National Library of Energy BETA

Sample records for users bypass authentication

  1. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information

    Broader source: Energy.gov [DOE]

    Apache Tomcat AJP protocol processing bug lets remote users bypass authentication or obtain information.

  2. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 57: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis December 28 2012 - 6:00am PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions.

  3. V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy 7: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability December 28, 2012 - 6:00am Addthis PROBLEM: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability PLATFORM: eXtplorer 2.x ABSTRACT: A vulnerability has been reported in eXtplorer, which can be exploited by malicious people to bypass certain security restrictions. REFERENCE LINKS: Secunia Advisory

  4. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    issued a fix (7.1.2). Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  5. U-130: JBoss Operations Network LDAP Authentication Bug Lets Remote Users Bypass Authentication

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in JBoss Operations Network. A remote user can login with an arbitrary password in certain cases.

  6. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in Red Hat Enterprise MRG Messaging. A remote user can access cluster messages and view the internal configuration.

  7. U-188: MySQL User Login Security Bypass and Unspecified Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE)

    An error when verifying authentication attempts can be exploited to bypass the authentication mechanism.

  8. V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks V-155: Apache Tomcat FORM Authenticator Lets Remote Users Conduct Session Fixation Attacks...

  9. T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    8: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct Bypass Attacks T-728: Apache Tomcat HTTP DIGEST Authentication Weaknesses Let Remote Users Conduct...

  10. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows®...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA Authentication Agent Lets Remote Authenticated Users Bypass an Authentication Step reference LINKS: SecurityTracker Alert ID: 1027559 Bugtraq ID: 55662 CVE-2012-2287...

  11. V-127: Samba Bug Lets Remote Authenticated Users Modify Files...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: Samba Bug Lets Remote Authenticated Users Modify Files V-127: Samba Bug Lets Remote Authenticated Users Modify Files April 5, 2013 - 6:00am Addthis PROBLEM: A vulnerability was...

  12. V-236: MediaWiki CentralAuth Extension Authentication Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    The vulnerability is caused due to an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the ...

  13. V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    | Department of Energy 6: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability V-236: MediaWiki CentralAuth Extension Authentication Bypass Vulnerability September 6, 2013 - 4:36am Addthis PROBLEM: A vulnerability has been reported in the CentralAuth extension for MediaWiki, which can be exploited by malicious people to bypass certain security restrictions. PLATFORM: MediaWiki CentralAuth Extension ABSTRACT: A vulnerability has been reported in the CentralAuth extension for

  14. T-646: Debian fex authentication bypass | Department of Energy

    Energy Savers [EERE]

    PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service for transferring very large, files, is not properly validating authentication IDs. While the ...

  15. V-195: RSA Authentication Manager Lets Local Users View the Administra...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: RSA Authentication Manager Lets Local Users View the Administrative Account Password V-195: RSA Authentication Manager Lets Local Users View the Administrative Account Password...

  16. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  17. U-233: Oracle Database INDEXTYPE CTXSYS.CONTEXT Bug Lets Remote Authenticated Users Gain Elevated Privileges

    Office of Energy Efficiency and Renewable Energy (EERE)

    A remote authenticated user with 'Create Table' privileges can gain 'SYS' privileges on the target system.

  18. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates

    Broader source: Energy.gov [DOE]

    A remote authenticated user can gain elevated privileges. A remote authenticated user can inject SQL commands. A remote user can spoof connections in certain cases.

  19. V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    5: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions December 12, 2012 - 2:00am Addthis PROBLEM:...

  20. User Authentication Policy | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users of the Argonne production systems are required to use a CRYPTOCard one time password... are: Something you know (for example, a password); Something you have (for example, an ID ...

  1. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A ...

  2. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload...

    Energy Savers [EERE]

    Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users ...

  3. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Controls | Department of Energy 36: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls January 18, 2011 - 2:30pm Addthis PROBLEM: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls. PLATFORM: Cisco 5500 Series Adaptive Security Appliances (ASA) ABSTRACT: Cisco ASA 5500 Series Adaptive Security Appliances are affected by multiple

  4. V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Let Remote Users Conduct Cross-Site Scripting Attacks | Department of Energy 51: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks V-151: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks May 8, 2013 - 12:06am Addthis PROBLEM: RSA Archer eGRC Bugs Let Remote Authenticated Users Upload Files and Let Remote Users Conduct Cross-Site Scripting Attacks

  5. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  6. T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Password | Department of Energy 5: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password T-575: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password March 11, 2011 - 3:05pm Addthis PROBLEM: A vulnerability was reported in OpenLDAP. A remote user can authenticate without a valid password. PLATFORM: Open LDAP version(s) 2.4.12 - 2.2.24 ABSTRACT: OpenLDAP back-ndb Lets Remote Users Authenticate Without a Valid Password. reference LINKS: SecurityTracker

  7. T-570: HP Security Bulletin- HP-UX Running OpenSSL, Remote Execution of Arbitrary Code, Denial of Service (DoS), Authentication Bypass

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified with HP-UX OpenSSL. This vulnerability could be exploited remotely to execute arbitrary code or create a Denial of Service (DoS) or an authentication bypass.

  8. U-247: EMC Cloud Tiering Appliance Flaw Lets Remote Users Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CTA 7.3.1 and later with Hotfix ESA-2012-034 Addthis Related Articles V-045: Adobe ColdFusion Lets Local Users Bypass Sandbox Restrictions V-036: EMC Smarts Network...

  9. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  10. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Office of Energy Efficiency and Renewable Energy (EERE)

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  11. U-234: Oracle MySQL User Login Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    Oracle MySQL is prone to a security bypass vulnerability Attackers can exploit this issue to bypass certain security restrictions.

  12. V-223: RSA Authentication Agent for PAM Allows Remote Users to...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    has issued a fix Addthis Related Articles U-267: RSA Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability...

  13. U-244: McAfee Email Gateway Lets Remote Users Bypass Authentication...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    McAfee Security Bulletin ID: SB10026 SecurityTracker Alert ID: 1027444 Bugtraq ID: 55184 CVE-2012-4595, CVE-2012-4596, CVE-2012-4597 IMPACT ASSESSMENT: Medium Discussion A remote...

  14. V-036: EMC Smarts Network Configuration Manager Database Authentication

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Bypass Vulnerability | Department of Energy 6: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability V-036: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability November 29, 2012 - 3:30am Addthis PROBLEM: EMC Smarts Network Configuration Manager Database Authentication Bypass Vulnerability PLATFORM: EMC Smarts Network Configuration Manager (NCM) all versions prior 9.1 ABSTRACT: Two vulnerabilities were reported in EMC Smarts

  15. V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated Privileges V-150: Apache VCL Input Validation Flaw Lets Remote Authenticated Users Gain Elevated...

  16. Multi-factor authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  17. V-231: Cisco Identity Services Engine Discloses Authentication...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    system stores the username and password of an authenticated user within hidden ... or clickjacking attack to access the username and password of an authenticated session. ...

  18. A proposed generic authentication information element

    SciTech Connect (OSTI)

    Tarman, T.D.

    1995-08-01

    This contribution describes a proposed information element that can convey authentication information within an ATM signaling message. The design of this information element provides a large amount of flexibility to the user because it does not specify a particular signature algorithm, and it does not specify which information elements must accompany the Authentication IE in a signaling message. This allows the user to implement authenticated signaling based on her site`s security policies and performance requirements.

  19. Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... offered at CAMD's annual user meeting) or by retaking the online CAMD Radiation Safety Test. If your training has expired your access card will not allow access to the ...

  20. V-231: Cisco Identity Services Engine Discloses Authentication Credentials

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    to Remote Users | Department of Energy 1: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users V-231: Cisco Identity Services Engine Discloses Authentication Credentials to Remote Users August 30, 2013 - 3:01am Addthis PROBLEM: A vulnerability was reported in Cisco Identity Services Engine. A remote user can obtain authentication credentials. PLATFORM: Cisco Identity Services Engine (ISE) 1.x ABSTRACT: A vulnerability was reported in Cisco Identity Services

  1. Authentication techniques for smart cards

    SciTech Connect (OSTI)

    Nelson, R.A.

    1994-02-01

    Smart card systems are most cost efficient when implemented as a distributed system, which is a system without central host interaction or a local database of card numbers for verifying transaction approval. A distributed system, as such, presents special card and user authentication problems. Fortunately, smart cards offer processing capabilities that provide solutions to authentication problems, provided the system is designed with proper data integrity measures. Smart card systems maintain data integrity through a security design that controls data sources and limits data changes. A good security design is usually a result of a system analysis that provides a thorough understanding of the application needs. Once designers understand the application, they may specify authentication techniques that mitigate the risk of system compromise or failure. Current authentication techniques include cryptography, passwords, challenge/response protocols, and biometrics. The security design includes these techniques to help prevent counterfeit cards, unauthorized use, or information compromise. This paper discusses card authentication and user identity techniques that enhance security for microprocessor card systems. It also describes the analysis process used for determining proper authentication techniques for a system.

  2. T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AJP Protocol Processing Bug Lets Remote Users Bypass Authentication or Obtain Information T-707: Apache Tomcat AJP Protocol Processing Bug Lets Remote Users Bypass Authentication...

  3. U-084: Cisco Digital Media Manager Lets Remote Authenticated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Show and Share. Impact: A remote authenticated user can send a specially crafted URL via TCP port 8443 to access administrative resources and gain administrative privileges....

  4. System and method for authentication

    SciTech Connect (OSTI)

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  5. T-704: RSA enVision Lets Remote Users View Files and Remote Authentica...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain Password T-704: RSA enVision Lets Remote Users View Files and Remote Authenticated Users Obtain...

  6. Authentication Protocol using Quantum Superposition States

    SciTech Connect (OSTI)

    Kanamori, Yoshito; Yoo, Seong-Moo; Gregory, Don A.; Sheldon, Frederick T

    2009-01-01

    When it became known that quantum computers could break the RSA (named for its creators - Rivest, Shamir, and Adleman) encryption algorithm within a polynomial-time, quantum cryptography began to be actively studied. Other classical cryptographic algorithms are only secure when malicious users do not have sufficient computational power to break security within a practical amount of time. Recently, many quantum authentication protocols sharing quantum entangled particles between communicators have been proposed, providing unconditional security. An issue caused by sharing quantum entangled particles is that it may not be simple to apply these protocols to authenticate a specific user in a group of many users. An authentication protocol using quantum superposition states instead of quantum entangled particles is proposed. The random number shared between a sender and a receiver can be used for classical encryption after the authentication has succeeded. The proposed protocol can be implemented with the current technologies we introduce in this paper.

  7. Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy

    DOE Patents [OSTI]

    Strait, Robert S.; Pearson, Peter K.; Sengupta, Sailes K.

    2000-01-01

    A password system comprises a set of codewords spaced apart from one another by a Hamming distance (HD) that exceeds twice the variability that can be projected for a series of biometric measurements for a particular individual and that is less than the HD that can be encountered between two individuals. To enroll an individual, a biometric measurement is taken and exclusive-ORed with a random codeword to produce a "reference value." To verify the individual later, a biometric measurement is taken and exclusive-ORed with the reference value to reproduce the original random codeword or its approximation. If the reproduced value is not a codeword, the nearest codeword to it is found, and the bits that were corrected to produce the codeword to it is found, and the bits that were corrected to produce the codeword are also toggled in the biometric measurement taken and the codeword generated during enrollment. The correction scheme can be implemented by any conventional error correction code such as Reed-Muller code R(m,n). In the implementation using a hand geometry device an R(2,5) code has been used in this invention. Such codeword and biometric measurement can then be used to see if the individual is an authorized user. Conventional Diffie-Hellman public key encryption schemes and hashing procedures can then be used to secure the communications lines carrying the biometric information and to secure the database of authorized users.

  8. T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    6: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls T-536: Cisco ASA Multiple Flaws Let Remote Users Deny Service and Bypass Security Controls ...

  9. Data Authentication Demonstration for Radionuclide Stations

    SciTech Connect (OSTI)

    Harris, Mark; Herrington, Pres; Miley, Harry; Ellis, J. Edward; McKinnon, David; St. Pierre, Devon

    1999-08-03

    Data authentication is required for certification of sensor stations in the International Monitoring System (IMS). Authentication capability has been previously demonstrated for continuous waveform stations (seismic and infrasound). This paper addresses data surety for the radionuclide stations in the IMS, in particular the Radionuclide Aerosol Sampler/Analyzer (RASA) system developed by Pacific Northwest National Laboratory (PNNL). Radionuclide stations communicate data by electronic mail using formats defined in IMS 1.0, Formats and Protocols for Messages. An open message authentication standard exists, called S/MIME (Secure/Multipurpose Internet Mail Extensions), which has been proposed for use with all IMS radionuclide station message communications. This standard specifies adding a digital signature and public key certificate as a MIME attachment to the e-mail message. It is advantageous because it allows authentication to be added to all IMS 1.0 messages in a standard format and is commercially supported in e-mail software. For command and control, the RASA system uses a networked Graphical User Interface (GUI) based upon Common Object Request Broker Architecture (CORBA) communications, which requires special authentication procedures. The authors have modified the RASA system to meet CTBTO authentication guidelines, using a FORTEZZA card for authentication functions. They demonstrated signing radionuclide data messages at the RASA, then sending, receiving, and verifying the messages at a data center. They demonstrated authenticating command messages and responses from the data center GUI to the RASA. Also, the particular authentication system command to change the private/public key pair and retrieve the new public key was demonstrated. This work shows that data surety meeting IMS guidelines may be immediately applied to IMS radionuclide systems.

  10. Authentication of byte sequences

    SciTech Connect (OSTI)

    Stearns, S.D.

    1991-06-01

    Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

  11. Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Citrix_2FA_Authentication_12_3_2009.doc Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc (453.3 KB) More Documents & Publications Citrix_2FA_Authentication_09.09 Using Two-Factor RSA Token with WebVPN User guide for remote access to VDI and Workplace using RSA token

  12. U-231: Cisco ASA SIP and WebVPN Bugs Let Remote Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in Cisco ASA. A remote or remote authenticated user can cause denial of service conditions.

  13. T-646: Debian fex authentication bypass | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    ABSTRACT: Debian security discovered that fex, a web service for transferring very large, ... Impact: Debian has discovered that F*EX, a web service for transferring very large files, ...

  14. U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    9: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass Authentication U-159: Red Hat Enterprise MRG Messaging Qpid Bug Lets Certain Remote Users Bypass...

  15. U-026: Cisco Small Business SRP500 Series Bug Lets Remote Users Inject Commands

    Broader source: Energy.gov [DOE]

    A remote user can create a URL that, when loaded by the target authenticated administrative user, will execute arbitrary commands on the target system.

  16. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN ...

  17. T-692: VMware vFabric tc Server Lets Remote Users Login Using...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    A remote user can login using an obfuscated version of their password. PLATFORM: ... user can use the password in obfuscated form (or in plain text form) to authenticate. ...

  18. Proposed DSS-specific fields for the generic authentication information element

    SciTech Connect (OSTI)

    Tarman, T.D.

    1995-08-06

    This contribution proposes the format of the ``Algorithm-Specific Information`` and ``Signature`` fields within the ``Proposed Generic Authentication Information Element`` for authentication IEs based on the Digital Signature Standard (DSS). These fields are designed to allow various levels of authentication ``strength`` (or robustness), and many of these fields may be omitted in systems that optimize authentication performance by sharing common (public) Digital Signature Algorithm (DSA) parameters. This allows users and site security officers to design their authenticated signaling according to site security and performance requirements.

  19. V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code | Department of Energy 6: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code V-076: Cisco Wireless LAN Controller Bugs Let Remote Users Deny Service and Remote Authenticated Users Modify the Configuration and Execute Arbitrary Code January 24, 2013 - 6:00am Addthis PROBLEM: Several vulnerabilities were reported in

  20. V-216: Drupal Monster Menus Module Security Bypass and Script Insertion

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 6: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and Script Insertion Vulnerabilities August 12, 2013 - 6:00am Addthis PROBLEM: Two vulnerabilities have been reported in the Monster Menus module for Drupal PLATFORM: Drupal Monster Menus Module 6.x and 7.x ABSTRACT: The vulnerabilities can be exploited by malicious users to bypass certain security restrictions and

  1. Authentication of quantum messages.

    SciTech Connect (OSTI)

    Barnum, Howard; Crépeau, Jean-Claude; Gottesman, D.; Smith, A.; Tapp, Alan

    2001-01-01

    Authentication is a well-studied area of classical cryptography: a sender A and a receiver B sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified or replaced by a dishonest party with control of the communication line. In this paper we study the authentication of messages composed of quantum states. We give a formal definition of authentication in the quantum setting. Assuming A and B have access to an insecure quantum channel and share a private, classical random key, we provide a non-interactive scheme that both enables A to encrypt and authenticate (with unconditional security) an m qubit message by encoding it into m + s qubits, where the probability decreases exponentially in the security parameter s. The scheme requires a private key of size 2m + O(s). To achieve this, we give a highly efficient protocol for testing the purity of shared EPR pairs. It has long been known that learning information about a general quantum state will necessarily disturb it. We refine this result to show that such a disturbance can be done with few side effects, allowing it to circumvent cryptographic protections. Consequently, any scheme to authenticate quantum messages must also encrypt them. In contrast, no such constraint exists classically: authentication and encryption are independent tasks, and one can authenticate a message while leaving it publicly readable. This reasoning has two important consequences: On one hand, it allows us to give a lower bound of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is impossible, even with only computational security.

  2. Secure authenticated video equipment

    SciTech Connect (OSTI)

    Doren, N.E.

    1993-07-01

    In the verification technology arena, there is a pressing need for surveillance and monitoring equipment that produces authentic, verifiable records of observed activities. Such a record provides the inspecting party with confidence that observed activities occurred as recorded, without undetected tampering or spoofing having taken place. The secure authenticated video equipment (SAVE) system provides an authenticated series of video images of an observed activity. Being self-contained and portable, it can be installed as a stand-alone surveillance system or used in conjunction with existing monitoring equipment in a non-invasive manner. Security is provided by a tamper-proof camera enclosure containing a private, electronic authentication key. Video data is transferred communication link consisting of a coaxial cable, fiber-optic link or other similar media. A video review station, located remotely from the camera, receives, validates, displays and stores the incoming data. Video data is validated within the review station using a public key, a copy of which is held by authorized panics. This scheme allows the holder of the public key to verify the authenticity of the recorded video data but precludes undetectable modification of the data generated by the tamper-protected private authentication key.

  3. U-217: Red Hat Certificate System Bugs Let Remote Users Conduct Cross-Site Scripting and Denial of Service Attacks

    Office of Energy Efficiency and Renewable Energy (EERE)

    Two vulnerabilities were reported in Red Hat Certificate System. A remote user can conduct cross-site scripting attacks. A remote authenticated user can revoke the CA certificate.

  4. Authentication Without Secrets

    SciTech Connect (OSTI)

    Pierson, Lyndon G.; Robertson, Perry J.

    2015-11-01

    This work examines a new approach to authentication, which is the most fundamental security primitive that underpins all cyber security protections. Current Internet authentication techniques require the protection of one or more secret keys along with the integrity protection of the algorithms/computations designed to prove possession of the secret without actually revealing it. Protecting a secret requires physical barriers or encryption with yet another secret key. The reason to strive for "Authentication without Secret Keys" is that protecting secrets (even small ones only kept in a small corner of a component or device) is much harder than protecting the integrity of information that is not secret. Promising methods are examined for authentication of components, data, programs, network transactions, and/or individuals. The successful development of authentication without secret keys will enable far more tractable system security engineering for high exposure, high consequence systems by eliminating the need for brittle protection mechanisms to protect secret keys (such as are now protected in smart cards, etc.). This paper is a re-release of SAND2009-7032 with new figures numerous edits.

  5. Low-bandwidth authentication.

    SciTech Connect (OSTI)

    Donnelly, Patrick Joseph; McIver, Lauren; Gaines, Brian R.; Anderson, Erik; Collins, Michael Joseph; Thomas,Kurt Adam; McDaniel, Austin

    2007-09-01

    Remotely-fielded unattended sensor networks generally must operate at very low power--in the milliwatt or microwatt range--and thus have extremely limited communications bandwidth. Such sensors might be asleep most of the time to conserve power, waking only occasionally to transmit a few bits. RFID tags for tracking or material control have similarly tight bandwidth constraints, and emerging nanotechnology devices will be even more limited. Since transmitted data is subject to spoofing, and since sensors might be located in uncontrolled environments vulnerable to physical tampering, the high-consequence data generated by such systems must be protected by cryptographically sound authentication mechanisms; but such mechanisms are often lacking in current sensor networks. One reason for this undesirable situation is that standard authentication methods become impractical or impossible when bandwidth is severely constrained; if messages are small, a standard digital signature or HMAC will be many times larger than the message itself, yet it might be possible to spare only a few extra bits per message for security. Furthermore, the authentication tags themselves are only one part of cryptographic overhead, as key management functions (distributing, changing, and revoking keys) consume still more bandwidth. To address this problem, we have developed algorithms that provide secure authentication while adding very little communication overhead. Such techniques will make it possible to add strong cryptographic guarantees of data integrity to a much wider range of systems.

  6. Two-Factor Authentication

    Broader source: Energy.gov [DOE]

    Two-Factor Authentication (2FA) (also known as 2-Step Verification) is a system that employs two methods to identify an individual. More secure than reusable passwords, when a token's random number...

  7. LANSCE | Users | User Office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Office LANSCE User Office and Visitor Center The LANSCE User Office is responsible for coordinating the users with LANSCE instrument scientist and the facility. Users contact the User Office weeks before they arrive at the LANSCE Visitor Center at Technical Area 53. Among their many responsibilities, the team issues the call for proposals, coordinates proposal experiment schedules, directs users to the training center, issues badges and dosimeters, helps to arrange tours of the facilities,

  8. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent...

  9. International safeguards data authentication

    SciTech Connect (OSTI)

    Melton, R.B.; Smith, C.E.; DeLand, S.M.; Manatt, D.R.

    1996-07-01

    The International Safeguards community is becoming increasingly reliant on information stored in electronic form. In international monitoring and related activities it must be possible to verify and maintain the integrity of this electronic information. This paper discusses the use of data authentication technology to assist in accomplishing this task. The paper provides background information, identifies the relevance to international safeguards, discusses issues related to export controls, algorithm patents, key management and the use of commercial vs. custom software.

  10. User Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Information User Information Print ALSHub User Portal User Guide A step-by-step guide for users about how to apply and prepare for beam time at the ALS. Experiment Safety Upon receiving beam time, complete an Experiment Safety Sheet Prospective Users Users from Industry Contacts for Users User Policy Data Management Users' Executive Committee (UEC) User Meeting

  11. LANSCE | Users | User Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    LANSCE User Program LANSCE's User Program ensures the research it oversees represents the cutting edge of nuclear and materials science and technology. The User Program plays a key role in training the next generation of top scientists, attracting the best graduate students, postdoctoral researchers, and early-career scientists (defined as those less than 40-years old). The User Program typically begins with the first call for proposals and run until the end of the run-cycle. The User-Program

  12. Anonymous authenticated communications

    DOE Patents [OSTI]

    Beaver, Cheryl L.; Schroeppel, Richard C.; Snyder, Lillian A.

    2007-06-19

    A method of performing electronic communications between members of a group wherein the communications are authenticated as being from a member of the group and have not been altered, comprising: generating a plurality of random numbers; distributing in a digital medium the plurality of random numbers to the members of the group; publishing a hash value of contents of the digital medium; distributing to the members of the group public-key-encrypted messages each containing a same token comprising a random number; and encrypting a message with a key generated from the token and the plurality of random numbers.

  13. CERTIFICATE OF AUTHENTICITY

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. ~ i c h a e l G. Mueller, Chair National Coal Council I NATIONAL COAL COUNCIL 1 FULL COUNCIL MEETING FRIDAY NOVEMBER 14, 2 0 0 8 The Full Council meeting convened at 9 : 0 0 a.m. in the Washington Ballroom of the Westin Grand Hotel, 2 3 5 0 M Street, NW, Washington, DC, Chair

  14. AVNG authentication features

    SciTech Connect (OSTI)

    Thron, Jonathan Louis; Mac Arthur, Duncan W; White, Greg; Razinkov, Sergey; Livke, Alexander

    2010-01-01

    Any verification measurement performed on potentially classified nuclear material must satisfy two seemingly contradictory constraints. First and foremost, no classified information can be released. At the same time, the monitoring party must have confidence in the veracity of the measurement (called authentication). An information barrier (IB) is included in the measurement system to protect the potentially classified information. To achieve both goals, the IB allows only very limited, previously agreed-on information to be displayed to the monitoring party. In addition to this limited information from the potentially classified measurement, other measurements are performed and procedures are put in place for the monitoring party to gain confidence that the material being measured is consistent with the host's declarations concerning that material. In this presentation, we will discuss the techniques used in the AVNG attribute measuring system to facilitate authentication of the verification measurements by the monitors. These techniques include measuring unclassified items while allowing more information to be displayed; having the monitor understand the system function, design, and implementation; and randomly selecting the order of measurements.

  15. Heat exchanger bypass test report

    SciTech Connect (OSTI)

    De Vries, M.L.

    1995-01-26

    This test report documents the results that were obtained while conducting the test procedure which bypassed the heat exchangers in the HC-21C sludge stabilization process. The test was performed on November 15, 1994 using WHC-SD-CP-TC-031, ``Heat Exchanger Bypass Test Procedure.`` The primary objective of the test procedure was to determine if the heat exchangers were contributing to condensation of moisture in the off-gas line. This condensation was observed in the rotameters. Also, a secondary objective was to determine if temperatures at the rotameters would be too high and damage them or make them inaccurate without the heat exchangers in place.

  16. U-169: Sympa Multiple Security Bypass Vulnerabilities

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Sympa, which can be exploited by malicious people to bypass certain security restrictions.

  17. Provably Secure Password-based Authentication in TLS

    SciTech Connect (OSTI)

    Abdalla, Michel; Emmanuel, Bresson; Chevassut, Olivier; Moeller,Bodo; Pointcheval, David

    2005-12-20

    In this paper, we show how to design an efficient, provably secure password-based authenticated key exchange mechanism specifically for the TLS (Transport Layer Security) protocol. The goal is to provide a technique that allows users to employ (short) passwords to securely identify themselves to servers. As our main contribution, we describe a new password-based technique for user authentication in TLS, called Simple Open Key Exchange (SOKE). Loosely speaking, the SOKE ciphersuites are unauthenticated Diffie-Hellman ciphersuites in which the client's Diffie-Hellman ephemeral public value is encrypted using a simple mask generation function. The mask is simply a constant value raised to the power of (a hash of) the password.The SOKE ciphersuites, in advantage over previous pass-word-based authentication ciphersuites for TLS, combine the following features. First, SOKE has formal security arguments; the proof of security based on the computational Diffie-Hellman assumption is in the random oracle model, and holds for concurrent executions and for arbitrarily large password dictionaries. Second, SOKE is computationally efficient; in particular, it only needs operations in a sufficiently large prime-order subgroup for its Diffie-Hellman computations (no safe primes). Third, SOKE provides good protocol flexibility because the user identity and password are only required once a SOKE ciphersuite has actually been negotiated, and after the server has sent a server identity.

  18. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Home Contact User Services Print The User Services Group is available to aid ALS users before they arrive, while they are here, and after they leave. User Office Experiment...

  19. T-696: RSA Adaptive Authentication Has Unspecified Remote Authenticated Session Re-use Flaw

    Broader source: Energy.gov [DOE]

    An issue with Adaptive Authentication (On-Premise) was discovered which in certain circumstances might affect the out-of-the-box available authentication methods. In certain circumstances, when authentication information is compromised, and with the knowledge of additional session information, the authentication information might be reused within an active session.

  20. User Facilities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Facilities User Facilities User facility agreements allow Los Alamos partners and other entities to conduct research at our unique facilities. In 2011, LANL hosted more than 1,200 users at CINT, LANSCE, and NHMFL. Users came from across the DOE complex, from international academia, and from industrial companies from 45 states across the U.S. Unique world-class user facilities foster rich research opportunities Through its technology transfer efforts, LANL can implement user facility

  1. LANSCE | Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Rosen Scholar Rosen Prize Users dotline User Information Planning for Arrival: Contact the User Office several weeks before arriving at LANSCE. The LANSCE User Office will assist you in preparing for your visit to LANSCE. Plan to arrive one day prior to your scheduled beam time. User Office Contacts Division Office Ph: 505.667.5051 Lujan Center User Office lujan-uo@lanl.gov WNR User Program Administrator Tanya Herrera Ph: 505.667.6797 User Office Main Desk Email: lansce-user-office@lanl.gov Ph:

  2. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Section Sue Bailey This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Services Group Leader Prospective users Proprietary users...

  3. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Proposals for beam time User publications database Guest logistics and parking Loan of laptop, stealth phone and projector Logisitics for the annual users' meeting ALS Experiment...

  4. AVTA: Oil Bypass Filter Specifications and Test Procedures | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Oil Bypass Filter Specifications and Test Procedures AVTA: Oil Bypass Filter Specifications and Test Procedures PuraDYN Oil Bypass Filtration System Evaluation Test Plan methodology is used in the testing of all oil bypass filters on the buses at the Idaho National Laboratory. PuraDYN Oil Bypass Filtration System Evaluation Test Plan (732.1 KB) More Documents & Publications Demonstrated Petroleum Reduction Using Oil Bypass Filter Technology on Heavy and Light Vehicles Effects of

  5. V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerabil...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability May 23, 2013 - 6:00am Addthis...

  6. Photovoltaic power generation system free of bypass diodes (Patent...

    Office of Scientific and Technical Information (OSTI)

    Photovoltaic power generation system free of bypass diodes Title: Photovoltaic power generation system free of bypass diodes A photovoltaic power generation system that includes a ...

  7. Demonstrated Petroleum Reduction Using Oil Bypass Filter Technology...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Demonstrated Petroleum Reduction Using Oil Bypass Filter Technology on Heavy and Light Vehicles Demonstrated Petroleum Reduction Using Oil Bypass Filter Technology on Heavy and ...

  8. Oil Bypass Filter Technology Performance Evaluation - First Quarterly...

    Office of Scientific and Technical Information (OSTI)

    Oil Bypass Filter Technology Performance Evaluation - First Quarterly Report Citation Details In-Document Search Title: Oil Bypass Filter Technology Performance Evaluation - First ...

  9. Thermal Bypass Air Barriers in the 2009 International Energy...

    Energy Savers [EERE]

    Thermal Bypass Air Barriers in the 2009 International Energy Conservation Code - Building America Top Innovation Thermal Bypass Air Barriers in the 2009 International Energy ...

  10. V-216: Drupal Monster Menus Module Security Bypass and Script...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP ...

  11. User Facilities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Facilities User Facilities A new research frontier awaits! Our door is open, and we thrive on mutually beneficial partnerships and collaborations that drive innovations and new technologies. Unique world-class user facilities foster rich research opportunities Through its technology transfer efforts, Los Alamos National Laboratory can implement user facility agreements that allow its partners and other entities to conduct research at many of its unique facilities. While our largest user

  12. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Contacts for Users User Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address

  13. Obfuscated authentication systems, devices, and methods

    DOE Patents [OSTI]

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  14. CERTIFICATE OF AUTHENTICITY | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    CERTIFICATE OF AUTHENTICITY CERTIFICATE OF AUTHENTICITY I hereby certify that this transcript constitutes an accurate record of the full Council meeting of the National Coal Council held on November 14,2008 at the Westin Grand Hotel, Washington, D.C. Tran_001.pdf CERTIFICATE OF AUTHENTICITY (4.5 MB) More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for Offshore Wind Demonstrations Office of Information Resources Office of

  15. T-574: Google Chrome Multiple Flaws Let Remote Users Execute Arbitrary Code

    Broader source: Energy.gov [DOE]

    Multiple vulnerabilities have been reported in Google Chrome, where some have an unknown impact while others can be exploited by malicious people bypass certain security restrictions, disclose system information, and compromise a user's system.

  16. CERTIFICATE OF AUTHENTICITY | Department of Energy

    Energy Savers [EERE]

    D.C. Tran001.pdf PDF icon CERTIFICATE OF AUTHENTICITY More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for...

  17. User Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Guide Print 1. Register with the ALS Create an account on ALSHub-the ALS user portal. 2. Apply for Beam Time 3. Establish a User Agreement 4. Comply with Experiment Safety Requirements Upon receiving beam time, complete an Experiment Safety Sheet. 5. Get Access to Work Onsite 6. Complete Online Safety Training 7. Utilize Available Resources 8. Complete the User Satisfaction Survey 9. Report Publications, Awards, Talks, Acknowledging Work at ALS

  18. User Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs

  19. User Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Guide Print 1. Register with the ALS Create an account on ALSHub-the ALS user portal. 2. Apply for Beam Time 3. Establish a User Agreement 4. Comply with Experiment Safety Requirements Upon receiving beam time, complete an Experiment Safety Sheet. 5. Get Access to Work Onsite 6. Complete Online Safety Training 7. Utilize Available Resources 8. Complete the User Satisfaction Survey 9. Report Publications, Awards, Talks, Acknowledging Work at ALS

  20. User Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs

  1. User Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Guide User Guide Print 1. Register with the ALS Create an account on ALSHub-the ALS user portal. 2. Apply for Beam Time 3. Establish a User Agreement 4. Comply with Experiment Safety Requirements Upon receiving beam time, complete an Experiment Safety Sheet. 5. Get Access to Work Onsite 6. Complete Online Safety Training 7. Utilize Available Resources 8. Complete the User Satisfaction Survey 9. Report Publications, Awards, Talks, Acknowledging Work at ALS

  2. User Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Policy User Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing

  3. T-680:Samba SWAT 'user' Field Cross Site Scripting Vulnerability

    Broader source: Energy.gov [DOE]

    It was found that the 'Change Password' page / screen of the Samba Web Administration Tool did not properly sanitize content of the user-provided "user" field, prior printing it back to the page content. A remote attacker could provide a specially-crafted URL, which once visited by an authenticated Samba SWAT user could allow the attacker to conduct cross-site scripting attacks (execute arbitrary HTML or script code).

  4. Exhaust gas bypass valve control for thermoelectric generator

    DOE Patents [OSTI]

    Reynolds, Michael G; Yang, Jihui; Meisner, Greogry P.; Stabler, Francis R.; De Bock, Hendrik Pieter Jacobus; Anderson, Todd Alan

    2012-09-04

    A method of controlling engine exhaust flow through at least one of an exhaust bypass and a thermoelectric device via a bypass valve is provided. The method includes: determining a mass flow of exhaust exiting an engine; determining a desired exhaust pressure based on the mass flow of exhaust; comparing the desired exhaust pressure to a determined exhaust pressure; and determining a bypass valve control value based on the comparing, wherein the bypass valve control value is used to control the bypass valve.

  5. User Packages

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Packages User Packages There is more than one way for users to manage installation of Python packages on their own. Users of the Anaconda distribution may create their own environments as described here. Users of the NERSC-built modules can use virtualenv, pip, or compile and install Python packages directly. Using "pip" on Edison and Cori There is an issue with the pip command on the Cray systems because of an SSL certificate verification problem. One symptom is that you create

  6. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Author Guidelines User Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address

  7. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Services General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected from

  8. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected

  9. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected

  10. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected

  11. Bypass diode for a solar cell

    DOE Patents [OSTI]

    Rim, Seung Bum; Kim, Taeseok; Smith, David D.; Cousins, Peter J.

    2012-03-13

    Bypass diodes for solar cells are described. In one embodiment, a bypass diode for a solar cell includes a substrate of the solar cell. A first conductive region is disposed above the substrate, the first conductive region of a first conductivity type. A second conductive region is disposed on the first conductive region, the second conductive region of a second conductivity type opposite the first conductivity type.

  12. Instructions for using HSPD-12 Authenticated Outlook Web Access...

    Energy Savers [EERE]

    Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook...

  13. AUTHENTICATED

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1 Contract No. 11PB-12330 AMENDMENT executed by the BONNEVILLE POWER ADMINISTRATION and PORT TOWNSEND PAPER CORPORATION This AMENDMENT to the Firm Power Sales Agreement (Agreement)...

  14. User Policy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Policy Print 1. Guiding Principles The aim of User Policy at the Advanced Light Source (ALS) is to provide a framework for establishing a challenging yet congenial environment where talented scientists from different backgrounds can work together in pursuit of the new scientific opportunities presented by the availability of this innovative facility. User policy must address a variety of user needs and sensitivities. On one hand, the qualified researcher with little financial backing needs

  15. Industrial Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Industrial Users The facility has been used for more than a decade by a virtual Who's Who of the semiconductor industry to simulate the potential failures posed by cosmic-ray-induced neutrons upon miniature electronic devices, such as chips that help control aircraft or complex integrated circuits in automobiles. Industrial User Information The Neutron and Nuclear Science (WNR) Facility welcomes proposals for beam time experiments from industry users. Proprietary and non-proprietary industrial

  16. User Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Upon receiving beam time, complete an Experiment Safety Sheet. 5. Get Access to Work Onsite 6. Complete Online Safety Training 7. Utilize Available Resources 8. Complete the User ...

  17. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected from

  18. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Services Print General Inquiries: This e-mail address is being protected from spambots. You need JavaScript enabled to view it Tel: 510-486-7745 (dial last four numbers from on-site phones) Location: Building 6 mezzanine, Room 6-2212 Office hours: Monday-Friday 8am - 5pm (new users should arrive before 4pm) Address: Advanced Light Source, Berkeley Lab, MS 6-2100, Berkeley, CA 94720 Group Leader User Services Sue Bailey Prospective users, Industry users This e-mail address is being protected from

  19. Prospective Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    from universities, government labs, and industry who are interested in performing experiments at the general sciences and structural biology beamlines open to users. An...

  20. Industrial Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Industrial Users - Media Publications and Information The Invisible Neutron Threat Neutron-Induced Failures in Semiconductor Devices Nuclear Science Research at the LANSCE-WNR...

  1. User guide for remote access to VDI and Workplace using RSA token |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token User guide for remote access to VDI and Workplace using RSA token VDI_WP_RSA_Remote_Guide_Final.pdf (1.22 MB) More Documents & Publications User Guide for Remote Access to VDI/Workplace Using PIV Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc Citrix_2FA_Authentication_09.09

  2. Final report for the network authentication investigation and pilot.

    SciTech Connect (OSTI)

    Eldridge, John M.; Dautenhahn, Nathan; Miller, Marc M.; Wiener, Dallas J; Witzke, Edward L.

    2006-11-01

    New network based authentication mechanisms are beginning to be implemented in industry. This project investigated different authentication technologies to see if and how Sandia might benefit from them. It also investigated how these mechanisms can integrate with the Sandia Two-Factor Authentication Project. The results of these investigations and a network authentication path forward strategy are documented in this report.

  3. Hardware device binding and mutual authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  4. Prospective Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the ALS with all the technical, experiment, and administrative support they require for successful and efficient use of beam time. The kinds of access for users, i.e., General...

  5. U-246: Tigase XMPP Dialback Protection Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Tigase, which can be exploited by malicious people to bypass certain security restrictions.

  6. V-162: Apache Struts "ParameterInterceptor" Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Apache Struts, which can be exploited by malicious people to bypass certain security restrictions.

  7. NIF Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    users NIF Users Research Opportunities at the National Ignition Facility The National Ignition Facility provides the scientific community with an unprecedented capability for studying materials at extreme pressures, temperatures, and densities. NIF is expected to achieve temperatures and densities almost an order of magnitude greater than those in the sun's core and pressures far in excess of those at the core of Jupiter. The density of neutrons during the tens of picoseconds the NIF target

  8. Bypass apparatus and method for series connected energy storage devices

    DOE Patents [OSTI]

    Rouillard, Jean; Comte, Christophe; Daigle, Dominik

    2000-01-01

    A bypass apparatus and method for series connected energy storage devices. Each of the energy storage devices coupled to a common series connection has an associated bypass unit connected thereto in parallel. A current bypass unit includes a sensor which is coupled in parallel with an associated energy storage device or cell and senses an energy parameter indicative of an energy state of the cell, such as cell voltage. A bypass switch is coupled in parallel with the energy storage cell and operable between a non-activated state and an activated state. The bypass switch, when in the non-activated state, is substantially non-conductive with respect to current passing through the energy storage cell and, when in the activated state, provides a bypass current path for passing current to the series connection so as to bypass the associated cell. A controller controls activation of the bypass switch in response to the voltage of the cell deviating from a pre-established voltage setpoint. The controller may be included within the bypass unit or be disposed on a control platform external to the bypass unit. The bypass switch may, when activated, establish a permanent or a temporary bypass current path.

  9. User Guide for Remote Access to VDI/Workplace Using PIV | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy User Guide for Remote Access to VDI/Workplace Using PIV User Guide for Remote Access to VDI/Workplace Using PIV User guide for remote access to VDI/Workplace using a PIV card . VDI_WP_PIV_Remote_Guide_Final.pdf (1.39 MB) More Documents & Publications User guide for remote access to VDI and Workplace using RSA token Remote Access Options Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA)

  10. User Program | Prospective Users US

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Click on the "User Satisfaction Survey" link on the "main menu" page. If you don't have an account you will need to create one. Your login ID (username and email) is the same as ...

  11. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOE Patents [OSTI]

    Kent, Alexander Dale

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  12. User Accounts and Emails

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Accounts and Emails Print User Accounts Once a User Agreement is signed, users may ... and Information System (IRIS) . User Emails Users may sign up for a Berkeley Lab ...

  13. ALS User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Meeting ALS User Meeting web banner ALS User Meeting: October 5-7, 2015 Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops Contact Us User...

  14. User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    a.m. - 12.00 p.m. and 1.00 p.m. - 4.00 p.m. User Office Staff Deborah Smith adriana reza This e-mail address is being protected from spambots. You need JavaScript enabled to...

  15. V-174: RSA Authentication Manager Writes Operating System, SNMP...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    4: RSA Authentication Manager Writes Operating System, SNMP, and HTTP Plug-in Proxy Passwords in Clear Text to Log Files V-174: RSA Authentication Manager Writes Operating System,...

  16. Kerberos authentication: The security answer for unsecured networks

    SciTech Connect (OSTI)

    Engert, D.E.

    1995-06-01

    Traditional authentication schemes do not properly address the problems encountered with today`s unsecured networks. Kerbmm developed by MIT, on the other hand is designed to operate in an open unsecured network, yet provide good authentication and security including encrypted session traffic. Basic Kerberos principles as well as experiences of the ESnet Authentication Pilot Project with Cross Realm. Authentication between four National Laboratories will also be described.

  17. Thermal Reliability Study of Bypass Diodes in Photovoltaic Modules |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Thermal Reliability Study of Bypass Diodes in Photovoltaic Modules Thermal Reliability Study of Bypass Diodes in Photovoltaic Modules Presented at the PV Module Reliability Workshop, February 26 - 27 2013, Golden, Colorado pvmrw13_ps3_nrel_zhang.pdf (530.07 KB) More Documents & Publications US TG 4 Activities of QA Forum US & Japan TG 4 Activities of QA Forum High Temperature Reverse By-Pass Diodes Bias and Failures

  18. User Environment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Environment Environment on Genepool When you log into the Genepool system you will land in your $HOME directory on NERSC's "global homes" file system. The global homes file system is mounted across all NERSC computation systems with the exception of PDSF. The $HOME directory has quota of 40GB and 1,000,000 inodes. To customize your environment, by setting environment variables or aliases, you will need to modify one of the "dot" files that NERSC has created for you. You

  19. V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    A vulnerability has been reported in Citrix Access Gateway, which can be exploited by malicious people to bypass certain security restrictions.

  20. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Related Articles U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module ...

  1. Heat exchanger bypass system for an absorption refrigeration system

    DOE Patents [OSTI]

    Reimann, Robert C.

    1984-01-01

    A heat exchanger bypass system for an absorption refrigeration system is disclosed. The bypass system operates to pass strong solution from the generator around the heat exchanger to the absorber of the absorption refrigeration system when strong solution builds up in the generator above a selected level indicative of solidification of strong solution in the heat exchanger or other such blockage. The bypass system includes a bypass line with a gooseneck located in the generator for controlling flow of strong solution into the bypass line and for preventing refrigerant vapor in the generator from entering the bypass line during normal operation of the refrigeration system. Also, the bypass line includes a trap section filled with liquid for providing a barrier to maintain the normal pressure difference between the generator and the absorber even when the gooseneck of the bypass line is exposed to refrigerant vapor in the generator. Strong solution, which may accumulate in the trap section of the bypass line, is diluted, to prevent solidification, by supplying weak solution to the trap section from a purge system for the absorption refrigeration system.

  2. Authentication of data for monitoring a comprehensive test ban treaty

    SciTech Connect (OSTI)

    Craft, R.L.; Draelos, T.J.

    1996-05-01

    The important issue of data integrity in the CTBT International Monitoring System (IMS) is discussed and a brief tutorial on data authentication techniques is offered. The utilization of data authentication as a solution to the data integrity problem is evaluated. Public key data authentication is recommended for multilateral monitoring regimes such as the CTBT. The ramifications and system considerations of applying data authentication at various locations in the IMS, or not at all, are reviewed in a data surety context. The paper concludes with a recommendation of authenticating data at all critical monitoring stations.

  3. Bypass diode for a solar cell

    DOE Patents [OSTI]

    Rim, Seung Bum; Kim, Taeseok; Smith, David D; Cousins, Peter J

    2013-11-12

    Methods of fabricating bypass diodes for solar cells are described. In once embodiment, a method includes forming a first conductive region of a first conductivity type above a substrate of a solar cell. A second conductive region of a second conductivity type is formed on the first conductive region. In another embodiment, a method includes forming a first conductive region of a first conductivity type above a substrate of a solar cell. A second conductive region of a second conductivity type is formed within, and surrounded by, an uppermost portion of the first conductive region but is not formed in a lowermost portion of the first conductive region.

  4. 2013 ALS User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 ALS User Meeting banner Home Agenda Awards Exhibitors Lodging Posters Registration T-Shirt Contest Transportation Workshops Contact Us User Meeting Archives Users' Executive...

  5. 2013 ALS User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2013 ALS User Meeting Print banner Home Agenda Awards Exhibitors Lodging Posters Registration T-Shirt Contest Transportation Workshops Contact Us User Meeting Archives Users'...

  6. ALS User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ALS User Meeting Print web banner ALS User Meeting: October 5-7, 2015 Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops Contact Us User Meeting...

  7. User Financial Account Form

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    22013 User Financial Account Form Establish a user financial account at SLAC to procure gases, chemicals, supplies or services to support your experiment at SLAC's user ...

  8. User Financial Account Form

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    102115 User Financial Account Form Establish a user financial account at SLAC to procure gases, chemicals, supplies or services to support your experiment at SLAC's user ...

  9. A Framework for Federated Two-Factor Authentication Enabling Cost-Effective Secure Access to Distributed Cyberinfrastructure

    SciTech Connect (OSTI)

    Ezell, Matthew A; Rogers, Gary L; Peterson, Gregory D.

    2012-01-01

    As cyber attacks become increasingly sophisticated, the security measures used to mitigate the risks must also increase in sophistication. One time password (OTP) systems provide strong authentication because security credentials are not reusable, thus thwarting credential replay attacks. The credential changes regularly, making brute-force attacks significantly more difficult. In high performance computing, end users may require access to resources housed at several different service provider locations. The ability to share a strong token between multiple computing resources reduces cost and complexity. The National Science Foundation (NSF) Extreme Science and Engineering Discovery Environment (XSEDE) provides access to digital resources, including supercomputers, data resources, and software tools. XSEDE will offer centralized strong authentication for services amongst service providers that leverage their own user databases and security profiles. This work implements a scalable framework built on standards to provide federated secure access to distributed cyberinfrastructure.

  10. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - ...

  11. PST user`s guide

    SciTech Connect (OSTI)

    Rempe, J.L.; Cebull, M.J.; Gilbert, B.G.

    1996-10-01

    The Parametric Source Term (PST) software allows estimation of radioactivity release fractions for Level 2 Probabilistic Safety Assessments (PSAs). PST was developed at the Idaho National Engineering Laboratory (INEL) for the Nuclear Regulatory Commission`s (NRC`s) Accident Sequence Precursor (ASP) Program. PST contains a framework of equations that model activity transport between volumes in the release pathway from the core, through the vessel, through the containment, and to the environment. PST quickly obtains exact solutions to differential equations for activity transport in each volume for each time interval. PST provides a superior method for source term estimation because it: ensures conservation of activity transported across various volumes in the release pathway; provides limited consideration of the time-dependent behavior of input parameter uncertainty distributions; allows input to be quantified using state-of-the-art severe accident analysis code results; increases modeling flexibility because linkage between volumes is specified by user input; and allows other types of Light Water Reactor (LWR) plant designs to be evaluated with minimal modifications. PST is a microcomputer-based system that allows the analyst more flexibility than a mainframe system. PST has been developed to run with both MS DOS and MS Windows 95/NT operating systems. PST has the capability to load ASP Source Term Vector (STV) information, import pre-specified default input for the 6 Pressurized Water Reactors (PWRs) initially analyzed in the NRC ASP program, allow input value modifications for release fraction sensitivity studies, export user-specified default input for the LWR being modeled, report results of radioactivity release calculations at each time interval, and generate formatted results that can interface with other risk assessment codes. This report describes the PST model and provides guidelines for using PST.

  12. System and method for authentication of goods

    DOE Patents [OSTI]

    Kaish, Norman; Fraser, Jay; Durst, David I.

    1999-01-01

    An authentication system comprising a medium having a plurality of elements, the elements being distinctive, detectable and disposed in an irregular pattern or having an intrinsic irregularity. Each element is characterized by a determinable attribute distinct from a two-dimensional coordinate representation of simple optical absorption or simple optical reflection intensity. An attribute and position of the plurality of elements, with respect to a positional reference is detected. A processor generates an encrypted message including at least a portion of the attribute and position of the plurality of elements. The encrypted message is recorded in physical association with the medium. The elements are preferably dichroic fibers, and the attribute is preferably a polarization or dichroic axis, which may vary over the length of a fiber. An authentication of the medium based on the encrypted message may be authenticated with a statistical tolerance, based on a vector mapping of the elements of the medium, without requiring a complete image of the medium and elements to be recorded.

  13. User Meeting Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Meeting Awards Print web banner ALS User Meeting Awards See the 2013 User Meeting Awards Winners Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Meeting Archives Users' Executive Committee The ALS Users' Executive Committee invites ALS users and staff to submit nominations in recognition of the people who have made significant contributions to the scientific

  14. JLab Users Group

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    JLab Users Group Please upgrade your browser. This site's design is only visible in a graphical browser that supports web standards, but its content is accessible to any browser. Concerns? JLab Users Group User Liaison Home Users Group Program Advisory Committee User/Researcher Information print version UG Resources Background & Purpose Users Group Wiki By Laws Board of Directors Board of Directors Minutes Directory of Members Events At-A-Glance Member Institutions News Users Group Mailing

  15. LANSCE | Users | LUG | Topical User Workshop

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 LANSCE Topical User Meeting | January 9-10 2012 LANSCE Topical User Workshop LANSCE will host the 2012 Topical User Workshop, January 9-10, 2012. We hope to see you there! Registration | Accommodations | Agenda (some presentations are included on the agenda) LANL foreign nationals may register at anytime. | Poster Dimensions: 32 in x 40 in This workshop will solicit user input for the scientific opportunities offered by the pulse stacker and superconducting accelerator that LANSCE has proposed

  16. Authenticating concealed private data while maintaining concealment

    DOE Patents [OSTI]

    Thomas, Edward V.; Draelos, Timothy J.

    2007-06-26

    A method of and system for authenticating concealed and statistically varying multi-dimensional data comprising: acquiring an initial measurement of an item, wherein the initial measurement is subject to measurement error; applying a transformation to the initial measurement to generate reference template data; acquiring a subsequent measurement of an item, wherein the subsequent measurement is subject to measurement error; applying the transformation to the subsequent measurement; and calculating a Euclidean distance metric between the transformed measurements; wherein the calculated Euclidean distance metric is identical to a Euclidean distance metric between the measurement prior to transformation.

  17. EA-1262: McKay Bypass Canal Extension, Golden, Colorado

    Broader source: Energy.gov [DOE]

    This EA evaluates the environmental impacts for the proposal to extend the McKay Bypass Canal in order to route water from the existing Canal north of the Walnut Creek drainage on the east side of...

  18. Oil Bypass Filter Technology Performance Evaluation - First Quarterly Report

    SciTech Connect (OSTI)

    Zirker, L.R.; Francfort, J.E.

    2003-01-31

    This report details the initial activities to evaluate the performance of the oil bypass filter technology being tested by the Idaho National Engineering and Environmental Laboratory (INEEL) for the U.S. Department of Energy's FreedomCAR & Vehicle Technologies Program. Eight full-size, four-cycle diesel-engine buses used to transport INEEL employees on various routes have been equipped with oil bypass systems from the puraDYN Corporation. Each bus averages about 60,000 miles a year. The evaluation includes an oil analysis regime to monitor the presence of necessary additives in the oil and to detect undesirable contaminants. Very preliminary economic analysis suggests that the oil bypass system can reduce life-cycle costs. As the evaluation continues and oil avoidance costs are quantified, it is estimated that the bypass system economics may prove increasingly favorable, given the anticipated savings in operational costs and in reduced use of oil and waste oil avoidance.

  19. Multi-factor Authentication Update | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Multi-factor Authentication Update There is a delay in the purchase of the multi-factor authentication software solution that will cause a lag in the planned implementation. The Laboratory is currently in negotiations to complete the purchase. Once complete, the implementation can begin.

  20. T-659: Update support for RSA Authentication Manager

    Broader source: Energy.gov [DOE]

    RSA posted SP4 Patch 4 of their Authentication Manager product 06/30/2011. There are a few pages of fixes in the README, but the most significant is that Authentication Manager can now be installed on Windows Server 2008 (both 32 and 64bit).

  1. V-237: TYPO3 Security Bypass Vulnerabilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    7: TYPO3 Security Bypass Vulnerabilities V-237: TYPO3 Security Bypass Vulnerabilities September 9, 2013 - 6:00am Addthis PROBLEM: Some vulnerabilities have been reported in TYPO3 PLATFORM: TYPO3 6.x ABSTRACT: TYPO3 comes with the possibility to restrict editors to certain file actions (copy, delete, move etc.) and to restrict these actions to be performed in certain locations REFERENCE LINKS: Secunia Advisory SA54717 Security Focus ID 62257 IMPACT ASSESSMENT: Medium DISCUSSION: 1) Some errors

  2. Thermal Bypass Air Barriers in the 2009 International Energy Conservation

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Code - Building America Top Innovation | Department of Energy Thermal Bypass Air Barriers in the 2009 International Energy Conservation Code - Building America Top Innovation Thermal Bypass Air Barriers in the 2009 International Energy Conservation Code - Building America Top Innovation Image of a San Antonio home. Since air leakage is so critical to home performance, Building America research consistently focused on promoting better air sealing and air barrier details, including field

  3. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Executive Committee Print The ALS Users' Executive Committee (UEC) is responsible for conveying the concerns and interests of users to ALS management. Members are elected annually by ALS users. To contact a member of the UEC, please email This e-mail address is being protected from spambots. You need JavaScript enabled to view it . ALS Users' Executive Committee Web Site ALS Users' Association Charter The current members of the committee (with terms), as of January 1, 2016, are David

  4. Users' Executive Committee

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Executive Committee Print The ALS Users' Executive Committee (UEC) is responsible for conveying the concerns and interests of users to ALS management. Members are elected annually by ALS users. To contact a member of the UEC, please email This e-mail address is being protected from spambots. You need JavaScript enabled to view it . ALS Users' Executive Committee Web Site ALS Users' Association Charter The current members of the committee (with terms), as of January 1, 2016, are David

  5. JLF User Group

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    jlf user group JLF User Group 2015 NIF and JLF User Group Meeting Links: Send request to join the JLF User Group Join the NIF User Group Dr. Carolyn Kuranz - JLF User Group Dr. Carolyn Kuranz received her Ph.D. in Applied Physics from the University of Michigan in 2009. She is currently an Assistant Research Scientist at the Center for Laser Experimental Astrophysical Research and the Center for Radiative Shock Hydrodynamics at the University of Michigan. Her research involves hydrodynamic

  6. Bypass flow computations on the LOFA transient in a VHTR

    SciTech Connect (OSTI)

    Tung, Yu-Hsin; Johnson, Richard W.; Ferng, Yuh-Ming; Chieng, Ching-Chang

    2014-01-01

    Bypass flow in the prismatic gas-cooled very high temperature reactor (VHTR) is not intentionally designed to occur, but is present in the gaps between graphite blocks. Previous studies of the bypass flow in the core indicated that the cooling provided by flow in the bypass gaps had a significant effect on temperature and flow distributions for normal operating conditions. However, the flow and heat transports in the core are changed significantly after a Loss of Flow Accident (LOFA). This study aims to study the effect and role of the bypass flow after a LOFA in terms of the temperature and flow distributions and for the heat transport out of the core by natural convection of the coolant for a 1/12 symmetric section of the active core which is composed of images and mirror images of two sub-region models. The two sub-region models, 9 x 1/12 and 15 x 1/12 symmetric sectors of the active core, are employed as the CFD flow models using computational grid systems of 70.2 million and 117 million nodes, respectively. It is concluded that the effect of bypass flow is significant for the initial conditions and the beginning of LOFA, but the bypass flow has little effect after a long period of time in the transient computation of natural circulation.

  7. Public-key data authentication for treaty verification

    SciTech Connect (OSTI)

    Draelos, T.J.; Goldsmith, S.Y.

    1992-08-01

    A public-key Treaty Data Authentication Module (TDAM) based on the National Institute of Standards and Technology (NIST) Digital Signature Standard (DSS) has been developed to support treaty verification systems. The TDAM utilizes the Motorola DSP56001 Digital Signal Processor as a coprocessor and supports both the STD Bus and PC-AT Bus platforms. The TDAM is embedded within an Authenticated Data Communication Subsystem (ADCS) which provides transparent data authentication and communications, thereby concealing the details of securely authenticating and communicating compliance data and commands. The TDAM has been designed according to the NIST security guidelines for cryptographic modules. Public-key data authentication is important for support of both bilateral and multi-lateral treaties. 8 refs.

  8. Public-key data authentication for treaty verification

    SciTech Connect (OSTI)

    Draelos, T.J.; Goldsmith, S.Y.

    1992-01-01

    A public-key Treaty Data Authentication Module (TDAM) based on the National Institute of Standards and Technology (NIST) Digital Signature Standard (DSS) has been developed to support treaty verification systems. The TDAM utilizes the Motorola DSP56001 Digital Signal Processor as a coprocessor and supports both the STD Bus and PC-AT Bus platforms. The TDAM is embedded within an Authenticated Data Communication Subsystem (ADCS) which provides transparent data authentication and communications, thereby concealing the details of securely authenticating and communicating compliance data and commands. The TDAM has been designed according to the NIST security guidelines for cryptographic modules. Public-key data authentication is important for support of both bilateral and multi-lateral treaties. 8 refs.

  9. Establish a User Agreement

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    is the document that permits the User andor the home organization to retain ownership of intellectual property. Without the user agreement in place, the University of California...

  10. User Accounts and Emails

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Accounts and Emails Print User Accounts Once a User Agreement is signed, users may set up an account for miscellaneous supplies and expenses at the ALS. To establish a user account, please contact This e-mail address is being protected from spambots. You need JavaScript enabled to view it , Budget and Planning, (x 6889). Users can keep track of expenses charged to their Berkeley Lab accounts through the Lab's Integrated Reporting and Information System (IRIS) . User Emails Users may sign up

  11. User Accounts and Emails

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Accounts and Emails Print User Accounts Once a User Agreement is signed, users may set up an account for miscellaneous supplies and expenses at the ALS. To establish a user account, please contact This e-mail address is being protected from spambots. You need JavaScript enabled to view it , Budget and Planning, (x 6889). Users can keep track of expenses charged to their Berkeley Lab accounts through the Lab's Integrated Reporting and Information System (IRIS) . User Emails Users may sign up

  12. Managing Your User Account

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Managing Your Account Managing Your User Account Use the NERSC Information Management (NIM) system to customize your user account and keep your personal information up-to-date. See the NIM User's Guide, especially the "Managing Your User Account with NIM" section. Last edited: 2016-04-29 11:35:06

  13. Franklin: User Experiences

    SciTech Connect (OSTI)

    National Energy Research Supercomputing Center; He, Yun; Kramer, William T.C.; Carter, Jonathan; Cardo, Nicholas

    2008-05-07

    The newest workhorse of the National Energy Research Scientific Computing Center is a Cray XT4 with 9,736 dual core nodes. This paper summarizes Franklin user experiences from friendly early user period to production period. Selected successful user stories along with top issues affecting user experiences are presented.

  14. ALS User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ALS User Meeting October 3-5, 2011 Lawrence Berkeley National Laboratory, California

  15. Centralized Authentication with Kerberos 5, Part I

    SciTech Connect (OSTI)

    Wachsmann, A

    2004-06-09

    Account administration in a distributed Unix/Linux environment can become very complicated and messy if done by hand. Large sites use special tools to deal with this problem. I will describe how even very small installations like your three computer network at home can take advantage of the very same tools. The problem in a distributed environment is that password and shadow files need to be changed individually on each machine if an account change occurs. Account changes include: password change, addition/removal of accounts, name change of an account (UID/GID changes are a big problem in any case), additional or removed login privileges to a (group of) computer(s), etc. In this article, I will show how Kerberos 5 solves the authentication problem in a distributed computing environment. A second article will describe a solution for the authorization problem.

  16. NIF User Group

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    group NIF User Group The National Ignition Facility User Group provides an organized framework and independent vehicle for interaction between the scientists who use NIF for "Science Use of NIF" experiments and NIF management. Responsibility for NIF and the research programs carried out at NIF resides with the NIF Director. The NIF User Group advises the NIF Director on matters of concern to users, as well as providing a channel for communication for NIF users with funding agencies and

  17. National User Facilities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National User Facilities Our Vision National User Facilities Research Areas In Focus Global Solutions ⇒ Navigate Section Our Vision National User Facilities Research Areas In Focus Global Solutions Berkeley Lab's User Facilities-Engines of Discovery Berkeley Lab's User Facilities provide state-of-the-art resources for scientists across the nation and around the world. About 10,000 researchers a year use these facilities, representing nearly one third of the total for all Department of Energy

  18. Establish a User Agreement

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Establish a User Agreement Establish a User Agreement Print Wednesday, 26 August 2009 16:00 User Agreements are Required Before a user group can begin their research at the ALS, a User Agreement between Berkeley Lab and the user's sponsoring organization must be signed. Many organizations already have a signed agreement, however if your organization has not established an agreement, please send an email to This e-mail address is being protected from spambots. You need JavaScript enabled to view

  19. Establish a User Agreement

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Establish a User Agreement Print User Agreements are Required Before a user group can begin their research at the ALS, a User Agreement between Berkeley Lab and the user's sponsoring organization must be signed. Many organizations already have a signed agreement, however if your organization has not established an agreement, please send an email to This e-mail address is being protected from spambots. You need JavaScript enabled to view it to set one up. The User Agreement is valid for up to

  20. Rankine cycle load limiting through use of a recuperator bypass

    DOE Patents [OSTI]

    Ernst, Timothy C.

    2011-08-16

    A system for converting heat from an engine into work includes a boiler coupled to a heat source for transferring heat to a working fluid, a turbine that transforms the heat into work, a condenser that transforms the working fluid into liquid, a recuperator with one flow path that routes working fluid from the turbine to the condenser, and another flow path that routes liquid working fluid from the condenser to the boiler, the recuperator being configured to transfer heat to the liquid working fluid, and a bypass valve in parallel with the second flow path. The bypass valve is movable between a closed position, permitting flow through the second flow path and an opened position, under high engine load conditions, bypassing the second flow path.

  1. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  2. INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS...

    Broader source: Energy.gov (indexed) [DOE]

    172013 Page 1 INSTRUCTIONS FOR USING HSPD-12 AUTHENTICATED OUTLOOK WEB ACCESS (OWA) Outlook Web Access provides access to unencrypted email only and is suitable for use from any ...

  3. OSG New User Form

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Policies User Surveys NERSC Users Group Help Staff Blogs Request Repository Mailing List Need Help? Out-of-hours Status and Password help Call operations: 1-800-66-NERSC, option 1 ...

  4. ALS Users' Association Charter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    facility. Thorough discussion with users of current projects, as well as plans for the future, will place ALS management in a better position to evaluate the needs of users and...

  5. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    in certain cases. reference LINKS: Vendor Advisory Security Tracker ID 1026744 CVE-2012-0866 IMPACT ASSESSMENT: Medium Discussion: For trigger functions marked SECURITY...

  6. T-608: HP Virtual Server Environment Lets Remote Authenticated Users Gain Elevated Privileges

    Broader source: Energy.gov [DOE]

    A potential security vulnerability has been identified in HP Virtual Server Environment for Windows. The vulnerability could be exploited remotely to elevate privileges.

  7. User Financial Account Form

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2/20/13 User Financial Account Form Establish a user financial account at SLAC to procure gases, chemicals, supplies or services to support your experiment at SLAC's user facilities and to send samples, dewars, or other equipment between SLAC and your institution. To open or renew your SLAC user financial account, complete and submit this form along with a Purchase Order (PO) from your institution. The PO should be made to SLAC National Accelerator Laboratory for the amount of estimated

  8. LANSCE | Users | LUG | Charter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Charter I. NAME The name of this organization shall be the Los Alamos Neutron Science Center (LANSCE) User Group. II. PURPOSE The purpose of the LANSCE User Group (LUG) is to: * Provide a formal channel for the exchange of information between LANSCE management and the researchers who use the facilities. * Supply a vehicle for users of LANSCE to transmit concerns and recommendations to the LANSCE management about operating policy, facilities, and other matters affecting the user community. *

  9. 2011 User Meeting Agenda

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    1 User Meeting Agenda Home Agenda Awards Exhibitors Lodging Posters Registration Photo Contest Transportation Workshops This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Meeting Archives Users' Executive Committee The 2011 ALS User Meeting begins registation begins at 07:30 on Monday, October 3, outside the Building 50 Auditorium. The meeting itself will start at 08:25 inside the Building 50 Auditorium; all plenary sessions will also be held at

  10. CYBERSECURITY AND USER ACCOUNTABILITY IN THE C-AD CONTROL SYSTEM

    SciTech Connect (OSTI)

    MORRIS,J.T.; BINELLO, S.; D OTTAVIO, T.; KATZ, R.A.

    2007-10-15

    A heightened awareness of cybersecurity has led to a review of the procedures that ensure user accountability for actions performed on the computers of the Collider-Accelerator Department (C-AD) Control System. Control system consoles are shared by multiple users in control rooms throughout the C-AD complex. A significant challenge has been the establishment of procedures that securely control and monitor access to these shared consoles without impeding accelerator operations. This paper provides an overview of C-AD cybersecurity strategies with an emphasis on recent enhancements in user authentication and tracking methods.

  11. User Program | Prospective Users Non-US

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Click on the "User Satisfaction Survey" link on the "main menu" page. If you don't have an account you will need to create one. Your login ID (username and email) is the same as ...

  12. Cycling firing method for bypass operation of bridge converters

    DOE Patents [OSTI]

    Zabar, Zivan

    1982-01-01

    The bridge converter comprises a number of switching elements and an electronic logic system which regulated the electric power levels by controlling the firing, i.e., the initiation of the conduction period of the switching elements. Cyclic firing of said elements allows the direct current to bypass the alternating current system with high power factor and negligible losses.

  13. Thermal Reliability Study of Bypass Diodes in Photovoltaic Modules (Poster)

    SciTech Connect (OSTI)

    Zhang, Z.; Wohlgemuth, J.; Kurtz, S.

    2013-05-01

    This paper presents the result of high-temperature durability and thermal cycling testing and analysis for the selected diodes to study the detail of the thermal design and relative long-term reliability of the bypass diodes used to limit the detrimental effects of module hot-spot susceptibility.

  14. Monthly PDSF User Meeting Minutes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Software Policies User Surveys NERSC Users Group User Announcements Help Staff Blogs Request Repository Mailing List Operations for: Passwords & Off-Hours Status...

  15. 2012 ALS User Meeting Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2012 ALS User Meeting Awards Print Recipients of the 2012 Users' Executive Committee awards and Student Poster Competition were announced Tuesday, October 9, at the ALS User...

  16. 2012 ALS User Meeting Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 ALS User Meeting Awards Recipients of the 2012 Users' Executive Committee awards and Student Poster Competition were announced Tuesday, October 9, at the ALS User Meeting. David...

  17. E-Labs - Learning with Authentic Data

    SciTech Connect (OSTI)

    Bardeen, Marjorie G.; Wayne, Mitchell

    2016-01-01

    the success teachers have had providing an opportunity for students to: • Organize and conduct authentic research. • Experience the environment of scientific collaborations. • Possibly make real contributions to a burgeoning scientific field. We've created projects that are problem-based, student driven and technology dependent. Students reach beyond classroom walls to explore data with other students and experts and share results, publishing original work to a worldwide audience. Students can discover and extend the research of other students, modeling the processes of modern, large-scale research projects. From start to finish e-Labs are student-led, teacher-guided projects. Students need only a Web browser to access computing techniques employed by professional researchers. A Project Map with milestones allows students to set the research plan rather than follow a step-by-step process common in other online projects. Most importantly, e-Labs build the learning experience around the students' own questions and let them use the very tools that scientists use. Students contribute to and access shared data, most derived from professional research databases. They use common analysis tools, store their work and use metadata to discover, replicate and confirm the research of others. This is where real scientific collaboration begins. Using online tools, students correspond with other research groups, post comments and questions, prepare summary reports, and in general participate in the part of scientific research that is often left out of classroom experiments. Teaching tools such as student and teacher logbooks, pre- and post-tests and an assessment rubric aligned with learner outcomes help teachers guide student work. Constraints on interface designs and administrative tools such as registration databases give teachers the "one-stop-shopping" they seek for multiple e-Labs. Teaching and administrative tools also allow us to track usage and assess the impact on

  18. PIA - Advanced Test Reactor National Scientific User Facility Users Week

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2009 | Department of Energy Advanced Test Reactor National Scientific User Facility Users Week 2009 PIA - Advanced Test Reactor National Scientific User Facility Users Week 2009 PIA - Advanced Test Reactor National Scientific User Facility Users Week 2009 PIA - Advanced Test Reactor National Scientific User Facility Users Week 2009 (316.78 KB) More Documents & Publications PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL Education Programs Business Enclav

  19. LANSCE | User Resources | User Satisfaction Survey

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Satisfaction Survey We hope that your research at the Los Alamos Neutron Science Center was productive and successful. Your feedback is important to the Department of Energy and us. Please take a few minutes to respond to the questions on the following page. Your assessment of your experience at LANSCE is used by DOE to evaluate and fund the facility, by the User Group Executive Committee to determine issues and to make recommendations to address them, and by the management and staff of

  20. General User Proposals (GUPs)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    General User Proposals (GUPs) General User Proposals (GUPs) Print Tuesday, 01 June 2010 09:36 General Users are granted beam time through a peer review proposal process. They may use beamlines and endstations provided by the ALS or the Participating Research Team (PRT) that operates the beamline. Before Submitting a Proposal Review the ALS Beamlines Directory to learn about the research capabilities of individual beamlines at the ALS. Contact the beamline scientist or the local contact listed in

  1. Shifter: User Defined Images

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Shifter: User Defined Images Shifter: User Defined Images Shifter: Bringing Linux containers to HPC NERSC is working to increase flexibility and usability of its HPC systems by enabling Docker-like Linux container technology. Linux containers allow an application to be packaged with its entire software stack - including some portions of the base OS files - as well defining needed user environment variables and application "entry point.". Containers may provide an abstract way of

  2. 2015 CAMD Users Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CAMD 2015 Symposium followed by the CAMD Users' Meeting SAXS Workshop Thursday, April 23th, 2015 CAMD, 6980 Jefferson Highway, Baton Rouge, LA 70806 CAMD 2015 Symposium followed by the CAMD Users' Meeting Friday, April 24th, 2015 LTRC Transportation Training and Education Center (Map) The CAMD 2015 Symposium followed by the CAMD Users' Meeting will be held on Friday, April 24th at the LTRC Transportation Training and Education Center, 4099 Gourrier Avenue, Baton Rouge, LA 70808, directly behind

  3. ALS Users' Association Charter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Executive Committee ALS Users' Association Charter Print The purpose of the Advanced Light Source Users' Association (ALSUA) is to provide an organized framework for the interaction between those who use the Advanced Light Source (ALS) at the Lawrence Berkeley Laboratory (LBL) for their research and the ALS management, as well as to provide a channel for communication with other synchrotron radiation laboratories and, on suitable occasions, with federal agencies. The ALSUA, representing

  4. LANSCE | User Resources

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    From the initial proposal process to the completion of the experiment, LANSCE provides its users with resources critical to their experiements and their experience. Lujan Resources pRad Resources WNR Resources Submit a proposal for beam time Visit Registration Schedules Experiment Reports User Satisfaction Survey Reviews Submit a proposal for beam time Visit Registration Schedules Experiment Reports User Satisfaction Survey Reviews Submit a proposal for beam time Visit Registration Schedules

  5. Users from Industry

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users from Industry Users from Industry Print The Advanced Light Source (ALS) welcomes industrial users from large and small companies whose projects advance scientific knowledge, investigate the development of new products and manufacturing methods, and/or provide economic benefits and jobs to the economy. The nature of industrial research can be different from traditional university and government sponsored projects, so the ALS has created unique opportunities for new and existing industrial

  6. 2013 User Meeting Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 User Meeting Awards Recipients of the 2013 Users' Executive Committee awards and the Student Poster Competition awards, were presented Tuesday, October 8, at the ALS User Meeting. David A. Shirley Award for Outstanding Scientific Achievement at the ALS 2013-shirley The David A. Shirley Award for Scientific Achievement went to Harald Ade, North Carolina State University, "For achievements in polymer science and in particular the elucidation of the chemical nano-morphology of complex

  7. ALS User Meeting Archives

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ALS User Meeting Archives Print Past User Meeting Programs, Workshops, and Awards Year David A. Shirley (Science) Klaus Halbach (Instrumentation) Tim Renner (Service) 2015 Program Workshops Wanli Yang, "For new concepts optimizing battery materials with the aid of soft x-ray microscopy." Hans Bechtel, Michael Martin, and Markus Raschke, "For the development of Synchrotron Infrared Nano Spectroscopy (SINS)." David Malone. "As the first person all 2400 ALS users contact

  8. 2011 User Meeting Agenda

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agenda Home Agenda Awards Exhibitors Lodging Posters Registration Photo Contest Transportation Workshops This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Meeting Archives Users' Executive Committee The 2011 ALS User Meeting begins registation begins at 07:30 on Monday, October 3, outside the Building 50 Auditorium. The meeting itself will start at 08:25 inside the Building 50 Auditorium; all plenary sessions will also be held at this location.

  9. 2011 User Meeting Workshops

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2011 User Meeting Workshops Home Agenda Awards Exhibitors Lodging Posters Registration Photo Contest Transportation Workshops This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Meeting Archives Users' Executive Committee Workshops will follow the end of the plenary sessions on Tuesday and continue through Wednesday.When registering , you will be asked to select the workshop that you plan to attend; this helps organizers plan room assignments and

  10. 2012 User Meeting Workshops

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Workshops 2012 ALS User Meeting Workshops Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Meeting Archives Users' Executive Committee Advanced Characterization of Critical Magnetic Materials Catherine Jenkins, Peter Fischer, Elke Arenholz, and David Shuh (LBNL) 67-3111 (Wed.) Automating Tomographic Data Analysis: Transfer, Storage, Processing, and Simulation Dula

  11. User Liaison Office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Liaison Please upgrade your browser. This site's design is only visible in a graphical browser that supports web standards, but its content is accessible to any browser. ...

  12. CNMS User Newsletter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of Standards and Technology (NIST) and he is working towards developing novel scanning force probes using cavity optomechanics. Research Highlights CNMS User Newsletter Page 7...

  13. User account | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Log in(active tab) Logon Help User login Username * JLAB/CUE Username Password * JLAB/CUE Password Log in

  14. About the User Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    . All proposals are reviewed for scientific merit by the Program Advisory Committee (PAC). In the case of proprietary proposals, such as the case for Industry, users pay for...

  15. 2012 User Meeting Workshops

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Workshops Print 2012 ALS User Meeting Workshops Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops This e-mail address is being protected from...

  16. 2012 User Meeting Agenda

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 User Meeting Agenda Print Agenda Home Agenda Awards Exhibitors Lodging Posters Registration Transportation Workshops This e-mail address is being protected from spambots. You...

  17. 2001 User Survey Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Questions and Changes from Previous Years NERSC Information Management (NIM) System Web and Communications Hardware Resources Software Training User Services Comments about...

  18. Users from Industry

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    industrial users from large and small companies whose projects advance scientific knowledge, investigate the development of new products and manufacturing methods, andor...

  19. 2014 NERSC User Survey

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Survey 2014 NERSC User Survey December 17, 2014 by Francesca Verdier Please take a few minutes to fill out NERSC's annual user survey. Your feedback is important because it allows us to judge the quality of our services, give DOE information on how we are doing, and point us to areas in which we can improve. The survey is on the web at the URL: https://www.nersc.gov/news-publications/publications-reports/user-surveys/2014/ and covers the allocation year 2014. Subscribe via RSS Subscribe

  20. 2004 User Survey Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    13 | Next 2004 User Survey Results Table of Contents Response Summary Respondent Demographics Overall Satisfaction and Importance All Satisfaction, Importance and Usefulness...

  1. 2005 User Survey Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    10 | Next 2005 User Survey Results Table of Contents Response Summary Respondent Demographics All Satisfaction, Importance and Usefulness Ratings Hardware Resources Software...

  2. 2003 User Survey Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    10 | Next 2003 User Survey Results Table of Contents Response Summary Respondent Demographics Overall Satisfaction and Importance All Satisfaction Topics and Changes from...

  3. LANSCE | Training Office | User Training

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    phone: 505.665.1010 mesa header Beam Status Accelerator Ops (Internal) Operating Schedule Long Range Operating Schedule User Resources User Agreements Proposals Visit Registration Schedules Experiment Reports User Satisfaction Survey Reviews Users User Office User Program LANSCE User Group Rosen Scholar Rosen Prize News & Multimedia News Multimedia Events Profiles Highlights Seminars Activity Reports The Pulse User Program Headlines About LANSCE History Leadership LINAC Outreach Affiliations

  4. X.509 Authentication/Authorization in FermiCloud

    SciTech Connect (OSTI)

    Kim, Hyunwoo; Timm, Steven

    2014-11-11

    We present a summary of how X.509 authentication and authorization are used with OpenNebula in FermiCloud. We also describe a history of why the X.509 authentication was needed in FermiCloud, and review X.509 authorization options, both internal and external to OpenNebula. We show how these options can be and have been used to successfully run scientific workflows on federated clouds, which include OpenNebula on FermiCloud and Amazon Web Services as well as other community clouds. We also outline federation options being used by other commercial and open-source clouds and cloud research projects.

  5. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Scripting and URL Redirection Attacks | Department of Energy 12: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks July 13, 2012 - 7:00am Addthis PROBLEM: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame Scripting and URL Redirection Attacks PLATFORM: RSA Authentication Manager 7.1 is vulnerable; other

  6. KDYNA user's manual

    SciTech Connect (OSTI)

    Levatin, J.A.L.; Attia, A.V.; Hallquist, J.O.

    1990-09-28

    This report is a complete user's manual for KDYNA, the Earth Sciences version of DYNA2D. Because most features of DYNA2D have been retained in KDYNA much of this manual is identical to the DYNA2D user's manual.

  7. HSI Best Practices for NERSC Users Nicholas Balthaser and Damian...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Authentication with a valid NERSC LDAP username and password is required. Note that HSI is ... This enables authentication without interactively typing a username and password, which is ...

  8. The PANTHER User Experience

    SciTech Connect (OSTI)

    Coram, Jamie L.; Morrow, James D.; Perkins, David Nikolaus

    2015-09-01

    This document describes the PANTHER R&D Application, a proof-of-concept user interface application developed under the PANTHER Grand Challenge LDRD. The purpose of the application is to explore interaction models for graph analytics, drive algorithmic improvements from an end-user point of view, and support demonstration of PANTHER technologies to potential customers. The R&D Application implements a graph-centric interaction model that exposes analysts to the algorithms contained within the GeoGraphy graph analytics library. Users define geospatial-temporal semantic graph queries by constructing search templates based on nodes, edges, and the constraints among them. Users then analyze the results of the queries using both geo-spatial and temporal visualizations. Development of this application has made user experience an explicit driver for project and algorithmic level decisions that will affect how analysts one day make use of PANTHER technologies.

  9. PURADYN Oil Bypass Filtration System Evaluation Test Plan

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Technologies & Infrastructure Department PURADYN OIL BYPASS FILTRATION SYSTEM EVALUATION TEST PLAN October 2002 Reviewed: INEEL Fleet Maintenance Supervisor (Thomas) Date Reviewed: INEEL Bus & Heavy Equipment Foreman (Murdock) Date Reviewed: INEEL Fleet Maintenance Department Manager (Bullock) Date Approved: INEEL Central/Idaho Falls Facilities Director (Winn) Date Reviewed: INEEL Test Engineer (Zirker) Date Reviewed: INEEL Project Manager (Francfort) Date Approved: INEEL TT&I

  10. AIRMaster+ User Manual | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    User Manual AIRMaster+ User Manual This user manual is designed to help users understand the AIRMaster+ compressed air software. AIRMaster+ User Manual (2000) (2.39

  11. User`s guide to MIDAS

    SciTech Connect (OSTI)

    Tisue, S.A.; Williams, N.B.; Huber, C.C.; Chun, K.C.

    1995-12-01

    Welcome to the MIDAS User`s Guide. This document describes the goals of the Munitions Items Disposition Action System (MIDAS) program and documents the MIDAS software. The main text first describes the equipment and software you need to run MIDAS and tells how to install and start it. It lists the contents of the database and explains how it is organized. Finally, it tells how to perform various functions, such as locating, entering, viewing, deleting, changing, transferring, and printing both textual and graphical data. Images of the actual computer screens accompany these explanations and guidelines. Appendix A contains a glossary of names for the various abbreviations, codes, and chemicals; Appendix B is a list of modem names; Appendix C provides a database dictionary and rules for entering data; and Appendix D describes procedures for troubleshooting problems associated with connecting to the MIDAS server and using MIDAS.

  12. LANSCE | Users | LUG

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    LUG-EC 2016 LUG EC Meeting 2015 LUG EC Meeting 2014 LUG EC Summary and Charge 2014 LUG EC Meeting 2013 LUG EC Meeting LUG Charter LUG Election LUG 2015 Meeting LUG 2012 Meeting Rosen Scholar Rosen Prize Users dotline LANSCE User Group (LUG) 2016 LUG Executive Committee Election Election is now closed. Thank you for voting! Results will be announced soon. The Executive Committee of the LANSCE User Group (LUG-EC) is seeking new representatives to serve on the Executive Committee beginning CY 2016.

  13. User Liaison Office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Office Space User space is available in the ARC, reserve space here. arc-thumb.jpg Click to see Virtual Tour 12000 Jefferson Avenue, Newport News, VA 23606 Phone: (757) 269-7255...

  14. User account | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Error message Access denied. You must log in to view this page. Log in(active tab) Logon Help User login Username * JLAB/CUE Username Password * JLAB/CUE Password Log in

  15. CNMS User Newsletter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    at the 4th annual Na onal User Facility Science Expo for the U.S. House of Representa ves in the foyer of the Ray- burn House Office Building, Capitol Hill Washington D.C.....

  16. 2012 User Meeting Agenda

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the Amorphous-to-Crystalline Transitions in CaCO3 Biominerals, with 20-nm Resolution Pupa Gilbert, University of Wisconsin 13:55 User Services Update Sue Bailey, LBNL 14:10...

  17. User Accounts (Logins)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    A user is given a username (also known as a login name) and associated password that permits them to access NERSC resources. This usernamepassword pair may be used by a single ...

  18. CNMS User Newsletter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    systems. Access is provided at no cost to users for research that is in the public do- main and intended for publica on in the open literature. The submission deadline is...

  19. User' Software Manual

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MM-Group Home MMG Advisory Committees 4-ID-D Home Recent Publications Beamline Info Optics Instrumentation Software User Info FAQs 4-ID-D Beamline Software Manual Introduction...

  20. General User Proposals (GUPs)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    or until the number of shifts recommended by the Proposal Study Panels (PSP) for the life of the proposal have been used. Users may decide whether to submit a new proposal or...

  1. ARM User Survey Report

    SciTech Connect (OSTI)

    Roeder, LR

    2010-06-22

    The objective of this survey was to obtain user feedback to, among other things, determine how to organize the exponentially growing data within the Atmospheric Radiation Measurement (ARM) Climate Research Facility, and identify users’ preferred data analysis system. The survey findings appear to have met this objective, having received approximately 300 responses that give insight into the type of work users perform, usage of the data, percentage of data analysis users might perform on an ARM-hosted computing resource, downloading volume level where users begin having reservations, opinion about usage if given more powerful computing resources (including ability to manipulate data), types of tools that would be most beneficial to them, preferred programming language and data analysis system, level of importance for certain types of capabilities, and finally, level of interest in participating in a code-sharing community.

  2. User Data Forum Presentations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    M08: Databases and Data analytic frameworks at NERSC June 16, 2014 | Author(s): Yushu Yao, NERSC User Services Group | Download File: M08-20140616-NERSC-Data-Forum-DB-SciDB-Talk-v2...

  3. User Data Forum Presentations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Presentations User Data Forum Presentations Sort by: Default | Name | Date (low-high) | ... M02: The Future of Data and Scientific Workflow June 16, 2014 | Author(s): Michael Wilde, ...

  4. NIM Guide for Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    The NERSC Information Management (NIM) system is a web portal that contains user, login ... Logging In To log into the NIM system, point your web browser to the URL http:...

  5. NERSC Usage and User Demographics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Usage Demographics Users and Projects Through the Years Careers Visitor Info Web Policies Home » About » Usage and User Demographics NERSC Usage and User Demographics Usage Demographics Number of NERSC Users and Projects Through the Years Number of NERSC Users and Projects Through the Years Read More » Last edited: 2015-03-02 16:21:25

  6. Oil Bypass Filter and Diesel Engine Idling Wear-Rate Evaluations |

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Department of Energy Bypass Filter and Diesel Engine Idling Wear-Rate Evaluations Oil Bypass Filter and Diesel Engine Idling Wear-Rate Evaluations 2005 Diesel Engine Emissions Reduction (DEER) Conference Presentations and Posters 2005_deer_zirker.pdf (247.36 KB) More Documents & Publications Demonstrated Petroleum Reduction Using Oil Bypass Filter Technology on Heavy and Light Vehicles Development of Partial Filter Technology for HDD Retrofit Comparing Emissions Benefits from Regulating

  7. V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Security Issue | Department of Energy 4: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue V-234: EMC RSA Archer GRC Open Redirection Weakness and Security Bypass Security Issue September 4, 2013 - 6:00am Addthis PROBLEM: A weakness and a security issue have been reported in EMC RSA Archer GRC PLATFORM: EMC RSA Archer GRC 5.x ABSTRACT: This fixes multiple vulnerabilities, which can be exploited to bypass certain security restrictions and to conduct spoofing

  8. V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerabilities | Department of Energy 2: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities December 21, 2012 - 12:15am Addthis PROBLEM: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities PLATFORM: Drupal 6.x versions prior to 6.27 Drupal 7.x versions prior to 7.18 ABSTRACT: Drupal Core Multiple vulnerabilities REFERENCE LINKS: SA-CORE-2012-004 - Drupal core

  9. High Temperature Reverse By-Pass Diodes Bias and Failures | Department of

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Reverse By-Pass Diodes Bias and Failures High Temperature Reverse By-Pass Diodes Bias and Failures Presented at the PV Module Reliability Workshop, February 26 - 27 2013, Golden, Colorado pvmrw13_ps3_memc_posbic.pdf (498.72 KB) More Documents & Publications US & Japan TG 4 Activities of QA Forum Thermal Reliability Study of Bypass Diodes in Photovoltaic Modules US TG 4 Activities of QA Forum

  10. New Users Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Storing and Retrieving Data Advanced Usage Examples Charging Storage Statistics Troubleshooting I/O Resources for Scientific Applications at NERSC Optimizing I/O performance on the Lustre file system I/O Formats Science Databases Sharing Data Transferring Data Unix Groups at NERSC Unix File Permissions Application Performance Data & Analytics Job Logs & Statistics Training & Tutorials Software Policies User Surveys NERSC Users Group Help Staff Blogs Request Repository Mailing List

  11. General User Proposals (GUPs)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    General User Proposals (GUPs) Print General Users are granted beam time through a peer review proposal process. They may use beamlines and endstations provided by the ALS or the Participating Research Team (PRT) that operates the beamline. Before Submitting a Proposal Review the ALS Beamlines Directory to learn about the research capabilities of individual beamlines at the ALS. Contact the beamline scientist or the local contact listed in the tables, for additional information about the

  12. Programs & User Facilities

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Science Programs » Office of Science » Programs & User Facilities Programs & User Facilities Enabling remarkable discoveries, tools that transform our understanding of energy and matter and advance national, economic, and energy security Advanced Scientific Computing Research Applied Mathematics Co-Design Centers Exascale Co-design Center for Materials in Extreme Environments (ExMatEx) Center for Exascale Simulation of Advanced Reactors (CESAR) Center for Exascale Simulation of

  13. JLF User Program

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    program JLF User Program The Jupiter Laser Facility User Program is open to all qualified applicants; US and non-US PIs are welcome to submit proposals. A proposal is necessary for shot-time allocated on the Titan, Janus, and COMET laser platforms at JLF. Using technical evaluations from experts, proposals will be reviewed and ranked by the JLF Advisory Committee based on scientific and/or programmatic quality, impact, and feasibility. Typically, all platforms are overrequested by a factor of

  14. LANSCE | User Resources | Schedules

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Schedules You will be notified of your experiment schedule at least 3-6 weeks prior to your start date. Two (2) weeks post-review, beam-time will be scheduled by the Instrument Scientist in consultation with the user. Three (3) weeks post review, schedule letters are sent to the Principal Investigator. After scheduling experiments, the LANSCE User Office will contact you to determine and schedule applicable training, assist with travel arrangements, initiate and required foreign national access

  15. LANSCE | Users | Rosen Prize

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Rosen Prize Current Recipient Past Recipients Call for Nominations Users dotline The Louis Rosen Prize Adam T. Holley Adam T. Holley Named 24th Rosen Prize Recipient The LANSCE User Group Executive Committee is pleased to announce that Adam Holley has been awarded the 2013 Rosen Prize for his doctoral thesis on "Ultracold Neutron Polarimetry in a Measurement of the β Asymmetry". His work demonstrated excellence in a number of facets the selection committee considered, including

  16. VOLTTRON: User Guide

    SciTech Connect (OSTI)

    Lutes, Robert G.; Katipamula, Srinivas; Akyol, Bora A.; Tenney, Nathan D.; Haack, Jereme N.; Monson, Kyle E.; Carpenter, Brandon J.

    2014-04-24

    This document is a user guide for the deployment of the Transactional Network platform and agent/application development within the VOLTTRON. The intent of this user guide is to provide a description of the functionality of the Transactional Network Platform. This document describes how to deploy the platform, including installation, use, guidance, and limitations. It also describes how additional features can be added to enhance its current functionality.

  17. ALS User Meeting Archives

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Meeting Archives Past User Meeting Programs, Workshops, and Awards Year David A. Shirley (Science) Klaus Halbach (Instrumentation) Tim Renner (Service) 2015 Program Workshops Wanli Yang, "For new concepts optimizing battery materials with the aid of soft x-ray microscopy." Hans Bechtel, Michael Martin, and Markus Raschke, "For the development of Synchrotron Infrared Nano Spectroscopy (SINS)." David Malone. "As the first person all 2400 ALS users contact for their beam

  18. ALS Users' Association Charter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Association Charter Print The purpose of the Advanced Light Source Users' Association (ALSUA) is to provide an organized framework for the interaction between those who use the Advanced Light Source (ALS) at the Lawrence Berkeley Laboratory (LBL) for their research and the ALS management, as well as to provide a channel for communication with other synchrotron radiation laboratories and, on suitable occasions, with federal agencies. The ALSUA, representing the research workers, will be in

  19. ALS Users' Association Charter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Association Charter Print The purpose of the Advanced Light Source Users' Association (ALSUA) is to provide an organized framework for the interaction between those who use the Advanced Light Source (ALS) at the Lawrence Berkeley Laboratory (LBL) for their research and the ALS management, as well as to provide a channel for communication with other synchrotron radiation laboratories and, on suitable occasions, with federal agencies. The ALSUA, representing the research workers, will be in

  20. ALS Users' Association Charter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ALS Users' Association Charter Print The purpose of the Advanced Light Source Users' Association (ALSUA) is to provide an organized framework for the interaction between those who use the Advanced Light Source (ALS) at the Lawrence Berkeley Laboratory (LBL) for their research and the ALS management, as well as to provide a channel for communication with other synchrotron radiation laboratories and, on suitable occasions, with federal agencies. The ALSUA, representing the research workers, will

  1. 2011 User Meeting Workshops

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Workshops Home Agenda Awards Exhibitors Lodging Posters Registration Photo Contest Transportation Workshops This e-mail address is being protected from spambots. You need JavaScript enabled to view it User Meeting Archives Users' Executive Committee Workshops will follow the end of the plenary sessions on Tuesday and continue through Wednesday.When registering , you will be asked to select the workshop that you plan to attend; this helps organizers plan room assignments and refreshments.

  2. LANSCE | Users | LUG | Topical User Meeting Agenda

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Agenda (some presentations are included below) Sunday 4:00pm-6:00pm Registration: Best Western Monday 7:30am Registration: LANSCE, Bldg 1 Facility Presentations | LANSCE, Rosen Auditorium 8:15am-8:22am LANSCE User Group Executive Committee Welcome: Steve Conradson 2011 LUG-EC Chair 8:23am-8:30am Worshop Goals/Processes Kurt Schoenberg LANSCE Facility Director 8:30am-9:00am LANSCE Overview and Future Opportunities Kurt Schoenberg LANSCE Facility Director 9:00am-9:30am Nuclear Neutron Science at

  3. Oil Bypass Filter and Diesel Engine Idling Wear-Rate Evaluations...

    Broader source: Energy.gov (indexed) [DOE]

    More Documents & Publications Demonstrated Petroleum Reduction Using Oil Bypass Filter Technology on Heavy and Light Vehicles Development of Partial Filter Technology for HDD ...

  4. V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

  5. Restoration Prioritization Toolset: Documentation and User’s Guides 2007

    SciTech Connect (OSTI)

    Judd, Chaeli; Woodruff, Dana L.; Thom, Ronald M.; Anderson, Michael G.; Borde, Amy B.

    2007-10-26

    This user’s guide provides technical background and details on the Restoration Prioritization Toolset developed for GoMRC as well as instructions for use.

  6. 2011 NERSC User Survey (Read Only)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2010/2011 User Survey Results Survey Text 2009/2010 User Survey Results 2008/2009 User Survey Results 2007/2008 User Survey Results 2006 User Survey Results 2005 User Survey Results 2004 User Survey Results 2003 User Survey Results 2002 User Survey Results 2001 User Survey Results 2000 User Survey Results 1999 User Survey Results 1998 User Survey Results HPC Requirements for Science HPC Workshop Reports NERSC Staff Publications & Presentations Journal Cover Stories Galleries facebook icon

  7. NERSC User Announcements RSS Feed

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Announcements RSS Feed NERSC User Announcements RSS Feed June 30, 2014 by Richard Gerber NERSC's User Announcements (not these "Featured Announcements") are now available as an RSS...

  8. User account | The Ames Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User account User account Primary tabs Log in Request new password(active tab) Username or e-mail address * E-mail new password

  9. GRSAC Users Manual

    SciTech Connect (OSTI)

    Ball, S.J.; Nypaver, D.J.

    1999-02-01

    An interactive workstation-based simulation code (GRSAC) for studying postulated severe accidents in gas-cooled reactors has been developed to accommodate user-generated input with ''smart front-end'' checking. Code features includes on- and off-line plotting, on-line help and documentation, and an automated sensitivity study option. The code and its predecessors have been validated using comparisons with a variety of experimental data and similar codes. GRSAC model features include a three-dimensional representation of the core thermal hydraulics, and optional ATWS (anticipated transients without scram) capabilities. The user manual includes a detailed description of the code features, and includes four case studies which guide the user through four different examples of the major uses of GRSAC: an accident case; an initial conditions setup and run; a sensitivity study; and the setup of a new reactor model.

  10. Defining the questions: a research agenda for nontraditional authentication in arms control

    SciTech Connect (OSTI)

    Hauck, Danielle K; Mac Arthur, Duncan W; Smith, Morag K; Thron, Jonathan L; Budlong - Sylvester, Kory

    2010-01-01

    Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

  11. Hardware device to physical structure binding and authentication

    DOE Patents [OSTI]

    Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

    2013-08-20

    Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

  12. 2016 CAMD User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CAMD 2016 User Meeting Friday, April 29th, 2016 CAMD, 6980 Jefferson Highway, Baton Rouge, LA 70806 The CAMD 2016 User Meeting will be held on Friday, April 29th at CAMD, 6980 Jefferson Highway, Baton Rouge, LA 70806. There will be a "Celebration of MPW" in the morning, coinciding with a poster session in the Experimental Hall starting at 10:30 AM. Beamline scientists will be on hand to explain the new features of the multi-pole wiggler beamlines. Lunch will be provided before the

  13. User Submitted Research Citations

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Submitted Research Citations User Submitted Research Citations Sort by: Default | Name | Date (low-high) | Date (high-low) | Source | Category Picture1 Miro Conjugation-Driven "Reverse Mars-van Krevelen"-Type Radical Mechanism for Low-Temperature C-O Bond Activation June 9, 2016 | Author(s): Alexander V. Mironenko. Dionisios G. Vlachos | Source: Mironenko, Alexander V., and Dionisios G. Vlachos. "Conjugation-driven "Reverse Mars-van Krevelen"-type Radical Mechanism

  14. Simultaneous Authentication and Certification of Arms-Control Measurement Systems

    SciTech Connect (OSTI)

    MacArthur, Duncan W. [Los Alamos National Laboratory; Hauck, Danielle K. [Los Alamos National Laboratory; Thron, Jonathan L. [Los Alamos National Laboratory

    2012-07-09

    Most arms-control-treaty-monitoring scenarios involve a host party that makes a declaration regarding its nuclear material or items and a monitoring party that verifies that declaration. A verification system developed for such a use needs to be trusted by both parties. The first concern, primarily from the host party's point of view, is that any sensitive information that is collected must be protected without interfering in the efficient operation of the facility being monitored. This concern is addressed in what can be termed a 'certification' process. The second concern, of particular interest to the monitoring party, is that it must be possible to confirm the veracity of both the measurement system and the data produced by this measurement system. The monitoring party addresses these issues during an 'authentication' process. Addressing either one of these concerns independently is relatively straightforward. However, it is more difficult to simultaneously satisfy host party certification concerns and monitoring party authentication concerns. Typically, both parties will want the final access to the measurement system. We will describe an alternative approach that allows both parties to gain confidence simultaneously. This approach starts with (1) joint development of the measurement system followed by (2) host certification of several copies of the system and (3) random selection by the inspecting party of one copy to be use during the monitoring visit and one (or more) copy(s) to be returned to the inspecting party's facilities for (4) further hardware authentication; any remaining copies are stored under joint seal for use as spares. Following this process, the parties will jointly (5) perform functional testing on the selected measurement system and then (6) use this system during the monitoring visit. Steps (1) and (2) assure the host party as to the certification of whichever system is eventually used in the monitoring visit. Steps (1), (3), (4), and (5

  15. Authenticated group Diffie-Hellman key exchange: theory and practice

    SciTech Connect (OSTI)

    Chevassut, Olivier

    2002-10-03

    Authenticated two-party Diffie-Hellman key exchange allows two principals A and B, communicating over a public network, and each holding a pair of matching public/private keys to agree on a session key. Protocols designed to deal with this problem ensure A (B resp.)that no other principals aside from B (A resp.) can learn any information about this value. These protocols additionally often ensure A and B that their respective partner has actually computed the shared secret value. A natural extension to the above cryptographic protocol problem is to consider a pool of principals agreeing on a session key. Over the years several papers have extended the two-party Diffie-Hellman key exchange to the multi-party setting but no formal treatments were carried out till recently. In light of recent developments in the formalization of the authenticated two-party Diffie-Hellman key exchange we have in this thesis laid out the authenticated group Diffie-Hellman key exchange on firmer foundations.

  16. V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    0: ASUS RT-N66U Router AiCloud Security Bypass Security Issue V-190: ASUS RT-N66U Router AiCloud Security Bypass Security Issue July 2, 2013 - 12:38am Addthis PROBLEM: ASUS RT-N66U...

  17. DOE Designated User Facilities | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Designated User Facilities DOE Designated User Facilities DOE Designated User Facilities Sept 30 2015 More Documents & Publications Microsoft Word - DesignatedUserFacilitiesApri...

  18. Nuclear Physics: User/Researcher Information

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    UserResearcher Information New User Checklist us citizen non-us-citizen us citizen About User Liaison User Liaison facilitates the lab's scientific program by maintaining ...

  19. Rankine cycle condenser pressure control using an energy conversion device bypass valve

    DOE Patents [OSTI]

    Ernst, Timothy C; Nelson, Christopher R; Zigan, James A

    2014-04-01

    The disclosure provides a waste heat recovery system and method in which pressure in a Rankine cycle (RC) system of the WHR system is regulated by diverting working fluid from entering an inlet of an energy conversion device of the RC system. In the system, an inlet of a controllable bypass valve is fluidly coupled to a working fluid path upstream of an energy conversion device of the RC system, and an outlet of the bypass valve is fluidly coupled to the working fluid path upstream of the condenser of the RC system such that working fluid passing through the bypass valve bypasses the energy conversion device and increases the pressure in a condenser. A controller determines the temperature and pressure of the working fluid and controls the bypass valve to regulate pressure in the condenser.

  20. LANSCE | Users | LUG | LUG EC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Committee The LANSCE User Group (LUG) is comprised of current users. LUG provides direct input to LANSCE management, primarily through LUG's Executive Committee. The members of the LANSCE User Group Executive Committee are elected by the vote of the LUG membership, they represent the entire user community and provide direct user input to LANSCE management on matters ranging from current facility operations to planning for the future. Membership terms are staggered to maintain

  1. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Attackers can exploit these issues to execute arbitrary script or HTML code, steal cookie-based authentication credentials, and conduct phishing attacks. Other attacks may also be ...

  2. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael; Klatt, Leon N.

    2000-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

  3. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael; Klatt, Leon N.

    2001-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

  4. STEM Mentoring Café- Engaging Young Women in an Authentic Mentoring...

    Office of Environmental Management (EM)

    STEM Mentoring Caf- Engaging Young Women in an Authentic Mentoring Experience Melinda Higgins Albert Einstein Distinguished Educator Fellow, NASA Office of Education, ...

  5. V-163: Red Hat Network Satellite Server Inter-Satellite Sync...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    3: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass V-163: Red Hat Network Satellite Server Inter-Satellite Sync Remote Authentication Bypass May...

  6. RELAP-7 User's Guide

    SciTech Connect (OSTI)

    Zhang, Hongbin; Zhao, Haihua; Zou, Ling; Andrs, David; Berry, Ray Alden; Martineau, Richard Charles

    2014-12-01

    The document contains a user's guide on how to run the RELAP-7 code. The RELAP-7 code is the next generation nuclear reactor system safety analysis code being developed at the Idaho National Laboratory. RELAP-7 will become the main reactor systems simulation toolkit for the LWRS (Light Water Reactor Sustainability) program’s RISMC (Risk Informed Safety Margin Characterization) effort and the next generation tool in the RELAP reactor safety/systems analysis application series. RELAP-7 is written with object oriented programming language C++. A number of example problems and their associated input files are presented in this document to guide users to run the RELAP-7 code starting with simple pipe problems to problems with increasing complexity.

  7. Trilinos users guide.

    SciTech Connect (OSTI)

    Willenbring, James M.; Heroux, Michael Allen

    2003-08-01

    The Trilinos Project is an effort to facilitate the design, development, integration and ongoing support of mathematical software libraries. A new software capability is introduced into Trilinos as a package. A Trilinos package is an integral unit usually developed by a small team of experts in a particular algorithms area such as algebraic preconditioners, nonlinear solvers, etc. The Trilinos Users Guide is a resource for new and existing Trilinos users. Topics covered include how to configure and build Trilinos, what is required to integrate an existing package into Trilinos and examples of how those requirements can be met, as well as what tools and services are available to Trilinos packages. Also discussed are some common practices that are followed by many Trilinos package developers. Finally, a snapshot of current Trilinos packages and their interoperability status is provided, along with a list of supported computer platforms.

  8. U-074: Microsoft.NET Bugs Let Remote Users Execute Arbitrary Commands, Access User Accounts, and Redirect Users

    Broader source: Energy.gov [DOE]

    A remote user can execute arbitrary commands on the target system. A remote user can access a target user's account. A remote user can redirect users to arbitrary sites.

  9. LANSCE | Users | Rosen Scholar

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    About Past Scholars Call for Nominations Rosen Prize Users dotline Rosen Scholar | Dr. Markus Roth Markus Roth Dr. Markus Roth is a Full Professor at the University of Technology in Darmstadt, Germany at the Institute for Nuclear Physics, where he has been since 2003. He leads a research group that is also associated with the German National Laboratory "Gesellschaft fĂĽr Schwerionenforschung (GSI)," with the main focus on dense plasma physics, advanced diagnostic methods, and particle

  10. NERSC User Environment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Environment NERSC User Environment Home Directories, Shells and Dotfiles All NERSC systems use global home directories, which are are pre-populated with shell initialization files (also known as dotfiles) for all available shells. NERSC fully supports bash, csh, and tcsh as login shells. Other shells (ksh, sh, and zsh) are also available. The default shell at NERSC is csh. Dotfiles The "standard" dotfiles are symbolic links to read-only files that NERSC controls. For each standard

  11. Proprietary User Agreement

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Alliance/NREL 10-12-15 The Department of Energy has opted to utilize the following agreement for Designated Proprietary User Facilities transactions. Because these transactions are widespread across Departmental facilities, uniformity in agreement terms is desirable. Except for the *** provisions, minor modifications to the terms of this agreement may be made by CONTRACTOR, but any changes to the *** provisions or substantive changes to the non *** provisions will require approval by the DOE

  12. Photovoltaic power generation system free of bypass diodes

    SciTech Connect (OSTI)

    Lentine, Anthony L.; Okandan, Murat; Nielson, Gregory N.

    2015-07-28

    A photovoltaic power generation system that includes a solar panel that is free of bypass diodes is described herein. The solar panel includes a plurality of photovoltaic sub-modules, wherein at least two of photovoltaic sub-modules in the plurality of photovoltaic sub-modules are electrically connected in parallel. A photovoltaic sub-module includes a plurality of groups of electrically connected photovoltaic cells, wherein at least two of the groups are electrically connected in series. A photovoltaic group includes a plurality of strings of photovoltaic cells, wherein a string of photovoltaic cells comprises a plurality of photovoltaic cells electrically connected in series. The strings of photovoltaic cells are electrically connected in parallel, and the photovoltaic cells are microsystem-enabled photovoltaic cells.

  13. AVRAM user's manual

    SciTech Connect (OSTI)

    McGrady, P.W.

    1988-02-01

    This document details the use of the reliability code for the Atomic Vapor Laser Isotope Separation (AVLIS) project. This code was designed by Tom Anklam and John Harris. In late 1984 Patrick McGrady and Elena Koontz of C and TD/TA were assigned the task of improving the code and converting it for use on the DEC-10 system. In early 1986, Patric McGrady converted it to the CRAY. The AVRAM code is divided into distinct parts (often referred to as programs in this document). There is a COSMOS file that controls the execution of the FORTRAN code and controls the naming of output datasets and the deletion of temporary datasets created by the code. The FORTRAN code consists of a main program as a driver and of three main subroutines: EDIT, PARAM, and AVRAM. The EDIT program allows the user to create a new user defined system or add to an existing system or to change certain parameters. The PARAM program allows the user to alter system parameters and to select options such as economics run, criticality analysis or sensitivity studies. The AVRAM program does a reliability analysis of the system.

  14. Pre-test CFD Calculations for a Bypass Flow Standard Problem

    SciTech Connect (OSTI)

    Rich Johnson

    2011-11-01

    The bypass flow in a prismatic high temperature gas-cooled reactor (HTGR) is the flow that occurs between adjacent graphite blocks. Gaps exist between blocks due to variances in their manufacture and installation and because of the expansion and shrinkage of the blocks from heating and irradiation. Although the temperature of fuel compacts and graphite is sensitive to the presence of bypass flow, there is great uncertainty in the level and effects of the bypass flow. The Next Generation Nuclear Plant (NGNP) program at the Idaho National Laboratory has undertaken to produce experimental data of isothermal bypass flow between three adjacent graphite blocks. These data are intended to provide validation for computational fluid dynamic (CFD) analyses of the bypass flow. Such validation data sets are called Standard Problems in the nuclear safety analysis field. Details of the experimental apparatus as well as several pre-test calculations of the bypass flow are provided. Pre-test calculations are useful in examining the nature of the flow and to see if there are any problems associated with the flow and its measurement. The apparatus is designed to be able to provide three different gap widths in the vertical direction (the direction of the normal coolant flow) and two gap widths in the horizontal direction. It is expected that the vertical bypass flow will range from laminar to transitional to turbulent flow for the different gap widths that will be available.

  15. 2011 CNM Users Meeting | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Argonne Press Releases Feature Stories In the News Users Meetings 2015 Users Meeting 2014 Users Meeting 2013 Users Meeting 2012 Users Meeting 2011 Users Meeting 2009 Users Meeting 2008 Users Meeting 2007 Users Meeting Workshops Photos Videos Career Opportunities CNM Intranet CNM on Facebook Career Opportunities CNM Intranet CNM on Facebook Argonne National Laboratory Center for Nanoscale Materials About Research Capabilities For Users People Publications News & Events News & Events

  16. 2012 CNM Users Meeting | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Argonne Press Releases Feature Stories In the News Users Meetings 2015 Users Meeting 2014 Users Meeting 2013 Users Meeting 2012 Users Meeting 2011 Users Meeting 2009 Users Meeting 2008 Users Meeting 2007 Users Meeting Workshops Photos Videos Career Opportunities CNM Intranet CNM on Facebook Career Opportunities CNM Intranet CNM on Facebook Argonne National Laboratory Center for Nanoscale Materials About Research Capabilities For Users People Publications News & Events News & Events

  17. Evaluation of a Stirling engine heater bypass with the NASA Lewis nodal-analysis performance code

    SciTech Connect (OSTI)

    Sullivan, T.J.

    1986-05-01

    In support of the US Department of Energy's Stirling Engine Highway Vehicle Systems program, the NASA Lewis Research Center investigated whether bypassing the P-40 Stirling engine heater during regenerative cooling would improve the engine thermal efficiency. The investigation was accomplished by using the Lewis nodal-analysis Stirling engine computer model. Bypassing the P-40 Stirling engine heater at full power resulted in a rise in the indicated thermal efficiency from 40.6 to 41.0 percent. For the idealized (some losses not included) heater bypass that was analyzed, this benefit is not considered significant.

  18. V-186: Drupal Login Security Module Security Bypass and Denial of Service

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Vulnerability | Department of Energy 6: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June 26, 2013 - 1:28am Addthis PROBLEM: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability PLATFORM: Login Security 6.x-1.x versions prior to 6.x-1.2. Login Security 7.x-1.x versions prior to 7.x-1.2. ABSTRACT: A security issue and a vulnerability have been

  19. SSRL User Financial Account Form

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    07/25/16 SSRL User Financial Account Form Establish an SSRL user financial account at SLAC to procure gases, chemicals, supplies or services to support your experiment at SLAC's user facilities or to send samples, dewars, or other equipment between SLAC and your institution. To open or renew your SLAC user financial account, complete and submit this form along with a Purchase Order (PO) from your institution. The PO should be made to SLAC National Accelerator Laboratory for the amount of

  20. SHAFT79 user's manual

    SciTech Connect (OSTI)

    Pruess, K.; Schroeder, R.C.

    1980-03-01

    SHAFT79 (Simultaneous Heat And Fluid Transport) is an integrated finite difference program for computing two-phase non-isothermal flow in porous media. The principal application for which SHAFT79 is designed is in geothermal reservoir simulation. SHAFT79 solves the same equations as an earlier version, called SHAFT78, but uses much more efficient mathematical and numerical methods. The present SHAFT79 user's manual gives a brief account of equations and numerical methods and then describes in detail how to set up input decks for running the program. The application of SHAFT79 is illustrated by means of a few sample problems. (MHR)

  1. User Program Performance Monitor

    Energy Science and Technology Software Center (OSTI)

    1983-09-30

    PROGLOOK makes it possible to monitor the execution of virtually any OS/MVT or OS/VS2 Release 1.6 load module. The main reason for using PROGLOOK is to find out which portions of a code use most of the CPU time so that those parts of the program can be rewritten to reduce CPU time. For large production programs, users have typically found it possible to reduce CPU time by 10 to 30 percent without changing themore » program''s function.« less

  2. Weekly User Schedule

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Weekly User Schedule Print Requests for special operations use of the "scrubbing" shift should be sent directly to Warren Byrne (486-7517) by 1:00 p.m. Friday. Any requests for changes in beam energy, bucket fill pattern, scrubbing shifts, or machine setup must be submitted to This e-mail address is being protected from spambots. You need JavaScript enabled to view it by 4:00 pm on Wednesday, the week before the scheduled run, for consideration during Thursday's Physics meeting. These

  3. Weekly User Schedule

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Weekly User Schedule Print Requests for special operations use of the "scrubbing" shift should be sent directly to Warren Byrne (486-7517) by 1:00 p.m. Friday. Any requests for changes in beam energy, bucket fill pattern, scrubbing shifts, or machine setup must be submitted to This e-mail address is being protected from spambots. You need JavaScript enabled to view it by 4:00 pm on Wednesday, the week before the scheduled run, for consideration during Thursday's Physics meeting. These

  4. Instructions for using HSPD-12 Authenticated Outlook Web Access...

    Broader source: Energy.gov (indexed) [DOE]

    Provides instructions for remote Outlook access using HSPD-12 Badge. HSPD-12 Badge Instructions (388.34 KB) More Documents & Publications User Guide for Remote Access to VDI...

  5. Molecular Foundry User Meeting - JCAP

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Molecular Foundry User Meeting Molecular Foundry User Meeting Thu, Aug 11, 2016 5:00pm 17:00 Fri, Aug 12, 2016 6:00pm 18:00 Lawrence Berkeley National Laboratory Berkeley, CA USA The Molecular Foundry is hosting its annual Users' Meeting - a nanoscience conference at Lawrence Berkeley National Lab - on August 11-12, 2016. The Molecular Foundry is a Department of Energy user facility for academic, national laboratory and industrial researchers. Whether you are a returning user, a prospective

  6. Experimental and Analytic Study on the Core Bypass Flow in a Very High Temperature Reactor

    SciTech Connect (OSTI)

    Richard Schultz

    2012-04-01

    Core bypass flow has been one of key issues in the very high temperature reactor (VHTR) design for securing core thermal margins and achieving target temperatures at the core exit. The bypass flow in a prismatic VHTR core occurs through the control element holes and the radial and axial gaps between the graphite blocks for manufacturing and refueling tolerances. These gaps vary with the core life cycles because of the irradiation swelling/shrinkage characteristic of the graphite blocks such as fuel and reflector blocks, which are main components of a core's structure. Thus, the core bypass flow occurs in a complicated multidimensional way. The accurate prediction of this bypass flow and counter-measures to minimize it are thus of major importance in assuring core thermal margins and securing higher core efficiency. Even with this importance, there has not been much effort in quantifying and accurately modeling the effect of the core bypass flow. The main objectives of this project were to generate experimental data for validating the software to be used to calculate the bypass flow in a prismatic VHTR core, validate thermofluid analysis tools and their model improvements, and identify and assess measures for reducing the bypass flow. To achieve these objectives, tasks were defined to (1) design and construct experiments to generate validation data for software analysis tools, (2) determine the experimental conditions and define the measurement requirements and techniques, (3) generate and analyze the experimental data, (4) validate and improve the thermofluid analysis tools, and (5) identify measures to control the bypass flow and assess its performance in the experiment.

  7. User Survey | Argonne Leadership Computing Facility

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Survey User Survey Results The ALCF conducts yearly surveys to gain a better understanding of how we can improve the user experience at ALCF. Below are the numeric results of these surveys. 2014 ALCF User Survey Results 2013 ALCF User Survey Results 2012 ALCF User Survey Results 2011 ALCF User Survey Results 2010 ALCF User Survey Results 2009 ALCF User Survey Results 2008 ALCF User Survey Results

  8. APS User News | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    News & Calendars Users Home APS User News User Announcements Proposal Deadlines and Related Meetings Conferences and Workshops APS Seminars and Meetings APS Committees and Reviews...

  9. User Financial Accounts | Linac Coherent Light Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Financial Accounts Why Have a User Financial Account? Each user group should establish a user financial account to procure gases, chemicals, supplies or services to support their ...

  10. User Financial Accounts | Stanford Synchrotron Radiation Lightsource

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Financial Accounts Why Have a User Financial Account? Each user group should establish a user financial account to procure gases, chemicals, supplies or services to support your ...

  11. V-183: Cisco TelePresence TC and TE Bugs Let Remote Users Deny Service and Remote Adjacent Authenticated Users Gain Root Shell Access

    Broader source: Energy.gov [DOE]

    Cisco TelePresence TC and TE Software contain two vulnerabilities in the implementation of the Session Initiation Protocol (SIP) that could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition. Additionally, Cisco TelePresence TC Software contain an adjacent root access vulnerability that could allow an attacker on the same physical or logical Layer-2 network as the affected system to gain an unauthenticated root shell.

  12. Holographic Labeling And Reading Machine For Authentication And Security Appications

    DOE Patents [OSTI]

    Weber, David C.; Trolinger, James D.

    1999-07-06

    A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

  13. New Users - 88-Inch Cyclotron

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    New Users Welcome! Congratulations on getting your experiment approved and scheduled at the 88-Inch Cyclotron. This section details how to register with LBNL, acquire gate access and parking, and take the required safety courses to run an experiment at the 88-Inch Cyclotron. 6 Weeks Ahead Set up a user agreement between your organization and LBNL, if there is not already one in place. Recharge customers (those who pay for beam time) must have a user agreement, purchase order, and an advance

  14. User Facilities Expert Team - JCAP

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    IMG_2298.JPG User Facilities Expert Team Research Why Solar Fuels Goals & Objectives Thrust 1 Thrust 2 Thrust 3 Thrust 4 Publications Research Highlights Videos Innovations User Facilities Expert Team Benchmarking Database Device Simulation Tool XPS Spectral Database Research Introduction Why Solar Fuels? Goals & Objectives Thrusts Thrust 1 Thrust 2 Thrust 3 Thrust 4 Library Publications Research Highlights Videos Resources User Facilities Expert Team Benchmarking Database Device

  15. LANSCE | Users | LUG | Election Ballot

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Executive Committee Election Polls are now open! Polls close on Monday, April 4, 2016. The Executive Committee of the LANSCE User Group (LUG-EC) is seeking new representatives to serve on the Executive Committee beginning CY 2016. The LUG-EC meets onsite at LANSCE annually and engages in monthly teleconferences with LANSCE Management and User Program representatives on behalf of you, the User Community. Further information about the EC and current members can be found on the LUG EC page. Please

  16. LANSCE | Users | LUG | LUG EC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    LUG 2014 Summary and Charge LANSCE User Group Executive Committee Onsite Meeting, March 2014 Summary On March 14th, 2014, the LANSCE user group executive committee (LUG-EC) convened a meeting with representatives from LANSCE management, and the management of each represented user facility - Weapons Neutron Research / Nuclear Science (WNR), Ultracold Neutrons (UCN), Proton Radiography (pRad), Isotope Production Facility (IPF), and the Lujan Neutron Scattering Center (Lujan Center). Each facility

  17. 2012 ALS User Meeting Awards

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 ALS User Meeting Awards Recipients of the 2012 Users' Executive Committee awards and Student Poster Competition were announced Tuesday, October 9, at the ALS User Meeting. David A. Shirley Award for Outstanding Scientific Achievement at the ALS shirley award The David A. Shirley Award for Scientific Achievement went to, from left, Carl Percival (University of Manchester), Dudley Shallcross [(University of Bristol) not pictured], and Craig Taatjes and David Osborn (Sandia), for making the first

  18. 2011 User Meeting Award Recipients

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2011 User Meeting Award Recipients Print Recipients of the 2011 Users' Executive Committee awards, Student Poster Competition awards, and Photography Contest awards were announced Tuesday, October 4th at the ALS User Meeting. Winners are pictured below with UEC Chair David Obsorn. David A. Shirley Award for Outstanding Scientific Achievement at the ALS Dr. Subrata Chakraborty, for "the design and execution of the most important and difficult experiment relevant to understanding the origin

  19. Office of Science User Facilities

    Broader source: Energy.gov [DOE]

    This presentation summarizes the information on the Office of Science User Facilities, which was given during the webinar on the DOE BRIDGE funding opportunity.

  20. Jefferson Lab Users Group News

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User InformationRegistration print version UG Resources Background & Purpose By Laws Board of Directors Board of Directors Meetings Directory of Members Events At-A-Glance Member...

  1. Setting Up Your User Environment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Setting Up Your User Environment Setting Up Your User Environment PDSF Defined Environment When new users are added to the PDSF machines, the login shell is set according to the user's request. You can choose between csh, tcsh, or bash. You can change your startup shell by logging into NIM. Paths and environment variables are controlled by startup files (also known as dot files). On PDSF the startup files are symbolic links to read-only files that NERSC controls (if they are not, see the

  2. April 2013 CNMS User Newsletter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    our understanding of nanoscale phenomena and develop functional nanomaterials systems. Access is provided at no cost to users for research that is in the public do- main and...

  3. 2009 PDSF Users Meeting Minutes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    122209 Attending: Eric and Jay from PDSF and users Andrei, Marjorie, and Jeff P. Cluster status: Utilization has been relatively light, mostly STAR and some ATLASUCI jobs....

  4. NERSC User Group Meeting 2014

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Large-Scale Structure experiments (DESDESILSST Euclid) will probe the nature of Dark Energy NERSC User Group Meeting 2014 CMB Satellite Missions Since COBE, the race has been ...

  5. APS User News, Issue 88

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    -- John Rogers to be Keynote at Users Meeting -- 2015 APS Compton Award goes to Ice, Larson, and Sparks BRIEFLY NOTED -- Congratulations to Daniel Haskel, Winner of the 2015...

  6. User Facility | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    National Laboratory is a premier user facility providing world-class expertise, instrumentation and infrastructure for interdisciplinary nanoscience and nanotechnology research....

  7. AMBER User's Manual

    SciTech Connect (OSTI)

    Vay, J.L.; Fawley, W.

    2000-11-08

    AMBER is a Particle-In-Cell (PIC) code which models the evolution of a representative slice of a relativistic electron beam in a linear accelerator. The beam is modeled as a steady flow and therefore no electromagnetic waves: all the fields (external and self-fields) are electrostatic and magnetostatic fields (for a complete description, see chapter 5). The possible elements describing the accelerator lattice are solenoids, accelerating gaps, pipes and apertures. Several kinds of beam distribution can be loaded: KV, gaussian, semi-gaussian, etc. Alternatively, the user can reconstruct (or load) a distribution from the output of another codefile, for example, an interface generating the beam distribution from output produced from EGUN or LSP codes is available as an option. This documentation first describes in detail the input files needed to run AMBER and the procedure to start the executable. The possible data files and graphical output are explained in the two following chapters. The last chapter describes the physics model and numerical techniques used. An example of input files and the result obtained with these inputs are also given in the Appendix.

  8. SOLDESIGN user's manual copyright

    SciTech Connect (OSTI)

    Pillsbury, R.D. Jr.

    1991-02-01

    SOLDESIGN is a general purpose program for calculating and plotting magnetic fields, Lorentz body forces, resistances and inductances for a system of coaxial uniform current density solenoidal elements. The program was originally written in 1980 and has been evolving ever since. SOLDESIGN can be used with either interactive (terminal) or file input. Output can be to the terminal or to a file. All input is free-field with comma or space separators. SOLDESIGN contains an interactive help feature that allows the user to examine documentation while executing the program. Input to the program consists of a sequence of word commands and numeric data. Initially, the geometry of the elements or coils is defined by specifying either the coordinates of one corner of the coil or the coil centroid, a symmetry parameter to allow certain reflections of the coil (e.g., a split pair), the radial and axial builds, and either the overall current density or the total ampere-turns (NI). A more general quadrilateral element is also available. If inductances or resistances are desired, the number of turns must be specified. Field, force, and inductance calculations also require the number of radial current sheets (or integration points). Work is underway to extend the field, force, and, possibly, inductances to non-coaxial solenoidal elements.

  9. National Library of Energy : User Account

    Office of Scientific and Technical Information (OSTI)

    Reset your password Enter either your User Name or Email Address to reset your password. User Name: Email Address: Go...

  10. User Facilities | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Advanced Photon Source Argonne Leadership Computing Facility Argonne Tandem Linear Accelerator System Center for Nanoscale Materials Transportation Research and Analysis Computing Center Science Work with Argonne About Safety News Careers Education Community Diversity Directory Argonne National Laboratory About Safety News Careers Education Community Diversity Directory Energy Environment Security User Facilities Science Work with Argonne User Facilities Advanced Photon Source Argonne

  11. Annual Users Training Meeting Archives | National Nuclear Security

    National Nuclear Security Administration (NNSA)

    Administration | (NNSA) Annual Users Training Meeting Archives 2011 Users Training Meeting 2010 Users Training Meeting 2009 Users Training Meeting 2008 Users Training Meeting 2007 Users Training Meeting 2006 Users Training Meeting 2005 Users Training Meeting Learn More 2005 NMMSS Users Training Meeting 2006 NMMSS Users Training Meeting 2007 NMMSS Users Training Meeting 2008 NMMSS Users Training Meeting 2009 NMMSS Users Training Meeting 2010 NMMSS Users Training Meeting 2011 NMMSS Users

  12. Investigation on the Core Bypass Flow in a Very High Temperature Reactor

    SciTech Connect (OSTI)

    Hassan, Yassin

    2013-10-22

    Uncertainties associated with the core bypass flow are some of the key issues that directly influence the coolant mass flow distribution and magnitude, and thus the operational core temperature profiles, in the very high-temperature reactor (VHTR). Designers will attempt to configure the core geometry so the core cooling flow rate magnitude and distribution conform to the design values. The objective of this project is to study the bypass flow both experimentally and computationally. Researchers will develop experimental data using state-of-the-art particle image velocimetry in a small test facility. The team will attempt to obtain full field temperature distribution using racks of thermocouples. The experimental data are intended to benchmark computational fluid dynamics (CFD) codes by providing detailed information. These experimental data are urgently needed for validation of the CFD codes. The following are the project tasks: • Construct a small-scale bench-top experiment to resemble the bypass flow between the graphite blocks, varying parameters to address their impact on bypass flow. Wall roughness of the graphite block walls, spacing between the blocks, and temperature of the blocks are some of the parameters to be tested. • Perform CFD to evaluate pre- and post-test calculations and turbulence models, including sensitivity studies to achieve high accuracy. • Develop the state-of-the art large eddy simulation (LES) using appropriate subgrid modeling. • Develop models to be used in systems thermal hydraulics codes to account and estimate the bypass flows. These computer programs include, among others, RELAP3D, MELCOR, GAMMA, and GAS-NET. Actual core bypass flow rate may vary considerably from the design value. Although the uncertainty of the bypass flow rate is not known, some sources have stated that the bypass flow rates in the Fort St. Vrain reactor were between 8 and 25 percent of the total reactor mass flow rate. If bypass flow rates are on the

  13. Oil Bypass Filter Technology Evaluation - Third Quarterly Report, April--June 2003

    SciTech Connect (OSTI)

    Laurence R. Zirker; James E. Francfort

    2003-08-01

    This Third Quarterly report details the ongoing fleet evaluation of an oil bypass filter technology by the Idaho National Engineering and Environmental Laboratory (INEEL) for the U.S. Department of Energy’s FreedomCAR & Vehicle Technologies Program. Eight full-size, four-cycle diesel-engine buses used to transport INEEL employees on various routes have been equipped with oil bypass filter systems from the PuraDYN Corporation. The reported engine lubricating oil-filtering capability (down to 0.1 microns) and additive package of the bypass filter system is intended to extend oil-drain intervals. To validate the extended oil-drain intervals, an oil-analysis regime monitors the presence of necessary additives in the oil, detects undesirable contaminants and engine wear metals, and evaluates the fitness of the oil for continued service. The eight buses have accumulated 185,000 miles to date without any oil changes. The preliminary economic analysis suggests that the per bus payback point for the oil bypass filter technology should be between 108,000 miles when 74 gallons of oil use is avoided and 168,000 miles when 118 gallons of oil use is avoided. As discussed in the report, the variation in the payback point is dependant on the assumed cost of oil. In anticipation of also evaluating oil bypass systems on six Chevrolet Tahoe sport utility vehicles, the oil is being sampled on the six Tahoes to develop an oil characterization history for each engine.

  14. AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES

    SciTech Connect (OSTI)

    Poland, R.; Drayer, R.; Wilson, J.

    2013-08-12

    This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operator’s and the IAEA’s interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using “joint use” equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEA’s ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

  15. David Turner! NERSC User Services Group NERSC User Environment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Environment --- 1 --- September 10, 2013 Overview * Login N odes, F ile S ystems, a nd D ot F iles - David T urner * So;ware M odules - Doug J acobsen * Compilers - Mike S ...

  16. 2016 PDSF User Meeting Minutes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    6 Minutes 2016 PDSF User Meeting Minutes September 6 : next August 9 , [slides] Attending Jeff, Jochen,Yuen-Dat, Craig, Jerome (phone), Jan Decisions/suggestions PDSF batch: investigate increase of the queue size to 50k jobs reduce 6 interactive nodes to 3 monitor load & connectivity per node inform users about intended limits of use of interactive nodes prepare to tag& kill jobs from users exceeding the limits, to be implemented in a month proceed with dedicated Shifter images for

  17. 2009 PDSF Users Meeting Minutes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2009 PDSF Users Meeting Minutes December 22 PDSF Users Meeting 12/22/09 Attending: Eric and Jay from PDSF and users Andrei, Marjorie, and Jeff P. Cluster status: Utilization has been relatively light, mostly STAR and some ATLASUCI jobs. Outages: Discussed slowness caused by atlasusi jobs and the possibility of making /common read-only but no decision on how to do that was reached. The issue of using the NERSC global homes was also discussed as a possibility in the future. Upcoming downtimes:

  18. 2010 PDSF Users Meeting Minutes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2010 PDSF Users Meeting Minutes December 21 PDSF Users Meeting 12/21/10 Attending: Eric and Jay from NERSC and users Andrei and Jeff P. Cluster status and utilization: Cluster has been loaded to capacity recently. STAR is running a lot of jobs, many of the grid-based and submitted from BNL. ALICE, ATLAS and icecube also running. Outages and Downtimes: There was an NGF downtime on the 16th, otherwise things have been stable for the most part. Procurements and New Hardware: Will get more storage

  19. Well devices with annulus check valve and hydraulic by-pass

    SciTech Connect (OSTI)

    Lawson, J.E.

    1984-05-22

    Hanger apparatus for suporting pipe in a well, the apparatus including both an annulus check valve, via which communication is established with the annulus between the suspended pipe and surrounding casing, and a pressure fluid by-pass, via which communication with a down-hole device such as a safety valve is established. Opening of the check valve and establishment of communication via the by-pass are accomplished by a simple stabbing operation with, e.g., a handling tool or a production upper body. Alternately, the check valve is opened by hydraulic pressure delivered via the production upper body.

  20. EFFECTS OF GRAPHITE SURFACE ROUGHNESS ON BYPASS FLOW COMPUTATIONS FOR AN HTGR

    SciTech Connect (OSTI)

    Rich Johnson; Yu-Hsin Tung; Hiroyuki Sato

    2011-07-01

    Bypass flow in a prismatic high temperature gas reactor (HTGR) occurs between graphite blocks as they sit side by side in the core. Bypass flow is not intentionally designed to occur in the reactor, but is present because of tolerances in manufacture, imperfect installation and expansion and shrinkage of the blocks from heating and irradiation. It is desired to increase the knowledge of the effects of such flow, which has been estimated to be as much as 20% of the total helium coolant flow. Computational fluid dynamic (CFD) simulations can provide estimates of the scale and impacts of bypass flow. Previous CFD calculations have examined the effects of bypass gap width, level and distribution of heat generation and effects of shrinkage. The present contribution examines the effects of graphite surface roughness on the bypass flow for different relative roughness factors on three gap widths. Such calculations should be validated using specific bypass flow measurements. While such experiments are currently underway for the specific reference prismatic HTGR design for the next generation nuclear plant (NGNP) program of the U. S. Dept. of Energy, the data are not yet available. To enhance confidence in the present calculations, wall shear stress and heat transfer results for several turbulence models and their associated wall treatments are first compared for flow in a single tube that is representative of a coolant channel in the prismatic HTGR core. The results are compared to published correlations for wall shear stress and Nusselt number in turbulent pipe flow. Turbulence models that perform well are then used to make bypass flow calculations in a symmetric onetwelfth sector of a prismatic block that includes bypass flow. The comparison of shear stress and Nusselt number results with published correlations constitutes a partial validation of the CFD model. Calculations are also compared to ones made previously using a different CFD code. Results indicate that

  1. User Experience Research and Statistics

    Broader source: Energy.gov [DOE]

    To improve your website or application, especially for new projects, EERE strongly recommends, but does not require, conducting user experience (UX) research. We only require that you get the...

  2. David Turner! User Services Group

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Services Group Accounts and Allocations --- 1 --- September 10, 2013 Accounts There a re t wo t ypes o f a ccounts a t N ERSC. 1. Your p ersonal, p rivate a ccount * ...

  3. Soybean (2010 JGI User Meeting)

    ScienceCinema (OSTI)

    Stacey, Gary

    2011-04-26

    Gary Stacey, associate director of the National Center for Soybean Biotechnology at the University of Missouri, gives a talk simply titled "Soybean" on March 24, 2010 at the 5th Annual DOE JGI User Meeting

  4. OpenEIS. Users Guide

    SciTech Connect (OSTI)

    Kim, Woohyun; Lutes, Robert G.; Katipamula, Srinivas; Haack, Jereme N.; Carpenter, Brandon J.; Akyol, Bora A.; Monson, Kyle E.; Allwardt, Craig H.; Kang, Timothy; Sharma, Poorva

    2015-02-28

    This document is a users guide for OpenEIS, a software code designed to provide standard methods for authoring, sharing, testing, using and improving algorithms for operational building energy efficiency.

  5. User Training | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Training Before performing work at the CNM, you must take certain orientation and safety training courses. We encourage you to take these courses remotely before you arrive at ...

  6. Proteus-SN user manual

    SciTech Connect (OSTI)

    Shemon, Emily R.; Smith, Micheal A.; Lee, Changho

    2015-07-31

    This user manual describes how to set up a neutron transport simulation with the PROTEUS-SN code. A companion methodology manual describes the theory and algorithms within PROTEUS-SN.

  7. User Experience Research Online Tools

    Broader source: Energy.gov [DOE]

    The Office of Energy Efficiency and Renewable Energy (EERE) has a variety of online tools to help you conduct user experience (UX) research. The following tools are free for use by staff and contractors who work on the EERE website.

  8. LANSCE | User Resources | Visitor Registration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Visit Registration Users must register online at least: 4 weeks prior to experiment for U.S. citizens 2 months prior to experiment for foreign nationals. Lujan Center WNR Visit Registration Visit Registration

  9. Midwest Hydro Users Group Meeting

    Broader source: Energy.gov [DOE]

    The Midwest Hydro Users Group will be holding their annual Fall meeting on November 12th and 13th in Wausau, Wisconsin.  An Owners-only meeting on the afternoon of the 12th followed by a full...

  10. NuMAD User's Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    (NuMAD v2.0) for Wind Turbine Blades: User's Guide Jonathan C. Berg Brian R. Resor Wind Energy Technologies Department Sandia National Laboratories P.O. Box 5800 Albuquerque, NM...

  11. 2014 User Meeting Award Recipients

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4 User Meeting Award Recipients 2014 ALS User Meeting Award Recipients Presented on Tuesday, October 7, 2014, by Peter Nico (UEC Chair). David A. Shirley Award for Outstanding Scientific Achievement at the ALS The David A. Shirley Award for Scientific Achievement went to Chuck Fadley (UC Davis and Berkeley Lab), "For significant contributions to a better understanding of surfaces and interfaces through the development of novel x-ray photoemission spectroscopy techniques." David Shirley

  12. Monthly PDSF User Meeting Minutes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    PDSF Selected Announcements Email Announcements Archive PDSF Mailing Lists In Case of Difficulty Accessing PDSF or HPSS Cluster Statistics Getting help Group Pages PDSF Completed Jobs Obsolete (to be discarded) Genepool Queues and Scheduling Retired Systems Storage & File Systems Application Performance Data & Analytics Job Logs & Statistics Training & Tutorials Software Policies User Surveys NERSC Users Group Help Staff Blogs Request Repository Mailing List Need Help?

  13. 2011 User Meeting Award Recipients

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Award Recipients Recipients of the 2011 Users' Executive Committee awards, Student Poster Competition awards, and Photography Contest awards were announced Tuesday, October 4th at the ALS User Meeting. Winners are pictured below with UEC Chair David Obsorn. David A. Shirley Award for Outstanding Scientific Achievement at the ALS Dr. Subrata Chakraborty, for "the design and execution of the most important and difficult experiment relevant to understanding the origin and evolution of the

  14. 25th Annual Users' Conference

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Registration Conference Schedule Poster Information Banquet Directions SSRLUO Ballot Lodging Information Travel to SLAC Visitor Information For Additional Information Contact: Michelle Steger steger@ssrl.slac.stanford.edu SSRL, MS 99 PO Box 4349 Stanford, CA 94309-0210 Phone: (650) 926-3011 Fax: (650) 926-3600 ALS Users' Conference: October 22-23 Graphics by Terry Anderson Last Update: September 11, 1998 Lisa Dunn, SSRL Stanford Synchrotron Radiation Laboratory 25th Annual Users' Conference

  15. User Safety | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Safety User Facilities User Facilities Home User Facilities at a Glance User Resources Getting Started User Safety Access Models User Agreements Data Management Resources Acknowledging User Facilities User Statistics Policies and Processes Frequently Asked Questions User Facility Science Highlights User Facility News Contact Information Office of Science U.S. Department of Energy 1000 Independence Ave., SW Washington, DC 20585 P: (202) 586-5430 User Resources User Safety Print Text Size: A

  16. Help:User page | Open Energy Information

    Open Energy Info (EERE)

    User page Jump to: navigation, search A user page is a page about a wiki user; someone who registered on the wiki, and is (most probably) a contributor. If you have registered, you...

  17. SSRL Users' Organization | Stanford Synchrotron Radiation Lightsource

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users' Organization Charter | Committee Members | Committee Meetings | SSRLUO Activism SNUG Group Synchrotron and Neutron User's Group (SNUG) visit to Washington DC, April 2009. Left to right: Ryan Toomey, U. South Florida; Mark Dadmun, U. Tennessee; Christopher Kim, Chapman U. (SNUG Chair); Hendrik Ohldag, Stanford U. The SSRL Users' Organization (SSRLUO) is broadly concerned with representing the interests of the SSRL users (see Charter). Users elect members to serve on the Users' Executive

  18. NIF and Jupiter User Group Meeting 2015

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    home / nif workshops / user group 2015 NIF and Jupiter User Group Meeting 2015 Information on the NIF User Facility About the NIF and Jupiter Laser Facility User Group Meeting The NIF and Jupiter Laser Facility (JLF) User Groups hosted a joint meeting from Sunday, February 8, 2015, through Wednesday, February 11, 2015, in Livermore, CA. The meeting described NIF's and JLF's capabilities to current and potential users and included presentations about capabilities and recent experiments. The

  19. SLAC Linac Coherent Light Source User Site

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Committees & Contacts LCLS Scientific Advisory Committee (SAC) LCLS Detector Advisory Committee (LDAC) LCLS Proposal Review Panel LCLS Users' Organization LCLS Collaborators User...

  20. User:Selena Miller | Open Energy Information

    Open Energy Info (EERE)

    User page Edit with form History User:Selena Miller Jump to: navigation, search 12.jpg Name Selena Miller Location Los Angeles, California Edits 2 Retrieved from "http:...

  1. Radiometer Calibration and Characterization (RCC) User's Manual...

    Office of Scientific and Technical Information (OSTI)

    (RCC) User's Manual: Windows Version 4.0 Citation Details In-Document Search Title: Radiometer Calibration and Characterization (RCC) User's Manual: Windows Version 4.0 ...

  2. JOBAID-APPROVE A USERS TRAINING REQUEST

    Broader source: Energy.gov [DOE]

    The purpose of this job aid is to guide users through the step-by-step process of approving a user training request.

  3. Canopy 2.1 User Guide

    SciTech Connect (OSTI)

    Burtner, Edwin R.

    2012-09-15

    Its user guide for the Canopy system. Its design to be used electronically or printed out in conjunction with the application to teach users about the features.

  4. Users Executive Committee | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    provides advice to the Director on matters affecting the user community, and ensures good communication between the CNM user community and CNM management. The CNM UEC is also...

  5. User:Woodjr/Sandbox | Open Energy Information

    Open Energy Info (EERE)

    Sandbox < User:Woodjr Jump to: navigation, search Test link: Dataset 40 Retrieved from "http:en.openei.orgwindex.php?titleUser:WoodjrSandbox&oldid332192...

  6. Scott French! NERSC User Services Group! New User Training!

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    French! NERSC User Services Group! ! New User Training! August 13, 2015 Computing Environment Node Types * Login nodes - Shared w ith o ther u sers - Code c ompila3on, j ob p repara3on a nd s ubmission * MOM n odes ( Cray m achines) - Shared w ith o ther u sers - Where b atch s cript e xecutes - Will g o a way w hen w e t ransi3on t o S LURM * Compute n odes - Not s hared ( except s erial q ueues) --- 2 --- Login Node Configuration * Edison - Twelve n odes * 16 c ores, 2 .0 G Hz I ntel S andy B

  7. Ankit Bhagatwala! NERSC User Services Group! New User Training!

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Ankit Bhagatwala! NERSC User Services Group! ! New User Training! March 21, 2016 Computing Environment Node Types * Login nodes - Shared w ith o ther u sers - Code c ompila3on, j ob p repara3on a nd s ubmission * Compute n odes - Not s hared ( except s hared q ueue o n C ori) * Service nodes - File s ystem a ccess ( lustre), d ata m ovement ( HPSS), network c onnec3ons t o o utside w orld, e tc. - Not a ccessed d irectly --- 2 --- Login Node Configuration * Edison - Twelve n odes * 16 c ores, 2

  8. HTGR Cost Model Users' Manual

    SciTech Connect (OSTI)

    A.M. Gandrik

    2012-01-01

    The High Temperature Gas-Cooler Reactor (HTGR) Cost Model was developed at the Idaho National Laboratory for the Next Generation Nuclear Plant Project. The HTGR Cost Model calculates an estimate of the capital costs, annual operating and maintenance costs, and decommissioning costs for a high-temperature gas-cooled reactor. The user can generate these costs for multiple reactor outlet temperatures; with and without power cycles, including either a Brayton or Rankine cycle; for the demonstration plant, first of a kind, or nth of a kind project phases; for a single or four-pack configuration; and for a reactor size of 350 or 600 MWt. This users manual contains the mathematical models and operating instructions for the HTGR Cost Model. Instructions, screenshots, and examples are provided to guide the user through the HTGR Cost Model. This model was design for users who are familiar with the HTGR design and Excel. Modification of the HTGR Cost Model should only be performed by users familiar with Excel and Visual Basic.

  9. Novel Authentication of Monitoring Data Through the use of Secret and Public Cryptographic Keys

    SciTech Connect (OSTI)

    Benz, Jacob M.; Tolk, Keith; Tanner, Jennifer E.

    2014-07-21

    The Office of Nuclear Verification (ONV) is supporting the development of a piece of equipment to provide data authentication and protection for a suite of monitoring sensors as part of a larger effort to create an arms control technology toolkit. This device, currently called the Red Box, leverages the strengths of both secret and public cryptographic keys to authenticate, digitally sign, and pass along monitoring data to allow for host review, and redaction if necessary, without the loss of confidence in the authenticity of the data by the monitoring party. The design of the Red Box will allow for the addition and removal of monitoring equipment and can also verify that the data was collected by authentic monitoring equipment prior to signing the data and sending it to the host and for review. The host will then forward the data to the monitor for review and inspection. This paper will highlight the progress to date of the Red Box development, and will explain the novel method of leveraging both symmetric and asymmetric (secret and public key) cryptography to authenticate data within a warhead monitoring regime.

  10. David Turner! NERSC User Services Group! NUG New User Training...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    NUG New User Training February 23, 2015 Next Steps You A re N ot A lone A c alcula'on o f t he s elf--- generated p lasma current i n t he W 7---X reactor, p erformed u sing the ...

  11. David Turner! NERSC User Services Group! New User Training!

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    New User Training October 30, 2014 Next Steps You A re N ot A lone A c alcula'on o f t he s elf--- generated p lasma current i n t he W 7---X reactor, p erformed u sing the S ...

  12. Early Edison Users Deliver Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Early Edison Users Deliver Results Early Edison Users Deliver Results January 31, 2014 Contact: Margie Wylie, mwylie@lbl.gov, +1 510 486 7421 Before any supercomputer is accepted at NERSC, scientists are invited to put the system through its paces during an "early science" phase. While the main aim of this period is to test the new system, many scientists are able to use the time to significantly advance their work. (»Related story: "Edison Electrifies Scientific

  13. 2015 User Meeting Award Recipients

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    5 User Meeting Award Recipients 2015 ALS User Meeting Award Recipients Presented on Tuesday, October 6, 2015, by Chris Cappa (UEC Chair). David A. Shirley Award for Outstanding Scientific Achievement at the ALS The David A. Shirley Award for Scientific Achievement went to Wanli Yang, "For new concepts optimizing battery materials with the aid of soft x-ray microscopy." David Shirley was a Professor of Chemistry at UC Berkeley and Director of LBNL from 1980 to 1989, and was instrumental

  14. LANSCE | User Resources | Experiment Reports

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Experiment Reports For experiment report guidance, examples or a blank form, select one of the following .pdf files: Instructions.pdf Experiment Report Form.pdf Send reports to the LANSCE User Office. Reports are due three months after you receive beam time. If you didn't complete a User Survey during your visit, please do so when you complete your Experiment Report. The responses to the survey are used by LANSCE to identify and address issues and are also reported to the agencies providing

  15. Test and User Facilities | NREL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Test and User Facilities Our test and user facilities are available to industry and other organizations for researching, developing, and evaluating energy technologies. We can work with you to design the tests and operate the equipment. A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z A Advanced Research Turbines B Battery Thermal and Life Test Facility Biochemical Conversion Pilot Plant C Controllable Grid Interface Test System D Distributed

  16. E-Link - User Account

    Office of Scientific and Technical Information (OSTI)

    Energy Link (E-LINK) Access Request FOR DOE MAJOR SITE/FACILITY MANAGEMENT CONTRACTOR AND DOE HEADQUARTERS AND FIELD OFFICE PERSONNEL ONLY (Financial Assistance Recipients/Non-Major Site/Facility Management Contractors, go to www.osti.gov/elink-2413/) Major Site/Facility Management Contractors and DOE Headquarters and Field personnel are required to obtain a user name and password to access E-Link submissions and related reports. The process to obtain a user name and password also requires the

  17. PIA - Advanced Test Reactor National Scientific User Facility...

    Broader source: Energy.gov (indexed) [DOE]

    Advanced Test Reactor National Scientific User Facility Users Week 2009 PIA - Advanced Test Reactor National Scientific User Facility Users Week 2009 (316.78 KB) More Documents & ...

  18. Number of NERSC Users and Projects Through the Years

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users and Projects Through the Years Careers Visitor Info Web Policies Home About Usage and User Demographics Users and Projects Through the Years Number of NERSC Users ...

  19. SSRL and LCLS Users' Meeting and Workshops

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    SSRL and LCLS Users' Meeting and Workshops October 24-26, 2011 Menlo Park

  20. Steve Leak! NERSC User Engagement Group! NUG New User Training

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Leak! NERSC User Engagement Group! ! NUG New User Training NERSC File Systems and Data Management --- 1 --- March 2 1, 2 016 Topics * What fi lesystems a nd s torage d o w e h ave? - And h ow/when t o u se i t * How to share data with colleagues * How t o m ove d ata t o, f rom a nd a round N ERSC systems --- 2 --- Key Points * Variety o f s torage t ypes a vailable t o m eet d ifferent needs - Be a ware o f s trengths a nd l imita8ons o f e ach, u se e ach accordingly * BACK U P Y OUR I

  1. User Resources | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Resources User Facilities User Facilities Home User Facilities at a Glance User Resources Getting Started User Safety Access Models User Agreements Data Management Resources Acknowledging User Facilities User Statistics Policies and Processes Frequently Asked Questions User Facility Science Highlights User Facility News Contact Information Office of Science U.S. Department of Energy 1000 Independence Ave., SW Washington, DC 20585 P: (202) 586-5430 User Resources Print Text Size: A A A

  2. Microsoft Word - Citrix_2FA_Authentication_12_3_2009.doc

    Broader source: Energy.gov (indexed) [DOE]

    Workplace logon screen will prompt you only for your Windows User name and Password. ... see a prompt for your Windows User PASSWORD. There are various situations that cause ...

  3. SOWFA + Super Controller User's Manual

    SciTech Connect (OSTI)

    Fleming, P.; Gebraad, P.; Churchfield, M.; Lee, S.; Johnson, K.; Michalakes, J.; van Wingerden, J. W.; Moriarty, P.

    2013-08-01

    SOWFA + Super Controller is a modification of the NREL's SOWFA tool which allows for a user to apply multiturbine or centralized wind plant control algorithms within the high-fidelity SOWFA simulation environment. The tool is currently a branch of the main SOWFA program, but will one day will be merged into a single version. This manual introduces the tool and provides examples such that a user can implement their own super controller and set up and run simulations. The manual only discusses enough about SOWFA itself to allow for the customization of controllers and running of simulations, and details of SOWFA itself are reported elsewhere Churchfield and Lee (2013); Churchfield et al. (2012). SOWFA + Super Controller, and this manual, are in alpha mode.

  4. NuMAD User's Guide

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    7028 Unlimited Release Printed August 2012 Numerical Manufacturing And Design Tool (NuMAD v2.0) for Wind Turbine Blades: User's Guide Jonathan C. Berg and Brian R. Resor Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore, California 94550 Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security

  5. Sierra Structural Dynamics User's Notes

    SciTech Connect (OSTI)

    Reese, Garth M.

    2015-10-19

    Sierra/SD provides a massively parallel implementation of structural dynamics finite element analysis, required for high fidelity, validated models used in modal, vibration, static and shock analysis of weapons systems. This document provides a users guide to the input for Sierra/SD. Details of input specifications for the different solution types, output options, element types and parameters are included. The appendices contain detailed examples, and instructions for running the software on parallel platforms.

  6. NIF User Group Executive Board

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    executive board NIF User Group Executive Board Professor Don Lamb (Chair) University of Chicago Professor Farhat Beg (Vice Chair) University of California, San Diego Professor Justin Wark (Past Chair) University of Oxford Dr. Riccardo Betti University of Rochester Dr. Kirk Flippo Los Alamos National Laboratory Professor Gianluca Gregori University of Oxford Professor Michel Koenig École Polytechnique Dr. Chikang Li Massachusetts Institute of Technology Dr. Jena Meinecke Young Researcher:

  7. atlasUserMeeting14

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    GRETINA Mario Cromaz, LBNL Work supported under contract number DE-AC02-05CH11231. 2014 ATLAS User's Meeting ANL - May 15-16, 2014 The GRETINA Spectrometer 2 * first generation gamma-ray tracking array * spherical shell of Ge covering 25% of available solid angle (scalable to full 4 coverage) * consists of seven 4-crystal modules (quads), 36-way segmented HPGe crystals (1000 segments) * tracking ability removes need for active suppression, scales to very high efficiencies * physics runs now

  8. FNAL Users Meeting Morgan Wascko

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FNAL Users Meeting Morgan Wascko 3 June, 2004 LSU Slide 1 Quo Vadis, MiniBooNE? Context ν oscillation landscape LSND Implications What if the signal is confirmed? Latest MiniBooNE news Beam and Booster performance Detector performance calibration sources optical modeling of the oil detected neutrino rate vs. time Neutrino data flux, cross section progress Updated Oscillation Sensitivity based on measured neutrino rates during first year of data New physics? Many answers for many questions

  9. LANSCE | News | User Program Headlines

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Program Headlines dotline Lujan Center: Material Science FY17 Call for Proposals Proposal Submission: https://www.lanl.gov/orgs/lansce/ Lujan Center Call for Proposals is Open. Deadline: May 21, 2016 at 5:00 pm (MDT). lansce.lanl.gov lansce.lanl.gov/lujan The Los Alamos Neutron Science Center (LANSCE) invites proposals for material science experiments at the Lujan Center addressing science of NNSA and LANL programmatic interest for the September 2016 - February 2017 run cycle. The Lujan

  10. 2013 PDSF User Meeting Minutes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    3 Minutes 2013 PDSF User Meeting Minutes December 3 Attending Shusu, Ernst, Mike, Craig, Iwona, Larry, Lisa Outages/Downtimes November 12 - 15: Mendel nodes offline for recabling Various Dates: Rolling upgrades of various PDSF interactive nodes Upcoming Downtimes January: Possible project outage December 16: Eliza 3, 8, 9 will no longer be accessible Other Issues New Mendel rack is in place, new interactives are open to a few beta testers. Amount of available scratch now tracked properly by

  11. Non-Proprietary User Agreement

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Non-Proliferation Treaty

    Alliance/NREL 1-21-16 The Department of Energy has opted to utilize the following agreement for Designated Non-Proprietary User Facilities transactions. Because these transactions are widespread across Departmental facilities, uniformity in agreement terms is desirable. Except for the *** provisions, minor modifications to the terms of this agreement may be made by CONTRACTOR, but any changes to the *** provisions or substantive changes to the non *** provisons will

  12. Cohesive Zone Model User Element

    Energy Science and Technology Software Center (OSTI)

    2007-04-17

    Cohesive Zone Model User Element (CZM UEL) is an implementation of a Cohesive Zone Model as an element for use in finite element simulations. CZM UEL computes a nodal force vector and stiffness matrix from a vector of nodal displacements. It is designed for structural analysts using finite element software to predict crack initiation, crack propagation, and the effect of a crack on the rest of a structure.

  13. 2012 LANSCE Topical User Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2 LANSCE Topical User Meeting January 9-10, 2012 The Office of Defense Programs is developing a long-term strategy for the construction of new experimental science facilities supporting NNSA missions. The new facilities will provide the critical science and technology capabilities necessary to execute the 21 st century responsibilities of NNSA in executing its mission and in supporting the broader national security agenda. The call focuses on large facilities with costs exceeding $100M. The NNSA

  14. A photorespiratory bypass increases plant growth and seed yield in biofuel crop Camelina sativa

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Dalal, Jyoti; Lopez, Harry; Vasani, Naresh B.; Hu, Zhaohui; Swift, Jennifer E.; Yalamanchili, Roopa; Dvora, Mia; Lin, Xiuli; Xie, Deyu; Qu, Rongda; et al

    2015-10-29

    Camelina sativa is an oilseed crop with great potential for biofuel production on marginal land. The seed oil from camelina has been converted to jet fuel and improved fuel efficiency in commercial and military test flights. Hydrogenation-derived renewable diesel from camelina is environmentally superior to that from canola due to lower agricultural inputs, and the seed meal is FDA approved for animal consumption. However, relatively low yield makes its farming less profitable. Our study is aimed at increasing camelina seed yield by reducing carbon loss from photorespiration via a photorespiratory bypass. Genes encoding three enzymes of the Escherichia coli glycolatemore » catabolic pathway were introduced: glycolate dehydrogenase (GDH), glyoxylate carboxyligase (GCL) and tartronic semialdehyde reductase (TSR). These enzymes compete for the photorespiratory substrate, glycolate, convert it to glycerate within the chloroplasts, and reduce photorespiration. As a by-product of the reaction, CO2 is released in the chloroplast, which increases photosynthesis. Camelina plants were transformed with either partial bypass (GDH), or full bypass (GDH, GCL and TSR) genes. Furthermore, transgenic plants were evaluated for physiological and metabolic traits.« less

  15. Mechanism of RNA polymerase II bypass of oxidative cyclopurine DNA lesions

    SciTech Connect (OSTI)

    Walmacq, Celine; Wang, Lanfeng; Chong, Jenny; Scibelli, Kathleen; Lubkowska, Lucyna; Gnatt, Averell; Brooks, Philip J.; Wang, Dong; Kashlev, Mikhail

    2015-01-20

    In human cells, the oxidative DNA lesion 8,5'-cyclo-2'-deoxyadenosine (CydA) induces prolonged stalling of RNA polymerase II (Pol II) followed by transcriptional bypass, generating both error-free and mutant transcripts with AMP misincorporated immediately downstream from the lesion. Here, we present biochemical and crystallographic evidence for the mechanism of CydA recognition. Pol II stalling results from impaired loading of the template base (5') next to CydA into the active site, leading to preferential AMP misincorporation. Such predominant AMP insertion, which also occurs at an abasic site, is unaffected by the identity of the 5´-templating base, indicating that it derives from nontemplated synthesis according to an A rule known for DNA polymerases and recently identified for Pol II bypass of pyrimidine dimers. Subsequent to AMP misincorporation, Pol II encounters a major translocation block that is slowly overcome. The translocation block combined with the poor extension of the dA.rA mispair reduce transcriptional mutagenesis. Moreover, increasing the active-site flexibility by mutation in the trigger loop, which increases the ability of Pol II to accommodate the bulky lesion, and addition of transacting factor TFIIF facilitate CydA bypass. Thus, blocking lesion entry to the active site, trans-lesion A rule synthesis, and translocation block are common features of transcription across different bulky DNA lesions.

  16. Mechanism of RNA polymerase II bypass of oxidative cyclopurine DNA lesions

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Walmacq, Celine; Wang, Lanfeng; Chong, Jenny; Scibelli, Kathleen; Lubkowska, Lucyna; Gnatt, Averell; Brooks, Philip J.; Wang, Dong; Kashlev, Mikhail

    2015-01-20

    In human cells, the oxidative DNA lesion 8,5'-cyclo-2'-deoxyadenosine (CydA) induces prolonged stalling of RNA polymerase II (Pol II) followed by transcriptional bypass, generating both error-free and mutant transcripts with AMP misincorporated immediately downstream from the lesion. Here, we present biochemical and crystallographic evidence for the mechanism of CydA recognition. Pol II stalling results from impaired loading of the template base (5') next to CydA into the active site, leading to preferential AMP misincorporation. Such predominant AMP insertion, which also occurs at an abasic site, is unaffected by the identity of the 5´-templating base, indicating that it derives from nontemplated synthesismore » according to an A rule known for DNA polymerases and recently identified for Pol II bypass of pyrimidine dimers. Subsequent to AMP misincorporation, Pol II encounters a major translocation block that is slowly overcome. The translocation block combined with the poor extension of the dA.rA mispair reduce transcriptional mutagenesis. Moreover, increasing the active-site flexibility by mutation in the trigger loop, which increases the ability of Pol II to accommodate the bulky lesion, and addition of transacting factor TFIIF facilitate CydA bypass. Thus, blocking lesion entry to the active site, trans-lesion A rule synthesis, and translocation block are common features of transcription across different bulky DNA lesions.« less

  17. Fan System Assessment Tool User Manual | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    User Manual Fan System Assessment Tool User Manual This user manual will help users understand how to use AMO's Fan System Assessment Tool. Fan System Assessment Tool User Manual ...

  18. T-531: The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500

    Broader source: Energy.gov [DOE]

    The WebVPN implementation on Cisco Adaptive Security Appliances (ASA) 5500 series devices with software before 8.2(3) permits the viewing of CIFS shares even when CIFS file browsing has been disabled, which allows remote authenticated users to bypass intended access restrictions via CIFS requests, aka Bug ID CSCsz80777.

  19. Users Manual for the FEHMN application

    SciTech Connect (OSTI)

    Zyvoloski, G.A.; Robinson, B.A.; Dash, Z.V.; Trease, L.L.

    1996-09-01

    The user`s manual documents the use of the Yucca Mountain Site Characterization Projects Finite element heat and mass transfer code (FEHMN) application. The manual covers: Program considerations, data files, input data, output, system interface, and examples.

  20. NERSC Releases Mobile Apps to Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Releases Mobile Apps to Users NERSC Releases Mobile Apps to Users Job Status, MOTD and Pilot of VASP Submission Available with More to Come April 23, 2012 In an effort to make...

  1. Foreign Users | Stanford Synchrotron Radiation Lightsource

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... Advance approval is required for users from Iran, Sudan or Syria. Foreign national users who were born in, are citizens of, or represent organizations from Iran, Sudan or Syria, ...

  2. User:Myenergy | Open Energy Information

    Open Energy Info (EERE)

    User page Edit with form History User:Myenergy Jump to: navigation, search Myenergy vertical styled.png Name MyEnergy Location Boston, Massachusetts Edits 4 MyEnergy is a leading...

  3. User:Joebloggs | Open Energy Information

    Open Energy Info (EERE)

    search Doofenshmirtz biteguard.png Name Joe Bloggs Location World Edits 3 This is a test user from someone on the OpenEI team. This user will simulate various spam to make sure...

  4. User:GregZiebold | Open Energy Information

    Open Energy Info (EERE)

    Energy Info Google Group Open Energy Info Twitter OpenEI YouTube Channel OpenEI Blog My test pages: User:GregZieboldGateway test User:GregZieboldSemantic Map test...

  5. User:Harris | Open Energy Information

    Open Energy Info (EERE)

    Harris Jump to: navigation, search Name harris Location Houston, Texas Edits 2 Friends User Edits DWC Bot 12006 Retrieved from "http:en.openei.orgwindex.php?titleUser:Harris&o...

  6. E-print Network : User Account

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    New Search | My Selections (0) | | | | Alerts | E-print Network Create User Account User Name: Email Address: I want to: Always receive emails Receive emails if there are new...

  7. MAMA- User Feedback and Training Summary

    SciTech Connect (OSTI)

    Porter, Reid B.; Ruggiero, Christy E.

    2014-05-21

    This document describes the current state of the MAMA (Morphological Analysis of Materials) software user identified bugs, issues, and requests for improvements. It also lists Current users and current training methods.

  8. User Access Program | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... The PEB, an external panel of peer reviewers, evaluates CNM user proposals. PEB reviewers are directed to treat user proposals as confidential documents and to inform the CNM of ...

  9. Manufactured Home Energy Audit user`s manual

    SciTech Connect (OSTI)

    1997-09-01

    The Manufactured Home Energy Audit (MHEA) is a software tool that predicts manufactured home energy consumption and recommends weatherization retrofit measures. It was developed to assist local weatherization agencies working with the US Department of Energy (DOE) Weatherization Assistance Program. Whether new or experienced, employed within or outside the Weatherization Assistance Program, all users can benefit from incorporating MHEA into their manufactured home weatherization programs. DOE anticipates that the state weatherization assistance programs that incorporate MHEA into their programs will find significant growth in the energy and cost savings achieved from manufactured home weatherization. The easy-to-use MHEA displays a colorful, graphical interface for entering simple inputs and provides understandable, usable results. The user enters information about the manufactured home construction, heating equipment, cooling equipment, and weather site. MHEA then calculates annual energy consumption using a simplified building energy analysis technique. MHEA stands apart from other building energy analysis tools in many ways. Calculations incorporated into the computer code specifically address manufactured home heating and cooling load trends. The retrofit measures evaluated by MHEA are all applicable to manufactured homes. Help messages describe common manufactured home weatherization practices as well as provide hints on how to install retrofit measures. These and other features help make MHEA easy to use when evaluating energy consumption and the effects of weatherization retrofit measures for manufactured homes.

  10. User:Mptonko | Open Energy Information

    Open Energy Info (EERE)

    Mptonko Jump to: navigation, search Edits 456 Retrieved from "http:en.openei.orgwindex.php?titleUser:Mptonko&oldid74785...

  11. User:Pgray | Open Energy Information

    Open Energy Info (EERE)

    Pgray Jump to: navigation, search Edits 203 Retrieved from "http:en.openei.orgwindex.php?titleUser:Pgray&oldid814210...

  12. User and Performance Impacts from Franklin Upgrades

    SciTech Connect (OSTI)

    He, Yun

    2009-05-10

    The NERSC flagship computer Cray XT4 system"Franklin" has gone through three major upgrades: quad core upgrade, CLE 2.1 upgrade, and IO upgrade, during the past year. In this paper, we will discuss the various aspects of the user impacts such as user access, user environment, and user issues etc from these upgrades. The performance impacts on the kernel benchmarks and selected application benchmarks will also be presented.

  13. User:Clarknd | Open Energy Information

    Open Energy Info (EERE)

    Clarknd Jump to: navigation, search Edits 1961 Retrieved from "http:en.openei.orgwindex.php?titleUser:Clarknd&oldid508286...

  14. MRDAP User/Developer Documentation

    SciTech Connect (OSTI)

    Joshua Cogliati; Michael Milvich

    2009-09-01

    The Multi-Reactor Design and Analysis Platform (MRDAP) is designed to simplify the creation, transfer and processing of data between computational codes. MRDAP accomplishes these objectives with three parts: 1. allows each integrated code, through a plugin, to specify the required input for execution and the required output needed, 2. creates an interface for execution and data transfer, 3. enables the creation of Graphical User Interfaces (GUI) to assist with input preparation and data visualization. Ultimately, the main motivation of this work is to enable analysts (who perform reactor physics calculations routinely), by providing a tool that increases efficiency and minimizes the potential for errors or failed executions.

  15. CADCAM-009: VERTRAN user's manual

    SciTech Connect (OSTI)

    Blackledge, M.A.

    1985-01-01

    Sandia National Laboratories has been assigned Lead Lab responsibility by the Department of Energy (DOE) for integrating computer-aided design/computer-aided manufacturing (CAD/CAM) activities throughout DOE's Nuclear Weapons Complex (NWC). A primary objective is automating the exchange of product definition data within the NWC. It is essential that data integrity be preserved and verified following each such data exchange. VERTRAN (for VERification of TRANsferred data) is a software based method for detecting differences in the geometric data of a computer product definition file that has been transferred from one CAD system to another. Complete user instructions and program responses are provided.

  16. Michael Stewart! NERSC User Services

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Michael Stewart! NERSC User Services Compilers on NERSC Systems --- 1 --- September 10, 2013 Compilers on NERSC Systems Crays ( Hopper a nd E dison) PrgEnv m odules p rovide l inks t o M PI a nd m ath l ibrary l ibraries a nd includes. Invoke c ompilers w ith w rapper c ommands a nd t he l oaded PrgEnv m odule will i nvoke t he p roper c ompiler: ?n ( Fortran), c c ( C c ompiler), a nd C C ( C+ +). Available c ompiler m odules: pgi ( only o n H opper), i ntel, c ray, a nd g nu (gcc). Default

  17. Ahn-ANL_User_Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    OPPORTUNITIES WITH THE PROTOTYPE AT-TPC AT ATLAS Tan Ahn! National Superconducting Cyclotron Lab, Michigan State University! ! Single-Particle Structure and Reactions Session! ATLAS Users Meeting! May 15, 2014 PROTOTYPE AT-TPC e - e - e - e - e - e - e - e - e - e - e - e - D. Suzuki et al., NIM A 660, 64 (2011) PROTOTYPE AT-TPC e - e - e - e - e - e - e - e - e - e - e - e - active-target volume D. Suzuki et al., NIM A 660, 64 (2011) PROTOTYPE AT-TPC e - e - e - e - e - e - e - e - e - e - e -

  18. 2014 PDSF User Meeting Minutes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4 Minutes 2014 PDSF User Meeting Minutes December 2 Attending Jeff Outages / Downtimes 11/11 NERSC / PDSF maintenance 11/18 project hours Upcoming Downtime None Other Issues New Mendel nodes are online. Slides The slides from the meeting can be found here. November 4 Attending Jeff, Mike Outages / Downtime 10/20 NERSC CA and NEWT outage Upcoming Downtime 11/11 8:00 am to 6:00 pm maintenance Other Issues PDSF old home hardware is being retired. Please check your scripts for "/home" or

  19. 2015 PDSF User Meeting Minutes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    5 Minutes 2015 PDSF User Meeting Minutes January 6 Attending Jeff, Craig, Ernst, Lisa Outages/Downtimes None Upcoming Downtimes February 11 all day maintenance Other Issues Would like to retire SL53, please let Lisa know who's still using it and what's needed in SL6x. Slides You can find the slides shown at the meeting here. February 3 Attending Mike, Jeff, Lisa Outages/Downtimes 1/13: pdsfdtn2 maintenance 1/20: Power sag caused several nodes to lose GPFS, jobs failed 1/22: Global homes and

  20. User's guide to DOE facilities

    SciTech Connect (OSTI)

    Not Available

    1984-01-01

    The Department of Energy's research laboratories represent valuable, often unique, resources for university and industrial scientists. It is DOE policy to make these laboratories and facilities available to qualified scientists. The answers to such questions as who are eligible, what and where are the facilities, what is the cost, when can they be used, are given. Data sheets are presented for each facility to provide information such as location, user contact, description of research, etc. A subject index refers to areas of research and equipment available.

  1. 2011 PDSF Users Meeting Minutes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2011 PDSF Users Meeting Minutes December 20 Attending: Eric Larry Iwona Mike Alex Hiroshi JeffP Lisa December 6 Attending: Eric, Iwona, Mike, Larry, Lisa November 22 Attending: Eric Iwona Mike Larry Lisa JeffP Ernst November 8 Attending: Eric Iwona JeffP JeffA Mike Craig October 25 Attending: Eric Marjorie Lisa Elizabeth October 11 Attending: Eric Mike Larry Iwona JeffA September 27 Attending: Eric Elizabeth, Larry, Lisa, JeffP, JeffA, Craig, Iwona, Mike September 13 Attending: Eric, Larry,

  2. 2012 NERSC User Survey Text

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Sustainable, and Recyclable Design | Department of Energy 2 London Olympics Go for the Green with Its Energy Efficient, Sustainable, and Recyclable Design 2012 London Olympics Go for the Green with Its Energy Efficient, Sustainable, and Recyclable Design July 26, 2012 - 12:00pm Addthis Olympic stadium, with a roof made of 2,500 tons of steel tubing from recycled gas pipelines, is one example of sustainable design that is part of London's 500-acre Olympic Park. | Photo courtesy of iStock user

  3. 2012 PDSF Users Meeting Minutes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2012 PDSF Users Meeting Minutes June 19 Attending: Larry, Katie, Craig, Mike Hence, Jay, Ernst Read More » June 5 Attending: Larry, Katie, Craig, Mike Hence, Jay, Ernst Read More » May 22 Attending: Larry, Katie, Craig, Mike Hence, Jay, Ernst Read More » May 8 Attending: Eric Iwona Ernst Mike Lisa JeffP Larry Read More » April 24 Attending: Eric, Iwona, Chris Powell, Clayton, Mike, Lisa Read More » April 10 Attending: Eric Iwona Larry Evan JeffP Lisa Tom Mike Gene Read More » March 27

  4. 26th Annual Users' Conference

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    99users_conf.jpg (48161 bytes) registration_button.jpg (2015 bytes) program_button.jpg (1761 bytes) poster_button.jpg (1838 bytes) lytle_award.jpg ballot_button.jpg (2231 bytes) lodging_button.jpg (1708 bytes) directions_button.jpg (2196 bytes) visitor_button.jpg (1800 bytes) For Additional Information Contact: Michelle Steger steger.gif (1133 bytes) SSRL, MS 99 PO Box 4349 Stanford, CA 94309-0210 Phone: (650) 926-3011 Fax: (650) 926-3600 Last Update: August 3, 1999 by Lisa Dunn Image16.gif (32

  5. EMC User Safety | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Argonne Policies Safety at Work EMC User Safety Scheduled Maintenance Periods Transportation For Industrial Users Acknowledgment Statements for Publications End of Experiment Survey Users Executive Committee People Publications 2015 Publications 2014 Publications 2013 Publications 2012 Publications 2011 Publications 2010 Publications 2009 Publications 2008 Publications 2007 Publications 2006 Publications Fact Sheets & Other Documents Acknowledgment Statement News & Events RESEARCH

  6. User Facilities at Argonne | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Facilities at Argonne Argonne National Laboratory designs, builds, and operates national scientific user facilities for the benefit of researchers from industry, academia, and government laboratories. These one-of-a-kind facilities attract great minds from all over the nation to solve society's complex scientific problems. PDF icon User_Facilities

  7. 2012 PATRIOT SCRIPT User's Guide

    SciTech Connect (OSTI)

    Cuellar, Leticia; Cleland, Timothy J.; Kubicek, Deborah A.; Mathis, Mark M.; Stroud, Phillip D.

    2012-05-31

    PATRIOT Script is an application that executes Patriot batch runs. This document provides a description of this application and how to run it. The basic user access tool PATRIOT Client allows a user to generate several most reliable paths in one run: one can specify a list of sources (origins) and targets, and PATRIOT finds for a given architecture option and one choice of device all the most reliable paths between all these sources and targets. The main objective of PATRIOT Script is to provide a tool for making automatic PATRIOT runs not only for a prespecified set of sources and targets, but also for a pre-specified set of devices and various architecture options. Running PATRIOT Script requires two basic steps that will be explained in more detail next: (1) Pre-preparation of an excel spreadsheet with the information about the desired runs; and (2) Opening the PATRIOT Script application, reading in the excel-spreadsheet and running the desired scenarios. Sections 1 and 2 explain each of these steps, and section 3 describes the output of the PATRIOT Script. For a detail description of the models and data behind PATRIOT and a detailed explanation of all the architecture options see [1]. For instructions of how to run PATRIOT Client see [2].

  8. Call for General User Proposals - Upcoming Deadline

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Call for General User Proposals - Upcoming Deadline Call for General User Proposals - Upcoming Deadline Print The User Office is accepting new General User Proposals (GUPs) from scientists who wish to conduct research at the ALS in the 2016-2 July-Dec cycle. PROPOSAL SUBMISSION DEADLINE: March 2, 2016 Please log in to ALSHub to submit a new GUP or to make a Beam Time Request (BTR) on an existing active proposal. Users are reminded that they need to have an ALSHub account to submit proposals, and

  9. 2016-06-pdsf-user-meet

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    -06-07 PDSF Users Meeting 1 PDSF Users Meeting June 7, 2016 Jan Balewski 2016-06-07 PDSF Users Meeting Utilization 2 May 24 planned shut down 2016-06-07 PDSF Users Meeting Past/future outages 3 Past May 25 - NERSC quarterly shutdown Future June 11 - bldg 59 no power Impact: disabled pdsfNN login nodes reduce batch system capacity (Mendel is down) 2016-06-07 PDSF Users Meeting Announcements 4 Bi-weekly office hours in June * Wednesday, June 8, 2-4 pm , 59-3034-CR * Thursday, June 23, 2-4pm,

  10. Parallel community climate model: Description and user`s guide

    SciTech Connect (OSTI)

    Drake, J.B.; Flanery, R.E.; Semeraro, B.D.; Worley, P.H.

    1996-07-15

    This report gives an overview of a parallel version of the NCAR Community Climate Model, CCM2, implemented for MIMD massively parallel computers using a message-passing programming paradigm. The parallel implementation was developed on an Intel iPSC/860 with 128 processors and on the Intel Delta with 512 processors, and the initial target platform for the production version of the code is the Intel Paragon with 2048 processors. Because the implementation uses a standard, portable message-passing libraries, the code has been easily ported to other multiprocessors supporting a message-passing programming paradigm. The parallelization strategy used is to decompose the problem domain into geographical patches and assign each processor the computation associated with a distinct subset of the patches. With this decomposition, the physics calculations involve only grid points and data local to a processor and are performed in parallel. Using parallel algorithms developed for the semi-Lagrangian transport, the fast Fourier transform and the Legendre transform, both physics and dynamics are computed in parallel with minimal data movement and modest change to the original CCM2 source code. Sequential or parallel history tapes are written and input files (in history tape format) are read sequentially by the parallel code to promote compatibility with production use of the model on other computer systems. A validation exercise has been performed with the parallel code and is detailed along with some performance numbers on the Intel Paragon and the IBM SP2. A discussion of reproducibility of results is included. A user`s guide for the PCCM2 version 2.1 on the various parallel machines completes the report. Procedures for compilation, setup and execution are given. A discussion of code internals is included for those who may wish to modify and use the program in their own research.

  11. User Statistics | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Statistics User Facilities User Facilities Home User Facilities at a Glance User Resources User Statistics By Institution By Project Data Archive User Statistics Collection Practices Policies and Processes Frequently Asked Questions User Facility Science Highlights User Facility News Contact Information Office of Science U.S. Department of Energy 1000 Independence Ave., SW Washington, DC 20585 P: (202) 586-5430 User Statistics Print Text Size: A A A FeedbackShare Page The Office of Science

  12. 2015 APS/CNM/EMC Users Meeting | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2015 Users Meeting 2014 Users Meeting 2013 Users Meeting 2012 Users Meeting 2011 Users Meeting 2009 Users Meeting 2008 Users Meeting 2007 Users Meeting Workshops Photos Videos Career Opportunities CNM Intranet CNM on Facebook Career Opportunities CNM Intranet CNM on Facebook Argonne National Laboratory Center for Nanoscale Materials About Research Capabilities For Users People Publications News & Events News & Events RESEARCH HIGHLIGHTS COLLOQUIUM SERIES SEMINAR SERIES Argonne Press

  13. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  14. Notification of General User Proposal and Approved Program Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Notification of General User Proposal and Approved Program Results Notification of General User Proposal and Approved Program Results Print by Sue Bailey, User Services Group...

  15. V-093: Symantec PGP Desktop Buffer Overflows Let Local Users...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Secure Mobility Client Heap Overflow Lets Local Users Gain Elevated Privileges V-066: Adobe AcrobatReader Multiple Flaws Lets Remote Users Execute Arbitrary Code and Local Users...

  16. User Agreements | U.S. DOE Office of Science (SC)

    Office of Science (SC) Website

    Getting Started User Safety Access Models User Agreements Data Management Resources ... of intellectual property and data rights from the work undertaken at the user facility. ...

  17. Integrating end-to-end encryption and authentication technology into broadband networks

    SciTech Connect (OSTI)

    Pierson, L.G.

    1995-11-01

    BISDN services will involve the integration of high speed data, voice, and video functionality delivered via technology similar to Asynchronous Transfer Mode (ATM) switching and SONET optical transmission systems. Customers of BISDN services may need a variety of data authenticity and privacy assurances, via Asynchronous Transfer Mode (ATM) services Cryptographic methods can be used to assure authenticity and privacy, but are hard to scale for implementation at high speed. The incorporation of these methods into computer networks can severely impact functionality, reliability, and performance. While there are many design issues associated with the serving of public keys for authenticated signaling and for establishment of session cryptovariables, this paper is concerned with the impact of encryption itself on such communications once the signaling and setup have been completed. Network security protections should be carefully matched to the threats against which protection is desired. Even after eliminating unnecessary protections, the remaining customer-required network security protections can impose severe performance penalties. These penalties (further discussed below) usually involve increased communication processing for authentication or encryption, increased error rate, increased communication delay, and decreased reliability/availability. Protection measures involving encryption should be carefully engineered so as to impose the least performance, reliability, and functionality penalties, while achieving the required security protection. To study these trade-offs, a prototype encryptor/decryptor was developed. This effort demonstrated the viability of implementing certain encryption techniques in high speed networks. The research prototype processes ATM cells in a SONET OC-3 payload. This paper describes the functionality, reliability, security, and performance design trade-offs investigated with the prototype.

  18. Designing a minimum-functionality neutron and gamma measurement instrument with a focus on authentication

    SciTech Connect (OSTI)

    Karpius, Peter J; Williams, Richard B

    2009-01-01

    During the design and construction of the Next-Generation Attribute-Measurement System, which included a largely commercial off-the-shelf (COTS), nondestructive assay (NDA) system, we realized that commercial NDA equipment tends to include numerous features that are not required for an attribute-measurement system. Authentication of the hardware, firmware, and software in these instruments is still required, even for those features not used in this application. However, such a process adds to the complexity, cost, and time required for authentication. To avoid these added authenticat ion difficulties, we began to design NDA systems capable of performing neutron multiplicity and gamma-ray spectrometry measurements by using simplified hardware and software that avoids unused features and complexity. This paper discusses one possible approach to this design: A hardware-centric system that attempts to perform signal analysis as much as possible in the hardware. Simpler processors and minimal firmware are used because computational requirements are kept to a bare minimum. By hard-coding the majority of the device's operational parameters, we could cull large sections of flexible, configurable hardware and software found in COTS instruments, thus yielding a functional core that is more straightforward to authenticate.

  19. STOMP Subsurface Transport Over Multiple Phases: User`s guide

    SciTech Connect (OSTI)

    White, M.D.; Oostrom, M.

    1997-10-01

    The U.S. Department of Energy, through the Office of Technology Development, has requested the demonstration of remediation technologies for the cleanup of volatile organic compounds and associated radionuclides within the soil and groundwater at arid sites. This demonstration program, called the VOC-Arid Soils Integrated Demonstration Program (Arid-ID), has been initially directed at a volume of unsaturated and saturated soil contaminated with carbon tetrachloride, on the Hanford Site near Richland, Washington. A principal subtask of the Arid-ID program involves the development of an integrated engineering simulator for evaluating the effectiveness and efficiency of various remediation technologies. The engineering simulator`s intended users include scientists and engineers who are investigating soil physics phenomena associated with remediation technologies. Principal design goals for the engineer simulator include broad applicability, verified algorithms, quality assurance controls, and validated simulations against laboratory and field-scale experiments. An important goal for the simulator development subtask involves the ability to scale laboratory and field-scale experiments to full-scale remediation technologies, and to transfer acquired technology to other arid sites. The STOMP (Subsurface Transport Over Multiple Phases) simulator has been developed by the Pacific Northwest National Laboratory for modeling remediation technologies. Information on the use, application, and theoretical basis of the STOMP simulator theory and discussions on the governing equations, constitutive relations, and numerical solution algorithms for the STOMP simulator.

  20. Anaerobic digestion analysis model: User`s manual

    SciTech Connect (OSTI)

    Ruth, M.; Landucci, R.

    1994-08-01

    The Anaerobic Digestion Analysis Model (ADAM) has been developed to assist investigators in performing preliminary economic analyses of anaerobic digestion processes. The model, which runs under Microsoft Excel{trademark}, is capable of estimating the economic performance of several different waste digestion process configurations that are defined by the user through a series of option selections. The model can be used to predict required feedstock tipping fees, product selling prices, utility rates, and raw material unit costs. The model is intended to be used as a tool to perform preliminary economic estimates that could be used to carry out simple screening analyses. The model`s current parameters are based on engineering judgments and are not reflective of any existing process; therefore, they should be carefully evaluated and modified if necessary to reflect the process under consideration. The accuracy and level of uncertainty of the estimated capital investment and operating costs are dependent on the accuracy and level of uncertainty of the model`s input parameters. The underlying methodology is capable of producing results accurate to within {+-} 30% of actual costs.

  1. Profiling users in the UNIX os environment

    SciTech Connect (OSTI)

    Dao, V N P; Vemuri, R; Templeton, S J

    2000-09-29

    This paper presents results obtained by using a method of profiling a user based on the login host, the login time, the command set, and the command set execution time of the profiled user. It is assumed that the user is logging onto a UNIX host on a computer network. The paper concentrates on two areas: short-term and long-term profiling. In short-term profiling the focus is on profiling the user at a given session where user characteristics do not change much. In long-term profiling, the duration of observation is over a much longer period of time. The latter is more challenging because of a phenomenon called concept or profile drift. Profile drift occurs when a user logs onto a host for an extended period of time (over several sessions).

  2. Open cycle ocean thermal energy conversion steam control and bypass system

    DOE Patents [OSTI]

    Wittig, J. Michael; Jennings, Stephen J.

    1980-01-01

    Two sets of hinged control doors for regulating motive steam flow from an evaporator to a condenser alternatively through a set of turbine blades in a steam bypass around the turbine blades. The evaporator has a toroidal shaped casing situated about the turbine's vertical axis of rotation and an outlet opening therein for discharging motive steam into an annular steam flow path defined between the turbine's radially inner and outer casing structures. The turbine blades extend across the steam flow path intermediate the evaporator and condenser. The first set of control doors is arranged to prevent steam access to the upstream side of the turbine blades and the second set of control doors acts as a bypass around the blades so as to maintain equilibrium between the evaporator and condenser during non-rotation of the turbine. The first set of control doors preferably extend, when closed, between the evaporator casing and the turbine's outer casing and, when open, extend away from the axis of rotation. The second set of control doors preferably constitute a portion of the turbine's outer casing downstream from the blades when closed and extend, when open, toward the axis of rotation. The first and second sets of control doors are normally held in the open and closed positions respectively by locking pins which may be retracted upon detecting an abnormal operating condition respectively to permit their closing and opening and provide steam flow from the evaporator to the condenser.

  3. Electrical and thermal finite element modeling of arc faults in photovoltaic bypass diodes.

    SciTech Connect (OSTI)

    Bower, Ward Isaac; Quintana, Michael A.; Johnson, Jay

    2012-01-01

    Arc faults in photovoltaic (PV) modules have caused multiple rooftop fires. The arc generates a high-temperature plasma that ignites surrounding materials and subsequently spreads the fire to the building structure. While there are many possible locations in PV systems and PV modules where arcs could initiate, bypass diodes have been suspected of triggering arc faults in some modules. In order to understand the electrical and thermal phenomena associated with these events, a finite element model of a busbar and diode was created. Thermoelectrical simulations found Joule and internal diode heating from normal operation would not normally cause bypass diode or solder failures. However, if corrosion increased the contact resistance in the solder connection between the busbar and the diode leads, enough voltage potentially would be established to arc across micron-scale electrode gaps. Lastly, an analytical arc radiation model based on observed data was employed to predicted polymer ignition times. The model predicted polymer materials in the adjacent area of the diode and junction box ignite in less than 0.1 seconds.

  4. FES User Facilities | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FES User Facilities User Facilities User Facilities Home User Facilities at a Glance All User Facilities ASCR User Facilities BES User Facilities BER User Facilities FES User Facilities HEP User Facilities NP User Facilities User Resources User Statistics Policies and Processes Frequently Asked Questions User Facility Science Highlights User Facility News Contact Information Office of Science U.S. Department of Energy 1000 Independence Ave., SW Washington, DC 20585 P: (202) 586-5430 User

  5. ASCR User Facilities | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ASCR User Facilities User Facilities User Facilities Home User Facilities at a Glance All User Facilities ASCR User Facilities BES User Facilities BER User Facilities FES User Facilities HEP User Facilities NP User Facilities User Resources User Statistics Policies and Processes Frequently Asked Questions User Facility Science Highlights User Facility News Contact Information Office of Science U.S. Department of Energy 1000 Independence Ave., SW Washington, DC 20585 P: (202) 586-5430 User

  6. All User Facilities | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    All User Facilities User Facilities User Facilities Home User Facilities at a Glance All User Facilities ASCR User Facilities BES User Facilities BER User Facilities FES User Facilities HEP User Facilities NP User Facilities User Resources User Statistics Policies and Processes Frequently Asked Questions User Facility Science Highlights User Facility News Contact Information Office of Science U.S. Department of Energy 1000 Independence Ave., SW Washington, DC 20585 P: (202) 586-5430 User

  7. HEP User Facilities | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    HEP User Facilities User Facilities User Facilities Home User Facilities at a Glance All User Facilities ASCR User Facilities BES User Facilities BER User Facilities FES User Facilities HEP User Facilities NP User Facilities User Resources User Statistics Policies and Processes Frequently Asked Questions User Facility Science Highlights User Facility News Contact Information Office of Science U.S. Department of Energy 1000 Independence Ave., SW Washington, DC 20585 P: (202) 586-5430 User

  8. NIF and Jupiter User Group Meeting 2014

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    workshops / user group 2014 / NIF and Jupiter User Group Meeting 2014 About the NIF and Jupiter User Group Meeting The 192-beam National Ignition Facility (NIF), the most energetic inertial confinement fusion (ICF) facility in the world, is now operational. The NIF laser's unprecedented power, precision, and reproducibility, coupled with over 50 available diagnostics and sophisticated target fabrication capability, enable a wide range of leading edge scientific experiments. Initial experiments

  9. ORPS User Registration Form | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    User Registration Form ORPS User Registration Form September 1, 2015 Operational Event Information Systems Registration Form For Occurrence Reporting and Processing System ORPS User Registration Form (486.14 KB) More Documents & Publications ORPS Facility Registration Form Occurrence Reporting and Processing System (ORPS) - PISA: TRU Waste Drums Containing Treated Nitrate Salts May Challenge the Safety Analysis Microsoft Word - CHAP02ESH _REVISED1_3.doc

  10. MAESTRO Beamline Set to Open to Users

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MAESTRO Beamline Set to Open to Users MAESTRO Beamline Set to Open to Users Print It was 10 years ago that ALS Senior Staff Scientist Eli Rotenberg devised the name Microscopic and Electronic STRucture Observatory, or MAESTRO, for his long-envisioned beamline dedicated to the determination of the electronic structure of materials at the mesoscopic length scale. This September, the beamline, 7.0.2, will accept general user proposals for the first time, offering researchers unparalleled

  11. User Data Forum and HPCOR Logistics

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Logistics User Data Forum and HPCOR Logistics Joint Facilities User Forum on Data Intensive Computing June 16-18, 2014 Oakland City Center Conference Center 500 12th Street, Suite 105 Oakland, CA DOE HPC Operations Review (HPCOR) June 17, 2014 (Joint with Joint Facilities User Forum on Data Intensive Computing) Oakland City Center Conference Center 500 12th Street, Suite 105 Oakland, CA June 18-19, 2014 California State University, East Bay Trans Bay Center 1000 Broadway, Suite 109 Oakland, CA

  12. Microsoft Word - CR Users Policy1110.doc

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    CAMD Cleanroom Users Policy revised 04/11 Statement of Work: A cleanroom environment for processing and m etrology is required for precisi on and reproducibility in Microfabrication. Rules and regulations have been devised to ensure sa fety, high yield, and reliable operation for users and the facility. I. Equipment Use ď‚· Equipment training is conducted by the designated equipment manager or appointed Cleanroom Staff . Staff members are ass igned designated machines in which users can request

  13. Users: Scientists, Students & Postdocs | Jefferson Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Users: Scientists, Students & Postdocs New User Checklist us citizen non-us-citizen An invitation letter is required at the port of entry for all non-U.S.citizens requesting a business visa (B-1, WB) to participate in research, workshops, conferences and meetings at Jefferson Lab. These activities are prohibited with tourist visa (B-2, WT) The User Liaison Office is available to assist all visiting scientists and students seeking ID badges, training, computer accounts and all other matters

  14. 27th Annual SSRL Users' Meeting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Need more information? Contact the User Administration Office 27th Annual Stanford Synchrotron Radiation Laboratory Users' Meeting Stanford, California USA October 18-21, 2000 Meeting Chairs: Paul Foster (UC San Francisco) Jan LĂĽning (SSRL) The Stanford Synchrotron Radiation Laboratory (SSRL) Users' Meeting provides a forum for the presentation and discussion of recent developments and experimental results at SSRL or relating to synchrotron radiation sources. Surveys of these new developments

  15. New User and Data Analytics Training

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    New User and Data Analytics Training New User and Data Analytics Training February 23, 2015 Monday, Feb. 23 - New User and Data Analytics Training NERSC (Berkeley Lab Building 943), 415 20th Street, Oakland, CA If you plan to attend, please register here. There is no registration fee, but your registration helps us plan the event. To attend remotely via WebEx, please see Remote Setup. Note that the morning session "New User Training" and the afternoon session "Data and Analytics

  16. User Shipments | Linac Coherent Light Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... stockpiling or use of a nuclear explosive device, chemical or biological weapons, or missiles; The user understands that SLAC will only return materials, samples and other items ...

  17. User Shipments | Stanford Synchrotron Radiation Lightsource

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    ... stockpiling or use of a nuclear explosive device, chemical or biological weapons, or missiles; the user understands that SLAC will only return materials, samples and other items ...

  18. User:Lkastler | Open Energy Information

    Open Energy Info (EERE)

    Jump to: navigation, search Edits 1 Retrieved from "http:en.openei.orgwindex.php?titleUser:Lkastler&oldid888618" Feedback Contact needs updating Image needs...

  19. User:Dbgrantham | Open Energy Information

    Open Energy Info (EERE)

    Dbgrantham Jump to: navigation, search Name dbgrantham Edits 1 Retrieved from "http:en.openei.orgwindex.php?titleUser:Dbgrantham&oldid2970...

  20. User:Angeliecook | Open Energy Information

    Open Energy Info (EERE)

    Angeliecook Jump to: navigation, search Name Angelie Cook Edits 2 Retrieved from "http:en.openei.orgwindex.php?titleUser:Angeliecook&oldid712575...

  1. User:Enaname | Open Energy Information

    Open Energy Info (EERE)

    Enaname Jump to: navigation, search Name ENANAME Location San Diego County, California Edits 1 Retrieved from "http:en.openei.orgwindex.php?titleUser:Enaname&oldid522220...

  2. User:Dflower | Open Energy Information

    Open Energy Info (EERE)

    Dflower Jump to: navigation, search Name Drew Flower Edits 5 ABCD Retrieved from "http:en.openei.orgwindex.php?titleUser:Dflower&oldid576860...

  3. User:Arondobos | Open Energy Information

    Open Energy Info (EERE)

    Arondobos Jump to: navigation, search Name Aron Dobos Location Denver, CO Edits 1 Retrieved from "http:en.openei.orgwindex.php?titleUser:Arondobos&oldid266766...

  4. User:WolfgangFahl | Open Energy Information

    Open Energy Info (EERE)

    WolfgangFahl Jump to: navigation, search Name Wolfgang Fahl Edits 1 Retrieved from "http:en.openei.orgwindex.php?titleUser:WolfgangFahl&oldid877450...

  5. User:Imasonaz | Open Energy Information

    Open Energy Info (EERE)

    Imasonaz Jump to: navigation, search Location Arizona Edits 74 Retrieved from "http:en.openei.orgwindex.php?titleUser:Imasonaz&oldid805916...

  6. User:Nmatin | Open Energy Information

    Open Energy Info (EERE)

    Nmatin Jump to: navigation, search Retrieved from "http:en.openei.orgwindex.php?titleUser:Nmatin&oldid658628" Feedback Contact needs updating Image needs updating...

  7. Diatom Genomics (2009 JGI User Meeting)

    ScienceCinema (OSTI)

    Ambrust, Ginger

    2011-04-25

    Ginger Armbrust from the University of Washington spoke about diatom genomics on March 26, 2009 at the DOE JGI User Meeting

  8. APS User Information | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to APS, site access permission, user agreement, training, contactbio information your research: proposals, ESAFs, EEFs action items: things that need to be addressed before you...

  9. User:Dmulcahy | Open Energy Information

    Open Energy Info (EERE)

    Dmulcahy Jump to: navigation, search Name David Mulcahy Location Chapel Hill, North Carolina Edits 50 Friends User Edits ylin 14 Retrieved from "http:en.openei.orgw...

  10. BL 11-2 User Support

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    User Support - header Beam Line Status Optics Configuration Model Compound Library Glitch Curves Instrumentation - header Detectors Data Collecting Software Experimental Design...

  11. Property:Tool Users | Open Energy Information

    Open Energy Info (EERE)

    "Tool Users" Showing 1 page using this property. N National Residential Efficiency Measures Database + The National Residential Efficiency Measures Database is a publicly...

  12. Advanced Notification of Awards (ANA) User Guide

    Energy Savers [EERE]

    a pop-up window with instructions appears as displayed below. The user selects the "OK" button to exit the instructions. Approving Notifications When there is pending award...

  13. Giselle Jiles and Angel Hernandez, User Office

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    to visit, and birth announcements. "The users know that I have a weakness for chocolate," jokes Jiles. Hernandez describes his job as "culturally infusing" because of the...

  14. Diatom Genomics (2009 JGI User Meeting)

    SciTech Connect (OSTI)

    Ambrust, Ginger

    2009-03-26

    Ginger Armbrust from the University of Washington spoke about diatom genomics on March 26, 2009 at the DOE JGI User Meeting

  15. RTECS 1994 Public Use User's Guide

    U.S. Energy Information Administration (EIA) Indexed Site

    Banner 1994 RTECS Public Use Data User's Guide TABLE OF CONTENTS Survey Background 1994 RTECS Published Report How to Obtain Products and Services Printed Publications...

  16. User:Jamescook | Open Energy Information

    Open Energy Info (EERE)

    Jamescook Jump to: navigation, search Name James Cook Location Alabama Edits 6 Retrieved from "http:en.openei.orgwindex.php?titleUser:Jamescook&oldid795136...

  17. User:Psuwind | Open Energy Information

    Open Energy Info (EERE)

    Psuwind Jump to: navigation, search Name Pennsylvania Wind Application Center Location PA Edits 11 Retrieved from "http:en.openei.orgwindex.php?titleUser:Psuwind&oldid762655...

  18. Ocean Viral Metagenomics (2010 JGI User Meeting)

    ScienceCinema (OSTI)

    Rohwer, Forest

    2011-04-26

    Forest Rohwer from San Diego State University talks about "Ocean Viral Metagenomics" on March 25, 2010 at the 5th Annual DOE JGI User Meeting

  19. Pumping System Assessment Tool User Manual

    Broader source: Energy.gov [DOE]

    The Pumping System Assessment Tool (PSAT) user manual gives basic information about the data entry items, the calculated results, and assorted control button features.

  20. 2016-07-pdsf-user-meet

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    July 12, 2016 Jan Balewski * PDSF performance * past/future outages * announcements * toward common PDSF Shifter image * PDSF interactive nodes * AOB PDSF Users Meeting Utilization 2 PDSF Users Meeting Past/future outages 3 Past NIM - unavailable last week due to critical bug Future HPSS: 07/13/16 9:00-13:00 PDT, Scheduled maintenance. PDSF Users Meeting Announcements 4 Bi-weekly office hours in June * Thursday, July 21, 2-4pm, 59-4016-CR PDSF users meeting * Tuesday, August 2, 11:15 - 12:15pm

  1. APS User Information | Advanced Photon Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    found the Office of Science SCGSR Program website. The Midwest Center for Sturctural Genomics is now accepting applications for access to the MCSG User Resource. MCSG's structure...

  2. User:Cookjj05 | Open Energy Information

    Open Energy Info (EERE)

    Jump to: navigation, search Name Jeff Cook Location National Renewable Energy Laboratory Edits 1 Retrieved from "http:en.openei.orgwindex.php?titleUser:Cookjj05&oldid8...

  3. User:Abergfel | Open Energy Information

    Open Energy Info (EERE)

    Abergfel Jump to: navigation, search Edits 578 National Renewable Energies Laboratory Retrieved from "http:en.openei.orgwindex.php?titleUser:Abergfel&oldid643249...

  4. 2008/2009 User Survey Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Next 20082009 User Survey Results Table of Contents Response Survey Respondent Demographics Overall Satisfaction and Importance All Satisfaction and Importance Ratings...

  5. 2009/2010 User Survey Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Next 20092010 User Survey Results Table of Contents Response Summary Respondent Demographics Overall Satisfaction All Satisfaction and Importance Ratings HPC Resources NERSC...

  6. 2010/2011 User Survey Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Next 20102011 User Survey Results Table of Contents Response Summary Respondent Demographics Score Legend Satisfaction and Importance Scores HPC Resources Software Services...

  7. Heating 7.2 user`s manual

    SciTech Connect (OSTI)

    Childs, K.W.

    1993-02-01

    HEATING is a general-purpose conduction heat transfer program written in Fortran 77. HEATING can solve steady-state and/or transient heat conduction problems in one-, two-, or three-dimensional Cartesian, cylindrical, or spherical coordinates. A model may include multiple materials, and the thermal conductivity, density, and specific heat of each material may be both time- and temperature-dependent. The thermal conductivity may also be anisotropic. Materials may undergo change of phase. Thermal properties of materials may be input or may be extracted from a material properties library. Heat-generation rates may be dependent on time, temperature, and position, and boundary temperatures may be time- and position-dependent. The boundary conditions, which may be surface-to-environment or surface-to-surface, may be specified temperatures or any combination of prescribed heat flux, forced convection, natural convection, and radiation. The boundary condition parameters may be time- and/or temperature-dependent. General gray-body radiation problems may be modeled with user-defined factors for radiant exchange. The mesh spacing may be variable along each axis. HEATING uses a runtime memory allocation scheme to avoid having to recompile to match memory requirements for each specific problem. HEATING utilizes free-form input. Three steady-state solution techniques are available: point-successive-overrelaxation iterative method with extrapolation, direct-solution, and conjugate gradient. Transient problems may be solved using any one of several finite-difference schemes: Crank-Nicolson implicit, Classical Implicit Procedure (CIP), Classical Explicit Procedure (CEP), or Levy explicit method. The solution of the system of equations arising from the implicit techniques is accomplished by point-successive-overrelaxation iteration and includes procedures to estimate the optimum acceleration parameter.

  8. KAYENTA : theory and user's guide.

    SciTech Connect (OSTI)

    Brannon, Rebecca Moss; Fossum, Arlo Frederick; Strack, Otto Eric

    2009-03-01

    The physical foundations and domain of applicability of the Kayenta constitutive model are presented along with descriptions of the source code and user instructions. Kayenta, which is an outgrowth of the Sandia GeoModel, includes features and fitting functions appropriate to a broad class of materials including rocks, rock-like engineered materials (such as concretes and ceramics), and metals. Fundamentally, Kayenta is a computational framework for generalized plasticity models. As such, it includes a yield surface, but the term 'yield' is generalized to include any form of inelastic material response including microcrack growth and pore collapse. Kayenta supports optional anisotropic elasticity associated with ubiquitous joint sets. Kayenta supports optional deformation-induced anisotropy through kinematic hardening (in which the initially isotropic yield surface is permitted to translate in deviatoric stress space to model Bauschinger effects). The governing equations are otherwise isotropic. Because Kayenta is a unification and generalization of simpler models, it can be run using as few as 2 parameters (for linear elasticity) to as many as 40 material and control parameters in the exceptionally rare case when all features are used. For high-strain-rate applications, Kayenta supports rate dependence through an overstress model. Isotropic damage is modeled through loss of stiffness and strength.

  9. KAYENTA: Theory and User's Guide

    SciTech Connect (OSTI)

    Brannon, Rebecca Moss; Fuller, Timothy Jesse; Strack, Otto Eric; Fossum, Arlo Frederick; Sanchez, Jason James

    2015-02-01

    The physical foundations and domain of applicability of the Kayenta constitutive model are presented along with descriptions of the source code and user instructions. Kayenta, which is an outgrowth of the Sandia GeoModel, includes features and fitting functions appropriate to a broad class of materials including rocks, rock-like engineered materials (such as concretes and ceramics), and metals. Fundamentally, Kayenta is a computational framework for generalized plasticity models. As such, it includes a yield surface, but the term (3z(Byield(3y (Bis generalized to include any form of inelastic material response (including microcrack growth and pore collapse) that can result in non-recovered strain upon removal of loads on a material element. Kayenta supports optional anisotropic elasticity associated with joint sets, as well as optional deformation-induced anisotropy through kinematic hardening (in which the initially isotropic yield surface is permitted to translate in deviatoric stress space to model Bauschinger effects). The governing equations are otherwise isotropic. Because Kayenta is a unification and generalization of simpler models, it can be run using as few as 2 parameters (for linear elasticity) to as many as 40 material and control parameters in the exceptionally rare case when all features are used. For high-strain-rate applications, Kayenta supports rate dependence through an overstress model. Isotropic damage is modeled through loss of stiffness and strength.

  10. Vegetation Change Analysis User's Manual

    SciTech Connect (OSTI)

    D. J. Hansen; W. K. Ostler

    2002-10-01

    Approximately 70 percent of all U.S. military training lands are located in arid and semi-arid areas. Training activities in such areas frequently adversely affect vegetation, damaging plants and reducing the resilience of vegetation to recover once disturbed. Fugitive dust resulting from a loss of vegetation creates additional problems for human health, increasing accidents due to decreased visibility, and increasing maintenance costs for roads, vehicles, and equipment. Diagnostic techniques are needed to identify thresholds of sustainable military use. A cooperative effort among U.S. Department of Energy, U.S. Department of Defense, and selected university scientists was undertaken to focus on developing new techniques for monitoring and mitigating military impacts in arid lands. This manual focuses on the development of new monitoring techniques that have been implemented at Fort Irwin, California. New mitigation techniques are described in a separate companion manual. This User's Manual is designed to address diagnostic capabilities needed to distinguish between various degrees of sustainable and nonsustainable impacts due to military training and testing and habitat-disturbing activities in desert ecosystems. Techniques described here focus on the use of high-resolution imagery and the application of image-processing techniques developed primarily for medical research. A discussion is provided about the measurement of plant biomass and shrub canopy cover in arid. lands using conventional methods. Both semiquantitative methods and quantitative methods are discussed and reference to current literature is provided. A background about the use of digital imagery to measure vegetation is presented.

  11. HEATING 7. 1 user's manual

    SciTech Connect (OSTI)

    Childs, K.W.

    1991-07-01

    HEATING is a FORTRAN program designed to solve steady-state and/or transient heat conduction problems in one-, two-, or three- dimensional Cartesian, cylindrical, or spherical coordinates. A model may include multiple materials, and the thermal conductivity, density, and specific heat of each material may be both time- and temperature-dependent. The thermal conductivity may be anisotropic. Materials may undergo change of phase. Thermal properties of materials may be input or may be extracted from a material properties library. Heating generation rates may be dependent on time, temperature, and position, and boundary temperatures may be time- and position-dependent. The boundary conditions, which may be surface-to-boundary or surface-to-surface, may be specified temperatures or any combination of prescribed heat flux, forced convection, natural convection, and radiation. The boundary condition parameters may be time- and/or temperature-dependent. General graybody radiation problems may be modeled with user-defined factors for radiant exchange. The mesh spacing may be variable along each axis. HEATING is variably dimensioned and utilizes free-form input. Three steady-state solution techniques are available: point-successive-overrelaxation iterative method with extrapolation, direct-solution (for one-dimensional or two-dimensional problems), and conjugate gradient. Transient problems may be solved using one of several finite-difference schemes: Crank-Nicolson implicit, Classical Implicit Procedure (CIP), Classical Explicit Procedure (CEP), or Levy explicit method (which for some circumstances allows a time step greater than the CEP stability criterion). The solution of the system of equations arising from the implicit techniques is accomplished by point-successive-overrelaxation iteration and includes procedures to estimate the optimum acceleration parameter.

  12. Heating 7. 2 user's manual

    SciTech Connect (OSTI)

    Childs, K.W.

    1993-02-01

    HEATING is a general-purpose conduction heat transfer program written in Fortran 77. HEATING can solve steady-state and/or transient heat conduction problems in one-, two-, or three-dimensional Cartesian, cylindrical, or spherical coordinates. A model may include multiple materials, and the thermal conductivity, density, and specific heat of each material may be both time- and temperature-dependent. The thermal conductivity may also be anisotropic. Materials may undergo change of phase. Thermal properties of materials may be input or may be extracted from a material properties library. Heat-generation rates may be dependent on time, temperature, and position, and boundary temperatures may be time- and position-dependent. The boundary conditions, which may be surface-to-environment or surface-to-surface, may be specified temperatures or any combination of prescribed heat flux, forced convection, natural convection, and radiation. The boundary condition parameters may be time- and/or temperature-dependent. General gray-body radiation problems may be modeled with user-defined factors for radiant exchange. The mesh spacing may be variable along each axis. HEATING uses a runtime memory allocation scheme to avoid having to recompile to match memory requirements for each specific problem. HEATING utilizes free-form input. Three steady-state solution techniques are available: point-successive-overrelaxation iterative method with extrapolation, direct-solution, and conjugate gradient. Transient problems may be solved using any one of several finite-difference schemes: Crank-Nicolson implicit, Classical Implicit Procedure (CIP), Classical Explicit Procedure (CEP), or Levy explicit method. The solution of the system of equations arising from the implicit techniques is accomplished by point-successive-overrelaxation iteration and includes procedures to estimate the optimum acceleration parameter.

  13. A Security Solution for IEEE 802.11's Ad-hoc Mode:Password-Authentication and Group Diffie-Hellman Key Exchange

    SciTech Connect (OSTI)

    Emmanuel, Bresson; Olivier, Chevassut; David, Pointcheval

    2005-10-01

    The IEEE 802 standards ease the deployment of networkinginfrastructures and enable employers to accesscorporate networks whiletraveling. These standards provide two modes of communication calledinfrastructure and ad-hoc modes. A security solution for the IEEE802.11's infrastructure mode took several years to reach maturity andfirmware are still been upgraded, yet a solution for the ad-hoc modeneeds to be specified. The present paper is a first attempt in thisdirection. It leverages the latest developments in the area ofpassword-based authentication and (group) Diffie-Hellman key exchange todevelop a provably-secure key-exchange protocol for IEEE 802.11's ad-hocmode. The protocol allows users to securely join and leave the wirelessgroup at time, accommodates either a single-shared password orpairwise-shared passwords among the group members, or at least with acentral server; achieves security against dictionary attacks in theideal-hash model (i.e. random-oracles). This is, to the best of ourknowledge, the first such protocol to appear in the cryptographicliterature.

  14. 2006 XSD Scientific Software User Survey.

    SciTech Connect (OSTI)

    Jemian, P. R.

    2007-01-22

    In preparation for the 2006 XSD Scientific Software workshop, our committee sent a survey on June 16 to 100 users in the APS user community. This report contains the survey and the responses we received. The responses are presented in the order received.

  15. Builders and Users | Princeton Plasma Physics Lab

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Builders and Users Constructing the National Spherical Torus Experiment Upgrade took years of detailed planning and oversight. The team in charge brought decades of experience to the task, working together to make the $94 million upgrade a reality. Publication File: PDF icon NSTX-U_presskit_print_Builders-Users

  16. DAKOTA JAGUAR 2.1 user's Manual.

    SciTech Connect (OSTI)

    Adams, Brian M.; Lefantzi, Sophia; Chan, Ethan; Ruthruff, Joseph R.

    2011-06-01

    JAGUAR (JAva GUi for Applied Research) is a Java software tool providing an advanced text editor and graphical user interface (GUI) to manipulate DAKOTA (Design Analysis Kit for Optimization and Terascale Applications) input specifications. This document focuses on the features necessary for a user to use JAGUAR.

  17. Becoming a User | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Proposal Process in Brief Proposal Form Guidelines Preparing for Your Visit Working at CNM For Industrial Users Acknowledgment Statements for Publications End of Experiment Survey Users Executive Committee People Publications 2015 Publications 2014 Publications 2013 Publications 2012 Publications 2011 Publications 2010 Publications 2009 Publications 2008 Publications 2007 Publications 2006 Publications Fact Sheets & Other Documents Acknowledgment Statement News & Events RESEARCH

  18. User Facilities at a Glance | U.S. DOE Office of Science (SC)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Facilities at a Glance User Facilities User Facilities Home User Facilities at a Glance All User Facilities ASCR User Facilities BES User Facilities BER User Facilities FES User Facilities HEP User Facilities NP User Facilities User Resources User Statistics Policies and Processes Frequently Asked Questions User Facility Science Highlights User Facility News Contact Information Office of Science U.S. Department of Energy 1000 Independence Ave., SW Washington, DC 20585 P: (202) 586-5430 User

  19. A preliminary assessment of beryllium dust oxidation during a wet bypass accident in a fusion reactor

    SciTech Connect (OSTI)

    Brad J. Merrill; Richard L. Moore; J. Phillip Sharp

    2008-09-01

    A beryllium dust oxidation model has been developed at the Idaho National Laboratory (INL) by the Fusion Safety Program (FSP) for the MELCOR safety computer code. The purpose of this model is to investigate hydrogen production from beryllium dust layers on hot surfaces inside a fusion reactor vacuum vessel (VV) during in-vessel loss-of-cooling accidents (LOCAs). This beryllium dust oxidation model accounts for the diffusion of steam into a beryllium dust layer, the oxidation of the dust particles inside this layer based on the beryllium-steam oxidation equations developed at the INL, and the effective thermal conductivity of this beryllium dust layer. This paper details this oxidation model and presents the results of the application of this model to a wet bypass accident scenario in the ITER device.

  20. Particle Image Velocimetry Measurements and Analysis of Bypass Data for a Scaled 6mm Gap

    SciTech Connect (OSTI)

    J.R. Wolf; T.E. Conder; R.R. Schultz

    2012-09-01

    The purpose of the fluid dynamics experiments in the MIR (Matched Index of-Refraction) flow system at Idaho National Laboratory (INL) is to develop benchmark databases for the assessment of Computational Fluid Dynamics (CFD) solutions of the momentum equations, scalar mixing, and turbulence models for the flow ratios between coolant channels and bypass gaps in the interstitial regions of typical prismatic standard fuel element (SFE) or upper reflector block geometries of typical Modular High-temperature Gas-cooled Reactors (MHTGR) in the limiting case of negligible buoyancy and constant fluid properties. The experiments will use optical techniques, primarily particle image velocimetry (PIV) in the INL Matched Index of Refraction (MIR) flow system.