecting Remote Clusters with ATM

    SciTech Connect (OSTI)

    Hu, T.C.; Wyckoff, P.S.

    1998-10-01

    Sandia's entry into utilizing clusters of networked workstations is called Computational Plant or CPlant for short. The design of CPlant uses Ethernet to boot the individual nodes, Myrinet to communicate within a node cluster, and ATM to connect between remote clusters. This SAND document covers the work done to enable the use of ATM on the CPlant nodes in the Fall of 1997.

  14. Remote multiple string well completion

    SciTech Connect (OSTI)

    Kirkland, K.G.

    1981-09-15

    In a remotely installed underwater well apparatus, a tubular body, typically a multiple string tubing hanger, is landed in a position oriented rotationally with respect to a reference point on the apparatus and a seal device is then energized by the same tool employed to land and orient the tubular body.

  15. Working with SRNL - Our Facilities - Remote Systems Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Systems Laboratory Remote Systems Laboratory Working with SRNL Our Facilities - Remote Systems Laboratory The Remote Systems Laboratory is used for the design, development, fabrication, and testing of unique equipment systems for use in radioactive, hazardous or inaccessible environments

  16. Protecting Intelligent Distributed Power Grids against Cyber Attacks

    SciTech Connect (OSTI)

    Dong Wei; Yan Lu; Mohsen Jafari; Paul Skare; Kenneth Rohde

    2010-12-31

    Like other industrial sectors, the electrical power industry is facing challenges involved with the increasing demand for interconnected operations and control. The electrical industry has largely been restructured due to deregulation of the electrical market and the trend of the Smart Grid. This moves new automation systems from being proprietary and closed to the current state of Information Technology (IT) being highly interconnected and open. However, while gaining all of the scale and performance benefits of IT, existing IT security challenges are acquired as well. The power grid automation network has inherent security risks due to the fact that the systems and applications for the power grid were not originally designed for the general IT environment. In this paper, we propose a conceptual layered framework for protecting power grid automation systems against cyber attacks. The following factors are taken into account: (1) integration with existing, legacy systems in a non-intrusive fashion; (2) desirable performance in terms of modularity, scalability, extendibility, and manageability; (3) alignment to the 'Roadmap to Secure Control Systems in the Energy Sector' and the future smart grid. The on-site system test of the developed prototype security system is briefly presented as well.

  17. A Probabilistic Framework for Quantifying Mixed Uncertainties in Cyber Attacker Payoffs

    SciTech Connect (OSTI)

    Chatterjee, Samrat; Tipireddy, Ramakrishna; Oster, Matthew R.; Halappanavar, Mahantesh

    2015-12-28

    Quantification and propagation of uncertainties in cyber attacker payoffs is a key aspect within multiplayer, stochastic security games. These payoffs may represent penalties or rewards associated with player actions and are subject to various sources of uncertainty, including: (1) cyber-system state, (2) attacker type, (3) choice of player actions, and (4) cyber-system state transitions over time. Past research has primarily focused on representing defender beliefs about attacker payoffs as point utility estimates. More recently, within the physical security domain, attacker payoff uncertainties have been represented as Uniform and Gaussian probability distributions, and mathematical intervals. For cyber-systems, probability distributions may help address statistical (aleatory) uncertainties where the defender may assume inherent variability or randomness in the factors contributing to the attacker payoffs. However, systematic (epistemic) uncertainties may exist, where the defender may not have sufficient knowledge or there is insufficient information about the attackers payoff generation mechanism. Such epistemic uncertainties are more suitably represented as generalizations of probability boxes. This paper explores the mathematical treatment of such mixed payoff uncertainties. A conditional probabilistic reasoning approach is adopted to organize the dependencies between a cyber-systems state, attacker type, player actions, and state transitions. This also enables the application of probabilistic theories to propagate various uncertainties in the attacker payoffs. An example implementation of this probabilistic framework and resulting attacker payoff distributions are discussed. A goal of this paper is also to highlight this uncertainty quantification problem space to the cyber security research community and encourage further advancements in this area.

  18. Aggregate Remote Memory Copy Interface

    Energy Science and Technology Software Center (OSTI)

    2006-02-23

    The purpose of the Aggregate Remote Memory Copy (ARMCI) library is to provide a general- purpose, efficient, and Widely portable remote memory access (RMA) operations (one-sided communication) optimized for Contiguous and noncontiguous (strided, scatter/gather, I/O vector) data transfers. In addition, ARMCI includes a set of atomic and mutual exclusion operations. The development ARMCI is driven by the need to support the global-addres space communication model in context of distributed regular or irregular distributed data structures,more » communication libraries, and compilers. ARMCI is a standalone system that could be used to support user-level libraries and applications that use MPI or PVM.« less

  19. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  20. Disposable remote zero headspace extractor

    DOE Patents [OSTI]

    Hand, Julie J.; Roberts, Mark P.

    2006-03-21

    The remote zero headspace extractor uses a sampling container inside a stainless steel vessel to perform toxicity characteristics leaching procedure to analyze volatile organic compounds. The system uses an in line filter for ease of replacement. This eliminates cleaning and disassembly of the extractor. All connections are made with quick connect fittings which can be easily replaced. After use, the bag can be removed and disposed of, and a new sampling container is inserted for the next extraction.

  1. T-701: Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Citrix Access Gateway Enterprise Edition Input Validation Flaw in Logon Portal Permits Cross-Site Scripting Attacks.

  2. Remote Access Options | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Access Options Remote Access Options A Virtual Private Network (VPN) is a private connection between two resources that uses the public telecommunication infrastructure. It maintains privacy through the use of a tunneling protocol and security procedures and provides the following abilities. * Messaging via Outlook Web Access (OWA) * Remote desktop and application access via VDI and Citrix(tm) Workplace * Secure access to DOE Headquarters mission-specific internal network resources

  3. Quick-connect coupler for remote manipulation

    DOE Patents [OSTI]

    Dobbins, James C.

    1990-08-07

    An adaptor for a single-point attachment, push-to-connect/pull-to-disconnect, quick-connect fluid coupler which enables the coupler to be remotely manipulated.

  4. Geographical Applications of Remote Sensing (Journal Article...

    Office of Scientific and Technical Information (OSTI)

    SciTech Connect Search Results Journal Article: Geographical Applications of Remote ... DOE Contract Number: AC05-76RL01830 Resource Type: Journal Article Resource Relation: ...

  5. Remote Alaskan Communities Energy Efficiency Competition | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    As part of President Obama's commitment to fight climate change and assist remote Alaskan ... Media Kit For Stakeholders FACT SHEET: About RACEE DOWNLOAD: Social Media Kit ENERGY BLOG ...

  6. Geobotanical Remote Sensing For Geothermal Exploration | Open...

    Open Energy Info (EERE)

    Exploration Jump to: navigation, search OpenEI Reference LibraryAdd to library Book: Geobotanical Remote Sensing For Geothermal Exploration Abstract This paper presents a...

  7. Quick-connect coupler for remote manipulation

    DOE Patents [OSTI]

    Dobbins, James C. (Idaho Falls, ID)

    1990-01-01

    An adaptor for a single-point attachment, push-to-connect/pull-to-disconnect, quick-connect fluid coupler which enables the coupler to be remotely manipulated.

  8. Remote Alaskan Communities Energy Efficiency Competition | Department...

    Energy Savers [EERE]

    and potential for transformative and sustainable impacts on how the community currently ... accelerate efforts by remote Alaskan communities to adopt sustainable energy strategies. ...

  9. Remote Alaska Communities Energy Efficiency (RACEE) Competition...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    15 Remote Alaska Communities Energy Efficiency (RACEE) Competition Fact Sheet Background ... 2 2014 Power Cost Equalization Program report, http:www.akenergyauthority.org...

  10. Remote Alaskan Communities Energy Efficiency Competition

    Broader source: Energy.gov [DOE]

    New initiative aims significantly accelerate efforts by remote Alaskan communities to adopt sustainable energy strategies, through a competitive effort to elicit the best approaches.

  11. Detecting and Blocking Network Attacks at Ultra High Speeds

    SciTech Connect (OSTI)

    Paxson, Vern

    2010-11-29

    packets forwarded to it so that the connection can continue. If the connection successfully negotiates encryption, the IPS can no longer profitably analyze it, so it downloads a per-connection table entry to the Shunt specifying that the action for the connection in the future is 'forward.' For heavy-tailed connections, this means a very large majority of the connection's packets will now pass through the Shunt device without burdening the IPS with any further analysis load. On the other hand, if the IPS is dissatisfied with some element of the initial dialog, it downloads a 'drop' entry to terminate the connection. Note that by providing for reinjection, we can promote an intrusion detection system into an intrusion prevention system, one that does not merely detect attacks but can block them before they complete. Reinjection also allows the IPS to normalize traffic to remove ambiguities that attackers can leverage to evade the IPS.

  12. Remotely readable fiber optic compass

    DOE Patents [OSTI]

    Migliori, A.; Swift, G.W.; Garrett, S.L.

    1985-04-30

    A remotely readable fiber optic compass. A sheet polarizer is affixed to a magnet rotatably mounted in a compass body, such that the polarizer rotates with the magnet. The optical axis of the sheet polarizer is preferably aligned with the north-south axis of the magnet. A single excitation light beam is divided into four identical beams, two of which are passed through the sheet polarizer and through two fixed polarizing sheets which have their optical axes at right angles to one another. The angle of the compass magnet with respect to a fixed axis of the compass body can be determined by measuring the ratio of the intensities of the two light beams. The remaining ambiguity as to which of the four possible quadrants the magnet is pointing to is resolved by the second pair of light beams, which are passed through the sheet polarizer at positions which are transected by two semicircular opaque strips formed on the sheet polarizer. The incoming excitation beam and the four return beams are communicated by means of optical fibers, giving a remotely readable compass which has no electrical parts.

  13. Remotely readable fiber optic compass

    DOE Patents [OSTI]

    Migliori, Albert; Swift, Gregory W.; Garrett, Steven L.

    1986-01-01

    A remotely readable fiber optic compass. A sheet polarizer is affixed to a magnet rotatably mounted in a compass body, such that the polarizer rotates with the magnet. The optical axis of the sheet polarizer is preferably aligned with the north-south axis of the magnet. A single excitation light beam is divided into four identical beams, two of which are passed through the sheet polarizer and through two fixed polarizing sheets which have their optical axes at right angles to one another. The angle of the compass magnet with respect to a fixed axis of the compass body can be determined by measuring the ratio of the intensities of the two light beams. The remaining ambiguity as to which of the four possible quadrants the magnet is pointing to is resolved by the second pair of light beams, which are passed through the sheet polarizer at positions which are transected by two semicircular opaque strips formed on the sheet polarizer. The incoming excitation beam and the four return beams are communicated by means of optical fibers, giving a remotely readable compass which has no electrical parts.

  14. T-590: HP Diagnostics Input Validation Hole Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Diagnostics. The vulnerability could be exploited remotely resulting in cross site scripting (XSS).

  15. Remote Whispering Applying Time Reversal

    SciTech Connect (OSTI)

    Anderson, Brian Eric

    2015-07-16

    The purpose of this project was to explore the use of time reversal technologies as a means for communication to a targeted individual or location. The idea is to have the privacy of whispering in one’s ear, but to do this remotely from loudspeakers not located near the target. Applications of this work include communicating with hostages and survivors in rescue operations, communicating imaging and operational conditions in deep drilling operations, monitoring storage of spent nuclear fuel in storage casks without wires, or clandestine activities requiring signaling between specific points. This technology provides a solution in any application where wires and radio communications are not possible or not desired. It also may be configured to self calibrate on a regular basis to adjust for changing conditions. These communications allow two people to converse with one another in real time, converse in an inaudible frequency range or medium (i.e. using ultrasonic frequencies and/or sending vibrations through a structure), or send information for a system to interpret (even allowing remote control of a system using sound). The time reversal process allows one to focus energy to a specific location in space and to send a clean transmission of a selected signal only to that location. In order for the time reversal process to work, a calibration signal must be obtained. This signal may be obtained experimentally using an impulsive sound, a known chirp signal, or other known signals. It may also be determined from a numerical model of a known environment in which the focusing is desired or from passive listening over time to ambient noise.

  16. V-149: Microsoft Internet Explorer Object Access Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary Code V-149: Microsoft Internet Explorer Object Access Bug Lets Remote Users Execute Arbitrary...

  17. U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code U-262: Microsoft Internet Explorer Flaw Lets Remote Users Execute Arbitrary Code September 18, 2012 -...

  18. Advanced Remote Maintenance Design for Pilot-Scale Centrifugal...

    Office of Scientific and Technical Information (OSTI)

    Journal Article: Advanced Remote Maintenance Design for Pilot-Scale Centrifugal Contactors Citation Details In-Document Search Title: Advanced Remote Maintenance Design for ...

  19. Hyperspectral Geobotanical Remote Sensing For Co2 Storage Monitoring...

    Open Energy Info (EERE)

    Hyperspectral Geobotanical Remote Sensing For Co2 Storage Monitoring Jump to: navigation, search OpenEI Reference LibraryAdd to library Book: Hyperspectral Geobotanical Remote...

  20. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive Information V-202: Cisco Video Surveillance Manager Bugs Let Remote Users Obtain Potentially Sensitive...

  1. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated...

  2. V-220: Juniper Security Threat Response Manager Lets Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Threat Response Manager Lets Remote Authenticated Users Execute Arbitrary Commands V-220: Juniper Security Threat Response Manager Lets Remote Authenticated Users Execute...

  3. U-047: Siemens Automation License Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Siemens Automation License Manager Bugs Let Remote Users Deny Service or Execute Arbitrary Code U-047: Siemens Automation License Manager Bugs Let Remote Users Deny Service or...

  4. Remote Control of Laboratory Equipment for Educational Purposes...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Control of Laboratory Equipment for Educational Purposes This invention consists of a method to remote control many types of laboratory equipment that is typically found in ...

  5. Fact Sheet: Sustainable Energy for Remote Indonesian Grids (SERIG...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Fact Sheet: Sustainable Energy for Remote Indonesian Grids (SERIG) Fact Sheet: Sustainable Energy for Remote Indonesian Grids (SERIG) The United States Department of Energy (DOE) ...

  6. Category:Remote Sensing Techniques | Open Energy Information

    Open Energy Info (EERE)

    Remote Sensing Techniques Jump to: navigation, search GEOTHERMAL ENERGYGeothermal Home Geothermalpower.jpg Looking for the Remote Sensing Techniques page? For detailed information...

  7. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication...

  8. V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code V-176: Adobe Flash Player Memory Corruption Flaw Lets Remote Users Execute Arbitrary Code June...

  9. Methods, media, and systems for detecting attack on a digital processing device

    DOE Patents [OSTI]

    Stolfo, Salvatore J.; Li, Wei-Jen; Keromylis, Angelos D.; Androulaki, Elli

    2014-07-22

    Methods, media, and systems for detecting attack are provided. In some embodiments, the methods include: comparing at least part of a document to a static detection model; determining whether attacking code is included in the document based on the comparison of the document to the static detection model; executing at least part of the document; determining whether attacking code is included in the document based on the execution of the at least part of the document; and if attacking code is determined to be included in the document based on at least one of the comparison of the document to the static detection model and the execution of the at least part of the document, reporting the presence of an attack. In some embodiments, the methods include: selecting a data segment in at least one portion of an electronic document; determining whether the arbitrarily selected data segment can be altered without causing the electronic document to result in an error when processed by a corresponding program; in response to determining that the arbitrarily selected data segment can be altered, arbitrarily altering the data segment in the at least one portion of the electronic document to produce an altered electronic document; and determining whether the corresponding program produces an error state when the altered electronic document is processed by the corresponding program.

  10. Remotely operated submersible underwater suction apparatus

    DOE Patents [OSTI]

    Kristan, Louis L. (2111 Brentwood Dr., Idaho Falls, ID 83402)

    1990-01-01

    A completely submersible, remotely operated underwater suction device for collection of irradiated materials in a nuclear pool is disclosed. The device includes a pump means for pumping water through the device, a filter means for capturing irradiated debris, remotely operated releasable connector means, a collection means and a means for remotely maneuvering the collection means. The components of the suction device may be changed and replaced underwater to take advantage of the excellent radiation shielding ability of water to thereby minimize exposure of personnel to radiation.

  11. Heating remote rooms in passive solar buildings

    SciTech Connect (OSTI)

    Balcomb, J.D.

    1981-01-01

    Remote rooms can be effectively heated by convection through a connecting doorway. A simple steady-state equation is developed for design purposes. Validation of a dynamic model is achieved using data obtained over a 13-day period. Dynamic effects are investigated using a simulation analysis for three different cases of driving temperature; the effect is to reduce the temperature difference between the driving room and the remote room compared to the steady-state model. For large temperature swings in the driving room a strategy which uses the intervening door in a diode mode is effective. The importance of heat-storing mass in the remote room is investigated.

  12. Method for remote detection of trace contaminants

    DOE Patents [OSTI]

    Simonson, Robert J.; Hance, Bradley G.

    2003-09-09

    A method for remote detection of trace contaminants in a target area comprises applying sensor particles that preconcentrate the trace contaminant to the target area and detecting the contaminant-sensitive fluorescence from the sensor particles. The sensor particles can have contaminant-sensitive and contaminant-insensitive fluorescent compounds to enable the determination of the amount of trace contaminant present in the target are by relative comparison of the emission of the fluorescent compounds by a local or remote fluorescence detector. The method can be used to remotely detect buried minefields.

  13. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    SciTech Connect (OSTI)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  14. Protecting Accelerator Control Systems in the Face of Sophisticated Cyber Attacks

    SciTech Connect (OSTI)

    Hartman, Steven M

    2012-01-01

    Cyber security for industrial control systems has received significant attention in the past two years. The news coverage of the Stuxnet attack, believed to be targeted at the control system for a uranium enrichment plant, brought the issue to the attention of news media and policy makers. This has led to increased scrutiny of control systems for critical infrastructure such as power generation and distribution, and industrial systems such as chemical plants and petroleum refineries. The past two years have also seen targeted network attacks aimed at corporate and government entities including US Department of Energy National Laboratories. Both of these developments have potential repercussions for the control systems of particle accelerators. The need to balance risks from potential attacks with the operational needs of an accelerator present a unique challenge for the system architecture and access model.

  15. Machine Learning for Power System Disturbance and Cyber-attack Discrimination

    SciTech Connect (OSTI)

    Borges, Raymond Charles; Beaver, Justin M; Buckner, Mark A; Morris, Thomas; Adhikari, Uttam; Pan, Shengyi

    2014-01-01

    Power system disturbances are inherently complex and can be attributed to a wide range of sources, including both natural and man-made events. Currently, the power system operators are heavily relied on to make decisions regarding the causes of experienced disturbances and the appropriate course of action as a response. In the case of cyber-attacks against a power system, human judgment is less certain since there is an overt attempt to disguise the attack and deceive the operators as to the true state of the system. To enable the human decision maker, we explore the viability of machine learning as a means for discriminating types of power system disturbances, and focus specifically on detecting cyber-attacks where deception is a core tenet of the event. We evaluate various machine learning methods as disturbance discriminators and discuss the practical implications for deploying machine learning systems as an enhancement to existing power system architectures.

  16. Apparatus for remotely handling components

    DOE Patents [OSTI]

    Szkrybalo, Gregory A.; Griffin, Donald L.

    1994-01-01

    The inventive apparatus for remotely handling bar-like components which define a longitudinal direction includes a gripper mechanism for gripping the component including first and second gripper members longitudinally fixedly spaced from each other and oriented parallel to each other in planes transverse to the longitudinal direction. Each gripper member includes a jaw having at least one V-groove with opposing surfaces intersecting at a base and extending radially relative to the longitudinal direction for receiving the component in an open end between the opposing surfaces. The V-grooves on the jaw plate of the first and second gripper members are aligned in the longitudinal direction to support the component in the first and second gripper members. A jaw is rotatably mounted on and a part of each of the first and second gripper members for selectively assuming a retracted mode in which the open end of the V-groove is unobstructed and active mode in which the jaw spans the open end of the V-groove in the first and second gripper members. The jaw has a locking surface for contacting the component in the active mode to secure the component between the locking surface of the jaw and the opposing surfaces of the V-groove. The locking surface has a plurality of stepped portions, each defining a progressively decreasing radial distance between the base of the V-groove and the stepped portion opposing the base to accommodate varying sizes of components.

  17. Energy Vampires are Attacking Your Home - Here's How to Stop Them |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Vampires are Attacking Your Home - Here's How to Stop Them Energy Vampires are Attacking Your Home - Here's How to Stop Them October 20, 2014 - 2:09pm Addthis Using a power strip to switch off appliances ensures your home won't be plagued by energy vampires. | Photo courtesy of ©iStockphoto.com/webking Using a power strip to switch off appliances ensures your home won't be plagued by energy vampires. | Photo courtesy of ©iStockphoto.com/webking Erik Hyrkas Erik

  18. Request for Information -- Remote Alaskan Communities Energy...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    As part of President Obama's commitment to fight climate change and assist remote Alaskan ... Responses to the RFI may be submitted directly by email to AlaskaCompetition@hq.doe.go...

  19. SLAC Courier and Remote Login Facility

    SciTech Connect (OSTI)

    Huffer, M.E.

    1987-04-01

    The Courier and Remote Login Facility (CRLF) serves two functions. First, it provides for application programmers a presentation layer protocol called Courier. Courier enforces a remote procedure call discipline and allows the programmer to pass data between systems in a system independent form. Second, it implements a Remote Login Facility. This facility verifies a client's access rights, constructs an environment based on these rights, and starts up a program to process client requested services. Courier allows communication between two system elements (or hosts) by causing the creation of two programs: a user program on the initiating host and a server program on the remote host. Communication then takes place between the cooperating system elements by making appropriate calls to the Courier Interface Library.

  20. Remote Whispering Applying Time Reversal (Technical Report) ...

    Office of Scientific and Technical Information (OSTI)

    of spent nuclear fuel in storage casks without wires, or ... remote control of a system using sound). The time reversal process allows one to focus energy to a specific location ...

  1. Remote Alaskan Communities Energy Efficiency Competition

    Broader source: Energy.gov [DOE]

    The U.S. Department of Energy's (DOE's) Office of Indian Energy and Office of Energy Efficiency and Renewable Energy (EERE) have issued a Notice of Technical Assistance (NOTA) to significantly accelerate efforts by remote Alaskan communities to adopt sustainable energy strategies. The Remote Alaskan Communities Energy Efficiency Competition will empower Alaskan communities and Alaska Native villages to develop effective tools to advance the use of reliable, affordable, and energy efficient solutions that are replicable throughout Alaska and other Arctic regions.

  2. U-203: HP Photosmart Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP Photosmart. A remote user can cause denial of service conditions.

  3. T-636: Wireshark Multiple Flaws Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  4. Request for Information-- Remote Alaskan Communities Energy Efficiency Competition

    Broader source: Energy.gov [DOE]

    Download the request for information on the Remote Alaskan Communities Energy Efficiency Competition.

  5. U-176: Wireshark Multiple Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Wireshark. A remote user can cause denial of service conditions.

  6. Alternating Wolff-Parkinson-White syndrome associated with attack of angina

    SciTech Connect (OSTI)

    Mangiafico, R.A.; Petralito, A.; Grimaldi, D.R. )

    1990-07-01

    In a patient with Wolff-Parkinson-White syndrome and an inferior-posterior bypass tract, transient restoration of normal conduction occurred during an attack of angina. The ECG pattern of inferior posterior ischemia was present when the conduction was normal. Thallium scintigraphy showed a reversible posterolateral perfusion defect. The possible mechanisms for production of intermittent preexcitation are discussed.

  7. Regulating greenhouse gas 'leakage': how California can evade the impending constitutional attacks

    SciTech Connect (OSTI)

    Brian H. Potts

    2006-06-15

    Federalist greenhouse gas regulation poses many constitutional pitfalls, and some fear that California's cap-and-trade and procurement cap proposals are vulnerable to constitutional challenge. An attack under the commerce clause seems to pose the biggest threat, but the author proposes an alternative that can eliminate this threat: market participation.

  8. Fiber optically isolated and remotely stabilized data transmission system

    DOE Patents [OSTI]

    Nelson, M.A.

    1992-11-10

    A fiber optically isolated and remotely stabilized data transmission systems described wherein optical data may be transmitted over an optical data fiber from a remote source which includes a data transmitter and a power supply at the remote source. The transmitter may be remotely calibrated and stabilized via an optical control fiber, and the power source may be remotely cycled between duty and standby modes via an optical control fiber. 3 figs.

  9. Fiber optically isolated and remotely stabilized data transmission system

    DOE Patents [OSTI]

    Nelson, Melvin A.

    1992-01-01

    A fiber optically isolated and remotely stabilized data transmission system s described wherein optical data may be transmitted over an optical data fiber from a remote source which includes a data transmitter and a power supply at the remote source. The transmitter may be remotely calibrated and stabilized via an optical control fiber, and the power source may be remotely cycled between duty and standby modes via an optical control fiber.

  10. The Jericho Option: Al-Qa'ida and Attacks on Critical Infrastructure

    SciTech Connect (OSTI)

    Ackerman, G; Blair, C; Bale, J; Hahn, G; DiLorenzo, E; Vadlamudi, S; Lunsford, C

    2006-08-28

    There is no doubt that al-Qaida and its affiliates have displayed, and continue to display, an acute interest in attacking targets that are considered to be important components of the infrastructure of the United States. What has not thus far been carried out, however, is an in-depth examination of the basic nature, historical evolution, and present scope of the organization's objectives that might help government personnel develop sound policy recommendations and analytical indicators to assist in detecting and interdicting plots of this nature. This study was completed with the financial support of the Lawrence Livermore National Laboratory, through a project sponsored by the U.S. Department of Homeland Security, Science and Technology Directorate. It is specifically intended to increase counterterrorism analysts understanding of certain features of al-Qaida's strategy and operations in order to facilitate the anticipation and prevention of attacks directed against our most critical infrastructures. The procedure adopted herein has involved consulting a wide variety of source materials that bear on the topic, ranging from sacred religious texts and historical accounts to al-Qaida-linked materials and the firsthand testimony of captured members of the group. It has also intentionally combined multiple approaches, including exploring the more esoteric religion-historical referents that have served to influence al-Qaida's behavior, providing a strategic analysis of its objectives and targeting rationales, closely examining the statements and writings of al-Qaida leaders and spokesmen (in part on the basis of material translated from primary sources), offering a descriptive analysis of its past global attack patterns, and producing concise but nonetheless in-depth case studies of its previous ''infrastructural'' attacks on U.S. soil. The analyses contained herein tend to support the preliminary assessment made by some of the authors in an earlier report, namely

  11. U-204: HP Network Node Manager i Input Validation Hole Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager I (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  12. U-229: HP Network Node Manager i Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    Potential security vulnerabilities have been identified with HP Network Node Manager i (NNMi) for HP-UX, Linux, Solaris, and Windows. The vulnerabilities could be remotely exploited resulting in cross site scripting (XSS).

  13. U-144:Juniper Secure Access Input Validation Flaw Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    The VPN management interface does not properly filter HTML code from user-supplied input before displaying the input. A remote user can cause arbitrary scripting code to be executed by the target user's browser.

  14. Remote inspection system for hazardous sites

    SciTech Connect (OSTI)

    Redd, J.; Borst, C.; Volz, R.A.; Everett, L.J.

    1999-04-01

    Long term storage of special nuclear materials poses a number of problems. One of these is a need to inspect the items being stored from time to time. Yet the environment is hostile to man, with significant radiation exposure resulting from prolonged presence in the storage facility. This paper describes research to provide a remote inspection capability, which could lead to eliminating the need for humans to enter a nuclear storage facility. While there are many ways in which an RI system might be created, this paper describes the development of a prototype remote inspection system, which utilizes virtual reality technology along with robotics. The purpose of this system is to allow the operator to establish a safe and realistic telepresence in a remote environment. In addition, it was desired that the user interface for the system be as intuitive to use as possible, thus eliminating the need for extensive training. The goal of this system is to provide a robotic platform with two cameras, which are capable of providing accurate and reliable stereographic images of the remote environment. One application for the system is that it might be driven down the corridors of a nuclear storage facility and utilized to inspect the drums inside, all without the need for physical human presence. Thus, it is not a true virtual reality system providing simulated graphics, but rather an augmented reality system, which performs remote inspection of an existing, real environment.

  15. Valve assembly having remotely replaceable bearings

    DOE Patents [OSTI]

    Johnson, Evan R.; Tanner, David E.

    1980-01-01

    A valve assembly having remotely replaceable bearings is disclosed wherein a valve disc is supported within a flow duct for rotation about a pair of axially aligned bearings, one of which is carried by a spindle received within a diametral bore in the valve disc, and the other of which is carried by a bearing support block releasably mounted on the duct circumferentially of an annular collar on the valve disc coaxial with its diametrical bore. The spindle and bearing support block are adapted for remote removal to facilitate servicing or replacement of the valve disc support bearings.

  16. Geobotanical Remote Sensing for Geothermal Exploration

    SciTech Connect (OSTI)

    Pickles, W L; Kasameyer, P W; Martini, B A; Potts, D C; Silver, E A

    2001-05-22

    This paper presents a plan for increasing the mapped resource base for geothermal exploration in the Western US. We plan to image large areas in the western US with recently developed high resolution hyperspectral geobotanical remote sensing tools. The proposed imaging systems have the ability to map visible faults, surface effluents, historical signatures, and discover subtle hidden faults and hidden thermal systems. Large regions can be imaged at reasonable costs. The technique of geobotanical remote sensing for geothermal signatures is based on recent successes in mapping faults and effluents the Long Valley Caldera and Mammoth Mountain in California.

  17. Applying high resolution SyXRD analysis on sulfate attacked concrete field samples

    SciTech Connect (OSTI)

    Stroh, J.; Schlegel, M.-C.; Irassar, E.F.; Meng, B.; Emmerling, F.

    2014-12-15

    High resolution synchrotron X-ray diffraction (SyXRD) was applied for a microstructural profile analysis of concrete deterioration after sulfate attack. The cement matrices consist of ordinary Portland cement and different amounts of supplementary cementitious materials, such as fly ash, natural pozzolana and granulated blast furnace slag. The changes of the phase composition were determined along the direction of sulfate ingress. This approach allows the identification of reaction fronts and zones of different phase compositions and conclusions about the mechanisms of sulfate attack. Two reaction fronts were localized in the initial 4 mm from the sample surface. The mechanism of deterioration caused by the exposition in the sulfate-bearing soil is discussed. SyXRD is shown to be a reliable method for investigation of cementitious materials with aggregates embedded in natural environments.

  18. Verification of Sulfate Attack Penetration Rates for Saltstone Disposal Unit Modeling

    SciTech Connect (OSTI)

    Flach, G. P.

    2015-05-12

    Recent Special Analysis modeling of Saltstone Disposal Units consider sulfate attack on concrete and utilize degradation rates estimated from Cementitious Barriers Partnership software simulations. This study provides an independent verification of those simulation results using an alternative analysis method and an independent characterization data source. The sulfate penetration depths estimated herein are similar to the best-estimate values in SRNL-STI-2013-00118 Rev. 2 and well below the nominal values subsequently used to define Saltstone Special Analysis base cases.

  19. Ambrosia Beetle (Coleoptera: Scolytidae) Species, Flight, and Attack on Living Eastern Cottonwood Trees.

    SciTech Connect (OSTI)

    D.R. Coyle; D.C. Booth: M.S. Wallace

    2005-12-01

    ABSTRACT In spring 2002, ambrosia beetles (Coleoptera: Scolytidae) infested an intensively managed 22-ha tree plantation on the upper coastal plain of South Carolina. Nearly 3,500 scolytids representing 28 species were captured in ethanol-baited traps from 18 June 2002 to 18 April 2004. More than 88% of total captures were exotic species. Five species [Dryoxylon onoharaensum (Murayama), Euwallacea validus (Eichhoff), Pseudopityophthorus minutissimus (Zimmermann), Xyleborus atratus Eichhoff, and Xyleborus impressus Eichhoff]) were collected in South Carolina for the ????rst time. Of four tree species in the plantation, eastern cottonwood, Populus deltoides Bartram, was the only one attacked, with nearly 40% of the trees sustaining ambrosia beetle damage. Clone ST66 sustained more damage than clone S7C15. ST66 trees receiving fertilization were attacked more frequently than trees receiving irrigation, irrigation_fertilization, or controls, although the number of S7C15 trees attacked did not differ among treatments. The study location is near major shipping ports; our results demonstrate the necessity for intensive monitoring programs to determine the arrival, spread, ecology, and impact of exotic scolytids.

  20. T-693: Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    Symantec Endpoint Protection Manager Input Validation Hole Permits Cross-Site Scripting and Cross-Site Request Forgery Attacks .

  1. Remote Sensing Laboratory | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Remote Sensing Laboratory Department of Energy's chief risk officer visits Nevada National Security Site Earlier this month, Associate Deputy Secretary John MacWilliams visited the Nevada National Security Site (NNSS) in his role as Chief Risk Officer for the Department of Energy. He reviewed the various ways the NNSS contributes to the department's and NNSA's missions, including radiological

  2. Advanced signal processing in geophysical remote sensing

    SciTech Connect (OSTI)

    Witten, A.J.; King, W.C.

    1993-06-01

    This paper describes advanced signal processing methods which have improved the capabilities to detect and image the subsurface environment with geophysical remote sensing techniques. Field results are presented showing target detection, subsurface characterizations, and imaging of insitu waste treatment processes, all previously unachievable with such tools as ground penetrating radar, magnetometry and seismic.

  3. Advanced signal processing in geophysical remote sensing

    SciTech Connect (OSTI)

    Witten, A.J. ); King, W.C. . Dept. of Geography and Environmental Engineering)

    1993-01-01

    This paper describes advanced signal processing methods which have improved the capabilities to detect and image the subsurface environment with geophysical remote sensing techniques. Field results are presented showing target detection, subsurface characterizations, and imaging of insitu waste treatment processes, all previously unachievable with such tools as ground penetrating radar, magnetometry and seismic.

  4. Solar Energy Prospecting in Remote Alaska | Department of Energy

    Office of Environmental Management (EM)

    Prospecting in Remote Alaska Solar Energy Prospecting in Remote Alaska Solar-Prospecting-AK-final.jpg A new report from the U.S. Department of Energy Office of Indian Energy, ...

  5. NREL: Technology Deployment - Remote Shading Tool Has Potential...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Shading Tool Has Potential to Reduce Solar Soft Costs by 17 CentsWatt Publications Solar Census-Perfecting the Art of Automated, Remote Solar Shading Assessments Sponsors ...

  6. Geothermal Exploration Using Aviris Remote Sensing Data Over...

    Open Energy Info (EERE)

    Aviris Remote Sensing Data Over Fish Lake Valley, Nv Jump to: navigation, search OpenEI Reference LibraryAdd to library Conference Paper: Geothermal Exploration Using Aviris Remote...

  7. V-218: HP Service Manager Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-029: TCPIP Services for OpenVMS POPIMAP Service Bug Lets Remote Users Gain Unauthorized Access...

  8. U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access U-010:HP Onboard Administrator Unspecified Flaw Lets Remote Users Gain Access October 13, 2011 - 8:15am...

  9. V-127: Samba Bug Lets Remote Authenticated Users Modify Files...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was...

  10. River Turbine Provides Clean Energy to Remote Alaskan Village...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    River Turbine Provides Clean Energy to Remote Alaskan Village River Turbine Provides Clean Energy to Remote Alaskan Village August 18, 2015 - 10:36am Addthis River Turbine Provides ...

  11. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code March 10, 2011 - 3:05pm Addthis...

  12. User Guide Remote Access to VDI/Workplace Using PIV

    Broader source: Energy.gov (indexed) [DOE]

    ......... 3 1.1 Web Browsers ......with remote PIV with VDI. 1.1 Web Browsers Browser Version Functions with ...

  13. Analysis of Bright Harvest Remote Analysis for Residential Solar Installations

    SciTech Connect (OSTI)

    Nangle, John; Simon, Joseph

    2015-06-17

    Bright Harvest provides remote shading analysis and design products for residential PV system installers. The National Renewable Energy Laboratory (NREL) through the NREL Commercialization Assistance Program, completed comparative assessments between on-site measurements and remotely calculated values to validate the accuracy of Bright Harvest’s remote shading and power generation.

  14. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent...

  15. U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

  16. U-195: PHPlist Input Validation Flaws Permit Cross-Site Scripting and SQL Injection Attacks

    Broader source: Energy.gov [DOE]

    The 'public_html/lists/admin' pages do not properly validate user-supplied input in the 'sortby' parameter [CVE-2012-2740]. A remote authenticated administrative user can supply a specially crafted parameter value to execute SQL commands on the underlying database.

  17. Small geothermal electric systems for remote powering

    SciTech Connect (OSTI)

    Entingh, Daniel J.; Easwaran, Eyob.; McLarty, Lynn

    1994-08-08

    This report describes conditions and costs at which quite small (100 to 1,000 kilowatt) geothermal systems could be used for off-grid powering at remote locations. This is a first step in a larger process of determining locations and conditions at which markets for such systems could be developed. The results suggest that small geothermal systems offer substantial economic and environmental advantages for powering off-grid towns and villages. Geothermal power is most likely to be economic if the system size is 300 kW or greater, down to reservoir temperatures of 100{degree}C. For system sizes smaller than 300 kW, the economics can be favorable if the reservoir temperature is about 120{degree}C or above. Important markets include sites remote from grids in many developing and developed countries. Estimates of geothermal resources in many developing countries are shown.

  18. Self-referencing remote optical probe

    DOE Patents [OSTI]

    O'Rourke, P.E.; Prather, W.S.; Livingston, R.R.

    1991-08-13

    A probe is described for remote spectrometric measurements of fluid samples having a hollow probe body with a sliding reflective plug therein and a lens at one end, ports for admitting and expelling the fluid sample and a means for moving the reflector so that reference measurement can be made with the reflector in a first position near the lens and a sample measurement can be made with the reflector away from the lens and the fluid sample between the reflector and the lens. Comparison of the two measurements will yield the composition of the fluid sample. The probe is preferably used for remote measurements and light is carried to and from the probe via fiber optic cables. 3 figures.

  19. Self-referencing remote optical probe

    DOE Patents [OSTI]

    O'Rourke, Patrick E.; Prather, William S.; Livingston, Ronald R.

    1991-01-01

    A probe for remote spectrometric measurements of fluid samples having a hollow probe body with a sliding reflective plug therein and a lens at one end, ports for admitting and expelling the fluid sample and a means for moving the reflector so that reference measurement can be made with the reflector in a first position near the lens and a sample measurement can be made with the reflector away from the lens and the fluid sample between the reflector and the lens. Comparison of the two measurements will yield the composition of the fluid sample. The probe is preferably used for remote measurements and light is carried to and from the probe via fiber optic cables.

  20. System for remote control of underground device

    DOE Patents [OSTI]

    Brumleve, T.D.; Hicks, M.G.; Jones, M.O.

    1975-10-21

    A system is described for remote control of an underground device, particularly a nuclear explosive. The system includes means at the surface of the ground for transmitting a seismic signal sequence through the earth having controlled and predetermined signal characteristics for initiating a selected action in the device. Additional apparatus, located with or adjacent to the underground device, produces electrical signals in response to the seismic signals received and compares these electrical signals with the predetermined signal characteristics.

  1. Remote controlled vacuum joint closure mechanism

    DOE Patents [OSTI]

    Doll, David W. (San Diego, CA); Hager, E. Randolph (La Jolla, CA)

    1986-01-01

    A remotely operable and maintainable vacuum joint closure mechanism for a noncircular aperture is disclosed. The closure mechanism includes an extendible bellows coupled at one end to a noncircular duct and at its other end to a flange assembly having sealed grooves for establishing a high vacuum seal with the abutting surface of a facing flange which includes an aperture forming part of the system to be evacuated. A plurality of generally linear arrangements of pivotally coupled linkages and piston combinations are mounted around the outer surface of the duct and aligned along the length thereof. Each of the piston/linkage assemblies is adapted to engage the flange assembly by means of a respective piston and is further coupled to a remote controlled piston drive shaft to permit each of the linkages positioned on a respective flat outer surface of the duct to simultaneously and uniformly displace a corresponding piston and the flange assembly with which it is in contact along the length of the duct in extending the bellows to provide a high vacuum seal between the movable flange and the facing flange. A plurality of latch mechanisms are also pivotally mounted on the outside of the duct. A first end of each of the latch mechanisms is coupled to a remotely controlled latch control shaft for displacing the latch mechanism about its pivot point. In response to the pivoting displacement of the latch mechanism, a second end thereof is displaced so as to securely engage the facing flange.

  2. A remotely operated robot for decontamination tasks

    SciTech Connect (OSTI)

    Dudar, A.M.; Vandewalle, R.C.

    1994-02-01

    Engineers in the Robotics Development Group at the Westinghouse Savannah River Company (WSRC) have developed a robot which will be used to decontaminate a pipe gallery of a tank farm used for nuclear waste storage. Personnel access is required into this pipe gallery to inspect existing pipes and perform repairs to secondary containment walls around the tank farm. Presently, the pipe gallery is littered with debris of various sizes and its surface is contaminated with activity levels up to 2.5E6 DPM (disintegrations per minute) alpha and exposure levels as high as 20 Rad/hr. Cleaning up this pipe gallery win be the mission of an all-hydraulic robotic vehicle developed in-house at WSRC caged the ``Remote Decon`` robot. The Remote Decon is a tracked vehicle which utilizes skid steering and features a six-degree-of-freedom (DOF) manipulator arm, a five-DOF front end loader type bucket with a rotating brush for scrubbing and decontaminating surfaces, and a three-DOF pan/tilt mechanism with cameras and lights. The Remote Decon system is connected to a control console via a 200 foot tethered cable. The control console was designed with ergonomics and simplicity as the main design factors and features three joysticks, video monitors, LED panels, and audible alarms.

  3. Using GIS technology to manage information following a bio-terrorism attack.

    SciTech Connect (OSTI)

    Melton, Brad; Ramsey, James L., Jr.; Finley, Patrick

    2005-05-01

    The BROOM system was developed to collect, manage and analyze information from bioterrorist attacks on strategic buildings. GIS features help decision-makers and analysts rapidly assess the current status of contaminated facilities and develop optimized cleanup strategies. BROOM consists of networked server, desktop and PDA components. PDAs are deployed to collect samples of suspected bioagents, such as anthrax. Novel geostatistical methods are used to generate contaminant maps and define optimum locations for subsequent sampling. Efficiency and accuracy gains witnessed in field tests show that GIS technology can play a vital role in visualizing, managing and analyzing data from bioterrorism incidents.

  4. ALSO: BUILDING A BETTER MICROSYSTEM SPRAY IT AGAIN, SAM VR Tool Helps Prepare for Terrorist Attacks

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1999 - 2000 ALSO: BUILDING A BETTER MICROSYSTEM SPRAY IT AGAIN, SAM VR Tool Helps Prepare for Terrorist Attacks A QUARTERLY RESEARCH & DEVELOPMENT JOURNAL VOLUME 1, NO. 4 Z MACHINE Providing Clues to Astronomical Mysteries S A N D I A T E C H N O L O G Y [ From atop a 25-foot ladder, Sandian Larry Shipers examines a pair of cameras that provide feedback to a computer system that controls Sandia's automated painting system for the F-117 Nighthawk, also known as Stealth. The system sprays a

  5. Higher coronary heart disease and heart attack morbidity in Appalachian coal mining regions

    SciTech Connect (OSTI)

    Hendryx, M.; Zullig, K.J.

    2009-11-15

    This study analyzes the U.S. 2006 Behavioral Risk Factor Surveillance System survey data (N = 235,783) to test whether self-reported cardiovascular disease rates are higher in Appalachian coal mining counties compared to other counties after control for other risks. Dependent variables include self-reported measures of ever (1) being diagnosed with cardiovascular disease (CVD) or with a specific form of CVD including (2) stroke, (3) heart attack, or (4) angina or coronary heart disease (CHD). Independent variables included coal mining, smoking, BMI, drinking, physician supply, diabetes co-morbidity, age, race/ethnicity, education, income, and others. SUDAAN Multilog models were estimated, and odds ratios tested for coal mining effects. After control for covariates, people in Appalachian coal mining areas reported significantly higher risk of CVD (OR = 1.22, 95% CI = 1.14-1.30), angina or CHO (OR = 1.29, 95% C1 = 1.19-1.39) and heart attack (OR = 1.19, 95% C1 = 1.10-1.30). Effects were present for both men and women. Cardiovascular diseases have been linked to both air and water contamination in ways consistent with toxicants found in coal and coal processing. Future research is indicated to assess air and water quality in coal mining communities in Appalachia, with corresponding environmental programs and standards established as indicated.

  6. Risk-based decision making for staggered bioterrorist attacks : resource allocation and risk reduction in "reload" scenarios.

    SciTech Connect (OSTI)

    Lemaster, Michelle Nicole; Gay, David M.; Ehlen, Mark Andrew; Boggs, Paul T.; Ray, Jaideep

    2009-10-01

    Staggered bioterrorist attacks with aerosolized pathogens on population centers present a formidable challenge to resource allocation and response planning. The response and planning will commence immediately after the detection of the first attack and with no or little information of the second attack. In this report, we outline a method by which resource allocation may be performed. It involves probabilistic reconstruction of the bioterrorist attack from partial observations of the outbreak, followed by an optimization-under-uncertainty approach to perform resource allocations. We consider both single-site and time-staggered multi-site attacks (i.e., a reload scenario) under conditions when resources (personnel and equipment which are difficult to gather and transport) are insufficient. Both communicable (plague) and non-communicable diseases (anthrax) are addressed, and we also consider cases when the data, the time-series of people reporting with symptoms, are confounded with a reporting delay. We demonstrate how our approach develops allocations profiles that have the potential to reduce the probability of an extremely adverse outcome in exchange for a more certain, but less adverse outcome. We explore the effect of placing limits on daily allocations. Further, since our method is data-driven, the resource allocation progressively improves as more data becomes available.

  7. Remote controlled vacuum joint closure mechanism

    DOE Patents [OSTI]

    Doll, D.W.; Hager, E.R.

    1984-02-22

    A remotely operable and maintainable vacuum joint closure mechanism for a noncircular aperture is disclosed. The closure mechanism includes an extendible bellows coupled at one end to a noncircular duct and at its other end to a flange assembly having sealed grooves for establishing a high vacuum seal with the abutting surface of a facing flange which includes an aperture forming part of the system to be evacuated. A plurality of generally linear arrangements of pivotally coupled linkages and piston combinations are mounted around the outer surface of the duct and aligned along the length thereof. Each of the piston/linkage assemblies is adapted to engage the flange assembly by means of a respective piston and is further coupled to a remote controlled piston drive shaft to permit each of the linkages positioned on a respective flat outer surface of the duct to simultaneously and uniformly displace a corresponding piston and the flange assembly with which it is in contact along the length of the duct in extending the bellows to provide a high vacuum seal between the movable flange and the facing flange. A plurality of latch mechanisms are also pivotally mounted on the outside of the duct. A first end of each of the latch mechanisms is coupled to a remotely controlled latch control shaft for displacing the latch mechanism about its pivot point. In response to the pivoting displacement of the latch mechanism, a second end thereof is displaced so as to securely engage the facing flange and maintain the high vacuum seal established by the displacement of the flange assembly and extension of the bellows without displacing the entire duct.

  8. PV Charging System for Remote Area Operations

    SciTech Connect (OSTI)

    Ilsemann, Frederick; Thompson, Roger

    2008-07-31

    The objective of this project is to provide the public with a study of new as well existing technology to recharge batteries used in the field. A new product(s) will also be built based upon the information ascertained. American Electric Vehicles, Inc. (AEV) developed systems and methods suitable for charging state-of-the-art lithium-ion batteries in remote locations under both ideal and cloudy weather conditions. Conceptual designs are described for existing and next generation technology, particularly as regards solar cells, peak power trackers and batteries. Prototype system tests are reported.

  9. Cathodic protection of a remote river pipeline

    SciTech Connect (OSTI)

    Martin, B.A. )

    1994-03-01

    The 261-km long 500-mm diam Kutubu pipeline, which runs through dense jungle swamps in Papua, New Guinea, was built for Chevron Niugini to transport oil from the remote Kutubu oil production facility in the Southern Highlands to an offshore loading facility. The pipeline was laid with a section in the bed of a wide, fast-flowing river. This section was subject to substantial telluric effects and current density variations from changing water resistivities. The cathodic protection system's effectiveness was monitored by coupon off'' potentials and required an innovative approach.

  10. REMOTE AREA RADIATION MONITORING (RARM) ALTERNATIVES ANALYSIS

    SciTech Connect (OSTI)

    NELSON RL

    2008-07-18

    The Remote Area Radiation Monitoring (RARM) system will be used to provide real-time radiation monitoring information to the operations personnel during tank retrieval and transfer operations. The primary focus of the system is to detect potential anomalous (waste leaks) or transient radiological conditions. This system will provide mobile, real-time radiological monitoring, data logging, and status at pre-selected strategic points along the waste transfer route during tank retrieval operations. The system will provide early detection and response capabilities for the Retrieval and Closure Operations organization and Radiological Control personnel.

  11. Implantable, remotely-programmable insulin infusion system

    SciTech Connect (OSTI)

    Carlson, G.A.; Bair, R.E.; Gaona, J.I. Jr.; Love, J.T.; Urenda, R.S.

    1981-10-01

    An implantable, remotely-programmable insulin infusion system is described which has a mass of 280 grams and an implanted lifetime exceeding two years. The system uses a rotary solenoid-driven peristaltic pump controlled by low power CMOS timing circuitry which provides bimodal insulin delivery. Fifteen low rates from 0.39 to 5.9 units/hour and 15 high doses from 0.84 to 12.5 units are available using U100 insulin. The system has been tested in the laboratory, evaluated in diabetic dogs, and implanted in one diabetic human.

  12. Remote vacuum compaction of compressible hazardous waste

    DOE Patents [OSTI]

    Coyne, M.J.; Fiscus, G.M.; Sammel, A.G.

    1998-10-06

    A system is described for remote vacuum compaction and containment of low-level radioactive or hazardous waste comprising a vacuum source, a sealable first flexible container, and a sealable outer flexible container for receiving one or more first flexible containers. A method for compacting low level radioactive or hazardous waste materials at the point of generation comprising the steps of sealing the waste in a first flexible container, sealing one or more first containers within an outer flexible container, breaching the integrity of the first containers, evacuating the air from the inner and outer containers, and sealing the outer container shut. 8 figs.

  13. Remote vacuum compaction of compressible hazardous waste

    DOE Patents [OSTI]

    Coyne, Martin J.; Fiscus, Gregory M.; Sammel, Alfred G.

    1998-01-01

    A system for remote vacuum compaction and containment of low-level radioactive or hazardous waste comprising a vacuum source, a sealable first flexible container, and a sealable outer flexible container for receiving one or more first flexible containers. A method for compacting low level radioactive or hazardous waste materials at the point of generation comprising the steps of sealing the waste in a first flexible container, sealing one or more first containers within an outer flexible container, breaching the integrity of the first containers, evacuating the air from the inner and outer containers, and sealing the outer container shut.

  14. High aspect ratio, remote controlled pumping assembly

    DOE Patents [OSTI]

    Brown, S.B.; Milanovich, F.P.

    1995-11-14

    A miniature dual syringe-type pump assembly is described which has a high aspect ratio and which is remotely controlled, for use such as in a small diameter penetrometer cone or well packer used in water contamination applications. The pump assembly may be used to supply and remove a reagent to a water contamination sensor, for example, and includes a motor, gearhead and motor encoder assembly for turning a drive screw for an actuator which provides pushing on one syringe and pulling on the other syringe for injecting new reagent and withdrawing used reagent from an associated sensor. 4 figs.

  15. High aspect ratio, remote controlled pumping assembly

    DOE Patents [OSTI]

    Brown, Steve B.; Milanovich, Fred P.

    1995-01-01

    A miniature dual syringe-type pump assembly which has a high aspect ratio and which is remotely controlled, for use such as in a small diameter penetrometer cone or well packer used in water contamination applications. The pump assembly may be used to supply and remove a reagent to a water contamination sensor, for example, and includes a motor, gearhead and motor encoder assembly for turning a drive screw for an actuator which provides pushing on one syringe and pulling on the other syringe for injecting new reagent and withdrawing used reagent from an associated sensor.

  16. Remote Alaska Communities Energy Efficiency (RACEE) Competition Fact Sheet

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    15 Remote Alaska Communities Energy Efficiency (RACEE) Competition Fact Sheet Background Remote Alaskan communities face a number of unique energy challenges, with the harsh climate and isolation combining to drive up energy costs. The remote locations, in many cases only reached by air or boat, add significant costs to any fuel imported to the communities which on the average are nearly double the medium amount spent throughout the United States, according to the U. S. Energy Information

  17. Remote Alaskan Communities Energy Efficiency Competition | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Remote Alaskan Communities Energy Efficiency Competition Remote Alaskan Communities Energy Efficiency Competition February 2, 2016 5:00PM EST DOE Office of Indian Energy and Office of Energy Efficiency and Renewable Energy The U.S. Department of Energy's (DOE's) Office of Indian Energy and Office of Energy Efficiency and Renewable Energy (EERE) have issued a Notice of Technical Assistance (NOTA) to significantly accelerate efforts by remote Alaskan communities to adopt sustainable

  18. Research Call Issued for Design Support Tool for Remote Microgrids |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Research Call Issued for Design Support Tool for Remote Microgrids Research Call Issued for Design Support Tool for Remote Microgrids May 18, 2015 - 1:54pm Addthis DOE's National Energy Technology Laboratory (NETL), on behalf of the Office of Electricity Delivery and Energy Reliability, has issued a research call for proposals for a "Design Support Tool for Remote Off-grid Microgrids" which facilitates the design of microgrids that encompass mixes of generation

  19. FACT SHEET: Remote Alaska Communities Energy Efficiency (RACEE) Competition

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy FACT SHEET: Remote Alaska Communities Energy Efficiency (RACEE) Competition FACT SHEET: Remote Alaska Communities Energy Efficiency (RACEE) Competition The Remote Alaska Communities Energy Efficiency Competition will empower Alaskan communities and native Alaskan villages to develop effective tools to advance the use of reliable, affordable, and energy efficient solutions that are replicable throughout Alaska and other Arctic regions. Download the fact sheet below for

  20. Remote Alaskan Communities Energy Efficiency Competition Social Media Kit |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Remote Alaskan Communities Energy Efficiency Competition Social Media Kit Remote Alaskan Communities Energy Efficiency Competition Social Media Kit Alaska Stakeholders-Below you will find some pre-written Facebook post suggestions for getting the word out about the Remote Alaskan Communities Energy Efficiency Competition to communities. Please check back throughout the month for more updates. RACEE Facebook Posts svs.docx (14.11 KB) More Documents & Publications FACT

  1. Evaporation — a key mechanism for the thaumasite form of sulfate attack

    SciTech Connect (OSTI)

    Mittermayr, Florian; Baldermann, Andre; Kurta, Christoph; Klammer, Dietmar; Leis, Albrecht; Dietzel, Martin

    2013-07-15

    Understanding the mechanisms leading to chemical attack on concrete is crucial in order to prevent damage of concrete structures. To date, most studies on sulfate attack and thaumasite formation are based on empirical approaches, as the identification of associated reaction mechanisms and paths is known to be highly complex. In this study, sulfate damaged concrete from Austrian tunnels was investigated by mineralogical, chemical and isotope methods to identify the reactions which caused intense concrete alteration. Major, minor and trace elemental contents as well as isotope ratios of local ground water (GW), drainage water (DW) and interstitial solutions (IS), extracted from damaged concrete material, were analyzed. Locally occurring GW contained 3 to 545 mg L{sup −1} of SO{sub 4} and is thus regarded as slightly aggressive to concrete in accordance to standard specifications (e.g. DIN EN 206-1). The concrete linings and drainage systems of the studied tunnels, however, have partly suffered from intensive sulfate attack. Heavily damaged concrete consisted mainly of thaumasite, secondary calcite, gypsum, and relicts of aggregates. Surprisingly, the concentrations of dissolved ions were extremely enriched in the IS with up to 30,000 and 12,000 mg L{sup −1} of SO{sub 4} and Cl, respectively. Analyses of aqueous ions with a highly conservative behavior, e.g. K, Rb and Li, as well as {sup 2}H/H and {sup 18}O/{sup 16}O isotope ratios of H{sub 2}O of the IS showed an intensive accumulation of ions and discrimination of the light isotopes vs. the GW. These isotope signals of the IS clearly revealed evaporation at distinct relative humidities. From ion accumulation and isotope fractionation individual total and current evaporation degrees were estimated. Our combined elemental and isotopic approach verified wetting–drying cycles within a highly dynamic concrete-solution-atmosphere system. Based on these boundary conditions, key factors controlling thaumasite

  2. WIPP Receives First Remote-Handled Waste Shipment From Sandia...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    For immediate release WIPP Receives First Remote-Handled Waste Shipment From Sandia Labs ... (RH-TRU) waste shipments from Sandia National Laboratories (SNL) in Albuquerque. ...

  3. Active and Passive Remote Sensing Diagram | Open Energy Information

    Open Energy Info (EERE)

    Active and Passive Remote Sensing Diagram Author National Aeronautics and Space Administration Published Nasa.gov, 2013 DOI Not Provided Check for DOI availability: http:...

  4. Remote System for Characterizing, Monitoring and Inspecting the...

    Office of Scientific and Technical Information (OSTI)

    Monitoring and Inspecting the Inside of Contaminated Nuclear Stacks Citation Details In-Document Search Title: Remote System for Characterizing, Monitoring and ...

  5. Special Section Guest Editorial. Advances in Remote Sensing for...

    Office of Scientific and Technical Information (OSTI)

    Sensing for Monitoring Global Environmental Changes Citation Details In-Document Search Title: Special Section Guest Editorial. Advances in Remote Sensing for Monitoring Global ...

  6. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port 8443 to access administrative resources and gain administrative privileges....

  7. U-137: HP Performance Manager Unspecified Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    vulnerability has been identified with HP Performance Manager running on HP-UX, Linux, Solaris, and Windows. The vulnerability could be exploited remotely to execute...

  8. Testing a Cloud Condensation Nuclei Remote Sensing Method

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a Cloud Condensation Nuclei Remote Sensing Method S. J. Ghan Climate Physics Pacific Northwest National Laboratory Richland, Washington D. R. Collin Department of Atmospheric...

  9. An Integrated Mapping And Remote Sensing Investigation Of The...

    Open Energy Info (EERE)

    Mapping And Remote Sensing Investigation Of The Structural Control For Fumarole Location In The Eburru Volcanic Complex, Kenya Rift Jump to: navigation, search OpenEI Reference...

  10. Gas Cleaning for Remote Solid Oxide Fuel Cell (SOFC) Applications

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    up for Fuel Cell Applications, Argonne National Lab Fuel (NG, LPG, LFG, ADG, APG, biodiesel) opportunities and impurity issues Gas Cleaning for Remote SOFC Applications Acumentrics ...

  11. Remote Duct Sealing in Residential and Commercial Buildings:...

    Broader source: Energy.gov (indexed) [DOE]

    Remote Duct Sealing in Residential and Commercial Buildings: "Saving Money, Saving Energy and Improving Performance" Lawrence Berkeley National Laboratory Presented by Dr. Mark ...

  12. Remote Duct Sealing in Residential and Commercial Buildings ...

    Broader source: Energy.gov (indexed) [DOE]

    Remote Duct Sealing in Residential and Commercial Buildings: "Saving Money, Saving Energy and Improving Performance," Lawrence Berkeley National Laboratory, presented by Dr. Mark ...

  13. Posters Toward an Operational Water Vapor Remote Sensing System...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 Posters Toward an Operational Water Vapor Remote Sensing System Using the Global ... T. Van Hove and C. Rocken University Navstar Consortium Boulder, Colorado Background Water ...

  14. Solar Energy Prospecting in Remote Alaska: An Economic Analysis...

    Broader source: Energy.gov (indexed) [DOE]

    Solar Energy Prospecting in Remote Alaska An Economic Analysis of Solar Photovoltaics in the Last Frontier State by Paul Schwabe, National Renewable Energy Laboratory U.S. ...

  15. Method of determining forest production from remotely sensed forest parameters

    DOE Patents [OSTI]

    Corey, J.C.; Mackey, H.E. Jr.

    1987-08-31

    A method of determining forest production entirely from remotely sensed data in which remotely sensed multispectral scanner (MSS) data on forest 5 composition is combined with remotely sensed radar imaging data on forest stand biophysical parameters to provide a measure of forest production. A high correlation has been found to exist between the remotely sensed radar imaging data and on site measurements of biophysical 10 parameters such as stand height, diameter at breast height, total tree height, mean area per tree, and timber stand volume.

  16. Remote interactive direct volume rendering of AMR data (Conference...

    Office of Scientific and Technical Information (OSTI)

    Conference: Remote interactive direct volume rendering of AMR data Citation Details ... Sponsoring Org: USDOE Director, Office of Science. Office of Advanced Scientific Computing ...

  17. Remote interactive direct volume rendering of AMR data (Conference...

    Office of Scientific and Technical Information (OSTI)

    Conference: Remote interactive direct volume rendering of AMR data Citation Details ... Visit OSTI to utilize additional information resources in energy science and technology. A ...

  18. Estimation of the relationship between remotely sensed anthropogenic...

    Office of Scientific and Technical Information (OSTI)

    of Indianapolis, Indiana, USA. Anthropogenic heat discharge was estimated based on a remote sensing-based surface energy balance model, which was parameterized using land ...

  19. U-277: Google Chrome Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addthis PROBLEM: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code PLATFORM: Version(s): prior to 22.0.1229.92 ABSTRACT: Several vulnerabilities were...

  20. Energy Department Announces Request for Information on the Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    goals and activities of the initiative are relevant to remote, rural Alaskan communities. ... "Maximizing the development and deployment of scalable clean energy solutions that address ...

  1. System and method for controlling remote devices

    DOE Patents [OSTI]

    Carrender, Curtis Lee; Gilbert, Ronald W.; Scott, Jeff W.; Clark, David A.

    2006-02-07

    A system and method for controlling remote devices utilizing a radio frequency identification (RFID) tag device having a control circuit adapted to render the tag device, and associated objects, permanently inoperable in response to radio-frequency control signals. The control circuit is configured to receive the control signals that can include an enable signal, and in response thereto enable an associated object, such as a weapon; and in response to a disable signal, to disable the tag itself, or, if desired, to disable the associated weapon or both the device and the weapon. Permanent disabling of the tag can be accomplished by several methods, including, but not limited to, fusing a fusable link, breaking an electrically conductive path, permanently altering the modulation or backscattering characteristics of the antenna circuit, and permanently erasing an associated memory. In this manner, tags in the possession of unauthorized employees can be remotely disabled, and weapons lost on a battlefield can be easily tracked and enabled or disabled automatically or at will.

  2. Remote control for anode-cathode adjustment

    DOE Patents [OSTI]

    Roose, Lars D.

    1991-01-01

    An apparatus for remotely adjusting the anode-cathode gap in a pulse power machine has an electric motor located within a hollow cathode inside the vacuum chamber of the pulse power machine. Input information for controlling the motor for adjusting the anode-cathode gap is fed into the apparatus using optical waveguides. The motor, controlled by the input information, drives a worm gear that moves a cathode tip. When the motor drives in one rotational direction, the cathode is moved toward the anode and the size of the anode-cathode gap is diminished. When the motor drives in the other direction, the cathode is moved away from the anode and the size of the anode-cathode gap is increased. The motor is powered by batteries housed in the hollow cathode. The batteries may be rechargeable, and they may be recharged by a photovoltaic cell in combination with an optical waveguide that receives recharging energy from outside the hollow cathode. Alternatively, the anode-cathode gap can be remotely adjusted by a manually-turned handle connected to mechanical linkage which is connected to a jack assembly. The jack assembly converts rotational motion of the handle and mechanical linkage to linear motion of the cathode moving toward or away from the anode.

  3. Remote measurement of corrosion using ultrasonic techniques

    SciTech Connect (OSTI)

    Garcia, K.M.; Porter, A.M.

    1995-02-01

    Supercritical water oxidation (SCWO) technology has the potential of meeting the US Department of Energy`s treatment requirements for mixed radioactive waste. A major technical constraint of the SCWO process is corrosion. Safe operation of a pilot plant requires monitoring of the corrosion rate of the materials of construction. A method is needed for measurement of the corrosion rate taking place during operation. One approach is to directly measure the change in wall thickness or growth of oxide layer at critical points in the SCWO process. In FY-93, a brief survey of the industry was performed to evaluate nondestructive evaluation (NDE) methods for remote corrosion monitoring in supercritical vessels. As a result of this survey, it was determined that ultrasonic testing (UT) methods would be the most cost-effective and suitable method of achieving this. Therefore, the objective for FY-94 was to prove the feasibility of using UT to monitor corrosion of supercritical vessels remotely during operation without removal of the insulation.

  4. Methodology for determining the intent of a limited nuclear attack. Master's thesis

    SciTech Connect (OSTI)

    Bivins, R.L.

    1987-05-01

    The purpose of this study was to develop a methodology for determining the intent of a limited nuclear attack. An investigation of possible methodologies for determining intent lead to research in Bayesian analysis. It was thought that the answer to intent could be found by taking prior beliefs of the decision maker and then using the Bayes Theorem to update those beliefs with ground-bases radar information obtained over time. Unfortunately, the use of Bayesian analysis as proposed here did not prove to be robust when the radar information is inaccurate. The reason for the inability of the proposed methodology to perform under the inaccurate radar parameters is that ignores too many of the complicating issues in determining intent.

  5. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates

    Broader source: Energy.gov [DOE]

    A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases.

  6. Conceptual design analyses for Hanford Site deployable remote spectroscopy systems

    SciTech Connect (OSTI)

    Philipp, B.L.; Reich, F.R.

    1994-09-01

    This document identifies potential remote, NIR spectroscopic waste surface moisture monitoring system design alternatives to be operated inside one of the Hanford Site, high level, nuclear waste storage tanks. Potential tank waste moisture data impacts from the remote NIR signal transfer through high humidity vapor space is evaluated.

  7. Remote direct memory access over datagrams

    SciTech Connect (OSTI)

    Grant, Ryan Eric; Rashti, Mohammad Javad; Balaji, Pavan; Afsahi, Ahmad

    2014-12-02

    A communication stack for providing remote direct memory access (RDMA) over a datagram network is disclosed. The communication stack has a user level interface configured to accept datagram related input and communicate with an RDMA enabled network interface card (NIC) via an NIC driver. The communication stack also has an RDMA protocol layer configured to supply one or more data transfer primitives for the datagram related input of the user level. The communication stack further has a direct data placement (DDP) layer configured to transfer the datagram related input from a user storage to a transport layer based on the one or more data transfer primitives by way of a lower layer protocol (LLP) over the datagram network.

  8. Remote shock sensing and notification system

    DOE Patents [OSTI]

    Muralidharan, Govindarajan [Knoxville, TN; Britton, Charles L [Alcoa, TN; Pearce, James [Lenoir City, TN; Jagadish, Usha [Knoxville, TN; Sikka, Vinod K [Oak Ridge, TN

    2010-11-02

    A low-power shock sensing system includes at least one shock sensor physically coupled to a chemical storage tank to be monitored for impacts, and an RF transmitter which is in a low-power idle state in the absence of a triggering signal. The system includes interface circuitry including or activated by the shock sensor, wherein an output of the interface circuitry is coupled to an input of the RF transmitter. The interface circuitry triggers the RF transmitter with the triggering signal to transmit an alarm message to at least one remote location when the sensor senses a shock greater than a predetermined threshold. In one embodiment the shock sensor is a shock switch which provides an open and a closed state, the open state being a low power idle state.

  9. Remote shock sensing and notification system

    DOE Patents [OSTI]

    Muralidharan, Govindarajan; Britton, Charles L.; Pearce, James; Jagadish, Usha; Sikka, Vinod K.

    2008-11-11

    A low-power shock sensing system includes at least one shock sensor physically coupled to a chemical storage tank to be monitored for impacts, and an RF transmitter which is in a low-power idle state in the absence of a triggering signal. The system includes interference circuitry including or activated by the shock sensor, wherein an output of the interface circuitry is coupled to an input of the RF transmitter. The interface circuitry triggers the RF transmitting with the triggering signal to transmit an alarm message to at least one remote location when the sensor senses a shock greater than a predetermined threshold. In one embodiment the shock sensor is a shock switch which provides an open and a closed state, the open state being a low power idle state.

  10. Remote adjustable focus Raman spectroscopy probe

    DOE Patents [OSTI]

    Schmucker, John E.; Blasi, Raymond J.; Archer, William B.

    1999-01-01

    A remote adjustable focus Raman spectroscopy probe allows for analyzing Raman scattered light from a point of interest external probe. An environmental barrier including at least one window separates the probe from the point of interest. An optical tube is disposed adjacent to the environmental barrier and includes a long working length compound lens objective next to the window. A beam splitter and a mirror are at the other end. A mechanical means is used to translated the prove body in the X, Y, and Z directions resulting in a variable focus optical apparatus. Laser light is reflected by the beam splitter and directed toward the compound lens objective, then through the window and focused on the point of interest. Raman scattered light is then collected by the compound lens objective and directed through the beam splitter to a mirror. A device for analyzing the light, such as a monochrometer, is coupled to the mirror.

  11. Interactive computer-enhanced remote viewing system

    SciTech Connect (OSTI)

    Tourtellott, J.A.; Wagner, J.F.

    1995-10-01

    Remediation activities such as decontamination and decommissioning (D&D) typically involve materials and activities hazardous to humans. Robots are an attractive way to conduct such remediation, but for efficiency they need a good three-dimensional (3-D) computer model of the task space where they are to function. This model can be created from engineering plans and architectural drawings and from empirical data gathered by various sensors at the site. The model is used to plan robotic tasks and verify that selected paths are clear of obstacles. This report describes the development of an Interactive Computer-Enhanced Remote Viewing System (ICERVS), a software system to provide a reliable geometric description of a robotic task space, and enable robotic remediation to be conducted more effectively and more economically.

  12. Method to analyze remotely sensed spectral data

    DOE Patents [OSTI]

    Stork, Christopher L.; Van Benthem, Mark H.

    2009-02-17

    A fast and rigorous multivariate curve resolution (MCR) algorithm is applied to remotely sensed spectral data. The algorithm is applicable in the solar-reflective spectral region, comprising the visible to the shortwave infrared (ranging from approximately 0.4 to 2.5 .mu.m), midwave infrared, and thermal emission spectral region, comprising the thermal infrared (ranging from approximately 8 to 15 .mu.m). For example, employing minimal a priori knowledge, notably non-negativity constraints on the extracted endmember profiles and a constant abundance constraint for the atmospheric upwelling component, MCR can be used to successfully compensate thermal infrared hyperspectral images for atmospheric upwelling and, thereby, transmittance effects. Further, MCR can accurately estimate the relative spectral absorption coefficients and thermal contrast distribution of a gas plume component near the minimum detectable quantity.

  13. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic...

    Office of Environmental Management (EM)

    59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSLTLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL...

  14. Intergranular attack and stress corrosion cracking of Alloy 600 in high-temperature caustic solutions containing contaminants

    SciTech Connect (OSTI)

    Bandy, R.; Roberge, R.; van Rooyen, D.

    1985-06-01

    Concentrated caustic is a primary cause of stress corrosion cracking and intergranular attack of Alloy 600 tubing in PWRs. However, temperature, electrochemical potential, stress, and metallurgical state all play a role. This study provides the quantitative evidence needed to develop models of crack growth and to devise effective countermeasures.

  15. Final report : impacts analysis for cyber attack on electric power systems (national SCADA test bed FY09).

    SciTech Connect (OSTI)

    Stamp, Jason Edwin; LaViolette, Randall A.; Gardiner, Judith D.

    2009-09-01

    The development continues for Finite State Abstraction (FSA) methods to enable Impacts Analysis (IA) for cyber attack against power grid control systems. Building upon previous work, we successfully demonstrated the addition of Bounded Model Checking (BMC) to the FSA method, which constrains grid conditions to reasonable behavior. The new FSA feature was successfully implemented and tested. FSA is an important part of IA for the power grid, complementing steady-state approaches. It enables the simultaneous evaluation of myriad dynamic trajectories for the system, which in turn facilitates IA for whole ranges of system conditions simultaneously. Given the potentially wide range and subtle nature of potential control system attacks, this is a promising research approach. In this report, we will explain the addition of BMC to the previous FSA work and some testing/simulation upon the implemented code using a two-bus test system. The current FSA approach and code allow the calculation of the acceptability of power grid conditions post-cyber attack (over a given time horizon and for a specific grid topology). Future work will enable analysis spanning various topologies (to account for switching events), as well as an understanding of the cyber attack stimuli that can lead to undesirable grid conditions.

  16. User Guide for Remote Access to VDI/Workplace Using PIV | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy User Guide for Remote Access to VDI/Workplace Using PIV User Guide for Remote Access to VDI/Workplace Using PIV User guide for remote access to VDI/Workplace using a PIV card . VDI_WP_PIV_Remote_Guide_Final.pdf (1.39 MB) More Documents & Publications User guide for remote access to VDI and Workplace using RSA token Remote Access Options Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA)

  17. V-006: CA ARCserve Backup Flaws Let Remote Users Execute Arbitrary Code and Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in CA ARCserve Backup. A remote user can execute arbitrary code on the target system. A remote user can cause denial of service conditions.

  18. U-005: Apache mod_proxy Pattern Matching Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers U-005: Apache modproxy Pattern Matching Bug Lets Remote Users Access Internal Servers October 6,...

  19. U-046: Apache mod_proxy/mod_rewrite Bug Lets Remote Users Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers U-046: Apache modproxymodrewrite Bug Lets Remote Users Access Internal Servers November 28, 2011 -...

  20. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code ...

  1. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN ...

  2. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive Resolvers V-172: ISC BIND RUNTIMECHECK Error Lets Remote Users Deny Service Against Recursive...

  3. Remote control of a scanning electron microscope aperture and gun alignment

    DOE Patents [OSTI]

    Cramer, Charles E.; Campchero, Robert J.

    2003-10-07

    This invention relates to a remote control system which through gear motors coupled to the scanning electron microscope (SEM) manual control knobs readily permits remote adjustments as necessary.

  4. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    LaserJet Printers Unspecified Flaw Lets Remote Users Update Firmware with Arbitrary Code U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information

  5. U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    1: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information U-241: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain...

  6. Remote I/O : fast access to distant storage.

    SciTech Connect (OSTI)

    Foster, I.; Kohr, D., Jr.; Krishnaiyer, R.; Mogill, J.

    1997-12-17

    As high-speed networks make it easier to use distributed resources, it becomes increasingly common that applications and their data are not colocated. Users have traditionally addressed this problem by manually staging data to and from remote computers. We argue instead for a new remote I/O paradigm in which programs use familiar parallel I/O interfaces to access remote file systems. In addition to simplifying remote execution, remote I/O can improve performance relative to staging by overlapping computation and data transfer or by reducing communication requirements. However, remote I/O also introduces new technical challenges in the areas of portability, performance, and integration with distributed computing systems. We propose techniques designed to address these challenges and describe a remote I/O library called RIO that we have developed to evaluate the effectiveness of these techniques. RIO addresses issues of portability by adopting the quasi-standard MPI-IO interface and by defining a RIO device and RIO server within the ADIO abstract I/O device architecture. It addresses performance issues by providing traditional I/O optimizations such as asynchronous operations and through implementation techniques such as buffering and message forwarding to off load communication overheads. RIO uses the Nexus communication library to obtain access to configuration and security mechanisms provided by the Globus wide area computing tool kit. Microbenchmarks and application experiments demonstrate that our techniques achieve acceptable performance in most situations and can improve turnaround time relative to staging.

  7. Remote handling facility and equipment used for space truss assembly

    SciTech Connect (OSTI)

    Burgess, T.W.

    1987-01-01

    The ACCESS truss remote handling experiments were performed at Oak Ridge National Laboratory's (ORNL's) Remote Operation and Maintenance Demonstration (ROMD) facility. The ROMD facility has been developed by the US Department of Energy's (DOE's) Consolidated Fuel Reprocessing Program to develop and demonstrate remote maintenance techniques for advanced nuclear fuel reprocessing equipment and other programs of national interest. The facility is a large-volume, high-bay area that encloses a complete, technologically advanced remote maintenance system that first began operation in FY 1982. The maintenance system consists of a full complement of teleoperated manipulators, manipulator transport systems, and overhead hoists that provide the capability of performing a large variety of remote handling tasks. This system has been used to demonstrate remote manipulation techniques for the DOE, the Power Reactor and Nuclear Fuel Development Corporation (PNC) of Japan, and the US Navy in addition to the National Aeronautics and Space Administration. ACCESS truss remote assembly was performed in the ROMD facility using the Central Research Laboratory's (CRL) model M-2 servomanipulator. The model M-2 is a dual-arm, bilateral force-reflecting, master/slave servomanipulator which was jointly developed by CRL and ORNL and represents the state of the art in teleoperated manipulators commercially available in the United States today. The model M-2 servomanipulator incorporates a distributed, microprocessor-based digital control system and was the first successful implementation of an entirely digitally controlled servomanipulator. The system has been in operation since FY 1983. 3 refs., 2 figs.

  8. Remote Chemical Sensing Using Quantum Cascade Lasers

    SciTech Connect (OSTI)

    Harper, Warren W.; Strasburg, Jana D.; Aker, Pam M.; Schultz, John F.

    2004-01-20

    Research done by the IR sensors team at PNNL is focused on developing advanced spectroscopic methods for detecting signatures of nuclear, chemical, biological and explosives weapons or weapons production. The sensors we develop fall into two categories: remote sensors that can be operated at distances ranging from 150 m to 10 km, and point sensors that are used for in-situ inspection and detection. FY03 has seen an explosion in FM DIAL progress with the net result being solid confirmation that FM DIAL is a technique capable of remote chemical monitoring in a wide variety of venues. For example, FM DIAL was used to detect a small plume of hydrogen sulfide, a candidate CW agent, released in the desert environment of the Hanford 200 Area site. These experiments were conducted over a range of physical conditions including outside temperatures ranging from 70 F to 105 F and turbulence conditions ranging from quiescent to chaotic. We are now rapidly developing the information needed to design prototype FM DIAL systems that are optimized for specific applications that include scenarios such as fixed position stand-off detection and mobile UAV mounted remote monitoring. Just as an example, in FY04 we will use FM DIAL to detect both in-facility and outdoor release of enriched UF6. The rapid progress in FM DIAL research made in FY03 is attributed to several advances. First, final construction of a custom-designed trailer allowed the instrument to be housed in a mobile temperature-controlled environment. This allowed the experiment to be transported to several locations so that data could be collected under a range of physical conditions. This has led to a better understanding of a variety of experimental noise sources. With this knowledge, we have been able to implement several changes in the way the FM DIAL data is collected and processed, with the net result being a drastic improvement in our confidence of analyte concentration measurement and an improvement i n the

  9. Regioselectivity of radical attacks on substituted olefins. Application of the SCD model

    SciTech Connect (OSTI)

    Shaik, S.S. ); Canadell, E. )

    1990-02-14

    The SCD model is used to derive regiochemical trends in radical addition to olefins. Regiochemistry is discussed by appeal to two fundamental properties of the radical and the olefin. The first factor is the relative spin density in the {sup 3}{pi}{pi}* state of the olefin. Thus, radical attack is directed toward the olefinic carbon which possesses the highest spin density. The second factor is the relative bond strengths of the radical to the olefinic carbons. This factor directs the regiochemistry toward the olefinic terminus which forms the strongest bond with the radical. When the two effects join up, regioselectivity will be large, e.g., for CH{sub 2}=CHX (X = NR{sub 2}, CR, Cl, CN, Ph). When the two effects oppose one another, regioselectivity will be smaller, and regioselectivity crossovers are expected, e.g., for CF{sub 2}=CHF. The normal regiochemistry is shown to coincide with the spin density rule which makes identical predictions to the HOMO rule.

  10. Tritium in the World Trade Center September 11, 2001 Terrorist Attack: It's Possible Sources and Fate

    SciTech Connect (OSTI)

    Parekh, P; Semkow, T; Husain, L; Haines, D; Woznial, G; Williams, P; Hafner, R; Rabun, R

    2002-05-03

    Traces of tritiated water (HTO) were determined at World Trade Center (WTC) ground zero after the 9/11/01 terrorist attack. A method of ultralow-background liquid scintillation counting was used after distilling HTO from the samples. A water sample from the WTC sewer, collected on 9/13/01, contained 0.174{plus_minus}0.074 (2{sigma}) nCi/L of HTO. A split water sample, collected on 9/21/01 from the basement of WTC Building 6, contained 3.53{plus_minus}0.17 and 2.83{plus_minus}0.15 nCi/L, respectively. Several water and vegetation samples were analyzed from areas outside the ground zero, located in Manhattan, Brooklyn, Queens, and Kensico Reservoir. No HTO above the background was found in those samples. All these results are well below the levels of concern to human exposure. Several tritium radioluminescent (RL) devices were investigated as possible sources of the traces of tritium at ground zero. Tritium is used in self-luminescent emergency EXIT signs. No such signs were present inside the WTC buildings. However, it was determined that Boeing 767-222 aircraft operated by the United Airlines that hit WTC Tower 2 as well as Boeing 767-223ER operated by the American Airlines, that hit WTC Tower 1, had a combined 34.3 Ci of tritium at the time of impact. Other possible sources of tritium include dials and lights of fire and emergency equipment, sights and scopes in weaponry, as well as time devices equipped with tritium dials. It was determined that emergency equipment was not a likely source. However, WTC hosted several law-enforcement agencies such as ATF, CIA, US Secret Service and US Customs. The ATF office had two weapon vaults in WTC Building 6. Also 63 Police Officers, possibly carrying handguns with tritium sights, died in the attack. The weaponry containing tritium was therefore a likely and significant source of tritium. It is possible that some of the 2830 victims carried tritium watches, however this source appears to be less significant that the other

  11. Massively Multi-core Acceleration of a Document-Similarity Classifier to Detect Web Attacks

    SciTech Connect (OSTI)

    Ulmer, C; Gokhale, M; Top, P; Gallagher, B; Eliassi-Rad, T

    2010-01-14

    This paper describes our approach to adapting a text document similarity classifier based on the Term Frequency Inverse Document Frequency (TFIDF) metric to two massively multi-core hardware platforms. The TFIDF classifier is used to detect web attacks in HTTP data. In our parallel hardware approaches, we design streaming, real time classifiers by simplifying the sequential algorithm and manipulating the classifier's model to allow decision information to be represented compactly. Parallel implementations on the Tilera 64-core System on Chip and the Xilinx Virtex 5-LX FPGA are presented. For the Tilera, we employ a reduced state machine to recognize dictionary terms without requiring explicit tokenization, and achieve throughput of 37MB/s at slightly reduced accuracy. For the FPGA, we have developed a set of software tools to help automate the process of converting training data to synthesizable hardware and to provide a means of trading off between accuracy and resource utilization. The Xilinx Virtex 5-LX implementation requires 0.2% of the memory used by the original algorithm. At 166MB/s (80X the software) the hardware implementation is able to achieve Gigabit network throughput at the same accuracy as the original algorithm.

  12. Project Plan Remote Target Fabrication Refurbishment Project

    SciTech Connect (OSTI)

    Bell, Gary L; Taylor, Robin D

    2009-08-01

    In early FY2009, the DOE Office of Science - Nuclear Physics Program reinstated a program for continued production of {sup 252}Cf and other transcurium isotopes at the Radiochemical Engineering Development Center (REDC) at Oak Ridge National Laboratory (ORNL). The FY2009 major elements of the workscope are as follows: (1) Recovery and processing of seven transuranium element targets undergoing irradiation at the High Flux Isotope Reactor (HFIR) at ORNL; (2) Development of a plan to manufacture new targets for irradiation beginning in early- to mid-FY10 to supply irradiated targets for processing Campaign 75 (TRU75); and (3) Refurbishment of the target manufacturing equipment to allow new target manufacture in early FY10 The {sup 252}Cf product from processing Campaign 74 (recently processed and currently shipping to customers) is expected to supply the domestic demands for a period of approximately two years. Therefore it is essential that new targets be introduced for irradiation by the second quarter of FY10 (HFIR cycle 427) to maintain supply of {sup 252}Cf; the average irradiation period is {approx}10 HFIR cycles, requiring about 1.5 calendar years. The strategy for continued production of {sup 252}Cf depends upon repairing and refurbishing the existing pellet and target fabrication equipment for one additional target production campaign. This equipment dates from the mid-1960s to the late 1980s, and during the last target fabrication campaign in 2005- 2006, a number of component failures and operations difficulties were encountered. It is expected that following the target fabrication and acceptance testing of the targets that will supply material for processing Campaign 75 a comprehensive upgrade and replacement of the remote hot-cell equipment will be required prior to subsequent campaigns. Such a major refit could start in early FY 2011 and would take about 2 years to complete. Scope and cost estimates for the repairs described herein were developed, and

  13. Remote-Handled Transuranic Content Codes

    SciTech Connect (OSTI)

    Washington TRU Solutions

    2006-12-01

    The Remote-Handled Transuranic (RH-TRU) Content Codes (RH-TRUCON) document describes the inventory of RH-TRU waste within the transportation parameters specified by the Remote-Handled Transuranic Waste Authorized Methods for Payload Control (RH-TRAMPAC).1 The RH-TRAMPAC defines the allowable payload for the RH-TRU 72-B. This document is a catalog of RH-TRU 72-B authorized contents by site. A content code is defined by the following components: A two-letter site abbreviation that designates the physical location of the generated/stored waste (e.g., ID for Idaho National Laboratory [INL]). The site-specific letter designations for each of the sites are provided in Table 1. A three-digit code that designates the physical and chemical form of the waste (e.g., content code 317 denotes TRU Metal Waste). For RH-TRU waste to be transported in the RH-TRU 72-B, the first number of this three-digit code is 3. The second and third numbers of the three-digit code describe the physical and chemical form of the waste. Table 2 provides a brief description of each generic code. Content codes are further defined as subcodes by an alpha trailer after the three-digit code to allow segregation of wastes that differ in one or more parameter(s). For example, the alpha trailers of the subcodes ID 322A and ID 322B may be used to differentiate between waste packaging configurations. As detailed in the RH-TRAMPAC, compliance with flammable gas limits may be demonstrated through the evaluation of compliance with either a decay heat limit or flammable gas generation rate (FGGR) limit per container specified in approved content codes. As applicable, if a container meets the watt*year criteria specified by the RH-TRAMPAC, the decay heat limits based on the dose-dependent G value may be used as specified in an approved content code. If a site implements the administrative controls outlined in the RH-TRAMPAC and Appendix 2.4 of the RH-TRU Payload Appendices, the decay heat or FGGR limits

  14. Digital, remote control system for a 2-MW research reactor

    SciTech Connect (OSTI)

    Battle, R.E.; Corbett, G.K.

    1988-01-01

    A fault-tolerant programmable logic controller (PLC) and operator workstations have been programmed to replace the hard-wired relay control system in the 2-MW Bulk Shielding Reactor (BSR) at Oak Ridge National Laboratory. In addition to the PLC and remote and local operator workstations, auxiliary systems for remote operation include a video system, an intercom system, and a fiber optic communication system. The remote control station, located at the High Flux Isotope Reactor 2.5 km from the BSR, has the capability of rector startup and power control. The system was designed with reliability and fail-safe features as important considerations. 4 refs., 3 figs.

  15. Remote inspection of underground storage tanks

    SciTech Connect (OSTI)

    Griebenow, B.L.; Martinson, L.M. )

    1992-01-01

    Westinghouse Idaho Nuclear Company, Inc. (WINCO) operates the Idaho Chemical Processing Plant (ICPP) for the US Department of Energy. The ICPP's mission is to process government-owned spent nuclear fuel. The process involves dissolving the fuel, extracting off uranium, and calcining the waste to a solid form for storage, Prior to calcining, WINCO temporarily stores the liquid waste from this process in eleven 1,135,600-l(300,000-gal), 15,2-m (50-ft)-diam, high-level liquid waste tanks. Each of these stainless steel tanks is contained within an underground concrete vault. The only access to the interior of the tanks is through risers that extend from ground level to the dome of the tanks. WINCO is replacing these tanks because of their age and the fact that they do not meet all of the current design requirements. The tanks will be replaced in two phases. WINCO is now in the Title I design stage for four new tank and vault systems to replace five of the existing systems. The integrity of the six remaining tanks must be verified to continue their use until they can be replaced in the second phase. To perform any integrity analysis, the inner surface of the tanks must be inspected. The remote tank inspection (RTI) robotic system, designed by RedZone Robotics of Pittsburgh, Pennsylvania, was developed to access the interior of the tanks and position various end effectors required to perform tank wall inspections.

  16. LNG links remote supplies and markets

    SciTech Connect (OSTI)

    Avidan, A.A.; Gardner, R.E.; Nelson, D.; Borrelli, E.N.; Rethore, T.J.

    1997-06-02

    Liquefied natural gas (LNG) has established a niche for itself by matching remote gas supplies to markets that both lacked indigenous gas reserves and felt threatened in the aftermath of the energy crises of the 1970s and 1980s. It has provided a cost-effective energy source for these markets, while also offering an environmentally friendly fuel long before that was fashionable. The introduction of natural-gas use via LNG in the early years (mostly into France and Japan) has also allowed LNG to play a major role in developing gas infrastructure. Today, natural gas, often supplied as LNG, is particularly well-suited for use in the combined cycle technology used in independent power generation projects (IPPs). Today, LNG players cannot simply focus on monetizing gas resources. Instead, they must adapt their projects to meet the needs of changing markets. The impact of these changes on the LNG industry has been felt throughout the value chain from finding and producing gas, gas treatment, liquefaction, transport as a liquid, receiving terminals and regasification, and finally, to consumption by power producers, industrial users, and households. These factors have influenced the evolution of the LNG industry and have implications for the future of LNG, particularly in the context of worldwide natural gas.

  17. Geological remote sensing for hydrocarbon exploration in Papua New Guinea

    SciTech Connect (OSTI)

    Valenti, G.L.; Phelps, J.C.; Eisenberg, L.L.

    1996-07-01

    One of the most active hydrocarbon exploration provinces of the last decade has been the fold and thrust belt of Papua New Guinea. Geologic remote sensing is an indispensable part of the exploration process in that remote and rugged area where usable seismic data are obtainable only locally, if at all. Photointerpretation of stereo synthetic aperture radar imagery has been especially useful in conventional lithostratigraphic mapping, both local and regional. Results of remote sensing imagery interpretation, integrated with surface geologic data, limited seismic, and balanced structural cross sections, facilitated the documentation of structural styles and provided the basis for a new, regional structural model. The role of remote sensing during various stages of the exploration process is summarized; imagery and map examples are presented.

  18. Draft Environmental Assessment on the Remote-handled Waste Disposition...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Draft Environmental Assessment on the Remote-handled Waste Disposition Project available for public review and comment The U.S. Department of Energy invites the public to review...

  19. Remote hard copy. Volume 3. Systems programming manual

    SciTech Connect (OSTI)

    Simons, R.W.

    1980-03-01

    The software used to operate and maintain the remote hard copy is described. All operating software that runs in the NOVA minicomputers is covered as are various utility and diagnostic programs used for creating and checking this software. 2 figures.

  20. ARM - Field Campaign - Scintillometry and Soil Moisture Remote...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Send us a note below or call us at 1-888-ARM-DATA. Send Campaign : Scintillometry and Soil Moisture Remote Sensing 2015.06.01 - 2015.10.31 Lead Scientist : Jan Hendrickx...

  1. The Fundamental Limitation of Atmospheric Remote Sensing by Dissection...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote Sensing by Dissection of Single-Photon State Space, and the Paradigms that Lie Beyond Illustrated with WAIL, O2 A-BandLine Spectroscopy, Etc. Davis, Anthony Los Alamos...

  2. ARM - Field Campaign - Remote Cloud Sensing (RCS) Field Evaluation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    govCampaignsRemote Cloud Sensing (RCS) Field Evaluation ARM Data Discovery Browse Data Comments? We would love to hear from you Send us a note below or call us at 1-888-ARM-DATA....

  3. Remote Gas Well Monitoring Technology Applied to Marcellus Shale...

    Energy Savers [EERE]

    ... the drilling effort in Washington County, WVU had been testing the remote, wireless system for the past year. Its success during testing demonstrates its ability to be a cost-effec...

  4. DOE Seeks Independent Evaluation of Remote-Handled Waste Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Seeks Independent Evaluation Of Remote-Handled Waste Program CARLSBAD, N.M., July 24, 2001 - An independent panel of scientific and engineering experts will convene July 30 in Carlsbad to evaluate U.S. Department of Energy (DOE) plans for managing remote-handled (RH) transuranic (TRU) waste at the Waste Isolation Pilot Plant (WIPP). DOE's Carlsbad Field Office has asked the American Society of Mechanical Engineers and the Institute for Regulatory Science to review its proposed RH-TRU waste

  5. Sandia National Laboratories: Employee & Retiree Resources: Remote Access

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Employee & Retiree Resources Emergency Announcements & Other Alerts Corporate Forms Technical Library Sandia Anywhere: Remote Access Sandia Anywhere: Remote Access Access Sandia's internal web-based resources You can access the following web-based resources directly with a CryptoCard from any computing device: Techweb Webmail - includes Outlook calendar and web-based IM Corporate Training (TEDS Learning Portal) Enterprise Information Management Services (EIMS) Expense Report HR Self

  6. Power plant emissions verified remotely at Four Corners sites

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Power plant emissions verified remotely Power plant emissions verified remotely at Four Corners sites The study is the first to show that space-based techniques can successfully verify international regulations on fossil energy emissions. May 19, 2014 The Four Corners coal-fired power plant, near Farmington, N.M. is a major source of pollutants, with measurements confirmed by Los Alamos National Laboratory researchers. The Four Corners coal-fired power plant, near Farmington, N.M. is a major

  7. Powering Remote Northern Villages with the Midnight Sun

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    POWERING REMOTE POWERING REMOTE NORTHERN VILLAGES WITH NORTHERN VILLAGES WITH THE MIDNIGHT SUN THE MIDNIGHT SUN Lance Whitwell, Lance Whitwell, Tribal Energy Manager Tribal Energy Manager Marjorie John, Marjorie John, Assistant Energy Manager Assistant Energy Manager Myles O'Kelly, Myles O'Kelly, Independence Power & Energy Consulting Independence Power & Energy Consulting Department of Energy Office of Energy Efficiency and Renewable Energy TRIBAL ENERGY PROGRAM FY2004 Year End Project

  8. JLab Guest Lecturer Discusses Hurricane Hunting - By Remote Control! On

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    April 14 | Jefferson Lab JLab Guest Lecturer Discusses Hurricane Hunting - By Remote Control! On April 14 JLab Guest Lecturer Discusses Hurricane Hunting - By Remote Control! On April 14 NEWPORT NEWS, Va., March 2, 2009 - Learn how the National Oceanic and Atmospheric Administration and National Aeronautics and Space Administration are using an unmanned aircraft system to gain information never before gathered about tropical storm systems and how this data is helping them better understand

  9. Solid state laser media driven by remote nuclear powered fluorescence

    DOE Patents [OSTI]

    Prelas, Mark A.

    1992-01-01

    An apparatus is provided for driving a solid state laser by a nuclear powered fluorescence source which is located remote from the fluorescence source. A nuclear reaction produced in a reaction chamber generates fluorescence or photons. The photons are collected from the chamber into a waveguide, such as a fiber optic waveguide. The waveguide transports the photons to the remote laser for exciting the laser.

  10. Intergranular attack of alloy 600: Simulation and remedial action tests: Final report

    SciTech Connect (OSTI)

    Daret, J.; Feron, D.

    1989-02-01

    The intergranular attack (IGA) that affects alloy 600 tubes in the tube sheet crevices of PWR steam generators is hard to simulate in laboratory studies. For this study, a special apparatus was designed with a range of representative materials, mechanical conditions and geometry. The design also took account of sludge piles, thermal fluxes and water chemistry. During a first series of seven model boiler tests, chemical parameters and test procedures were adjusted to finally obtain a field prototypical degradation of tubing over a significant length within the tube sheet crevice for the case of caustic pollution. IGA was not produced for the river water in-leakage case. A second series of model boiler tests also showed the possibility of producing a representative IGA by initially filling the tube sheet crevices with concentrated caustic solutions. A third series of five model boiler tests aimed at studying in the effectiveness of remedial actions on either virgin of IGA affected tubing. Tube sheet crevice flushing operations using the natural circulation procedure showed a poor efficiency for moving concentrated contaminants, but they succeeded in forcing chemicals additives (acetic acid or boric acid) within the non-occluded portions of crevices. This off-line treatment resulted in a reduction in the progression rate of the pre-existing IGA by a factor of 2 to 3. Simulation of this treatment on virgin material showed that this result was obtained because acetate or borate shifted the cation-to-anion equivalent ratio to well under one. However this off-line treatment could not prevent the occurrence of intergranular stress corrosion cracking (IGSCC) near the top of crevices, since caustic continued to hideout under full power operation. The best remedial action consisted of a combination of off-line and on-line boric acid treatment. IGSCC was prevented both on virgin and IGA affected tubes. 3 figs., 3 tabs.

  11. High-Resolution Characterization of Intergranular Attack and Stress Corrosion Cracking of Alloy 600 in High-Temperature Primary Water

    SciTech Connect (OSTI)

    Thomas, Larry E.; Bruemmer, Stephen M.

    2000-06-01

    Intergranular (IG) attack regions and stress-corrosion cracks in alloy 600 U-bend samples tested in 330C, pressurized-water-reactor water have been characterized by analytical transmission electron microscopy (ATEM). Observations of cross-sectional samples revealed short oxidized zones preceding crack tips and narrow (10-nm wide), deeply penetrated, oxidized zones along grain boundaries exposed along open cracks. High-resolution TEM imaging and fine-probe analysis were used to determine the local chemistries and structures in these corrosion-affected zones. Matrix areas surrounding the crack tips appeared highly strained, whereas the IG penetrations generally did not. The predominant oxide structure found along crack walls and just ahead of crack tips was NiO with metal-atom ratios similar to the alloy. The attacked grain boundaries off open cracks contained similar fine-grained NiO-structure oxide together with local areas of Cr-rich oxide and Ni-rich metal. In contrast, Cr-rich oxide identified as Cr2O3 predominated at the leading edges of the IG attack. Stereoscopic imaging of these tip structures revealed nm-scale porosity and tunnels within the oxide and pores along the grain-boundary plane ahead of the oxide. The general interpretation of these results is that IG attack and cracking follows local dissolution or oxidation and the formation of pores at grain boundaries. This degradation occurs at the nanometer scale and therefore requires high-resolution ATEM methods to reveal detailed characteristics. Experimental support for several possible IG degradation mechanisms is considered.

  12. Final report : impacts analysis for cyber attack on electric power systems (National SCADA Test Bed FY08).

    SciTech Connect (OSTI)

    Phillips, Laurence R.; Richardson, Bryan T.; Stamp, Jason Edwin; LaViolette, Randall A.

    2009-02-01

    To analyze the risks due to cyber attack against control systems used in the United States electrical infrastructure, new algorithms are needed to determine the possible impacts. This research is studying the Reliability Impact of Cyber ttack (RICA) in a two-pronged approach. First, malevolent cyber actions are analyzed in terms of reduced grid reliability. Second, power system impacts are investigated using an abstraction of the grid's dynamic model. This second year of esearch extends the work done during the first year.

  13. T-678: Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service

    Office of Energy Efficiency and Renewable Energy (EERE)

    Red Hat Enterprise Virtualization Hypervisor VLAN Packet Processing Flaw Lets Remote Users Deny Service.

  14. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system.

  15. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information

    Broader source: Energy.gov [DOE]

    Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information.

  16. Energy storage for hybrid remote power systems

    SciTech Connect (OSTI)

    Isherwood, W., LLNL

    1998-03-01

    Energy storage can be a cost-effective component of hybrid remote power systems. Storage serves the special role of taking advantage of intermittent renewable power sources. Traditionally this role has been played by lead-acid batteries, which have high life-cycle costs and pose special disposal problems. Hydrogen or zinc-air storage technologies can reduce life-cycle costs and environmental impacts. Using projected data for advanced energy storage technologies, LLNL ran an optimization for a hypothetical Arctic community with a reasonable wind resource (average wind speed 8 m/s). These simulations showed the life-cycle annualized cost of the total energy system (electric plus space heating) might be reduced by nearly 40% simply by adding wind power to the diesel system. An additional 20 to 40% of the wind-diesel cost might be saved by adding hydrogen storage or zinc-air fuel cells to the system. Hydrogen produced by electrolysis of water using intermittent, renewable power provides inexpensive long-term energy storage. Conversion back to electricity with fuel cells can be accomplished with available technology. The advantages of a hydrogen electrolysis/fuel cell system include low life-cycle costs for long term storage, no emissions of concern, quiet operation, high reliability with low maintenance, and flexibility to use hydrogen as a direct fuel (heating, transportation). Disadvantages include high capital costs, relatively low electrical turn-around efficiency, and lack of operating experience in utility settings. Zinc-air fuel cells can lower capital and life-cycle costs compared to hydrogen, with most of the same advantages. Like hydrogen systems, zinc-air technology promises a closed system for long-term storage of energy from intermittent sources. The turn around efficiency is expected to exceed 60%, while use of waste heat can potentially increase overall energy efficiency to over 80%.

  17. Remote-handled transuranic waste study

    SciTech Connect (OSTI)

    1995-10-01

    The Waste Isolation Pilot Plant (WIPP) was developed by the US Department of Energy (DOE) as a research and development facility to demonstrate the safe disposal of transuranic (TRU) radioactive wastes generated from the Nation`s defense activities. The WIPP disposal inventory will include up to 250,000 cubic feet of TRU wastes classified as remote handled (RH). The remaining inventory will include contact-handled (CH) TRU wastes, which characteristically have less specific activity (radioactivity per unit volume) than the RH-TRU wastes. The WIPP Land Withdrawal Act (LWA), Public Law 102-579, requires a study of the effect of RH-TRU waste on long-term performance. This RH-TRU Waste Study has been conducted to satisfy the requirements defined by the LWA and is considered by the DOE to be a prudent exercise in the compliance certification process of the WIPP repository. The objectives of this study include: conducting an evaluation of the impacts of RH-TRU wastes on the performance assessment (PA) of the repository to determine the effects of Rh-TRU waste as a part of the total WIPP disposal inventory; and conducting a comparison of CH-TRU and RH-TRU wastes to assess the differences and similarities for such issues as gas generation, flammability and explosiveness, solubility, and brine and geochemical interactions. This study was conducted using the data, models, computer codes, and information generated in support of long-term compliance programs, including the WIPP PA. The study is limited in scope to post-closure repository performance and includes an analysis of the issues associated with RH-TRU wastes subsequent to emplacement of these wastes at WIPP in consideration of the current baseline design. 41 refs.

  18. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code | Department of Energy 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in

  19. Remote sensing for wind power potential: a prospector's handbook

    SciTech Connect (OSTI)

    Wade, J.E.; Maule, P.A.; Bodvarsson, G.; Rosenfeld, C.L.; Woolley, S.G.; McClenahan, M.R.

    1983-02-01

    Remote sensing can aid in identifying and locating indicators of wind power potential from the terrestrial, marine, and atmospheric environments (i.e.: wind-deformed trees, white caps, and areas of thermal flux). It is not considered as a tool for determining wind power potential. A wide variety of remotely sensed evidence is described in terms of the scale at which evidence of wind power can be identified, and the appropriate remote sensors for finding such evidence. Remote sensing can be used for regional area prospecting using small-scale imagery. The information from such small-scale imagery is most often qualitative, and if it is transitory, examination of a number of images to verify presistence of the feature may be required. However, this evidence will allow rapid screening of a large area. Medium-scale imagery provides a better picture of the evidence obtained from small-scale imagery. At this level it is best to use existing imagery. Criteria relating to land use, accessibility, and proximity of candidate sites to nearby transmission lines can also be effectively evaluated from medium-scale imagery. Large-scale imagery provides the most quantitative evidence of the strength of wind. Wind-deformed trees can be identified at a large number of sites using only a few hours in locally chartered aircraft. A handheld 35mm camera can adequately document any evidence of wind. Three case studies that employ remote sensing prospecting techniques are described. Based on remotely sensed evidence, the wind power potential in three geographically and climatically diverse areas of the United States is estimated, and the estimates are compared to actual wind data in those regions. In addition, the cost of each survey is discussed. The results indicate that remote sensing for wind power potential is a quick, cost effective, and fairly reliable method for screening large areas for wind power potential.

  20. Snail/beta-catenin signaling protects breast cancer cells from hypoxia attack

    SciTech Connect (OSTI)

    Scherbakov, Alexander M.; Stefanova, Lidia B.; Sorokin, Danila V.; Semina, Svetlana E.; Berstein, Lev M.; Krasilnikov, Mikhail A.

    2013-12-10

    The tolerance of cancer cells to hypoxia depends on the combination of different factors from increase of glycolysis (Warburg Effect) to activation of intracellular growth/apoptotic pathways. Less is known about the influence of epithelialmesenchymal transition (EMT) and EMT-associated pathways on the cell sensitivity to hypoxia. The aim of this study was to explore the role of Snail signaling, one of the key EMT pathways, in the mediating of hypoxia response and regulation of cell sensitivity to hypoxia, using as a model in vitro cultured breast cancer cells. Earlier we have shown that estrogen-independent HBL-100 breast cancer cells differ from estrogen-dependent MCF-7 cells with increased expression of Snail1, and demonstrated Snail1 involvement into formation of hormone-resistant phenotype. Because Snail1 belongs to hypoxia-activated proteins, here we studied the influence of Snail1 signaling on the cell tolerance to hypoxia. We found that Snail1-enriched HBL-100 cells were less sensitive to hypoxia-induced growth suppression if compared with MCF-7 line (31% MCF-7 vs. 71% HBL-100 cell viability after 1% O{sub 2} atmosphere for 3 days). Snail1 knock-down enhanced the hypoxia-induced inhibition of cell proliferation giving the direct evidence of Snail1 involvement into cell protection from hypoxia attack. The protective effect of Snail1 was shown to be mediated, at least in a part, via beta-catenin which positively regulated expression of HIF-1-dependent genes. Finally, we found that cell tolerance to hypoxia was accompanied with the failure in the phosphorylation of AMPK the key energy sensor, and demonstrated an inverse relationship between AMPK and Snail/beta-catenin signaling. Totally, our data show that Snail1 and beta-catenin, besides association with loss of hormone dependence, protect cancer cells from hypoxia and may serve as an important target in the treatment of breast cancer. Moreover, we suggest that the level of these proteins as well the

  1. V-172: ISC BIND RUNTIME_CHECK Error Lets Remote Users Deny Service Against Recursive Resolvers

    Broader source: Energy.gov [DOE]

    A defect exists which allows an attacker to crash a BIND 9 recursive resolver with a RUNTIME_CHECK error in resolver.c

  2. T-635: Cisco AnyConnect Secure Mobility Client Lets Remote Users...

    Energy Savers [EERE]

    ... An attacker could create a malicious web page that looks like the normal VPN web login ... This arbitrary executable would be executed with the same operating system privileges ...

  3. Remote Engineering progress report, January-December 1984

    SciTech Connect (OSTI)

    Phillips, D.E.

    1985-12-23

    This report summarizes progress on work performed in the Remote Engineering group at Rocky Flats from January to December 1984. Remote Engineering's goals in all 1984 projects were to help increase production capacity, reduce radiation exposure, improve operation safety, improve product quality, or alleviate material-accounting errors. To convert manual operations to automated operations, Remote Engineering provided design, fabrication, and assembly of new equipment for varied plant operations. Seventeen separate projects were handled by Remote Engineering in 1984. Four of the projects automate related operations in Building 559, the Chemical Analytical Laboratory. In Building 559, the following operations needed mechanizing: Sample Cutting, Storage and Retrieval, Pneumatic Transfer System, and Chemical Operations Robotic System. Remote Engineering has completed the design of the hot-dip zinc-galvanizing furnace, and Maintenance will complete the assembly and installation. Three systems are in production use but are still undergoing development: the Unimate robot, the Laser Marker, and the Ingot Gripper. The Plutonium Oxide/Skull-Burn Furnace is awaiting installation. The other projects are at various states of design and development. These reports reflect the status of the projects as they existed December 31, 1984, except the Future Work sections which were updated August 27, 1985.

  4. T-649: Red Hat Network Satellite Server Request Validation Flaw Permits Cross-Site Request Forgery Attacks

    Broader source: Energy.gov [DOE]

    The Red Hat Network (RHN) Satellite and Spacewalk services do not properly validate user-supplied. A remote user can create specially crafted HTML that, when loaded by a target authenticated user, will take actions on the target site acting as the target user.

  5. U-067:WebSVN Input Validation Flaw in getLog() Permits Cross-Site Scripting Attacks

    Broader source: Energy.gov [DOE]

    A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the WebSVN software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

  6. Remote-Handled Low Level Waste Disposal Project Alternatives Analysis

    SciTech Connect (OSTI)

    David Duncan

    2010-10-01

    This report identifies, evaluates, and compares alternatives for meeting the U.S. Department of Energy’s mission need for management of remote-handled low-level waste generated by the Idaho National Laboratory and its tenants. Each alternative identified in the Mission Need Statement for the Remote-Handled Low-Level Waste Treatment Project is described and evaluated for capability to fulfill the mission need. Alternatives that could meet the mission need are further evaluated and compared using criteria of cost, risk, complexity, stakeholder values, and regulatory compliance. The alternative for disposal of remote-handled low-level waste that has the highest confidence of meeting the mission need and represents best value to the government is to build a new disposal facility at the Idaho National Laboratory Site.

  7. Remote detection of chemicals with passive millimeter waves.

    SciTech Connect (OSTI)

    Gopalsami, N.; Bakhtiari, S.; Elmer, T. W.; Raptis, A. C.; Nuclear Engineering Division

    2006-01-01

    Passive millimeter-wave (mmW) systems have been used in the past to remotely map solid targets and to measure low-pressure spectral lines of stratospheric and interstellar gases; however, its application to pressure-broadened spectral detection of terrestrial gases is new. A radiative transfer model was developed to determine the detection feasibility and system requirements for passive mmW spectral detection. A Dicke-switched multispectral radiometer that operates at 146-154 GHz was designed and built for remote detection of stack gases. The radiometer was tested in the laboratory using a gas cell; the spectra of acetonitrile were detected passively against a cold background, which mimicked typical remote detection scenarios in the field. With Dicke-switched integration of radiometric signals, on-line calibration, and novel signal processing to minimize atmospheric fluctuation, spectral line detection of polar molecules is possible from chemical plumes a few kilometers away.

  8. Remote Sealing of Canisters for Hot Isostatic Pressing

    SciTech Connect (OSTI)

    Wahlquist, Dennis; Bateman, Ken; Malewitz, Tim

    2015-03-01

    Battelle Energy Alliance, LLC, has successfully tested a remote welding process to seal radioactive waste containers prior to hot isostatic pressing (HIP). Since the 1990s, a variety of radioactive and hazardous waste forms have been remotely treated using HIP during trials within Idaho National Laboratory (INL) hot cells. For HIP treatment at INL, waste was loaded into a stainless-steel or aluminum canister, which was evacuated, seal welded, and placed in a HIP furnace. HIP simultaneously heats and pressurizes the waste, reducing its volume and increasing its stability, thus lowering the cost and risk associated with disposal. Weld integrity must be ensured in order to prevent the spread of contamination during HIP. This paper presents a process for sealing HIP canisters remotely using modified, commercially available equipment. This process includes evacuation, heating, welding, and weld inspection. The process and equipment have proven to reliably seal canisters in continued HIP trials.

  9. JTAG-based remote configuration of FPGAs over optical fibers

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Deng, B.; Xu, H.; Liu, C.; Chen, J.; Chen, K.; Gong, D.; Guo, D.; Hou, S.; D. Huang; Liu, T.; et al

    2015-01-28

    In this study, a remote FPGA-configuration method based on JTAG extension over optical fibers is presented. The method takes advantage of commercial components and ready-to-use software such as iMPACT and does not require any hardware or software development. The method combines the advantages of the slow remote JTAG configuration and the fast local flash memory configuration. The method has been verified successfully and used in the Demonstrator of Liquid-Argon Trigger Digitization Board (LTDB) for the ATLAS liquid argon calorimeter Phase-I trigger upgrade. All components on the FPGA side are verified to meet the radiation tolerance requirements.

  10. Exploring Papua New Guinea with remote sensing, fieldwork

    SciTech Connect (OSTI)

    Dekker, F.; Balkwill, H.; Slater, A. ); Herner, R. ); Kampschuur, W. )

    1991-03-01

    This paper reports on several types of remote sensing surveys that have been acquired of the Eastern Papuan Fold Belt, in the Gulf Province of Papua New Guinea. These include aerial photographs, Landsat Multispectral Scanner (MSS) and Synthetic Aperture Radar (SAR). Each has been used by Petro-Canada Inc. for interpreting the geologic structure and stratigraphy of onshore hydrocarbon prospects. Analysis of available remotely sensed imagery reveals greater structural complexity than shown on published geologic maps. Foremost among the images is SAR because of its low, artificial sun angle.

  11. Geobotanical Remote Sensing Applied to Targeting New Geothermal Resource

    Office of Scientific and Technical Information (OSTI)

    Locations in the U.S. Basin and Range with a Focus on Dixie Meadows, NV (Journal Article) | SciTech Connect Journal Article: Geobotanical Remote Sensing Applied to Targeting New Geothermal Resource Locations in the U.S. Basin and Range with a Focus on Dixie Meadows, NV Citation Details In-Document Search Title: Geobotanical Remote Sensing Applied to Targeting New Geothermal Resource Locations in the U.S. Basin and Range with a Focus on Dixie Meadows, NV This paper presents an overview of the

  12. Sustainable Energy in Remote Indonesian Grids. Accelerating Project Development

    SciTech Connect (OSTI)

    Hirsch, Brian; Burman, Kari; Davidson, Carolyn; Elchinger, Michael; Hardison, R.; Karsiwulan, D.; Castermans, B.

    2015-06-30

    Sustainable Energy for Remote Indonesian Grids (SERIG) is a U.S. Department of Energy (DOE) funded initiative to support Indonesia’s efforts to develop clean energy and increase access to electricity in remote locations throughout the country. With DOE support, the SERIG implementation team consists of the National Renewable Energy Laboratory (NREL) and Winrock International’s Jakarta, Indonesia office. Through technical assistance that includes techno-economic feasibility evaluation for selected projects, government-to-government coordination, infrastructure assessment, stakeholder outreach, and policy analysis, SERIG seeks to provide opportunities for individual project development and a collective framework for national replication office.

  13. T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System

    Office of Energy Efficiency and Renewable Energy (EERE)

    PHP is prone to a security-bypass vulnerability.Successful exploits will allow an attacker to delete files from the root directory, which may aid in further attacks. PHP 5.3.6 is vulnerable; other versions may also be affected.

  14. Factors affecting the remotely sensed response of coniferous forest plantations

    SciTech Connect (OSTI)

    Danson, F.M. ); Curran, P.J. )

    1993-01-01

    Remote sensing of forest biophysical properties has concentrated upon forest sites with a wide range of green vegetation amount and thereby leaf area index and canopy cover. However, coniferous forest plantations, an important forest type in Europe, are managed to maintain a large amount of green vegetation with little spatial variation. Therefore, the strength of the remotely sensed signal will, it is hypothesized, be determined more by the structure of this forest than by its cover. Airborne Thematic Mapper (ATM) and SPOT-1 HRV data were used to determine the effects of this structural variation on the remotely sensed response of a coniferous forest plantation in the United Kingdom. Red and near infrared radiance were strongly and negatively correlated with a range of structural properties and with the age of the stands but weakly correlated with canopy cover. A composite variable, related to the volume of the canopy, accounted for over 75% of the variation in near infrared radiance. A simple model that related forest structural variables to the remotely sensed response was used to understand and explain this response from a coniferous forest plantation.

  15. Proliferation detection using a remote resonance Raman chemical sensor

    SciTech Connect (OSTI)

    Sedlacek, A.J.; Chen, C.L.; Dougherty, D.R.

    1993-08-01

    The authors discussed the potential of the resonance Raman chemical sensor as a remote sensor that can be used for gases, liquids or solids. This spectroscopy has the fundamental advantage that it is based on optical fingerprints that are insensitive to environmental perturbations or excitation frequency. By taking advantage of resonance enhancement, the inelastic scattering cross-section can increase anywhere from 4 to 6 orders of magnitude which translates into increased sensing range or lower detection limits. It was also shown that differential cross-sections as small as 10{sup {minus}27} cm{sup 2}/sr do not preclude the use of this technique as being an important component in one`s remote-sensing arsenal. The results obtained in the early 1970s on various pollutants and the more recent work on atmospheric water cast a favorable light on the prospects for the successful development of a resonance Raman remote sensor. Currently, of the 20 CW agent-related {open_quotes}signature{close_quotes} chemicals that the authors have investigated, 18 show enhancements ranging from 3 to 6 orders of magnitude. The absolute magnitudes of the measured resonance enhanced Raman cross-sections for these 18 chemicals suggest that detection and identification of trace quantities of the {open_quotes}signature{close_quotes} chemicals, through a remote resonance Raman chemical sensor, could be achieved.

  16. Synthesis of the unmanned aerial vehicle remote control augmentation system

    SciTech Connect (OSTI)

    Tomczyk, Andrzej

    2014-12-10

    Medium size Unmanned Aerial Vehicle (UAV) usually flies as an autonomous aircraft including automatic take-off and landing phases. However in the case of the on-board control system failure, the remote steering is using as an emergency procedure. In this reason, remote manual control of unmanned aerial vehicle is used more often during take-of and landing phases. Depends on UAV take-off mass and speed (total energy) the potential crash can be very danger for airplane and environment. So, handling qualities of UAV is important from pilot-operator point of view. In many cases the dynamic properties of remote controlling UAV are not suitable for obtaining the desired properties of the handling qualities. In this case the control augmentation system (CAS) should be applied. Because the potential failure of the on-board control system, the better solution is that the CAS algorithms are placed on the ground station computers. The method of UAV handling qualities shaping in the case of basic control system failure is presented in this paper. The main idea of this method is that UAV reaction on the operator steering signals should be similar - almost the same - as reaction of the 'ideal' remote control aircraft. The model following method was used for controller parameters calculations. The numerical example concerns the medium size MP-02A UAV applied as an aerial observer system.

  17. Structural acceptance criteria Remote Handling Building Tritium Extraction Facility

    SciTech Connect (OSTI)

    Mertz, G.

    1999-12-16

    This structural acceptance criteria contains the requirements for the structural analysis and design of the Remote Handling Building (RHB) in the Tritium Extraction Facility (TEF). The purpose of this acceptance criteria is to identify the specific criteria and methods that will ensure a structurally robust building that will safely perform its intended function and comply with the applicable Department of Energy (DOE) structural requirements.

  18. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  19. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code...

    Energy Savers [EERE]

    iOS. A remote user can cause arbitrary code to be executed on the target user's system. ... A remote user can create a specially crafted file that, when loaded by the target user, ...

  20. Deadlock during first touch of upc_alloc'd remote memory when...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Reports Deadlock during first touch of upcalloc'd remote memory when target is in upcbarrier Deadlock during first touch of upcalloc'd remote memory when target is in ...

  1. T-652: Mozilla Thunderbird Bugs Let Remote Users Obtain Cookies and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Mozilla Thunderbird. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain cookies from another domain in certain cases.

  2. U-118: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code and Obtain Information

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can obtain potentially information.

  3. V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Oracle Java Flaws Let Remote Users Execute Arbitrary Code V-095: Oracle Java Flaws Let Remote Users Execute Arbitrary Code February 20, 2013 - 12:38am Addthis PROBLEM: Oracle...

  4. V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code V-142: Oracle Java Reflection API Flaw Lets Remote Users Execute Arbitrary Code April 25, 2013 - 12:14am...

  5. V-144: HP Printers Let Remote Users Access Files on the Printer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: HP Printers Let Remote Users Access Files on the Printer V-144: HP Printers Let Remote Users Access Files on the Printer April 29, 2013 - 12:27am Addthis PROBLEM: HP Printers...

  6. V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets V-147: IBM Lotus Notes Mail Client Lets Remote Users Execute Java Applets May 2, 2013 - 6:00am Addthis...

  7. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am ...

  8. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls ...

  9. V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Apple Safari Bugs Let Remote Users Execute Arbitrary Code V-113: Apple Safari Bugs Let Remote Users Execute Arbitrary Code March 18, 2013 - 1:53am Addthis PROBLEM: Apple Safari...

  10. V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code V-020: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code November 9, 2012 - 6:00am...

  11. V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service V-225: McAfee Email Gateway SMTP Processing Flaw Lets Remote Users Deny Service August 23, 2013 - 1:26am...

  12. V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Samba smbd CPU Processing Loop Lets Remote Users Deny Service V-212: Samba smbd CPU Processing Loop Lets Remote Users Deny Service August 6, 2013 - 6:00am Addthis PROBLEM: A...

  13. V-166: HP-UX Directory Server Discloses Passwords to Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users V-166: HP-UX Directory Server Discloses Passwords to Remote Authenticated and Local Users May...

  14. U-140: HP-UX Unspecified Flaw in DCE Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary code on the target system. A remote user can send specially crafted data to execute arbitrary code on the target system. The code will run with the privileges of the target service.

  15. 0.4 kV remote control (Smart Grid Project) | Open Energy Information

    Open Energy Info (EERE)

    .4 kV remote control (Smart Grid Project) Jump to: navigation, search Project Name 0.4 kV remote control Country Denmark Coordinates 56.26392, 9.501785 Loading map......

  16. OE Announces Awardees Under the Remote Off-Grid Microgrid Design...

    Energy Savers [EERE]

    Awardees Under the Remote Off-Grid Microgrid Design Support Tool Research Call OE Announces Awardees Under the Remote Off-Grid Microgrid Design Support Tool Research Call September ...

  17. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs T-676: Apple iOS Certificate Chain Validation Flaw Lets Certain Remote Users Access or ...

  18. State of New Mexico Issues Permit For Remote-Handled Waste at...

    Office of Environmental Management (EM)

    of New Mexico Issues Permit For Remote-Handled Waste at WIPP State of New Mexico Issues Permit For Remote-Handled Waste at WIPP October 16, 2006 - 1:35pm Addthis Enables DOE to ...

  19. U-048: HP LaserJet Printers Unspecified Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    T-699: EMC AutoStart Buffer Overflows Let Remote Users Execute Arbitrary Code U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System...

  20. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A ...

  1. T-685: Cisco Warranty CD May Load Malware From a Remote Site...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Cisco Warranty CD May Load Malware From a Remote Site T-685: Cisco Warranty CD May Load Malware From a Remote Site August 5, 2011 - 3:26pm Addthis PROBLEM: A vulnerability was...

  2. V-066: Adobe Acrobat/Reader Multiple Flaws Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote...

  3. U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service U-257: Adobe ColdFusion Unspecified Bug Lets Remote Users Deny Service September 12, 2012 - 6:00am Addthis...

  4. V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code V-110: Adobe Flash Player Bugs Let Remote Users Execute Arbitrary Code March 13, 2013 - 12:04am Addthis PROBLEM:...

  5. U-089:Apache Struts ParameterInterceptor() Flaw Lets Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache Struts ParameterInterceptor() Flaw Lets Remote Users Execute Arbitrary Commands PLATFORM: Struts 2.0.0 - Struts 2.3.1.1 ABSTRACT: A remote user can execute arbitrary code...

  6. U-153: EMC Data Protection Advisor Server and Collector Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Data Protection Advisor. A remote user can cause denial of service conditions.

  7. U-134: Apache Traffic Server Host Header Processing Flaw Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Apache Traffic Server. A remote user can cause denial of service conditions.

  8. U-161: Citrix Provisioning Services Unspecified Flaw Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Citrix Provisioning Services. A remote user can execute arbitrary code on the target system.

  9. U-205: RSA Access Manager Session Replay Flaw Lets Remote Users Access the System

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in RSA Access Manager. A remote user can gain access to the target system.

  10. U-135: HP WBEM Discloses Diagnostic Data to Remote and Local Users

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP WBEM. A remote or local user can gain access to diagnostic data.

  11. T-719:Apache mod_proxy_ajp HTTP Processing Error Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can cause the backend server to remain in an error state until the retry timeout expires.

  12. U-236: Microsoft JScript and VBScript Engine Integer Overflow Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Execution of arbitrary code via network A remote user can cause arbitrary code to be executed on the target

  13. U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases.

  14. U-208: HP Operations Agent Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in HP Operations Agent. A remote user can execute arbitrary code on the target system

  15. U-163: PHP Command Parameter Bug Lets Remote Users Obtain Potentially Sensitive Information and Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in PHP. A remote user can obtain potentially sensitive information. A remote user can execute arbitrary code on the target system.

  16. DEVELOPMENT OF REMOTE HANFORD CONNECTOR GASKET REPLACEMENT TOOLING FOR DWPF

    SciTech Connect (OSTI)

    Krementz, D.; Coughlin, Jeffrey

    2009-05-05

    The Defense Waste Processing Facility (DWPF) requested the Savannah River National Laboratory (SRNL) to develop tooling and equipment to remotely replace gaskets in mechanical Hanford connectors to reduce personnel radiation exposure as compared to the current hands-on method. It is also expected that radiation levels will continually increase with future waste streams. The equipment is operated in the Remote Equipment Decontamination Cell (REDC), which is equipped with compressed air, two master-slave manipulators (MSM's) and an electro-mechanical manipulator (EMM) arm for operation of the remote tools. The REDC does not provide access to electrical power, so the equipment must be manually or pneumatically operated. The MSM's have a load limit at full extension of ten pounds, which limited the weight of the installation tool. In order to remotely replace Hanford connector gaskets several operations must be performed remotely, these include: removal of the spent gasket and retaining ring (retaining ring is also called snap ring), loading the new snap ring and gasket into the installation tool and installation of the new gasket into the Hanford connector. SRNL developed and tested tools that successfully perform all of the necessary tasks. Removal of snap rings from horizontal and vertical connectors is performed by separate air actuated retaining ring removal tools and is manipulated in the cell by the MSM. In order install a new gasket, the snap ring loader is used to load a new snap ring into a groove in the gasket installation tool. A new gasket is placed on the installation tool and retained by custom springs. An MSM lifts the installation tool and presses the mounted gasket against the connector block. Once the installation tool is in position, the gasket and snap ring are installed onto the connector by pneumatic actuation. All of the tools are located on a custom work table with a pneumatic valve station that directs compressed air to the desired tool and

  17. Geotechnical applications of remote sensing and remote data transmission; Proceedings of the Symposium, Cocoa Beach, FL, Jan. 31-Feb. 1, 1986

    SciTech Connect (OSTI)

    Johnson, A.I.; Pettersson, C.B.

    1988-01-01

    Papers and discussions concerning the geotechnical applications of remote sensing and remote data transmission, sources of remotely sensed data, and glossaries of remote sensing and remote data transmission terms, acronyms, and abbreviations are presented. Aspects of remote sensing use covered include the significance of lineaments and their effects on ground-water systems, waste-site use and geotechnical characterization, the estimation of reservoir submerging losses using CIR aerial photographs, and satellite-based investigation of the significance of surficial deposits for surface mining operations. Other topics presented include the location of potential ground subsidence and collapse features in soluble carbonate rock, optical Fourier analysis of surface features of interest in geotechnical engineering, geotechnical applications of U.S. Government remote sensing programs, updating the data base for a Geographic Information System, the joint NASA/Geosat Test Case Project, the selection of remote data telemetry methods for geotechnical applications, the standardization of remote sensing data collection and transmission, and a comparison of airborne Goodyear electronic mapping system/SAR with satelliteborne Seasat/SAR radar imagery.

  18. Experimental data base for estimating the consequences from a hypothetical sabotage attack on a spent fuel shipping cask

    SciTech Connect (OSTI)

    Sandoval, R.P.; Luna, R.E.

    1986-01-01

    This paper describes the results of a program conducted at Sandia National Laboratories for the US Department of Energy to provide an experimental data base for estimating the radiological health effects that could result from the sabotage of a light water reactor spent fuel shipping cask. The primary objectives of the program were limited to: (1) evaluating the effectiveness of selected high energy devices (HED) in breaching full-scale spent fuel shipping casks, (2) quantifying and characterizing relevant aerosol and radiological properties of the released fuel, and (3) using the resulting experimental data to evaluate the radiological health effects resulting from a hypothetical attack on a spent fuel shipping cask in a densely populated urban area. 3 refs.

  19. Mechanisms of stress corrosion cracking and intergranular attack in Alloy 600 in high temperature caustic and pure water

    SciTech Connect (OSTI)

    Bandy, R.; van Rooyen, D.

    1984-01-01

    In recent years, several studies have been conducted on the intergranular stress corrosion cracking (SCC) and intergranular attack (IGA) of Alloy 600. A combination of SCC and IGA has been observed in Alloy 600 tubing on the hot leg of some operating steam generators in pressurized water reactor (PWR) nuclear power plants, and sodium hydroxide along with several other chemical species have been implicated in the tube degradations. SCC has been observed above and within the tube sheet, whereas IGA is generally localized within the tube sheet. Alloy 600 is also susceptible to SCC in pure and primary water. Various factors that influence SCC and IGA include metallurgical conditions of the alloy, concentrations of alkaline species, impurity content of the environment, temperature and stress. The mechanisms of these intergranular failures, however, are not well understood. Some of the possible mechanisms of the SCC and IGA in high temperature water and caustic are described in this paper.

  20. Cooperative Remote Monitoring, Arms control and nonproliferation technologies: Fourth quarter 1995

    SciTech Connect (OSTI)

    Alonzo, G M

    1995-01-01

    The DOE`s Cooperative Remote Monitoring programs integrate elements from research and development and implementation to achieve DOE`s objectives in arms control and nonproliferation. The contents of this issue are: cooperative remote monitoring--trends in arms control and nonproliferation; Modular Integrated Monitoring System (MIMS); Authenticated Tracking and Monitoring Systems (ATMS); Tracking and Nuclear Materials by Wide-Area Nuclear Detection (WAND); Cooperative Monitoring Center; the International Remote Monitoring Project; international US and IAEA remote monitoring field trials; Project Dustcloud: monitoring the test stands in Iraq; bilateral remote monitoring: Kurchatov-Argonne-West Demonstration; INSENS Sensor System Project.

  1. Remotely maintainable top-loading captive ball valve system for ICPP

    SciTech Connect (OSTI)

    Berry, S.M.

    1994-12-31

    A program was undertaken for the remote maintenance of valve boxes at the Idaho Chemical Processing Plant. The remote adaptive features developed for a 3-in. top-loading captive ball valve have been fabricated and thoroughly tested on a prototype 3-in. valve unit located at the RRMTF. Remote disassembly/assembly has been successfully demonstrated on numerous occasions by the RSA group at WINCO. In addition, the remotely detachable valve actuator rod has also been successfully demonstrated on this prototype unit. Approximately 150 valves of several sizes with remote adaptive features based on WINCO`s prototype development by the RSA group are currently being manufactured.

  2. User guide for remote access to VDI and Workplace using RSA token |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token VDI_WP_RSA_Remote_Guide_Final.pdf (1.22 MB) More Documents & Publications User Guide for Remote Access to VDI/Workplace Using PIV Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc Citrix_2FA_Authentication_09.09

  3. Methods and systems for remote detection of gases

    DOE Patents [OSTI]

    Johnson, Timothy J.

    2007-11-27

    Novel systems and methods for remotely detecting at least one constituent of a gas via infrared detection are provided. A system includes at least one extended source of broadband infrared radiation and a spectrally sensitive receiver positioned remotely from the source. The source and the receiver are oriented such that a surface of the source is in the field of view of the receiver. The source includes a heating component thermally coupled to the surface, and the heating component is configured to heat the surface to a temperature above ambient temperature. The receiver is operable to collect spectral infrared absorption data representative of a gas present between the source and the receiver. The invention advantageously overcomes significant difficulties associated with active infrared detection techniques known in the art, and provides an infrared detection technique with a much greater sensitivity than passive infrared detection techniques known in the art.

  4. The Fermilab CMTF cryogenic distribution remote control system

    SciTech Connect (OSTI)

    Pei, L.; Theilacker, J.; Klebaner, A.; Martinez, A.; Bossert, R.

    2014-01-29

    The Cryomodule Test Facility (CMTF) is able to provide the necessary test bed for measuring the performance of Superconducting Radio Frequency (SRF) cavities in a cryomodule (CM). The CMTF have seven 300 KW screw compressors, two liquid helium refrigerators, and two Cryomodule Test Stands (CMTS). CMTS1 is designed for 1.3 GHz cryomodule operating in a pulsed mode (PM) and CMTS2 is for cryomodule operating in Half-Wave (HW) and Continuous Wave (CW) mode. Based on the design requirement, each subsystem has to be far away from each other and be placed in distant locations. Therefore choosing Siemens Process Control System 7-400, DL205 PLC, Synoptic and Fermilab ACNET are the ideal choices for CMTF cryogenic distribution real-time remote control system. This paper presents a method which has been successfully used by many Fermilab distribution cryogenic real-time remote control systems.

  5. A facility to remotely assemble radioisotope thermoelectric generators

    SciTech Connect (OSTI)

    Engstrom, J.W.; Goldmann, L.H.; Truitt, R.W.

    1992-07-01

    Radioisotope Thermoelectric Generators (RTGs) are electrical power sources that use heat from decaying radioisotopes to directly generate electrical power. The RTG assembly process is performed in an inert atmosphere inside a large glovebox, which is surrounded by radiation shielding to reduce exposure to neutron and gamma radiation from the radioisotope heat source. In the past, allowable dose rate limits have allowed direct, manual assembly methods; however, current dose rate limits require a thicker radiation shielding that makes direct, manual assembly infeasible. To minimize RTG assembly process modifications, telerobotic systems are being investigated to perform remote assembly tasks. Telerobotic systems duplicate human arm motion and incorporate force feedback sensitivity to handle objects and tools in a human-like manner. A telerobotic system with two arms and a three-dimensional (3-D) vision system can be used to perform remote RTG assembly tasks inside gloveboxes and cells using unmodified, normal hand tools.

  6. A facility to remotely assemble radioisotope thermoelectric generators

    SciTech Connect (OSTI)

    Engstrom, J.W.; Goldmann, L.H.; Truitt, R.W. )

    1993-01-15

    Radioisotope Thermoelectric Generators (RTGs) are electrical power sources that use heat from decaying radioisotopes to directly generate electrical power. The RTG assembly process is performed in an inert atmosphere inside a large glovebox, which is surrounded by radiation shielding to reduce exposure to neutron and gamma radiation from the radioisotope heat source. In the past, allowable dose rate limits have allowed direct, manual assembly methods; however, current dose rate limits require a thicker radiation shielding that makes direct, manual assembly infeasible. To minimize RTG assembly process modifications, telerobotic systems are being investigated to perform remote assembly tasks. Telerobotic systems duplicate human arm motion and incorporate force feedback sensitivity to handle objects and tools in a human-like manner. A telerobotic system with two arms and a three-dimensional (3-D) vision system can be used to perform remote RTG assembly tasks inside gloveboxes and cells using unmodified, normal hand tools.

  7. Preliminary Analysis of Remote Monitoring & Robotic Concepts for Performance Confirmation

    SciTech Connect (OSTI)

    D.A. McAffee

    1997-02-18

    As defined in 10 CFR Part 60.2, Performance Confirmation is the ''program of tests, experiments and analyses which is conducted to evaluate the accuracy and adequacy of the information used to determine with reasonable assurance that the performance objectives for the period after permanent closure will be met''. The overall Performance Confirmation program begins during site characterization and continues up to repository closure. The main purpose of this document is to develop, explore and analyze initial concepts for using remotely operated and robotic systems in gathering repository performance information during Performance Confirmation. This analysis focuses primarily on possible Performance Confirmation related applications within the emplacement drifts after waste packages have been emplaced (post-emplacement) and before permanent closure of the repository (preclosure). This will be a period of time lasting approximately 100 years and basically coincides with the Caretaker phase of the project. This analysis also examines, to a lesser extent, some applications related to Caretaker operations. A previous report examined remote handling and robotic technologies that could be employed during the waste package emplacement phase of the project (Reference 5.1). This analysis is being prepared to provide an early investigation of possible design concepts and technical challenges associated with developing remote systems for monitoring and inspecting activities during Performance Confirmation. The writing of this analysis preceded formal development of Performance Confirmation functional requirements and program plans and therefore examines, in part, the fundamental Performance Confirmation monitoring needs and operating conditions. The scope and primary objectives of this analysis are to: (1) Describe the operating environment and conditions expected in the emplacement drifts during the preclosure period. (Presented in Section 7.2). (2) Identify and discuss the

  8. PCDAS Version 2. 2: Remote network control and data acquisition

    SciTech Connect (OSTI)

    Fishbaugher, M.J.

    1987-09-01

    This manual is intended for both technical and non-technical people who want to use the PCDAS remote network control and data acquisition software. If you are unfamiliar with remote data collection hardware systems designed at Pacific Northwest Laboratory (PNL), this introduction should answer your basic questions. Even if you have some experience with the PNL-designed Field Data Acquisition Systems (FDAS), it would be wise to review this material before attempting to set up a network. This manual was written based on the assumption that you have a rudimentary understanding of personal computer (PC) operations using Disk Operating System (DOS) version 2.0 or greater (IBM 1984). You should know how to create subdirectories and get around the subdirectory tree.

  9. Remote sensing of soil radionuclide fluxes in a tropical ecosystem

    SciTech Connect (OSTI)

    Clegg, B.; Koranda, J.; Robinson, W.; Holladay, G.

    1980-11-06

    We are using a transponding geostationary satellite to collect surface environmental data to describe the fate of soil-borne radionuclides. The remote, former atomic testing grounds at the Eniwetok and Bikini Atolls present a difficult environment in which to collect continuous field data. Our land-based, solar-powered microprocessor and environmental data systems remotely acquire measurements of net and total solar radiation, rain, humidity, temperature, and soil-water potentials. For the past year, our water flux model predicts wet season plant transpiration rates nearly equal to the 6 to 7 mm/d evaporation pan rate, which decreases to 2 to 3 mm/d for the dry season. Radioisotopic analysis confirms the microclimate-estimated 1:3 to 1:20 soil to plant /sup 137/Cs dry matter concentration ratio. This ratio exacerbates the dose to man from intake of food plants. Nephelometer measurements of airborne particulates presently indicate a minimum respiratory radiological dose.

  10. Remote System Technologies for Deactivating Hanford Hot Cells

    SciTech Connect (OSTI)

    Berlin, G.; Walton, T.

    2003-02-25

    Remote system technologies are being deployed by Fluor Hanford to help accelerate the deactivation of highly-radioactive hot cell facilities. These technologies offer improved methods for accessing difficult-to-reach spaces and performing tasks such as visual inspection, radiological characterization, decontamination, waste handling, and size reduction. This paper is focused on the application of remote systems in support of deactivation work being performed in several legacy facilities at Hanford (i.e., the 324 and 327 Buildings). These facilities were previously used for fuel fabrication, materials examination, and the development of waste treatment processes. The technologies described in this paper represent significant improvements to Hanford's baseline methods, and may offer benefits to other U.S. Department of Energy (DOE) sites and commercial operations.

  11. Methods and systems for remote detection of gases

    DOE Patents [OSTI]

    Johnson, Timothy J

    2012-09-18

    Novel systems and methods for remotely detecting at least one constituent of a gas via infrared detection are provided. A system includes at least one extended source of broadband infrared radiation and a spectrally sensitive receiver positioned remotely from the source. The source and the receiver are oriented such that a surface of the source is in the field of view of the receiver. The source includes a heating component thermally coupled to the surface, and the heating component is configured to heat the surface to a temperature above ambient temperature. The receiver is operable to collect spectral infrared absorption data representative of a gas present between the source and the receiver. The invention advantageously overcomes significant difficulties associated with active infrared detection techniques known in the art, and provides an infrared detection technique with a much greater sensitivity than passive infrared detection techniques known in the art.

  12. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, Allan M.

    1997-01-01

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.

  13. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, Allan M.

    1996-01-01

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.

  14. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, Allan M.

    1999-01-01

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user's local host, thereby providing ease of use and minimal software maintenance for users of that remote service.

  15. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, A.M.

    1996-08-06

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user`s local host, thereby providing ease of use and minimal software maintenance for users of that remote service. 16 figs.

  16. Remote information service access system based on a client-server-service model

    DOE Patents [OSTI]

    Konrad, A.M.

    1997-12-09

    A local host computing system, a remote host computing system as connected by a network, and service functionalities: a human interface service functionality, a starter service functionality, and a desired utility service functionality, and a Client-Server-Service (CSS) model is imposed on each service functionality. In one embodiment, this results in nine logical components and three physical components (a local host, a remote host, and an intervening network), where two of the logical components are integrated into one Remote Object Client component, and that Remote Object Client component and the other seven logical components are deployed among the local host and remote host in a manner which eases compatibility and upgrade problems, and provides an illusion to a user that a desired utility service supported on a remote host resides locally on the user`s local host, thereby providing ease of use and minimal software maintenance for users of that remote service. 16 figs.

  17. Local intelligent electronic device (IED) rendering templates over limited bandwidth communication link to manage remote IED

    DOE Patents [OSTI]

    Bradetich, Ryan; Dearien, Jason A; Grussling, Barry Jakob; Remaley, Gavin

    2013-11-05

    The present disclosure provides systems and methods for remote device management. According to various embodiments, a local intelligent electronic device (IED) may be in communication with a remote IED via a limited bandwidth communication link, such as a serial link. The limited bandwidth communication link may not support traditional remote management interfaces. According to one embodiment, a local IED may present an operator with a management interface for a remote IED by rendering locally stored templates. The local IED may render the locally stored templates using sparse data obtained from the remote IED. According to various embodiments, the management interface may be a web client interface and/or an HTML interface. The bandwidth required to present a remote management interface may be significantly reduced by rendering locally stored templates rather than requesting an entire management interface from the remote IED. According to various embodiments, an IED may comprise an encryption transceiver.

  18. Researcher, Los Alamos National Laboratory - Space and Remote Sensing Group

    National Nuclear Security Administration (NNSA)

    | National Nuclear Security Administration | (NNSA) Los Alamos National Laboratory - Space and Remote Sensing Group Patrick Colestock Patrick Colestock November 2009 Los Alamos National Laboratory Fellow Six Los Alamos scientists have been designated 2009 Los Alamos National Laboratory Fellows in recognition of sustained, outstanding scientific contributions and exceptional promise for continued professional achievement. The title of Fellow is bestowed on only about 2 percent of the

  19. Televised remote control system of a continuous mining machine

    SciTech Connect (OSTI)

    Lansberry, J.B.

    1981-08-04

    A method of recovering particulate material from a seam of such material within the earth bounded above and below by different material which comprises the steps of positioning in mining relation to the seam a continuous mining machine having a power driven mechanism thereon for moving the machine through successive seam material cutting cycles which include an advancing movement along a mined entry within the seam in a direction toward the working face of the seam; illuminating portions of the space surrounding the continuous mining machine including portions of the working face disposed forwardly thereof and adjacent portions of the roof, floor and side walls of the mined entry rearwardly of the working face; establishing electromagnetic signals indicative of the appearance of the illuminated portions of the working face of the seam and the adjacent portions of the roof, floor and side walls; transmitting the established electromagnetic signals to a remote control station; converting at the remote control station the transmitted electromagnetic signals to a continuous picture of the appearance of at least a selected portion of the illuminated portions of the working face of the seam and the adjacent portions of the roof, floor and side walls; and controlling from the remote control station the cutting cycle of the continuous mining machine so that the material cut during a cycle is cut from the seam up to the different material defining the roof and down to the different material defining the floor based upon visually distinguishing between the material of the seam and the different material which forms the roof and floor by viewing the continuous picture provided at the remote control station and apparatus for carrying out the method.

  20. Contact-Handled and Remote-Handled Transuranic Waste Packaging

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-08-09

    Provides specific instructions for packaging and/or repackaging contact-handled transuranic (CH-TRU) and remote-handled transuranic (RH-TRU) waste in a manner consistent with DOE O 435.1, Radioactive Waste Management, DOE M 435.1-1 Chg 1, Radioactive Waste Management Manual, CH-TRU and RH-TRU waste transportation requirements, and Waste Isolation Pilot Plant (WIPP) programmatic requirements. Does not cancel/supersede other directives.

  1. NNSA Researchers Advance Technology for Remote Reactor Monitoring |

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | (NNSA) Researchers Advance Technology for Remote Reactor Monitoring Thursday, May 5, 2016 - 12:06pm New detector neutralizes neutron interference for nuclear detection. NNSA's Defense Nuclear Nonproliferation Research and Development Program drives the innovation of technical capabilities to detect, identify, and characterize foreign nuclear weapons development activities. To achieve this, NNSA leverages the unique capabilities of the national

  2. Remote video radioactive process evaluation, Savannah River Site

    SciTech Connect (OSTI)

    Heckendorn, F.M.

    1990-01-01

    Specialized miniature low cost video equipment has been effectively used in a number of remote, radioactive, and contaminated environments at the Savannah River Site (SRS). The equipment and related techniques have reduced the potential for personnel exposure to both radiation and physical hazards. The valuable process information thus provided would not have otherwise been available for use in improving the quality of operation at SRS.

  3. Remote video radioactive systems evaluation, Savannah River Site

    SciTech Connect (OSTI)

    Heckendorn, F.M.; Robinson, C.W.

    1991-12-31

    Specialized miniature low cost video equipment has been effectively used in a number of remote, radioactive, and contaminated environments at the Savannah River Site (SRS). The equipment and related techniques have reduced the potential for personnel exposure to both radiation and physical hazards. The valuable process information thus provided would not have otherwise been available for use in improving the quality of operation at SRS.

  4. Remote video radioactive process evaluation, Savannah River Site

    SciTech Connect (OSTI)

    Heckendorn, F.M.

    1990-12-31

    Specialized miniature low cost video equipment has been effectively used in a number of remote, radioactive, and contaminated environments at the Savannah River Site (SRS). The equipment and related techniques have reduced the potential for personnel exposure to both radiation and physical hazards. The valuable process information thus provided would not have otherwise been available for use in improving the quality of operation at SRS.

  5. Remote video radioactive systems evaluation, Savannah River Site

    SciTech Connect (OSTI)

    Heckendorn, F.M.; Robinson, C.W.

    1991-01-01

    Specialized miniature low cost video equipment has been effectively used in a number of remote, radioactive, and contaminated environments at the Savannah River Site (SRS). The equipment and related techniques have reduced the potential for personnel exposure to both radiation and physical hazards. The valuable process information thus provided would not have otherwise been available for use in improving the quality of operation at SRS.

  6. Surface based remote sensing of aerosol-cloud interactions

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Surface based remote sensing of aerosol-cloud interactions Feingold, Graham NOAA/Environmental Technology Laboratory Frisch, Shelby NOAA/Environmental Technology Laboratory Min, Qilong State University of New York at Albany Category: Cloud Properties We will present an analysis of the effect of aerosol on clouds at the Southern Great Plains ARM site. New methods for retrieving cloud droplet effective radius with radar (MMCR), multifilter rotating shadowband radiometer (MFRSR), and microwave

  7. Photovoltaic (PV) Module Level Remote Safety Disconnect - Energy Innovation

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Portal Find More Like This Return to Search Photovoltaic (PV) Module Level Remote Safety Disconnect National Renewable Energy Laboratory Contact NREL About This Technology Figure 1: System configuration of emergency module-level disconnect using module-level &lsquo;Isolation Detection Units&rsquo; (IDU).<br /> Figure 1: System configuration of emergency module-level disconnect using module-level 'Isolation Detection Units' (IDU). Technology Marketing Summary The ability to

  8. Perm Web: remote parallel and distributed volume visualization

    SciTech Connect (OSTI)

    Wittenbrink, C.M.; Kim, K.; Story, J.; Pang, A.; Hollerbach, K.; Max, N.

    1997-01-01

    In this paper we present a system for visualizing volume data from remote supercomputers (PermWeb). We have developed both parallel volume rendering algorithms, and the World Wide Web software for accessing the data at the remote sites. The implementation uses Hypertext Markup Language (HTML), Java, and Common Gateway Interface (CGI) scripts to connect World Wide Web (WWW) servers/clients to our volume renderers. The front ends are interactive Java classes for specification of view, shading, and classification inputs. We present performance results, and implementation details for connections to our computing resources at the University of California Santa Cruz including a MasPar MP-2, SGI Reality Engine-RE2, and SGI Challenge machines. We apply the system to the task of visualizing trabecular bone from finite element simulations. Fast volume rendering on remote compute servers through a web interface allows us to increase the accessibility of the results to more users. User interface issues, overviews of parallel algorithm developments, and overall system interfaces and protocols are presented. Access is available through Uniform Resource Locator (URL) http://www.cse.ucsc.edu/research/slvg/. 26 refs., 7 figs.

  9. NN-SITE: A remote monitoring testbed facility

    SciTech Connect (OSTI)

    Kadner, S.; White, R.; Roman, W.; Sheely, K.; Puckett, J.; Ystesund, K.

    1997-08-01

    DOE, Aquila Technologies, LANL and SNL recently launched collaborative efforts to create a Non-Proliferation Network Systems Integration and Test (NN-Site, pronounced N-Site) facility. NN-Site will focus on wide area, local area, and local operating level network connectivity including Internet access. This facility will provide thorough and cost-effective integration, testing and development of information connectivity among diverse operating systems and network topologies prior to full-scale deployment. In concentrating on instrument interconnectivity, tamper indication, and data collection and review, NN-Site will facilitate efforts of equipment providers and system integrators in deploying systems that will meet nuclear non-proliferation and safeguards objectives. The following will discuss the objectives of ongoing remote monitoring efforts, as well as the prevalent policy concerns. An in-depth discussion of the Non-Proliferation Network Systems Integration and Test facility (NN-Site) will illuminate the role that this testbed facility can perform in meeting the objectives of remote monitoring efforts, and its potential contribution in promoting eventual acceptance of remote monitoring systems in facilities worldwide.

  10. Amplification of Xenon NMR and MRI by remote detection

    SciTech Connect (OSTI)

    Moule, Adam J.; Spence, Megan M.; Han, Song-I.; Seeley, JulietteA.; Pierce, Kimberly L.; Saxena, Sunil; Pines, Alexander

    2003-03-31

    A novel technique is proposed in which a nuclear magneticresonance (NMR) spectrum or magnetic resonance image (MRI) is encoded andstored as spin polarization and is then moved to a different physicallocation to be detected. Remote detection allows the separateoptimization of the encoding and detection steps, permitting theindependent choice of experimental conditions, and excitation anddetection methodologies. In the first experimental demonstration of thistechnique, we show that NMR signal can be amplified by taking diluted129Xe from a porous sample placed inside a large encoding coil, andconcentrating it into a smaller detection coil. In general, the study ofNMR active molecules at low concentration that have low physical fillingfactor is facilitated by remote detection. In the second experiment, MRIinformation encoded in a very low field magnet (4-7mT) is transferred toa high field magnet (4.2 T) in order to be detected under optimizedconditions. Furthermore, remote detection allows the utilization ofultra-sensitive optical or superconducting detection techniques, whichbroadens the horizon of NMR experimentation.

  11. T-695: Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Avaya Aura Application Server Buffer Overflow in 'cstore.exe' Lets Remote Users Execute Arbitrary Code.

  12. T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution

    Broader source: Energy.gov [DOE]

    Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

  13. U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Buffer Overflow Lets Remote Users Execute Arbitrary Code | Department of Energy 59: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code U-259: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute Arbitrary Code September 13, 2012 - 6:00am Addthis PROBLEM: RSA BSAFE SSL-C Lets Remote Users Decrypt SSL/TLS Traffic and SSL Buffer Overflow Lets Remote Users Execute

  14. Frequency Modulation Spectroscopy Modeling for Remote Chemical Detection

    SciTech Connect (OSTI)

    Sheen, David M.

    2000-09-30

    Frequency modulation (FM) spectroscopy techniques show promise for active infrared remote chemical sensing. FM spectroscopy techniques have reduced sensitivity to optical and electronic noise, and are relatively immune to the effects of various electronic and mechanical drifts. FM systems are responsive to sharp spectral features and can therefore reduce the effects of spectral clutter due to interfering chemicals in the plume or in the atmosphere. The relatively high modulation frequencies used for FM also reduces the effects of albedo (reflectance) and plume variations. Conventional differential absorption lidar (DIAL) systems are performance limited by the noise induced by speckle. Analysis presented in this report shows that FM based sensors may reduce the effects of speckle by one to two orders of magnitude. This can result in reduced dwell times and faster area searches, as well as reducing various forms of spatial clutter. FM systems will require a laser system that is continuously tunable at relatively high frequencies (0.1 to 20 MHz). One promising candidate is the quantum-cascade (QC) laser [1, 2]. The QC laser is potentially capable of power levels on the order of 1 Watt and frequency tuning on the order of 3 - 6 GHz, which is the performance level required for FM spectroscopy based remote sensing. In this report we describe a high-level numerical model for an FM spectroscopy based remote sensing system, and application to two unmanned airborne vehicle (UAV) scenarios. A Predator scenario operating at a slant range of 6.5 km with a 10 cm diameter telescope, and a Global Hawk scenario operating at a range of 30 km with a 20 cm diameter telescope, has been assumed to allow estimation of the performance of potential FM systems.

  15. Remote-site power generation opportunities for Alaska

    SciTech Connect (OSTI)

    Jones, M.L.

    1997-03-01

    The Energy and Environmental Research Center (EERC) has been working with the Federal Energy Technology Center in Morgantown, West Virginia, to assess options for small, low-cost, environmental acceptable power generation for application in remote areas of Alaska. The goal of this activity was to reduce the use of fuel in Alaskan villages by developing small, low-cost power generation applications. Because of the abundance of high-quality coal throughout Alaska, emphasis was placed on clean coal applications, but other energy sources, including geothermal, wind, hydro, and coalbed methane, were also considered. The use of indigenous energy sources would provide cheaper cleaner power, reduce the need for PCE (Power Cost Equalization program) subsidies, increase self-sufficiency, and retain hard currency in the state while at the same time creating jobs in the region. The introduction of economical, small power generation systems into Alaska by US equipment suppliers and technology developers aided by the EERC would create the opportunities for these companies to learn how to engineer, package, transport, finance, and operate small systems in remote locations. All of this experience would put the US developers and equipment supply companies in an excellent position to export similar types of small power systems to rural areas or developing countries. Thus activities in this task that relate to determining the generic suitability of these technologies for other countries can increase US competitiveness and help US companies sell these technologies in foreign countries, increasing the number of US jobs. The bulk of this report is contained in the two appendices: Small alternative power workshop, topical report and Global market assessment of coalbed methane, fluidized-bed combustion, and coal-fired diesel technologies in remote applications.

  16. Geological and environmental remote sensing for international petroleum operations

    SciTech Connect (OSTI)

    Ellis, J.M.

    1995-11-01

    Remote sensing allows the petroleum industry to make better and quicker interpretations of geological and environmental conditions in areas of present and future operations. Often remote sensing (including aerial photographs) is required because existing maps are out-of-date, too small of scale, or provide only limited information. Implementing remote sensing can lead to lower project costs and reduced risk. The same satellite and airborne data can be used effectively for both geological and environmental applications. For example, earth scientists can interpret new lithologic, structural, and geomorphic information from near-infrared and radar imagery in terrains as diverse as barren desert and tropical jungle. Environmental applications with these and other imagery include establishing baselines, assessing impact by documenting changes through time, and mapping land-use, habitat, and vegetation. Higher resolution sensors provide an up-to-date overview of onshore and offshore petroleum facilities, whereas sensors capable of oblique viewing can be used to generate topographic maps. Geological application in Yemen involved merging Landsat TM and SPOT imagery to obtain exceptional lithologic discrimination. In the Congo, a topographic map to plan field operations was interpreted from the overlapping radar strips. Landsat MSS and TM, SPOT, and Russian satellite images with new aerial photographs are being used in the Tengiz supergiant oil field of Kazakhstan to help establish an environmental baseline, generate a base map, locate wells, plan facilities, and support a geographical information system (GIS). In the Niger delta, Landsat TM and SPOT are being used to plan pipeline routes and seismic lines, and to monitor rapid shoreline changes and population growth. Accurate coastlines, facility locations, and shoreline types are being extracted from satellite images for use in oil spill models.

  17. Wellhead to wire utilization of remote gas resources

    SciTech Connect (OSTI)

    Harris, R.A.; Hines, T.L.

    1998-12-31

    Utilization of remote gas resources in developing countries continues to offer challenges and opportunities to producers and contractors. The Aguaytia Gas and Power Project is an example where perseverance and creativity resulted in successful utilization of natural gas resources in the Ucayali Region of Central Peru, a country which previously had no natural gas infrastructure. The resource for the project was first discovered by Mobil in 1961, and remained undeveloped for over thirty years due to lack of infrastructure and markets. Maple Gas won a competitively bid contract to develop the Aguaytia gas reserves in March of 1993. The challenges facing Maple Gas were to develop downstream markets for the gas, execute contracts with Perupetro S.A. and other Peruvian government entities, raise financing for the project, and solicit and execute engineering procurement and construction (EPC) contracts for the execution of the project. The key to development of the downstream markets was the decision to generate electric power and transmit the power over the Andes to the main electrical grid along the coast of Peru. Supplemental revenue could be generated by gas sales to a small regional power plant and extraction of LPG and natural gasoline for consumption in the Peruvian market. Three separate lump sum contracts were awarded to Asea Brown Boveri (ABB) companies for the gas project, power project and transmission project. Each project presented its unique challenges, but the commonalities were the accelerated schedule, high rainfall in a prolonged wet season and severe logistics due to lack of infrastructure in the remote region. This presentation focuses on how the gas plant contractor, ABB Randall, working in harmony with the developer, Maple Gas, tackled the challenges to monetize a remote gas resource.

  18. Remote power systems with advanced storage technologies for Alaskan villages

    SciTech Connect (OSTI)

    Isherwood, W.; Smith, R.; Aceves, S.; Berry, G.; Clark, W.; Johnson, R.; Das, D.; Goering, D.; Seifert, R.

    1997-12-01

    Remote Alaskan communities pay economic and environmental penalties for electricity, because they must import diesel as their primary fuel for electric power production, paying heavy transportation costs and potentially causing environmental damage with empty drums, leakage, and spills. For these reasons, remote villages offer a viable niche market where sustainable energy systems based on renewable resources and advanced energy storage technologies can compete favorably on purely economic grounds, while providing environmental benefits. These villages can also serve as a robust proving ground for systematic analysis, study, improvement, and optimization of sustainable energy systems with advanced technologies. This paper presents an analytical optimization of a remote power system for a hypothetical Alaskan village. The analysis considers the potential of generating renewable energy (e.g., wind and solar), along with the possibility of using energy storage to take full advantage of the intermittent renewable sources available to these villages. Storage in the form of either compressed hydrogen or zinc pellets can then provide electricity from hydrogen or zinc-air fuel cells when renewable sources are unavailable.The analytical results show a great potential to reduce fossil fuel consumption and costs basing renewable energy combined with advanced energy storage devices. The best solution for our hypothetical village appears to be a hybrid energy system, which can reduce consumption of diesel fuel by over 50% with annualized cost savings by over 30% by adding wind turbines to the existing diesel generators. When energy storage devices are added, diesel fuel consumption and costs can be reduced substantially more. With optimized energy storage, use of the diesel generatorss can be reduced to almost zero, with the existing equipment only maintained for added reliability. However about one quarter of the original diesel consumption is still used for heating purposes

  19. Remotely operated excavator needs assessment/site visit summary

    SciTech Connect (OSTI)

    Straub, J.; Haller, S.; Worsley, R.; King, M.

    1992-12-02

    The Uranium in Soils Integrated Demonstration requested an assessment of soil excavation needs relative to soil remediation. The following list identifies the DOE sites assessed: Mound Laboratory, Paducah Gaseous Diffusion Plant, Portsmouth Gaseous Diffusion Plant, Nevada Test Site, Lawrence Livermore National Laboratory, Rocky Flats Plant, Los Alamos National Laboratory, Sandia National Laboratory, Idaho National Engineering Laboratory, Hanford Site, and Fernald Site. The reviewed sites fall into one or more of the following three categories: production, EPA National Priorities List, or CERCLA (superfund) designation. Only three of the sites appear to have the need for a remotely operated excavator rope. Hanford and Idaho Falls have areas of high-level radioactive contamination either buried or in/under buildings. The Fernald site has a need for remote operated equipment of different types. It is their feeling that remote equipment can be used to remove the health dangers to humans by removing them from the area. Most interviewees stated that characterization technologies needs are more immediate concern over excavation. In addition, the sites do not have similar geographic conditions which would aid in the development of a generic precision excavator. The sites visited were not ready to utilize or provide the required design information necessary to draft a performance specification. This creates a strong case against the development of one type of ROPE for use at these sites. Assuming soil characterization technology/methodology is improved sufficiently to allow accurate and real time field characterization then development of a precision excavator might be pursued based on FEMP needs, since the FEMP`s sole scope of work is remediation. The excavator could then be used/tested and then later modified for other sites as warranted.

  20. Advanced spent fuel conditioning process (ACP) progress with respect to remote operation and maintenance

    SciTech Connect (OSTI)

    Lee, Hyo Jik; Lee, Jong Kwang; Park, Byung Suk; Yoon, Ji Sup

    2007-07-01

    Korea Atomic Energy Research Institute (KAERI) has been developing an Advanced Spent Fuel Conditioning Process (ACP) to reduce the volume of spent fuel, and the construction of the ACP facility (ACPF) for a demonstration of its technical feasibility has been completed. In 2006 two inactive demonstrations were performed with simulated fuels in the ACPF. Accompanied by process equipment performance tests, its remote operability and maintainability were also tested during that time. Procedures for remote operation tasks are well addressed in this study and evaluated thoroughly. Also, remote maintenance and repair tasks are addressed regarding some important modules with a high priority order. The above remote handling test's results provided a lot of information such as items to be revised to improve the efficiency of the remote handling tasks. This paper deals with the current status of ACP and the progress of remote handling of ACPF. (authors)

  1. An Assessment of Remote Visual Testing System Capabilities for the Detection of Service Induced Cracking

    SciTech Connect (OSTI)

    Anderson, Michael T.; Cumblidge, Stephen E.; Doctor, Steven R.

    2005-09-01

    Remote visual testing is typically employed to ascertain the condition of materials in components that are inaccessible for direct examination. In the power and petrochemical industries, remote visual testing is used to assess whether service-related degradation is being manifested that, if left unchecked, may eventually impair the structural reliability of a component. Several codes and standards require that visual examinations be periodically conducted. Many of these inspections must be performed remotely due to harsh environments or design geometries of the subject components. This paper describes the attributes and limitations of remote visual testing, performance demonstration standards for camera systems, typical dimensions for service-induced cracking phenomena, and an assessment of the reliability of remote video camera systems at finding cracks. Because many forms of service-induced cracks have very small crack opening dimensions, the reliability of remote visual testing may not be adequate to ensure component integrity, given the capabilities of current camera systems and application practices.

  2. SMALL SCALE FUEL CELL AND REFORMER SYSTEMS FOR REMOTE POWER

    SciTech Connect (OSTI)

    Dennis Witmer

    2003-12-01

    New developments in fuel cell technologies offer the promise of clean, reliable affordable power, resulting in reduced environmental impacts and reduced dependence on foreign oil. These developments are of particular interest to the people of Alaska, where many residents live in remote villages, with no roads or electrical grids and a very high cost of energy, where small residential power systems could replace diesel generators. Fuel cells require hydrogen for efficient electrical production, however. Hydrogen purchased through conventional compressed gas suppliers is very expensive and not a viable option for use in remote villages, so hydrogen production is a critical piece of making fuel cells work in these areas. While some have proposed generating hydrogen from renewable resources such as wind, this does not appear to be an economically viable alternative at this time. Hydrogen can also be produced from hydrocarbon feed stocks, in a process known as reforming. This program is interested in testing and evaluating currently available reformers using transportable fuels: methanol, propane, gasoline, and diesel fuels. Of these, diesel fuels are of most interest, since the existing energy infrastructure of rural Alaska is based primarily on diesel fuels, but this is also the most difficult fuel to reform, due to the propensity for coke formation, due to both the high vaporization temperature and to the high sulfur content in these fuels. There are several competing fuel cell technologies being developed in industry today. Prior work at UAF focused on the use of PEM fuel cells and diesel reformers, with significant barriers identified to their use for power in remote areas, including stack lifetime, system efficiency, and cost. Solid Oxide Fuel Cells have demonstrated better stack lifetime and efficiency in demonstrations elsewhere (though cost still remains an issue), and procuring a system for testing was pursued. The primary function of UAF in the fuel cell

  3. Administering an epoch initiated for remote memory access

    SciTech Connect (OSTI)

    Blocksome, Michael A; Miller, Douglas R

    2014-03-18

    Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

  4. Administering an epoch initiated for remote memory access

    DOE Patents [OSTI]

    Blocksome, Michael A.; Miller, Douglas R.

    2013-01-01

    Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

  5. Administering an epoch initiated for remote memory access

    DOE Patents [OSTI]

    Blocksome, Michael A; Miller, Douglas R

    2012-10-23

    Methods, systems, and products are disclosed for administering an epoch initiated for remote memory access that include: initiating, by an origin application messaging module on an origin compute node, one or more data transfers to a target compute node for the epoch; initiating, by the origin application messaging module after initiating the data transfers, a closing stage for the epoch, including rejecting any new data transfers after initiating the closing stage for the epoch; determining, by the origin application messaging module, whether the data transfers have completed; and closing, by the origin application messaging module, the epoch if the data transfers have completed.

  6. Continuous remote unattended monitoring for safeguards data collection systems

    SciTech Connect (OSTI)

    Klosterbuer, S.F.; Halbig, J.K.; Harker, W.C.; Menlove, H.O.; Painter, J.A.; Stewart, J.E.

    1994-02-01

    To meet increased inspection requirements, unattended and remote monitoring systems have been developed and installed in several large facilities to perform safeguards functions. These unattended monitoring systems are based on instruments originally developed for traditional safeguards and the domestic nuclear industry to nondestructively assay nuclear materials. Through specialized measurement procedures, these instruments have been adapted to be unattended monitors. This paper defines the parts of these unattended monitoring systems, describes the systems that have been installed in the field and their status, and discusses future trends for unattended systems.

  7. Remote handling equipment at the hanford waste treatment plant

    SciTech Connect (OSTI)

    Bardal, M.A.; Roach, J.D.

    2007-07-01

    Cold war plutonium production led to extensive amounts of radioactive waste stored in tanks at the Department of Energy's Hanford Waste Treatment Plant. The storage tanks could potentially leak into the ground water and into the Columbia River. The solution for this risk of the leaking waste is vitrification. Vitrification is a process of mixing molten glass with radioactive waste to form a stable condition for storage. The Department of Energy has contracted Bechtel National, Inc. to build facilities at the Hanford site to process the waste. The waste will be separated into high and low level waste. Four major systems will process the waste, two pretreatment and two high level. Due to the high radiation levels, high integrity custom cranes have been designed to remotely maintain the hot cells. Several critical design parameters were implemented into the remote machinery design, including radiation limitations, remote operations, Important to Safety features, overall equipment effectiveness, minimum wall approaches, seismic constraints, and recovery requirements. Several key pieces of equipment were designed to meet these design requirements - high integrity crane bridges, trolleys, main hoists, mast hoists, slewing hoists, a monorail hoist, and telescoping mast deployed tele-robotic manipulator arms. There were unique and challenging design features and equipment needed to provide the remotely operated high integrity crane/manipulator systems for the Hanford Waste Treatment Plant. The cranes consist of a double girder bridge with various main hoist capacities ranging from one to thirty ton and are used for performing routine maintenance. A telescoping mast mounted tele-robotic manipulator arm with a one-ton hook is deployed from the trolley to perform miscellaneous operations in-cell. A dual two-ton slewing jib hoist is mounted to the bottom of the trolley and rotates 360 degrees around the mast allowing the closest hook wall approaches. Each of the two hoists on

  8. Nuclear reactor remote disconnect control rod coupling indicator

    DOE Patents [OSTI]

    Vuckovich, Michael

    1977-01-01

    A coupling indicator for use with nuclear reactor control rod assemblies which have remotely disengageable couplings between the control rod and the control rod drive shaft. The coupling indicator indicates whether the control rod and the control rod drive shaft are engaged or disengaged. A resistive network, utilizing magnetic reed switches, senses the position of the control rod drive mechanism lead screw and the control rod position indicating tube, and the relative position of these two elements with respect to each other is compared to determine whether the coupling is engaged or disengaged.

  9. Intergranular attack and stress corrosion cracking propagation behavior of alloy 600 in high-temperature caustic solution

    SciTech Connect (OSTI)

    Kawamura, H.; Hirano, H. . Komae Research Lab.)

    1999-06-01

    The effect of stress intensity factors (K) at the intergranular attack and stress corrosion crack (IGA/SCC) tips on the IGA/SCC propagation behavior of steam generator (SG) tubing was studied under accelerated test conditions. Values of K at the IGA/SCC crack tips were calculated using the statically indeterminate model. Based upon analysis of those factors, the double-cantilever beam (DCB) and SG model boiler tests were carried out to evaluate the effect of stress intensity on IGA/SCC crack propagation. K at the crack tips increased with increasing crack length. For a long crack, K decreased with an increasing number of cracks. However, for a short crack, K decreased slightly with an increasing number of cracks. DCB test results showed the IGA/SCC crack velocity of alloy 600 (UNS N06600) increased gradually with increasing K in the range from 15 MPa[radical]m to [approximately]60 MPa[radical]m. This is the range relevant to IGA/SCC crack tips of typical SG tubes under operating conditions of Pressurized-water reactors. Metallographic examination of tubes removed from the SG model boiler, fouled with 10 ppm sodium hydroxide (NaOH), showed IGA/SCC propagation rates were almost constant in the tested range of K.

  10. OE Announces Awardees Under the Remote Off-Grid Microgrid Design Support

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Tool Research Call | Department of Energy Awardees Under the Remote Off-Grid Microgrid Design Support Tool Research Call OE Announces Awardees Under the Remote Off-Grid Microgrid Design Support Tool Research Call September 15, 2015 - 9:50am Addthis The Office of Electricity Delivery and Energy Reliability has selected Lawrence Berkeley National Laboratory (LBNL) and Oak Ridge National Laboratory (ORNL) as awardees under the Remote Off-Grid Microgrid Design Support Tool Research Call. The

  11. Final remote-handled waste canister leaves Los Alamos National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Remote-handled waste canister leaves LANL Final remote-handled waste canister leaves Los Alamos National Laboratory The Laboratory began shipping the canisters exactly one month ago and averaged four shipments per week. July 2, 2009 Los Alamos National Laboratory sits on top of a once-remote mesa in northern New Mexico with the Jemez mountains as a backdrop to research and innovation covering multi-disciplines from bioscience, sustainable energy sources, to plasma physics and new materials. Los

  12. Development of a Remote Monitoring Sensor Network for In-Situ Decommissioned Structures

    Office of Environmental Management (EM)

    10-01666, Revision 0 Key Words: in situ decommissioning sensor remote monitoring end state Retention: Permanent DEVELOPMENT OF A REMOTE MONITORING SENSOR NETWORK FOR IN SITU DECOMMISSIONED STRUCTURES Panel Report November 2010 Savannah River National Laboratory Savannah River Nuclear Solutions Aiken, SC 29808 Prepared for the U.S. Department of Energy Under Contract Number DE-AC09-08SR22470 Development of a Remote Monitoring Sensor Network Page 2 of 34 for In Situ Decommissioned Structures

  13. ARG-US Remote Area Modular Monitoring (RAMM) | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ARG-US Remote Area Modular Monitoring (RAMM) ARG-US Remote Area Modular Monitoring (RAMM) Scientists at Argonne National Laboratory have developed a technology to make nuclear and radiological facilities safer by better monitoring both plant conditions as well as the most sensitive materials onsite. The patent-pending system, called ARG-US Remote Area Modular Monitoring, or RAMM, uses hig- tech sensors paired with redundant, self-healing communications platforms that can work even in the most

  14. V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Login Anonymously | Department of Energy 5: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously V-235: Cisco Mobility Services Engine Configuration Error Lets Remote Users Login Anonymously September 5, 2013 - 12:33am Addthis PROBLEM: A vulnerability was reported in Cisco Mobility Services Engine. A remote user can login anonymously. PLATFORM: Cisco Mobility Services Engine ABSTRACT: A vulnerability in Cisco Mobility Services Engine could allow an

  15. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Controls | Department of Energy 36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple

  16. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sensitive Information | Department of Energy 53: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information December 7, 2011 - 7:30am Addthis PROBLEM: Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) Red Hat Enterprise Linux Server (v. 6) Red Hat

  17. U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Arbitrary Code and Deny Service | Department of Energy 79: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service U-279: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service October 11, 2012 - 6:00am Addthis PROBLEM: Cisco Firewall Services Module Bugs Let Remote Users Execute Arbitrary Code and Deny Service PLATFORM: Version(s): prior to 4.1(9) ABSTRACT: Several vulnerabilities were reported in Cisco Firewall

  18. V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service | Department

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of Energy 5: Cisco ASA Multiple Bugs Let Remote Users Deny Service V-135: Cisco ASA Multiple Bugs Let Remote Users Deny Service April 16, 2013 - 12:21am Addthis PROBLEM: Cisco ASA Multiple Bugs Let Remote Users Deny Service PLATFORM: Cisco ASA Software for Cisco ASA 5500 Series Adaptive Security Appliances, Cisco ASA Services Module for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers, and Cisco ASA 1000V Cloud Firewall are affected by multiple vulnerabilities. Affected

  19. U-170: Apple QuickTime Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Apple QuickTime. A remote user can cause arbitrary code to be executed on the target user's system.

  20. T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 5: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code T-545: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code January 28, 2011 - 7:21am Addthis PROBLEM: RealPlayer Heap Corruption Error in 'vidplin.dll' Lets Remote Users Execute Arbitrary Code. PLATFORM: RealPlayer 14.0.1 and prior versions ABSTRACT: A vulnerability was reported in RealPlayer. A remote user can

  1. U-036: Apple iOS Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create content that, when loaded by the target user, will execute arbitrary code on or obtain potentially sensitive information from the target user's system.

  2. U-096: IBM AIX TCP Large Send Offload Bug Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A remote user can send a series of specially crafted TCP packets to trigger a kernel panic on the target system.

  3. Sandia to Partner with MOgene Green Chemicals on ARPA-E REMOTE...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Partner with MOgene Green Chemicals on ARPA-E REMOTE Project - Sandia Energy Energy Search Icon Sandia Home Locations Contact Us Employee Locator Energy & Climate Secure & ...

  4. U-080: Linux Kernel XFS Heap Overflow May Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in the Linux Kernel. A remote user can cause arbitrary code to be executed on the target user's system.

  5. Using remote sensing to quantify albedo of roofs in seven California...

    Office of Scientific and Technical Information (OSTI)

    2: Results and application to climate modeling Citation Details In-Document Search This content will become publicly available on February 23, 2017 Title: Using remote sensing to ...

  6. Remote-Handled Low-Level Waste (RHLLW) Disposal Project Code of Record

    SciTech Connect (OSTI)

    S.L. Austad, P.E.; L.E. Guillen, P.E.; C. W. McKnight, P.E.; D. S. Ferguson, P.E.

    2010-10-01

    The Remote-Handled Low-Level Waste Disposal Project addresses an anticipated shortfall in remote-handled LLW disposal capability following cessation of operations at the existing facility, which will continue until it is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of fiscal year 2015). Development of a new onsite disposal facility, the highest ranked alternative, will provide necessary remote handled LLW disposal capability and will ensure continuity of operations that generate remote-handled LLW. This report documents the Code of Record for design of a new LLW disposal capability.

  7. T-538: HP OpenView Storage Data Protector Bug Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in HP OpenView Storage Data Protector. A remote user can execute arbitrary code on the target system.

  8. U-201: HP System Management Homepage Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    The vulnerabilities could be exploited remotely resulting in unauthorized access, disclosure of information, data modification, Denial of Service (DoS), and execution of arbitrary code.

  9. U-133: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  10. U-143: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system.

  11. U-041: Google Chrome Out-of-Bounds Write Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  12. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands

    Broader source: Energy.gov [DOE]

    A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system.

  13. T-598: Apache Tomcat HTTP BIO Connector Error Discloses Information From Different Requests to Remote Users

    Broader source: Energy.gov [DOE]

    When using HTTP pipelining, the system may return information from a different request to a remote user. The vulnerability resides in the HTTP BIO connector.

  14. U-136: Adobe Flash Player Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Adobe Flash Player. A remote user can cause arbitrary code to be executed on the target user's system.

  15. T-718:Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  16. U-079: Adobe Acrobat/Reader Multiple Bugs Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create a file that, when loaded by the target user, will execute arbitrary code on the target user's system.

  17. MHK ISDB/Instruments/HOBO RX3000 Remote Monitoring System | Open...

    Open Energy Info (EERE)

    Pro processing software recommended. Weatherproof enclosure ( NEMA 4x), powered by ONSET solar panel, AC adapter, or DC power supply. Ethernet, WiFi, and Cellular remote...

  18. U-166: Adobe Shockwave Player Memory Corruption Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities were reported in Adobe Shockwave Player. A remote user can cause arbitrary code to be executed on the target user's system.

  19. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  20. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration.

  1. U-053: Linux kexec Bugs Let Local and Remote Users Obtain Potentially...

    Office of Environmental Management (EM)

    Linux kexec Bugs Let Local and Remote Users Obtain Potentially Sensitive Information . PLATFORM: Red Hat Enterprise Linux Desktop (v. 6) Red Hat Enterprise Linux HPC Node (v. 6) ...

  2. Antitrust implications of utility participation in the market for remote photovoltaic systems

    SciTech Connect (OSTI)

    Starrs, T.J.

    1994-12-31

    Remote photovoltaic systems are an important niche market in the development of a viable photovoltaics industry. Electric utilities in the US have started offering remote photovoltaic service. Utilities have the potential to use their monopoly power in regulated markets to unfair competitive advantage in competitive markets. Therefore, utility participation in remote photovoltaic markets raises potentially significant issues of antitrust law and policy. This paper describes some of the legal and factual criteria that US courts and regulatory agencies are likely to use in assessing the antitrust implications of utility participation in the market for remote photovoltaic systems.

  3. U-160: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Several vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system

  4. V-210: HP LaserJet Pro Printer Bug Lets Remote Users Access Data

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with certain HP LaserJet Pro printers. The vulnerability could be exploited remotely to gain unauthorized access to data.

  5. Energy Department Announces Request for Information on the Remote Alaskan Communities Energy Efficiency Competition

    Broader source: Energy.gov [DOE]

    The Energy Department announced today a Request for Information (RFI) to help shape the design of a newly proposed initiative - a Remote Alaskan Communities Energy Efficiency Competition.

  6. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Password | Department of Energy 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker

  7. T-692: VMware vFabric tc Server Lets Remote Users Login Using...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can login using an obfuscated version of their password. PLATFORM: ... user can use the password in obfuscated form (or in plain text form) to authenticate. ...

  8. U-004:Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can create HTML that, when loaded by the target user, will execute arbitrary code on the target user's system.

  9. Use of ARM/NSA Data to Validate and Improve the Remote Sensing...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ARMNSA Data to Validate and Improve the Remote Sensing Retrieval of Cloud and Surface ... North Slope of Alaska (NSA) through the Atmospheric Radiation Measurement (ARM) Program. ...

  10. U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy 91: cURL Lets Remote Users Decrypt SSL/TLS Traffic U-091: cURL Lets Remote Users Decrypt SSL/TLS Traffic January 30, 2012 - 6:45am Addthis PROBLEM: A vulnerability was reported in cURL. PLATFORM: Linux (Any), UNIX (Any), Windows (Any) : Version(s): 7.10.6 through 7.23.1 ABSTRACT: A remote user can decrypt SSL/TLS sessions in certain cases. reference LINKS: CVE-2011-3389 SecurityTracker Alert ID: 1026587 Vendor Advisory IMPACT ASSESSMENT: Moderate Discussion: A remote user with the

  11. U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 07: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service U-107: Cisco NX-OS IP Packet Processing Flaw Lets Remote Users Deny Service February 21, 2012 - 6:00am Addthis PROBLEM: A vulnerability was reported in Cisco NX-OS. A remote user can cause denial of service conditions. PLATFORM: Nexus 1000v, 5000, and 7000 Series Switches ABSTRACT: A remote user can send a specially crafted IP packet to cause the target device to reload. reference LINKS: Cisco

  12. U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addresses | Department of Energy 39: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses U-239: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses August 20, 2012 - 7:00am Addthis PROBLEM: Apple iPhone SMS Processing Flaw Lets Remote Users Spoof SMS Source Addresses PLATFORM: Version(s): 6 beta 4 and prior versions ABSTRACT: A remote user can spoof SMS source addresses. Reference LINKS: SecurityTracker Alert ID: 1027410 Apple.com PCMag.com

  13. U-275: HP IBRIX X9000 Storage Discloses Information to Remote Users

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP IBRIX X9000 Storage. The vulnerability could be remotely exploited to allow disclosure of information.

  14. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Articles U-083:Oracle Critical Patch Update Advisory - January 2012 V-067: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code T-576: Oracle Solaris Adobe Flash Player...

  15. T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges.

  16. Deterministic generation of remote entanglement with active quantum feedback

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Martin, Leigh; Motzoi, Felix; Li, Hanhan; Sarovar, Mohan; Whaley, K. Birgitta

    2015-12-10

    We develop and study protocols for deterministic remote entanglement generation using quantum feedback, without relying on an entangling Hamiltonian. In order to formulate the most effective experimentally feasible protocol, we introduce the notion of average-sense locally optimal feedback protocols, which do not require real-time quantum state estimation, a difficult component of real-time quantum feedback control. We use this notion of optimality to construct two protocols that can deterministically create maximal entanglement: a semiclassical feedback protocol for low-efficiency measurements and a quantum feedback protocol for high-efficiency measurements. The latter reduces to direct feedback in the continuous-time limit, whose dynamics can bemore » modeled by a Wiseman-Milburn feedback master equation, which yields an analytic solution in the limit of unit measurement efficiency. Our formalism can smoothly interpolate between continuous-time and discrete-time descriptions of feedback dynamics and we exploit this feature to derive a superior hybrid protocol for arbitrary nonunit measurement efficiency that switches between quantum and semiclassical protocols. Lastly, we show using simulations incorporating experimental imperfections that deterministic entanglement of remote superconducting qubits may be achieved with current technology using the continuous-time feedback protocol alone.« less

  17. Cooling tower and plume modeling for satellite remote sensing applications

    SciTech Connect (OSTI)

    Powers, B.J.

    1995-05-01

    It is often useful in nonproliferation studies to be able to remotely estimate the power generated by a power plant. Such information is indirectly available through an examination of the power dissipated by the plant. Power dissipation is generally accomplished either by transferring the excess heat generated into the atmosphere or into bodies of water. It is the former method with which we are exclusively concerned in this report. We discuss in this report the difficulties associated with such a task. In particular, we primarily address the remote detection of the temperature associated with the condensed water plume emitted from the cooling tower. We find that the effective emissivity of the plume is of fundamental importance for this task. Having examined the dependence of the plume emissivity in several IR bands and with varying liquid water content and droplet size distributions, we conclude that the plume emissivity, and consequently the plume brightness temperature, is dependent upon not only the liquid water content and band, but also upon the droplet size distribution. Finally, we discuss models dependent upon a detailed point-by-point description of the hydrodynamics and thermodynamics of the plume dynamics and those based upon spatially integrated models. We describe in detail a new integral model, the LANL Plume Model, which accounts for the evolution of the droplet size distribution. Some typical results obtained from this model are discussed.

  18. Deterministic generation of remote entanglement with active quantum feedback

    SciTech Connect (OSTI)

    Martin, Leigh; Motzoi, Felix; Li, Hanhan; Sarovar, Mohan; Whaley, K. Birgitta

    2015-12-10

    We develop and study protocols for deterministic remote entanglement generation using quantum feedback, without relying on an entangling Hamiltonian. In order to formulate the most effective experimentally feasible protocol, we introduce the notion of average-sense locally optimal feedback protocols, which do not require real-time quantum state estimation, a difficult component of real-time quantum feedback control. We use this notion of optimality to construct two protocols that can deterministically create maximal entanglement: a semiclassical feedback protocol for low-efficiency measurements and a quantum feedback protocol for high-efficiency measurements. The latter reduces to direct feedback in the continuous-time limit, whose dynamics can be modeled by a Wiseman-Milburn feedback master equation, which yields an analytic solution in the limit of unit measurement efficiency. Our formalism can smoothly interpolate between continuous-time and discrete-time descriptions of feedback dynamics and we exploit this feature to derive a superior hybrid protocol for arbitrary nonunit measurement efficiency that switches between quantum and semiclassical protocols. Lastly, we show using simulations incorporating experimental imperfections that deterministic entanglement of remote superconducting qubits may be achieved with current technology using the continuous-time feedback protocol alone.

  19. Increasing the effectiveness of reachback and remote command and control

    SciTech Connect (OSTI)

    McGee, David R.

    2002-12-02

    Commanders and their staff, when geographically dispersed, continue to choose what they find to be the most effective remote collaboration tools: email and radio messages. Even command and control systems that provide a unified view of the battlefield among remote collaborators are often supplanted by more traditional tools, such as a large paper map (McGee, Cohen & Wu, 2000). Indeed, today's computer interfaces often impose too high a barrier for the capture and delivery of situational assessment (McGee, Cohen, Wesson & Horman, 2002). To compensate, commanders traditionally meet face-to-face at least once daily to debrief each other on the outcome of the day's fight and to coordinate a strategy for the next day's engagement. Each of these meetings presents a risk to commanders, in addition to lost time during travel and various other concerns. Ongoing activity at higher echelons may consist of this activity continuously. At lower echelons, coordination is typically mediated by a radio or other messaging platform. Common to each of these scenarios, the coordination and collaboration is mediated by physical tools, e.g., an up-to-date common operational picture. Much of the promise of collaboration technology, from video-conferencing to realtime collaboration tools, is meant to alleviate the need for face-to-face meetings and improve moment-to-moment coordination. However, these tools fall woefully short of meeting the needs of commanders in the battlefield.

  20. When Utility Bills Attack!

    Broader source: Energy.gov [DOE]

    As proactive as I am with my monthly budgeting, I tend to be reactive when it comes to my monthly utility bills.

  1. Inhibitory effect of boric acid on intergranular attack and stress corrosion cracking of Alloy 600 in high temperature water

    SciTech Connect (OSTI)

    Kawamura, H.; Hirano, H.; Koike, M.; Suda, M.

    1995-09-01

    The inhibitory effect of boric acid on the Intergranular Attack and Stress Corrosion Cracking (IGA/SCC) propagation behavior of steam generator (SG) tubing was studied under accelerated test conditions. Based on the analysis results of stress intensity factors at IGA/SCC crack tips, the notched C-ring tests were carried out to evaluate the effect of stress intensity and boric acid on the IGA/SCC crack propagation. The A.C. impedance measurement and Auger electron spectroscopy (AES) were also conducted to clarify the inhibitory effect of boric acid. Notched C-ring test results indicated that IGA/SCC crack velocity of alloy 600 increased gradually with increasing stress intensity factor in the range 4 to about 26 MPa{center_dot}m{sup 1/2}, which might be loaded on the IGA/SCC crack tips of actual SG tubes under PWR secondary conditions. Adding boric acid slightly retarded the crack velocity in both all volatile treatment (AVT) water and caustic solutions. IGA/SCC crack velocities were lower in nearly neutral solutions than in alkali or acidic solutions. Furthermore, A.C. impedance studies showed that the polarization resistances of oxide films formed in boric acid solutions were higher than those of films formed in acidic and alkali solutions. AES analysis revealed that boron content in the oxide films formed in acidic solution containing boric acid was lowest. Good agreement was obtained between the IGA/SCC inhibitory effect of boric acid and the formation of the stable oxide films containing boron.

  2. Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack

    SciTech Connect (OSTI)

    Stein, Steven L.; Lesperance, Ann M.; Upton, Jaki F.

    2010-02-01

    On October 9, 2008, federal, state and local policy makers, emergency managers, and medical and public health officials convened in Seattle, Washington, for a workshop on Addressing the Federal-State-Local Interface Issues During a Catastrophic Event Such as an Anthrax Attack. The day-long symposium was aimed at generating a dialogue about recovery and restoration through a discussion of the associated challenges that impact entire communities, including people, infrastructure, and critical systems. The Principal Federal Official (PFO) provided an overview of the role of the PFO in a catastrophic event. A high-level summary of an anthrax scenario was presented. The remainder of the day was focused on interactive discussions among federal, state and local emergency management experts in the areas of: • Decision-making, prioritization, and command and control • Public health/medical services • Community resiliency and continuity of government. Key topics and issues that resulted from discussions included: • Local representation in the Joint Field Office (JFO) • JFO transition to the Long-Term Recovery Office • Process for prioritization of needs • Process for regional coordination • Prioritization - process and federal/military intervention • Allocation of limited resources • Re-entry decision and consistency • Importance of maintaining a healthy hospital system • Need for a process to establish a consensus on when it is safe to re-enter. This needs to be across all jurisdictions including the military. • Insurance coverage for both private businesses and individuals • Interaction between the government and industry. The symposium was sponsored by the Interagency Biological Restoration Demonstration, a collaborative regional program jointly funded by the U.S. Department of Homeland Security and the U.S. Department of Defense. To aid the program’s efforts and inform the development of blueprint for recovery from a biological incident

  3. Developing health-based pre-planning clearance goals for airport remediation following a chemical terrorist attack: Decision criteria for multipathway exposure routes

    SciTech Connect (OSTI)

    Watson, Annetta Paule; Dolislager, Frederick; Hall, Dr. Linda; Hauschild, Veronique; Raber, Ellen; Love, Dr. Adam

    2011-01-01

    In the event of a chemical terrorist attack on a transportation hub, post-event remediation and restoration activities necessary to attain unrestricted facility re-use and re-entry could require hours to multiple days. While timeframes are dependent on numerous variables, a primary controlling factor is the level of pre-planning and decision-making completed prior to chemical release. What follows is the second of a two-part analysis identifying key considerations, critical information and decision criteria to facilitate post-attack and post-decontamination consequence management activities. Decision criteria analysis presented here provides first-time, open-literature documentation of multi-pathway, health-based remediation exposure guidelines for selected toxic industrial compounds, chemical warfare agents, and agent degradation products for pre-planning application in anticipation of a chemical terrorist attack. Guideline values are provided for inhalation and direct ocular vapor exposure routes as well as percutaneous vapor, surface contact, and ingestion. Target populations include various employees as well as transit passengers. This work has been performed as a national case study conducted in partnership with the Los Angeles International Airport and The Bradley International Terminal. All recommended guidelines have been selected for consistency with airport scenario release parameters of a one-time, short-duration, finite airborne release from a single source followed by compound-specific decontamination.

  4. Remote sensing-based estimation of annual soil respiration at two contrasting forest sites

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Gu, Lianhong; Huang, Ni; Black, T. Andrew; Wang, Li; Niu, Zheng

    2015-11-23

    Soil respiration (Rs), an important component of the global carbon cycle, can be estimated using remotely sensed data, but the accuracy of this technique has not been thoroughly investigated. In this article, we proposed a methodology for the remote estimation of annual Rs at two contrasting FLUXNET forest sites (a deciduous broadleaf forest and an evergreen needleleaf forest).

  5. Remote high-temperature insulatorless heat-flux gauge

    DOE Patents [OSTI]

    Noel, Bruce W. (Espanola, NM)

    1993-01-01

    A remote optical heat-flux gauge for use in extremely high temperature environments is described. This application is possible because of the use of thermographic phosphors as the sensing media, and the omission of the need for an intervening layer of insulator between phosphor layers. The gauge has no electrical leads, but is interrogated with ultraviolet or laser light. The luminescence emitted by the two phosphor layers, which is indicative of the temperature of the layers, is collected and analyzed in order to determine the heat flux incident on the surface being investigated. The two layers of thermographic phosphor must be of different materials to assure that the spectral lines collected will be distinguishable. Spatial heat-flux measurements can be made by scanning the light across the surface of the gauge.

  6. Remote high-temperature insulatorless heat-flux gauge

    DOE Patents [OSTI]

    Noel, B.W.

    1993-12-28

    A remote optical heat-flux gauge for use in extremely high temperature environments is described. This application is possible because of the use of thermographic phosphors as the sensing media, and the omission of the need for an intervening layer of insulator between phosphor layers. The gauge has no electrical leads, but is interrogated with ultraviolet or laser light. The luminescence emitted by the two phosphor layers, which is indicative of the temperature of the layers, is collected and analyzed in order to determine the heat flux incident on the surface being investigated. The two layers of thermographic phosphor must be of different materials to assure that the spectral lines collected will be distinguishable. Spatial heat-flux measurements can be made by scanning the light across the surface of the gauge. 3 figures.

  7. Field Deployable Tritium Assay System Remote Control Software

    Energy Science and Technology Software Center (OSTI)

    1998-05-12

    The FDTASREM software is a command control based application for the Field Deployable Tritium Assay System (FDTAS-Invention Disclosure SRS-96-091 has been submitted). The program runs on the Remote computer which is located at the field site with the FDTAS sampling and analysis components. The application executes commands received over the connected phone line from the operator via the FDTAS Host GUI running in the laboratory some distance away. The FDTASREM controls interface with the FDTASmore » auto sampler and the analysis systems. It tells the sampler to take a sample from a specified location and send it to the analyzer. Once the sample is sent to the analyzer, FDTASREM sequences the internal valves and pumps to deliver the sample and cocktail to the counting chamber. Once the analysis is complete, the program can execute the clean command and prepare the system for the next sample.« less

  8. Field Deployable Tritium Assay System Remote Control Software

    SciTech Connect (OSTI)

    1998-05-12

    The FDTASREM software is a command control based application for the Field Deployable Tritium Assay System (FDTAS-Invention Disclosure SRS-96-091 has been submitted). The program runs on the Remote computer which is located at the field site with the FDTAS sampling and analysis components. The application executes commands received over the connected phone line from the operator via the FDTAS Host GUI running in the laboratory some distance away. The FDTASREM controls interface with the FDTAS auto sampler and the analysis systems. It tells the sampler to take a sample from a specified location and send it to the analyzer. Once the sample is sent to the analyzer, FDTASREM sequences the internal valves and pumps to deliver the sample and cocktail to the counting chamber. Once the analysis is complete, the program can execute the clean command and prepare the system for the next sample.

  9. Magnetic resonance imaging of living systems by remote detection

    DOE Patents [OSTI]

    Wemmer, David; Pines, Alexander; Bouchard, Louis; Xu, Shoujun; Harel, Elad; Budker, Dmitry; Lowery, Thomas; Ledbetter, Micah

    2013-10-29

    A novel approach to magnetic resonance imaging is disclosed. Blood flowing through a living system is prepolarized, and then encoded. The polarization can be achieved using permanent or superconducting magnets. The polarization may be carried out upstream of the region to be encoded or at the place of encoding. In the case of an MRI of a brain, polarization of flowing blood can be effected by placing a magnet over a section of the body such as the heart upstream of the head. Alternatively, polarization and encoding can be effected at the same location. Detection occurs at a remote location, using a separate detection device such as an optical atomic magnetometer, or an inductive Faraday coil. The detector may be placed on the surface of the skin next to a blood vessel such as a jugular vein carrying blood away from the encoded region.

  10. Remote multi-position information gathering system and method

    DOE Patents [OSTI]

    Hirschfeld, Tomas B. (Livermore, CA)

    1989-01-01

    A technique for gathering specific information from various remote locations, especially fluorimetric information characteristic of particular materials at the various locations is disclosed herein. This technique uses a single source of light disposed at still a different, central location and an overall optical network including an arrangement of optical fibers cooperating with the light source for directing individual light beams into the different information bearing locations. The incoming light beams result in corresponding displays of light, e.g., fluorescent light, containing the information to be obtained. The optical network cooperates with these light displays at the various locations for directing outgoing light beams containing the same information as their cooperating displays from these locations to the central location. Each of these outgoing beams is applied to a detection arrangement, e.g., a fluorescence spectroscope, for retrieving the information contained thereby.

  11. Reliability review of the remote tool delivery system locomotor

    SciTech Connect (OSTI)

    Chesser, J.B.

    1999-04-01

    The locomotor being built by RedZone Robotics is designed to serve as a remote tool delivery (RID) system for waste retrieval, tank cleaning, viewing, and inspection inside the high-level waste tanks 8D-1 and 8D-2 at West Valley Nuclear Services (WVNS). The RTD systm is to be deployed through a tank riser. The locomotor portion of the RTD system is designed to be inserted into the tank and is to be capable of moving around the tank by supporting itself and moving on the tank internal structural columns. The locomotor will serve as a mounting platform for a dexterous manipulator arm. The complete RTD system consists of the locomotor, dexterous manipulator arm, cameras, lights, cables, hoses, cable/hose management system, power supply, and operator control station.

  12. Remote multi-position information gathering system and method

    DOE Patents [OSTI]

    Hirschfeld, Tomas B. (Livermore, CA)

    1986-01-01

    A technique for gathering specific information from various remote locations, especially fluorimetric information characteristic of particular materials at the various locations is disclosed herein. This technique uses a single source of light disposed at still a different, central location and an overall optical network including an arrangement of optical fibers cooperating with the light source for directing individual light beams into the different information bearing locations. The incoming light beams result in corresponding displays of light, e.g., fluorescent light, containing the information to be obtained. The optical network cooperates with these light displays at the various locations for directing ongoing light beams containing the same information as their cooperating displays from these locations to the central location. Each of these outgoing beams is applied to a detection arrangement, e.g., a fluorescence spectroscope, for retrieving the information contained thereby.

  13. Remote multi-position information gathering system and method

    DOE Patents [OSTI]

    Hirschfeld, T.B.

    1986-12-02

    A technique for gathering specific information from various remote locations, especially fluorimetric information characteristic of particular materials at the various locations is disclosed herein. This technique uses a single source of light disposed at still a different, central location and an overall optical network including an arrangement of optical fibers cooperating with the light source for directing individual light beams into the different information bearing locations. The incoming light beams result in corresponding displays of light, e.g., fluorescent light, containing the information to be obtained. The optical network cooperates with these light displays at the various locations for directing outgoing light beams containing the same information as their cooperating displays from these locations to the central location. Each of these outgoing beams is applied to a detection arrangement, e.g., a fluorescence spectroscope, for retrieving the information contained thereby. 9 figs.

  14. Remote multi-position information gathering system and method

    DOE Patents [OSTI]

    Hirschfeld, T.B.

    1989-01-24

    A technique for gathering specific information from various remote locations, especially fluorimetric information characteristic of particular materials at the various locations is disclosed herein. This technique uses a single source of light disposed at still a different, central location and an overall optical network including an arrangement of optical fibers cooperating with the light source for directing individual light beams into the different information bearing locations. The incoming light beams result in corresponding displays of light, e.g., fluorescent light, containing the information to be obtained. The optical network cooperates with these light displays at the various locations for directing outgoing light beams containing the same information as their cooperating displays from these locations to the central location. Each of these outgoing beams is applied to a detection arrangement, e.g., a fluorescence spectroscope, for retrieving the information contained thereby. 9 figs.

  15. Remote visual inspection for NDE in power plants

    SciTech Connect (OSTI)

    Samsonov, P. )

    1993-06-01

    Remote visual inspection equipment such as borescopes, and video scopes give power plant nondestructive examination (NDE) groups the necessary tools to establish superior corrective and preventive plant maintenance programs. These scopes allow the user to evaluate the condition of pipes, boilers, turbines, heat exchangers, and other critical machinery without costly and time-consuming disassembly. Overall plant efficiency is increased and the likelihood of catastrophic failure is reduced significantly. Insertion diameters vary from 0.6 mm to 20 mm and come in lengths of just a few inches to as long as 100 ft. (30 m). Ancillary equipment such as video and digital processors provides a permanent record of the inspection and uses sophisticated three-dimensional (3-D) measurement, trend analysis, documentation, and image manipulation.

  16. System and method for inventorying multiple remote objects

    DOE Patents [OSTI]

    Carrender, Curtis L.; Gilbert, Ronald W.

    2009-12-29

    A system and method of inventorying multiple objects utilizing a multi-level or a chained radio frequency identification system. The system includes a master tag and a plurality of upper level tags and lower level tags associated with respective objects. The upper and lower level tags communicate with each other and the master tag so that reading of the master tag reveals the presence and absence of upper and lower level tags. In the chained RF system, the upper and lower level tags communicate locally with each other in a manner so that more remote tags that are out of range of some of the upper and lower level tags have their information relayed through adjacent tags to the master tag and thence to a controller.

  17. System and method for inventorying multiple remote objects

    DOE Patents [OSTI]

    Carrender, Curtis L.; Gilbert, Ronald W.

    2007-10-23

    A system and method of inventorying multiple objects utilizing a multi-level or a chained radio frequency identification system. The system includes a master tag and a plurality of upper level tags and lower level tags associated with respective objects. The upper and lower level tags communicate with each other and the master tag so that reading of the master tag reveals the presence and absence of upper and lower level tags. In the chained RF system, the upper and lower level tags communicate locally with each other in a manner so that more remote tags that are out of range of some of the upper and lower level tags have their information relayed through adjacent tags to the master tag and thence to a controller.

  18. Remote NMR/MRI detection of laser polarized gases

    DOE Patents [OSTI]

    Pines, Alexander; Saxena, Sunil; Moule, Adam; Spence, Megan; Seeley, Juliette A.; Pierce, Kimberly L.; Han, Song-I; Granwehr, Josef

    2006-06-13

    An apparatus and method for remote NMR/MRI spectroscopy having an encoding coil with a sample chamber, a supply of signal carriers, preferably hyperpolarized xenon and a detector allowing the spatial and temporal separation of signal preparation and signal detection steps. This separation allows the physical conditions and methods of the encoding and detection steps to be optimized independently. The encoding of the carrier molecules may take place in a high or a low magnetic field and conventional NMR pulse sequences can be split between encoding and detection steps. In one embodiment, the detector is a high magnetic field NMR apparatus. In another embodiment, the detector is a superconducting quantum interference device. A further embodiment uses optical detection of Rb--Xe spin exchange. Another embodiment uses an optical magnetometer using non-linear Faraday rotation. Concentration of the signal carriers in the detector can greatly improve the signal to noise ratio.

  19. System, method, and apparatus for remote measurement of terrestrial biomass

    DOE Patents [OSTI]

    Johnson, Patrick W

    2011-04-12

    A system, method, and/or apparatus for remote measurement of terrestrial biomass contained in vegetative elements, such as large tree boles or trunks present in an area of interest, are provided. The method includes providing an airborne VHF radar system in combination with a LiDAR system, overflying the area of interest while directing energy toward the area of interest, using the VHF radar system to collect backscatter data from the trees as a function of incidence angle and frequency, and determining a magnitude of the biomass from the backscatter data and data from the laser radar system for each radar resolution cell. A biomass map is generated showing the magnitude of the biomass of the vegetative elements as a function of location on the map by using each resolution cell as a unique location thereon. In certain preferred embodiments, a single frequency is used with a linear array antenna.

  20. Wireless remote radiation monitoring system (WRRMS). Innovative technology summary report

    SciTech Connect (OSTI)

    Not Available

    1998-12-01

    The Science Application International Corporation (SAIC) RadStar{trademark} wireless remote radiation monitoring system (WRRMS) is designed to provide real-time monitoring of the radiation dose to workers as they perform work in radiologically contaminated areas. WRRMS can also monitor dose rates in a room or area. The system uses radio-frequency communications to transmit dose readings from the wireless dosimeters worn by workers to a remote monitoring station that can be located out of the contaminated area. Each base station can monitor up to 16 workers simultaneously. The WRRMS can be preset to trigger both audible and visual alarms at certain dose rates. The alarms are provided to the worker as well as the base station operator. This system is particularly useful when workers are wearing personal protective clothing or respirators that make visual observation of their self-reading dosimeters (SRDs), which are typically used to monitor workers, more difficult. The base station is an IBM-compatible personal computer that updates and records information on individual workers every ten seconds. Although the equipment costs for this improved technology are higher than the SRDs (amortized at $2.54/hr versus $1.02/hr), total operational costs are actually less ($639/day versus $851/day). This is because the WRRMS requires fewer workers to be in the contaminated zone than the traditional (baseline) technology. There are also intangible benefits associated with improved worker safety and as low as reasonably achievable (ALARA) principles, making the WRRMS an attractive alternative to the baseline technology. The baseline technology measures only integrated dose and requires workers to check their own dosimeters manually during the task.

  1. REMOTE FIELD EDDY CURRENT INSPECTION OF UNPIGGABLE PIPELINES

    SciTech Connect (OSTI)

    Albert Teitsma

    2004-03-01

    The Remote Field Eddy Current (RFEC) technique is ideal for inspecting unpiggable pipelines because all its components can be made much smaller than the diameter of the pipe to be inspected. We reviewed the technique, and used demonstrations from prior work by others in presentations on the technique and how we plan to develop it. Coils were wound; a jig for pulling the coils through the pipe was manufactured; defects were machined in one six-inch diameter, ten-foot long pipe; and the equipment was assembled. After completing first crude pullout test to show that RFEC inspection would work, we repeated the experiment with a proper jig and got excellent results. The test showed the expected behavior, with the direct field dominating the signal to about two pipe diameters from the drive coil, and the remote field dominating for greater separations between the drive coil and the sensing coils. Response of RFEC to a typical defect was measured, as was the sensitivity to defect size. Before manufacturing defects in the pipe, we measured the effect of defect separation and concluded that defects separated by 18 inches or 1/3rd of the pipe diameter did not interfere with each other. We manufactured a set of 13 defects, and measured the RFEC signals. We found a background variation that was eventually attributed to permeability variations in the seamless pipe. We scanned all thirteen defects and got satisfactory results. The two smallest defects did not show a signal, but these were much too small to be reported in a pipeline inspection. We acquired a ten-foot seam welded pipe that has much less background variation. We are measuring the sensitivity of RFEC signals to mechanical variations between the exciter and sensing coils.

  2. U-165: Apple iOS Bugs Let Remote Users Execute Arbitrary Code and Spoof Address Bar URLs

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Apple iOS. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can spoof the address bar URL.

  3. U-063: RSA SecurID Software Token for Windows DLL Loading Error Lets Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A remote user can cause the target application to execute arbitrary code on the target user's system.

  4. Preliminary Hazard Analysis for the Remote-Handled Low-Level Waste Disposal Facility

    SciTech Connect (OSTI)

    Lisa Harvego; Mike Lehto

    2010-02-01

    The need for remote handled low level waste (LLW) disposal capability has been identified. A new onsite, remote-handled LLW disposal facility has been identified as the highest ranked alternative for providing continued, uninterrupted remote-handled LLW disposal capability for remote-handled LLW that is generated as part of the nuclear mission of the Idaho National Laboratory and from spent nuclear fuel processing activities at the Naval Reactors Facility. Historically, this type of waste has been disposed of at the Radioactive Waste Management Complex. Disposal of remote-handled LLW in concrete disposal vaults at the Radioactive Waste Management Complex will continue until the facility is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). This document supports the conceptual design for the proposed remote-handled LLW disposal facility by providing an initial nuclear facility hazard categorization and by identifying potential hazards for processes associated with onsite handling and disposal of remote-handled LLW.

  5. Preliminary Hazard Analysis for the Remote-Handled Low-Level Waste Disposal Facility

    SciTech Connect (OSTI)

    Lisa Harvego; Mike Lehto

    2010-05-01

    The need for remote handled low level waste (LLW) disposal capability has been identified. A new onsite, remote-handled LLW disposal facility has been identified as the highest ranked alternative for providing continued, uninterrupted remote-handled LLW disposal capability for remote-handled LLW that is generated as part of the nuclear mission of the Idaho National Laboratory and from spent nuclear fuel processing activities at the Naval Reactors Facility. Historically, this type of waste has been disposed of at the Radioactive Waste Management Complex. Disposal of remote-handled LLW in concrete disposal vaults at the Radioactive Waste Management Complex will continue until the facility is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). This document supports the conceptual design for the proposed remote-handled LLW disposal facility by providing an initial nuclear facility hazard categorization and by identifying potential hazards for processes associated with onsite handling and disposal of remote-handled LLW.

  6. Preliminary Hazard Analysis for the Remote-Handled Low-Level Waste Disposal Project

    SciTech Connect (OSTI)

    Lisa Harvego; Mike Lehto

    2010-10-01

    The need for remote handled low level waste (LLW) disposal capability has been identified. A new onsite, remote-handled LLW disposal facility has been identified as the highest ranked alternative for providing continued, uninterrupted remote-handled LLW disposal capability for remote-handled LLW that is generated as part of the nuclear mission of the Idaho National Laboratory and from spent nuclear fuel processing activities at the Naval Reactors Facility. Historically, this type of waste has been disposed of at the Radioactive Waste Management Complex. Disposal of remote-handled LLW in concrete disposal vaults at the Radioactive Waste Management Complex will continue until the facility is full or until it must be closed in preparation for final remediation of the Subsurface Disposal Area (approximately at the end of Fiscal Year 2017). This document supports the conceptual design for the proposed remote-handled LLW disposal facility by providing an initial nuclear facility hazard categorization and by identifying potential hazards for processes associated with onsite handling and disposal of remote-handled LLW.

  7. V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Execute Arbitrary Code | Department of Energy 9: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code V-049: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code December 18, 2012 - 1:30am Addthis PROBLEM: RealPlayer Buffer Overflow and Invalid Pointer Flaw Let Remote Users Execute Arbitrary Code PLATFORM: Windows RealPlayer 15.0.6.14 and prior. ABSTRACT: Two vulnerabilities were reported in RealPlayer. REFERENCE

  8. V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Deny Service | Department of Energy 1: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service V-071: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service January 17, 2013 - 12:00am Addthis PROBLEM: Cisco ASA 1000V Cloud Firewall H.323 Inspection Bug Lets Remote Users Deny Service PLATFORM: The vulnerability is reported in versions 8.7.1 and 8.7.1.1. ABSTRACT: A vulnerability has been reported in Cisco ASA 1000V Cloud Firewall

  9. V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Spoof the Server | Department of Energy 65: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server V-165: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server May 28, 2013 - 12:46am Addthis PROBLEM: Cisco WebEx for iOS Certificate Validation Flaw Lets Remote Users Spoof the Server PLATFORM: Cisco WebEx for iOS 4.1, Other versions may also be affected. ABSTRACT: A vulnerability was reported in Cisco WebEx for iOS. REFERENCE LINKS:

  10. Estimation of the relationship between remotely sensed anthropogenic heat discharge and building energy use

    SciTech Connect (OSTI)

    Zhou, Yuyu; Weng, Qihao; Gurney, Kevin R.; Shuai, Yanmin; Hu, Xuefei

    2012-01-01

    This paper examined the relationship between remotely sensed anthropogenic heat discharge and energy use from residential and commercial buildings across multiple scales in the city of Indianapolis, Indiana, USA. Anthropogenic heat discharge was estimated based on a remote sensing-based surface energy balance model, which was parameterized using land cover, land surface temperature, albedo, and meteorological data. Building energy use was estimated using a GIS-based building energy simulation model in conjunction with Department of Energy/ Energy Information Administration survey data, Assessor's parcel data, GIS floor areas data, and remote sensing-derived building height data.

  11. V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Execute Arbitrary Code | Department of Energy 8: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code V-228: RealPlayer Buffer Overflow and Memory Corruption Error Let Remote Users Execute Arbitrary Code August 27, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities were reported in RealPlayer PLATFORM: RealPlayer 16.0.2.32 and prior ABSTRACT: A remote user can cause arbitrary code to be executed on the target user's system REFERENCE LINKS:

  12. T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Passwords | Department of Energy 92: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords T-692: VMware vFabric tc Server Lets Remote Users Login Using Obfuscated Passwords August 12, 2011 - 3:47pm Addthis PROBLEM: A vulnerability was reported in VMware vFabric tc Server. A remote user can login using an obfuscated version of their password. PLATFORM: Version(s): vFabric tc Server 2.0.0.RELEASE to 2.0.5.SR01, 2.1.0.RELEASE to 2.1.1.SR01 ABSTRACT: VMware vFabric tc

  13. T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Sessions | Department of Energy 7:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions T-727:Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions September 27, 2011 - 8:00am Addthis PROBLEM: Microsoft Windows SSL/TLS Protocol Flaw Lets Remote Users Decryption Sessions. PLATFORM: Windows XP Service Pack 3 Windows XP Professional x64 Edition Service Pack 2 Windows Server 2003 Service Pack 2 Windows Server 2003 x64 Edition Service Pack 2 Windows

  14. U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Commands on the Target System | Department of Energy 49: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System U-049: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System December 1, 2011 - 9:00am Addthis PROBLEM: IBM Tivoli Netcool Reporter CGI Bug Lets Remote Users Inject Commands on the Target System. PLATFORM: IBM Tivoli Netcool Reporter prior to 2.2.0.8 ABSTRACT: A vulnerability was reported in IBM Tivoli Netcool

  15. Vegetation Cover Analysis of Hazardous Waste Sites in Utah and Arizona Using Hyperspectral Remote Sensing

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Sens. 2012, 4, 327-353; doi:10.3390/rs4020327 Remote Sensing ISSN 2072-4292 www.mdpi.com/journal/remotesensing Article Vegetation Cover Analysis of Hazardous Waste Sites in Utah and Arizona Using Hyperspectral Remote Sensing Jungho Im 1, *, John R. Jensen 2 , Ryan R. Jensen 3 , John Gladden 4 , Jody Waugh 5 and Mike Serrato 4 1 Department of Environmental Resources Engineering, College of Environmental Science and Forestry, State University of New York, Syracuse, NY 13210, USA 2

  16. WIPP Receives First Remote-Handled Waste Shipment From Sandia Labs |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy First Remote-Handled Waste Shipment From Sandia Labs WIPP Receives First Remote-Handled Waste Shipment From Sandia Labs December 21, 2011 - 12:00pm Addthis Media Contact Deb Gill www.wipp.energy.gov 575-234-7270 CARLSBAD, N.M. - The U.S. Department of Energy's (DOE) Waste Isolation Pilot Plant (WIPP) has received the first of eight planned defense-related remote-handled transuranic (RH-TRU) waste shipments from Sandia National Laboratories (SNL) in Albuquerque. The

  17. Project Execution Plan for the Remote Handled Low-Level Waste Disposal Project

    SciTech Connect (OSTI)

    Danny Anderson

    2014-07-01

    As part of ongoing cleanup activities at the Idaho National Laboratory (INL), closure of the Radioactive Waste Management Complex (RWMC) is proceeding under the Comprehensive Environmental Response, Compensation, and Liability Act (42 USC 9601 et seq. 1980). INL-generated radioactive waste has been disposed of at RWMC since 1952. The Subsurface Disposal Area (SDA) at RWMC accepted the bulk of INL’s contact and remote-handled low-level waste (LLW) for disposal. Disposal of contact-handled LLW and remote-handled LLW ion-exchange resins from the Advanced Test Reactor in the open pit of the SDA ceased September 30, 2008. Disposal of remote-handled LLW in concrete disposal vaults at RWMC will continue until the facility is full or until it must be closed in preparation for final remediation of the SDA (approximately at the end of fiscal year FY 2017). The continuing nuclear mission of INL, associated ongoing and planned operations, and Naval spent fuel activities at the Naval Reactors Facility (NRF) require continued capability to appropriately dispose of contact and remote handled LLW. A programmatic analysis of disposal alternatives for contact and remote-handled LLW generated at INL was conducted by the INL contractor in Fiscal Year 2006; subsequent evaluations were completed in Fiscal Year 2007. The result of these analyses was a recommendation to the Department of Energy (DOE) that all contact-handled LLW generated after September 30, 2008, be disposed offsite, and that DOE proceed with a capital project to establish replacement remote-handled LLW disposal capability. An analysis of the alternatives for providing replacement remote-handled LLW disposal capability has been performed to support Critical Decision-1. The highest ranked alternative to provide this required capability has been determined to be the development of a new onsite remote-handled LLW disposal facility to replace the existing remote-handled LLW disposal vaults at the SDA. Several offsite DOE

  18. T-541: Citrix Provisioning Services Unspecified Flaw Let's Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    A vulnerability has been identified in Citrix Provisioning Services that could result in arbitrary code execution. This vulnerability can be triggered by an attacker sending a specially crafted packet to the Provisioning Services server. This vulnerability is present in all supported versions of Citrix Provisioning Services up to and including version 5.6.

  19. T-569: Adobe Flash SWF File Processing Memory Corruption Remote Code Execution Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    Critical vulnerabilities have been identified in Adobe Flash Player 10.1.102.64 and earlier versions for Windows, Macintosh, Linux, and Solaris. These vulnerabilities could cause the application to crash and could potentially allow an attacker to take control of the affected system.

  20. T-664: Apache Santuario Buffer Overflow Lets Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    A buffer overflow exists when creating or verifying XML signatures with RSA keys of sizes on the order of 8192 or more bits. This typically results in a crash and denial of service in applications that verify signatures using keys that could be supplied by an attacker.