Sample records for users bypass authentication

  1. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Broader source: Energy.gov (indexed) [DOE]

    RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements PLATFORM: RSA Authentication Agent 7.1, 7.1.1 for Microsoft Windows ABSTRACT: A vulnerability was...

  2. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

    Broader source: Energy.gov (indexed) [DOE]

    7: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain Administrative Access U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

  3. V-223: RSA Authentication Agent for PAM Allows Remote Users to...

    Broader source: Energy.gov (indexed) [DOE]

    Vulnerability V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication Requirements V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local Users...

  4. U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication and

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartment of|Users

  5. U-130: JBoss Operations Network LDAP Authentication Bug Lets...

    Broader source: Energy.gov (indexed) [DOE]

    Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

  6. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows®...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Users Bypass Authentication Requirements V-159: RSA SecurID Agent Discloses Node Secret Encryption Key to Local Users V-195: RSA Authentication Manager Lets Local Users View...

  7. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  8. V-103: RSA Authentication Agent Lets Remote Users Bypass Authentication

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | Department of EnergySUSE

  9. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  10. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Broader source: Energy.gov (indexed) [DOE]

    Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks PLATFORM: Tomcat 6.0.21 to 6.0.36, 7.0.0 to 7.0.32 ABSTRACT: A vulnerability was reported in...

  11. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Broader source: Energy.gov (indexed) [DOE]

    PostgreSQL. PLATFORM: Version(s): prior to 8.3.18, 8.4.11, 9.0.7, 9.1.3 ABSTRACT: A remote authenticated user can gain elevated privileges. A remote authenticated user can inject...

  12. User Authentication Policy | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAbout UsUser Agreements User Accounts

  13. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  14. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  15. SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key

    E-Print Network [OSTI]

    Sheldon, Nathan D.

    SSL/TLS Session-Aware User Authentication Using a GAA Bootstrapped Key Chunhua Chen1 , Chris J.mitchell@rhul.ac.uk Abstract. Most SSL/TLS-based electronic commerce (e-commerce) ap- plications (including Internet banking a server effectively, and because user authentication methods are typi- cally decoupled from SSL

  16. SSL/TLS Session-Aware User Authentication Rolf Oppliger1

    E-Print Network [OSTI]

    Basin, David

    SSL/TLS Session-Aware User Authentication Revisited Rolf Oppliger1 , Ralf Hauser2 , and David Basin threat to SSL/TLS-based e-commerce applications. In [OHB06], we introduced the notion of SSL/TLS session-aware user authentication to protect SSL/TLS- based e-commerce applications against MITM attacks and we

  17. A Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication

    E-Print Network [OSTI]

    Paterson, Kenny

    to the pervasive electrical power grid. In particular, as commercial interest grows in grid computing, gridA Certificate-Free Grid Security Infrastructure Supporting Password-Based User Authentication Jason propose a security infrastructure for grid applications, in which users are authenticated us- ing

  18. SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates

    E-Print Network [OSTI]

    Basin, David

    SSL/TLS Session-Aware User Authentication: A Lightweight Alternative to Client-Side Certificates E-Mail: basin@inf.ethz.ch Abstract Many SSL/TLS-based e-commerce applications employ traditional authentication mechanisms on the client side. These mechanisms--if decoupled from SSL/TLS session establishment

  19. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  20. Efficient Authentication and Authorization of Mobile Users Based on Peer-to-Peer Network Mechanisms

    E-Print Network [OSTI]

    Braun, Torsten

    1 Efficient Authentication and Authorization of Mobile Users Based on Peer-to-Peer Network is to avoid exchanging security information between networks visited by a roaming user and the user's home network and retrieves the required security information from that AAA server. The AAA servers can

  1. V-236: MediaWiki CentralAuth Extension Authentication Bypass...

    Broader source: Energy.gov (indexed) [DOE]

    in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension...

  2. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  3. Cryptanalysis of Two Dynamic IDbased Remote User Authentication Schemes for

    E-Print Network [OSTI]

    University, Harbin City 150001, China 2 Automobile Management Institute of PLA, Bengbu City 233011, China guessing attack under their non­tamper resistance assumption of the smart card; (2) It fails to provide of schemes. Keywords: Cryptanalysis, Authentication protocol, O#ine password guessing attack, Smart card

  4. A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA)

    E-Print Network [OSTI]

    Basin, David

    A Proof of Concept Implementation of SSL/TLS Session-Aware User Authentication (TLS-SA) Rolf, CH-8005 Z¨urich Abstract Most SSL/TLS-based e-commerce applications employ con- ventional mechanisms for user authentication. These mechanisms--if de- coupled from SSL/TLS session establishment

  5. SSL/TLS Session-Aware User Authentication--Or How to Effectively Thwart

    E-Print Network [OSTI]

    Basin, David

    SSL/TLS Session-Aware User Authentication--Or How to Effectively Thwart the Man-in-the-Middle Rolf@inf.ethz.ch Abstract. Man-in-the-middle attacks pose a serious threat to SSL/TLS- based electronic commerce mechanisms fail to provide protection against this type of attack, even when they run on top of SSL

  6. User authentication and remote execution across administrative domains

    E-Print Network [OSTI]

    Kaminsky, Michael, 1976-

    2004-01-01T23:59:59.000Z

    (cont.) selectively delegates authority to processes running on remote machines that need to access other resources. The delegation mechanism lets users incrementally construct trust policies for remote machines. Measurements ...

  7. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  8. AUTHENTICATED

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP7-0973 1 Introduction In the design ofSouthwesternAUTHENTICATED

  9. U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...

    Broader source: Energy.gov (indexed) [DOE]

    McAfee Email Gateway (MEG) 7.0.0 and 7.0.1 (MEG 6.7.x is NOT affected.) McAfee Email and Web Security (EWS) 5.6 Patch 3 and earlier McAfee Email and Web Security (EWS) 5.5 Patch 6...

  10. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyTheVulnerabilities |

  11. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success|SustainableDepartmentregulations.gov to1:

  12. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Broader source: Energy.gov (indexed) [DOE]

    (Patch 26 (P26) for RSA Authentication Manager 7.1 Service Pack 4 (SP4) and Appliance 3.0 SP4; Patch 2 (P2) for RSA Authentication Manager 8.0). Addthis Related Articles T-704:...

  13. V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyThe followingRemoteBypassDepartment of

  14. Authenticating Primary Users' Signals in Cognitive Radio Networks via Integrated Cryptographic and Wireless Link Signatures

    E-Print Network [OSTI]

    Ning, Peng

    any harmful interference to the primary user [17]. For example, in IEEE 802.22 WRANs, TV transmission towers are primary users, and radio devices that use TV channels for communication are secondary users should not use those channels to avoid interfering with the transmission of the primary user. Existing m

  15. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Broader source: Energy.gov (indexed) [DOE]

    Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain Elevated Privileges U-233:...

  16. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability |Users Obtain

  17. Multi-factor authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21T23:59:59.000Z

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  18. ACCEPTED BY IEEE TRANSACTIONS ON IMAGE PROCESSING, JULY 28, 2014. 1 On Continuous User Authentication via Typing

    E-Print Network [OSTI]

    such as keystroke dynamics (KD), TB provides reliable authentication with a short delay, while avoiding explicit key-logging

  19. T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability |Users Obtain Password

  20. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilitiesVulnerability |UsersSessions

  1. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  2. Quantum direct communication with authentication

    SciTech Connect (OSTI)

    Lee, Hwayean [Center for Information Security Technologies (CIST) and Graduate School of Information Security (GSIS), Korea University, Anam Dong, Sungbuk Gu, Seoul (Korea, Republic of); Institut fuer Experimentalphysik, Universitaet Wien (Austria); Lim, Jongin [Center for Information Security Technologies (CIST) and Graduate School of Information Security (GSIS), Korea University, Anam Dong, Sungbuk Gu, Seoul (Korea, Republic of); Yang, HyungJin [Center for Information Security Technologies (CIST) and Graduate School of Information Security (GSIS), Korea University, Anam Dong, Sungbuk Gu, Seoul (Korea, Republic of); Department of Physics, Korea University, Chochiwon, Choongnam (Korea, Republic of)

    2006-04-15T23:59:59.000Z

    We propose two quantum direct communication (QDC) protocols with user authentication. Users can identify each other by checking the correlation of Greenberger-Horne-Zeilinger (GHZ) states. Alice can directly send a secret message to Bob without any previously shared secret using the remaining GHZ states after authentication. Our second QDC protocol can be used even though there is no quantum link between Alice and Bob. The security of the transmitted message is guaranteed by properties of entanglement of GHZ states.

  3. Message Authentication message authentication is concerned with

    E-Print Network [OSTI]

    Message Authentication · message authentication is concerned with: ­protecting the integrity of a message ­validating identity of originator ­non-repudiation of origin (dispute resolution) · will consider the security requirements · then three alternative functions used: ­message encryption ­message authentication

  4. T-703: Cisco Unified Communications Manager Open Query Interface...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Identity Services Engine Discloses Authentication Credentials to Remote Users V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability...

  5. Ch.3 User Authentication Textbook?

    E-Print Network [OSTI]

    Dong, Yingfei

    : wall clock time · exploiting multiple password use: same passwd · electronic monitoring: keyloging

  6. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

  7. V-231: Cisco Identity Services Engine Discloses Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    form fields. A remote or local user can conduct a cross-site scripting or clickjacking attack to access the username and password of an authenticated session. IMPACT: Disclosure of...

  8. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Broader source: Energy.gov (indexed) [DOE]

    authenticated user can gain elevated privileges on the target system. PLATFORM: Cisco Digital Media Manager: Version(s) 5.22 and prior, 5.2.3 ABSTRACT: The system does not...

  9. Authentication of byte sequences

    SciTech Connect (OSTI)

    Stearns, S.D.

    1991-06-01T23:59:59.000Z

    Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

  10. U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

  11. T-646: Debian fex authentication bypass | Department of Energy

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergyIssues DOE'sSummaryDepartment ofSecurity Controls |Department9:

  12. T-646: Debian fex authentication bypass | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed offOCHCO Overview OCHCOSystems Analysis Success Stories Systems Analysis SuccessEnergy 38:T-646:

  13. Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy

    DOE Patents [OSTI]

    Strait, Robert S. (Oakland, CA); Pearson, Peter K. (Livermore, CA); Sengupta, Sailes K. (Livermore, CA)

    2000-01-01T23:59:59.000Z

    A password system comprises a set of codewords spaced apart from one another by a Hamming distance (HD) that exceeds twice the variability that can be projected for a series of biometric measurements for a particular individual and that is less than the HD that can be encountered between two individuals. To enroll an individual, a biometric measurement is taken and exclusive-ORed with a random codeword to produce a "reference value." To verify the individual later, a biometric measurement is taken and exclusive-ORed with the reference value to reproduce the original random codeword or its approximation. If the reproduced value is not a codeword, the nearest codeword to it is found, and the bits that were corrected to produce the codeword to it is found, and the bits that were corrected to produce the codeword are also toggled in the biometric measurement taken and the codeword generated during enrollment. The correction scheme can be implemented by any conventional error correction code such as Reed-Muller code R(m,n). In the implementation using a hand geometry device an R(2,5) code has been used in this invention. Such codeword and biometric measurement can then be used to see if the individual is an authorized user. Conventional Diffie-Hellman public key encryption schemes and hashing procedures can then be used to secure the communications lines carrying the biometric information and to secure the database of authorized users.

  14. T-574: Google Chrome Multiple Flaws Let Remote Users Execute...

    Broader source: Energy.gov (indexed) [DOE]

    Multiple vulnerabilities were reported in Google Chrome. A remote user can cause arbitrary code to be executed on the target user's system. A remote user can bypass the pop-up...

  15. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands

    Broader source: Energy.gov [DOE]

    A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system.

  16. V-202: Cisco Video Surveillance Manager Bugs Let Remote Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and...

  17. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  18. Protocols and security proofs for data authentication

    E-Print Network [OSTI]

    Mityagin, Anton

    2006-01-01T23:59:59.000Z

    Generalized Carter-Wegman MACs . . . . . . . . . . . . . . .which constitute Carter-Wegman message authentication schemening generalized Carter-Wegman message authentication scheme

  19. Formal Analysis and Systematic Construction of Two-factor Authentication Scheme

    E-Print Network [OSTI]

    , Duncan S. Wong1 , Huaxiong Wang2 , and Xiaotie Deng1 1 Department of Computer Science City University-factor authentication mechanisms is based on smart card and user's password. Throughout the years, there have been many-resistant hash functions. Keywords: Authentication, Password, Smart Card, Guessing Attack 1 Introduction Password

  20. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Environmental Management (EM)

    to be executed by the target user's browser. The code will originate from the site running the RSA Authentication Manager software and will run in the security context of that...

  1. Tools for Authentication

    SciTech Connect (OSTI)

    White, G

    2008-07-09T23:59:59.000Z

    Many recent Non-proliferation and Arms Control software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project (projects can have both common and custom rules to detect flaws and security holes). Any such extensible tool must be based on a complete language compiler infrastructure, that is, one that can parse and digest the full language through its standard grammar. ROSE is precisely such a compiler infrastructure developed within DOE. ROSE is a robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. This year, it has been extended to support the automated analysis of binaries. We continue to extend ROSE to address a number of security-specific requirements and apply it to software authentication for Non-proliferation and Arms Control projects. We will give an update on the status of our work.

  2. Key recycling in authentication

    E-Print Network [OSTI]

    Christopher Portmann

    2014-09-29T23:59:59.000Z

    In their seminal work on authentication, Wegman and Carter propose that to authenticate multiple messages, it is sufficient to reuse the same hash function as long as each tag is encrypted with a one-time pad. They argue that because the one-time pad is perfectly hiding, the hash function used remains completely unknown to the adversary. Since their proof is not composable, we revisit it using a composable security framework. It turns out that the above argument is insufficient: if the adversary learns whether a corrupted message was accepted or rejected, information about the hash function is leaked, and after a bounded finite amount of rounds it is completely known. We show however that this leak is very small: Wegman and Carter's protocol is still $\\epsilon$-secure, if $\\epsilon$-almost strongly universal$_2$ hash functions are used. This implies that the secret key corresponding to the choice of hash function can be reused in the next round of authentication without any additional error than this $\\epsilon$. We also show that if the players have a mild form of synchronization, namely that the receiver knows when a message should be received, the key can be recycled for any arbitrary task, not only new rounds of authentication.

  3. An Authentication and Security Protocol for Mobile Computing

    E-Print Network [OSTI]

    Zheng, Yuliang

    networks such as public switched telephone/data networks, and hence many security issues with wire-line-air transmission of signals and low power supply of a mobile user. #12;When examining security in a wirelessAn Authentication and Security Protocol for Mobile Computing Yuliang Zheng Monash University Mc

  4. T-606: Sun Java System Access Manager Lets Remote Users Partially...

    Broader source: Energy.gov (indexed) [DOE]

    CVE-2011-0844 CVE-2011-0847 Oracle Critical Patch Update Advisory IMPACT ASSESSMENT: Medium Discussion: A remote authenticated user can partially access data on the target...

  5. Anonymous authenticated communications

    DOE Patents [OSTI]

    Beaver, Cheryl L. (Albuquerque, NM); Schroeppel, Richard C. (Woodland Hills, UT); Snyder, Lillian A. (Corrales, NM)

    2007-06-19T23:59:59.000Z

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  6. Demonstrated Petroleum Reduction Using Oil Bypass Filter Technology...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Demonstrated Petroleum Reduction Using Oil Bypass Filter Technology on Heavy and Light Vehicles Demonstrated Petroleum Reduction Using Oil Bypass Filter Technology on Heavy and...

  7. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Environmental Management (EM)

    186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June...

  8. T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw

    Broader source: Energy.gov [DOE]

    An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

  9. IT Licentiate theses Query Authentication and

    E-Print Network [OSTI]

    Flener, Pierre

    IT Licentiate theses 2008-002 Query Authentication and Data Confidentiality in Wireless Sensor of Licentiate of Philosophy in Computer Science at Uppsala University 2008 #12;Query Authentication and Data

  10. Biometric Authentication using Nonparametric Methods

    E-Print Network [OSTI]

    Sheela, S V; 10.5121/ijcsit.2010.2309

    2010-01-01T23:59:59.000Z

    The physiological and behavioral trait is employed to develop biometric authentication systems. The proposed work deals with the authentication of iris and signature based on minimum variance criteria. The iris patterns are preprocessed based on area of the connected components. The segmented image used for authentication consists of the region with large variations in the gray level values. The image region is split into quadtree components. The components with minimum variance are determined from the training samples. Hu moments are applied on the components. The summation of moment values corresponding to minimum variance components are provided as input vector to k-means and fuzzy kmeans classifiers. The best performance was obtained for MMU database consisting of 45 subjects. The number of subjects with zero False Rejection Rate [FRR] was 44 and number of subjects with zero False Acceptance Rate [FAR] was 45. This paper addresses the computational load reduction in off-line signature verification based o...

  11. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    by malicious people to bypass certain security restrictions. May 14, 2012 U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users...

  12. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    vulnerabilities were reported in Symantec Messaging Gateway. August 29, 2012 U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain...

  13. JC3 Bulletin Archive | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    by malicious people to bypass certain security restrictions. May 14, 2012 U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users...

  14. JC3 | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    vulnerabilities were reported in Symantec Messaging Gateway. August 29, 2012 U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass Authentication and Gain...

  15. Exhaust gas bypass valve control for thermoelectric generator

    DOE Patents [OSTI]

    Reynolds, Michael G; Yang, Jihui; Meisner, Greogry P.; Stabler, Francis R.; De Bock, Hendrik Pieter (Peter) Jacobus; Anderson, Todd Alan

    2012-09-04T23:59:59.000Z

    A method of controlling engine exhaust flow through at least one of an exhaust bypass and a thermoelectric device via a bypass valve is provided. The method includes: determining a mass flow of exhaust exiting an engine; determining a desired exhaust pressure based on the mass flow of exhaust; comparing the desired exhaust pressure to a determined exhaust pressure; and determining a bypass valve control value based on the comparing, wherein the bypass valve control value is used to control the bypass valve.

  16. Bypass diode for a solar cell

    DOE Patents [OSTI]

    Rim, Seung Bum (Palo Alto, CA); Kim, Taeseok (San Jose, CA); Smith, David D. (Campbell, CA); Cousins, Peter J. (Menlo Park, CA)

    2012-03-13T23:59:59.000Z

    Bypass diodes for solar cells are described. In one embodiment, a bypass diode for a solar cell includes a substrate of the solar cell. A first conductive region is disposed above the substrate, the first conductive region of a first conductivity type. A second conductive region is disposed on the first conductive region, the second conductive region of a second conductivity type opposite the first conductivity type.

  17. CITI Technical Report 93-1 Long Running Jobs in an Authenticated Environment

    E-Print Network [OSTI]

    Michigan, University of

    . An unfortunate byproduct of building Kerberos-based systems is a loss of functionality, such as long running jobs-- -- CITI Technical Report 93-1 Long Running Jobs in an Authenticated Environment A. D. Rubin that a user have a valid token or ticket for a job to run. These tickets are issued with limited lifetimes

  18. V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directed off Energy.gov. Are you sureReportsofDepartmentSeries |Attacks | Department of Energy3:

  19. The Power of Verification Queries in Message Authentication and Authenticated Encryption

    E-Print Network [OSTI]

    Bernstein, Daniel

    encryption. Keywords: Message authentication, PRFs, Carter-Wegman, symmetric encryption, authenticated-cipher based MACs [5, 22, 10, 4, 11, 20, 17, 18] and Carter-Wegman (CW) ma-schemes [25, 21, 23, 16, 8, 9

  20. The Power of Verification Queries in Message Authentication and Authenticated Encryption

    E-Print Network [OSTI]

    encryption. Keywords: Message authentication, PRFs, Carter­Wegman, symmetric encryption, authenticated­cipher based MACs [5, 22, 10, 4, 11, 20, 17, 18] and Carter­Wegman (CW) ma­schemes [25, 21, 23, 16, 8, 9

  1. Obfuscated authentication systems, devices, and methods

    DOE Patents [OSTI]

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22T23:59:59.000Z

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  2. Implicit User Re-authentication for Mobile Sausan Yazji1

    E-Print Network [OSTI]

    Dick, Robert

    dramatically. Features of the Lamp: · Battery, Mechanically, or Electrically powered · All lighting Firelight would be Non-Governmental Organizations (NGOs) · Doctors Without Borders · World Bank · World to the lamp and used to power the light. · Battery Powered: The light can be powered by a car battery

  3. AVTA: Oil Bypass Filter Specifications and Test Procedures

    Broader source: Energy.gov [DOE]

    PuraDYN Oil Bypass Filtration System Evaluation Test Plan methodology is used in the testing of all oil bypass filters on the buses at the Idaho National Laboratory.

  4. U-142: HP Onboard Administrator Bugs Let Remote Users Gain Access...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Unspecified Flaw Lets Remote Users Gain Access U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-026: Cisco Small...

  5. authenticated key exchange: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 56 Authentication and Key Agreement via Memorable...

  6. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    Stronger security bounds for Wegman-Carter-Shoup authenticators, authentication, MAC, Wegman-Carter, provable security 1 Introduction This paper proves

  7. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    Stronger security bounds for Wegman-Carter-Shoup authenticators Daniel J. Bernstein Department probabilities for f. Keywords: mode of operation, authentication, MAC, Wegman-Carter, provable security 1

  8. U-246: Tigase XMPP Dialback Protection Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions.

  9. Bypass apparatus and method for series connected energy storage devices

    DOE Patents [OSTI]

    Rouillard, Jean (Saint-Luc, CA); Comte, Christophe (Montreal, CA); Daigle, Dominik (St-Hyacinthe, CA)

    2000-01-01T23:59:59.000Z

    A bypass apparatus and method for series connected energy storage devices. Each of the energy storage devices coupled to a common series connection has an associated bypass unit connected thereto in parallel. A current bypass unit includes a sensor which is coupled in parallel with an associated energy storage device or cell and senses an energy parameter indicative of an energy state of the cell, such as cell voltage. A bypass switch is coupled in parallel with the energy storage cell and operable between a non-activated state and an activated state. The bypass switch, when in the non-activated state, is substantially non-conductive with respect to current passing through the energy storage cell and, when in the activated state, provides a bypass current path for passing current to the series connection so as to bypass the associated cell. A controller controls activation of the bypass switch in response to the voltage of the cell deviating from a pre-established voltage setpoint. The controller may be included within the bypass unit or be disposed on a control platform external to the bypass unit. The bypass switch may, when activated, establish a permanent or a temporary bypass current path.

  10. DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING

    E-Print Network [OSTI]

    Cortesi, Tino

    DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING Sukriti Bhattacharya and Agostino Cortesi@dsi.unive.it, cortesi@unive.it Keywords: Database watermarking, ZAW, Public key watermark, Abstract interpretation the verification of integrity of the relational databases by using a public zero distortion authentication

  11. Verifying authentication protocols with CSP Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

  12. Final report for the network authentication investigation and pilot.

    SciTech Connect (OSTI)

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01T23:59:59.000Z

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  13. Final report and recommendations of the ESnet Authentication Pilot Project

    SciTech Connect (OSTI)

    Johnson, G.R.; Moore, J.P. [Pacific Northwest Lab., Richland, WA (United States); Athey, C.L. [Lawrence Livermore National Lab., CA (United States); Engert, D.E. [Argonne National Lab., IL (United States); Ramus, J.E. [National Energy Research Supercomputer Center, Livermore, CA (United States)

    1995-01-01T23:59:59.000Z

    To conduct their work, U.S. Department of Energy (DOE) researchers require access to a wide range of computing systems and information resources outside of their respective laboratories. Electronically communicating with peers using the global Internet has become a necessity to effective collaboration with university, industrial, and other government partners. DOE`s Energy Sciences Network (ESnet) needs to be engineered to facilitate this {open_quotes}collaboratory{close_quotes} while ensuring the protection of government computing resources from unauthorized use. Sensitive information and intellectual properties must be protected from unauthorized disclosure, modification, or destruction. In August 1993, DOE funded four ESnet sites (Argonne National Laboratory, Lawrence Livermore National Laboratory, the National Energy Research Supercomputer Center, and Pacific Northwest Laboratory) to begin implementing and evaluating authenticated ESnet services using the advanced Kerberos Version 5. The purpose of this project was to identify, understand, and resolve the technical, procedural, cultural, and policy issues surrounding peer-to-peer authentication in an inter-organization internet. The investigators have concluded that, with certain conditions, Kerberos Version 5 is a suitable technology to enable ESnet users to freely share resources and information without compromising the integrity of their systems and data. The pilot project has demonstrated that Kerberos Version 5 is capable of supporting trusted third-party authentication across an inter-organization internet and that Kerberos Version 5 would be practical to implement across the ESnet community within the U.S. The investigators made several modifications to the Kerberos Version 5 system that are necessary for operation in the current Internet environment and have documented other technical shortcomings that must be addressed before large-scale deployment is attempted.

  14. Improving Classical Authentication with Quantum Communication

    E-Print Network [OSTI]

    of short secret keys [1]. Brassard's scheme is itself an improvement of the Wegman-Carter protocol [2 of messages we want to authenticate, as opposed to the Wegman-Carter proposal. The security of PRGs is based

  15. Hardware device binding and mutual authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04T23:59:59.000Z

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  16. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  17. Heat exchanger bypass system for an absorption refrigeration system

    DOE Patents [OSTI]

    Reimann, Robert C. (Lafayette, NY)

    1984-01-01T23:59:59.000Z

    A heat exchanger bypass system for an absorption refrigeration system is disclosed. The bypass system operates to pass strong solution from the generator around the heat exchanger to the absorber of the absorption refrigeration system when strong solution builds up in the generator above a selected level indicative of solidification of strong solution in the heat exchanger or other such blockage. The bypass system includes a bypass line with a gooseneck located in the generator for controlling flow of strong solution into the bypass line and for preventing refrigerant vapor in the generator from entering the bypass line during normal operation of the refrigeration system. Also, the bypass line includes a trap section filled with liquid for providing a barrier to maintain the normal pressure difference between the generator and the absorber even when the gooseneck of the bypass line is exposed to refrigerant vapor in the generator. Strong solution, which may accumulate in the trap section of the bypass line, is diluted, to prevent solidification, by supplying weak solution to the trap section from a purge system for the absorption refrigeration system.

  18. V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerabil...

    Broader source: Energy.gov (indexed) [DOE]

    to enable method execution and execute arbitrary methods, bypassing Struts and OGNL library protections. 2. Any unsanitized String variable exposed by an action and have it...

  19. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOE Patents [OSTI]

    Kent, Alexander Dale (Los Alamos, NM)

    2008-09-02T23:59:59.000Z

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  20. Vectum user`s guide

    SciTech Connect (OSTI)

    McClurg, F.R.

    1992-04-01T23:59:59.000Z

    This user`s guide is the documentation for vectum: the easy to use, flexible, multi-purpose, 2D velocity vector plotting package based on the NCAR Graphics libraries.

  1. Bypass diode for a solar cell

    DOE Patents [OSTI]

    Rim, Seung Bum; Kim, Taeseok; Smith, David D; Cousins, Peter J

    2013-11-12T23:59:59.000Z

    Methods of fabricating bypass diodes for solar cells are described. In once embodiment, a method includes forming a first conductive region of a first conductivity type above a substrate of a solar cell. A second conductive region of a second conductivity type is formed on the first conductive region. In another embodiment, a method includes forming a first conductive region of a first conductivity type above a substrate of a solar cell. A second conductive region of a second conductivity type is formed within, and surrounded by, an uppermost portion of the first conductive region but is not formed in a lowermost portion of the first conductive region.

  2. Oil Bypass Filter and Diesel Engine Idling Wear-Rate Evaluations...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Bypass Filter and Diesel Engine Idling Wear-Rate Evaluations Oil Bypass Filter and Diesel Engine Idling Wear-Rate Evaluations 2005 Diesel Engine Emissions Reduction (DEER)...

  3. V-036: EMC Smarts Network Configuration Manager Database Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    36: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass...

  4. V-174: RSA Authentication Manager Writes Operating System, SNMP...

    Broader source: Energy.gov (indexed) [DOE]

    RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files PLATFORM: RSA Authentication Manager 8.0 ABSTRACT: A...

  5. REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL

    E-Print Network [OSTI]

    REALIZING TWO-FACTOR AUTHENTICATION FOR THE BITCOIN PROTOCOL Christopher Mann and Daniel Loebenberger 15 August 2014 Abstract. We show how to realize two-factor authentication for a Bitcoin wal- let a prototypic implementation of a Bitcoin wallet that offers both: two-factor authentication and verification

  6. Authentication Procedures - The Procedures and Integration Working Group

    SciTech Connect (OSTI)

    Kouzes, Richard T.; Bratcher, Leigh; Gosnell, Tom; Langner, Diana; MacArthur, D.; Mihalczo, John T.; Pura, Carolyn; Riedy, Alex; Rexroth, Paul; Scott, Mary; Springarn, Jay

    2001-05-31T23:59:59.000Z

    Authentication is how we establish trust in monitoring systems and measurements to verify compliance with, for example, the storage of nuclear weapons material. Authentication helps assure the monitoring party that accurate and reliable information is provided by any measurement system and that any irregularities are detected. The U.S. is developing its point of view on the procedures for authentication of monitoring systems now planned or contemplated for arms reduction and control applications. The authentication of a system utilizes a set of approaches, including: functional testing using trusted calibration sources, evaluation of documentation, evaluation of software, evaluation of hardware, random selection of hardware and software, tamper-indicating devices, and operational procedures. Authentication of measurement systems should occur throughout their lifecycles, starting with the elements of design, and moving to off-site authentication, on-siste authentication, and continuing with authentication following repair. The most important of these is the initial design of systems. Hardware and software design criteria and procurement decisions can make future authentication relatively straightforward or conversely very difficult. Facility decisions can likewise ease the procedures for authentication since reliable and effective monitoring systems and tampering indicating devices can help provide the assurance needed in the integrity of such items as measurement systems, spare equipment, and reference sources. This paper will summarize the results of the U.S. Authentication Task Force discussion on the role of procedures in authentication.

  7. Using Rose and Compass for Authentication

    SciTech Connect (OSTI)

    White, G

    2009-07-09T23:59:59.000Z

    Many recent non-proliferation software projects include a software authentication component. In this context, 'authentication' is defined as determining that a software package performs only its intended purpose and performs that purpose correctly and reliably over many years. In addition to visual inspection by knowledgeable computer scientists, automated tools are needed to highlight suspicious code constructs both to aid the visual inspection and to guide program development. While many commercial tools are available for portions of the authentication task, they are proprietary, and have limited extensibility. An open-source, extensible tool can be customized to the unique needs of each project. ROSE is an LLNL-developed robust source-to-source analysis and optimization infrastructure currently addressing large, million-line DOE applications in C, C++, and FORTRAN. It continues to be extended to support the automated analysis of binaries (x86, ARM, and PowerPC). We continue to extend ROSE to address a number of security specific requirements and apply it to software authentication for non-proliferation projects. We will give an update on the status of our work.

  8. Secure Anonymous RFID Authentication Protocols Christy Chatmon

    E-Print Network [OSTI]

    Burmester, Mike

    technology is to automatically identify objects that are contained in electromagnetic fields. RFID tags do attention as is seen by an increase in its deployment, such as object tracking and monitoring, supply-chain management, and personal- ized information services. Numerous authentication protocols for RFID systems were

  9. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAboutUser Services Print The UserUser

  10. EA-1262: McKay Bypass Canal Extension, Golden, Colorado

    Broader source: Energy.gov [DOE]

    This EA evaluates the environmental impacts for the proposal to extend the McKay Bypass Canal in order to route water from the existing Canal north of the Walnut Creek drainage on the east side of...

  11. Oil Bypass Filter Technology Performance Evaluation - First Quarterly Report

    SciTech Connect (OSTI)

    Zirker, L.R.; Francfort, J.E.

    2003-01-31T23:59:59.000Z

    This report details the initial activities to evaluate the performance of the oil bypass filter technology being tested by the Idaho National Engineering and Environmental Laboratory (INEEL) for the U.S. Department of Energy's FreedomCAR & Vehicle Technologies Program. Eight full-size, four-cycle diesel-engine buses used to transport INEEL employees on various routes have been equipped with oil bypass systems from the puraDYN Corporation. Each bus averages about 60,000 miles a year. The evaluation includes an oil analysis regime to monitor the presence of necessary additives in the oil and to detect undesirable contaminants. Very preliminary economic analysis suggests that the oil bypass system can reduce life-cycle costs. As the evaluation continues and oil avoidance costs are quantified, it is estimated that the bypass system economics may prove increasingly favorable, given the anticipated savings in operational costs and in reduced use of oil and waste oil avoidance.

  12. Oil Bypass Filter Technology Performance Evaluation - January 2003 Quarterly Report

    SciTech Connect (OSTI)

    Laurence R. Zirker; James E. Francfort

    2003-01-01T23:59:59.000Z

    This report details the initial activities to evaluate the performance of the oil bypass filter technology being tested by the Idaho National Engineering and Environmental Laboratory (INEEL) for the U.S. Department of Energy's FreedomCAR & Vehicle Technologies Program. Eight full-size, four-cycle diesel-engine buses used to transport INEEL employees on various routes have been equipped with oil bypass systems from the puraDYN Corporation. Each bus averages about 60,000 miles a year. The evaluation includes an oil analysis regime to monitor the presence of necessary additives in the oil and to detect undesirable contaminants. Very preliminary economic analysis suggests that the oil bypass system can reduce life-cycle costs. As the evaluation continues and oil avoidance costs are quantified, it is estimated that the bypass system economics may prove increasingly favorable, given the anticipated savings in operational costs and in reduced use of oil and waste oil avoidance.

  13. Hemodynamic Changes following Aortic Valve Bypass: A Mathematical Approach

    E-Print Network [OSTI]

    Benevento, Emilia

    Aortic valve bypass (AVB) has been shown to be a viable solution for patients with severe aortic stenosis (AS). Under this circumstance, the left ventricle (LV) has a double outlet. The objective was to develop a mathematical ...

  14. Development of By-Pass Blending Station System

    E-Print Network [OSTI]

    Liu, M.; Barnes, D.; Bunz, K.; Rosenberry, N.

    2003-01-01T23:59:59.000Z

    A new building blending station system named by-pass blending station (BBS) has been developed to reduce building pump energy consumption in both district heating and cooling systems. Theoretical investigation demonstrated that the BBS can...

  15. User Agreements | Partnerships | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    user facilities to the User Office of the specific facility. Users must include an acknowledgement on all publications that include work performed at ORNL. Users should refer to...

  16. Comment on 'Quantum direct communication with authentication'

    SciTech Connect (OSTI)

    Zhang, Zhan-jun [Department of Physics and Center for Quantum Information Science, National Cheng Kung University, Tainan 70101, Taiwan (China); Key Laboratory of Optoelectronic Information Acquisition and Manipulation of Ministry of Education of China, School of Physics and Material Science, Anhui University, Hefei 230039 (China); Liu, Jun; Wang, Dong; Shi, Shou-hua [Key Laboratory of Optoelectronic Information Acquisition and Manipulation of Ministry of Education of China, School of Physics and Material Science, Anhui University, Hefei 230039 (China)

    2007-02-15T23:59:59.000Z

    Two protocols of quantum direct communication with authentication [Phys. Rev. A 73, 042305 (2006)] were recently proposed by Lee, Lim, and Yang. In this paper we will show that in the two protocols the authenticator Trent should be prevented from knowing the secret message. The first protocol can be eavesdropped on by Trent using the intercept-measure-resend attack, while the second protocol can be eavesdropped on by Trent using a simple single-qubit measurement. To fix these leaks, we revise the original versions of the protocols by using the Pauli Z operation {sigma}{sub z} instead of the original bit-flip operation X. As a consequence, the attacks we present can be prevented and accordingly the protocol securities are improved.

  17. Manual bypass for an electronic fuel injector

    SciTech Connect (OSTI)

    Melnik, G.; Amein, B.; McCoy, C.L.; Martin, J.A.

    1990-01-19T23:59:59.000Z

    This patent describes a bypass mechanism for an electronically governed fuel flow control means. It comprises: a valve assembly including a housing defining a fuel entry chamber, a fuel exit chamber, a bore intersecting the fuel entry chamber, and a flow restriction orifice connecting the bore to the fuel exit chamber. The bore defining a radially smaller cylinder and a rapidly larger cylinder, the larger cylinder being at least partly threaded; a rotatable metering shaft in the bore having a threaded end matingly engaged with the larger cylinder, the shaft defining a pin-like end in the fuel entry chamber having an end face opposed to and larger than the orifice. The shaft having a shank fitting closely through the smaller cylinder. The pin-like end being no shorter than the width of the fuel entry chamber, so the shank never enters the fuel entry chamber to affect flow therein. The juxtapoisition of the end face and the orifice being substantially the sole means to vary flow into the orifice.

  18. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron SpinPrinceton PlasmaAfternoon4.CCSM4large.jpg BER:Services PrintUserUser

  19. User Environment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAbout UsUser Agreements UserEntry Pass

  20. User Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAbout UsUser2/20/13User Guide Print 1.

  1. User Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAbout UsUser2/20/13User Guide Print

  2. User Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAbout UsUser2/20/13User Guide

  3. User Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAbout UsUser2/20/13User GuidePolicy

  4. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAboutUser Services Print The User

  5. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAboutUser Services PrintServicesUser

  6. System and method for authentication of goods

    DOE Patents [OSTI]

    Kaish, Norman (West Hampstead, NY); Fraser, Jay (Freeport, NY); Durst, David I. (Syosset, NY)

    1999-01-01T23:59:59.000Z

    An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

  7. Serious leisure, participation and experience in tourism: authenticity and ritual in a renaissance festival

    E-Print Network [OSTI]

    Kim, Hyounggon

    2005-02-17T23:59:59.000Z

    the serious festival participation were reminiscent of tourism existential authenticity specified by Wang (1999) as two levels: intrapersonal authenticity (gaining one?s true self) and interpersonal authenticity (gaining true human relationship). A search...

  8. authentic cost calculations: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ;Abstract iii We also show how to use two existing multicast authentication techniques (TESLA and a master for embedded control networks characterized by few re- ceivers and weak...

  9. authentication system based: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 58 Integrating identity-based cryptography in IMS...

  10. STEM Mentoring Café- Engaging Young Women in an Authentic Mentoring...

    Broader source: Energy.gov (indexed) [DOE]

    Engaging Young Women in an Authentic Mentoring Experience Melinda Higgins Albert Einstein Distinguished Educator Fellow, NASA Office of Education, Headquarters and Goddard...

  11. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    Stronger security bounds for Wegman-Carter-Shoup authenticators, MAC, Wegman-Carter, provable security 1 Introduction This paper proves that various

  12. Shouhuai Xu 2000 1 Password-based Authentication and

    E-Print Network [OSTI]

    Sandhu, Ravi

    &AKE FBackground knowledge FPrevious solutions to authentication: The Trouble FBeing implemented proposals: Server FBeing implemented proposals: Server has a cert. FWeaker assumption proposals: Server has no cert

  13. A Flexible Approach to Embedded Network Multicast Authentication

    E-Print Network [OSTI]

    Koopman, Philip

    A Flexible Approach to Embedded Network Multicast Authentication Chris Szilagyi ECE Department Carnegie Mellon University szilagyi@cmu.edu Philip Koopman ECE Department Carnegie Mellon University

  14. User Program | Prospective Users US

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAbout UsUser2/20/13User

  15. IEEE TRANS. INFORM. THEORY, VOL. X, NO. XX, 2005 1 Authentication with Distortion Criteria

    E-Print Network [OSTI]

    Martinian, Emin

    authentication system constructions. Index Terms-- multimedia security, authentication, digi- tal signatures of possible perturbations, including, for example, degradation due to noise or compression; transformation

  16. Recent advances in analysis of PWR containment bypass accidents

    SciTech Connect (OSTI)

    Warman, E.A.; Metcalf, J.E.; Donahue, M.L. (Stone and Webster Engineering Corp., Boston, MA (United States))

    1991-01-01T23:59:59.000Z

    The Reactor Safety Study identified and quantified the contribution to off-site radiological risks of accident sequences at pressurized water reactors (PWRs) in which the release of fission products may be released by bypassing the containment building. These so-called bypass accidents were also referred to as interfacing systems loss-of-coolant accidents (LOCAs) or Event 5 sequences due to the postulated failure of valves separating the high-pressure reactor coolant system (RCS) from low-pressure piping located outside containment. Containment bypass sequence risks constitute a large fraction of the total pressurized water reactor (PWR) in NUREG-1150 in large part because estimates of competing risks from early containment failures have been greatly reduced since WASH-1400. Rigorous analyses of both SGTR and V sequence bypass sequences result in reductions in fission product release to such an extent that in-containment sequences are expected to dominate PWR risks at levels substantially lower than reported in NUREG-1150. It is important that these findings be confirmed by other investigators, particularly in light of the NRC's ongoing study of the frequency of occurrence of interfacing systems. LOCAs based on extensive investigations at operating plants. Progress in this latter effort should be matched by progress in the knowledge and understanding of the progression of bypass sequences, once initiated.

  17. Photovoltaic-module bypass-diode encapsulation. Annual report

    SciTech Connect (OSTI)

    Not Available

    1983-06-20T23:59:59.000Z

    The design and processing techniques necessary to incorporate bypass diodes within the module encapsulant are presented in this annual report. A comprehensive survey of available pad-mounted PN junction and Schottky diodes led to the selection of Semicon PN junction diode cells for this application. Diode junction-to-heat spreader thermal resistance measurements, performed on a variety of mounted diode chip types and sizes, have yielded values which are consistently below 1/sup 0/C per watt, but show some instability when thermally cycled over the temperature range from -40 to 150/sup 0/C. Based on the results of a detailed thermal analysis, which covered the range of bypass currents from 2 to 20 amperes, three representative experimental modules, each incorporating integral bypass diode/heat spreader assemblies of various sizes, were designed and fabricated. Thermal testing of these modules has enabled the formation of a recommended heat spreader plate sizing relationship. The production cost of three encapsulated bypass diode/heat spreader assemblies were compared with similarly rated externally-mounted packaged diodes. An assessment of bypass diode reliability, which relies heavily on rectifying diode failure rate data, leads to the general conclusion that, when proper designed and installed, these devices will improve the overall reliability of a terrestrial array over a 20 year design lifetime.

  18. Rankine cycle load limiting through use of a recuperator bypass

    DOE Patents [OSTI]

    Ernst, Timothy C.

    2011-08-16T23:59:59.000Z

    A system for converting heat from an engine into work includes a boiler coupled to a heat source for transferring heat to a working fluid, a turbine that transforms the heat into work, a condenser that transforms the working fluid into liquid, a recuperator with one flow path that routes working fluid from the turbine to the condenser, and another flow path that routes liquid working fluid from the condenser to the boiler, the recuperator being configured to transfer heat to the liquid working fluid, and a bypass valve in parallel with the second flow path. The bypass valve is movable between a closed position, permitting flow through the second flow path and an opened position, under high engine load conditions, bypassing the second flow path.

  19. Multi-Level TESLA: Broadcast Authentication for Distributed Sensor Networks

    E-Print Network [OSTI]

    Ning, Peng

    Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG named multi-level µTESLA based on µTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multi-level µTESLA satisfies several nice

  20. On the construction of digest functions for manual authentication protocols

    E-Print Network [OSTI]

    Jeavons, Peter

    On the construction of digest functions for manual authentication protocols Abstract A digest. Frequently a digest function needs to have a very short output (e.g. 16­32 bits) and no key is used to digest, notably message authentication codes or MACs. Short digests can be constructed directly or by "condensing

  1. T-659: Update support for RSA Authentication Manager

    Broader source: Energy.gov [DOE]

    RSA posted SP4 Patch 4 of their Authentication Manager product 06/30/2011. There are a few pages of fixes in the README, but the most significant is that Authentication Manager can now be installed on Windows Server 2008 (both 32 and 64bit).

  2. Authenticating concealed private data while maintaining concealment

    DOE Patents [OSTI]

    Thomas, Edward V. (Albuquerque, NM); Draelos, Timothy J. (Albuquerque, NM)

    2007-06-26T23:59:59.000Z

    A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.

  3. User Meeting Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Meeting Awards web banner ALS User Meeting Awards See the 2013 User Meeting Awards Winners Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops...

  4. Hardware authentication using transmission spectra modified optical fiber.

    SciTech Connect (OSTI)

    Grubbs, Robert K.; Romero, Juan A.

    2010-09-01T23:59:59.000Z

    The ability to authenticate the source and integrity of data is critical to the monitoring and inspection of special nuclear materials, including hardware related to weapons production. Current methods rely on electronic encryption/authentication codes housed in monitoring devices. This always invites the question of implementation and protection of authentication information in an electronic component necessitating EMI shielding, possibly an on board power source to maintain the information in memory. By using atomic layer deposition techniques (ALD) on photonic band gap (PBG) optical fibers we will explore the potential to randomly manipulate the output spectrum and intensity of an input light source. This randomization could produce unique signatures authenticating devices with the potential to authenticate data. An external light source projected through the fiber with a spectrometer at the exit would 'read' the unique signature. No internal power or computational resources would be required.

  5. Industrial Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > The Energy Materials Center at CornellOf SmartIndustrial Users The

  6. User Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron SpinPrinceton PlasmaAfternoon4. UraniumUsedFacilities OfficeUser Policy

  7. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron SpinPrinceton PlasmaAfternoon4.CCSM4large.jpg BER:Services Print TheUser

  8. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron SpinPrinceton PlasmaAfternoon4.CCSM4large.jpg BER:Services PrintUser

  9. NIF Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > The EnergyCenterDioxide CaptureSee theOil & GasPSTarget NIF Users

  10. Prospective Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclear Press Releases ArchiveServices »Projects ExcitonHome User

  11. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAboutUser Services Print The

  12. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAboutUser Services Print TheAuthor

  13. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAboutUser Services Print

  14. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAboutUser Services PrintServices Print

  15. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAboutUser Services PrintServices

  16. User Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy, science,SpeedingWu,IntelligenceYou are ABOUT US ITER | WHY FUSION? |User

  17. Thermal Reliability Study of Bypass Diodes in Photovoltaic Modules (Poster)

    SciTech Connect (OSTI)

    Zhang, Z.; Wohlgemuth, J.; Kurtz, S.

    2013-05-01T23:59:59.000Z

    This paper presents the result of high-temperature durability and thermal cycling testing and analysis for the selected diodes to study the detail of the thermal design and relative long-term reliability of the bypass diodes used to limit the detrimental effects of module hot-spot susceptibility.

  18. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThis documentEnergy(SHINES)FullThe

  19. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartment

  20. authenticated key agreement: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    desirable attributes. Index Terms--Mutual Authentication; Key Management; SRP; Security; Smart Meter; Smart Leung, Victor C.M. 53 On the security of some password-based key...

  1. Stronger security bounds for WegmanCarterShoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    Stronger security bounds for Wegman­Carter­Shoup authenticators Daniel J. Bernstein # Department, Wegman­Carter, provable security 1 Introduction This paper proves that various state­of­the­art 128­bit

  2. Authenticated Encryption: How Reordering can Impact Performance Basel Alomair

    E-Print Network [OSTI]

    ciphertext blocks are then authenticated using a MAC based on a universal hash-function family (in the Carter-Wegman encryption [30]. The GCM standard is based on the Carter- Wegman Counter (CWC) blockcipher mode

  3. austrian meat authenticity: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is...

  4. Understanding 'It': Affective Authenticity, Space, and the Phish Scene

    E-Print Network [OSTI]

    Yeager, Elizabeth Anne

    2011-04-26T23:59:59.000Z

    "Understanding It: Affective Authenticity, Space, and the Phish Scene" is an ethnographic study of "scene identity" around the contemporary rock band Phish. Utilizing data generated from six years of ethnographic fieldwork, ...

  5. Authenticity and Physiological Changes during Defensive Verbal Response

    E-Print Network [OSTI]

    Yen, Yana

    2013-08-31T23:59:59.000Z

    who are more authentic experience higher subjective well-being because they feel in control of their self (Kifer, Heller, Perunovic, & Galinsky, 2013). Thus, by paying attention to how one’s cognitions, physiology, and behavior support or challenge...

  6. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22T23:59:59.000Z

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  7. Analog Video Authentication and Seal Verification Equipment Development

    SciTech Connect (OSTI)

    Gregory Lancaster

    2012-09-01T23:59:59.000Z

    Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital images and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.

  8. CHEMFORM user`s guide

    SciTech Connect (OSTI)

    Sjoreen, A.; Toran, L.

    1996-01-01T23:59:59.000Z

    CHEMFORM is a DOS-based program which converts geochemical data files into the format read by the U.S. Geological Survey family of models: WATEQ4F, PHREEQE, or NETPATH. These geochemical models require data formatted in a particular order, which typically does not match data storage. CHEMFORM converts geochemical data that are stored in an ASCII file to input files that can be read by these models, without being re-entered by hand. The data may be in any order and format in the original file, as long as they are separated by blanks. The location of each data element in the input file is entered in CHEMFORM. Any required data that are not present in your file may also be entered. The positions of the data in the input file are saved to be used as defaults for the next run. CHEMFORM runs in two modes. In the first mode, it will read one input file and write one output file. The input file may contain data on multiple lines, and the user will specify both line number and position of each item in CHEMFORM. This mode facilitates the conversion of the input from one model to the format needed by another model. In the second mode, the CHEMFORM input files contains more than one water analysis. All the geochemical data for a given sample are stored on one line, and CHEMFORM writes an output file for each line. This mode is useful when many samples are available for a site in the same format (different monitoring points or samples taken at different times from one monitoring point).

  9. V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

  10. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...

    Office of Environmental Management (EM)

    can exploit these issues to execute arbitrary PHP code within the context of the web server, bypass certain security restrictions, and perform unauthorized actions; this may aid...

  11. Manual authentication for wireless devices Christian Gehrmann

    E-Print Network [OSTI]

    Mitchell, Chris

    is to examine how these services might best be achieved for personal wireless-enabled devices. Using the terminology of Stajano [12], the problem is that of securely `imprinting' a personal device. That is, suppose a user has two wireless-enabled devices, e.g. a mobile phone and a Personal Digital Assistant (PDA

  12. Fraction Collector User Manual

    E-Print Network [OSTI]

    Pawlowski, Wojtek

    Fraction Collector Frac-950 18-1139-56 User Manual #12;#12;Important user information All users Territories Hong Kong © Copyright Amersham Biosciences AB 2002 - All rights reserved Fraction Collector Frac Fraction Collector Frac-950 User Manual 18-1139-56 Edition AE v Contents 1 Introduction 1.1 General

  13. Franklin: User Experiences

    SciTech Connect (OSTI)

    National Energy Research Supercomputing Center; He, Yun (Helen); Kramer, William T.C.; Carter, Jonathan; Cardo, Nicholas

    2008-05-07T23:59:59.000Z

    The newest workhorse of the National Energy Research Scientific Computing Center is a Cray XT4 with 9,736 dual core nodes. This paper summarizes Franklin user experiences from friendly early user period to production period. Selected successful user stories along with top issues affecting user experiences are presented.

  14. Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis

    E-Print Network [OSTI]

    Li, Depeng

    Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...

  15. Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)

    E-Print Network [OSTI]

    Doran, Simon J.

    1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

  16. The fragility of AES-GCM authentication algorithm Shay Gueron1,2

    E-Print Network [OSTI]

    for the authentication. The GHASH algorithm is a special form of the Carter-Wegman polynomial evaluation MAC. Each 16

  17. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Tygar, Doug

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

  18. Building the Big Message Authentication Code Dale R. THOMPSON, J. Brad MAXWELL, and James P. PARKERSON

    E-Print Network [OSTI]

    Thompson, Dale R.

    Building the Big Message Authentication Code Dale R. THOMPSON, J. Brad MAXWELL, and James P.S.A. ABSTRACT Message Authentication Codes (MAC) are used to ensure the integrity of digital content is not compromised and to authenticate the sender. A MAC can be constructed by using a message digest and a shared

  19. University of Newcastle upon Tyne Evaluation of Authorization-Authentication Tools: PERMIS, OASIS,

    E-Print Network [OSTI]

    Newcastle upon Tyne, University of

    -Authentication Tools: PERMIS, OASIS, XACML & SHIBOLETH J. Wu and P. Periorellis TECHNICAL REPORT SERIES No. CS-TR-935 of Authorization-Authentication Tools: PERMIS, OASIS, XACML & SHIBOLETH J. Wu, P. Periorellis Abstract GOLD (Grid., PERIORELLIS, P.. Evaluation of Authorization-Authentication Tools: PERMIS, OASIS, XACML & SHIBOLETH [By] J. Wu

  20. The order of encryption and authentication for protecting communications (Or: how secure is SSL?)

    E-Print Network [OSTI]

    The order of encryption and authentication for protecting communications (Or: how secure is SSL and authentication, including the authenticate-then-encrypt method used in SSL, are not generically secure. We show with a random or pseudorandom pad). Thus, while we show the generic security of SSL to be broken, the current

  1. Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication

    E-Print Network [OSTI]

    Basin, David

    , or authentication of transmitted data [27,33]. The ISO (International Organization for Standardization) and IECProvably Repairing the ISO/IEC 9798 Standard for Entity Authentication David Basin, Cas Cremers the family of entity authentication protocols defined by the ISO/IEC 9798 standard and find numerous

  2. Authentication : can mobile environments be secured?

    E-Print Network [OSTI]

    Cropper, Charles Austin

    2013-02-22T23:59:59.000Z

    . An encryption scheme, i. e. a set of transformations that change readable text (plaintext) into secret text (ciphertext) [19]. Cryptography. The art of secret writing [17]. The branch of mathematics based on the transformation of data [26]. Mobile System. A... communication system requiring no physical link between the user and a service provider [27]. Protocols. Consists of a set of procedures by which activities transpire. Smart Card. Resembles a credit card in appearance. Smart cards have embedded, single...

  3. T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges.

  4. Authentication in the Clouds: A Framework and its Application to Mobile Users

    E-Print Network [OSTI]

    .00. With bank accounts, health records, corporate intellectual property and politically sensitive information. For instance, it is often not practical to require security-related computation that notably limits battery

  5. Implicit User Re-Authentication for Mobile Sausan Yazji, Xi Chen, Robert P. Dick, Peter Scheuermann

    E-Print Network [OSTI]

    Bustamante, Fabián E.

    of servers and battery-powered portable devices. The proposed system is able to distinguish between normal% of a typical laptop battery in 24 hours. 1 Introduction Portable computing devices such as personal digital- formation, e.g., bank account, commercial transaction, and private emails. How- ever, they are frequently

  6. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Energy Savers [EERE]

    5.x ABSTRACT: Several vulnerabilities were reported in RSA Archer eGRC. REFERENCE LINKS: EMC SecurityTracker Alert ID: 1028516 CVE-2013-0932 CVE-2013-0933 CVE-2013-0934 IMPACT...

  7. V-127: Samba Bug Lets Remote Authenticated Users Modify Files | Department

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment ofPrivileges | DepartmentDepartmentAttacksMozillaof

  8. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23, 2014,Zaleski -BlueprintThisVulnerabilities | Department ofForgery Attacks

  9. U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitrary Code | Department

  10. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscarora Phase IIDOEArbitraryPrivileges, Inject

  11. U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary Code

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartment ofDepartmentScripting

  12. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are being directedAnnual Siteof Energy 2, 2015 -Helicopter-Japan Joint NuclearDepartment ofEnergy

  13. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|Potomac RiverWithDepartment ofGain Elevated

  14. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of 2005UNSDepartmentFebruaryPhase|Potomac RiverWithDepartmentFixation Attacks |

  15. V-195: RSA Authentication Manager Lets Local Users View the Administrative

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015of

  16. V-223: RSA Authentication Agent for PAM Allows Remote Users to Make

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742Energy China 2015ofDepartment of Energy Microsoft SecurityEnergyDepartment ofSUSE

  17. V-195: RSA Authentication Manager Lets Local Users View the Administrative

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your DensityEnergy U.S.-China Electric Vehicle and03/02 TUE 08:59Capability for2:ofDepartment|AttacksAccount

  18. U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page onYouTube YouTube Note: Since the.pdfBreakingMayDepartmentTest forTechnologiesTribalInjury at the Hanford8 Annual FOIAU

  19. Alteration of the groundwater table due to construction of a floodplain bypass at Upper Pine Creek, Concord, California

    E-Print Network [OSTI]

    Williams, John L III

    2003-01-01T23:59:59.000Z

    66 Exploratory Boring 67 Natural Creek 72 Floodplain BypassChannel 78 Floodplain Bypass Channel 65 Natural Creek 69Natural Creek Table 2 Post-Project Groundwater Table Raw

  20. Dead Block Replacement and Bypass with a Sampling Predictor Daniel A. Jimenez

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Dead Block Replacement and Bypass with a Sampling Predictor Daniel A. Jim´enez Department of Computer Science The University of Texas at San Antonio Abstract We present a cache replacement and bypass policy driven by dead block prediction. A block is considered dead is it will be replaced before

  1. Rankine cycle condenser pressure control using an energy conversion device bypass valve

    DOE Patents [OSTI]

    Ernst, Timothy C; Nelson, Christopher R; Zigan, James A

    2014-04-01T23:59:59.000Z

    The disclosure provides a waste heat recovery system and method in which pressure in a Rankine cycle (RC) system of the WHR system is regulated by diverting working fluid from entering an inlet of an energy conversion device of the RC system. In the system, an inlet of a controllable bypass valve is fluidly coupled to a working fluid path upstream of an energy conversion device of the RC system, and an outlet of the bypass valve is fluidly coupled to the working fluid path upstream of the condenser of the RC system such that working fluid passing through the bypass valve bypasses the energy conversion device and increases the pressure in a condenser. A controller determines the temperature and pressure of the working fluid and controls the bypass valve to regulate pressure in the condenser.

  2. Preliminary Study of Bypass Flow in Prismatic Core of Very High Temperature Reactor Using Small-Scale Model 

    E-Print Network [OSTI]

    Kanjanakijkasem, Worasit 1975-

    2012-11-29T23:59:59.000Z

    . Bypass flow experiments are conducted by using three small-scale models of prismatic blocks. They are stacked in a test section to form bypass gaps of single-layer blocks as exist in prismatic core of VHTR. Three bypass gap widths set in air and water...

  3. Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 8th Keystroke Biometric Test-Taker Authentication System

    E-Print Network [OSTI]

    Tappert, Charles

    Biometric Test-Taker Authentication System Michael Wuench, Mingfei Bi, Evelin Urbaez, Shaji Mary Varghese

  4. Title of Dissertation: EPISTEMOLOGICAL AUTHENTICITY IN SCIENCE CLASSROOMS

    E-Print Network [OSTI]

    Maryland at College Park, University of

    ABSTRACT Title of Dissertation: EPISTEMOLOGICAL AUTHENTICITY IN SCIENCE CLASSROOMS Paul S. Hutchison, Ph.D., 2008 Dissertation Directed By: Professor David Hammer, Departments of Curriculum Dissertation submitted to the Faculty of the Graduate School of the University of Maryland, College Park

  5. Authentication Control Point and Its Implications For Secure Processor Design

    E-Print Network [OSTI]

    Lee, Hsien-Hsin "Sean"

    Authentication Control Point and Its Implications For Secure Processor Design Weidong Shi Hsien. Despite a number of secure processor designs have been proposed, the delicate relationship between privacy and integrity protection in the context of modern out-of-order processor design is not well understood

  6. Bucket Hashing and its Application to Fast Message Authentication

    E-Print Network [OSTI]

    Bernstein, Daniel

    the contents of each bucket; then collect up all the buckets' contents. Used in the context of Wegman to authenticate. But it is well­known that this reasoning is specious: in particular, Wegman and Carter [32. In the Wegman--Carter approach communicating parties S and V share a secret key k = (h; P ) which specifies both

  7. Key recycling in authentication Christopher Portmann #1,2

    E-Print Network [OSTI]

    , Switzerland. May 31, 2012 Abstract In their seminal work on authentication, Wegman and Carter pro­ pose of rounds it is completely known. We show however that this leak is very small, and Wegman and Carter, and in their seminal work [1], Wegman and Carter showed that it can be achieved with information­theoretic security

  8. Key recycling in authentication Christopher Portmann1,2

    E-Print Network [OSTI]

    , Switzerland. May 31, 2012 Abstract In their seminal work on authentication, Wegman and Carter pro- pose finite amount of rounds it is completely known. We show however that this leak is very small, and Wegman], Wegman and Carter showed that it can be achieved with information-theoretic security by appending a tag

  9. Patent-Free Authenticated-Encryption As Fast As OCB

    E-Print Network [OSTI]

    Krovetz, Ted

    . Encryption is achieved via counter-mode while authenti- cation uses the Wegman-Carter paradigm. A single encryption and authentication under a single key. Some of the modes also switch to faster Wegman to nearly x cpb because recent Wegman-Carter schemes are as fast as 0.5 cpb--much faster than any known

  10. Universal hashing and authentication codes 1 D. R. Stinson

    E-Print Network [OSTI]

    Stinson, Douglas

    authentication codes without secrecy. This idea is due to Wegman and Carter [14], who gave a construction which states (plaintext messages). We generalize the Wegman and Carter construction by formally de#12;ning some to decrease the key length by a factor of four (roughly) compared to the Wegman and Carter construction, while

  11. Behavioral Authentication of Server Flows James P. Early

    E-Print Network [OSTI]

    Rosenberg, Catherine P.

    Behavioral Authentication of Server Flows James P. Early Carla E. Brodley ˇ Catherine Rosenberg, in the presence of proxy servers that re-map port numbers or host services that have been compromised to act as backdoors or covert channels. We present an approach to classify server traffic based on decision trees

  12. Forging Attacks on two Authenticated Encryptions COBRA and POET

    E-Print Network [OSTI]

    Forging Attacks on two Authenticated Encryptions COBRA and POET Mridul Nandi Indian Statistical COBRA [4], based on pseudorandom per- mutation (PRP) blockcipher, and POET [3], based on Almost XOR and a simple vari- ant of the original proposal of POET (due to a forging attack [13] on the original proposal

  13. Authenticated Streamwise On-line Encryption Patrick P. Tsang

    E-Print Network [OSTI]

    and end-to-end latency. Also, ASOE provides data authenticity as an option. ASOE can therefore be used construction incurs zero end-to-end latency due to buffering and only 48 bytes of message expansion, regardless 7.3 End-to-end Latency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 7

  14. SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees

    E-Print Network [OSTI]

    Gummadi, Ramakrishna

    SSL Splitting and Barnraising: Cooperative Caching with Authenticity Guarantees by Christopher T by . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Arthur C. Smith Chairman, Department Committee on Graduate Students #12;SSL Splitting and Barnraising for the degree of Master of Engineering in Electrical Engineering and Computer Science Abstract SSL splitting

  15. Non-Cryptographic Authentication and Identification in Wireless Networks

    E-Print Network [OSTI]

    California at Davis, University of

    1 Non-Cryptographic Authentication and Identification in Wireless Networks Kai Zeng, Kannan considered as potential alternatives/complements to provide security services in wireless networks identi- fication in wireless networks using lower/physical layer properties or information. We discuss

  16. A Hybrid Authentication and Authorization Process for Control System Networks

    SciTech Connect (OSTI)

    Manz, David O.; Edgar, Thomas W.; Fink, Glenn A.

    2010-08-25T23:59:59.000Z

    Convergence of control system and IT networks require that security, privacy, and trust be addressed. Trust management continues to plague traditional IT managers and is even more complex when extended into control system networks, with potentially millions of entities, a mission that requires 100% availability. Yet these very networks necessitate a trusted secure environment where controllers and managers can be assured that the systems are secure and functioning properly. We propose a hybrid authentication management protocol that addresses the unique issues inherent within control system networks, while leveraging the considerable research and momentum in existing IT authentication schemes. Our hybrid authentication protocol for control systems provides end device to end device authentication within a remote station and between remote stations and control centers. Additionally, the hybrid protocol is failsafe and will not interrupt communication or control of vital systems in a network partition or device failure. Finally, the hybrid protocol is resilient to transitory link loss and can operate in an island mode until connectivity is reestablished.

  17. ELmE : A Misuse Resistant Parallel Authenticated Encryption

    E-Print Network [OSTI]

    -Encrypt constructions (inherently inefficient but provide full pri- vacy) and online constructions, e.g., McOE, sponge bottleneck in processing associated data. In this paper, we design a new online secure authenticated in associated data) and pipeline implementable. It also provides full privacy when associated data (which

  18. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Doran, Simon J.

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  19. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  20. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

  1. Cryptanalysis of a recent two factor authentication scheme

    E-Print Network [OSTI]

    Centre Dublin City University Ballymun, Dublin 9, Ireland. mike.scott@certivox.com Abstract. Very recently a scheme has been proposed by Wang and Ma for a robust smart-card based password authentication scheme, which claims to be secure against a Smart Card security breach. In this short note we attempt

  2. TRL Computer System User’s Guide

    SciTech Connect (OSTI)

    Engel, David W.; Dalton, Angela C.

    2014-01-31T23:59:59.000Z

    We have developed a wiki-based graphical user-interface system that implements our technology readiness level (TRL) uncertainty models. This document contains the instructions for using this wiki-based system.

  3. LANSCE | Users | LUG | Topical User Workshop

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to NNSA's call for major NNSA facility upgrades, as well as new end stations at the Lujan Neutron Scattering Center. All current and potential LANSCE users are encouraged to...

  4. C. T. Lin, S. P. Shieh / Chain Authentication in Mobile Communication Systems Chain Authentication in Mobile Communication

    E-Print Network [OSTI]

    Shieh, Shiuhpyng Winston

    , video, image, and data, be available anytime and everywhere to everybody. The Federal Communications Commission (FCC), U. S. A., defines personal communications services as "a family of mobile or portable radioC. T. Lin, S. P. Shieh / Chain Authentication in Mobile Communication Systems 1 Chain

  5. New pathway to bypass the 15O waiting point

    E-Print Network [OSTI]

    I. Stefan; F. de Oliveira Santos; M. G. Pellegriti; G. Dumitru; J. C. Angélique; M. Angélique; E. Berthoumieux; A. Buta; R. Borcea; A. Coc; J. M. Daugas; T. Davinson; M. Fadil; S. Grévy; J. Kiener; A. Lefebvre-Schuhl; M. Lenhardt; M. Lewitowicz; F. Negoita; D. Pantelica; L. Perrot; O. Roig; M. G. Saint Laurent; I. Ray; O. Sorlin; M. Stanoiu; C. Stodel; V. Tatischeff; J. C. Thomas

    2006-04-14T23:59:59.000Z

    We propose the sequential reaction process $^{15}$O($p$,$\\gamma)(\\beta^{+}$)$^{16}$O as a new pathway to bypass of the $^{15}$O waiting point. This exotic reaction is found to have a surprisingly high cross section, approximately 10$^{10}$ times higher than the $^{15}$O($p$,$\\beta^{+}$)$^{16}$O. These cross sections were calculated after precise measurements of energies and widths of the proton-unbound $^{16}$F low lying states, obtained using the H($^{15}$O,p)$^{15}$O reaction. The large $(p,\\gamma)(\\beta^{+})$ cross section can be understood to arise from the more efficient feeding of the low energy wing of the ground state resonance by the gamma decay. The implications of the new reaction in novae explosions and X-ray bursts are discussed.

  6. Leveraging Personal Devices for Stronger Password Authentication from Untrusted Computers

    E-Print Network [OSTI]

    Van Oorschot, Paul

    protocols are vulnerable to attacks including keylogging, phishing, and pharming, which can extract user

  7. A service-oriented architecture for authentication and authorization

    E-Print Network [OSTI]

    Hamedtoolloei, Hamidreza

    2009-01-01T23:59:59.000Z

    distribution: system entities such as users, resources, and sites are inher- ently distributed. • Reliability:

  8. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Aysajan Abidin; Jan-Ĺke Larsson

    2013-03-01T23:59:59.000Z

    Information-theoretically secure (ITS) authentication is needed in Quantum Key Distribution (QKD). In this paper, we study security of an ITS authentication scheme proposed by Wegman & Carter, in the case of partially known authentication key. This scheme uses a new authentication key in each authentication attempt, to select a hash function from an Almost Strongly Universal$_2$ hash function family. The partial knowledge of the attacker is measured as the trace distance between the authentication key distribution and the uniform distribution; this is the usual measure in QKD. We provide direct proofs of security of the scheme, when using partially known key, first in the information-theoretic setting and then in terms of witness indistinguishability as used in the Universal Composability (UC) framework. We find that if the authentication procedure has a failure probability $\\epsilon$ and the authentication key has an $\\epsilon'$ trace distance to the uniform, then under ITS, the adversary's success probability conditioned on an authentic message-tag pair is only bounded by $\\epsilon+|\\mT|\\epsilon'$, where $|\\mT|$ is the size of the set of tags. Furthermore, the trace distance between the authentication key distribution and the uniform increases to $|\\mT|\\epsilon'$ after having seen an authentic message-tag pair. Despite this, we are able to prove directly that the authenticated channel is indistinguishable from an (ideal) authentic channel (the desired functionality), except with probability less than $\\epsilon+\\epsilon'$. This proves that the scheme is ($\\epsilon+\\epsilon'$)-UC-secure, without using the composability theorem.

  9. APS User News, Issue 85

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to table of contents USER MATTERS 2014 Users Meeting Registration Open The 2014 APSCNMEMC Users Meeting: User Science: Discoveries for Tomorrow will be held May 12-15, 2014....

  10. Demonstration of a hitless bypass switch using nanomechanical perturbation for high-bitrate transparent networks

    E-Print Network [OSTI]

    Chatterjee, Rohit

    We demonstrate an optical hitless bypass switch based on nanomechanical proximity perturbation for high-bitrate transparent networks. Embedded in a single-level ?-imbalanced Mach-Zehnder interferometer, the two ...

  11. Asynchronous Bypass Channels Improving Performance for Multi-synchronous Network-on-chips

    E-Print Network [OSTI]

    Jain, Tushar Naveen Kumar

    2011-10-21T23:59:59.000Z

    microarchitecture which offers superior performance versus typical synchroniz- ing router designs. Our approach features Asynchronous Bypass Channels (ABCs) at intermediate nodes thus avoiding synchronization delay. We also propose a new network topology and routing...

  12. User Program | Prospective Users Non-US

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAbout UsUser2/20/13User GuidePolicyNon

  13. LANSCE | User Resources

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    proposal process to the completion of the experiment, LANSCE provides its users with resources critical to their experiements and their experience. Lujan Resources WNR Resources...

  14. STANDARD USER AGREEMENT

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    addressed in Article IX. USER may be permitted by the Contractor to furnish equipment, tooling, test apparatus, or materials necessary to assist in the performance of its...

  15. User Facilities - Learn More

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a user Trip Planning Search by discipline Biological Science Chemical Science Computer Science Energy Science Engineering Material Sciences Neutron Science Physics Search by...

  16. User Electrical Equipment Inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    user electronics that are not tested by a Nationally Recognized Testing Laboratory (NRTL). This includes any type of non-commercial, home-built electronic and electrical...

  17. Vectum user's guide

    SciTech Connect (OSTI)

    McClurg, F.R.

    1992-04-01T23:59:59.000Z

    This user's guide is the documentation for vectum: the easy to use, flexible, multi-purpose, 2D velocity vector plotting package based on the NCAR Graphics libraries.

  18. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAboutUser Services UserUsersUsers'

  19. Experimental and Analytic Study on the Core Bypass Flow in a Very High Temperature Reactor

    SciTech Connect (OSTI)

    Richard Schultz

    2012-04-01T23:59:59.000Z

    Core bypass flow has been one of key issues in the very high temperature reactor (VHTR) design for securing core thermal margins and achieving target temperatures at the core exit. The bypass flow in a prismatic VHTR core occurs through the control element holes and the radial and axial gaps between the graphite blocks for manufacturing and refueling tolerances. These gaps vary with the core life cycles because of the irradiation swelling/shrinkage characteristic of the graphite blocks such as fuel and reflector blocks, which are main components of a core's structure. Thus, the core bypass flow occurs in a complicated multidimensional way. The accurate prediction of this bypass flow and counter-measures to minimize it are thus of major importance in assuring core thermal margins and securing higher core efficiency. Even with this importance, there has not been much effort in quantifying and accurately modeling the effect of the core bypass flow. The main objectives of this project were to generate experimental data for validating the software to be used to calculate the bypass flow in a prismatic VHTR core, validate thermofluid analysis tools and their model improvements, and identify and assess measures for reducing the bypass flow. To achieve these objectives, tasks were defined to (1) design and construct experiments to generate validation data for software analysis tools, (2) determine the experimental conditions and define the measurement requirements and techniques, (3) generate and analyze the experimental data, (4) validate and improve the thermofluid analysis tools, and (5) identify measures to control the bypass flow and assess its performance in the experiment.

  20. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

    2001-01-01T23:59:59.000Z

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

  1. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

    2000-01-01T23:59:59.000Z

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

  2. New foundations for efficient authentication, commutative cryptography, and private disjointness testing

    E-Print Network [OSTI]

    Weis, Stephen August, 1978-

    2006-01-01T23:59:59.000Z

    This dissertation presents new constructions and security definitions related to three areas: authentication, cascadable and commutative crytpography, and private set operations. Existing works relevant to each of these ...

  3. Nanotechnology User Facility for

    E-Print Network [OSTI]

    A National Nanotechnology User Facility for Industry Academia Government #12;The National Institute of Commerce's nanotechnology user facility. The CNST enables innovation by providing rapid access to the tools new measurement and fabrication methods in response to national nanotechnology needs. www

  4. V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabili...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2) An error within DIGEST authentication mechanism does not properly check server nonces. This weakness is reported in versions 5.5.0-5.5.35, 6.0.0-6.0.35, and...

  5. ARM User Survey Report

    SciTech Connect (OSTI)

    Roeder, LR

    2010-06-22T23:59:59.000Z

    The objective of this survey was to obtain user feedback to, among other things, determine how to organize the exponentially growing data within the Atmospheric Radiation Measurement (ARM) Climate Research Facility, and identify users’ preferred data analysis system. The survey findings appear to have met this objective, having received approximately 300 responses that give insight into the type of work users perform, usage of the data, percentage of data analysis users might perform on an ARM-hosted computing resource, downloading volume level where users begin having reservations, opinion about usage if given more powerful computing resources (including ability to manipulate data), types of tools that would be most beneficial to them, preferred programming language and data analysis system, level of importance for certain types of capabilities, and finally, level of interest in participating in a code-sharing community.

  6. User exit subroutines This section describes the user exit subroutine.

    E-Print Network [OSTI]

    Hall, Julian

    Chapter 3 User exit subroutines This section describes the user exit subroutine. 47 #12; 48 EMSOL) On entry dspace is the user­provided work area. Specified as: a one­dimensional real array of doublewords during ems sslv. Specified as: a fullword integer. usrrtcd is the user return code from the user exit

  7. User exit subroutines This section describes the user exit subroutine.

    E-Print Network [OSTI]

    Hall, Julian

    Chapter 3 User exit subroutines This section describes the user exit subroutine. 41 #12; 42 EMSOL) On entry dspace is the user­provided work area. Specified as: a one­dimensional real array of doublewords during ems sslv. Specified as: a fullword integer. usrrtcd is the user return code from the user exit

  8. User`s guide to MIDAS

    SciTech Connect (OSTI)

    Tisue, S.A.; Williams, N.B.; Huber, C.C. [Argonne National Lab., IL (United States). Decision and Information Sciences Div.] [Argonne National Lab., IL (United States). Decision and Information Sciences Div.; Chun, K.C. [Argonne National Lab., IL (United States). Environmental Assessment Div.] [Argonne National Lab., IL (United States). Environmental Assessment Div.

    1995-12-01T23:59:59.000Z

    Welcome to the MIDAS User`s Guide. This document describes the goals of the Munitions Items Disposition Action System (MIDAS) program and documents the MIDAS software. The main text first describes the equipment and software you need to run MIDAS and tells how to install and start it. It lists the contents of the database and explains how it is organized. Finally, it tells how to perform various functions, such as locating, entering, viewing, deleting, changing, transferring, and printing both textual and graphical data. Images of the actual computer screens accompany these explanations and guidelines. Appendix A contains a glossary of names for the various abbreviations, codes, and chemicals; Appendix B is a list of modem names; Appendix C provides a database dictionary and rules for entering data; and Appendix D describes procedures for troubleshooting problems associated with connecting to the MIDAS server and using MIDAS.

  9. Users from Industry

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAboutUser Services UserUsers from

  10. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAboutUser Services UserUsers

  11. V-036: EMC Smarts Network Configuration Manager Database Authentication

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyThe followingRemoteBypass Vulnerability

  12. Restoration Prioritization Toolset: Documentation and User’s Guides 2007

    SciTech Connect (OSTI)

    Judd, Chaeli; Woodruff, Dana L.; Thom, Ronald M.; Anderson, Michael G.; Borde, Amy B.

    2007-10-26T23:59:59.000Z

    This user’s guide provides technical background and details on the Restoration Prioritization Toolset developed for GoMRC as well as instructions for use.

  13. User' Software Manual

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MM-Group Home MMG Advisory Committees 4-ID-D Home Recent Publications Beamline Info Optics Instrumentation Software User Info FAQs 4-ID-D Beamline Software Manual Introduction...

  14. International aeronautical user charges

    E-Print Network [OSTI]

    Odoni, Amedeo R.

    1985-01-01T23:59:59.000Z

    Introduction: 1.1 BACKGROUND AND MOTIVATION Very few issues relating to the international air transportation industry are today as divisive as those pertaining to user charges imposed at international airports and enroute ...

  15. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Xu, Wenyuan

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

  16. The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Perrig, Adrian

    The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss­tolerant Authentication) broadcast au­ thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro­ nization between

  17. Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME

    E-Print Network [OSTI]

    Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

  18. Breaking POET Authentication with a Single Query Jian Guo, Jeremy Jean, Thomas Peyrin, and Lei Wang

    E-Print Network [OSTI]

    Breaking POET Authentication with a Single Query Jian Guo, J´er´emy Jean, Thomas Peyrin, and Lei article, we describe a very practical and simple attack on the au- thentication part of POET authenticated encryption mode proposed at FSE 2014. POET is a provably secure scheme that was designed to resist various

  19. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems

    E-Print Network [OSTI]

    Wang, Yongge

    Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

  20. Provably Repairing the ISO/IEC 9798 Standard for Entity Authentication

    E-Print Network [OSTI]

    Basin, David

    (International Organization for Standardization) and IEC (Interna- tional Electrotechnical Commission) jointlyProvably Repairing the ISO/IEC 9798 Standard for Entity Authentication David Basin, Cas Cremers the family of entity authentication proto- cols defined by the ISO/IEC 9798 standard and find numerous

  1. CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

  2. Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach

    E-Print Network [OSTI]

    Robust Smart Card based Password Authentication Scheme against Smart Card Security Breach Ding Wang University, Beijing 100871, China 3 Automobile Management Institute of PLA, Bengbu City 233011, China wangdingg@mail.nankai.edu.cn Abstract. As the most prevailing two-factor authentication mechanism, smart

  3. A Measurement Study on IKEv2 Authentication Performance in Wireless Networks

    E-Print Network [OSTI]

    Nřrvĺg, Kjetil

    . The performance cost evaluation of security protocols, such as the Internet key exchange version 2 (IKEv2 and IKEv2 in an OPNET simulation environment. They used pre-shared key (PSK) based authentication methodsA Measurement Study on IKEv2 Authentication Performance in Wireless Networks Zolt´an Faigl , Stefan

  4. Atomic-scale Authentication Using Resonant Tunnelling Diodes

    E-Print Network [OSTI]

    J. Roberts; I. E. Bagci; M. A. M. Zawawi; J. Sexton; N. Hulbert; Y. J. Noori; M. P. Young; C. S. Woodhead; M. Missous; M. A. Migliorato; U. Roedig; R. J. Young

    2015-02-23T23:59:59.000Z

    The rapid development of technology has provided a wealth of resources enabling the trust of everyday interactions to be undermined. Authentication schemes aim to address this challenge by providing proof of identity. This can be achieved by using devices that, when challenged, give unique but reproducible responses. At present, these distinct signatures are commonly generated by physically unclonable functions, or PUFs. These devices provide a straightforward measurement of a physical characteristic of their structure that has inherent randomness, due to imperfections in the manufacturing process. These hard-to-predict physical responses can generate a unique identity that can be used for authentication without relying on the secrecy of stored data. However, the classical design of these devices limits both their size and security. Here we show that the extensively studied problematic fluctuations in the current-voltage measurements of resonant tunnelling diodes (RTDs) provide an uncomplicated, robust measurement that can function as a PUF without conventional resource limitations. This is possible due to quantum tunnelling within the RTD, and on account of these room temperature quantum effects, we term such devices QUFs - quantum unclonable functions. As a result of the current-voltage spectra being dependent on the atomic structure and composition of the nanostructure within the RTD, each device provides a high degree of uniqueness, whilst being impossible to clone or simulate, even with state-of-the-art technology. We have thus created PUF-like devices requiring the fewest resources which make use of quantum phenomena in a highly manufacturable electronic device operating at room temperature. Conventional spectral analysis techniques, when applied to our QUFs, will enable reliable generation of unpredictable unique identities which can be employed in advanced authentication systems.

  5. VOLTTRON: User Guide

    SciTech Connect (OSTI)

    Lutes, Robert G.; Katipamula, Srinivas; Akyol, Bora A.; Tenney, Nathan D.; Haack, Jereme N.; Monson, Kyle E.; Carpenter, Brandon J.

    2014-04-24T23:59:59.000Z

    This document is a user guide for the deployment of the Transactional Network platform and agent/application development within the VOLTTRON. The intent of this user guide is to provide a description of the functionality of the Transactional Network Platform. This document describes how to deploy the platform, including installation, use, guidance, and limitations. It also describes how additional features can be added to enhance its current functionality.

  6. Oil Bypass Filter Technology Evaluation Tenth Quarterly Report January–March 2005

    SciTech Connect (OSTI)

    Larry Ziker; James Francfort

    2005-06-01T23:59:59.000Z

    This Oil Bypass Filter Technology Evaluation quarterly report (January– March 2005) details the ongoing fleet evaluation of oil bypass filter technologies being conducted by the Idaho National Laboratory (INL) for the U.S. Department of Energy’s FreedomCAR & Vehicle Technologies Program. Eleven INL fourcycle diesel-engine buses and six INL Chevrolet Tahoes with gasoline engines are equipped with oil bypass filter systems. Eight of the buses and the six Tahoes are equipped with oil bypass filters from the puraDYN Corporation; the remaining three buses are equipped with oil bypass filters from Refined Global Solutions. Both the puraDYN and Refined Global Solutions bypass filters have a heating chamber to remove liquid contaminates from the oil. During the January to March 2005 reporting quarter, the eleven diesel engine buses traveled 97,943 miles. As of March 31, 2005, the buses had accumulated 744,059 total test miles. During this quarter, four regularly scheduled 12,000-mile bus servicings were performed. The full-flow and bypass oil filters were changed and oil analysis samples were taken for the four buses. Bus 73446 had its oil changed due to a low total base number value. Bus 73450 had a major engine failure at the beginning of the quarter when one of its pushrods and valves were damaged. Buses 73432 and 73433 were removed from the bypass filter evaluation project and placed into the INL Diesel Engine Idling Wear-Rate Evaluation Test. While a total of nine oil changes on the INL buses occurred during the past 29 months, 53 oil changes have been avoided by using the oil bypass filters. The 53 avoided oil changes equates to 1,855 quarts (464 gallons) of new oil not consumed and 1,855 quarts of waste oil not generated. Therefore, over 85% of the oil normally required for oil-changes was not used, and, consequently, the evaluation achieved a greater than 85% reduction in the amount of waste oil normally generated by the buses. The six Tahoe test vehicles traveled 40,700 miles, and as of March 31, 2005, the Tahoes had accumulated 231,428 total test miles.

  7. Investigation on the Core Bypass Flow in a Very High Temperature Reactor

    SciTech Connect (OSTI)

    Hassan, Yassin

    2013-10-22T23:59:59.000Z

    Uncertainties associated with the core bypass flow are some of the key issues that directly influence the coolant mass flow distribution and magnitude, and thus the operational core temperature profiles, in the very high-temperature reactor (VHTR). Designers will attempt to configure the core geometry so the core cooling flow rate magnitude and distribution conform to the design values. The objective of this project is to study the bypass flow both experimentally and computationally. Researchers will develop experimental data using state-of-the-art particle image velocimetry in a small test facility. The team will attempt to obtain full field temperature distribution using racks of thermocouples. The experimental data are intended to benchmark computational fluid dynamics (CFD) codes by providing detailed information. These experimental data are urgently needed for validation of the CFD codes. The following are the project tasks: • Construct a small-scale bench-top experiment to resemble the bypass flow between the graphite blocks, varying parameters to address their impact on bypass flow. Wall roughness of the graphite block walls, spacing between the blocks, and temperature of the blocks are some of the parameters to be tested. • Perform CFD to evaluate pre- and post-test calculations and turbulence models, including sensitivity studies to achieve high accuracy. • Develop the state-of-the art large eddy simulation (LES) using appropriate subgrid modeling. • Develop models to be used in systems thermal hydraulics codes to account and estimate the bypass flows. These computer programs include, among others, RELAP3D, MELCOR, GAMMA, and GAS-NET. Actual core bypass flow rate may vary considerably from the design value. Although the uncertainty of the bypass flow rate is not known, some sources have stated that the bypass flow rates in the Fort St. Vrain reactor were between 8 and 25 percent of the total reactor mass flow rate. If bypass flow rates are on the high side, the quantity of cooling flow through the core may be considerably less than the nominal design value, causing some regions of the core to operate at temperatures in excess of the design values. These effects are postulated to lead to localized hot regions in the core that must be considered when evaluating the VHTR operational and accident scenarios.

  8. OASIS User Manual

    E-Print Network [OSTI]

    Bojtar, L

    2009-01-01T23:59:59.000Z

    The OASIS system has been operational for years now. After a long development the project has reached a state where the number of features it provides exceeds largely what most of its users knows about. The author felt it was time to write a user manual explaining all the functionality of the viewer application. This document is a user manual, concentrating on the functionality of the viewer from the user’s point of view. There are already documents available on the project’s web site about the technical aspects at http://project-oasis.web.cern.ch/project-oasis/presentations.htm . There was an attempt to produce a tutorial on the viewer, but it didn’t get much further than the table of contents, that however is well thought. The structure of this user manual follows the same principle, the basic and most often used features are grouped together. Advanced or less often used features are described in a separate chapter. There is a second organizational principle, features belong to different levels: chann...

  9. Oil Bypass Filter Technology Evaluation, Fourth Quarterly Report, July--September 2003

    SciTech Connect (OSTI)

    James E. Francfort; Larry Zirker

    2003-11-01T23:59:59.000Z

    This fourth Oil Bypass Filter Technology Evaluation report details the ongoing fleet evaluation of an oil bypass filter technology by the Idaho National Engineering and Environmental Laboratory (INEEL) for the U.S. Department of Energy’s FreedomCAR & Vehicle Technologies Program. Eight four-cycle diesel-engine buses used to transport INEEL employees on various routes have been equipped with oil bypass filter systems from the puraDYN Corporation. The bypass filters are reported to have engine oil filtering capability of <1 micron and a built-in additive package to facilitate extended oil-drain intervals. To date, the eight buses have accumulated 259,398 test miles. This represents an avoidance of 21 oil changes, which equates to 740 quarts (185 gallons) of oil not used or disposed of. To validate the extended oil-drain intervals, an oil-analysis regime evaluates the fitness of the oil for continued service by monitoring the presence of necessary additives, undesirable contaminants, and engine-wear metals. For bus 73450, higher values of iron have been reported, but the wear rate ratio (parts per million of iron per thousand miles driven) has remained consistent. In anticipation of also evaluating oil bypass systems on six Chevrolet Tahoe sport utility vehicles, the oil is being sampled on each of the Tahoes to develop a characterization history or baseline for each engine.

  10. Oil Bypass Filter Technology Evaluation - Third Quarterly Report, April--June 2003

    SciTech Connect (OSTI)

    Laurence R. Zirker; James E. Francfort

    2003-08-01T23:59:59.000Z

    This Third Quarterly report details the ongoing fleet evaluation of an oil bypass filter technology by the Idaho National Engineering and Environmental Laboratory (INEEL) for the U.S. Department of Energy’s FreedomCAR & Vehicle Technologies Program. Eight full-size, four-cycle diesel-engine buses used to transport INEEL employees on various routes have been equipped with oil bypass filter systems from the PuraDYN Corporation. The reported engine lubricating oil-filtering capability (down to 0.1 microns) and additive package of the bypass filter system is intended to extend oil-drain intervals. To validate the extended oil-drain intervals, an oil-analysis regime monitors the presence of necessary additives in the oil, detects undesirable contaminants and engine wear metals, and evaluates the fitness of the oil for continued service. The eight buses have accumulated 185,000 miles to date without any oil changes. The preliminary economic analysis suggests that the per bus payback point for the oil bypass filter technology should be between 108,000 miles when 74 gallons of oil use is avoided and 168,000 miles when 118 gallons of oil use is avoided. As discussed in the report, the variation in the payback point is dependant on the assumed cost of oil. In anticipation of also evaluating oil bypass systems on six Chevrolet Tahoe sport utility vehicles, the oil is being sampled on the six Tahoes to develop an oil characterization history for each engine.

  11. LANSCE | Training Office | User Training

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    header TA-53 Training Office User Specific Training LANL Training Services (Internal) LANL UTRAIN (Internal) LANL EXTRAIN (External) Training Office dotline User Training Below is...

  12. LANSCE | Lujan Center | Industrial Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Industrial Users The Lujan Neutron Scattering Center offers a diverse set of capabilities and instruments for industrial projects. Industrial users are invited to contact Fredrik...

  13. SLAC Linac Coherent Light Source User Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Support Contact information for LCLS scientific, operations and user support staff. User Support For information about user research administration at LCLS or SSRL. Cathy...

  14. Required Training for Users | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Required Training for Users All APS users, including APS staff, resident users, general users, etc., must complete the required "core" courses listed below before participating in...

  15. User exit subroutines This section describes the user exit subroutine.

    E-Print Network [OSTI]

    Hall, Julian

    Chapter 3 User exit subroutines This section describes the user exit subroutine. 39 #12; 40 EMSOL resetting the current model. Specification call ems itru(dspace, dspace, reason, userrtcd) On entry dspace. Specified as: a fullword integer. usrrtcd is the user return code from the user exit subroutine. Specified

  16. Lead User's theory adapted to services: Towards Service User's Toolkit

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Lead User's theory adapted to services: Towards Service User's Toolkit E. Stevens Prof under the perspective of networks and communities. Lead User's theory (LUT) focused mainly is to adapt lead user's theory and practice to the specific case of the intangible processes and services

  17. Tests of by-pass diodes at cryogenic temperatures for the KATRIN magnets

    SciTech Connect (OSTI)

    Gil, W. [Karlsruhe Institute of Technology, ITEP, Hermann-von-Helmholtz-Platz 1, D-76344, Eggenstein-Leopoldshafen (Germany); Bolz, H.; Jansen, A.; Müller, K.; Steidl, M. [Karlsruhe Institute of Technology, IKP, Hermann-von-Helmholtz-Platz 1, D-76344, Eggenstein-Leopoldshafen (Germany); Hagedorn, D. [CERN, TE-MPE, 1211 Geneva 23 (Switzerland)

    2014-01-27T23:59:59.000Z

    The Karlsruhe Tritium Neutrino experiment (KATRIN) requires a series of superconducting solenoid magnets for guiding beta-electrons from the source to the detector. By-pass diodes will operate at liquid helium temperatures to protect the superconducting magnets and bus bars in case of quenches. The operation conditions of the by-pass diodes depend on the different magnet systems of KATRIN. Therefore, different diode stacks are designed with adequate copper heat sinks assuming adiabatic conditions. The by-pass diode stacks have been submitted to cold tests both at liquid nitrogen and liquid helium temperatures for checking operation conditions. This report presents the test set up and first results of the diode characteristics at 300 K and 77 K, as well as of endurance tests of the diode stacks at constant current load at 77 K and 4.2 K.

  18. Oil Bypass Filter Technology Evaluation Ninth Quarterly Report October–December 2004

    SciTech Connect (OSTI)

    Larry Zirker; James Francfort; Jordan Fielding

    2005-02-01T23:59:59.000Z

    This Oil Bypass Filter Technology Evaluation quarterly report (October–December 2004) details the ongoing fleet evaluation of oil bypass filter technologies being conducted by the Idaho National Laboratory (INL; formerly Idaho National Engineering and Environmental Laboratory) for the U.S. Department of Energy’s FreedomCAR & Vehicle Technologies Program. Eight INL four-cycle diesel-engine buses used to transport INL employees on various routes and six INL Chevrolet Tahoes with gasoline engines are equipped with oil bypass filter systems from the puraDYN Corporation. This quarter, three additional buses were equipped with bypass filters from Refined Global Solutions. Oil bypass filters are reported to have an engine oil filtering capability of less than 1 micron. Both the puraDYN and Refined Global Solutions bypass filters have a heating chamber to remove liquid contaminate from the oil. During the quarter, the eleven diesel engine buses traveled 62,188 miles, and as of January 3, 2005 the buses had accumulated 643,036 total test miles. Two buses had their engine oil changed this quarter. In one bus, the oil was changed due to its degraded quality as determined by a low total base number (<3.0 mg KOH/g). The other bus had high oxidation and nitration numbers (>30.0 Abs/cm). Although a total of six buses have had their oil changed during the last 26 months, by using the oil bypass filters the buses in the evaluation avoided 48 oil changes, which equates to 1,680 quarts (420 gallons) of new oil not consumed and 1,680 quarts of waste oil not generated. Therefore, over 80% of the oil normally required for oil-changes was not used, and, consequently, the evaluation achieved over 80% reduction in the amount of waste oil normally generated. The six Tahoe test vehicles traveled 39,514 miles, and as of January 3, 2005 the Tahoes had accumulated 189,970 total test miles. The Tahoe filter test is in transition. To increase the rate of bypass filter oil flow on the Tahoes, puraDYN provided a larger orifice assembly, and these are being changed out as the Tahoes come in for regular service.

  19. Endovascular Treatment of a Coronary Artery Bypass Graft to Pulmonary Artery Fistula with Coil Embolization

    SciTech Connect (OSTI)

    Nielson, Jeffery L., E-mail: nielson@uhrad.com; Kang, Preet S. [University Hospitals of Cleveland and Veterans Administration Medical Center-Cleveland, Case Western Reserve University, Departments of Radiology (United States)

    2006-04-15T23:59:59.000Z

    Fistula formation between a coronary artery bypass graft (CABG)and the pulmonary arterial circulation represents a rare cause of recurrent angina in patients following bypass grafting. Therapy has traditionally involved surgical ligation by open thoracotomy. We describe a case of left internal mammary artery-left upper lobe pulmonary artery fistula presenting as early recurrent angina following CABG. The fistula was embolized using platinum coils, resulting in symptomatic relief and improvement in myocardial perfusion on cardiac perfusion scintigraphy. Coil embolization should be considered a therapeutic option in patients with coronary-pulmonary steal syndrome.

  20. MD user's manual

    SciTech Connect (OSTI)

    Correll, S.

    1988-04-01T23:59:59.000Z

    MD is the S-1 Mark IIA machine debugger. It is the hardware equivalent of a software symbolic debugger. It consists of a user-level program which executes on a VAX computer running Berkeley UNIX and a device driver which resides within the UNIX kernel. It communicates with the S-1 Mark IIA through a front-end interface attached to the UNIBUS of the VAX. The first section of this report describes MD's user interface and command set. The second section describes the virtual machine interface through which MD and the UNIX device driver communicate.

  1. User Accounts and Emails

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron SpinPrinceton PlasmaAfternoon4. UraniumUsed FuelFAQ » UsefulUserUser

  2. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron SpinPrinceton PlasmaAfternoon4.CCSM4large.jpgbriefing aboutUsers'Users'

  3. ALS Users' Association Charter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032)8Li (59AJ76) (See theDoctoral Fellowship inALSALSALSALS UserUsers'

  4. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch >Internship Program TheSite MapScience AcceleratorSurvey UserUsers'

  5. User Data Forum Presentations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAbout UsUser Agreements User

  6. User Financial Account Form

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAbout UsUser2/20/13 User Financial

  7. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAboutUser ServicesUsers' Executive

  8. CNMS User Newsletter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWPSuccess Stories Siteandscience, and8Critical4 CNMS User4 CNMS User

  9. CNMS User Newsletter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWPSuccess Stories Siteandscience, and8Critical4 CNMS User4 CNMS User5

  10. CNMS User Newsletter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWPSuccess Stories Siteandscience, and8Critical4 CNMS User4 CNMS User513

  11. 1st EGEE User Forum

    E-Print Network [OSTI]

    Lamanna, Massimo; Loomis, Carl; Enabling Grids for E-sciencE

    2006-01-01T23:59:59.000Z

    The EGEE project, organized a User Forum during March 1-3, 2006 at CERN, Geneva. This was an event focusing explicitly on the growing user community, and it provided an opportunity for in depth dialogue on the services provided to users, and on the experiences and planning of user communities drawn from a wide range of disciplines. The present document is the "Book of Abstracts" documenting the event and providing the activities of the EGEE user communities.

  12. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  13. Holographic Labeling And Reading Machine For Authentication And Security Appications

    DOE Patents [OSTI]

    Weber, David C. (Rancho Santa Margarita, CA); Trolinger, James D. (Costa Mesa, CA)

    1999-07-06T23:59:59.000Z

    A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

  14. The Emotional and Spiritual Dimensions of Being a Pastor: Authenticity and Identity

    E-Print Network [OSTI]

    Otey, Penny Addison

    2011-10-21T23:59:59.000Z

    Emotional labor and its influence on authenticity and identity amongst human service workers has been the focus of numerous studies. Often these studies viewed identity as a stable sense of self. This study set out to examine emotional labor amongst...

  15. Subverting value hierarchies : essays on the causes and responses to shifts in demand for authenticity

    E-Print Network [OSTI]

    Hahl, Oliver (Oliver Douglas)

    2013-01-01T23:59:59.000Z

    This dissertation includes three essays on the causes and responses to shifts in demand for authenticity. In the first chapter, I answer the question: why do previously cast-off products, practices, or styles abruptly ...

  16. Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key

    E-Print Network [OSTI]

    Direct Proof of Security of Wegman-Carter Authentication with Partially Known Key Aysajan Abidin by Wegman and Carter [24], in the case of partially known key. The scheme is based on secretly selecting

  17. Improving Classical Authentication over a Quantum Channel F. M. Assis1

    E-Print Network [OSTI]

    Lisboa, Universidade Técnica de

    be used to replace Wegman-Carter's classical authentication scheme in quantum key distribution (QKD the QKD protocol to bootstrap. The authenti- cation scheme commonly used in QKD is the Wegman

  18. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  19. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10T23:59:59.000Z

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  20. Questioning the Meaning of Authenticity in Martin Heidegger's Being and Time

    E-Print Network [OSTI]

    Liwinski, Thomas

    2011-10-21T23:59:59.000Z

    , it is necessary to highlight those commitments to phenomenology and hermeneutics that informs Heidegger's effort. The third chapter first introduces the various characterizations of authenticity that Heidegger offers in Being and Time and the problematic meaning...

  1. Using Unlabelled Data To Update Classification Rules With Applications In Food Authenticity Studies

    E-Print Network [OSTI]

    Washington at Seattle, University of

    library . . . . . . . . . . . 3 2 Average correct classification rates for the five meat groupsUsing Unlabelled Data To Update Classification Rules With Applications In Food Authenticity Studies programme. #12;Abstract A classification method is developed to classify samples when both labelled

  2. Salinas - User's Notes

    SciTech Connect (OSTI)

    ALVIN,KENNETH F.; BHARDWAJ,MANOJ K.; DRIESSEN,BRIAN; REESE,GARTH M.; SEGALMAN,DANIEL J.

    1999-11-01T23:59:59.000Z

    Salinas provides a massively parallel implementation of structural dynamics finite element analysis, required for high fidelity, validated models used in modal, vibration, static and shock analysis of weapons systems. This document provides a users guide to the input for Salinas. Details of input specifications for the different solution types, output options, element types and parameters are included. The appendices contain detailed examples, and instructions for running the software on parallel platforms.

  3. Anonymous, authentic, and accountable resource management based on the E-cash paradigm

    E-Print Network [OSTI]

    Lam, Tak Cheung

    2009-05-15T23:59:59.000Z

    AAA Anonymity, Authenticity, Accountability BC Binary Code BRGC Binary Reflected Gray Code CA Central Authority DHT Distributed Hashing Table DSI Double Spending Identification DVS Delegation Key, Verification Key, Secret Share GDA General... Disposable Authentication GDM General Divisibility Model GTM General Transferability Model MLBF Multi-Layer Bloom Filter KDM Key Dependency Map MSR Multi-Source Reusability P2P Peer-to-Peer RC Random Code SH Secret Handshake SOA Service Oriented...

  4. Biomass Feedstock National User Facility

    Broader source: Energy.gov [DOE]

    Breakout Session 1B—Integration of Supply Chains I: Breaking Down Barriers Biomass Feedstock National User Facility Kevin L. Kenney, Director, Biomass Feedstock National User Facility, Idaho National Laboratory

  5. Glycoprotein Enrichment Resin User Manual

    E-Print Network [OSTI]

    Lebendiker, Mario

    Glycoprotein Enrichment Resin User Manual Cat. No. 635647 PT4050-1 (PR912675) Published 14 January Laboratories, Inc. Version No. PR912675 ATakara Bio Company 2 Glycoprotein Enrichment Resin User Manual I.................................................................................................4 IV. Glycoprotein Enrichment

  6. AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES

    SciTech Connect (OSTI)

    Poland, R.; Drayer, R.; Wilson, J.

    2013-08-12T23:59:59.000Z

    This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operator’s and the IAEA’s interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using “joint use” equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEA’s ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

  7. Argonne User Facility Agreements | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Argonne User Facility Agreements About User Agreements If you are not an Argonne National Laboratory employee, a user agreement signed by your home institution is a prerequisite...

  8. CFD Analysis of Core Bypass Flow and Crossflow in the Prismatic Very High Temperature Gas-cooled Nuclear Reactor 

    E-Print Network [OSTI]

    Wang, Huhu 1985-

    2012-12-13T23:59:59.000Z

    Very High Temperature Rector (VHTR) had been designated as one of those promising reactors for the Next Generation (IV) Nuclear Plant (NGNP). For a prismatic core VHTR, one of the most crucial design considerations is the bypass flow and crossflow...

  9. JLF User Group

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > The Energy Materials Center atdiffusivities inJLF Forms JLFJLF User

  10. JLF User Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > The Energy Materials Center atdiffusivities inJLF Forms JLFJLF User JLF

  11. User Facility Science Highlights

    Office of Science (SC) Website

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4(SC) Mapping the ImpactSCDOE Office ofThe LifeUser Agreements

  12. Joint Facilities User Forum

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron beamJoin HERO Mariners vs.Joint Environmental User

  13. User Accounts and Emails

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron SpinPrinceton PlasmaAfternoon4. UraniumUsed FuelFAQ » UsefulUser

  14. User Liaison Office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron SpinPrinceton PlasmaAfternoon4. UraniumUsedFacilities Office Space User

  15. User Liaison Office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron SpinPrinceton PlasmaAfternoon4. UraniumUsedFacilities Office Space User

  16. User Liaison Office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron SpinPrinceton PlasmaAfternoon4. UraniumUsedFacilities Office Space User

  17. User Meeting Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron SpinPrinceton PlasmaAfternoon4. UraniumUsedFacilities Office SpaceUser

  18. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron SpinPrinceton PlasmaAfternoon4.CCSM4large.jpgbriefing aboutUsers'

  19. ALS Users' Association Charter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032)8Li (59AJ76) (See theDoctoral Fellowship inALSALSALSALS User

  20. National User Facilities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > The EnergyCenterDioxide CaptureSeeNUCLEAR SCIENCENational User

  1. Weekly User Schedule

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulenceUtilizeRuralthe emergency response2NetWeekly User

  2. Weekly User Schedule

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulenceUtilizeRuralthe emergency response2NetWeekly UserWeekly

  3. User Defined Images

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch >Internship Program TheSite Map SiteResearchMichiganAbout OverviewUser

  4. Users from Industry

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch >Internship Program TheSite MapScience AcceleratorSurvey User

  5. Weekly User Schedule

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch >Internship Program TheSiteEurekaWeekly User Schedule Print Requests for

  6. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAboutUser Services

  7. The User Agreement

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron Spin Transition in the Earth'sConnect, National.** #andUser

  8. ALS User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy, science,SpeedingWu,IntelligenceYou are70 Years ofAA-Z Index A BALS User

  9. About the User Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms About Become agovEducationWelcome toAboutAboutUsUser Program at

  10. 2013 User Meeting Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch >InternshipDepartment ofAugust 2011OctoberSeptember 2013333 User Meeting

  11. 2013 User Meeting Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch >InternshipDepartment ofAugust 2011OctoberSeptember 2013333 User Meeting3

  12. 2013 User Survey Text

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch >InternshipDepartment ofAugust 2011OctoberSeptember 2013333 User

  13. 2011 User Meeting Agenda

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruary 2004August 2011 Wed,2011 Cost of1 User Meeting

  14. 2011 User Meeting Agenda

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruary 2004August 2011 Wed,2011 Cost of1 User

  15. CNMS User Newsletter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWPSuccess Stories Siteandscience, and8Critical4 CNMS User Newsletter

  16. CNMS User Newsletter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWPSuccess Stories Siteandscience, and8Critical4 CNMS User Newsletter5

  17. CNMS User Newsletter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWPSuccess Stories Siteandscience, and8Critical4 CNMS User Newsletter52

  18. CNMS User Newsletter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625govInstrumentstdmadapInactiveVisiting the TWPSuccess Stories Siteandscience, and8Critical4 CNMS User

  19. General User Proposals (GUPs)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist.Newof EnergyFundingGene ControlsCounselGeneral User Proposals

  20. Photovoltaics information user study

    SciTech Connect (OSTI)

    Belew, W.W.; Wood, B.L.; Marie, T.L.; Reinhardt, C.L.

    1980-10-01T23:59:59.000Z

    The results of a series of telephone interviews with groups of users of information on photovoltaics (PV) are described. These results, part of a larger study on many different solar technologies, identify types of information each group needed and the best ways to get information to each group. The report is 1 of 10 discussing study results. The overall study provides baseline data about information needs in the solar community. It covers these technological areas: photovoltaics, passive solar heating and cooling, active solar heating and cooling, biomass energy, solar thermal electric power, solar industrial and agricultural process heat, wind energy, ocean energy, and advanced energy storage. An earlier study identified the information user groups in the solar community and the priority (to accelerate solar energy commercialization) of getting information to each group. In the current study only high-priority groups were examined. Results from seven PV groups respondents are analyzed in this report: DOE-Funded Researchers, Non-DOE-Funded Researchers, Researchers Working for Manufacturers, Representatives of Other Manufacturers, Representatives of Utilities, Electric Power Engineers, and Educators.

  1. T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500

    Broader source: Energy.gov [DOE]

    The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777.

  2. User Statistics Collection Practices Archives | U.S. DOE Office...

    Office of Science (SC) Website

    Policies and Processes User Statistics Collection Practices User Statistics Collection Practices Archives User Facilities User Facilities Home User Facilities at a Glance...

  3. Remote File PC Users Guide

    E-Print Network [OSTI]

    University of Technology, Sydney

    UTS: ITD Remote File Access 2010 PC Users Guide V3.0 #12;UTS:ITD Remote File Access: PC Users Guide Part III: Accessing Remote File Access 8 Part IV: Using Remote File Access 14 Part V: FAQ 25 #12;UTS:ITD Remote File Access: PC Users Guide v3.0 2010 3 1. What is Remote File Access? UTS Remote File Access

  4. APS User News, Issue 87

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Workshop Proposals and Beamline Scientist Award -- Nominees Sought for 12th Arthur H. Compton Award -- DOE Office of Science User Experiment Database -- Ten in a...

  5. Library Terms That Users Understand

    E-Print Network [OSTI]

    Kupersmith, John

    2012-01-01T23:59:59.000Z

    listed below Appalachian State University Library andGeorgia Southern University Library This test compared theNorth Carolina State University Libraries Test method: user

  6. LANSCE | Users | LUG | LUG EC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Media Media Events Profiles Highlights Seminars Activity Reports The Pulse User Program Headlines About LANSCE History Leadership LINAC Outreach Affiliations Visiting LANSCE...

  7. Customer Data Entry User's Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Customer Data Entry User's Guide, Version 2 Updated: September 18, 2014 The Customer Data Entry (CDE) Application provides BPA transmission customers with capability to view and...

  8. User Information | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    System Proposal Submission System CNM Tool Scheduler Scientific Contacts List CNM Users Organization Find CNM on the Argonne Map 2015 Maintenance Periods Key Research Areas...

  9. Library Terms That Users Understand

    E-Print Network [OSTI]

    Kupersmith, John

    2012-01-01T23:59:59.000Z

    University of Newfoundland Libraries Test methods: user taskUsability of the Academic Library Web Site: ImplicationsDesign," College & Research Libraries (July Library Website

  10. User Facilities | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Facilities Advanced Photon Source Argonne Leadership Computing Facility Argonne Tandem Linear Accelerator System Center for Nanoscale Materials Transportation Research and...

  11. Ahn-ANL_User_Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    WITH THE PROTOTYPE AT-TPC AT ATLAS Tan Ahn National Superconducting Cyclotron Lab, Michigan State University Single-Particle Structure and Reactions Session ATLAS Users...

  12. A Tree-Based TESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia

    E-Print Network [OSTI]

    Zhu, Sencun

    A Tree-Based µTESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu to multiple nodes in an authenticated way. µTESLA and multi-level µTESLA have been proposed to provide of senders. Though multi-level µTESLA schemes can scale up to large sensor networks (in terms of receivers

  13. Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite/Wireless Networks and

    E-Print Network [OSTI]

    Baras, John S.

    Probabilistic Non-Repudiation for Source Authentication with TESLA Certificates in Hybrid Satellite describe a novel non-repudiation mechanism for an authentication protocol based on the extended TESLA to this problem, we have proposed a new class of lightweight, symmetric key certificates called extended TESLA

  14. Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai Zeldovich, and Srinivas Devadas

    E-Print Network [OSTI]

    Sabatini, David M.

    Authenticated Storage Using Small Trusted Hardware Hsin-Jung Yang, Victor Costan, Nickolai}@mit.edu ABSTRACT A major security concern with outsourcing data storage to third- party providers is authenticating hardware (e.g., a monotonic counter) at the storage server achieve low throughput. This pa- per proposes

  15. TMAP7 User Manual

    SciTech Connect (OSTI)

    Glen R. Longhurst

    2008-12-01T23:59:59.000Z

    The TMAP Code was written at the Idaho National Engineering and Environmental Laboratory by Brad Merrill and James Jones in the late 1980s as a tool for safety analysis of systems involving tritium. Since then it was upgraded to TMAP4 and has been used in numerous applications including experiments supporting fusion safety, predictions for advanced systems such as the International Thermonuclear Experimental Reactor (ITER), and estimates involving tritium production technologies. Its further upgrade to TMAP2000 and now to TMAP7 was accomplished in response to several needs. TMAP and TMAP4 had the capacity to deal with only a single trap for diffusing gaseous species in solid structures. TMAP7 includes up to three separate traps and up to 10 diffusing species. The original code had difficulty dealing with heteronuclear molecule formation such as HD and DT under solution-law dependent diffusion boundary conditions. That difficulty has been overcome. TMAP7 automatically generates heteronuclear molecular partial pressures when solubilities and partial pressures of the homonuclear molecular species are provided for law-dependent diffusion boundary conditions. A further sophistication is the addition of non-diffusing surface species. Atoms such as oxygen or nitrogen or formation and decay or combination of hydroxyl radicals on metal surfaces are sometimes important in reactions with diffusing hydrogen isotopes but do not themselves diffuse appreciably in the material. TMAP7 will accommodate up to 30 such surface species, allowing the user to specify relationships between those surface concentrations and partial pressures of gaseous species above the surfaces or to form them dynamically by combining diffusion species or other surface species. Additionally, TMAP7 allows the user to include a surface binding energy and an adsorption barrier energy. The code includes asymmetrical diffusion between the surface sites and regular diffusion sites in the bulk. All of the previously existing features for heat transfer, flows between enclosures, and chemical reactions within the enclosures have been retained, but the allowed problem size and complexity have been increased to take advantage of the greater memory and speed available on modern computers. One additional feature unique to TMAP7 is the addition of radioactive decay for both trapped and mobile species. Whereas earlier versions required a separate FORTRAN compiler to operate, TMAP7 is based on a publiclicense compiler, distributed with the code.

  16. TMAP7 User Manual

    SciTech Connect (OSTI)

    Glen R. Longhurst

    2006-09-01T23:59:59.000Z

    The TMAP Code was written at the Idaho National Engineering and Environmental Laboratory by Brad Merrill and James Jones in the late 1980s as a tool for safety analysis of systems involving tritium. Since then it has been upgraded to TMAP4 and has been used in numerous applications including experiments supporting fusion safety, predictions for advanced systems such as the International Thermonuclear Experimental Reactor (ITER), and estimates involving tritium production technologies. Its further upgrade to TMAP2000 and now to TMAP7 was accomplished in response to several needs. TMAP and TMAP4 had the capacity to deal with only a single trap for diffusing gaseous species in solid structures. TMAP7 includes up to three separate traps and up to 10 diffusing species. The original code had difficulty dealing with heteronuclear molecule formation such as HD and DT. That has been removed. Under pre-specified boundary enclosure conditions and solution-law dependent diffusion boundary conditions, such as Sieverts' law, TMAP7 automatically generates heteronuclear molecular partial pressures when solubilities and partial pressures of the homonuclear molecular species are provided for law-dependent diffusion boundary conditions. A further sophistication is the addition of non-diffusing surface species. Atoms such as oxygen or nitrogen or formation and decay or combination of hydroxyl radicals on metal surfaces are sometimes important in reactions with diffusing hydrogen isotopes but do not themselves diffuse appreciably in the material. TMAP7 will accommodate up to 30 such surface species, allowing the user to specify relationships between those surface concentrations and partial pressures of gaseous species above the surfaces or to form them dynamically by combining diffusion species or other surface species. Additionally, TMAP7 allows the user to include a surface binding energy and an adsorption barrier energy. The code includes asymmetrical diffusion between the surface sites and regular diffusion sites in the bulk. All of the previously existing features for heat transfer, flows between enclosures, and chemical reactions within the enclosures have been retained, but the allowed problem size and complexity have been increased to take advantage of the greater memory and speed available on modern computers. One feature unique to TMAP7 is the addition of radioactive decay for both trapped and mobile species.

  17. User interfaces to expert systems

    SciTech Connect (OSTI)

    Agarwal, A.; Emrich, M.L.

    1988-10-01T23:59:59.000Z

    Expert Systems are becoming increasingly popular in environments where the user is not well versed in computers or the subject domain. They offer expert advice and can also explain their lines of reasoning. As these systems are applied to highly technical areas, they become complex and large. Therefore, User Systems Interfaces (USIs) become critical. This paper discusses recent technologies that can be applied to improved user communication. In particular, bar menus/graphics, mouse interfaces, touch screens, and voice links will be highlighted. Their applications in the context of SOFTMAN (The Software Manager Apprentice) a knowledge-based system are discussed. 18 refs., 2 figs.

  18. User account | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAboutUser Services User StatisticsUser

  19. User account | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAboutUser Services User StatisticsUser

  20. Nov. 15, 2001 Mohammad al-Kahtani 1 Emerging Authorization and Authentication

    E-Print Network [OSTI]

    Sandhu, Ravi

    1 Nov. 15, 2001 Mohammad al-Kahtani 1 XML Emerging Authorization and Authentication Standards Nov. 15, 2001 Mohammad al-Kahtani 2 About the speaker · Name: Mohammad al-Kahtani · Doctoral Candidate in Software Engineering: George Mason University · Contact info: malkahta@gmu.edu #12;2 Nov. 15, 2001 Mohammad

  1. All Your Face Are Belong to Us: Breaking Facebook's Social Authentication

    E-Print Network [OSTI]

    Yang, Junfeng

    All Your Face Are Belong to Us: Breaking Facebook's Social Authentication Iasonas Polakis FORTH adversaries from compromising accounts using stolen credentials. Facebook has recently released a two can obtain the information needed to solve the chal- lenges presented by Facebook. We implement

  2. Simplified authenticated key exchange based on the q(th) root problem

    SciTech Connect (OSTI)

    JOHNSTON,ANNA M.; GEMMELL,PETER S.

    2000-02-29T23:59:59.000Z

    Finding a q{sup th} root in GF(p), where p and q are prunes, q is large and q{sup 2} divides (p{minus}1) is a difficult problem equivalent to the discrete logarithm problem using an element of order q as the base. This paper describes an authenticated key exchange algorithm utilizing this hard problem.

  3. Distillation Codes and Applications to DoS Resistant Multicast Authentication

    E-Print Network [OSTI]

    Perrig, Adrian

    Distillation Codes and Applications to DoS Resistant Multicast Authentication Chris Karlof UC We introduce distillation codes, a method for streaming and storing data. Like erasure codes, distillation codes allow information to be decoded from a sufficiently large quorum of symbols. In contrast

  4. An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    An Innovative Solution for Cloud Computing Authentication: Grids of EAP-TLS Smart Cards Pascal clients. This paper aims to solve this issue by proposing an innovative paradigm based on a grid of smart the scalability of this server linked to smart card grids whose distributed computation manages the concurrence

  5. MMH: Software Message Authentication in the Gbit/second Rates \\Lambda

    E-Print Network [OSTI]

    Bernstein, Daniel

    universal hashing) applications. The construction is based on techniques due to Carter and Wegman Universal hash functions, which were first introduced by Carter and Wegman in [CW79], have a wide range authentication (introduced by Wegman and Carter [WC81] as well) received much attention lately. In particular

  6. MULTIMEDIA CONTENT AUTHENTICATION: FUNDAMENTAL LIMITS Emin Martinian and Gregory W. Wornell

    E-Print Network [OSTI]

    Martinian, Emin

    MULTIMEDIA CONTENT AUTHENTICATION: FUNDAMENTAL LIMITS Emin Martinian and Gregory W. Wornell Dept,gwwˇ @mit.edu ABSTRACT In many multimedia applications, there is a need to authen- ticate a source that has signature techniques are a natural tool for addressing such problems. However, in many emerging multimedia

  7. On optimizing energy consumption: An adaptative authentication level in wireless sensor networks

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    On optimizing energy consumption: An adaptative authentication level in wireless sensor networks-hungry. As energy is a scarce resource in wireless sensor networks, we propose a new approach that consists or third-party nodes. I. INTRODUCTION Wireless sensor networks (WSNs) are used in several fields

  8. An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks. In Section 3 we evaluate the performance and efficiency of our proposal, both in terms of energy consumption of Engineering & Built Environment Callaghan, The University of Newcastle (AUSTRALIA) Ljiljana

  9. A Localized Authentication, Authorization, and Accounting (AAA) Protocol for Mobile Hotspots

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    of authentication, authorization, and accounting (AAA) protocol, which is a core technology for public mobile mobile hotspots. I. INTRODUCTION With the advances of wireless access technologies (e.g., 3G, IEEE 802 hotspots [3] [4] [5]. In terms of mobility management, the Internet Engineering Task Force (IETF) has

  10. Project List 1. Project Name: Efficient Anonymous Private Authentication Protocol for RFID Systems

    E-Print Network [OSTI]

    Brylow, Dennis

    based authentication. Publication: · Md. Endadul Hoque, Farzana Rahman, and Sheikh I. Ahamed, "Anon's geocoding and mapping API. Publication: ···· Farzana Rahman, Casey O'Brien, Sheikh I. Ahamed, He Zhang'Brien, Kristine Manning, Jason Cowdy, Sheikh Iqbal Ahamed, "Let EcoDrive be Your Guide: Development of a Mobile

  11. Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and

    E-Print Network [OSTI]

    Cryptanalysis of an ID­based Password Authentication Scheme using Smart Cards and Fingerprints Michael Scott School of Computer Applications Dublin City University Ballymun, Dublin 9, Ireland. mike two ID­based password authen­ tication schemes for logging onto a remote network server using smart

  12. Security by Spatial Reference: Using Relative Positioning to Authenticate Devices for

    E-Print Network [OSTI]

    Hazas, Mike

    to connect their personal devices with devices encountered in their environment in order to take advantage the interaction of their personal device with the intended target device. They must be able to ascertainSecurity by Spatial Reference: Using Relative Positioning to Authenticate Devices for Spontaneous

  13. User cost in oil production

    E-Print Network [OSTI]

    Adelman, Morris Albert

    1990-01-01T23:59:59.000Z

    The assumption of an initial fixed mineral stock is superfluous and wrong. User cost (resource rent) in mineral production is the present value of expected increases in development cost. It can be measured as the difference ...

  14. ATF Program Committee/Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CommitteeUsers Meeting, April 26-27, 2012 M.Babzien slide 1 ATF Solid State Laser Operations Igor Pogorelsky CO 2 laser and experimental support Mikhail Polyanskiy CO 2 laser,...

  15. 2011 CAMD Users Meeting Schedule

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Invited Speakers; CAMD Users - Research Programs 10:00 - 10:30 - James Jerry Spivey (LSU Chemical Engineering) 10:30 - 11:00 - Kip Matthews (LSU Physics and Astronomy), Ken...

  16. 2011 CAMD User Meeting Announcement

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Friday, April 15th, 2011 LSU AgCenter and CAMD Conference Room The 2011 LSU-CAMD User Meeting will be held on Friday, April 15. This year, the morning session will be held on...

  17. 2012 CAMD User Meeting Announcement

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Hall (LSU AgCenter) and Nelson Hall The 2012 LSU-CAMD User Meeting will be held on Friday, April 27th. This year, the morning and afternoon sessions will be held on campus in Room...

  18. atlasUserMeeting14

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    GRETINA Mario Cromaz, LBNL Work supported under contract number DE-AC02-05CH11231. 2014 ATLAS User's Meeting ANL - May 15-16, 2014 The GRETINA Spectrometer 2 * first generation...

  19. Soybean (2010 JGI User Meeting)

    ScienceCinema (OSTI)

    Stacey, Gary

    2011-04-26T23:59:59.000Z

    Gary Stacey, associate director of the National Center for Soybean Biotechnology at the University of Missouri, gives a talk simply titled "Soybean" on March 24, 2010 at the 5th Annual DOE JGI User Meeting

  20. Midwest Hydro Users Group Meeting

    Broader source: Energy.gov [DOE]

    The Midwest Hydro Users Group will be holding their annual Fall meeting on November 12th and 13th in Wausau, Wisconsin.  An Owners-only meeting on the afternoon of the 12th followed by a full...

  1. Electrical and thermal finite element modeling of arc faults in photovoltaic bypass diodes.

    SciTech Connect (OSTI)

    Bower, Ward Isaac; Quintana, Michael A.; Johnson, Jay

    2012-01-01T23:59:59.000Z

    Arc faults in photovoltaic (PV) modules have caused multiple rooftop fires. The arc generates a high-temperature plasma that ignites surrounding materials and subsequently spreads the fire to the building structure. While there are many possible locations in PV systems and PV modules where arcs could initiate, bypass diodes have been suspected of triggering arc faults in some modules. In order to understand the electrical and thermal phenomena associated with these events, a finite element model of a busbar and diode was created. Thermoelectrical simulations found Joule and internal diode heating from normal operation would not normally cause bypass diode or solder failures. However, if corrosion increased the contact resistance in the solder connection between the busbar and the diode leads, enough voltage potentially would be established to arc across micron-scale electrode gaps. Lastly, an analytical arc radiation model based on observed data was employed to predicted polymer ignition times. The model predicted polymer materials in the adjacent area of the diode and junction box ignite in less than 0.1 seconds.

  2. Open cycle ocean thermal energy conversion steam control and bypass system

    DOE Patents [OSTI]

    Wittig, J. Michael (West Goshen, PA); Jennings, Stephen J. (Radnor Township, Delaware County, PA)

    1980-01-01T23:59:59.000Z

    Two sets of hinged control doors for regulating motive steam flow from an evaporator to a condenser alternatively through a set of turbine blades in a steam bypass around the turbine blades. The evaporator has a toroidal shaped casing situated about the turbine's vertical axis of rotation and an outlet opening therein for discharging motive steam into an annular steam flow path defined between the turbine's radially inner and outer casing structures. The turbine blades extend across the steam flow path intermediate the evaporator and condenser. The first set of control doors is arranged to prevent steam access to the upstream side of the turbine blades and the second set of control doors acts as a bypass around the blades so as to maintain equilibrium between the evaporator and condenser during non-rotation of the turbine. The first set of control doors preferably extend, when closed, between the evaporator casing and the turbine's outer casing and, when open, extend away from the axis of rotation. The second set of control doors preferably constitute a portion of the turbine's outer casing downstream from the blades when closed and extend, when open, toward the axis of rotation. The first and second sets of control doors are normally held in the open and closed positions respectively by locking pins which may be retracted upon detecting an abnormal operating condition respectively to permit their closing and opening and provide steam flow from the evaporator to the condenser.

  3. PIA - Advanced Test Reactor National Scientific User Facility...

    Energy Savers [EERE]

    Advanced Test Reactor National Scientific User Facility Users Week 2009 PIA - Advanced Test Reactor National Scientific User Facility Users Week 2009 PIA - Advanced Test Reactor...

  4. U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    4: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users U-074: Microsoft .NET Bugs Let Remote Users Execute Arbitrary Commands,...

  5. Using a Personal Device to Strengthen Password Authentication from an Untrusted Computer

    E-Print Network [OSTI]

    Van Oorschot, Paul

    . Keylogging and phishing attacks can extract user identity and sensitive account information for unauthorized

  6. HTGR Cost Model Users' Manual

    SciTech Connect (OSTI)

    A.M. Gandrik

    2012-01-01T23:59:59.000Z

    The High Temperature Gas-Cooler Reactor (HTGR) Cost Model was developed at the Idaho National Laboratory for the Next Generation Nuclear Plant Project. The HTGR Cost Model calculates an estimate of the capital costs, annual operating and maintenance costs, and decommissioning costs for a high-temperature gas-cooled reactor. The user can generate these costs for multiple reactor outlet temperatures; with and without power cycles, including either a Brayton or Rankine cycle; for the demonstration plant, first of a kind, or nth of a kind project phases; for a single or four-pack configuration; and for a reactor size of 350 or 600 MWt. This users manual contains the mathematical models and operating instructions for the HTGR Cost Model. Instructions, screenshots, and examples are provided to guide the user through the HTGR Cost Model. This model was design for users who are familiar with the HTGR design and Excel. Modification of the HTGR Cost Model should only be performed by users familiar with Excel and Visual Basic.

  7. Universal Hashing and Multiple Authentication M. Atici1*2and 11. R,. S t i n ~ o n ' > ~

    E-Print Network [OSTI]

    Bernstein, Daniel

    authentication without secrecy. Our point of view is the uni- vcrsal hashing approach pioneered by Wegman,ions, and obtained some improvements to the Wegman-Carter construction. Since 1991, several authors have given im

  8. CFD Analysis of Core Bypass Flow and Crossflow in the Prismatic Very High Temperature Gas-cooled Nuclear Reactor

    E-Print Network [OSTI]

    Wang, Huhu 1985-

    2012-12-13T23:59:59.000Z

    if the large portion of the coolant flows into bypass gaps instead of coolant channels in which the cooling efficiency is much higher. A preliminary three dimensional steady-state CFD analysis was performed with commercial code STARCCM+ 6.04 to investigate...

  9. Application-Bypass Reduction for Large-Scale Adam Wagner, Member, IEEE, Darius Buntinas, Member, IEEE, Ron Brightwell, Member, IEEE,

    E-Print Network [OSTI]

    Panda, Dhabaleswar K.

    of Energy's Grant #DE=FC02- 01ER25506, National Science Foundation's grant #EIA-9986052 increases with system size, indicating that the application-bypass implementation is more scalable and skew or skewed. This may happen for a variety of reasons including heterogeneous systems consisting of nodes

  10. GADRAS-DRF user's manual.

    SciTech Connect (OSTI)

    Theisen, Lisa Anne; Mitchell, Dean James; Thoreson, Gregory G.; Harding, Lee T.; Horne, Steve; Bradley, Jon David; Eldridge, Bryce Duncan; Amai, Wendy A.

    2013-09-01T23:59:59.000Z

    The Gamma Detector Response and Analysis Software-Detector Response Function (GADRAS-DRF) application computes the response of gamma-ray detectors to incoming radiation. This manual provides step-by-step procedures to acquaint new users with the use of the application. The capabilities include characterization of detector response parameters, plotting and viewing measured and computed spectra, and analyzing spectra to identify isotopes or to estimate flux profiles. GADRAS-DRF can compute and provide detector responses quickly and accurately, giving researchers and other users the ability to obtain usable results in a timely manner (a matter of seconds or minutes).

  11. User Agreements | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del SolStrengthening aTurbulence mayUndergraduateAbout UsUser Agreements User

  12. A preliminary assessment of beryllium dust oxidation during a wet bypass accident in a fusion reactor

    SciTech Connect (OSTI)

    Brad J. Merrill; Richard L. Moore; J. Phillip Sharp

    2008-09-01T23:59:59.000Z

    A beryllium dust oxidation model has been developed at the Idaho National Laboratory (INL) by the Fusion Safety Program (FSP) for the MELCOR safety computer code. The purpose of this model is to investigate hydrogen production from beryllium dust layers on hot surfaces inside a fusion reactor vacuum vessel (VV) during in-vessel loss-of-cooling accidents (LOCAs). This beryllium dust oxidation model accounts for the diffusion of steam into a beryllium dust layer, the oxidation of the dust particles inside this layer based on the beryllium-steam oxidation equations developed at the INL, and the effective thermal conductivity of this beryllium dust layer. This paper details this oxidation model and presents the results of the application of this model to a wet bypass accident scenario in the ITER device.

  13. Particle Image Velocimetry Measurements and Analysis of Bypass Data for a Scaled 6mm Gap

    SciTech Connect (OSTI)

    J.R. Wolf; T.E. Conder; R.R. Schultz

    2012-09-01T23:59:59.000Z

    The purpose of the fluid dynamics experiments in the MIR (Matched Index of-Refraction) flow system at Idaho National Laboratory (INL) is to develop benchmark databases for the assessment of Computational Fluid Dynamics (CFD) solutions of the momentum equations, scalar mixing, and turbulence models for the flow ratios between coolant channels and bypass gaps in the interstitial regions of typical prismatic standard fuel element (SFE) or upper reflector block geometries of typical Modular High-temperature Gas-cooled Reactors (MHTGR) in the limiting case of negligible buoyancy and constant fluid properties. The experiments will use optical techniques, primarily particle image velocimetry (PIV) in the INL Matched Index of Refraction (MIR) flow system.

  14. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01T23:59:59.000Z

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  15. WIPP Transparency Project - container tracking and monitoring demonstration using the Authenticated Tracking and Monitoring System (ATMS)

    SciTech Connect (OSTI)

    SCHOENEMAN, J. LEE; SMARTT, HEIDI ANNE; HOFER, DENNIS

    2000-01-27T23:59:59.000Z

    The Authenticated Tracking and Monitoring System (ATMS) is designed to answer the need for global monitoring of the status and location of proliferation-sensitive items on a worldwide basis, 24 hours a day. ATMS uses wireless sensor packs to monitor the status of the items within the shipment and surrounding environmental conditions. Receiver and processing units collect a variety of sensor event data that is integrated with GPS tracking data. The collected data are transmitted to the International Maritime Satellite (INMARSAT) communication system, which then sends the data to mobile ground stations. Authentication and encryption algorithms secure the data during communication activities. A typical ATMS application would be to track and monitor the stiety and security of a number of items in transit along a scheduled shipping route. The resulting tracking, timing, and status information could then be processed to ensure compliance with various agreements.

  16. Using quantum routers to implement quantum message authentication and Bell-state manipulation

    E-Print Network [OSTI]

    Karol Bartkiewicz; Antonín ?ernoch; Karel Lemr

    2014-09-03T23:59:59.000Z

    In this paper we investigate the capability of quantum routing (quantum state fusion) to implement two useful quantum communications protocols. The analyzed protocols include quantum authentication of quantum messages and non-destructive linear-optical Bell state manipulation. We also present the concept of quantum decoupler -- a device implementing an inverse operation to quantum routing. We demonstrate that both quantum router and decoupler can work as specialized disentangling gates.

  17. Integrating end-to-end encryption and authentication technology into broadband networks

    SciTech Connect (OSTI)

    Pierson, L.G.

    1995-11-01T23:59:59.000Z

    BISDN services will involve the integration of high speed data, voice, and video functionality delivered via technology similar to Asynchronous Transfer Mode (ATM) switching and SONET optical transmission systems. Customers of BISDN services may need a variety of data authenticity and privacy assurances, via Asynchronous Transfer Mode (ATM) services Cryptographic methods can be used to assure authenticity and privacy, but are hard to scale for implementation at high speed. The incorporation of these methods into computer networks can severely impact functionality, reliability, and performance. While there are many design issues associated with the serving of public keys for authenticated signaling and for establishment of session cryptovariables, this paper is concerned with the impact of encryption itself on such communications once the signaling and setup have been completed. Network security protections should be carefully matched to the threats against which protection is desired. Even after eliminating unnecessary protections, the remaining customer-required network security protections can impose severe performance penalties. These penalties (further discussed below) usually involve increased communication processing for authentication or encryption, increased error rate, increased communication delay, and decreased reliability/availability. Protection measures involving encryption should be carefully engineered so as to impose the least performance, reliability, and functionality penalties, while achieving the required security protection. To study these trade-offs, a prototype encryptor/decryptor was developed. This effort demonstrated the viability of implementing certain encryption techniques in high speed networks. The research prototype processes ATM cells in a SONET OC-3 payload. This paper describes the functionality, reliability, security, and performance design trade-offs investigated with the prototype.

  18. Utilitas and venustas: balancing utility and authenticity in the stewardship of our built heritage

    E-Print Network [OSTI]

    Reich, Alene Wilmoth

    2007-04-25T23:59:59.000Z

    Members, John Alexander John Nichols Head of Department, Mardelle Shepley December 2005 Major Subject: Architecture iii ABSTRACT Utilitas and Venustas: Balancing Utility and Authenticity in the Stewardship of Our Built... Services (HPS). The aim of HPS is to, ?[help] our nation's citizens and communities identify, evaluate, protect and preserve historic properties for future generations of Americans.?17 HPS is responsible for the administration of educational, technical...

  19. DOE's BestPractices Steam End User Training Steam End User Training

    E-Print Network [OSTI]

    Oak Ridge National Laboratory

    DOE's BestPractices Steam End User Training Steam End User Training Steam Distribution Losses Module 1 June 29, 2010 Steam EndUser Training Steam Distribution System Losses Module Slide 1 pressure. #12;DOE's BestPractices Steam End User Training Steam End User Training Steam Distribution

  20. DOE's BestPractices Steam End User Training Steam End User Training

    E-Print Network [OSTI]

    Oak Ridge National Laboratory

    DOE's BestPractices Steam End User Training Steam End User Training Welcome Module - 1 8/27/2010 Steam End User Training Welcome Module Slide 1 ­ Steam End User Training Welcome to the Department of Energy's Industrial Technologies Program BestPractices Steam End-User Training. The Department of Energy

  1. Reactive Ion Etch Users Guide

    E-Print Network [OSTI]

    Wager, John F.

    RIE Reactive Ion Etch Users Guide Eric Sundholm 2-22-2007 Standby Condition: be sure that the tool the chamber to remove any potential hazards before the chamber can be opened. 9. Pump Down Chamber Utilities Pump Chamber 10. Check pressure to start turbo pump Display Sensor Display a. Wait for pressure

  2. User's Guide Model RPM10

    E-Print Network [OSTI]

    Haller, Gary L.

    , will provide years of safe reliable service. Meter Description 1. Photo Tachometer sensor, IR ThermometerUser's Guide Model RPM10 Laser Photo / Contact Tachometer with IR Thermometer Patented #12;RPM10 V1.4 8/072 1 2 3 4 5 6 7 Introduction Congratulations on your purchase of Extech's Laser Photo

  3. Home Authentication / Biometrics Business / Finance Continuity / Recovery Cybersecurity Detection Education / Sci-Tech Emergency / Police / Mil. Government policy Infrastructure Public health / Biodefense Surveillance Systems integration Transport / Borde

    E-Print Network [OSTI]

    Rogers, John A.

    Home Authentication / Biometrics Business / Finance Continuity / Recovery Cybersecurity Detection Education / Sci-Tech Emergency / Police / Mil. Government policy Infrastructure Public health / Biodefense

  4. User Statistics Collection Practices | U.S. DOE Office of Science...

    Office of Science (SC) Website

    User Statistics Collection Practices User Facilities User Facilities Home User Facilities at a Glance User Resources User Statistics Policies and Processes Definition Designation...

  5. Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron SpinPrinceton PlasmaAfternoon4.CCSM4large.jpgbriefing about next

  6. SOWFA + Super Controller User's Manual

    SciTech Connect (OSTI)

    Fleming, P.; Gebraad, P.; Churchfield, M.; Lee, S.; Johnson, K.; Michalakes, J.; van Wingerden, J. W.; Moriarty, P.

    2013-08-01T23:59:59.000Z

    SOWFA + Super Controller is a modification of the NREL's SOWFA tool which allows for a user to apply multiturbine or centralized wind plant control algorithms within the high-fidelity SOWFA simulation environment. The tool is currently a branch of the main SOWFA program, but will one day will be merged into a single version. This manual introduces the tool and provides examples such that a user can implement their own super controller and set up and run simulations. The manual only discusses enough about SOWFA itself to allow for the customization of controllers and running of simulations, and details of SOWFA itself are reported elsewhere Churchfield and Lee (2013); Churchfield et al. (2012). SOWFA + Super Controller, and this manual, are in alpha mode.

  7. Method of treating emissions of a hybrid vehicle with a hydrocarbon absorber and a catalyst bypass system

    DOE Patents [OSTI]

    Roos, Bryan Nathaniel; Gonze, Eugene V; Santoso, Halim G; Spohn, Brian L

    2014-01-14T23:59:59.000Z

    A method of treating emissions from an internal combustion engine of a hybrid vehicle includes directing a flow of air created by the internal combustion engine when the internal combustion engine is spinning but not being fueled through a hydrocarbon absorber to collect hydrocarbons within the flow of air. When the hydrocarbon absorber is full and unable to collect additional hydrocarbons, the flow of air is directed through an electrically heated catalyst to treat the flow of air and remove the hydrocarbons. When the hydrocarbon absorber is not full and able to collect additional hydrocarbons, the flow of air is directed through a bypass path that bypasses the electrically heated catalyst to conserve the thermal energy stored within the electrically heated catalyst.

  8. Preliminary studies of coolant by-pass flows in a prismatic very high temperature reactor using computational fluid dynamics

    SciTech Connect (OSTI)

    Hiroyuki Sato; Richard Johnson; Richard Schultz

    2009-09-01T23:59:59.000Z

    Three dimensional computational fluid dynamic (CFD) calculations of a typical prismatic very high temperature gas-cooled reactor (VHTR) were conducted to investigate the influence of gap geometry on flow and temperature distributions in the reactor core using commercial CFD code FLUENT. Parametric calculations changing the gap width in a whole core length model of fuel and reflector columns were performed. The simulations show the effects of core by-pass flows in the heated core region by comparing results for several gap widths including zero gap width. The calculation results underline the importance of considering inter-column gap width for the evaluation of maximum fuel temperatures and temperature gradients in fuel blocks. In addition, it is shown that temperatures of core outlet flow from gaps and channels are strongly affected by the gap width of by-pass flow in the reactor core.

  9. MAMA- User Feedback and Training Summary

    SciTech Connect (OSTI)

    Porter, Reid B. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States); Ruggiero, Christy E. [Los Alamos National Lab. (LANL), Los Alamos, NM (United States)

    2014-05-21T23:59:59.000Z

    This document describes the current state of the MAMA (Morphological Analysis of Materials) software user identified bugs, issues, and requests for improvements. It also lists Current users and current training methods.

  10. EURECOM VPN SSL for students User's guide

    E-Print Network [OSTI]

    Gesbert, David

    EURECOM VPN SSL for students User's guide Table of Contents Introduction...................................................................................................................................9 SSL VPN usage.........................................................................................................................................20 EURECOM VPN SSL students user's guide Page 1 #12;Introduction Eurecom offers a solution for staff

  11. Design exploration: engaging a larger user population 

    E-Print Network [OSTI]

    Moore, John Michael

    2009-06-02T23:59:59.000Z

    Software designers must understand the domain, work practices, and user expectations before determining requirements or generating initial design mock-ups. Users and other stakeholders are a valuable source of information leading...

  12. Home Inventory User Manual About Home Inventory

    E-Print Network [OSTI]

    Wolfgang, Paul

    Home Inventory User Manual About Home Inventory The HomeInventory Project consists of a customized. With two types of roles, Users and Administrators, clients logged into the HomeInventory have access to a variety of commands. HomeInventory stores each user's items safely and privately, without worry

  13. Syllabus Information Depiction System (SIDS) user's guide

    SciTech Connect (OSTI)

    Waterman, D.K.; Skinner, N.L.

    1987-10-01T23:59:59.000Z

    The Syllabus Information Depiction System (SIDS) is an automated tool designed to track the aircrew training syllabi of the Marine Corps. This report is the User's Manual for this data base system, providing users with instructions to help them use the system more efficiently. This document contains printed screen layouts that will guide the user step-by-step through the written instructions.

  14. IDAHO WATER USER RECOMMENDATIONS MAINSTEM PLAN

    E-Print Network [OSTI]

    IDAHO WATER USER RECOMMENDATIONS ON THE MAINSTEM PLAN COLUMBIA RIVER BASIN FISH AND WILDLIFE PROGRAM SUBMITTED ON BEHALF OF THE COMMITTEE OF NINE AND THE IDAHO WATER USERS ASSOCIATION JUNE 15, 2001 and Flow Augmentation Policy in the Columbia River Basin #12;1 IDAHO WATER USER RECOMMENDATIONS

  15. U.S. Department of Energy FreedomCAR & Vehicle Technologies Program Oil Bypass Filter Technology Evaluation Final Report

    SciTech Connect (OSTI)

    L. R. Zirker; J. E. Francfort; J. J. Fielding

    2006-03-01T23:59:59.000Z

    This Oil Bypass Filter Technology Evaluation final report documents the feasibility of using oil bypass filters on 17 vehicles in the Idaho National Laboratory (INL) fleet during a 3-year test period. Almost 1.3 million test miles were accumulated, with eleven 4-cycle diesel engine buses accumulating 982,548 test miles and six gasoline-engine Chevrolet Tahoes accumulating 303,172 test miles. Two hundred and forty oil samples, taken at each 12,000-mile bus servicing event and at 3,000 miles for the Tahoes, documented the condition of the engine oils for continued service. Twenty-eight variables were normally tested, including the presence of desired additives and undesired wear metals such as iron and chrome, as well as soot, water, glycol, and fuel. Depending on the assumptions employed, the INL found that oil bypass filter systems for diesel engine buses have a positive payback between 72,000 and 144,000 miles. For the Tahoes, the positive payback was between 66,000 and 69,000 miles.

  16. Implications for Damage Recognition during Dpo4-Mediated Mutagenic Bypass of m1G and m3C Lesions

    SciTech Connect (OSTI)

    Rechkoblit, Olga; Delaney, James C.; Essigmann, John M.; Patel, Dinshaw J. (MIT); (MSKCC)

    2012-05-08T23:59:59.000Z

    DNA is susceptible to alkylation damage by a number of environmental agents that modify the Watson-Crick edge of the bases. Such lesions, if not repaired, may be bypassed by Y-family DNA polymerases. The bypass polymerase Dpo4 is strongly inhibited by 1-methylguanine (m1G) and 3-methylcytosine (m3C), with nucleotide incorporation opposite these lesions being predominantly mutagenic. Further, extension after insertion of both correct and incorrect bases, introduces additional base substitution and deletion errors. Crystal structures of the Dpo4 ternary extension complexes with correct and mismatched 3'-terminal primer bases opposite the lesions reveal that both m1G and m3C remain positioned within the DNA template/primer helix. However, both correct and incorrect pairing partners exhibit pronounced primer terminal nucleotide distortion, being primarily evicted from the DNA helix when opposite m1G or misaligned when pairing with m3C. Our studies provide insights into mechanisms related to hindered and mutagenic bypass of methylated lesions and models associated with damage recognition by repair demethylases.

  17. User Survey User Survey DOE Occupational Radiation Exposure Report

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of Energy OfficeFact Sheet|FeedstockUser

  18. David Turner! NERSC User Services Group NERSC User Environment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration wouldDECOMPOSITION OFSupplementalC. L. MartinGraduates > TheUser

  19. David Turner! NERSC User Services Group! NUG New User Training!

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration wouldDECOMPOSITION OFSupplementalC. L. MartinGraduates >NERSCNUG New User

  20. DOE's BestPractices Steam End User Training Steam EndUser Training

    E-Print Network [OSTI]

    Oak Ridge National Laboratory

    DOE's BestPractices Steam End User Training Steam EndUser Training Resource Utilization End User Training Resource Utilization Analysis Module 1 June 28, 2010 #12; DOE's BestPractices Steam End User Training Slide 3 Fuel Selection 1 Fuel purchases typically dominate the operating cost

  1. DOE's BestPractices Steam End User Training Steam End User Training

    E-Print Network [OSTI]

    Oak Ridge National Laboratory

    DOE's BestPractices Steam End User Training Steam End User Training Navigational Tutorial - 1 8/27/2010 Steam End User Training Navigational Tutorial Module Slide 1 ­ Introduction Hello, and welcome to the Steam End User Training. I would like to take a few minutes to show you how to navigate through

  2. DOE's BestPractices Steam End User Training Steam End User Training

    E-Print Network [OSTI]

    Oak Ridge National Laboratory

    DOE's BestPractices Steam End User Training Steam End User Training Introduction Module - 1 8/27/2010 Steam End User Training Introduction Module Slide 1 - Introduction Title Page Hello, and welcome to the Steam System End User training. In this training, we will investigate how to assess, evaluate

  3. DOE's BestPractices Steam End User Training Steam End User Training

    E-Print Network [OSTI]

    Oak Ridge National Laboratory

    DOE's BestPractices Steam End User Training Steam End User Training Steam Generation Efficiency Module Efficiency Definition - 1 8/30/2010 Steam End-User Training Steam Generation Efficiency Module will be discussed. [Slide Visual ­ Contents of Module Sections] Banner: DOE's BestPractices Steam End User Training

  4. DOE's BestPractices Steam End User Training Steam End User Training

    E-Print Network [OSTI]

    Oak Ridge National Laboratory

    DOE's BestPractices Steam End User Training Steam End User Training Steam Generation Efficiency Module Shell Losses - 1 8/27/2010 Steam End-User Training Steam Generation Efficiency Module Shell Losses-Section: Shell Losses] Banner: DOE's BestPractices Steam End User Training Steam Generation Efficiency Efficiency

  5. Manufactured Home Energy Audit user`s manual

    SciTech Connect (OSTI)

    NONE

    1997-09-01T23:59:59.000Z

    The Manufactured Home Energy Audit (MHEA) is a software tool that predicts manufactured home energy consumption and recommends weatherization retrofit measures. It was developed to assist local weatherization agencies working with the US Department of Energy (DOE) Weatherization Assistance Program. Whether new or experienced, employed within or outside the Weatherization Assistance Program, all users can benefit from incorporating MHEA into their manufactured home weatherization programs. DOE anticipates that the state weatherization assistance programs that incorporate MHEA into their programs will find significant growth in the energy and cost savings achieved from manufactured home weatherization. The easy-to-use MHEA displays a colorful, graphical interface for entering simple inputs and provides understandable, usable results. The user enters information about the manufactured home construction, heating equipment, cooling equipment, and weather site. MHEA then calculates annual energy consumption using a simplified building energy analysis technique. MHEA stands apart from other building energy analysis tools in many ways. Calculations incorporated into the computer code specifically address manufactured home heating and cooling load trends. The retrofit measures evaluated by MHEA are all applicable to manufactured homes. Help messages describe common manufactured home weatherization practices as well as provide hints on how to install retrofit measures. These and other features help make MHEA easy to use when evaluating energy consumption and the effects of weatherization retrofit measures for manufactured homes.

  6. Sputter deposition of thin film MIM capacitors on LTCC substrates for RF bypass and filtering applications

    SciTech Connect (OSTI)

    Murray, Jack [Missouri University of Science and Technology; O'Keefe, Matthew J. [Missouri University of Science and Technology; Wilder, Kristina [Missouri University of Science and Technology; Eatinger, Ryan [Kansas State University; Kuhn, William [Kansas State University; Krueger, Daniel S. [Honeywell Federal Manufacturing & Technologies; Wolf, J. Ambrose [Honeywell Federal Manufacturing & Technologies

    2011-08-31T23:59:59.000Z

    Thin film capacitors for RF bypass and filtering applications were sputter deposited onto low temperature co-fired ceramic (LTCC) substrates. The capacitors were configured in a metal-insulator-metal (MIM) design featuring 200 nm thick Al electrodes and a 300 nm thick Al{sub 2}O{sub 3} dielectric layer, with dimensions varied between ~150x150 ?m and ~750x750 ?m. DC current-voltage measurements (E ? 5 MV/cm) coupled with impedance analysis (?15 MHz) was used to characterize the resulting devices. More than 90% of the devices functioned as capacitors with high DC resistance (>20 M?) and low loss (tan ? <0.1). A second set of capacitors were made under the same experimental conditions with device geometries optimized for high frequency (?200 MHz) applications. These capacitors featured temperature coefficient of capacitance (TCC) values between 500 and 1000 ppm/°C as well as low loss and high self-resonant frequency performance (ESR <0.6 Ohms at self-resonance of 5.7 GHz for 82 pF). Capacitance and loss values were comparable between the capacitor structures of similar areas at the different frequency regimes.

  7. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows® and RSA®

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn April 23,EnergyChicopeeTechnologyfactTuscaroraDepartmentAuthentication Client 3.5 Access

  8. User's guide to DOE facilities

    SciTech Connect (OSTI)

    Not Available

    1984-01-01T23:59:59.000Z

    The Department of Energy's research laboratories represent valuable, often unique, resources for university and industrial scientists. It is DOE policy to make these laboratories and facilities available to qualified scientists. The answers to such questions as who are eligible, what and where are the facilities, what is the cost, when can they be used, are given. Data sheets are presented for each facility to provide information such as location, user contact, description of research, etc. A subject index refers to areas of research and equipment available.

  9. Jefferson Lab Users Group News

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12 InvestigationLabNewLabLab To ReceiveUser

  10. FNAL Users Meeting Morgan Wascko

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist. Category UC-lFederal ColumbiaASCR2FOR THEFNAL Users Meeting

  11. 2005 NERSC User Survey Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch >InternshipDepartment of Energy with6, 2014, 6:32 p.m.January5 User

  12. 2006 NERSC User Survey Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch >InternshipDepartment of Energy with6, 2014, 6:326 User Survey

  13. David Turner! User Services Group

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration wouldDECOMPOSITION OFSupplementalC. L. MartinGraduatesUser Services Group

  14. Fermilab | Users' Executive Committee | Home

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8,Dist.New Mexico Feb. 13, 2013FocusreceivesTrafficUsers Organization

  15. Richard Gerber! NERSC User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection TechnicalResonant Soft X-RayReview/Verify3User Services DeputyMarch 1

  16. 2012 ALS User Meeting Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch >InternshipDepartment ofAugust 2011October 2012 Thu, 10/04/20122 ALS User

  17. 2014 User Meeting Award Recipients

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch >InternshipDepartment ofAugustDecember 2014 Fri, 12/05/2014 -442014 User

  18. 2011 User Meeting Award Recipients

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruary 2004August 2011 Wed,2011 Cost of1 UserAward

  19. 2011 User Meeting Award Recipients

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del(ANL-IN-03-032) -Less isNFebruary 2004August 2011 Wed,2011 Cost of1 UserAward2011

  20. FLOWTRAN-TF user guide

    SciTech Connect (OSTI)

    Flach, G.P.; Lee, S.Y.; Aleman, S.E.

    1993-02-01T23:59:59.000Z

    This document is a set of detailed instructions and guidelines to aid users in constructing and interpreting FLOWTRAN-TF input and output files for version 1.2 of the source code. The document assumes the user is familiar with the FLOWTRAN-TF Software Design report, SRS fuel assembly hardware, and two-phase flow. General code capabilities and input options are summarized. Then, detailed instructions for creating and interpreting code input files are given next. A sample input deck and corresponding output files are listed for reference and illustration. FLOWTRAN-TF is a two-phase thermal-hydraulics code of similar technology to existing commercial reactor codes such as RELAP and TRAC but customized for Savannah River Site applications. The code may be used to simulate solid components, fluid coolant flow and solid-fluid heat transfer, or fluid flow only (adiabatic flow channels). Pure component water or two-component air-water flows may be modeled. A variety of materials may be chosen for the solid tubes separating flow channels. FLOWTRAN-TF is fundamentally a transient analysis tool.

  1. 2012 PATRIOT SCRIPT User's Guide

    SciTech Connect (OSTI)

    Cuellar, Leticia [Los Alamos National Laboratory; Cleland, Timothy J. [Los Alamos National Laboratory; Kubicek, Deborah A. [Los Alamos National Laboratory; Mathis, Mark M. [Los Alamos National Laboratory; Stroud, Phillip D. [Los Alamos National Laboratory

    2012-05-31T23:59:59.000Z

    PATRIOT Script is an application that executes Patriot batch runs. This document provides a description of this application and how to run it. The basic user access tool PATRIOT Client allows a user to generate several most reliable paths in one run: one can specify a list of sources (origins) and targets, and PATRIOT finds for a given architecture option and one choice of device all the most reliable paths between all these sources and targets. The main objective of PATRIOT Script is to provide a tool for making automatic PATRIOT runs not only for a prespecified set of sources and targets, but also for a pre-specified set of devices and various architecture options. Running PATRIOT Script requires two basic steps that will be explained in more detail next: (1) Pre-preparation of an excel spreadsheet with the information about the desired runs; and (2) Opening the PATRIOT Script application, reading in the excel-spreadsheet and running the desired scenarios. Sections 1 and 2 explain each of these steps, and section 3 describes the output of the PATRIOT Script. For a detail description of the models and data behind PATRIOT and a detailed explanation of all the architecture options see [1]. For instructions of how to run PATRIOT Client see [2].

  2. ITOUGH2 user`s guide version 2.2

    SciTech Connect (OSTI)

    Finsterle, S.

    1993-08-01T23:59:59.000Z

    ITOUGH2 is a program to estimate hydrogeologic model parameters for the numerical simulator TOUGH2. TOUGH2 was developed by Karsten Pruess at Lawrence Berkeley Laboratory for simulating non-isothermal flows of multicomponent, multiphase fluids in porous and fractured media. ITOUGH2 solves the inverse problem by automatic model calibration based on an indirect approach, in which some function of the difference between observed and model-predicted system response and appropriately weighted prior information about the parameters is minimized using standard optimization techniques. ITOUGH2 also provides a detailed error analysis of the estimated parameter set, and employs some procedures to study error propagation for prediction runs. This report includes a review of the inverse modeling theory, and a detailed description of the program architecture, input language, and the various user features provided by ITOUGH2. A sample problem is given to illustrate code application.

  3. Trajectory analysis and optimization system (TAOS) user`s manual

    SciTech Connect (OSTI)

    Salguero, D.E.

    1995-12-01T23:59:59.000Z

    The Trajectory Analysis and Optimization System (TAOS) is software that simulates point--mass trajectories for multiple vehicles. It expands upon the capabilities of the Trajectory Simulation and Analysis program (TAP) developed previously at Sandia National Laboratories. TAOS is designed to be a comprehensive analysis tool capable of analyzing nearly any type of three degree-of-freedom, point-mass trajectory. Trajectories are broken into segments, and within each segment, guidance rules provided by the user control how the trajectory is computed. Parametric optimization provides a powerful method for satisfying mission-planning constraints. Althrough TAOS is not interactive, its input and output files have been designed for ease of use. When compared to TAP, the capability to analyze trajectories for more than one vehicle is the primary enhancement, although numerous other small improvements have been made. This report documents the methods used in TAOS as well as the input and output file formats.

  4. Hybrid user interfaces : design guidelines and implementation examples

    E-Print Network [OSTI]

    Ahn, Sehyun

    2006-01-01T23:59:59.000Z

    A hybrid user interface is a new type of computer user interface that achieves high usability by combining features of graphical user interfaces and command line interfaces. The main goal of a hybrid user interface is to ...

  5. A goal-oriented user interface for personalized semantic search

    E-Print Network [OSTI]

    Faaborg, Alexander James

    2006-01-01T23:59:59.000Z

    Users have high-level goals when they browse the Web or perform searches. However, the two primary user interfaces positioned between users and the Web, Web browsers and search engines, have very little interest in users' ...

  6. GENII Version 2 Users’ Guide

    SciTech Connect (OSTI)

    Napier, Bruce A.

    2004-03-08T23:59:59.000Z

    The GENII Version 2 computer code was developed for the Environmental Protection Agency (EPA) at Pacific Northwest National Laboratory (PNNL) to incorporate the internal dosimetry models recommended by the International Commission on Radiological Protection (ICRP) and the radiological risk estimating procedures of Federal Guidance Report 13 into updated versions of existing environmental pathway analysis models. The resulting environmental dosimetry computer codes are compiled in the GENII Environmental Dosimetry System. The GENII system was developed to provide a state-of-the-art, technically peer-reviewed, documented set of programs for calculating radiation dose and risk from radionuclides released to the environment. The codes were designed with the flexibility to accommodate input parameters for a wide variety of generic sites. Operation of a new version of the codes, GENII Version 2, is described in this report. Two versions of the GENII Version 2 code system are available, a full-featured version and a version specifically designed for demonstrating compliance with the dose limits specified in 40 CFR 61.93(a), the National Emission Standards for Hazardous Air Pollutants (NESHAPS) for radionuclides. The only differences lie in the limitation of the capabilities of the user to change specific parameters in the NESHAPS version. This report describes the data entry, accomplished via interactive, menu-driven user interfaces. Default exposure and consumption parameters are provided for both the average (population) and maximum individual; however, these may be modified by the user. Source term information may be entered as radionuclide release quantities for transport scenarios, or as basic radionuclide concentrations in environmental media (air, water, soil). For input of basic or derived concentrations, decay of parent radionuclides and ingrowth of radioactive decay products prior to the start of the exposure scenario may be considered. A single code run can accommodate unlimited numbers of radionuclides including the source term and any radionuclides that accumulate from decay of the parent, because the system works sequentially on individual decay chains. The code package also provides interfaces, through the Framework for Risk Analysis in Multimedia Environmental Systems (FRAMES), for external calculations of atmospheric dispersion, geohydrology, biotic transport, and surface water transport.

  7. Elemental ABAREX -- a user's manual.

    SciTech Connect (OSTI)

    Smith, A.B.

    1999-05-26T23:59:59.000Z

    ELEMENTAL ABAREX is an extended version of the spherical optical-statistical model code ABAREX, designed for the interpretation of neutron interactions with elemental targets consisting of up to ten isotopes. The contributions from each of the isotopes of the element are explicitly dealt with, and combined for comparison with the elemental observables. Calculations and statistical fitting of experimental data are considered. The code is written in FORTRAN-77 and arranged for use on the IBM-compatible personal computer (PC), but it should operate effectively on a number of other systems, particularly VAX/VMS and IBM work stations. Effort is taken to make the code user friendly. With this document a reasonably skilled individual should become fluent with the use of the code in a brief period of time.

  8. Remote Participation at EFDA­JET Task Force Work, Experience and Priorities from a User’s Point of View

    E-Print Network [OSTI]

    Remote Participation at EFDA­JET Task Force Work, Experience and Priorities from a User’s Point of View

  9. GSS, a user interface specification framework

    E-Print Network [OSTI]

    Morris, John Graham

    1988-01-01T23:59:59.000Z

    composite of four boxes. 24 Figure 7. A congguration set of three advisory lights, 25 Figure 8. Three airplane icon template example. 26 Figurc 9. Image abstraction manipulation. Figure 10. Rotation about a moving origin. Figure 11. A Symbolic's dynamic... in terms of the small set of con- cepts which make up the ontology. So far, duce issues have been addressed which relate to concept development for a user inter- face ontology: 15 ~ a methodology, ~ gross user interface behavior, ~ user interface...

  10. OCEAN SCIENCES CENTRE USER FEE DOCUMENT

    E-Print Network [OSTI]

    Oyet, Alwell

    ............................................................................................................ 4 2.2 Storage Fees.6 Cold Rooms support research programs of our Government and Industrial Partners The following user fee schedules

  11. SLAC Linac Coherent Light Source User Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    | Publications and Press | Proposal Preparation | Proposal Review| Beam Time Allocation LCLS Access Policy Overview LCLS aims to attract diverse users and to enable a broad set of...

  12. Diatom Genomics (2009 JGI User Meeting)

    ScienceCinema (OSTI)

    Ambrust, Ginger

    2011-04-25T23:59:59.000Z

    Ginger Armbrust from the University of Washington spoke about diatom genomics on March 26, 2009 at the DOE JGI User Meeting

  13. ATF Users Meeting 2002 Max.ppt

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    at the CAP Steering Committee and ATF Users Meeting January 31 - February 1, 2002 Accelerator and Fusion Research Division Center for Beam Physics e - Atom at rest Atom...

  14. User Facility Training | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    See Also: Argonne WBT Argonne eJHQ ACIS Training APS Beamline Shielding Argonne National Laboratory User Facility Training Core Courses: These courses require your badge number and...

  15. Addressing the needs of mobile users

    E-Print Network [OSTI]

    Sohn, Timothy Youngjin

    2008-01-01T23:59:59.000Z

    Based Localization Technology for Mobile Users . . . . . 3.1for designing future mobile technology. Methods There arefor ways future mobile technology might better address

  16. Ocean Viral Metagenomics (2010 JGI User Meeting)

    ScienceCinema (OSTI)

    Rohwer, Forest

    2011-04-26T23:59:59.000Z

    Forest Rohwer from San Diego State University talks about "Ocean Viral Metagenomics" on March 25, 2010 at the 5th Annual DOE JGI User Meeting

  17. PIA - Environmental Molecular Sciences Laboratory (EMSL) User...

    Office of Environmental Management (EM)

    Sciences Laboratory (EMSL) User System (ESU) More Documents & Publications PIA - WEB iPASS System DOE PIA Integrated Safety Management Workshop Registration, PIA, Idaho...

  18. MOBILE-TERMINATED DATA User's Guide

    E-Print Network [OSTI]

    Ashley, Michael C. B.

    MOBILE-TERMINATED DATA User's Guide Iridium Satellite LLC Rev. 2; February 1, 2002 #12;MOBILE TERMINATED DATA................................................................................................................................3 1.1 IRIDIUM MOBILE TERMINATED DATA CONNECTIVITY

  19. Universal Hashing and Multiple Authentication M. Atici 1;2 and D. R. Stinson 1;3

    E-Print Network [OSTI]

    Stinson, Douglas

    . Our point of view is the uni­ versal hashing approach pioneered by Wegman and Carter in 1981. We first to the construction of unconditionally secure authentication codes without secrecy. This idea is due to Wegman formal def­ initions of relevant classes of hash functions, and obtained some improvements to the Wegman

  20. IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for Smart Grid Communications Mostafa M. Fouda, Member, IEEE, Zubair Md. Fadlullah, Member Abstract--Smart grid (SG) communication has recently received significant attentions to facilitate

  1. Trust-and Clustering-Based Authentication Services in Mobile Ad Hoc Edith C. H. Ngai and Michael R. Lyu

    E-Print Network [OSTI]

    Lyu, Michael R.

    distributed systems, security in ad hoc networks is based on the use of a key management system. Specific key the network. The new solution is evaluated through simulation and implementation, and the resultsTrust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith C. H. Ngai

  2. STOMP Subsurface Transport Over Multiple Phases: User`s guide

    SciTech Connect (OSTI)

    White, M.D.; Oostrom, M.

    1997-10-01T23:59:59.000Z

    The U.S. Department of Energy, through the Office of Technology Development, has requested the demonstration of remediation technologies for the cleanup of volatile organic compounds and associated radionuclides within the soil and groundwater at arid sites. This demonstration program, called the VOC-Arid Soils Integrated Demonstration Program (Arid-ID), has been initially directed at a volume of unsaturated and saturated soil contaminated with carbon tetrachloride, on the Hanford Site near Richland, Washington. A principal subtask of the Arid-ID program involves the development of an integrated engineering simulator for evaluating the effectiveness and efficiency of various remediation technologies. The engineering simulator`s intended users include scientists and engineers who are investigating soil physics phenomena associated with remediation technologies. Principal design goals for the engineer simulator include broad applicability, verified algorithms, quality assurance controls, and validated simulations against laboratory and field-scale experiments. An important goal for the simulator development subtask involves the ability to scale laboratory and field-scale experiments to full-scale remediation technologies, and to transfer acquired technology to other arid sites. The STOMP (Subsurface Transport Over Multiple Phases) simulator has been developed by the Pacific Northwest National Laboratory for modeling remediation technologies. Information on the use, application, and theoretical basis of the STOMP simulator theory and discussions on the governing equations, constitutive relations, and numerical solution algorithms for the STOMP simulator.

  3. CHEETAH 1.0 user`s manual

    SciTech Connect (OSTI)

    Fried, L.E.

    1994-06-24T23:59:59.000Z

    CHEETAH is an effort to bring the TIGER thermochemical code into the 1990s. A wide variety of improvements have been made in Version 1.0, and a host of others will be implemented in the future. In CHEETAH 1.0 I have improved the robustness and ease of use of TIGER. All of TIGER`s solvers have been replaced by new algorithms. I find that CHEETAH solves a wider variety of problems with no user intervention (e.g. no guesses for the C-J state) than TIGER did. CHEETAH has been made simpler to use than TIGER; typical use of the code occurs with the new standard run command. I hope that CHEETAH makes the use of thermochemical codes more attractive to practical explosive formulators. In the future I plan to improve the underlying science in CHEETAH. More accurate equations of state will be used in the gas and the condensed phase. A kinetics capability will be added to the code that will predict reaction zone thickness. CHEETAH is currently a numerical implementation of C-J theory. It will,become an implementation of ZND theory. Further ease of use features will eventually be added; an automatic formulator that adjusts concentrations to match desired properties is planned.

  4. Navigating the Aural Web: Augmenting User Experience for Visually Impaired and Mobile Users

    E-Print Network [OSTI]

    Zhou, Yaoqi

    Navigating the Aural Web: Augmenting User Experience for Visually Impaired and Mobile Users Davide and Experience Research (USER) Lab 535 W. Michigan Street Indianapolis, IN 46202 USA Abstract The current web information architectures typical of the web. A pervasive problem in designing for web accessibility

  5. DOE's BestPractices Steam End-User Training Steam End User Training

    E-Print Network [OSTI]

    Oak Ridge National Laboratory

    DOE's BestPractices Steam End-User Training Steam End User Training Steam Generation Module Stack Losses 1 June 28, 2010 Steam EndUser Training Steam Generation Efficiency Module Stack Losses loss is almost always the largest boiler loss. [Slide Visual ­ Stack Loss Title Page] Steam

  6. ESO Users Committee Jacco van Loon

    E-Print Network [OSTI]

    Crowther, Paul

    : accession supported (later: failed) · Russia: accession politically difficult · Poland and Ireland generation VLT(I) instruments ______ #12;ESO User Portal tools to be released between December 2006 and April to more aggressively advertise both UC to advertise both within constituencies #12;ESO User Portal

  7. Ocean Atmosphere Sea Ice Soil User's Guide

    E-Print Network [OSTI]

    OASIS3 Ocean Atmosphere Sea Ice Soil User's Guide oasis3 prism 2­2, June 2004 Sophie Valcke 1 to realize a coupled simulation with OASIS3. The aim of OASIS3 is to provide a flexible and user friendly. OASIS3 synchronizes the exchanges of coupling fields between the models being coupled, and performs 2D

  8. Ocean Atmosphere Sea Ice Soil User's Guide

    E-Print Network [OSTI]

    OASIS3 Ocean Atmosphere Sea Ice Soil User's Guide oasis3 prism 2­3, August 2004 Sophie Valcke 1 to realize a coupled simulation with OASIS3. The aim of OASIS3 is to provide a flexible and user friendly. OASIS3 synchronizes the exchanges of coupling fields between the models being coupled, and performs 2D

  9. OASIS4OASIS4 User defined interpolation

    E-Print Network [OSTI]

    1 08/06/2011 OASIS4OASIS4 User ­ defined interpolation with a weight-and-address file Developer/06/2011 For each component of OASIS4, the user defines the grids, the coupling fields (transients), ... i.e. all of elements and attributes. These informations are gathered in OASIS4 internal structures, described

  10. OASIS Dedicated User Support 2010 Annual report

    E-Print Network [OSTI]

    ISENES WP4 OASIS Dedicated User Support 2010 Annual report E. Maisonnave, S. Valcke TR/CMGC/11/28 #12;Abstract Three missions complemented the OASIS Dedicated User support program in 2010. Focused on high performance configurations, these actions consisted in: · testing OASIS3 on a high resolution

  11. Report Series ``OASIS3 User's Guide''

    E-Print Network [OSTI]

    Report Series ``OASIS3 User's Guide'' Number 2 Edited by: Sophie Valcke, Arnaud Caubel, Damien Declat, Laurent Terray #12; . #12; OASIS3 Ocean Atmosphere Sea Ice Soil User's Guide August 2003 Sophie­by­step description on how to realize a coupled simulation with OASIS3. The aim of OASIS3 is to provide a flexible

  12. User Guide for San José Finance Tool

    Broader source: Energy.gov [DOE]

    This user guide is intended primarily for the finance tool itself rather than an introduction to photovoltaics (PV) and PV finance. Users who do not have a basic understanding of PV systems, terminology, and financing structures are encouraged to review the documents referenced at the end of the guide...

  13. USER'S MANUAL Revision 1.0c

    E-Print Network [OSTI]

    van Hemmen, J. Leo

    to correct the interference at your own expense. California Best Management Practices RegulationsH8QM3-2 H8QMi-2 USER'S MANUAL Revision 1.0c SUPER ® #12;Manual Revision 1.0c Release Date: November in the United States of America The information in this User's Manual has been carefully reviewed

  14. USER'S MANUAL Revision 1.1b

    E-Print Network [OSTI]

    Maccabe, Barney

    Best Management Practices Regulations for Perchlorate Materials: This Perchlorate warning applies onlySUPER ® X7DB3 USER'S MANUAL Revision 1.1b #12;Unless you request and receive written permission in this User's Manual has been carefully reviewed and is believed to be accurate. The vendor assumes

  15. DAKOTA JAGUAR 2.1 user's Manual.

    SciTech Connect (OSTI)

    Adams, Brian M.; Lefantzi, Sophia; Chan, Ethan; Ruthruff, Joseph R.

    2011-06-01T23:59:59.000Z

    JAGUAR (JAva GUi for Applied Research) is a Java software tool providing an advanced text editor and graphical user interface (GUI) to manipulate DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) input specifications. This document focuses on the features necessary for a user to use JAGUAR.

  16. University Library AMSTERDAM UNIVERSITY LIBRARY USER REGULATIONS

    E-Print Network [OSTI]

    van Rooij, Robert

    University Library AMSTERDAM UNIVERSITY LIBRARY USER REGULATIONS Regulations for the users of the libraries of the University of Amsterdam General 1. The Amsterdam University Library (from hereon: the library) is understood to mean the whole body of faculty libraries and facilities of the Library

  17. Collaboration Suite Advanced Web Client User Guide

    E-Print Network [OSTI]

    Shepp, Larry

    ZimbraTM Collaboration Suite Advanced Web Client User Guide Version 5.0 #12;Zimbra Web Client User Guide Copyright Notice Copyright © 2008 Zimbra, Inc. All rights reserved materials, onscreen publication, or Web documentation--is expressly forbidden. Zimbra and the Zimbra logo

  18. User Interfaces 1 Command Line Interfaces

    E-Print Network [OSTI]

    Verschelde, Jan

    User Interfaces 1 Command Line Interfaces getting arguments of the command line a command line 2013 1 / 39 #12;User Interfaces 1 Command Line Interfaces getting arguments of the command line a command line interface to store points fitting points with polyfit of numpy 2 Encapsulation by Object

  19. LMD Martian Mesoscale Model User Manual

    E-Print Network [OSTI]

    Spiga, Aymeric

    LMD Martian Mesoscale Model [LMD-MMM] User Manual A. Spiga aymeric.spiga@upmc.fr Laboratoire de;#12;Contents 1 What is the LMD Martian Mesoscale Model? 3 1.1 Dynamical core on mesoscale levels . . . . . . . . . . . . . . . 35 iii #12;iv User Manual for the LMD Martian Mesoscale Model

  20. Model Checking User Interfaces Abigail Cauchi

    E-Print Network [OSTI]

    Pace, Gordon J.

    Model Checking User Interfaces Abigail Cauchi Dept of Computer Science University of Malta acau0004@um.edu.mt Gordon Pace Dept of Computer Science University of Malta gordon.pace@um.edu.mt Sandro Spina Dept of Computer Science University of Malta sandro.spina@um.edu.mt Abstract User interfaces

  1. Heating 7.2 user`s manual

    SciTech Connect (OSTI)

    Childs, K.W.

    1993-02-01T23:59:59.000Z

    HEATING is a general-purpose conduction heat transfer program written in Fortran 77. HEATING can solve steady-state and/or transient heat conduction problems in one-, two-, or three-dimensional Cartesian, cylindrical, or spherical coordinates. A model may include multiple materials, and the thermal conductivity, density, and specific heat of each material may be both time- and temperature-dependent. The thermal conductivity may also be anisotropic. Materials may undergo change of phase. Thermal properties of materials may be input or may be extracted from a material properties library. Heat-generation rates may be dependent on time, temperature, and position, and boundary temperatures may be time- and position-dependent. The boundary conditions, which may be surface-to-environment or surface-to-surface, may be specified temperatures or any combination of prescribed heat flux, forced convection, natural convection, and radiation. The boundary condition parameters may be time- and/or temperature-dependent. General gray-body radiation problems may be modeled with user-defined factors for radiant exchange. The mesh spacing may be variable along each axis. HEATING uses a runtime memory allocation scheme to avoid having to recompile to match memory requirements for each specific problem. HEATING utilizes free-form input. Three steady-state solution techniques are available: point-successive-overrelaxation iterative method with extrapolation, direct-solution, and conjugate gradient. Transient problems may be solved using any one of several finite-difference schemes: Crank-Nicolson implicit, Classical Implicit Procedure (CIP), Classical Explicit Procedure (CEP), or Levy explicit method. The solution of the system of equations arising from the implicit techniques is accomplished by point-successive-overrelaxation iteration and includes procedures to estimate the optimum acceleration parameter.

  2. Vegetation Change Analysis User's Manual

    SciTech Connect (OSTI)

    D. J. Hansen; W. K. Ostler

    2002-10-01T23:59:59.000Z

    Approximately 70 percent of all U.S. military training lands are located in arid and semi-arid areas. Training activities in such areas frequently adversely affect vegetation, damaging plants and reducing the resilience of vegetation to recover once disturbed. Fugitive dust resulting from a loss of vegetation creates additional problems for human health, increasing accidents due to decreased visibility, and increasing maintenance costs for roads, vehicles, and equipment. Diagnostic techniques are needed to identify thresholds of sustainable military use. A cooperative effort among U.S. Department of Energy, U.S. Department of Defense, and selected university scientists was undertaken to focus on developing new techniques for monitoring and mitigating military impacts in arid lands. This manual focuses on the development of new monitoring techniques that have been implemented at Fort Irwin, California. New mitigation techniques are described in a separate companion manual. This User's Manual is designed to address diagnostic capabilities needed to distinguish between various degrees of sustainable and nonsustainable impacts due to military training and testing and habitat-disturbing activities in desert ecosystems. Techniques described here focus on the use of high-resolution imagery and the application of image-processing techniques developed primarily for medical research. A discussion is provided about the measurement of plant biomass and shrub canopy cover in arid. lands using conventional methods. Both semiquantitative methods and quantitative methods are discussed and reference to current literature is provided. A background about the use of digital imagery to measure vegetation is presented.

  3. Bypass Flow Computations using a One-Twelfth Symmetric Sector For Normal Operation in a 350 MWth VHTR

    SciTech Connect (OSTI)

    Richard W. Johnson; Hiroyuki Sato

    2010-10-01T23:59:59.000Z

    Significant uncertainty exists about the effects of bypass flow in a prismatic gas-cooled very high temperature reactor (VHTR). Bypass flow is the flow in the gaps between prismatic graphite blocks in the core. The gaps are present because of variations in their construction, imperfect installation and expansion and shrinkage from thermal heating and neutron fluence. Calculations are performed using computational fluid dynamics (CFD) for flow of the helium coolant in the gap and coolant channels along with conjugate heat generation and heat transfer in the fuel compacts and graphite. A commercial CFD code is used for all of the computations. A one-twelfth sector of a standard hexagonal block column is used for the CFD model because of its symmetry. Various scenarios are computed by varying the gap width from zero to 5 mm, varying the total heat generation rate to examine average and peak radial generation rates and variation of the graphite block geometry to account for the effects of shrinkage caused by irradiation. The calculations are for a 350 MWth prismatic reactor. It is shown that the effect of increasing gap width, while maintaining the same total mass flow rate, causes increased maximum fuel temperature while providing significant cooling to the near-gap region. The maximum outlet coolant temperature variation is increased by the presence of gap flow and also by an increase in total heat generation with a gap present. The effect of block shrinkage is actually to decrease maximum fuel temperature compared to a similar reference case.

  4. HEATING 7. 1 user's manual

    SciTech Connect (OSTI)

    Childs, K.W.

    1991-07-01T23:59:59.000Z

    HEATING is a FORTRAN program designed to solve steady-state and/or transient heat conduction problems in one-, two-, or three- dimensional Cartesian, cylindrical, or spherical coordinates. A model may include multiple materials, and the thermal conductivity, density, and specific heat of each material may be both time- and temperature-dependent. The thermal conductivity may be anisotropic. Materials may undergo change of phase. Thermal properties of materials may be input or may be extracted from a material properties library. Heating generation rates may be dependent on time, temperature, and position, and boundary temperatures may be time- and position-dependent. The boundary conditions, which may be surface-to-boundary or surface-to-surface, may be specified temperatures or any combination of prescribed heat flux, forced convection, natural convection, and radiation. The boundary condition parameters may be time- and/or temperature-dependent. General graybody radiation problems may be modeled with user-defined factors for radiant exchange. The mesh spacing may be variable along each axis. HEATING is variably dimensioned and utilizes free-form input. Three steady-state solution techniques are available: point-successive-overrelaxation iterative method with extrapolation, direct-solution (for one-dimensional or two-dimensional problems), and conjugate gradient. Transient problems may be solved using one of several finite-difference schemes: Crank-Nicolson implicit, Classical Implicit Procedure (CIP), Classical Explicit Procedure (CEP), or Levy explicit method (which for some circumstances allows a time step greater than the CEP stability criterion). The solution of the system of equations arising from the implicit techniques is accomplished by point-successive-overrelaxation iteration and includes procedures to estimate the optimum acceleration parameter.

  5. Heating 7. 2 user's manual

    SciTech Connect (OSTI)

    Childs, K.W.

    1993-02-01T23:59:59.000Z

    HEATING is a general-purpose conduction heat transfer program written in Fortran 77. HEATING can solve steady-state and/or transient heat conduction problems in one-, two-, or three-dimensional Cartesian, cylindrical, or spherical coordinates. A model may include multiple materials, and the thermal conductivity, density, and specific heat of each material may be both time- and temperature-dependent. The thermal conductivity may also be anisotropic. Materials may undergo change of phase. Thermal properties of materials may be input or may be extracted from a material properties library. Heat-generation rates may be dependent on time, temperature, and position, and boundary temperatures may be time- and position-dependent. The boundary conditions, which may be surface-to-environment or surface-to-surface, may be specified temperatures or any combination of prescribed heat flux, forced convection, natural convection, and radiation. The boundary condition parameters may be time- and/or temperature-dependent. General gray-body radiation problems may be modeled with user-defined factors for radiant exchange. The mesh spacing may be variable along each axis. HEATING uses a runtime memory allocation scheme to avoid having to recompile to match memory requirements for each specific problem. HEATING utilizes free-form input. Three steady-state solution techniques are available: point-successive-overrelaxation iterative method with extrapolation, direct-solution, and conjugate gradient. Transient problems may be solved using any one of several finite-difference schemes: Crank-Nicolson implicit, Classical Implicit Procedure (CIP), Classical Explicit Procedure (CEP), or Levy explicit method. The solution of the system of equations arising from the implicit techniques is accomplished by point-successive-overrelaxation iteration and includes procedures to estimate the optimum acceleration parameter.

  6. V-017: Apache Tomcat Security Bypass and Denial of Service Vulnerabilities

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartment of EnergyThe followingRemote Users Execute|

  7. V-216: Drupal Monster Menus Module Security Bypass and Script Insertion

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently20,000 Russian Nuclear Warheads intoMansoor GhassemUseDepartment ofUsers|Vulnerabilities

  8. U.S. Department of Energy FreedomCAR & Vehicle Technologies Program Oil Bypass Filter Technology Evaluation Fifth Quarterly Report October - December 2003

    SciTech Connect (OSTI)

    Larry Zirker; James Francfort

    2004-02-01T23:59:59.000Z

    This Oil Bypass Filter Technology Evaluation quarterly report (October-December 2003) details the ongoing fleet evaluation of an oil bypass filter technology by the Idaho National Engineering and Environmental Laboratory (INEEL) for the U.S. Department of Energy's FreedomCAR & Vehicle Technologies Program. Eight four-cycle diesel-engine buses used to transport INEEL employees on various routes have been equipped with oil bypass filter systems from the puraDYN Corporation. The bypass filters are reported to have engine oil filtering capability of <1 micron and a built-in additive package to facilitate extended oil-drain intervals. To date, the eight buses have accumulated 324,091 test miles. This represents an avoidance of 27 oil changes, which equate to 952 quarts (238 gallons) of new oil not conserved and therefore, 952 quarts of waste oil not generated. To validate the extended oil-drain intervals, an oil-analysis regime is used to evaluate the fitness of the oil for continued service by monitoring the presence of necessary additives, undesirable contaminants, and engine-wear metals. The test fleet has been expanded to include six Chevrolet Tahoe sport utility vehicles with gasoline engines.

  9. New User Facilities Web Page Highlights Work at National Laboratories...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    User Facilities Web Page Highlights Work at National Laboratories New User Facilities Web Page Highlights Work at National Laboratories January 15, 2014 - 12:00am Addthis The User...

  10. Fighting phishing at the user interface

    E-Print Network [OSTI]

    Wu, Min, 1976-

    2006-01-01T23:59:59.000Z

    The problem that this thesis concentrates on is phishing attacks. Phishing attacks use email messages and web sites designed to look as if they come from a known and legitimate organization, in order to deceive users into ...

  11. NIST Calibration Program Calibration Services Users Guide

    E-Print Network [OSTI]

    NIST Calibration Program Calibration Services Users Guide SP 250 Appendix Fee Schedule 2011 Calibration Services: Dimensional Mechanical Thermodynamic Optical Radiation Ionizing Radiation...................................................................................................................... 7 Reports of Calibration/Test Results

  12. Inky : Internet keywords with user feedback

    E-Print Network [OSTI]

    Chou, Victoria H. (Victoria Hsiao-tsung)

    2008-01-01T23:59:59.000Z

    The web today is accessed primarily through graphical user interfaces although some of its functionality can be more efficiently invoked through a command line interface. This thesis presents Inky, a sloppy command line ...

  13. User experience design of complex systems

    E-Print Network [OSTI]

    Reily, Todd R. (Todd Richard)

    2012-01-01T23:59:59.000Z

    Over recent years, the global marketplace and its consumers have developed a mutual recognition for the rising prominence of design that delivers high quality user experience. For the provider of products and services, ...

  14. September 2005 ADVISING USERS ON INFORMATION TECHNOLOGY

    E-Print Network [OSTI]

    September 2005 ADVISING USERS ON INFORMATION TECHNOLOGY BBuulllleettiinn BIOMETRIC TECHNOLOGIES: HELPING TO PROTECT INFORMATION AND AUTOMATED TRANSACTIONS IN INFORMATION TECHNOLOGY SYSTEMS BIOMETRIC TECHNOLOGIES: HELPING TO PROTECT INFORMATION AND AUTOMATED TRANSACTIONS IN INFORMATION TECHNOLOGY SYSTEMS

  15. User's guide to the Venezuelan macrofinancial model

    E-Print Network [OSTI]

    Aliana, Simon

    1981-01-01T23:59:59.000Z

    This paper presents a user's guide and documentation for a macrofinancial model of Venezuela. This model was developed under a DOE International Affairs Division grant (contract no. EX-76-A-01-2295) for the project, "A ...

  16. Characterizing User Mobility in Wireless Networks

    E-Print Network [OSTI]

    Nunes, Bruno Astuto Arouche

    2012-01-01T23:59:59.000Z

    Symmetry of User Mobility in Wireless Networks 3.1 MobilityAnalysis of a local-area wireless network. In ACM MOBI- COMand evaluation of wireless networks and their protocols.

  17. Paper Airplane user's manual : version four

    E-Print Network [OSTI]

    Lajoie, Ronnie M.

    Preface: This document provides the user with a step-by-step guide to using Paper Airplane, Version IV. Although this program can be used to design any system (once given the proper set of design equations), this manual ...

  18. FACET: SLAC___s New User Facility

    SciTech Connect (OSTI)

    Clarke, C.I.; Decker, F.-J.; England, R.J.; Erickson, R.A.; Hast, C.; Hogan, M.J.; Li, S.Z.; Litos, M.D.; Nosochkov, Y.; Seeman, J.T.; Sheppard, J.; Wienands, U.; Woodley, M.; Yocky, G.; /SLAC

    2012-05-16T23:59:59.000Z

    FACET (Facility for Advanced Accelerator Experimental Tests) is a new User Facility at SLAC National Accelerator Laboratory. The first User Run started in spring 2012 with 20 GeV, 3 nC electron beams. The facility is designed to provide short (20 {micro}m) bunches and small (20 {micro}m wide) spot sizes, producing uniquely high power beams. FACET supports studies from many fields but in particular those of Plasma Wakefield Acceleration and Dielectric Wakefield Acceleration. The creation of drive and witness bunches and shaped bunch profiles is possible with 'Notch' Collimation. FACET is also a source of THz radiation for material studies. Positrons will be available at FACET in future user runs. We present the User Facility and the available tools and opportunities for future experiments.

  19. Water Usage Law, Major Water Users (Missouri)

    Broader source: Energy.gov [DOE]

    Any water user with the capability to withdraw or divert 100,000 gallons or more per day from any stream, river, lake, well, spring or other water source must register and file for a permit for...

  20. PMI Toolbox User's Guide Photon Migration Imaging

    E-Print Network [OSTI]

    Boas, David

    PMI Toolbox User's Guide 2/25/2002 1 Photon Migration Imaging Toolbox 2001 http Temple Place - Suite 330, Boston, MA 02111-1307, USA. http://www.gnu.org/copyleft/gpl.html #12;PMI