Sample records for vapor lighting security

  1. Storage and Retrieval of Thermal Light in Warm Atomic Vapor

    E-Print Network [OSTI]

    Young-Wook Cho; Yoon-Ho Kim

    2010-07-12T23:59:59.000Z

    We report slowed propagation and storage and retrieval of thermal light in warm rubidium vapor using the effect of electromagnetically-induced transparency (EIT). We first demonstrate slowed-propagation of the probe thermal light beam through an EIT medium by measuring the second-order correlation function of the light field using the Hanbury-Brown$-$Twiss interferometer. We also report an experimental study on the effect of the EIT slow-light medium on the temporal coherence of thermal light. Finally, we demonstrate the storage and retrieval of thermal light beam in the EIT medium. The direct measurement of the photon number statistics of the retrieved light field shows that the photon number statistics is preserved during the storage and retrieval process.

  2. Light storage in a room temperature atomic vapor based on coherent population oscillations

    E-Print Network [OSTI]

    M. -A. Maynard; F. Bretenaker; F. Goldfarb

    2014-10-21T23:59:59.000Z

    We report the experimental observation of Coherent Population Oscillation (CPO) based light storage in an atomic vapor cell at room temperature. Using the ultranarrow CPO between the ground levels of a $\\Lambda$ system selected by polarization in metastable $^4$He, such a light storage is experimentally shown to be phase preserving. As it does not involve any atomic coherences it has the advantage of being robust to dephasing effects such as small magnetic field inhomogeneities. The storage time is limited by the population lifetime of the ground states of the $\\Lambda$ system.

  3. Optical pumping in a microfabricated Rb vapor cell using a microfabricated Rb discharge light source

    SciTech Connect (OSTI)

    Venkatraman, V.; Kang, S.; Affolderbach, C.; Mileti, G., E-mail: gaetano.mileti@unine.ch [Laboratoire Temps-Fréquence, University of Neuchâtel, Neuchâtel 2000 (Switzerland); Shea, H. [Microsystems for Space Technologies Laboratory, Ecole Polytechnique Fédérale de Lausanne (EPFL), Neuchâtel 2002 (Switzerland)

    2014-02-03T23:59:59.000Z

    Miniature (vapor-cell based devices using optical pumping of alkali atoms, such as atomic clocks and magnetometers, today mostly employ vertical-cavity surface-emitting lasers as pump light sources. Here, we report on the demonstration of optical pumping in a microfabricated alkali vapor resonance cell using (1) a microfabricated Rb discharge lamp light source, as well as (2) a conventional glass-blown Rb discharge lamp. The microfabricated Rb lamp cell is a dielectric barrier discharge (DBD) light source, having the same inner cell volume of around 40?mm{sup 3} as that of the resonance cell, both filled with suitable buffer gases. A miniature (?2?cm{sup 3} volume) test setup based on the M{sub z} magnetometer interrogation technique was used for observation of optical-radiofrequency double-resonance signals, proving the suitability of the microfabricated discharge lamp to introduce efficient optical pumping. The pumping ability of this light source was found to be comparable to or even better than that of a conventional glass-blown lamp. The reported results indicate that the micro-fabricated DBD discharge lamp has a high potential for the development of a new class of miniature atomic clocks, magnetometers, and quantum sensors.

  4. Channelization architecture for wide-band slow light in atomic vapors

    E-Print Network [OSTI]

    Zachary Dutton; Mark Bashkansky; Michael Steiner; John Reintjes

    2005-10-20T23:59:59.000Z

    We propose a ``channelization'' architecture to achieve wide-band electromagnetically induced transparency (EIT) and ultra-slow light propagation in atomic Rb-87 vapors. EIT and slow light are achieved by shining a strong, resonant ``pump'' laser on the atomic medium, which allows slow and unattenuated propagation of a weaker ``signal'' beam, but only when a two-photon resonance condition is satisfied. Our wideband architecture is accomplished by dispersing a wideband signal spatially, transverse to the propagation direction, prior to entering the atomic cell. When particular Zeeman sub-levels are used in the EIT system, then one can introduce a magnetic field with a linear gradient such that the two-photon resonance condition is satisfied for each individual frequency component. Because slow light is a group velocity effect, utilizing differential phase shifts across the spectrum of a light pulse, one must then introduce a slight mismatch from perfect resonance to induce a delay. We present a model which accounts for diffusion of the atoms in the varying magnetic field as well as interaction with levels outside the ideal three-level system on which EIT is based. We find the maximum delay-bandwidth product decreases with bandwidth, and that delay-bandwidth product ~1 should be achievable with bandwidth ~50 MHz (~5 ns delay). This is a large improvement over the ~1 MHz bandwidths in conventional slow light systems and could be of use in signal processing applications.

  5. Light storage via coherent population oscillation in a thermal cesium vapor

    E-Print Network [OSTI]

    A. J. F. de Almeida; J. Sales; M. -A. Maynard; T. Laupretre; F. Bretenaker; D. Felinto; F. Goldfarb; J. W. R. Tabosa

    2014-09-19T23:59:59.000Z

    We report on the storage of light via the phenomenon of Coherent Population Oscillation (CPO) in an atomic cesium vapor at room temperature. In the experiment the optical information of a probe field is stored in the CPO of two ground states of a Lambda three-level system formed by the Zeeman sublevels of the hyperfine transition F = 3 - F' = 2 of cesium D2 line. We show directly that this CPO based memory is very insensitive to stray magnetic field inhomogeneities and presents a lifetime which is mainly limited only by atomic motion. A theoretical simulation of the measured spectra was also developed and is in very good agreement with the experiment.

  6. Nonlinear Magneto-Optical Rotation in Rubidium Vapor Excited with Blue Light

    E-Print Network [OSTI]

    Pustelny, S; Akulshin, A; Auzinsh, M; Leefer, N; Budker, D

    2015-01-01T23:59:59.000Z

    We present experimental and numerical studies of nonlinear magneto-optical rotation (NMOR) in rubidium vapor excited with resonant light tuned to the $5^2\\!S_{1/2}\\rightarrow 6^2\\!P_{1/2}$ absorption line (421~nm). Contrary to the experiments performed to date on the strong $D_1$ or $D_2$ lines, in this case, the spontaneous decay of the excited state $6^2\\!P_{1/2}$ may occur via multiple intermediate states, affecting the dynamics, magnitude and other characteristics of NMOR. Comparing the experimental results with the results of modelling based on Auzinsh et al., Phys. Rev. A 80, 1 (2009), we demonstrate that despite the complexity of the structure, NMOR can be adequately described with a model, where only a single excited-state relaxation rate is used.

  7. Novel Low Cost Organic Vapor Jet Printing of Striped High Efficiency Phosphorescent OLEDs for White Lighting

    SciTech Connect (OSTI)

    Mike Hack

    2008-12-31T23:59:59.000Z

    In this program, Universal Display Corporation and University of Michigan proposed to integrate three innovative concepts to meet the DOE's Solid State Lighting (SSL) goals: (1) high-efficiency phosphorescent organic light emitting device (PHOLED{trademark}) technology, (2) a white lighting design that is based on a series of red, green and blue OLED stripes, and (3) the use of a novel cost-effective, high rate, mask-less deposition process called organic vapor jet printing (OVJP). Our PHOLED technology offers up to four-times higher power efficiency than other OLED approaches for general lighting. We believe that one of the most promising approaches to maximizing the efficiency of OLED lighting sources is to produce stripes of the three primary colors at such a pitch (200-500 {mu}m) that they appear as a uniform white light to an observer greater than 1 meter (m) away from the illumination source. Earlier work from a SBIR Phase 1 entitled 'White Illumination Sources Using Striped Phosphorescent OLEDs' suggests that stripe widths of less than 500 {mu}m appear uniform from a distance of 1m without the need for an external diffuser. In this program, we intend to combine continued advances in this PHOLED technology with the striped RGB lighting design to demonstrate a high-efficiency, white lighting source. Using this background technology, the team has focused on developing and demonstrating the novel cost-effective OVJP process to fabricate these high-efficiency white PHOLED light sources. Because this groundbreaking OVJP process is a direct printing approach that enables the OLED stripes to be printed without a shadow mask, OVJP offers very high material utilization and high throughput without the costs and wastage associated with a shadow mask (i.e. the waste of material that deposits on the shadow mask itself). As a direct printing technique, OVJP also has the potential to offer ultra-high deposition rates (> 1,000 Angstroms/second) for any size or shaped features. As a result, we believe that this work will lead to the development of a cost-effective manufacturing solution to produce very-high efficiency OLEDs. By comparison to more common ink-jet printing (IJP), OVJP can also produce well-defined patterns without the need to pattern the substrate with ink wells or to dry/anneal the ink. In addition, the material set is not limited by viscosity and solvent solubility. During the program we successfully demonstrated a 6-inch x 6-inch PHOLED lighting panel consisting of fine-featured red, green and blue (R-G-B) stripes (1mm width) using an OVJP deposition system that was designed, procured and installed into UDC's cleanroom as part of this program. This project will significantly accelerate the DOE's ability to meet its 2015 DOE SSL targets of 70-150 lumens/Watt and less than $10 per 1,000 lumens for high CRI lighting index (76-90). Coupled with a low cost manufacturing path through OVJP, we expect that this achievement will enable the DOE to achieve its 2015 performance goals by the year 2013, two years ahead of schedule. As shown by the technical work performed under this program, we believe that OVJP is a very promising technology to produce low cost, high efficacy, color tunable light sources. While we have made significant progress to develop OVJP technology and build a pilot line tool to study basic aspects of the technology and demonstrate a lighting panel prototype, further work needs to be performed before its full potential and commercial viability can be fully assessed.

  8. Electrical, optical, and material characterizations of blue InGaN light emitting diodes submitted to reverse-bias stress in water vapor condition

    SciTech Connect (OSTI)

    Chen, Hsiang, E-mail: hchen@ncnu.edu.tw; Chu, Yu-Cheng; Chen, Yun-Ti; Chen, Chian-You [Department of Applied Materials and Optoelectronic Engineering, National Chi Nan University, No. 1, University Road, Puli, Nantou County 54561, Taiwan (China); Shei, Shih-Chang [Department of Electrical Engineering, National University of Tainan, No.33, Sec. 2, Shulin St., West Central Dist., Tainan City 70005, Taiwan (China)

    2014-09-07T23:59:59.000Z

    In this paper, we investigate degradation of InGaN/GaN light emitting diodes (LEDs) under reverse-bias operations in water vapor and dry air. To examine failure origins, electrical characterizations including current-voltage, breakdown current profiles, optical measurement, and multiple material analyses were performed. Our findings indicate that the diffusion of indium atoms in water vapor can expedite degradation. Investigation of reverse-bias stress can help provide insight into the effects of water vapor on LEDs.

  9. Sub-Doppler resonances in the back-scattered light from random porous media infused with Rb vapor

    E-Print Network [OSTI]

    Villalba, S; Lenci, L; Bloch, D; Lezama, A; Failache, H

    2013-01-01T23:59:59.000Z

    We report on the observation of sub-Doppler resonances on the back-scattered light from a random porous glass medium with rubidium vapor filling its interstices. The sub-Doppler spectral lines are the consequence of saturated absorption where the incident laser beam saturates the atomic medium and the back-scattered light probes it. Some specificities of the observed spectra reflect the transient atomic evolution under confinement inside the pores. Simplicity, robustness and potential miniaturization are appealing features of this system as a spectroscopic reference.

  10. Journal of Light Emitting Diodes Vol 2 N0 1, April 2010 1 Abstract--In metal organic vapor phase epitaxy we developed

    E-Print Network [OSTI]

    Wetzel, Christian M.

    Journal of Light Emitting Diodes Vol 2 N0 1, April 2010 1 Abstract-- In metal organic vapor phase epitaxy we developed GaInN/GaN quantum well material suitable for 500 ­ 580 nm light emitting diodes at longer wavelengths. Index Terms-- a-plane GaN, GaInN, Green light emitting diode, m-plane GaN I

  11. Estimation of temporal separation of slow light pulses in atomic vapors by weak measurement

    E-Print Network [OSTI]

    Pardeep Kumar; Shubhrangshu Dasgupta

    2015-03-16T23:59:59.000Z

    We show how two circular polarization components of a linearly polarized pulse, propagating through a coherently driven dilute atomic vapor, can be well resolved in time domain by weak measurement. Slower group velocity of one of the components due to electromagnetically induced transparency leads to a differential group delay between the two components. For low number density, this delay may not be large enough to temporally resolve the two components. We show how this can be enhanced in terms of mean time of arrival of the output pulse through a post-selected polarizer. We demonstrate the idea with all the analytical and numerical results, with a specific example of alkali atoms.

  12. ZnO light-emitting diode grown by plasma-assisted metal organic chemical vapor deposition

    SciTech Connect (OSTI)

    Xu, W.Z.; Ye, Z.Z.; Zeng, Y.J.; Zhu, L.P.; Zhao, B.H.; Jiang, L.; Lu, J.G.; He, H.P.; Zhang, S.B. [State Key Laboratory of Silicon Materials, Zhejiang University, Hangzhou 310027 (China); National Renewable Energy Laboratory, Golden, Colorado 80401 (United States)

    2006-04-24T23:59:59.000Z

    We report a breakthrough in fabricating ZnO homojunction light-emitting diode by metal organic chemical vapor deposition. Using NO plasma, we are able to grow p-type ZnO thin films on n-type bulk ZnO substrates. The as-grown films on glass substrates show hole concentration of 10{sup 16}-10{sup 17} cm{sup -3} and mobility of 1-10 cm{sup 2} V{sup -1} s{sup -1}. Room-temperature photoluminescence spectra reveal nitrogen-related emissions. A typical ZnO homojunction shows rectifying behavior with a turn-on voltage of about 2.3 V. Electroluminescence at room temperature has been demonstrated with band-to-band emission at I=40 mA and defect-related emissions in the blue-yellow spectrum range.

  13. Visible Light Photocatalysis with Nitrogen-Doped Titanium Dioxide Nanoparticles Prepared by Plasma Assisted Chemical Vapor Deposition

    SciTech Connect (OSTI)

    Buzby,S.; Barakat, M.; Lin, H.; Ni, C.; Rykov, S.; Chen, J.; Shah, S.

    2006-01-01T23:59:59.000Z

    Nitrogen-doped TiO{sub 2} nanoparticles were synthesized via plasma assisted metal organic chemical vapor deposition. Nitrogen dopant concentration was varied from 0 to 1.61 at. %. The effect of nitrogen ion doping on visible light photocatalysis has been investigated. Samples were analyzed by various analytical techniques such as x-ray diffraction, transmission electron microscopy, x-ray photoelectron spectroscopy, and near-edge x-ray absorption fine structure. Titanium tetraisopropoxide was used as the titanium precursor, while rf-plasma-decomposed ammonia was used as the source for nitrogen doping. The N-doped TiO{sub 2} nanoparticles were deposited on stainless steel mesh under a flow of Ar and O2 gases at 600 {sup o}C in a tube reactor. The photocatalytic activity of the prepared N-doped TiO{sub 2} samples was tested by the degradation of 2-chlorophenol (2-CP) in an aqueous solution using a visible lamp equipped with an UV filter. The efficiency of photocatalytic oxidation of 2-CP was measured using high performance liquid chromatography. Results obtained revealed the formation of N-doped TiO{sub 2} samples as TiO{sub 2-x}N{sub x}, and a corresponding increase in the visible light photocatalytic activity.

  14. Science and the Energy Security Challenge: The Example of Solid-State Lighting

    ScienceCinema (OSTI)

    Julia Phillips

    2010-01-08T23:59:59.000Z

    Securing a viable, carbon neutral energy future for humankind will require an effort of gargantuan proportions. As outlined clearly in a series of workshops sponsored by the DOE Office of Basic Energy Sciences (http://www.sc.doe.gov/bes/reports/list.html), fundamental advances in scientific understanding are needed to broadly implement many of the technologies that are held out as promising options to meet future energy needs, ranging from solar energy, to nuclear energy, to approaches to clean combustion. Using solid state lighting based on inorganic materials as an example, I will discuss some recent results and new directions, emphasizing the multidisciplinary, team nature of the endeavor. I will also offer some thoughts about how to encourage translation of the science into attractive, widely available products ? a significant challenge that cannot be ignored. This case study offers insight into approaches that are likely to be beneficial for addressing other aspects of the energy security challenge.

  15. Safeguards and security requirements for weapons plutonium disposition in light water reactors

    SciTech Connect (OSTI)

    Thomas, L.L.; Strait, R.S. [Lawrence Livermore National Lab., CA (United States). Fission Energy and Systems Safety Program

    1994-10-01T23:59:59.000Z

    This paper explores the issues surrounding the safeguarding of the plutonium disposition process in support of the United States nuclear weapons dismantlement program. It focuses on the disposition of the plutonium by burning mixed oxide fuel in light water reactors (LWR) and addresses physical protection, material control and accountability, personnel security and international safeguards. The S and S system needs to meet the requirements of the DOE Orders, NRC Regulations and international safeguards agreements. Experience has shown that incorporating S and S measures into early facility designs and integrating them into operations provides S and S that is more effective, more economical, and less intrusive. The plutonium disposition safeguards requirements with which the US has the least experience are the implementation of international safeguards on plutonium metal; the large scale commercialization of the mixed oxide fuel fabrication; and the transportation to and loading in the LWRs of fresh mixed oxide fuel. It is in these areas where the effort needs to be concentrated if the US is to develop safeguards and security systems that are effective and efficient.

  16. Near real time vapor detection and enhancement using aerosol adsorption

    DOE Patents [OSTI]

    Novick, V.J.; Johnson, S.A.

    1999-08-03T23:59:59.000Z

    A vapor sample detection method is described where the vapor sample contains vapor and ambient air and surrounding natural background particles. The vapor sample detection method includes the steps of generating a supply of aerosol that have a particular effective median particle size, mixing the aerosol with the vapor sample forming aerosol and adsorbed vapor suspended in an air stream, impacting the suspended aerosol and adsorbed vapor upon a reflecting element, alternatively directing infrared light to the impacted aerosol and adsorbed vapor, detecting and analyzing the alternatively directed infrared light in essentially real time using a spectrometer and a microcomputer and identifying the vapor sample. 13 figs.

  17. Near real time vapor detection and enhancement using aerosol adsorption

    DOE Patents [OSTI]

    Novick, Vincent J. (Downers Grove, IL); Johnson, Stanley A. (Countryside, IL)

    1999-01-01T23:59:59.000Z

    A vapor sample detection method where the vapor sample contains vapor and ambient air and surrounding natural background particles. The vapor sample detection method includes the steps of generating a supply of aerosol that have a particular effective median particle size, mixing the aerosol with the vapor sample forming aerosol and adsorbed vapor suspended in an air stream, impacting the suspended aerosol and adsorbed vapor upon a reflecting element, alternatively directing infrared light to the impacted aerosol and adsorbed vapor, detecting and analyzing the alternatively directed infrared light in essentially real time using a spectrometer and a microcomputer and identifying the vapor sample.

  18. Inversion by metalorganic chemical vapor deposition from N- to Ga-polar gallium nitride and its application to multiple quantum well light-emitting diodes

    SciTech Connect (OSTI)

    Hosalli, A. M.; Van Den Broeck, D. M.; Bedair, S. M. [Department of Electrical and Computer Engineering, NCSU, Raleigh, North Carolina 27695 (United States)] [Department of Electrical and Computer Engineering, NCSU, Raleigh, North Carolina 27695 (United States); Bharrat, D.; El-Masry, N. A. [Department of Material Science and Engineering, NCSU, Raleigh, North Carolina 27695 (United States)] [Department of Material Science and Engineering, NCSU, Raleigh, North Carolina 27695 (United States)

    2013-12-02T23:59:59.000Z

    We demonstrate a metalorganic chemical vapor deposition growth approach for inverting N-polar to Ga-polar GaN by using a thin inversion layer grown with high Mg flux. The introduction of this inversion layer allowed us to grow p-GaN films on N-polar GaN thin film. We have studied the dependence of hole concentration, surface morphology, and degree of polarity inversion for the inverted Ga-polar surface on the thickness of the inversion layer. We then use this approach to grow a light emitting diode structure which has the MQW active region grown on the advantageous N-polar surface and the p-layer grown on the inverted Ga-polar surface.

  19. Slow light propagation and amplification via electromagnetically induced transparency and four-wave mixing in an optically dense atomic vapor

    E-Print Network [OSTI]

    N. B. Phillips; A. V. Gorshkov; I. Novikova

    2009-03-24T23:59:59.000Z

    We experimentally and theoretically analyze the propagation of weak signal field pulses under the conditions of electromagnetically induced transparency (EIT) in hot Rb vapor, and study the effects of resonant four-wave mixing (FWM). In particular, we demonstrate that in a double-$\\Lambda$ system, formed by the strong control field with the weak resonant signal and a far-detuned Stokes field, both continuous-wave spectra and pulse propagation dynamics for the signal field depend strongly on the amplitude of the seeded Stokes field, and the effect is enhanced in optically dense atomic medium. We also show that the theory describing the coupled propagation of the signal and Stokes fields is in good agreement with the experimental observations.

  20. All mercury lamps contain small amounts of mercury. An electric current passes through the lamp and vaporizes the mercury to generate light. Recycling mercury containing lamps protects human health and our environment from heavy

    E-Print Network [OSTI]

    George, Steven C.

    and vaporizes the mercury to generate light. Recycling mercury containing lamps protects human health and our the environment by recycling universal wastes, contact EH&S at (949) 824-6200 or visit: www.ehs.uci.edu Mercury lamp recycling separates a number of materials for further use in new products. · The mercury is reused

  1. Mercury Lamps Recycling Fluorescent light-tubes, compact fluorescent bulbs, mercury and sodium vapor lamps, ultraviolet and

    E-Print Network [OSTI]

    Baker, Chris I.

    Mercury Lamps Recycling Fluorescent light-tubes, compact fluorescent bulbs, mercury and sodium labeled for shipment to a recycling plant for mercury, glass and aluminum recovery. The beneficial re can be recycled infinitely without losing its purity or strength. While the primary end product

  2. Diode pumped alkali vapor fiber laser

    DOE Patents [OSTI]

    Payne, Stephen A. (Castro Valley, CA); Beach, Raymond J. (Livermore, CA); Dawson, Jay W. (Livermore, CA); Krupke, William F. (Pleasanton, CA)

    2007-10-23T23:59:59.000Z

    A method and apparatus is provided for producing near-diffraction-limited laser light, or amplifying near-diffraction-limited light, in diode pumped alkali vapor photonic-band-gap fiber lasers or amplifiers. Laser light is both substantially generated and propagated in an alkali gas instead of a solid, allowing the nonlinear and damage limitations of conventional solid core fibers to be circumvented. Alkali vapor is introduced into the center hole of a photonic-band-gap fiber, which can then be pumped with light from a pump laser and operated as an oscillator with a seed beam, or can be configured as an amplifier.

  3. Diode pumped alkali vapor fiber laser

    DOE Patents [OSTI]

    Payne, Stephen A. (Castro Valley, CA); Beach, Raymond J. (Livermore, CA); Dawson, Jay W. (Livermore, CA); Krupke, William F. (Pleasanton, CA)

    2006-07-26T23:59:59.000Z

    A method and apparatus is provided for producing near-diffraction-limited laser light, or amplifying near-diffraction-limited light, in diode pumped alkali vapor photonic-band-gap fiber lasers or amplifiers. Laser light is both substantially generated and propagated in an alkali gas instead of a solid, allowing the nonlinear and damage limitations of conventional solid core fibers to be circumvented. Alkali vapor is introduced into the center hole of a photonic-band-gap fiber, which can then be pumped with light from a pump laser and operated as an oscillator with a seed beam, or can be configured as an amplifier.

  4. Image Storage in Hot Vapors

    E-Print Network [OSTI]

    L. Zhao; T. Wang; Y. Xiao; S. F. Yelin

    2007-10-22T23:59:59.000Z

    We theoretically investigate image propagation and storage in hot atomic vapor. A $4f$ system is adopted for imaging and an atomic vapor cell is placed over the transform plane. The Fraunhofer diffraction pattern of an object in the object plane can thus be transformed into atomic Raman coherence according to the idea of ``light storage''. We investigate how the stored diffraction pattern evolves under diffusion. Our result indicates, under appropriate conditions, that an image can be reconstructed with high fidelity. The main reason for this procedure to work is the fact that diffusion of opposite-phase components of the diffraction pattern interfere destructively.

  5. Energy Savings Potential for Street Lighting in India

    E-Print Network [OSTI]

    Johnson, Alissa K.

    2014-01-01T23:59:59.000Z

    M. B. Kostic, “Light-emitting diodes in street and roadwayCompact fluorescent Light emitting diode High intensityCompact fluorescent Light emitting diode Mercury Vapor High

  6. Advancing Explosives Detection Capabilities: Vapor Detection

    ScienceCinema (OSTI)

    Atkinson, David

    2014-07-24T23:59:59.000Z

    A new, PNNL-developed method provides direct, real-time detection of trace amounts of explosives such as RDX, PETN and C-4. The method selectively ionizes a sample before passing the sample through a mass spectrometer to detect explosive vapors. The method could be used at airports to improve aviation security.

  7. Lighting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron 9 5Let us countLighting Sign In About | Careers |

  8. Calibrated vapor generator source

    DOE Patents [OSTI]

    Davies, J.P.; Larson, R.A.; Goodrich, L.D.; Hall, H.J.; Stoddard, B.D.; Davis, S.G.; Kaser, T.G.; Conrad, F.J.

    1995-09-26T23:59:59.000Z

    A portable vapor generator is disclosed that can provide a controlled source of chemical vapors, such as, narcotic or explosive vapors. This source can be used to test and calibrate various types of vapor detection systems by providing a known amount of vapors to the system. The vapor generator is calibrated using a reference ion mobility spectrometer. A method of providing this vapor is described, as follows: explosive or narcotic is deposited on quartz wool, placed in a chamber that can be heated or cooled (depending on the vapor pressure of the material) to control the concentration of vapors in the reservoir. A controlled flow of air is pulsed over the quartz wool releasing a preset quantity of vapors at the outlet. 10 figs.

  9. Calibrated vapor generator source

    DOE Patents [OSTI]

    Davies, John P. (Idaho Falls, ID); Larson, Ronald A. (Idaho Falls, ID); Goodrich, Lorenzo D. (Shelley, ID); Hall, Harold J. (Idaho Falls, ID); Stoddard, Billy D. (Idaho Falls, ID); Davis, Sean G. (Idaho Falls, ID); Kaser, Timothy G. (Idaho Falls, ID); Conrad, Frank J. (Albuquerque, NM)

    1995-01-01T23:59:59.000Z

    A portable vapor generator is disclosed that can provide a controlled source of chemical vapors, such as, narcotic or explosive vapors. This source can be used to test and calibrate various types of vapor detection systems by providing a known amount of vapors to the system. The vapor generator is calibrated using a reference ion mobility spectrometer. A method of providing this vapor is described, as follows: explosive or narcotic is deposited on quartz wool, placed in a chamber that can be heated or cooled (depending on the vapor pressure of the material) to control the concentration of vapors in the reservoir. A controlled flow of air is pulsed over the quartz wool releasing a preset quantity of vapors at the outlet.

  10. High-Intensity Discharge Lighting Basics | Department of Energy

    Energy Savers [EERE]

    lighting. Mercury vapor lamps provide about 50 lumens per watt. They cast a very cool bluegreen white light. Most indoor mercury vapor lamps in arenas and gymnasiums have been...

  11. The concept of the use of recycled uranium for increasing the degree of security of export deliveries of fuel for light-water reactors

    SciTech Connect (OSTI)

    Alekseev, P. N.; Ivanov, E. A.; Nevinitsa, V. A.; Ponomarev-Stepnoi, N. N.; Rumyantsev, A. N.; Shmelev, V. M. [Russian Research Center Kurchatov Institute (Russian Federation); Borisevich, V. D.; Smirnov, A. Yu.; Sulaberidze, G. A. [National Nuclear Research University MEPhI (Russian Federation)

    2010-12-15T23:59:59.000Z

    The present paper deals with investigation of the possibilities for reducing the risk of proliferation of fissionable materials by means of increasing the degree of protection of fresh fuel intended for light-water reactors against unsanctioned use in the case of withdrawal of a recipient country of deliveries from IAEA safeguards. It is shown that the use of recycled uranium for manufacturing export nuclear fuel makes transfer of nuclear material removed from the fuel assemblies for weapons purposes difficult because of the presence of isotope {sup 232}U, whose content increases when one attempts to enrich uranium extracted from fresh fuel. In combination with restricted access to technologies for isotope separation by means of establishing international centers for uranium enrichment, this technical measure can significantly reduce the risk of proliferation associated with export deliveries of fuel made of low-enriched uranium. The assessment of a maximum level of contamination of nuclear material being transferred by isotope {sup 232}U for the given isotope composition of the initial fuel is obtained. The concept of further investigations of the degree of security of export deliveries of fuel assemblies with recycled uranium intended for light-water reactors is suggested.

  12. Vapor spill monitoring method

    DOE Patents [OSTI]

    Bianchini, Gregory M. (Livermore, CA); McRae, Thomas G. (Livermore, CA)

    1985-01-01T23:59:59.000Z

    Method for continuous sampling of liquified natural gas effluent from a spill pipe, vaporizing the cold liquified natural gas, and feeding the vaporized gas into an infrared detector to measure the gas composition. The apparatus utilizes a probe having an inner channel for receiving samples of liquified natural gas and a surrounding water jacket through which warm water is flowed to flash vaporize the liquified natural gas.

  13. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  14. Application of Computational Fluid Dynamics in the Forced Dispersion Modeling of LNG Vapor Clouds

    E-Print Network [OSTI]

    Kim, Byung-Kyu

    2013-05-31T23:59:59.000Z

    The safety and security of liquefied natural gas (LNG) facilities has prompted the need for continued study of LNG mitigation systems. Water spray systems are widely recognized as an effective measure for dispersing LNG vapor clouds. Currently...

  15. Low-Pressure Sodium Lighting Basics

    Broader source: Energy.gov [DOE]

    Low-pressure sodium lighting provides more energy-efficient outdoor lighting than high-intensity discharge lighting, but it has very poor color rendition. Typical applications include highway and security lighting, where color is not important.

  16. Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security

    SciTech Connect (OSTI)

    Electric Power Research

    2007-11-01T23:59:59.000Z

    The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

  17. Atomic vapor spectroscopy in integrated photonic structures

    E-Print Network [OSTI]

    Ritter, Ralf; Pernice, Wolfram; Kübler, Harald; Pfau, Tilman; Löw, Robert

    2015-01-01T23:59:59.000Z

    We investigate an integrated optical chip immersed in atomic vapor providing several waveguide geometries for spectroscopy applications. The narrow-band transmission through a silicon nitride waveguide and interferometer is altered when the guided light is coupled to a vapor of rubidium atoms via the evanescent tail of the waveguide mode. We use grating couplers to couple between the waveguide mode and the radiating wave, which allow for addressing arbitrary coupling positions on the chip surface. The evanescent atom-light interaction can be numerically simulated and shows excellent agreement with our experimental data. This work demonstrates a next step towards miniaturization and integration of alkali atom spectroscopy and provides a platform for further fundamental studies of complex waveguide structures.

  18. Apparatus and method for photochemical vapor deposition

    DOE Patents [OSTI]

    Jackson, Scott C. (Wilmington, DE); Rocheleau, Richard E. (Wilmington, DE)

    1987-03-31T23:59:59.000Z

    A photochemical vapor deposition apparatus includes a reactor housing having a window in one wall above a reaction chamber in the housing. A transparent curtain divides the reaction chamber into a reaction zone and a flush zone. At least one substrate is mounted in the reaction zone in light communication with the window so that ultraviolet radiation may penetrate through the window into the reaction zone. The window is kept clear by a gas flowing through the flush zone.

  19. Vapor generation methods for explosives detection research. ...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Vapor generation methods for explosives detection research. Vapor generation methods for explosives detection research. Abstract: The generation of calibrated vapor samples of...

  20. Electrolyte vapor condenser

    DOE Patents [OSTI]

    Sederquist, R.A.; Szydlowski, D.F.; Sawyer, R.D.

    1983-02-08T23:59:59.000Z

    A system is disclosed for removing electrolyte from a fuel cell gas stream. The gas stream containing electrolyte vapor is supercooled utilizing conventional heat exchangers and the thus supercooled gas stream is passed over high surface area passive condensers. The condensed electrolyte is then drained from the condenser and the remainder of the gas stream passed on. The system is particularly useful for electrolytes such as phosphoric acid and molten carbonate, but can be used for other electrolyte cells and simple vapor separation as well. 3 figs.

  1. Cyber Security

    Energy Savers [EERE]

    Associate CIO for Cyber Security (IM-30) Rod Turk Deputy Associate CIO for Cyber Security (IM-30) Michael Maraya Incident Management Division (IM-32) Rob Ciochon Director Policy,...

  2. information security

    E-Print Network [OSTI]

    Faculty listing for "information security" ... 1167; Phone: +1 765 49-46022; Email: wagstaff@purdue.edu; Research Interests: number theory, information security.

  3. Organic vapor jet printing system

    DOE Patents [OSTI]

    Forrest, Stephen R

    2012-10-23T23:59:59.000Z

    An organic vapor jet printing system includes a pump for increasing the pressure of an organic flux.

  4. Port security and information technology

    E-Print Network [OSTI]

    Petrakakos, Nikolaos Harilaos

    2005-01-01T23:59:59.000Z

    The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

  5. Enrichment of light hydrocarbon mixture

    DOE Patents [OSTI]

    Yang; Dali (Los Alamos, NM); Devlin, David (Santa Fe, NM); Barbero, Robert S. (Santa Cruz, NM); Carrera, Martin E. (Naperville, IL); Colling, Craig W. (Warrenville, IL)

    2010-08-10T23:59:59.000Z

    Light hydrocarbon enrichment is accomplished using a vertically oriented distillation column having a plurality of vertically oriented, nonselective micro/mesoporous hollow fibers. Vapor having, for example, both propylene and propane is sent upward through the distillation column in between the hollow fibers. Vapor exits neat the top of the column and is condensed to form a liquid phase that is directed back downward through the lumen of the hollow fibers. As vapor continues to ascend and liquid continues to countercurrently descend, the liquid at the bottom of the column becomes enriched in a higher boiling point, light hydrocarbon (propane, for example) and the vapor at the top becomes enriched in a lower boiling point light hydrocarbon (propylene, for example). The hollow fiber becomes wetted with liquid during the process.

  6. Enrichment of light hydrocarbon mixture

    DOE Patents [OSTI]

    Yang, Dali (Los Alamos, NM); Devlin, David (Santa Fe, NM); Barbero, Robert S. (Santa Cruz, NM); Carrera, Martin E. (Naperville, IL); Colling, Craig W. (Warrenville, IL)

    2011-11-29T23:59:59.000Z

    Light hydrocarbon enrichment is accomplished using a vertically oriented distillation column having a plurality of vertically oriented, nonselective micro/mesoporous hollow fibers. Vapor having, for example, both propylene and propane is sent upward through the distillation column in between the hollow fibers. Vapor exits neat the top of the column and is condensed to form a liquid phase that is directed back downward through the lumen of the hollow fibers. As vapor continues to ascend and liquid continues to countercurrently descend, the liquid at the bottom of the column becomes enriched in a higher boiling point, light hydrocarbon (propane, for example) and the vapor at the top becomes enriched in a lower boiling point light hydrocarbon (propylene, for example). The hollow fiber becomes wetted with liquid during the process.

  7. Stratified vapor generator

    DOE Patents [OSTI]

    Bharathan, Desikan (Lakewood, CO); Hassani, Vahab (Golden, CO)

    2008-05-20T23:59:59.000Z

    A stratified vapor generator (110) comprises a first heating section (H.sub.1) and a second heating section (H.sub.2). The first and second heating sections (H.sub.1, H.sub.2) are arranged so that the inlet of the second heating section (H.sub.2) is operatively associated with the outlet of the first heating section (H.sub.1). A moisture separator (126) having a vapor outlet (164) and a liquid outlet (144) is operatively associated with the outlet (124) of the second heating section (H.sub.2). A cooling section (C.sub.1) is operatively associated with the liquid outlet (144) of the moisture separator (126) and includes an outlet that is operatively associated with the inlet of the second heating section (H.sub.2).

  8. Light-Induced Atomic Desorption (LIAD)

    E-Print Network [OSTI]

    Budker, Dmitry

    in density n0=the initial density more intense higher density!! #12;Light Friquency Low light power (0.56m, polysiloxane, etc) #12;Time Dependence exposed to 514-nm desorbing light at room temperature (~20) density increase in density!! coating is replenished #12;Light Intensity 0=relative rate of increase of the vapor

  9. VAPOR PRESSURES AND HEATS OF VAPORIZATION OF PRIMARY COAL TARS

    SciTech Connect (OSTI)

    Eric M. Suuberg; Vahur Oja

    1997-07-01T23:59:59.000Z

    This project had as its main focus the determination of vapor pressures of coal pyrolysis tars. It involved performing measurements of these vapor pressures and from them, developing vapor pressure correlations suitable for use in advanced pyrolysis models (those models which explicitly account for mass transport limitations). This report is divided into five main chapters. Each chapter is a relatively stand-alone section. Chapter A reviews the general nature of coal tars and gives a summary of existing vapor pressure correlations for coal tars and model compounds. Chapter B summarizes the main experimental approaches for coal tar preparation and characterization which have been used throughout the project. Chapter C is concerned with the selection of the model compounds for coal pyrolysis tars and reviews the data available to us on the vapor pressures of high boiling point aromatic compounds. This chapter also deals with the question of identifying factors that govern the vapor pressures of coal tar model materials and their mixtures. Chapter D covers the vapor pressures and heats of vaporization of primary cellulose tars. Chapter E discusses the results of the main focus of this study. In summary, this work provides improved understanding of the volatility of coal and cellulose pyrolysis tars. It has resulted in new experimentally verified vapor pressure correlations for use in pyrolysis models. Further research on this topic should aim at developing general vapor pressure correlations for all coal tars, based on their molecular weight together with certain specific chemical characteristics i.e. hydroxyl group content.

  10. Information Security: Coordination of Federal Cyber Security...

    Office of Environmental Management (EM)

    Security: Coordination of Federal Cyber Security Research and Development Information Security: Coordination of Federal Cyber Security Research and Development GAO recommends that...

  11. Laser vaporization/ionization interface for coupling microscale separation techniques with mass spectrometry

    DOE Patents [OSTI]

    Yeung, E.S.; Chang, Y.C.

    1999-06-29T23:59:59.000Z

    The present invention provides a laser-induced vaporization and ionization interface for directly coupling microscale separation processes to a mass spectrometer. Vaporization and ionization of the separated analytes are facilitated by the addition of a light-absorbing component to the separation buffer or solvent. 8 figs.

  12. Marine Corps Base Quantico Achieves 85% Savings in Parking Lighting...

    Broader source: Energy.gov (indexed) [DOE]

    conducting a major overhaul of its outdoor lighting (replacing 2,000 fixtures with LED lights), while boosting safety and security throughout the site. mcbquantico2014.pdf More...

  13. Lighting Research Group FinalReportOctober1999

    E-Print Network [OSTI]

    Lighting Research Group FinalReportOctober1999 Lighting Recommendations for the Social Security Administration Frank Hagel Federal Building in Richmond CA #12;Final Report Lighting Recommendations to improve the lighting quality and energy efficiency of the lighting system at the Social Security

  14. Liquid-phase and vapor-phase dehydration of organic/water solutions

    DOE Patents [OSTI]

    Huang, Yu (Palo Alto, CA); Ly, Jennifer (San Jose, CA); Aldajani, Tiem (San Jose, CA); Baker, Richard W. (Palo Alto, CA)

    2011-08-23T23:59:59.000Z

    Processes for dehydrating an organic/water solution by pervaporation or vapor separation using fluorinated membranes. The processes are particularly useful for treating mixtures containing light organic components, such as ethanol, isopropanol or acetic acid.

  15. To estimate vapor pressure easily

    SciTech Connect (OSTI)

    Yaws, C.L.; Yang, H.C. (Lamar Univ., Beaumont, TX (USA))

    1989-10-01T23:59:59.000Z

    Vapor pressures as functions of temperature for approximately 700 major organic chemical compounds are given. The tabulation also gives the temperature range for which the data are applicable. Minimum and maximum temperatures are denoted by TMIN and TMAX. The Antoine equation that correlates vapor pressure as a function of temperature is described. A representative comparison of calculated and actual data values for vapor pressure is shown for ethyl alcohol. The coefficient tabulation is based on both literature (experimental data) and estimated values.

  16. Water Vapor Experiment Concludes

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron SpinPrincetonUsing Maps1DOE AwardsDNitrateEnergyNews3 Water Vapor

  17. ARM Water Vapor IOP

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office511041cloth DocumentationProducts (VAP) VAP Update Information on new,Scanning Radar323ARM Water Vapor IOP

  18. Room-temperature cw operation of InGaP/InGaAlP visible light laser diodes on GaAs substrates grown by metalorganic chemical vapor deposition

    SciTech Connect (OSTI)

    Ishikawa, M.; Ohba, Y.; Sugawara, H.; Yamamoto, M.; Nakanisi, T.

    1986-01-20T23:59:59.000Z

    Room-temperature cw operation for InGaP/InGaAlP double heterostructure (DH) laser diodes on GaAs substrates was achieved for the first time. The DH wafers were grown by low-pressure metalorganic chemical vapor deposition using methyl metalorganics. A lasing wavelength of 679 nm and a threshold current of 109 mA at 24C were obtained for an inner stripe structure laser diode with a 250- m-long and 7- m stripe geometry. The laser operated at up to 51C. The characteristic temperature T0 was 87 K at around room temperature. The lowest threshold current density, 5.0 kA/cmS, was obtained with a 20- m stripe width laser diode under room-temperature pulsed operation.

  19. Vapor Transport in Dry Soils

    SciTech Connect (OSTI)

    Gee, Glendon W.; Ward, Anderson L.

    2001-11-16T23:59:59.000Z

    Water-vapor movement in soils is a complex process, controlled by both diffusion and advection and influenced by pressure and thermal gradients acting across tortuous flow paths. Wide-ranging interest in water-vapor transport includes both theoretical and practical aspects. Just how pressure and thermal gradients enhance water-vapor flow is still not completely understood and subject to ongoing research. Practical aspects include dryland farming (surface mulching), water harvesting (aerial wells), fertilizer placement, and migration of contaminants at waste-sites. The following article describes the processes and practical applications of water-vapor transport, with emphasis on unsaturated (dry) soil systems.

  20. Vaporization of zinc from scrap

    SciTech Connect (OSTI)

    Ozturk, B.; Fruehan, R.J. [Carnegie Mellon Univ., Pittsburgh, PA (United States)

    1996-12-31T23:59:59.000Z

    The rate of zinc vaporization from galvanized scrap was measured using a thermogravimetric apparatus along with chemical analysis. It is found that the rate of zinc vaporization is very fast in nitrogen and carbon monoxide atmospheres at temperatures higher than 950 C. At lower temperature rate decreases with decreasing temperature and is controlled by the gas phase mass transport. The simultaneous oxidation and vaporization of zinc occurs when the samples were heated in carbon dioxide and air. The current experimental results indicate that almost all of the zinc from scrap vaporizes during the heating process in a very short period of time after the temperature reaches above 850 C.

  1. NNSA Administrator Looks to Future of Nuclear Security at STRATCOM Symposium

    ScienceCinema (OSTI)

    Thomas D'Agostino

    2010-09-01T23:59:59.000Z

    Administrator Thomas P. DAgostino of the National Nuclear Security Administration (NNSA) discusses the future of the Nuclear Security Enterprise and its strategic deterrence mission in light of President Obamas unprecedented nuclear security agenda.

  2. Vapor spill pipe monitor

    DOE Patents [OSTI]

    Bianchini, G.M.; McRae, T.G.

    1983-06-23T23:59:59.000Z

    The invention is a method and apparatus for continually monitoring the composition of liquefied natural gas flowing from a spill pipe during a spill test by continually removing a sample of the LNG by means of a probe, gasifying the LNG in the probe, and sending the vaporized LNG to a remote ir gas detector for analysis. The probe comprises three spaced concentric tubes surrounded by a water jacket which communicates with a flow channel defined between the inner and middle, and middle and outer tubes. The inner tube is connected to a pump for providing suction, and the probe is positioned in the LNG flow below the spill pipe with the tip oriented partly downward so that LNG is continuously drawn into the inner tube through a small orifice. The probe is made of a high thermal conductivity metal. Hot water is flowed through the water jacket and through the flow channel between the three tubes to provide the necessary heat transfer to flash vaporize the LNG passing through the inner channel of the probe. The gasified LNG is transported through a connected hose or tubing extending from the probe to a remote ir sensor which measures the gas composition.

  3. Special Analysis for the Disposal of the Idaho National Laboratory Unirradiated Light Water Breeder Reactor Rods and Pellets Waste Stream at the Area 5 Radioactive Waste Management Site, Nevada National Security Site, Nye County, Nevada

    SciTech Connect (OSTI)

    Shott, Gregory [NSTec

    2014-08-31T23:59:59.000Z

    The purpose of this special analysis (SA) is to determine if the Idaho National Laboratory (INL) Unirradiated Light Water Breeder Reactor (LWBR) Rods and Pellets waste stream (INEL103597TR2, Revision 2) is suitable for disposal by shallow land burial (SLB) at the Area 5 Radioactive Waste Management Site (RWMS). The INL Unirradiated LWBR Rods and Pellets waste stream consists of 24 containers with unirradiated fabricated rods and pellets composed of uranium oxide (UO2) and thorium oxide (ThO2) fuel in zirconium cladding. The INL Unirradiated LWBR Rods and Pellets waste stream requires an SA because the 229Th, 230Th, 232U, 233U, and 234U activity concentrations exceed the Nevada National Security Site (NNSS) Waste Acceptance Criteria (WAC) Action Levels.

  4. Vapor Retarder Classification - Building America Top Innovation...

    Energy Savers [EERE]

    the Top Innovation. See an example of vapor retarder best practices in action. Find other case studies of Building America projects across the country that utilizes vapor retarder...

  5. Enthalpies of Vaporization and Vapor Pressures of Some Deuterated Hydrocarbons. Liquid-Vapor Pressure Isotope Effects

    E-Print Network [OSTI]

    Chickos, James S.

    Enthalpies of Vaporization and Vapor Pressures of Some Deuterated Hydrocarbons. Liquid hydrocarbons and their perdeuterated analogues have been determined by correlation-gas chromatography of cyclohexane-d12 and benzene-d6. Other hydrocarbons studied include the perdeuterated forms of hexane, toluene

  6. Passive vapor extraction feasibility study

    SciTech Connect (OSTI)

    Rohay, V.J.

    1994-06-30T23:59:59.000Z

    Demonstration of a passive vapor extraction remediation system is planned for sites in the 200 West Area used in the past for the disposal of waste liquids containing carbon tetrachloride. The passive vapor extraction units will consist of a 4-in.-diameter pipe, a check valve, a canister filled with granular activated carbon, and a wind turbine. The check valve will prevent inflow of air that otherwise would dilute the soil gas and make its subsequent extraction less efficient. The granular activated carbon is used to adsorb the carbon tetrachloride from the air. The wind turbine enhances extraction rates on windy days. Passive vapor extraction units will be designed and operated to meet all applicable or relevant and appropriate requirements. Based on a cost analysis, passive vapor extraction was found to be a cost-effective method for remediation of soils containing lower concentrations of volatile contaminants. Passive vapor extraction used on wells that average 10-stdft{sup 3}/min air flow rates was found to be more cost effective than active vapor extraction for concentrations below 500 parts per million by volume (ppm) of carbon tetrachloride. For wells that average 5-stdft{sup 3}/min air flow rates, passive vapor extraction is more cost effective below 100 ppm.

  7. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  8. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  9. Portable vapor diffusion coefficient meter

    DOE Patents [OSTI]

    Ho, Clifford K. (Albuquerque, NM)

    2007-06-12T23:59:59.000Z

    An apparatus for measuring the effective vapor diffusion coefficient of a test vapor diffusing through a sample of porous media contained within a test chamber. A chemical sensor measures the time-varying concentration of vapor that has diffused a known distance through the porous media. A data processor contained within the apparatus compares the measured sensor data with analytical predictions of the response curve based on the transient diffusion equation using Fick's Law, iterating on the choice of an effective vapor diffusion coefficient until the difference between the predicted and measured curves is minimized. Optionally, a purge fluid can forced through the porous media, permitting the apparatus to also measure a gas-phase permeability. The apparatus can be made lightweight, self-powered, and portable for use in the field.

  10. Vapor deposition of hardened niobium

    DOE Patents [OSTI]

    Blocher, Jr., John M. (Columbus, OH); Veigel, Neil D. (Columbus, OH); Landrigan, Richard B. (Columbus, OH)

    1983-04-19T23:59:59.000Z

    A method of coating ceramic nuclear fuel particles containing a major amount of an actinide ceramic in which the particles are placed in a fluidized bed maintained at ca. 800.degree. to ca. 900.degree. C., and niobium pentachloride vapor and carbon tetrachloride vapor are led into the bed, whereby niobium metal is deposited on the particles and carbon is deposited interstitially within the niobium. Coating apparatus used in the method is also disclosed.

  11. National Nuclear Security Administration | National Nuclear Security...

    National Nuclear Security Administration (NNSA)

    National Nuclear Security Administration | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing...

  12. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    Information Security Group IY5512 Computer Security Part 7b: Windows securityPart 7b: Windows security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security Group) of Windows machines. 2 Information Security Group Objectives II · Focus on Active Directory, authentication

  13. Transportation Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

  14. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08T23:59:59.000Z

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  15. Analysis of crude oil vapor pressures at the U.S. Strategic Petroleum Reserve.

    SciTech Connect (OSTI)

    Rudeen, David Keith (GRAM, Inc., Albuquerque, NM); Lord, David L.

    2005-08-01T23:59:59.000Z

    Crude oil storage caverns at the U.S. Strategic Petroleum Reserve (SPR) are solution-mined from subsurface salt domes along the U.S. Gulf Coast. While these salt domes exhibit many attractive characteristics for large-volume, long-term storage of oil such as low cost for construction, low permeability for effective fluids containment, and secure location deep underground, they also present unique technical challenges for maintaining oil quality within delivery standards. The vapor pressures of the crude oils stored at SPR tend to increase with storage time due to the combined effects of geothermal heating and gas intrusion from the surrounding salt. This presents a problem for oil delivery offsite because high vapor-pressure oil may lead to excessive atmospheric emissions of hydrocarbon gases that present explosion hazards, health hazards, and handling problems at atmospheric pressure. Recognizing this potential hazard, the U.S. Department of Energy, owner and operator of the SPR, implemented a crude oil vapor pressure monitoring program that collects vapor pressure data for all the storage caverns. From these data, DOE evaluates the rate of change in vapor pressures of its oils in the SPR. Moreover, DOE implemented a vapor pressure mitigation program in which the oils are degassed periodically and will be cooled immediately prior to delivery in order to reduce the vapor pressure to safe handling levels. The work described in this report evaluates the entire database since its origin in 1993, and determines the current levels of vapor pressure around the SPR, as well as the rate of change for purposes of optimizing both the mitigation program and meeting safe delivery standards. Generally, the rate of vapor pressure increase appears to be lower in this analysis than reported in the past and, problematic gas intrusion seems to be limited to just a few caverns. This being said, much of the current SPR inventory exceeds vapor pressure delivery guidelines and must be degassed and cooled in order to meet current delivery standards.

  16. Kinetics of wet sodium vapor complex plasma

    SciTech Connect (OSTI)

    Mishra, S. K., E-mail: nishfeb@rediffmail.com [Institute for Plasma Research (IPR), Gandhinagar 382428 (India); Sodha, M. S. [Centre of Energy Studies, Indian Institute of Technology Delhi (IITD), New Delhi 110016 (India)] [Centre of Energy Studies, Indian Institute of Technology Delhi (IITD), New Delhi 110016 (India)

    2014-04-15T23:59:59.000Z

    In this paper, we have investigated the kinetics of wet (partially condensed) Sodium vapor, which comprises of electrons, ions, neutral atoms, and Sodium droplets (i) in thermal equilibrium and (ii) when irradiated by light. The formulation includes the balance of charge over the droplets, number balance of the plasma constituents, and energy balance of the electrons. In order to evaluate the droplet charge, a phenomenon for de-charging of the droplets, viz., evaporation of positive Sodium ions from the surface has been considered in addition to electron emission and electron/ion accretion. The analysis has been utilized to evaluate the steady state parameters of such complex plasmas (i) in thermal equilibrium and (ii) when irradiated; the results have been graphically illustrated. As a significant outcome irradiated, Sodium droplets are seen to acquire large positive potential, with consequent enhancement in the electron density.

  17. Security Specialist

    Broader source: Energy.gov [DOE]

    The position is located in the Office of Environmental Management (EM),Office of Safeguards, Security and Emergency Preparedness (EM-44). The mission of EM-44 is to develop and oversee the...

  18. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  19. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  20. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  1. Interactive Montages of Sprites for Indexing and Summarizing Security Video

    E-Print Network [OSTI]

    Pal, Chris

    for indexing and visualizing video in the context of security applications. We wish to index security video that contains relatively rare but important events, such as security video taken from large public or industrial slowly occurring lighting changes and alterations of camera position. To achieve this, we compute a MAP

  2. Security of counterfactual quantum cryptography

    SciTech Connect (OSTI)

    Yin Zhenqiang; Li Hongwei; Chen Wei; Han Zhengfu; Guo Guangcan [Key Laboratory of Quantum Information, University of Science and Technology of China, Hefei 230026 (China)

    2010-10-15T23:59:59.000Z

    Recently, a 'counterfactual' quantum-key-distribution scheme was proposed by T.-G. Noh [Phys. Rev. Lett. 103, 230501 (2009)]. In this scheme, two legitimate distant peers may share secret keys even when the information carriers are not traveled in the quantum channel. We find that this protocol is equivalent to an entanglement distillation protocol. According to this equivalence, a strict security proof and the asymptotic key bit rate are both obtained when a perfect single-photon source is applied and a Trojan horse attack can be detected. We also find that the security of this scheme is strongly related to not only the bit error rate but also the yields of photons. And our security proof may shed light on the security of other two-way protocols.

  3. Many exterior entry lights in residential and commercial applications use two-

    E-Print Network [OSTI]

    , and replacement CFLs are not widely stocked. The Light-Emitting Diode (LED) Hybrid Security Fixture combines

  4. Vapor deposition of thin films

    DOE Patents [OSTI]

    Smith, David C. (Los Alamos, NM); Pattillo, Stevan G. (Los Alamos, NM); Laia, Jr., Joseph R. (Los Alamos, NM); Sattelberger, Alfred P. (Los Alamos, NM)

    1992-01-01T23:59:59.000Z

    A highly pure thin metal film having a nanocrystalline structure and a process of preparing such highly pure thin metal films of, e.g., rhodium, iridium, molybdenum, tungsten, rhenium, platinum, or palladium by plasma assisted chemical vapor deposition of, e.g., rhodium(allyl).sub.3, iridium(allyl).sub.3, molybdenum(allyl).sub.4, tungsten(allyl).sub.4, rhenium(allyl).sub.4, platinum(allyl).sub.2, or palladium(allyl).sub.2 are disclosed. Additionally, a general process of reducing the carbon content of a metallic film prepared from one or more organometallic precursor compounds by plasma assisted chemical vapor deposition is disclosed.

  5. Taxation and Social Security

    E-Print Network [OSTI]

    Kaplow, Louis

    2006-01-01T23:59:59.000Z

    Re: Taxation and Social Security Attached is draft chapter11 TAXATION AND SOCIAL SECURITY A substantial fraction ofaspects of social security schemes in a setting in which

  6. Security and Elections

    E-Print Network [OSTI]

    Bishop, Matt; Peisert, Sean

    2012-01-01T23:59:59.000Z

    World Conf. Information Security Education, 2007, pp. 17–24;Security andElections IEEE Security & Privacy, 10(5):64–67, Sept. -

  7. CAMPUS SECURITY REPORT 2009

    E-Print Network [OSTI]

    CAMPUS SECURITY REPORT 2009 San Francisco State University University Police Department 1600 & Procedure Concerning Security, Access & Maintenance of Campus Facilities & Weapons Policies........................................................... 6 g. Safety & Security

  8. Vacuum vapor deposition gun assembly

    DOE Patents [OSTI]

    Zeren, Joseph D. (Boulder, CO)

    1985-01-01T23:59:59.000Z

    A vapor deposition gun assembly includes a hollow body having a cylindrical outer surface and an end plate for holding an adjustable heat sink, a hot hollow cathode gun, two magnets for steering the plasma from the gun into a crucible on the heat sink, and a shutter for selectively covering and uncovering the crucible.

  9. Hydrogen Cars and Water Vapor

    E-Print Network [OSTI]

    Colorado at Boulder, University of

    misidentified as "zero-emissions vehicles." Fuel cell vehicles emit water vapor. A global fleet could have, with discernible effects on people and ecosystems. The broad environmental effects of fuel cell vehicles. This cycle is currently under way with hydrogen fuel cells. As fuel cell cars are suggested as a solution

  10. Tag: Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Tag: Security Displaying 1 - 6 of 6... Category: Security Sheltering in Place If you are advised to shelter-in-place by local news or our website, please follow these...

  11. Vapor phase modifiers for oxidative coupling

    DOE Patents [OSTI]

    Warren, Barbara K. (Charleston, WV)

    1991-01-01T23:59:59.000Z

    Volatilized metal compounds retard vapor phase alkane conversion reactions in oxidative coupling processes that convert lower alkanes to higher hydrocarbons.

  12. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  13. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  14. Security Rulemaking

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742 33Frequently AskedEnergy SmallImplementingSecurity SymposiumSecuring the Nation's509Department2

  15. Faculty Information Security Guide

    E-Print Network [OSTI]

    Myers, Lawrence C.

    Faculty Information Security Guide Dartmouth Your information is vitally important to your teaching protect your information. THE DARTMOUTH INFORMATION SECURITY COMMITTEE The Dartmouth Information Security Committee (DISC) meets monthly to assess vulnerabilities of information security, and to develop and revise

  16. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    April 2004 SELECTING INFORMATION TECHNOLOGY SECURITY PRODUCTS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Information technology security prod ucts are essential to better secure infor mation technology (IT) systems

  17. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

  18. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  19. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-29T23:59:59.000Z

    This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Admin Chg 2, dated 5-15-15, cancels Admin Chg 1.

  20. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18T23:59:59.000Z

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  1. Vapor canister heater for evaporative emissions systems

    SciTech Connect (OSTI)

    Bishop, R.P.; Berg, P.G.

    1987-01-01T23:59:59.000Z

    Automotive evaporative emissions systems use a charcoal canister to store evaporative hydrocarobn emissions. These stored vapors are later purged and burned during engine operation. Under certain conditions the engine cannot completely purge the canister of the stored fuel vapors, which results in a decreased vapor storage capacity in the canister. A self-regulating PTC (Positive Temperature Coefficient) heater has been developed to warm the purge air as it enters the canister, in order to provide thermal energy for increased release of the vapors from charcoal sites. This paper describes the construction and operation of the vapor canister heater as it relates to improved evaporative emission system performance.

  2. An optical water vapor sensor for unmanned aerial vehicles

    SciTech Connect (OSTI)

    Timothy A. Berkoff; Paul L. Kebabian; Robert A. McClatchy; Charles E. Kolb; Andrew Freedman

    1998-12-01T23:59:59.000Z

    The water vapor sensor developed by Aerodyne Research, based on the optical absorption of light at {approximately}935 nm, has been successfully demonstrated on board the Pacific Northwest National Laboratory's Gulfstream-1 research aircraft during the Department of Energy's ARM Intensive Operations Period in August 1998. Data taken during this field campaign show excellent agreement with a chilled mirror and Lyman-alpha hygrometers and measurements confirm the ability to measure rapid, absolute water vapor fluctuations with a high degree of instrument stability and accuracy, with a noise level as low 10 ppmv (1 Hz measurement bandwidth). The construction of this small, lightweight sensor contains several unique elements which result in several significant advantages when compared to other techniques. First, the low power consumption Argon discharge lamp provides an optical beam at a fixed wavelength without a need for temperature or precision current control. The multi-pass absorption cell developed for this instrument provides a compact, low cost method that can survive deployment in the field. Fiber-optic cables, which are used to convey to light between the absorption cell, light source, and detection modules enable remote placement of the absorption cell from the opto-electronics module. Finally, the sensor does not use any moving parts which removes a significant source of potential malfunction. The result is an instrument which maintained its calibration throughout the field measurement campaign, and was not affected by high vibration and large uncontrolled temperature excursions. We believe that the development of an accurate, fast response water vapor monitor described in this report will open up new avenues of aerial-vehicle-based atmospheric research which have been relatively unexplored due to the lack of suitable low-cost, light-weight instrumentation.

  3. Means and method for vapor generation

    DOE Patents [OSTI]

    Carlson, Larry W. (Oswego, IL)

    1984-01-01T23:59:59.000Z

    A liquid, in heat transfer contact with a surface heated to a temperature well above the vaporization temperature of the liquid, will undergo a multiphase (liquid-vapor) transformation from 0% vapor to 100% vapor. During this transition, the temperature driving force or heat flux and the coefficients of heat transfer across the fluid-solid interface, and the vapor percentage influence the type of heating of the fluid--starting as "feedwater" heating where no vapors are present, progressing to "nucleate" heating where vaporization begins and some vapors are present, and concluding with "film" heating where only vapors are present. Unstable heating between nucleate and film heating can occur, accompanied by possibly large and rapid temperature shifts in the structures. This invention provides for injecting into the region of potential unstable heating and proximate the heated surface superheated vapors in sufficient quantities operable to rapidly increase the vapor percentage of the multiphase mixture by perhaps 10-30% and thereby effectively shift the multiphase mixture beyond the unstable heating region and up to the stable film heating region.

  4. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security's IT Security Procedures require that non-public University information, including social security numbers and professional information in a secure and appropriate manner. #12;

  5. Heats of vaporization of room temperature ionic liquids by tunable vacuum ultraviolet photoionization

    SciTech Connect (OSTI)

    Chambreau, Steven D.; Vaghjiani, Ghanshyam L.; To, Albert; Koh, Christine; Strasser, Daniel; Kostko, Oleg; Leone, Stephen R.

    2009-11-25T23:59:59.000Z

    The heats of vaporization of the room temperature ionic liquids (RTILs) N-butyl-N-methylpyrrolidinium bistrifluorosulfonylimide, N-butyl-N-methylpyrrolidinium dicyanamide, and 1-butyl-3-methylimidazolium dicyanamide are determined using a heated effusive vapor source in conjunction with single photon ionization by a tunable vacuum ultraviolet synchrotron source. The relative gas phase ionic liquid vapor densities in the effusive beam are monitored by clearly distinguished dissociative photoionization processes via a time-of-flight mass spectrometer at a tunable vacuum ultraviolet beamline 9.0.2.3 (Chemical Dynamics Beamline) at the Advanced Light Source synchrotron facility. Resulting in relatively few assumptions, through the analysis of both parent cations and fragment cations, the heat of vaporization of N-butyl-N-methylpyrrolidinium bistrifluorosulfonylimide is determined to be Delta Hvap(298.15 K) = 195+-19 kJ mol-1. The observed heats of vaporization of 1-butyl-3-methylimidazolium dicyanamide (Delta Hvap(298.15 K) = 174+-12 kJ mol-1) and N-butyl-N-methylpyrrolidinium dicyanamide (Delta Hvap(298.15 K) = 171+-12 kJ mol-1) are consistent with reported experimental values using electron impact ionization. The tunable vacuum ultraviolet source has enabled accurate measurement of photoion appearance energies. These appearance energies are in good agreement with MP2 calculations for dissociative photoionization of the ion pair. These experimental heats of vaporization, photoion appearance energies, and ab initio calculations corroborate vaporization of these RTILs as intact cation-anion ion pairs.

  6. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2010 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  7. INSTITUTE FOR CYBER SECURITY Security Models

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY 1 Security Models: Past, Present and Future Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security University of Texas at San Antonio July 2009 ravi.sandhu@utsa.edu www.profsandhu.com © Ravi Sandhu #12;INSTITUTE FOR CYBER SECURITY 2 THE BIG

  8. Security Procedures Caltech Campus Security Dispatch

    E-Print Network [OSTI]

    Goddard III, William A.

    Security Procedures Caltech Campus Security Dispatch: 5000 (from any Caltech phone) or (626) 395-5000 (from any phone) When emergencies arise, contact Caltech Campus Security MEDICAL If someone experiences a medical emergency: · Remain calm · Notify Campus Security Dispatch · Do NOT move victim EARTHQUAKE When

  9. Security rules versus Security properties Mathieu Jaume

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Security rules versus Security properties Mathieu Jaume SPI ­ LIP6 ­ University Pierre & Marie components of security policies can be expressed, and we identify their role in the de- scription of a policy, of a system and of a secure system. In this setting, we formally describe two approaches to define policies

  10. T-592: Cisco Security Advisory: Cisco Secure Access Control System...

    Energy Savers [EERE]

    92: Cisco Security Advisory: Cisco Secure Access Control System Unauthorized Password Change Vulnerability T-592: Cisco Security Advisory: Cisco Secure Access Control System...

  11. Using Operational Security (OPSEC) to Support a Cyber Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Using Operational Security (OPSEC) to Support a Cyber Security Culture in Control Systems Environments Using Operational Security (OPSEC) to Support a Cyber Security Culture in...

  12. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Environmental Management (EM)

    186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability V-186: Drupal Login Security Module Security Bypass and Denial of Service Vulnerability June...

  13. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  14. Sandia Energy - Installation Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Installation Energy Security Home Stationary Power Grid Modernization Resilient Electric Infrastructures Military Installation Energy Security Installation Energy SecurityTara...

  15. Control of flow through a vapor generator

    DOE Patents [OSTI]

    Radcliff, Thomas D.

    2005-11-08T23:59:59.000Z

    In a Rankine cycle system wherein a vapor generator receives heat from exhaust gases, provision is made to avoid overheating of the refrigerant during ORC system shut down while at the same time preventing condensation of those gases within the vapor generator when its temperature drops below a threshold temperature by diverting the flow of hot gases to ambient and to thereby draw ambient air through the vapor generator in the process. In one embodiment, a bistable ejector is adjustable between one position, in which the hot gases flow through the vapor generator, to another position wherein the gases are diverted away from the vapor generator. Another embodiment provides for a fixed valve ejector with a bias towards discharging to ambient, but with a fan on the downstream side of said vapor generator for overcoming this bias.

  16. Vapor explosion in the RIA-ST-4 experiment. [BWR

    SciTech Connect (OSTI)

    El-Genk, M.S.

    1980-01-01T23:59:59.000Z

    A concern in assuring the safety of commercial light water reactors (LWRs) is whether core overheating, during which molten fuel is produced, can lead to massive vaporization of the coolant and shock pressurization of the system due to an energetic molten fuel-coolant interaction (MFCI). The RIA-ST-4 experiment was one of four scoping tests in the Reactivity Initiated Accident (RIA) Test Series which is being conducted in the Power Burst Facility (PBF) to define an energy deposition failure threshold and to determine modes and consequences of fuel rod failure during a postulated boiling water reactor (BWR) control rod drop accident.

  17. Coupling apparatus for a metal vapor laser

    DOE Patents [OSTI]

    Ball, Don G. (Livermore, CA); Miller, John L. (Dublin, CA)

    1993-01-01T23:59:59.000Z

    Coupling apparatus for a large bore metal vapor laser is disclosed. The coupling apparatus provides for coupling high voltage pulses (approximately 40 KV) to a metal vapor laser with a high repetition rate (approximately 5 KHz). The coupling apparatus utilizes existing thyratron circuits and provides suitable power input to a large bore metal vapor laser while maintaining satisfactory operating lifetimes for the existing thyratron circuits.

  18. Coupling apparatus for a metal vapor laser

    DOE Patents [OSTI]

    Ball, D.G.; Miller, J.L.

    1993-02-23T23:59:59.000Z

    Coupling apparatus for a large bore metal vapor laser is disclosed. The coupling apparatus provides for coupling high voltage pulses (approximately 40 KV) to a metal vapor laser with a high repetition rate (approximately 5 KHz). The coupling apparatus utilizes existing thyratron circuits and provides suitable power input to a large bore metal vapor laser while maintaining satisfactory operating lifetimes for the existing thyratron circuits.

  19. Security Perimeter

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear SecurityUnder Budget

  20. Safety, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Scienceand Requirements RecentlyElectronicResourcesjobsJuly throughR EMaterialsSafety, Security

  1. Computer Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMForms AboutRESEARCHHydrosilylationComputer Security All JLF

  2. Tank vapor sampling and analysis data package for tank 241-C-106 waste retrieval sluicing system process test phase III

    SciTech Connect (OSTI)

    LOCKREM, L.L.

    1999-08-13T23:59:59.000Z

    This data package presents sampling data and analytical results from the March 28, 1999, vapor sampling of Hanford Site single-shell tank 241-C-106 during active sluicing. Samples were obtained from the 296-C-006 ventilation system stack and ambient air at several locations. Characterization Project Operations (CPO) was responsible for the collection of all SUMMATM canister samples. The Special Analytical Support (SAS) vapor team was responsible for the collection of all triple sorbent trap (TST), sorbent tube train (STT), polyurethane foam (PUF), and particulate filter samples collected at the 296-C-006 stack. The SAS vapor team used the non-electrical vapor sampling (NEVS) system to collect samples of the air, gases, and vapors from the 296-C-006 stack. The SAS vapor team collected and analyzed these samples for Lockheed Martin Hanford Corporation (LMHC) and Tank Waste Remediation System (TWRS) in accordance with the sampling and analytical requirements specified in the Waste Retrieval Sluicing System Vapor Sampling and Analysis Plan (SAP) for Evaluation of Organic Emissions, Process Test Phase III, HNF-4212, Rev. 0-A, (LMHC, 1999). All samples were stored in a secured Radioactive Materials Area (RMA) until the samples were radiologically released and received by SAS for analysis. The Waste Sampling and Characterization Facility (WSCF) performed the radiological analyses. The samples were received on April 5, 1999.

  3. Overview of chemical vapor infiltration

    SciTech Connect (OSTI)

    Besmann, T.M.; Stinton, D.P.; Lowden, R.A.

    1993-06-01T23:59:59.000Z

    Chemical vapor infiltration (CVI) is developing into a commercially important method for the fabrication of continuous filament ceramic composites. Current efforts are focused on the development of an improved understanding of the various processes in CVI and its modeling. New approaches to CVI are being explored, including pressure pulse infiltration and microwave heating. Material development is also proceeding with emphasis on improving the oxidation resistance of the interfacial layer between the fiber and matrix. This paper briefly reviews these subjects, indicating the current state of the science and technology.

  4. Wick for metal vapor laser

    DOE Patents [OSTI]

    Duncan, David B. (Livermore, CA)

    1992-01-01T23:59:59.000Z

    An improved wick for a metal vapor laser is made of a refractory metal cylinder, preferably molybdenum or tungsten for a copper laser, which provides the wicking surface. Alternately, the inside surface of the ceramic laser tube can be metalized to form the wicking surface. Capillary action is enhanced by using wire screen, porous foam metal, or grooved surfaces. Graphite or carbon, in the form of chunks, strips, fibers or particles, is placed on the inside surface of the wick to reduce water, reduce metal oxides and form metal carbides.

  5. Vapor phase modifiers for oxidative coupling

    DOE Patents [OSTI]

    Warren, B.K.

    1991-12-17T23:59:59.000Z

    Volatilized metal compounds are described which are capable of retarding vapor phase alkane conversion reactions in oxidative coupling processes that convert lower alkanes to higher hydrocarbons.

  6. Climate-derived tensions in Arctic security.

    SciTech Connect (OSTI)

    Backus, George A.; Strickland, James Hassler

    2008-09-01T23:59:59.000Z

    Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

  7. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Delivery and Energy Reliability #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY Federal agencies to support waivers and specific response legal authorities #12;INFRASTRUCTURE SECURITY

  8. CAMPUS SECURITY CARD REQUISITION

    E-Print Network [OSTI]

    CAMPUS SECURITY CARD REQUISITION DEPARTMENT LAST NAME GIVEN NAME(S) SFU ID NUMBER CARD NUMBER CAMPUS SECURITY OFFICE USE ONLY SERVICE CHARGE: ___________________________ DEPOSIT be reported or returned to Campus Security TC 050 (291-5448). CARDHOLDER SIGNATURE DATE: #12;

  9. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01T23:59:59.000Z

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  10. Flammability Characteristics of Hydrogen and Its Mixtures with Light Hydrocarbons at Atmospheric and Sub-atmospheric Pressures 

    E-Print Network [OSTI]

    Le, Thuy Minh Hai

    2013-07-13T23:59:59.000Z

    /vapor. This research focuses on the flammability limits of hydrogen and its binary mixtures with light hydrocarbons (methane, ethane, n-butane, and ethylene) at sub-atmospheric pressures. The flammability limits of hydrogen, light hydrocarbons, and binary mixtures...

  11. Flammability Characteristics of Hydrogen and Its Mixtures with Light Hydrocarbons at Atmospheric and Sub-atmospheric Pressures

    E-Print Network [OSTI]

    Le, Thuy Minh Hai

    2013-07-13T23:59:59.000Z

    /vapor. This research focuses on the flammability limits of hydrogen and its binary mixtures with light hydrocarbons (methane, ethane, n-butane, and ethylene) at sub-atmospheric pressures. The flammability limits of hydrogen, light hydrocarbons, and binary mixtures...

  12. Cyber Security | National Security | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power Administration would likeConstitution4Customer-Comments Sign In About |Cyber SecurityCyber

  13. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25T23:59:59.000Z

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  14. Security & Privacy | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security & Privacy Security & Privacy Privacy Notice We collect no personal information about you without your knowledge when you visit this site, although you may choose to...

  15. Advancing Global Nuclear Security

    Broader source: Energy.gov [DOE]

    Today world leaders gathered at The Hague for the Nuclear Security Summit, a meeting to measure progress and take action to secure sensitive nuclear materials.

  16. Tropospheric water vapor and climate sensitivity

    SciTech Connect (OSTI)

    Schneider, E.K.; Kirtman, B.P.; Lindzen, R.S. [Center for Ocean-Land-Atmosphere Studies, Calverton, MD (United States)] [Center for Ocean-Land-Atmosphere Studies, Calverton, MD (United States)

    1999-06-01T23:59:59.000Z

    Estimates are made of the effect of changes in tropospheric water vapor on the climate sensitivity to doubled carbon dioxide (CO{sub 2}) using a coarse resolution atmospheric general circulation model coupled to a slab mixed layer ocean. The sensitivity of the model to doubled CO{sub 2} is found as the difference between the equilibrium responses for control and doubled CO{sub 2} cases. Clouds are specified to isolate the water vapor feedback. Experiments in which the water vapor distribution is specified rather than internally calculated are used to find the contribution of water vapor in various layers and latitude belts to the sensitivity. The contribution of water vapor in layers of equal mass to the climate sensitivity varies by about a factor of 2 with height, with the largest contribution coming from layers between 450 and 750 mb, and the smallest from layers above 230 mb. The positive feedback on the global mean surface temperature response to doubled CO{sub 2} from water vapor above 750 mb is about 2.6 times as large as that from water vapor below 750 mb. The feedback on global mean surface temperature due to water vapor in the extratropical free troposphere is about 50% larger than the feedback due to the lower-latitude free troposphere water vapor. Several important sources of nonlinearity of the radiative heating rates were identified in the process of constructing the specified cloud and water vapor fields. These are (1) the interaction of clouds and solar radiation, which produces much more reflection of solar radiation for time mean clouds than for the instantaneous clouds; (2) the correlation of clouds and water vapor, which produces less downward longwave radiation at the ground for correlated clouds and water vapor than when these fields are independent; and (3) the interaction of water vapor with long wave radiation, which produces less downward longwave radiation at the ground of the average over instantaneous water vapor distributions than of the time mean water vapor distribution.

  17. Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without restriction, subject to copyright controls.)

    E-Print Network [OSTI]

    Thomas, Andrew

    the event for their gain. The Threats: Internet watch groups and cyber security experts have already potential cyber threats please visit the Center for Internet Security website at CISecurity.org. #12;Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without

  18. Data:7f0c8183-5b88-4bd5-857a-e29d0c8a9ddf | Open Energy Information

    Open Energy Info (EERE)

    20100501 End date if known: Rate name: SECURITY LIGHTING SERVICES: 400W Mercury Vapor Bulb Sector: Lighting Description: Dusk till Dawn Lighting Service Source or reference:...

  19. Data:7262b279-e32b-4a52-9d7f-9cf28788ca1e | Open Energy Information

    Open Energy Info (EERE)

    20100501 End date if known: Rate name: SECURITY LIGHTING SERVICES: 175w Mercury Vapor Bulb Sector: Lighting Description: Dusk till Dawn Lighting Service Source or reference:...

  20. Security tasks are highly interdependent.

    E-Print Network [OSTI]

    Motivation Security tasks are highly interdependent. To improve security tools, we need to understand how security practitioners collaborate in their organizations. Security practitioners in context Exchange of Information Develop security tools that: · Integrate information from different communication

  1. Security Policies Dr. Ahmad Almulhem

    E-Print Network [OSTI]

    Almulhem, Ahmad

    Security Policies Dr. Ahmad Almulhem Computer Engineering Department, KFUPM Spring 2008 Ahmad Almulhem - Network Security Engineering - 2008 1 / 51 #12;Security Policies Types of Security Policies Trust Types of Access Control Summary Part I Overview Ahmad Almulhem - Network Security Engineering

  2. LNG fire and vapor control system technologies

    SciTech Connect (OSTI)

    Konzek, G.J.; Yasutake, K.M.; Franklin, A.L.

    1982-06-01T23:59:59.000Z

    This report provides a review of fire and vapor control practices used in the liquefied natural gas (LNG) industry. Specific objectives of this effort were to summarize the state-of-the-art of LNG fire and vapor control; define representative LNG facilities and their associated fire and vapor control systems; and develop an approach for a quantitative effectiveness evaluation of LNG fire and vapor control systems. In this report a brief summary of LNG physical properties is given. This is followed by a discussion of basic fire and vapor control design philosophy and detailed reviews of fire and vapor control practices. The operating characteristics and typical applications and application limitations of leak detectors, fire detectors, dikes, coatings, closed circuit television, communication systems, dry chemicals, water, high expansion foam, carbon dioxide and halogenated hydrocarbons are described. Summary descriptions of a representative LNG peakshaving facility and import terminal are included in this report together with typical fire and vapor control systems and their locations in these types of facilities. This state-of-the-art review identifies large differences in the application of fire and vapor control systems throughout the LNG industry.

  3. Quantitative organic vapor-particle sampler

    DOE Patents [OSTI]

    Gundel, Lara (Berkeley, CA); Daisey, Joan M. (Walnut Creek, CA); Stevens, Robert K. (Cary, NC)

    1998-01-01T23:59:59.000Z

    A quantitative organic vapor-particle sampler for sampling semi-volatile organic gases and particulate components. A semi-volatile organic reversible gas sorbent macroreticular resin agglomerates of randomly packed microspheres with the continuous porous structure of particles ranging in size between 0.05-10 .mu.m for use in an integrated diffusion vapor-particle sampler.

  4. 6, 80698095, 2006 Water vapor in Asian

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    of Sciences, Beijing, China 2 National Center for Atmospheric Research, Boulder, CO, USA Received: 23 May 2006 vapor from European Center for Medium-Range Weather20 Forecasts (ECMWF) analyses. 1 Introduction Upper Tropospheric Water Vapor (UTWV) is a key greenhouse gas which exerts a major influence on the energy balance

  5. Single Molecule DNA Detection with an Atomic Vapor Notch Filter

    E-Print Network [OSTI]

    Uhland, Denis; Widmann, Matthias; Lee, Sang-Yun; Wrachtrup, Jörg; Gerhardt, Ilja

    2015-01-01T23:59:59.000Z

    The detection of single molecules has facilitated many advances in life- and material-sciences. Commonly, it founds on the fluorescence detection of single molecules, which are for example attached to the structures under study. For fluorescence microscopy and sensing the crucial parameters are the collection and detection efficiency, such that photons can be discriminated with low background from a labeled sample. Here we show a scheme for filtering the excitation light in the optical detection of single stranded labeled DNA molecules. We use the narrow-band filtering properties of a hot atomic vapor to filter the excitation light from the emitted fluorescence of a single emitter. The choice of atomic sodium allows for the use of fluorescent dyes, which are common in life-science. This scheme enables efficient photon detection, and a statistical analysis proves an enhancement of the optical signal of more than 15% in a confocal and in a wide-field configuration.

  6. HANFORD CHEMICAL VAPORS WORKER CONCERNS & EXPOSURE EVALUATION

    SciTech Connect (OSTI)

    ANDERSON, T.J.

    2006-12-20T23:59:59.000Z

    Chemical vapor emissions from underground hazardous waste storage tanks on the Hanford site in eastern Washington State are a potential concern because workers enter the tank farms on a regular basis for waste retrievals, equipment maintenance, and surveillance. Tank farm contractors are in the process of retrieving all remaining waste from aging single-shell tanks, some of which date to World War II, and transferring it to newer double-shell tanks. During the waste retrieval process, tank farm workers are potentially exposed to fugitive chemical vapors that can escape from tank headspaces and other emission points. The tanks are known to hold more than 1,500 different species of chemicals, in addition to radionuclides. Exposure assessments have fully characterized the hazards from chemical vapors in half of the tank farms. Extensive sampling and analysis has been done to characterize the chemical properties of hazardous waste and to evaluate potential health hazards of vapors at the ground surface, where workers perform maintenance and waste transfer activities. Worker concerns. risk communication, and exposure assessment are discussed, including evaluation of the potential hazards of complex mixtures of chemical vapors. Concentrations of vapors above occupational exposure limits-(OEL) were detected only at exhaust stacks and passive breather filter outlets. Beyond five feet from the sources, vapors disperse rapidly. No vapors have been measured above 50% of their OELs more than five feet from the source. Vapor controls are focused on limited hazard zones around sources. Further evaluations of vapors include analysis of routes of exposure and thorough analysis of nuisance odors.

  7. On the Security of the Ping-Pong Protocol

    E-Print Network [OSTI]

    Kim Bostroem; Timo Felbinger

    2008-07-07T23:59:59.000Z

    We briefly review the security of the ping-pong protocol in light of several attack scenarios suggested by various authors since the proposal of the protocol. We refute one recent attack on an ideal quantum channel, and show that a recent claim of falseness of our original security proof is erroneous.

  8. Stacked vapor fed amtec modules

    DOE Patents [OSTI]

    Sievers, Robert K. (North Huntingdon, PA)

    1989-01-01T23:59:59.000Z

    The present invention pertains to a stacked AMTEC module. The invention includes a tubular member which has an interior. The member is comprised of a ion conductor that substantially conducts ions relative to electrons, preferably a beta"-alumina solid electrolyte, positioned about the interior. A porous electrode for conducting electrons and allowing sodium ions to pass therethrough, and wherein electrons and sodium ions recombine to form sodium is positioned about the beta"-alumina solid electrolyte. The electrode is operated at a temperature and a pressure that allows the recombined sodium to vaporize. Additionally, an outer current collector grid for distributing electrons throughout the porous electrode is positioned about and contacts the porous electrode. Also included in the invention is transporting means for transporting liquid sodium to the beta"-alumina solid electrolyte of the tubular member. A transition piece is positioned about the interior of the member and contacts the transporting means. The transition piece divides the member into a first cell and a second cell such that each first and second cell has a beta"-alumina solid electrolyte, a first and second porous electrode and a grid. The transition piece conducts electrons from the interior of the tubular member. There is supply means for supplying sodium to the transporting means. Preferably the supply means is a shell which surrounds the tubular member and is operated at a temperature such that the vaporized sodium condenses thereon. Returning means for returning the condensed sodium from the shell to the transporting means provides a continuous supply of liquid sodium to the transporting means. Also, there are first conducting means for conducting electric current from the transition piece which extends through the shell, and second conducting means for conducting electric current to the grid of the first cell which extends through the shell.

  9. Quantitative Infrared Intensity Studies of Vapor-PhaseGlyoxal...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrared Intensity Studies of Vapor-Phase Glyoxal,Methylglyoxal, and 2,3-Butanedione (Diacetyl) with Quantitative Infrared Intensity Studies of Vapor-Phase Glyoxal,Methylglyoxal,...

  10. Absolute integrated intensities of vapor-phase hydrogen peroxide...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Absolute integrated intensities of vapor-phase hydrogen peroxide (H202) in the mid-infrared at atmospheric pressure. Absolute integrated intensities of vapor-phase hydrogen...

  11. Hydrogen-Bond Acidic Polymers for Chemical Vapor Sensing. | EMSL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Acidic Polymers for Chemical Vapor Sensing. Hydrogen-Bond Acidic Polymers for Chemical Vapor Sensing. Abstract: A review with 171 references. Hydrogen-bond acidic polymers for...

  12. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  13. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16T23:59:59.000Z

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  14. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  15. Smart lighting: New Roles for Light

    E-Print Network [OSTI]

    Salama, Khaled

    Smart lighting: New Roles for Light in the Solid State Lighting World Robert F. Karlicek, Jr. Director, Smart Lighting Engineering Research Center Professor, Electrical, Systems and Computer Lighting · What is Smart Lighting · Technology Barriers to Smart Lighting · Visible Light Communications

  16. The Data and Application Security and Privacy (DASPY) Challenge

    E-Print Network [OSTI]

    Sandhu, Ravi

    Computer security Information security = Computer security + Communications security Information Computer security Information security = Computer security + Communications security Information Cyber security (defensive) goals have evolved Computer security Information security = Computer

  17. MasteringWeb Services Security MasteringWeb Services Security

    E-Print Network [OSTI]

    Preview of MasteringWeb Services Security Preview of MasteringWeb Services Security Konstantin introduction Highlights of the book Web Services security problem XML Security WS-Security Security mechanisms for ASP.NET Web Services Planning and building secure Web Service systems ­ Architectural and policy

  18. Commercial Lighting

    Broader source: Energy.gov [DOE]

    Commercial lighting accounts for more than 20 percent of total commercial building energy use. The Energy Department works to reduce lighting energy use through research and deployment.

  19. Recovering hydrocarbons from hydrocarbon-containing vapors

    DOE Patents [OSTI]

    Mirza, Zia I. (La Verne, CA); Knell, Everett W. (Los Alamitos, CA); Winter, Bruce L. (Danville, CA)

    1980-09-30T23:59:59.000Z

    Values are recovered from a hydrocarbon-containing vapor by contacting the vapor with quench liquid consisting essentially of hydrocarbons to form a condensate and a vapor residue, the condensate and quench fluid forming a combined liquid stream. The combined liquid stream is mixed with a viscosity-lowering liquid to form a mixed liquid having a viscosity lower than the viscosity of the combined liquid stream to permit easy handling of the combined liquid stream. The quench liquid is a cooled portion of the mixed liquid. Viscosity-lowering liquid is separated from a portion of the mixed liquid and cycled to form additional mixed liquid.

  20. Lecture 13: Control System Cyber Security

    E-Print Network [OSTI]

    CERN. Geneva

    2013-01-01T23:59:59.000Z

    Today, the industralized world lives in symbiosis with control systems: it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and outline why the presenter is still waiting for a change in paradigm. Stefan Lüders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and...

  1. Sandia Energy - Security Risk Assessment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Risk Assessment Home Climate & Earth Systems WaterEnergy Nexus Water Monitoring & Treatment Technology Security Risk Assessment Security Risk Assessmentcwdd2015-05-04T21:...

  2. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    MonitoringClimate Security Climate Security Climate Security Global reductions in greenhouse gases will eventually be motivated by an international climate treaty and will entail...

  3. Chemical vapor infiltration using microwave energy

    DOE Patents [OSTI]

    Devlin, David J. (Los Alamos, NM); Currier, Robert P. (Los Alamos, NM); Laia, Jr., Joseph R. (Los Alamos, NM); Barbero, Robert S. (Santa Cruz, NM)

    1993-01-01T23:59:59.000Z

    A method for producing reinforced ceramic composite articles by means of chemical vapor infiltration and deposition in which an inverted temperature gradient is utilized. Microwave energy is the source of heat for the process.

  4. Chemical vapor deposition of functionalized isobenzofuran polymers

    E-Print Network [OSTI]

    Olsson, Ylva Kristina

    2007-01-01T23:59:59.000Z

    This thesis develops a platform for deposition of polymer thin films that can be further tailored by chemical surface modification. First, we explore chemical vapor deposition of functionalized isobenzofuran films using ...

  5. An advanced vapor-compression desalination system 

    E-Print Network [OSTI]

    Lara Ruiz, Jorge Horacio Juan

    2006-04-12T23:59:59.000Z

    Currently, the two dominant desalination methods are reverse osmosis (RO) and multi-stage flash (MSF). RO requires large capital investment and maintenance, whereas MSF is too energy intensive. An innovative vapor-compression desalination system...

  6. Modeling of LNG Pool Spreading and Vaporization

    E-Print Network [OSTI]

    Basha, Omar 1988-

    2012-11-20T23:59:59.000Z

    In this work, a source term model for estimating the rate of spreading and vaporization of LNG on land and sea is introduced. The model takes into account the composition changes of the boiling mixture, the varying thermodynamic properties due...

  7. Chemical vapor deposition of antimicrobial polymer coatings

    E-Print Network [OSTI]

    Martin, Tyler Philip, 1977-

    2007-01-01T23:59:59.000Z

    There is large and growing interest in making a wide variety of materials and surfaces antimicrobial. Initiated chemical vapor deposition (iCVD), a solventless low-temperature process, is used to form thin films of polymers ...

  8. Solid-Vapor Sorption Refrigeration Systems 

    E-Print Network [OSTI]

    Graebel, W.; Rockenfeller, U.; Kirol, L.

    1991-01-01T23:59:59.000Z

    SOLID-VAPOR SORPTION REFRIGERATION SYSTEMS DR. WILLIAM GRAEBEL DR. UWE ROCKENFELLER MR. LANCE KIROL Engineer President Chief Engineer Rocky Research Rocky Research Rocky Research Boulder city, NV Boulder city, NV Boulder City, NV Abstract.... Complex compounds have a number of advantages as working media, including: 43 SOLID-VAPOR SORPTION REFRIGERATION SYSTEMS DR. WILLIAM GRAEBEL Engineer Rocky Research Boulder city, NV DR. UWE ROCKENFELLER President Rocky Research Boulder city, NV MR...

  9. SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS

    E-Print Network [OSTI]

    SECURITY ASSESSMENTS: TOOLS FOR MEASURING THE EFFECTIVENESS OF SECURITY CONTROLS Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology The selection and implementation of security controls are critical decisions for protecting

  10. Campus Security Report 1 Campus seCurity

    E-Print Network [OSTI]

    Wilmers, Chris

    Campus Security Report 1 Campus seCurity and Fire saFety report UC Santa Cruz 2010 #12;Campus Security Report 2 UC Santa Cruz Geography ........................................................ 8 Security and Access to Campus Buildings and Grounds ........................................ 8

  11. Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES

    E-Print Network [OSTI]

    Newby, Gregory B.

    Information Security for Libraries (1) INFORMATION SECURITY FOR LIBRARIES Gregory B. Newby School an active role in information security. INTRODUCTION By most accounts, the proliferation of the Internet of information security, making concrete recommendations for safeguarding information and information access

  12. ANNUAL SECURITY FIRE SAFETY REPORT

    E-Print Network [OSTI]

    ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http://www.dartmouth.edu/~security/ #12;1 Table of Contents MESSAGE FROM THE DIRECTOR OF SAFETY AND SECURITY................................................................................................................................................................... 7 ANNUAL SECURITY REPORT

  13. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    of climate change, energy security and economic stability.DoD is improving U.S. energy security and national security.www.greenpacks.org • Energy Security & Climate Change:

  14. Office of Information Security

    Broader source: Energy.gov [DOE]

    The Office of Information Security is responsible for implementation of the Classified Matter Protection and Control Program (CMPC), the Operations Security Program (OPSEC) and the Facility Clearance Program and the Survey Program for Headquarters

  15. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  16. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

  17. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01T23:59:59.000Z

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  18. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  19. Stationary light in cold atomic gases

    E-Print Network [OSTI]

    Gor Nikoghosyan; Michael Fleischhauer

    2009-09-16T23:59:59.000Z

    We discuss stationary light created by a pair of counter-propagating control fields in Lambda-type atomic gases with electromagnetically induced transparency for the case of negligible Doppler broadening. In this case the secular approximation used in the discussion of stationary light in hot vapors is no longer valid. We discuss the quality of the effective light-trapping system and show that in contrast to previous claims it is finite even for vanishing ground-state dephasing. The dynamics of the photon loss is in general non exponential and can be faster or slower than in hot gases.

  20. SECURITY AND FIRE SAFETY

    E-Print Network [OSTI]

    Barrash, Warren

    ANNUAL SECURITY AND FIRE SAFETY REPORT 2014 #12;2 Boise State University 2014 Annual Security and Fire Safety Report From the Vice President for Campus Operations and General Counsel At Boise State University, we are committed to providing a safe and secure environment for students, staff

  1. UNIVERSITY POLICE ANNUAL SECURITY

    E-Print Network [OSTI]

    Kulp, Mark

    UNIVERSITY POLICE 2013 ANNUAL SECURITY AND FIRE SAFETY GUIDE In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act The University of New Orleans. Please take a moment to read the following information. #12;ANNUAL SECURITY AND FIRE SAFETY GUIDE 2013

  2. Energy, Climate & Infrastructure Security

    E-Print Network [OSTI]

    Energy, Climate & Infrastructure Security EXCEPTIONAL SERVICE IN THE NATIONAL INTEREST Sandia Security Administration under contract DE-AC04-94AL85000. SAND 2012-1846P CustomTraining Sandia providesPRAsandhowtheycanbemanaged to increase levels of safety and security. Like othertrainings,Sandiaexpertsdesigncoursesto beasbroadorin

  3. Secure Core Contact Information

    E-Print Network [OSTI]

    Secure Core Contact Information C. E. Irvine irvine@nps.edu 831-656-2461 Department of Computer for the secure management of local and/or remote information in multiple contexts. The SecureCore project Science Graduate School of Operations and Information Sciences www.cisr.nps.edu Project Description

  4. Information Security Guide

    E-Print Network [OSTI]

    Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12; Table of Contents Introduction 1 Why do I need to invest in information security? 2 Where do I need to focus my attention in accomplishing critical information security goals? 4 What are the key activities

  5. Light Properties Light travels at the speed of light `c'

    E-Print Network [OSTI]

    Mojzsis, Stephen J.

    LIGHT!! #12;Light Properties Light travels at the speed of light `c' C = 3 x 108 m/s Or 190,000 miles/second!! Light could travel around the world about 8 times in one second #12;What is light?? Light is a "wave packet" A photon is a "light particle" #12;Electromagnetic Radiation and You Light is sometimes

  6. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05T23:59:59.000Z

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  7. Vapor scavenging by atmospheric aerosol particles

    SciTech Connect (OSTI)

    Andrews, E.

    1996-05-01T23:59:59.000Z

    Particle growth due to vapor scavenging was studied using both experimental and computational techniques. Vapor scavenging by particles is an important physical process in the atmosphere because it can result in changes to particle properties (e.g., size, shape, composition, and activity) and, thus, influence atmospheric phenomena in which particles play a role, such as cloud formation and long range transport. The influence of organic vapor on the evolution of a particle mass size distribution was investigated using a modified version of MAEROS (a multicomponent aerosol dynamics code). The modeling study attempted to identify the sources of organic aerosol observed by Novakov and Penner (1993) in a field study in Puerto Rico. Experimentally, vapor scavenging and particle growth were investigated using two techniques. The influence of the presence of organic vapor on the particle`s hydroscopicity was investigated using an electrodynamic balance. The charge on a particle was investigated theoretically and experimentally. A prototype apparatus--the refractive index thermal diffusion chamber (RITDC)--was developed to study multiple particles in the same environment at the same time.

  8. Secure Transportation Management

    SciTech Connect (OSTI)

    Gibbs, P. W. [Brookhaven National Lab. (BNL), Upton, NY (United States)

    2014-10-15T23:59:59.000Z

    Secure Transport Management Course (STMC) course provides managers with information related to procedures and equipment used to successfully transport special nuclear material. This workshop outlines these procedures and reinforces the information presented with the aid of numerous practical examples. The course focuses on understanding the regulatory framework for secure transportation of special nuclear materials, identifying the insider and outsider threat(s) to secure transportation, organization of a secure transportation unit, management and supervision of secure transportation units, equipment and facilities required, training and qualification needed.

  9. A new secure process for steganography: CI2 Stego-security and topological-security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    A new secure process for steganography: CI2 Stego-security and topological-security Nicolas Friot1- formation hiding security fields. We show that the proposed scheme is stego-secure, which is the highest level of security in a well defined and studied category of attack called "watermark-only attack

  10. MOCVD synthesis of group III-nitride heterostructure nanowires for solid-state lighting.

    SciTech Connect (OSTI)

    Wang, George T.; Creighton, James Randall; Talin, Albert Alec

    2006-11-01T23:59:59.000Z

    Solid-state lighting (SSL) technologies, based on semiconductor light emitting devices, have the potential to reduce worldwide electricity consumption by more than 10%, which could significantly reduce U.S. dependence on imported energy and improve energy security. The III-nitride (AlGaInN) materials system forms the foundation for white SSL and could cover a wide spectral range from the deep UV to the infrared. For this LDRD program, we have investigated the synthesis of single-crystalline III-nitride nanowires and heterostructure nanowires, which may possess unique optoelectronic properties. These novel structures could ultimately lead to the development of novel and highly efficient SSL nanodevice applications. GaN and III-nitride core-shell heterostructure nanowires were successfully synthesized by metal organic chemical vapor deposition (MOCVD) on two-inch wafer substrates. The effect of process conditions on nanowire growth was investigated, and characterization of the structural, optical, and electrical properties of the nanowires was also performed.

  11. Smart Lighting Controller!! Smart lighting!

    E-Print Network [OSTI]

    Anderson, Betty Lise

    1! Smart Lighting Controller!! #12;2! Smart lighting! No need to spend energy lighting the room if://blogs.stthomas.edu/realestate/2011/01/24/residential-real-estate-professionals-how-do-you- develop feedback! There is a connection between the output and the input! Therefore forces inputs to same voltage

  12. VAPOR PRESSURE ISOTOPE EFFECTS IN THE MEASUREMENT OF ENVIRONMENTAL TRITIUM SAMPLES.

    SciTech Connect (OSTI)

    Kuhne, W.

    2012-12-03T23:59:59.000Z

    Standard procedures for the measurement of tritium in water samples often require distillation of an appropriate sample aliquot. This distillation process may result in a fractionation of tritiated water and regular light water due to the vapor pressure isotope effect, introducing either a bias or an additional contribution to the total tritium measurement uncertainty. The magnitude of the vapor pressure isotope effect is characterized as functions of the amount of water distilled from the sample aliquot and the heat settings for the distillation process. The tritium concentration in the distillate is higher than the tritium concentration in the sample early in the distillation process, it then sharply decreases due to the vapor pressure isotope effect and becomes lower than the tritium concentration in the sample, until the high tritium concentration retained in the boiling flask is evaporated at the end of the process. At that time, the tritium concentration in the distillate again overestimates the sample tritium concentration. The vapor pressure isotope effect is more pronounced the slower the evaporation and distillation process is conducted; a lower heat setting during the evaporation of the sample results in a larger bias in the tritium measurement. The experimental setup used and the fact that the current study allowed for an investigation of the relative change in vapor pressure isotope effect in the course of the distillation process distinguish it from and extend previously published measurements. The separation factor as a quantitative measure of the vapor pressure isotope effect is found to assume values of 1.034 {+-} 0.033, 1.052 {+-} 0.025, and 1.066 {+-} 0.037, depending on the vigor of the boiling process during distillation of the sample. A lower heat setting in the experimental setup, and therefore a less vigorous boiling process, results in a larger value for the separation factor. For a tritium measurement in water samples, this implies that the tritium concentration could be underestimated by 3 - 6%.

  13. Method and Apparatus for Concentrating Vapors for Analysis

    DOE Patents [OSTI]

    Grate, Jay W. (West Richland, WA); Baldwin, David L. (Kennewick, WA); Anheier, Jr., Norman C. (Richland, WA)

    2008-10-07T23:59:59.000Z

    An apparatus and method are disclosed for pre-concentrating gaseous vapors for analysis. The invention finds application in conjunction with, e.g., analytical instruments where low detection limits for gaseous vapors are desirable. Vapors sorbed and concentrated within the bed of the apparatus can be thermally desorbed achieving at least partial separation of vapor mixtures. The apparatus is suitable, e.g., for preconcentration and sample injection, and provides greater resolution of peaks for vapors within vapor mixtures, yielding detection levels that are 10-10,000 times better than for direct sampling and analysis systems. Features are particularly useful for continuous unattended monitoring applications.

  14. Information SecurityInformation Security--Applications andApplications and

    E-Print Network [OSTI]

    Ahmed, Farid

    Information SecurityInformation Security-- Applications andApplications and Techniques about? InformationInformation SecuritySecurity Information SecurityInformation Security What?What? Why of Information SecuritySecurity Network SecurityNetwork Security PGP, SSL,PGP, SSL, IPsecIPsec Data Security

  15. Adsorption of water vapor on reservoir rocks

    SciTech Connect (OSTI)

    Not Available

    1993-07-01T23:59:59.000Z

    Progress is reported on: adsorption of water vapor on reservoir rocks; theoretical investigation of adsorption; estimation of adsorption parameters from transient experiments; transient adsorption experiment -- salinity and noncondensible gas effects; the physics of injection of water into, transport and storage of fluids within, and production of vapor from geothermal reservoirs; injection optimization at the Geysers Geothermal Field; a model to test multiwell data interpretation for heterogeneous reservoirs; earth tide effects on downhole pressure measurements; and a finite-difference model for free surface gravity drainage well test analysis.

  16. Thermal electric vapor trap arrangement and method

    DOE Patents [OSTI]

    Alger, T.

    1988-03-15T23:59:59.000Z

    A technique for trapping vapor within a section of a tube is disclosed herein. This technique utilizes a conventional, readily providable thermal electric device having a hot side and a cold side and means for powering the device to accomplish this. The cold side of this device is positioned sufficiently close to a predetermined section of the tube and is made sufficiently cold so that any condensable vapor passing through the predetermined tube section is condensed and trapped, preferably within the predetermined tube section itself. 4 figs.

  17. Thermal electric vapor trap arrangement and method

    DOE Patents [OSTI]

    Alger, Terry (Tracy, CA)

    1988-01-01T23:59:59.000Z

    A technique for trapping vapor within a section of a tube is disclosed herein. This technique utilizes a conventional, readily providable thermal electric device having a hot side and a cold side and means for powering the device to accomplish this. The cold side of this device is positioned sufficiently close to a predetermined section of the tube and is made sufficiently cold so that any condensable vapor passing through the predetermined tube section is condensed and trapped, preferably within the predetermined tube section itself.

  18. Securing Internet Routing Securing Internet Routing

    E-Print Network [OSTI]

    Goldberg, Sharon

    Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: · Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths

  19. SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013)

    E-Print Network [OSTI]

    2013-01-01T23:59:59.000Z

    SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks (2013) Published online in Wiley Online Library (wileyonlinelibrary.com). DOI: 10.1002/sec.819 SPECIAL ISSUE PAPER Integrating security mechanisms, must be protected against security threats. Due to the security and also resource constraint concerns

  20. Using Security and Domain ontologies for Security Requirements Analysis

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Using Security and Domain ontologies for Security Requirements Analysis Amina Souag, Camille.Mouratidis@uel.ac.uk Abstract-- Recent research has argued about the importance of considering security during Requirements that security being a multi-faceted problem, a single security ontology is not enough to guide SR Engineering

  1. Information Security Governance: When Compliance Becomes more Important than Security

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    Information Security Governance: When Compliance Becomes more Important than Security Terence Tan1 information security must adapt to changing conditions by extending security governance to middle management for implementing information security are more interested in complying with organizational standards and policies

  2. Information Security Advisory Information Security, Computing and Information Services

    E-Print Network [OSTI]

    Qiu, Weigang

    Information Security Advisory Information Security, Computing and Information Services security.cuny.edu Published: November 2014 Holiday Season Phishing Scams and Malware Campaigns CUNY/CIS Information Security.cuny.edu under "CUNY Issued Security Advisories" Visit the Federal Trade Commission's Consumer Information page

  3. INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY

    E-Print Network [OSTI]

    Subramanian, Sriram

    - 1 ­ INFORMATION SECURITY POLICY.doc INFORMATION SECURITY POLICY Ratified by RCA Senate, February 2007 Contents Introduction 2 Policy Statement 3 Information Security at RCA 5 Annexes A. Applicable ­ INFORMATION SECURITY POLICY.doc Introduction Why Information Security? The access, availability

  4. A Game Theoretical Approach to Communication Security

    E-Print Network [OSTI]

    Gueye, Assane

    2011-01-01T23:59:59.000Z

    Information and communication systems’ securityTrust: An Element of Information Security,” in Security andInternational Journal of Information Security, vol. 4, pp.

  5. Cerenkov Light

    ScienceCinema (OSTI)

    Slifer, Karl

    2014-05-22T23:59:59.000Z

    The bright blue glow from nuclear reactors is Cerenkov light. Karl Slifer describes how nuclear physicists can use this phenomenon to study the nucleus of the atom.

  6. Cerenkov Light

    SciTech Connect (OSTI)

    Slifer, Karl

    2013-06-13T23:59:59.000Z

    The bright blue glow from nuclear reactors is Cerenkov light. Karl Slifer describes how nuclear physicists can use this phenomenon to study the nucleus of the atom.

  7. Lighting Renovations

    Broader source: Energy.gov [DOE]

    When undertaking a lighting renovation in a Federal building, daylighting is the primary renewable energy opportunity. Photovoltaics (PV) also present an excellent opportunity. While this guide...

  8. Advanced Chemical Heat Pumps Using Liquid-Vapor Reactions 

    E-Print Network [OSTI]

    Kirol, L.

    1987-01-01T23:59:59.000Z

    Chemical heat pumps utilizing liquid-vapor reactions can be configured in forms analogous to electric drive vapor-compression heat pumps and heat activated absorption heat pumps. Basic thermodynamic considerations eliminate some heat pumps and place...

  9. Moisture Durability of Vapor Permeable Insulating Sheathing (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2013-10-01T23:59:59.000Z

    In this project, Building America team Building Science Corporation researched some of the ramifications of using exterior, vapor permeable insulation on retrofit walls with vapor permeable cavity insulation. Retrofit strategies are a key factor in reducing exterior building stock consumption.

  10. Vapor intrusion modeling : limitations, improvements, and value of information analyses

    E-Print Network [OSTI]

    Friscia, Jessica M. (Jessica Marie)

    2014-01-01T23:59:59.000Z

    Vapor intrusion is the migration of volatile organic compounds (VOCs) from a subsurface source into the indoor air of an overlying building. Vapor intrusion models, including the Johnson and Ettinger (J&E) model, can be ...

  11. OPTIMIZATION OF INJECTION INTO VAPOR-DOMINATED GEOTHERMAL

    E-Print Network [OSTI]

    Stanford University

    OPTIMIZATION OF INJECTION INTO VAPOR-DOMINATED GEOTHERMAL RESERVOIRS CONSIDERING ADSORPTION governing the behavior of vapor- dominated geothermal reservoirs. These mechanisms affect both was to determine the most effective injection strategy once these two effects are considered. Geothermal reservoir

  12. Vaporization of synthetic fuels. Final report. [Thesis

    SciTech Connect (OSTI)

    Sirignano, W.A.; Yao, S.C.; Tong, A.Y.; Talley, D.

    1983-01-01T23:59:59.000Z

    The problem of transient droplet vaporization in a hot convective environment is examined. The main objective of the present study is to develop an algorithm for the droplet vaporization which is simple enough to be feasibly incorporated into a complete spray combustion analysis and yet will also account for the important physics such as liquid-phase internal circulation, unsteady droplet heating and axisymmetric gas-phase convection. A simplified liquid-phase model has been obtained based on the assumption of the existence of a Hill's spherical vortex inside the droplet together with some approximations made in the governing diffusion equation. The use of the simplified model in a spray situation has also been examined. It has been found that droplet heating and vaporization are essentially unsteady and droplet temperature is nonuniform for a significant portion of its lifetime. It has also been found that the droplet vaporization characteristic can be quite sensitive to the particular liquid-phase and gas-phase models. The results of the various models are compared with the existing experimental data. Due to large scattering in the experimental measurements, particularly the droplet diameter, no definite conclusion can be drawn based on the experimental data. Finally, certain research problems which are related to the present study are suggested for future studies.

  13. Chemical vapor deposition of mullite coatings

    DOE Patents [OSTI]

    Sarin, Vinod (Lexington, MA); Mulpuri, Rao (Boston, MA)

    1998-01-01T23:59:59.000Z

    This invention is directed to the creation of crystalline mullite coatings having uniform microstructure by chemical vapor deposition (CVD). The process comprises the steps of establishing a flow of reactants which will yield mullite in a CVD reactor, and depositing a crystalline coating from the reactant flow. The process will yield crystalline coatings which are dense and of uniform thickness.

  14. Atomic-vapor-laser isotope separation

    SciTech Connect (OSTI)

    Davis, J.I.

    1982-10-01T23:59:59.000Z

    This paper gives a brief history of the scientific considerations leading to the development of laser isotope separation (LIS) processes. The close relationship of LIS to the broader field of laser-induced chemical processes is evaluated in terms of physical criteria to achieve an efficient production process. Atomic-vapor LIS processes under development at Livermore are reviwed. 8 figures.

  15. Program performs vapor-liquid equilibrium calculations

    SciTech Connect (OSTI)

    Rice, V.L.

    1982-06-28T23:59:59.000Z

    A program designed for the Hewlett-Packard HP-41CV or 41C calculators solves basic vapor-liquid equilibrium problems, including figuring the dewpoint, bubblepoint, and equilibrium flash. The algorithm uses W.C. Edmister's method for predicting ideal-solution K values.

  16. Enhance your Cyber Security Knowledge

    E-Print Network [OSTI]

    Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

  17. Annual Security Report October 2013

    E-Print Network [OSTI]

    Goddard III, William A.

    1 Annual Security Report October 2013 Mission Statement The Campus Security and Parking Services Department ("Security") exists to provide a secure and welcoming research, educational, and work environment in which security concerns are balanced with freedom of movement in an open campus atmosphere while

  18. Dumb Ideas in Computer Security

    E-Print Network [OSTI]

    Dumb Ideas in Computer Security Dr Charles P Pfleeger Pfleeger Consulting Group 19 July 2011 chuck Security" (2005) http://www.ranum.com/security/computer_security/editorials/dumb/ Default permit Ideas in Computer Security 219 Jul 2011 #12;Struck a Nerve Results 1-10 of about 2,030,000 for dumb

  19. Security Division 2007 Annual Report

    E-Print Network [OSTI]

    Computer Security Division 2007 Annual Report #12;TAble of ConTenTS Welcome Division Organization The Computer Security Division Responds to the Federal Information Security Management Act of 2002 Security Information Technology 15 Security Testing and Metrics 17 Validation Programs and Laboratory Accreditation 17

  20. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    August 2003 IT SECURITY METRICS Elizabeth B. Lennon, Editor Information Technology Laboratory approach to measuring information security. Evaluating security at the sys tem level, IT security metrics and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  1. Effects of capillarity and vapor adsorption in the depletion of vapor-dominated geothermal reservoirs

    SciTech Connect (OSTI)

    Pruess, Karsten; O'Sullivan, Michael

    1992-01-01T23:59:59.000Z

    Vapor-dominated geothermal reservoirs in natural (undisturbed) conditions contain water as both vapor and liquid phases. The most compelling evidence for the presence of distributed liquid water is the observation that vapor pressures in these systems are close to saturated vapor pressure for measured reservoir temperatures (White et al., 1971; Truesdell and White, 1973). Analysis of natural heat flow conditions provides additional, indirect evidence for the ubiquitous presence of liquid. From an analysis of the heat pipe process (vapor-liquid counterflow) Preuss (1985) inferred that effective vertical permeability to liquid phase in vapor-dominated reservoirs is approximately 10{sup 17} m{sup 2}, for a heat flux of 1 W/m{sup 2}. This value appears to be at the high end of matrix permeabilities of unfractured rocks at The Geysers, suggesting that at least the smaller fractures contribute to liquid permeability. For liquid to be mobile in fractures, the rock matrix must be essentially completely liquid-saturated, because otherwise liquid phase would be sucked from the fractures into the matrix by capillary force. Large water saturation in the matrix, well above the irreducible saturation of perhaps 30%, has been shown to be compatible with production of superheated steam (Pruess and Narasimhan, 1982). In response to fluid production the liquid phase will boil, with heat of vaporization supplied by the reservoir rocks. As reservoir temperatures decline reservoir pressures will decline also. For depletion of ''bulk'' liquid, the pressure would decline along the saturated vapor pressure curve, while for liquid held by capillary and adsorptive forces inside porous media, an additional decline will arise from ''vapor pressure lowering''. Capillary pressure and vapor adsorption effects, and associated vapor pressure lowering phenomena, have received considerable attention in the geothermal literature, and also in studies related to geologic disposal of heat generating nuclear wastes, and in the drying of porous materials. Geothermally oriented studies were presented by Chicoine et al. (1977), Hsieh and Ramey (1978, 1981), Herkelrath et al. (1983), and Nghiem and Ramey (1991). Nuclear waste-related work includes papers by Herkelrath and O'Neal (1985), Pollock (1986), Eaton and Bixler (1987), Pruess et al. (1990), Nitao (1990), and Doughty and E'ruess (1991). Applications to industrial drying of porous materials have been discussed by Hamiathy (1969) arid Whitaker (1977). This paper is primarily concerned with evaluating the impact of vapor pressure lowering (VPL) effects on the depletion behavior of vapor-dominated reservoirs. We have examined experimental data on vapor adsorption and capillary pressures in an effort to identify constitutive relationships that would be applicable to the tight matrix rocks of vapor-dominated systems. Numerical simulations have been performed to evaluate the impact of these effects on the depletion of vapor-dominated reservoirs.

  2. Energy Security Initiatives Update

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

  3. TEC Information Security

    Broader source: Energy.gov (indexed) [DOE]

    External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

  4. Personnel Security Specialist

    Broader source: Energy.gov [DOE]

    The Office of the Associate Under Secretary for Environment, Health, Safety, and Security (AU) which provides corporate leadership and strategic approaches for protecting DOEs workers, the public,...

  5. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

  6. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08T23:59:59.000Z

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  7. Hazardous Material Security (Maryland)

    Broader source: Energy.gov [DOE]

    All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

  8. National Nuclear Security Administration

    Broader source: Energy.gov (indexed) [DOE]

    and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

  9. Modeling engine oil vaporization and transport of the oil vapor in the piston ring pack on internal combustion engines

    E-Print Network [OSTI]

    Cho, Yeunwoo, 1973-

    2004-01-01T23:59:59.000Z

    A model was developed to study engine oil vaporization and oil vapor transport in the piston ring pack of internal combustion engines. With the assumption that the multi-grade oil can be modeled as a compound of several ...

  10. Cyber Assessment Methods for SCADA Security

    SciTech Connect (OSTI)

    Not Available

    2005-06-01T23:59:59.000Z

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  11. Cyber Assessment Methods For SCADA Security

    SciTech Connect (OSTI)

    May Robin Permann; Kenneth Rohde

    2005-06-01T23:59:59.000Z

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  12. Office of Departmental Personnel Security

    Broader source: Energy.gov [DOE]

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  13. UC SECURITY FRAMEWORK 2011 -2012

    E-Print Network [OSTI]

    Hickman, Mark

    1 UC SECURITY FRAMEWORK 2011 - 2012 #12;2 Contents Background..................................................................................................................................4 About UC Security & Campus Community Support .................................................................5 Security Service Authority and Relationship with NZ Police and Emergency Services ...........5

  14. The security of machine learning

    E-Print Network [OSTI]

    Barreno, Marco; Nelson, Blaine; Joseph, Anthony D.; Tygar, J. D.

    2010-01-01T23:59:59.000Z

    of the IEEE symposium on security and privacy (pp. 188–201).and communications security (CCS) (pp. 59–68). Globerson,detection. In USENIX security symposium. Klimt, B. , & Yang,

  15. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS By Joan S. Hash, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology Introduction To assist federal agencies with effec tively integrating security

  16. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  17. Metal vapor laser including hot electrodes and integral wick

    DOE Patents [OSTI]

    Ault, Earl R. (Livermore, CA); Alger, Terry W. (Tracy, CA)

    1995-01-01T23:59:59.000Z

    A metal vapor laser, specifically one utilizing copper vapor, is disclosed herein. This laser utilizes a plasma tube assembly including a thermally insulated plasma tube containing a specific metal, e.g., copper, and a buffer gas therein. The laser also utilizes means including hot electrodes located at opposite ends of the plasma tube for electrically exciting the metal vapor and heating its interior to a sufficiently high temperature to cause the metal contained therein to vaporize and for subjecting the vapor to an electrical discharge excitation in order to lase. The laser also utilizes external wicking arrangements, that is, wicking arrangements located outside the plasma tube.

  18. Metal vapor laser including hot electrodes and integral wick

    DOE Patents [OSTI]

    Ault, E.R.; Alger, T.W.

    1995-03-07T23:59:59.000Z

    A metal vapor laser, specifically one utilizing copper vapor, is disclosed herein. This laser utilizes a plasma tube assembly including a thermally insulated plasma tube containing a specific metal, e.g., copper, and a buffer gas therein. The laser also utilizes means including hot electrodes located at opposite ends of the plasma tube for electrically exciting the metal vapor and heating its interior to a sufficiently high temperature to cause the metal contained therein to vaporize and for subjecting the vapor to an electrical discharge excitation in order to lase. The laser also utilizes external wicking arrangements, that is, wicking arrangements located outside the plasma tube. 5 figs.

  19. Industrial Heat Pumps Using Solid/Vapor Working Fluids

    E-Print Network [OSTI]

    Rockenfeller, U.

    with vapor re-compression recovery systems. The state-of-the-art heat pump equipment employing liquid/vapor working fluids fulfills the requirements only in some applications. The employment of solid/vapor complex compounds leads to 'nore cost effective... allows for firing temperatures much higher than possible with liquid/vapor systems. The high energy density per unit mass and the independence of the vapor pressure from the refrigerant concentration (p = f (T), p "# f( x)) over a wide range leads...

  20. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  1. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01T23:59:59.000Z

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  2. Social Networking? Secure Networking?

    E-Print Network [OSTI]

    Chapman, Michael S.

    Social Networking? Secure Networking? Teaching & Learning Technology Roundtable February 2010 #12 ­ The intent behind the current security measures in place at OHSU ­ The OHSU Social Networking Guidelines 2. To begin a campus wide dialogue exploring the changing world of online social networking and it

  3. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19T23:59:59.000Z

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  4. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29T23:59:59.000Z

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

  5. December 2007 SECURING EXTERNAL

    E-Print Network [OSTI]

    devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

  6. Global Material Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City, Arizona,SiteNational Nuclear SecuritySecurity

  7. Army Energy Security and Independence

    Broader source: Energy.gov (indexed) [DOE]

    ARMY ENERGY SECURITY AND INDEPENDENCE Leadership Ownership Partnership 19 NOV 2008 Don Juhasz, PE, CEM CHIEF ARMY ENERGY POLICY Army Energy Security - "The Way Ahead" 2 ARMY ENERGY...

  8. Headquarters Facilities Master Security Plan

    Office of Environmental Management (EM)

    It implements the requirements of: Title 32, CFR, Part 2001, Classified National Security Information Executive Order 13526, Classified National Security Information...

  9. Sandia Energy - Water Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Infrastructure Security Home Climate & Earth Systems WaterEnergy Nexus Decision Models for Integrating EnergyWater Water Infrastructure Security Water Infrastructure...

  10. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29T23:59:59.000Z

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  11. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14T23:59:59.000Z

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  12. Development of Nb{sub 3}Sn Cavity Vapor Diffusion Deposition System

    SciTech Connect (OSTI)

    Eremeev, Grigory V.; Macha, Kurt M.; Clemens, William A.; Park, HyeKyoung; Williams, R. Scott

    2014-02-01T23:59:59.000Z

    Nb{sub 3}Sn is a BCS superconductors with the superconducting critical temperature higher than that of niobium, so theoretically it surpasses the limitations of niobium in RF fields. The feasibility of technology has been demonstrated at 1.5 GHz with Nb{sub 3}Sn vapor deposition technique at Wuppertal University. The benefit at these frequencies is more pronounced at 4.2 K, where Nb{sub 3}Sn coated cavities show RF resistances an order of magnitude lower than that of niobium. At Jefferson Lab we started the development of Nb{sub 3}Sn vapor diffusion deposition system within an R\\&D development program towards compact light sources. Here we present the current progress of the system development.

  13. FIRST DETECTION OF WATER VAPOR IN A PRE-STELLAR CORE

    SciTech Connect (OSTI)

    Caselli, Paola; Douglas, Thomas [School of Physics and Astronomy, University of Leeds, Leeds LS2 9JT (United Kingdom); Keto, Eric [Harvard-Smithsonian Center for Astrophysics, 60 Garden Street, Cambridge, MA 02138 (United States); Bergin, Edwin A. [Department of Astronomy, The University of Michigan, 500 Church Street, Ann Arbor, MI 48109-1042 (United States); Tafalla, Mario [Observatorio Astronomico Nacional (IGN), Calle Alfonso XII, 3, E-28014 Madrid (Spain); Aikawa, Yuri [Department of Earth and Planetary Sciences, Kobe University, Nada, 657-8501 Kobe (Japan); Pagani, Laurent [LERMA and UMR 8112 du CNRS, Observatoire de Paris, 61 Av. de l'Observatoire, F-75014 Paris (France); Yildiz, Umut A.; Kristensen, Lars E.; Van Dishoeck, Ewine F. [Leiden Observatory, Leiden University, P.O. Box 9513, 2300 RA Leiden (Netherlands); Van der Tak, Floris F. S. [SRON Netherlands Institute for Space Research, P.O. Box 800, 9700 AV, Groningen (Netherlands); Walmsley, C. Malcolm; Codella, Claudio [INAF-Osservatorio Astrofisico di Arcetri, Largo E. Fermi 5, I-50125 Firenze (Italy); Nisini, Brunella, E-mail: p.caselli@leeds.ac.uk [INAF-Osservatorio Astronomico di Roma, I-00040 Monte Porzio Catone (Italy)

    2012-11-10T23:59:59.000Z

    Water is a crucial molecule in molecular astrophysics as it controls much of the gas/grain chemistry, including the formation and evolution of more complex organic molecules in ices. Pre-stellar cores provide the original reservoir of material from which future planetary systems are built, but few observational constraints exist on the formation of water and its partitioning between gas and ice in the densest cores. Thanks to the high sensitivity of the Herschel Space Observatory, we report on the first detection of water vapor at high spectral resolution toward a dense cloud on the verge of star formation, the pre-stellar core L1544. The line shows an inverse P-Cygni profile, characteristic of gravitational contraction. To reproduce the observations, water vapor has to be present in the cold and dense central few thousand AU of L1544, where species heavier than helium are expected to freeze out onto dust grains, and the ortho:para H{sub 2} ratio has to be around 1:1 or larger. The observed amount of water vapor within the core (about 1.5 Multiplication-Sign 10{sup -6} M{sub Sun }) can be maintained by far-UV photons locally produced by the impact of galactic cosmic rays with H{sub 2} molecules. Such FUV photons irradiate the icy mantles, liberating water vapor in the core center. Our Herschel data, combined with radiative transfer and chemical/dynamical models, shed light on the interplay between gas and solids in dense interstellar clouds and provide the first measurement of the water vapor abundance profile across the parent cloud of a future solar-type star and its potential planetary system.

  14. Precision micro drilling with copper vapor lasers

    SciTech Connect (OSTI)

    Chang, J.J.; Martinez, M.W.; Warner, B.E.; Dragon, E.P.; Huete, G.; Solarski, M.E.

    1994-09-02T23:59:59.000Z

    The authors have developed a copper vapor laser based micro machining system using advanced beam quality control and precision wavefront tilting technologies. Micro drilling has been demonstrated through percussion drilling and trepanning using this system. With a 30 W copper vapor laser running at multi-kHz pulse repetition frequency, straight parallel holes with size varying from 500 microns to less than 25 microns and with aspect ratio up to 1:40 have been consistently drilled on a variety of metals with good quality. For precision trepanned holes, the hole-to-hole size variation is typically within 1% of its diameter. Hole entrance and exit are both well defined with dimension error less than a few microns. Materialography of sectioned holes shows little (sub-micron scale) recast layer and heat affected zone with surface roughness within 1--2 microns.

  15. Solid-Vapor Sorption Refrigeration Systems

    E-Print Network [OSTI]

    Graebel, W.; Rockenfeller, U.; Kirol, L.

    SOLID-VAPOR SORPTION REFRIGERATION SYSTEMS DR. WILLIAM GRAEBEL DR. UWE ROCKENFELLER MR. LANCE KIROL Engineer President Chief Engineer Rocky Research Rocky Research Rocky Research Boulder city, NV Boulder city, NV Boulder City, NV Abstract... Complex compound sorption reactions are ideally suited for use in refrigeration cycles as an economically viable alternative to CFC refrigerants. Complex compound refrigeration provides a number of energy-saving advantages over present refrigeration...

  16. DuPont Chemical Vapor Technical Report

    SciTech Connect (OSTI)

    MOORE, T.L.

    2003-10-03T23:59:59.000Z

    DuPont Safety Resources was tasked with reviewing the current chemical vapor control practices and providing preventive recommendations on best commercial techniques to control worker exposures. The increased focus of the tank closure project to meet the 2024 Tri-Party Agreement (TPA) milestones has surfaced concerns among some CH2MHill employees and other interested parties. CH2MHill is committed to providing a safe working environment for employees and desires to safely manage the tank farm operations using appropriate control measures. To address worker concerns, CH2MHill has chartered a ''Chemical Vapors Project'' to integrate the activities of multiple CH2MHill project teams, and solicit the expertise of external resources, including an independent Industrial Hygiene expert panel, a communications consultant, and DuPont Safety Resources. Over a three-month time period, DuPont worked with CH2MHill ESH&Q, Industrial Hygiene, Engineering, and the independent expert panel to perform the assessment. The process included overview presentations, formal interviews, informal discussions, documentation review, and literature review. DuPont Safety Resources concluded that it is highly unlikely that workers in the tank farms are exposed to chemicals above established standards. Additionally, the conventional and radiological chemistry is understood, the inherent chemical hazards are known, and the risk associated with chemical vapor exposure is properly managed. The assessment highlighted management's commitment to addressing chemical vapor hazards and controlling the associated risks. Additionally, we found the Industrial Hygiene staff to be technically competent and well motivated. The tank characterization data resides in a comprehensive database containing the tank chemical compositions and relevant airborne concentrations.

  17. Vapor-phase heat-transport system

    SciTech Connect (OSTI)

    Hedstrom, J.C.

    1983-01-01T23:59:59.000Z

    A vapor-phase heat-transport system is being tested in one of the passive test cells at Los Alamos. The system consists of one selective-surface collector and a condenser inside a water storage tank. The refrigerant, R-11, can be returned to the collector by gravity or with a pump. Results from several operating configurations are presented, together with a comparison with other passive systems. A new self-pumping concept is presented.

  18. Phosphor-Free Solid State Light Sources

    SciTech Connect (OSTI)

    Jeff E. Nause; Ian Ferguson; Alan Doolittle

    2007-02-28T23:59:59.000Z

    The objective of this work was to demonstrate a light emitting diode that emitted white light without the aid of a phosphor. The device was based on the combination of a nitride LED and a fluorescing ZnO substrate. The early portion of the work focused on the growth of ZnO in undoped and doped form. The doped ZnO was successfully engineered to emit light at specific wavelengths by incorporating various dopants into the crystalline lattice. Thereafter, the focus of the work shifted to the epitaxial growth of nitride structures on ZnO. Initially, the epitaxy was accomplished with molecular beam epitaxy (MBE). Later in the program, metallorganic chemical vapor deposition (MOCVD) was successfully used to grow nitrides on ZnO. By combining the characteristics of the doped ZnO substrate with epitaxially grown nitride LED structures, a phosphor-free white light emitting diode was successfully demonstrated and characterized.

  19. Extracting Security Control Requirements University of Tulsa

    E-Print Network [OSTI]

    Gamble, R. F.

    , Requirements, Security Policy Modeling. 1. INTRODUCTION Networks and information systems have grown. Security has become a larger issue with the democratization of technology and information. Security accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

  20. Combined rankine and vapor compression cycles

    DOE Patents [OSTI]

    Radcliff, Thomas D.; Biederman, Bruce P.; Brasz, Joost J.

    2005-04-19T23:59:59.000Z

    An organic rankine cycle system is combined with a vapor compression cycle system with the turbine generator of the organic rankine cycle generating the power necessary to operate the motor of the refrigerant compressor. The vapor compression cycle is applied with its evaporator cooling the inlet air into a gas turbine, and the organic rankine cycle is applied to receive heat from a gas turbine exhaust to heat its boiler within one embodiment, a common condenser is used for the organic rankine cycle and the vapor compression cycle, with a common refrigerant, R-245a being circulated within both systems. In another embodiment, the turbine driven generator has a common shaft connected to the compressor to thereby eliminate the need for a separate motor to drive the compressor. In another embodiment, an organic rankine cycle system is applied to an internal combustion engine to cool the fluids thereof, and the turbo charged air is cooled first by the organic rankine cycle system and then by an air conditioner prior to passing into the intake of the engine.

  1. High volume fuel vapor release valve

    SciTech Connect (OSTI)

    Gimby, D.R.

    1991-09-03T23:59:59.000Z

    This patent describes a fuel vapor release valve for use in a vehicle fuel system. It comprises a valve housing 10 placed in a specific longitudinal orientation, the valve housing 10 defining an interior cavity 22 having an inlet 20 for admitting fuel vapor and an outlet 14 for discharging such fuel vapor; a valve member 24 positioned in the cavity 22 for movement between an outlet 14 opening position and an outlet 14 closing position, the valve member 24 including a cap member 34 having a seat surface 36 for mating with the outlet 14 and an orifice 42 extending through the cap member 34 providing a passageway from the outlet 14 to the cavity 22, the orifice 42 extending through the cap member 34 providing a passageway from the outlet 14 to the cavity 22, the orifice 42 having a lesser radius than the outlet 14; the valve member 24 further including a plug member 30 engaged with the cap member 34 for movement between an orifice 42 opening position and an orifice 42 closing position; and, a valve housing tilt responsive means for moving the valve member 24 to an outlet 14 and orifice 42 closing position in response to tilting of the valve 10 about its longitudinal axis whereby, upon the return of the valve 10 to its specified longitudinal orientation, the plug member 30 first moves to an orifice 42 opening position and the cap member 34 subsequently moves to an outlet 14 opening position.

  2. Front lighted optical tooling method and apparatus

    DOE Patents [OSTI]

    Stone, W.J.

    1983-06-30T23:59:59.000Z

    An optical tooling method and apparatus uses a front lighted shadowgraphic technique to enhance visual contrast of reflected light. The apparatus includes an optical assembly including a fiducial mark, such as cross hairs, reflecting polarized light with a first polarization, a polarizing element backing the fiducial mark and a reflective surface backing the polarizing element for reflecting polarized light bypassing the fiducial mark and traveling through the polarizing element. The light reflected by the reflecting surface is directed through a second pass of the polarizing element toward the frontal direction with a polarization differing from the polarization of the light reflected by the fiducial mark. When used as a tooling target, the optical assembly may be mounted directly to a reference surface or may be secured in a mounting, such as a magnetic mounting. The optical assembly may also be mounted in a plane defining structure and used as a spherometer in conjunction with an optical depth measuring instrument.

  3. Security of differential phase shift quantum key distribution against individual attacks

    E-Print Network [OSTI]

    Edo Waks; Hiroki Takesue; Yoshihisa Yamamoto

    2005-08-16T23:59:59.000Z

    We derive a proof of security for the Differential Phase Shift Quantum Key Distribution (DPSQKD) protocol under the assumption that Eve is restricted to individual attacks. The security proof is derived by bounding the average collision probability, which leads directly to a bound on Eve's mutual information on the final key. The security proof applies to realistic sources based on pulsed coherent light. We then compare individual attacks to sequential attacks and show that individual attacks are more powerful.

  4. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  5. March 24, 2008 Databases: Security 1 Database Security and Authorization

    E-Print Network [OSTI]

    Adam, Salah

    to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

  6. Safety and Security What do Safety/Security work with?

    E-Print Network [OSTI]

    Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with; · Security revolving work environment · Handle locks, keys, alarms, surveillance · Responsible

  7. Urban Commerce and Security Study Urban Commerce and Security Study

    E-Print Network [OSTI]

    Urban Commerce and Security Study Urban Commerce and Security Study Contact Information Fred S. Roberts Research Sponsor: Department of Homeland Security Rutgers University/CCICADA Center Professor.S. Department of Homeland Security, under Agreement 2009-ST-061-CCI002-02. Any opinions, findings

  8. SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card

    E-Print Network [OSTI]

    Li, Mo

    SOCIAL SECURITY ADMINISTRATION Application for a Social Security Card Applying for a Social Security Card is easy AND it is FREE! If you DO NOT follow these instructions, we CANNOT process your and evidence to any Social Security office. Follow instructions below. HOW TO COMPLETE THE APPLICATION Most

  9. Wireless Security: Secure and Public Networks Villanova University

    E-Print Network [OSTI]

    36 Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer wireless access points. Security protocols exist for wireless networks; however, all widely implemented at implementing a protocol which allows public access to a secure wireless network have been made. In this report

  10. ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1

    E-Print Network [OSTI]

    Su, Xiao

    ITS Identity & Information Security Information Security Program Date 10-02-2013 Page 1 Information................................................................................................................................................................................3 Information Security Policy...............................................................................................................................................4 Information Security Policy Management

  11. Light Transport in Cold Atoms and Thermal Decoherence G. Labeyrie,1,* D. Delande,2

    E-Print Network [OSTI]

    Light Transport in Cold Atoms and Thermal Decoherence G. Labeyrie,1,* D. Delande,2 R. Kaiser,1 experimentally and theoretically how coherent transport of light inside a cold atomic vapor is affected motivated by astrophysical purposes, wave transport in opaque media was first analyzed by means

  12. SECURING RADIO FREQUENCY IDENTIFICATION (RFID)

    E-Print Network [OSTI]

    business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

  13. UNCG Security Awareness Training & Instructions

    E-Print Network [OSTI]

    Saidak, Filip

    UNCG Security Awareness Training & Instructions 02.09.2010 Page 1 of 4 Educating UNCG faculty and staff with respect to security best practices is essential in securing the University's information University employee that works with restricted or financial data. UNCG engaged Fishnet Security, a nationally

  14. ANNUAL SECURITY & FIRE SAFETY REPORT

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

  15. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30T23:59:59.000Z

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  16. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25T23:59:59.000Z

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  17. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31T23:59:59.000Z

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  18. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22T23:59:59.000Z

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  19. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Administration FY 2011 - FY 2015 Budget Outlook Managing the NNSA 4.0% Science, Technology & Engineering 14.5% Stockpile Support 17.9% Preventing the Spread of...

  20. Data port security lock

    DOE Patents [OSTI]

    Quinby, Joseph D. (Albuquerque, NM); Hall, Clarence S. (Albuquerque, NM)

    2008-06-24T23:59:59.000Z

    In a security apparatus for securing an electrical connector, a plug may be fitted for insertion into a connector receptacle compliant with a connector standard. The plug has at least one aperture adapted to engage at least one latch in the connector receptacle. An engagement member is adapted to partially extend through at least one aperture and lock to at least one structure within the connector receptacle.

  1. Engineering secure software 

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    breaches in the operating environment. Security breaches resulting from misuse or tnisconfiguration of the program should not be blamed on the software. T'his is a debatable position. A security breach that results from an unintentional enor... units with public key algorithms, private keys, and certificates. Any attempt to access or modify the data in these devices will render them unusable. The device contains software tools. These devices use the computer they reside on as a general...

  2. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17T23:59:59.000Z

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  3. Method and apparatus for concentrating vapors for analysis

    DOE Patents [OSTI]

    Grate, Jay W. (West Richland, WA); Baldwin, David L. (Kennewick, WA); Anheier, Jr., Norman C. (Richland, WA)

    2012-06-05T23:59:59.000Z

    A pre-concentration device and a method are disclosed for concentrating gaseous vapors for analysis. Vapors sorbed and concentrated within the bed of the pre-concentration device are thermally desorbed, achieving at least partial separation of the vapor mixtures. The pre-concentration device is suitable, e.g., for pre-concentration and sample injection, and provides greater resolution of peaks for vapors within vapor mixtures, yielding detection levels that are 10-10,000 times better than direct sampling and analysis systems. Features are particularly useful for continuous unattended monitoring applications. The invention finds application in conjunction with, e.g., analytical instruments where low detection limits for gaseous vapors are desirable.

  4. G-Band Vapor Radiometer Profiler (GVRP) Handbook

    SciTech Connect (OSTI)

    Caddeau, MP

    2010-06-23T23:59:59.000Z

    The G-Band Vapor Radiometer Profiler (GVRP) provides time-series measurements of brightness temperatures from 15 channels between 170 and 183.310 GHz. Atmospheric emission in this spectral region is primarily due to water vapor, with some influence from liquid water. Channels between 170.0 and 176.0 GHz are particularly sensitive to the presence of liquid water. The sensitivity to water vapor of the 183.31-GHz line is approximately 30 times higher than at the frequencies of the two-channel microwave radiometer (MWR) for a precipitable water vapor (PWV) amount of less than 2.5 mm. Measurements from the GVRP instrument are therefore especially useful during low-humidity conditions (PWV < 5 mm). In addition to integrated water vapor and liquid water, the GVRP can provide low-resolution vertical profiles of water vapor in very dry conditions.

  5. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31T23:59:59.000Z

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  6. Observation of two-photon absorption at low power levels using tapered optical fibers in rubidium vapor

    E-Print Network [OSTI]

    S. M. Hendrickson; M. M. Lai; T. B. Pittman; J. D. Franson

    2010-07-12T23:59:59.000Z

    Nonlinear optical effects can be enhanced in tapered optical fibers with diameters less than the wavelength of the propagating light. Here we report on the observation of two-photon absorption using tapered fibers in rubidium vapor at power levels of less than 150 nW. Transit-time broadening produces two-photon absorption spectra with sharp peaks that are very different from conventional line shapes.

  7. Development of chemical vapor composites, CVC materials. Final report

    SciTech Connect (OSTI)

    NONE

    1998-10-05T23:59:59.000Z

    Industry has a critical need for high-temperature operable ceramic composites that are strong, non-brittle, light weight, and corrosion resistant. Improvements in energy efficiency, reduced emissions and increased productivity can be achieved in many industrial processes with ceramic composites if the reaction temperature and pressure are increased. Ceramic composites offer the potential to meet these material requirements in a variety of industrial applications. However, their use is often restricted by high cost. The Chemical Vapor composite, CVC, process can reduce the high costs and multiple fabrication steps presently required for ceramic fabrication. CVC deposition has the potential to eliminate many difficult processing problems and greatly increase fabrication rates for composites. With CVC, the manufacturing process can control the composites` density, microstructure and composition during growth. The CVC process: can grow or deposit material 100 times faster than conventional techniques; does not require an expensive woven preform to infiltrate; can use high modulus fibers that cannot be woven into a preform; can deposit composites to tolerances of less than 0.025 mm on one surface without further machining.

  8. Cold Water Vapor in the Barnard 5 Molecular Cloud

    E-Print Network [OSTI]

    Wirström, E S; Persson, C M; Buckle, J V; Cordiner, M A; Takakuwa, S

    2014-01-01T23:59:59.000Z

    After more than 30 years of investigations, the nature of gas-grain interactions at low temperatures remains an unresolved issue in astrochemistry. Water ice is the dominant ice found in cold molecular clouds, however, there is only one region where cold (~10 K) water vapor has been detected - L1544. This study aims to shed light on ice desorption mechanisms under cold cloud conditions by expanding the sample. The clumpy distribution of methanol in dark clouds testifies to transient desorption processes at work -- likely to also disrupt water ice mantles. Therefore, the Herschel HIFI instrument was used to search for cold water in a small sample of prominent methanol emission peaks. We report detections of the ground-state transition of o-H2O (J = 1_10 - 1_01) at 556.9360 GHz toward two positions in the cold molecular cloud Barnard 5. The relative abundances of methanol and water gas support a desorption mechanism which disrupts the outer ice mantle layers, rather than causing complete mantle removal.

  9. Method for controlling corrosion in thermal vapor injection gases

    DOE Patents [OSTI]

    Sperry, John S. (Houston, TX); Krajicek, Richard W. (Houston, TX)

    1981-01-01T23:59:59.000Z

    An improvement in the method for producing high pressure thermal vapor streams from combustion gases for injection into subterranean oil producing formations to stimulate the production of viscous minerals is described. The improvement involves controlling corrosion in such thermal vapor gases by injecting water near the flame in the combustion zone and injecting ammonia into a vapor producing vessel to contact the combustion gases exiting the combustion chamber.

  10. Heat Recovery in Distillation by Mechanical Vapor Recompression

    E-Print Network [OSTI]

    Becker, F. E.; Zakak, A. I.

    tower energy requirements can be achieved by mechanical vapor recompression. Three design approaches for heating a distillation tower reboiler by mechanical vapor recompression are presented. The advantages of using a screw compressor are discussed... for lowering energy consumption in the distillation process through various heat recovery techniques. (3-8) One such technique utilizes mechanical vapor recompression. (9-12) The principle of this ap proach involves the use of a compressor to recycle...

  11. Recovery of benzene in an organic vapor monitor

    E-Print Network [OSTI]

    Krenek, Gregory Joel

    1980-01-01T23:59:59.000Z

    solid adsorbents available (silica gel, activated alumina, etc. ), activated charcoal is most frequently utilized. Activated charcoal has retentivity for sorbed vapors several times that of silica gel and it displays a selectivity for organic vapors... (diffusion rate) of the vapor molecules to the sur- face of the adsorbent. The adsorption process determine how effective the adsorbent collects and holds the contam- inant on the surface of the activated charcoal. Recovery of the contaminant from...

  12. Review of enhanced vapor diffusion in porous media

    SciTech Connect (OSTI)

    Webb, S.W.; Ho, C.K.

    1998-08-01T23:59:59.000Z

    Vapor diffusion in porous media in the presence of its own liquid has often been treated similar to gas diffusion. The gas diffusion rate in porous media is much lower than in free space due to the presence of the porous medium and any liquid present. However, enhanced vapor diffusion has also been postulated such that the diffusion rate may approach free-space values. Existing data and models for enhanced vapor diffusion, including those in TOUGH2, are reviewed in this paper.

  13. Advanced Chemical Heat Pumps Using Liquid-Vapor Reactions

    E-Print Network [OSTI]

    Kirol, L.

    ADVANCED CHEMICAL HEAT PUMPS USING LIQUID-VAPOR REACTIONS LANCE KIROL Senior Program Specialist Idaho National Engineering Laboratory Idaho Falls, Idaho . ABSTRACT Chemical heat pumps utilizing liquid-vapor reactions can be configured... in forms analogous to electric drive vapor-compression heat pumps and heat activated absorption heat pumps. Basic thermodynamic considerations eliminate some heat pumps and place restrictive working fluid requirements on others, but two thermodynam...

  14. Light Computing

    E-Print Network [OSTI]

    Gordon Chalmers

    2006-10-13T23:59:59.000Z

    A configuration of light pulses is generated, together with emitters and receptors, that allows computing. The computing is extraordinarily high in number of flops per second, exceeding the capability of a quantum computer for a given size and coherence region. The emitters and receptors are based on the quantum diode, which can emit and detect individual photons with high accuracy.

  15. IY5512: Part 1 Information Security Group

    E-Print Network [OSTI]

    Mitchell, Chris

    IY5512: Part 1 1 Information Security Group IY5512 Computer Security Part 1: Introduction to computer security Chris Mitchell me@chrismitchell.net http://www.chrismitchell.net 1 Information Security) ... 2 Information Security Group Agenda · Overview · Security goals · Security approaches ­ prevention

  16. Vapor port and groundwater sampling well

    DOE Patents [OSTI]

    Hubbell, J.M.; Wylie, A.H.

    1996-01-09T23:59:59.000Z

    A method and apparatus have been developed for combining groundwater monitoring wells with unsaturated-zone vapor sampling ports. The apparatus allows concurrent monitoring of both the unsaturated and the saturated zone from the same well at contaminated areas. The innovative well design allows for concurrent sampling of groundwater and volatile organic compounds (VOCs) in the vadose (unsaturated) zone from a single well, saving considerable time and money. The sample tubes are banded to the outer well casing during installation of the well casing. 10 figs.

  17. Vapor port and groundwater sampling well

    DOE Patents [OSTI]

    Hubbell, Joel M. (Idaho Falls, ID); Wylie, Allan H. (Idaho Falls, ID)

    1996-01-01T23:59:59.000Z

    A method and apparatus has been developed for combining groundwater monitoring wells with unsaturated-zone vapor sampling ports. The apparatus allows concurrent monitoring of both the unsaturated and the saturated zone from the same well at contaminated areas. The innovative well design allows for concurrent sampling of groundwater and volatile organic compounds (VOCs) in the vadose (unsaturated) zone from a single well, saving considerable time and money. The sample tubes are banded to the outer well casing during installation of the well casing.

  18. Chemical vapor deposition of epitaxial silicon

    DOE Patents [OSTI]

    Berkman, Samuel (Florham Park, NJ)

    1984-01-01T23:59:59.000Z

    A single chamber continuous chemical vapor deposition (CVD) reactor is described for depositing continuously on flat substrates, for example, epitaxial layers of semiconductor materials. The single chamber reactor is formed into three separate zones by baffles or tubes carrying chemical source material and a carrier gas in one gas stream and hydrogen gas in the other stream without interaction while the wafers are heated to deposition temperature. Diffusion of the two gas streams on heated wafers effects the epitaxial deposition in the intermediate zone and the wafers are cooled in the final zone by coolant gases. A CVD reactor for batch processing is also described embodying the deposition principles of the continuous reactor.

  19. Copper vapor laser acoustic thermometry system

    DOE Patents [OSTI]

    Galkowski, Joseph J. (Livermore, CA)

    1987-01-01T23:59:59.000Z

    A copper vapor laser (CVL) acoustic thermometry system is disclosed. The invention couples an acoustic pulse a predetermined distance into a laser tube by means of a transducer and an alumina rod such that an echo pulse is returned along the alumina rod to the point of entry. The time differential between the point of entry of the acoustic pulse into the laser tube and the exit of the echo pulse is related to the temperature at the predetermined distance within the laser tube. This information is processed and can provide an accurate indication of the average temperature within the laser tube.

  20. Vapor Retarder Classification - Building America Top Innovation |

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA group current C3EDepartmentDepartment of Energy Photo of a vapor retarder

  1. Category:Mercury Vapor | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page onYou are now leaving Energy.gov You are now leaving Energy.gov You are beingZealand JumpConceptual Model, click here. Category:Conceptual ModelLists forMercury Vapor page? For detailed

  2. ata security feature: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  3. acetone vapor sensing: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    XI, Universit de 7 ATMOSPHERIC WATER VAPOR PROFILES DERIVED FROM REMOTE-SENSING RADIOMETER MEASUREMENTS CiteSeer Summary: The feasibility and preliminary testing of a low...

  4. Rotary Vapor Compression Cycle Technology: A Pathway to Ultra...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Cycle Technology: A Pathway to Ultra-Efficient Air Conditioning, Heating and Refrigeration Rotary Vapor Compression Cycle Technology: A Pathway to Ultra-Efficient Air...

  5. alkali vapor species: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    of hexagonal patterns in a nonlinear optical system: Alkali metal vapor in a single-mirror arrangement Physics Websites Summary: Secondary bifurcations of hexagonal patterns in...

  6. alkali atom vapor: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    low power requirements, these "chip-scale" atomic Popovic, Zoya 3 Hybrid Optical Pumping of Optically Dense Alkali-Metal Vapor without Quenching Gas M. V. Romalis Physics...

  7. assisted chemical vapor: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    nanodiamonds (NDs) with 70-80 nm size via bead assisted sonic disintegration (BASD) of a polycrystalline chemical vapor deposition (CVD) film. The NDs display high crystalline...

  8. A new vapor pressure equation originating at the critical point

    E-Print Network [OSTI]

    Nuckols, James William

    1976-01-01T23:59:59.000Z

    - tence curve has been developed from critical scaling theory. The agreement between published vapor pressures and vapor pressures predicted by this equation is very good, especially in the critical region where many other vapor pressure equations fail... vapor pressure data f' or Ar, N2, 02H6, and H20, w1th the parameters ai to a being determined by an unweighted least squares curve 5 fit. The method of least squares has been described adequately elsewhere, e. g. Wylie (1966), and the theory w111...

  9. atmospheric water vapor: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    greenhouse gas, contributing to approximately two-thirds of the Earth's greenhouse effect Mitchell, 1989; IntergovernmentalA meta-analysis of water vapor...

  10. Hypothetical Thermodynamic Properties. Subcooled Vaporization Enthalpies and Vapor Pressures of Polyaromatic Hydrocarbons

    E-Print Network [OSTI]

    Chickos, James S.

    of Polyaromatic Hydrocarbons William Hanshaw, Marjorie Nutt, and James S. Chickos* Department of Chemistry and liquid vapor pressures from T ) 298.15 K to T ) 510 K of a series of polyaromatic hydrocarbons have been protocols are also made, and agreement generally is quite good. Introduction Polyaromatic hydrocarbons (PAHs

  11. M. Bahrami ENSC 461 (S 11) Vapor Power Cycles 1 Vapor Power Cycles

    E-Print Network [OSTI]

    Bahrami, Majid

    is not a suitable model for steam power cycle since: The turbine has to handle steam with low quality which will cause erosion and wear in turbine blades. It is impractical to design a compressor that handles two vapor expands isentropically in turbine and produces work. 4-1: Const P heat rejection High quality

  12. Lighting system with thermal management system having point contact synthetic jets

    DOE Patents [OSTI]

    Arik, Mehmet; Weaver, Stanton Earl; Kuenzler, Glenn Howard; Wolfe, Jr., Charles Franklin; Sharma, Rajdeep

    2013-12-10T23:59:59.000Z

    Lighting system having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system includes a plurality of synthetic jets. The synthetic jets are arranged within the lighting system such that they are secured at contact points.

  13. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  14. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

  15. Global Environmental Change and Human Security

    E-Print Network [OSTI]

    Kunnas, Jan

    2011-01-01T23:59:59.000Z

    with human rights, human security or environmental change ifEnvironmental Change and Human Security By Matthew, RichardChange and Human Security. Cambridge, Massachusetts &

  16. Security and United States Immigration Policy

    E-Print Network [OSTI]

    Totten, Robbie James

    2012-01-01T23:59:59.000Z

    Change and European Security. London: Brassey's. Furer,1981]. American National Security, 6th ed. Baltimore, MD:J. Wheeler. 2008. The Security Dilemma: Fear, Cooperation

  17. Energy and Security in Northeast Asia

    E-Print Network [OSTI]

    May, Michael; Johnson, Celeste; Fei, Edward; Suzuki, Tatsujiro

    1996-01-01T23:59:59.000Z

    regional cooperation on energy and security issues in Asia.Energy and Security in Northeast Asia An IGCC studycan be drawn. The energy security situation and outlook are

  18. Sandia Energy - Cyber Security for Electric Infrastructure

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security for Electric Infrastructure Home Stationary Power Grid Modernization Cyber Security for Electric Infrastructure Cyber Security for Electric Infrastructureashoter2015...

  19. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    National Security Technologies, LLC - September 26, 2014 Preliminary Notice of Violation, National Security Technologies, LLC - September 26, 2014 September 26, 2014 Security...

  20. Personnel Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

  1. Some Thoughts on Teaching Secure Programming

    E-Print Network [OSTI]

    Bishop, Matt

    2013-01-01T23:59:59.000Z

    Teaching Context in Information Security,” ACM Journal onWorld Conference on Information Security Education pp. 23–Colloquium on Information Systems Security Education (CISSE)

  2. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    Analysis of Information Security Games, Proceedings of theon the Economics of Information Security WEIS’, Hanover, NH,on the Economics of Information Security’. Anderson, R. and

  3. The control of confined vapor phase explosions

    SciTech Connect (OSTI)

    Scilly, N.F. [Laporte plc, Widnes (United Kingdom); Owen, O.J.R. [Fine Organics, Ltd., Middlesborough (United Kingdom); Wilberforce, J.K. [Solvay SA, Brussels (Belgium)

    1995-12-31T23:59:59.000Z

    The probability of, for example, a fire or explosion occurring during a process operation is related both to the fire-related properties of the materials used, such as flash point, flammable limits etc., i.e. the material or intrinsic factors, and the nature of the operation and the equipment used, i.e. the extrinsic factors. The risk, or frequency of occurrence, of other hazards such as reaction runaway, major toxic release etc. can be determined in a similar manner. For a vapor phase explosion (and a fire) the probability of the event is the product of the probability of generating a flammable atmosphere and the probability of ignition. Firstly, materials may be coded using properties that are relevant to the hazard in question. Secondly, different operations have different degrees of risk and these risks are assigned as Low, Medium, High etc. according to criteria outlined here. Combination of these two factors will then be a measure of the overall risk of the operation with the specified material and may be used to define operating standards. Currently, the hazard/risk of a vapor phase explosions is examined by this method but in due course dust explosions, fires, condensed phase explosions, reaction runaways, physical explosions, major toxic releases and incompatibility will be included.

  4. Vapor and gas sampling of Single-Shell Tank 241-A-101 using the Vapor Sampling System

    SciTech Connect (OSTI)

    Caprio, G.S.

    1995-11-01T23:59:59.000Z

    This document presents sampling data resulting from the June 8, 1995, sampling of SST 241-A-101 using the Vapor Sampling System.

  5. Residential Lighting

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What's PossibleRadiation Protection Technical squestionnairesquestionnaires AgreementLighting

  6. Global Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItem NotEnergy,ARMFormsGasReleaseSpeechesHallNot Logged In You must createSecurity Global

  7. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over OurThe Iron4 Self-Scrubbing:,, ,Development of NovelHigh( ( ( ( (physical security |

  8. Radiological Security | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOn AprilA groupTuba City,Enriched UraniumPhysical Security Systems(PA)About| National

  9. Security Commodity Team | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of ScienceandMesa del Sol HomeFacebook TwitterSearch-Comments Sign InNuclear Security

  10. Security Notice | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645 3,625 1,006 492 742EnergyOnItemResearch > TheNuclearHomeland ScienceInnovationScience andbarrierSecurity

  11. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our InstagramStructureProposedPAGESafety Tag: Safety Displaying 1security Tag:

  12. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345 UnlimitedSecure

  13. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level:Energy: Grid Integration Redefining What'sis Taking Over Our Instagram Secretary Moniz is Taking OverEvaluating ' M M t345Secure Storage

  14. Lighting Inventory Lighting Theatre and Drama

    E-Print Network [OSTI]

    Indiana University

    Lighting Inventory Lighting Theatre and Drama Description Totals R.Halls Wells- Metz Light ERS ETC SourceFour 25 25 50 degree ERS Strand Lighting 64 14 24 12 14 36 degree ERS ETC Source Four 15 15 36 degree ERS Strand Lighting 124 60 58 2 4 26 degree ERS ETC SourceFour 2 2 26 degree ERS Strand

  15. 1-Dimensional Numerical Model of Thermal Conduction and Vapor Diffusion

    E-Print Network [OSTI]

    Schörghofer, Norbert

    developed by Samar Khatiwala, 2001 extended to variable thermal properties and irregular grid by Norbert Sch for c. Upper boundary condition: a) Radiation Q + k T z z=0 = T4 z=0 Q is the incoming solar flux of Water Vapor with Phase Transitions developed by Norbert Sch¨orghofer, 2003­2004 3 phases: vapor, free

  16. Fenton Oxidation of TCE Vapors in a Foam Reactor

    E-Print Network [OSTI]

    Fenton Oxidation of TCE Vapors in a Foam Reactor Eunsung Kan,a,b Seongyup Kim,a and Marc A.interscience.wiley.com). DOI 10.1002/ep.10205 Oxidation of dilute TCE vapors in a foam reactor using Fenton's reagent composition of Fenton's reagents, the foam reactor configuration provided a higher rate absorption and greater

  17. ADHESION FORCES BETWEEN MICA SURFACES IN UNDERSATURATED VAPORS OF HYDROCARBONS

    E-Print Network [OSTI]

    Matsuoka, Hiroshige

    ADHESION FORCES BETWEEN MICA SURFACES IN UNDERSATURATED VAPORS OF HYDROCARBONS H. MATSUOKA1 , T] or meniscus force [3], which have been neglected in the conventional and relatively large mechani- cal systems forces between mica surfaces in under- saturated vapors of several kind of hydrocarbon liquids are mea

  18. Engineering secure software

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    the vulnerabilities based on their coverage and cost. The above modeling approach is also known as thc onion peel model due to its nature of dividing the problem space into zones of similar security. These zones represent the peels of the onion. Each zone is also... into peels based on the security considerations of the entities of the system. The model describes minimum interaction among components across peels and maximum within peels. The onion diagram includes the physical entities of the systems and not just...

  19. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

  20. Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

    E-Print Network [OSTI]

    Ragsdale, G.

    -25, 2010 Implementing TCG Standards Within Systems ? Trusted Platform Module (TPM) ? Provides root of trust ? Secure storage ? Signing & hashing functions ? Tamper detection ? Accelerates cryptography ? TPM software stack ? Implements TCG stack... Update Session Security (symmetric key) Code and Data Integrity (memory hash) ?Secure secret storage ?TPM chip root trust secret ?Owner root trust secret ?Memory hash signature ?Standard encryption algorithm ?Standard hashing algorithm ?Tamper detection...

  1. SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011

    E-Print Network [OSTI]

    SECURITY BASICS FOR MOBILE DEVICES UNH IT SECURITY, DECEMBER 2011 Choose brands and models of mobile devices that have the options referenced below. Use all available security options that your or sensitive university information in un-approved off-campus services, such as public cloud based services

  2. Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI

    E-Print Network [OSTI]

    Jurjens, Jan

    Security Patterns: Comparing Modeling Approaches Armstrong NHLABATSI ** , Arosha BANDARA the challenges of developing secure software systems remains an active research area in software engineering. Current research efforts have resulted in the documentation of recurring security problems as security

  3. INFORMATION SECURITY University Policy No: IM7800

    E-Print Network [OSTI]

    Herwig, Falk

    Page 1 INFORMATION SECURITY POLICY University Policy No: IM7800 Classification: Information to an Information Security Incident Procedures for Addressing Security Vulnerabilities of University Information Resources and Information Systems University Information Security Classification Procedures Procedures

  4. Analysis of electron-beam vaporization of refractory metals

    SciTech Connect (OSTI)

    Kheshgi, H.S.; Gresho, P.M.

    1986-09-01T23:59:59.000Z

    An electron beam is focussed onto a small area on the surface of a refractory metal to locally raise the temperature and vaporize metal. At high vaporization rates the hot area is on the surface of a churning liquid-metal pool contained in a solid-metal skull which sits in a cooled crucible. Inner workings of the process are revealed by analysis of momentum, energy, and mass transfer. At the surface high temperature causes high vaporization rate and high vapor thrust, depressing the vapor/liquid surface. In the liquid pool surface-tension gradients and thermal buoyancy drive a (typically) chaotic flow. In the solid skull thermal conductivity and contact resistance regulate the rate of heat transfer from pool to crucible. Analyses of these phenomena together reveal process performance sensitivities - e.g., to depression size or to magnitude of surface-tension gradients. 12 refs., 3 figs.

  5. Temperature dependent vapor pressures of chlorinated catechols, syringols, and syringaldehydes

    SciTech Connect (OSTI)

    Lei, Y.D.; Shiu, W.Y.; Boocock, D.G.B. [Univ. of Toronto, Ontario (Canada). Dept. of Chemical Engineering and Applied Chemistry] [Univ. of Toronto, Ontario (Canada). Dept. of Chemical Engineering and Applied Chemistry; Wania, F. [WECC Wania Environmental Chemists Corp., Toronto, Ontario (Canada)] [WECC Wania Environmental Chemists Corp., Toronto, Ontario (Canada)

    1999-03-01T23:59:59.000Z

    The vapor pressures of nine chlorinated catechols, syringols, and syringaldehydes were determined as a function of temperature with a gas chromatographic retention time technique. The vapor pressures at 298.15 K were in the range of 0.02--1 Pa, and the enthalpies of vaporization, between 68 and 82 kJ/mol. The validity of the technique was established by a calibration involving four chlorinated phenols with well-known vapor pressures. Using these data and previously reported solubility data, Henry`s law constants for these substances and some chlorinated guaiacols and veratrols were estimated. The vapor pressure of these substances tends to decrease with increasing polarity and an increasing number of chlorine atoms. Henry`s law constants decrease sharply with increasing polarity, suggesting that methylation can result in a significant increase in a chemical`s potential for volatilization from water.

  6. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  7. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01T23:59:59.000Z

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  8. Computer Security Incident Handling Guide

    E-Print Network [OSTI]

    States Computer Emergency Readiness Team National Cyber Security Division Department of Homeland Security of Standards and Technology Gaithersburg, MD Karen Scarfone Scarfone Cybersecurity C O M P U T E R S E C U R I

  9. System security Dr Len Hamey

    E-Print Network [OSTI]

    Hamey, Len

    , firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

  10. LED Lighting Basics

    Broader source: Energy.gov [DOE]

    Light-Emitting diodes (LEDs) efficiently produce light in a fundamentally different way than any legacy or traditional source of light.

  11. Light Source

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh SchoolIn12electron 9 5Let us count theLienertLift Forces in a Light

  12. Monitoring of vapor phase polycyclic aromatic hydrocarbons

    DOE Patents [OSTI]

    Vo-Dinh, Tuan; Hajaligol, Mohammad R.

    2004-06-01T23:59:59.000Z

    An apparatus for monitoring vapor phase polycyclic aromatic hydrocarbons in a high-temperature environment has an excitation source producing electromagnetic radiation, an optical path having an optical probe optically communicating the electromagnetic radiation received at a proximal end to a distal end, a spectrometer or polychromator, a detector, and a positioner coupled to the first optical path. The positioner can slidably move the distal end of the optical probe to maintain the distal end position with respect to an area of a material undergoing combustion. The emitted wavelength can be directed to a detector in a single optical probe 180.degree. backscattered configuration, in a dual optical probe 180.degree. backscattered configuration or in a dual optical probe 90.degree. side scattered configuration. The apparatus can be used to monitor an emitted wavelength of energy from a polycyclic aromatic hydrocarbon as it fluoresces in a high temperature environment.

  13. Chemical vapor deposition of group IIIB metals

    DOE Patents [OSTI]

    Erbil, A.

    1989-11-21T23:59:59.000Z

    Coatings of Group IIIB metals and compounds thereof are formed by chemical vapor deposition, in which a heat decomposable organometallic compound of the formula given in the patent where M is a Group IIIB metal, such as lanthanum or yttrium and R is a lower alkyl or alkenyl radical containing from 2 to about 6 carbon atoms, with a heated substrate which is above the decomposition temperature of the organometallic compound. The pure metal is obtained when the compound of the formula 1 is the sole heat decomposable compound present and deposition is carried out under nonoxidizing conditions. Intermetallic compounds such as lanthanum telluride can be deposited from a lanthanum compound of formula 1 and a heat decomposable tellurium compound under nonoxidizing conditions.

  14. Hybrid Vapor Compression Adsorption System: Thermal Storage Using Hybrid Vapor Compression Adsorption System

    SciTech Connect (OSTI)

    None

    2012-01-04T23:59:59.000Z

    HEATS Project: UTRC is developing a new climate-control system for EVs that uses a hybrid vapor compression adsorption system with thermal energy storage. The targeted, closed system will use energy during the battery-charging step to recharge the thermal storage, and it will use minimal power to provide cooling or heating to the cabin during a drive cycle. The team will use a unique approach of absorbing a refrigerant on a metal salt, which will create a lightweight, high-energy-density refrigerant. This unique working pair can operate indefinitely as a traditional vapor compression heat pump using electrical energy, if desired. The project will deliver a hot-and-cold battery that provides comfort to the passengers using minimal power, substantially extending the driving range of EVs.

  15. Gas Separation Using Organic-Vapor-Resistent Membranes In Conjunctin With Organic-Vapor-Selective Membranes

    DOE Patents [OSTI]

    Baker, Richard W. (Palo Alto, CA); Pinnau, Ingo (Palo Alto, CA); He, Zhenjie (Fremont, CA); Da Costa, Andre R. (Menlo Park, CA); Daniels, Ramin (San Jose, CA); Amo, Karl D. (Mountain View, CA); Wijmans, Johannes G. (Menlo Park, CA)

    2003-06-03T23:59:59.000Z

    A process for treating a gas mixture containing at least an organic compound gas or vapor and a second gas, such as natural gas, refinery off-gas or air. The process uses two sequential membrane separation steps, one using membrane selective for the organic compound over the second gas, the other selective for the second gas over the organic vapor. The second-gas-selective membranes use a selective layer made from a polymer having repeating units of a fluorinated polymer, and demonstrate good resistance to plasticization by the organic components in the gas mixture under treatment, and good recovery after exposure to liquid aromatic hydrocarbons. The membrane steps can be combined in either order.

  16. Enhancing Transportation Energy Security through Advanced Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Transportation Energy Security through Advanced Combustion and Fuels Technologies Enhancing Transportation Energy Security through Advanced Combustion and Fuels Technologies 2005...

  17. Line Management Perspective: National Nuclear Security Administration...

    Broader source: Energy.gov (indexed) [DOE]

    National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

  18. Office of Security Assessments | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    information, personnel security, and foreign visits and assignments. Assesses the information security practices at facilities managing special access programs and...

  19. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  20. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  1. Corporate Security and Conflict Outcomes 

    E-Print Network [OSTI]

    Tkach, Benjamin K

    2013-10-21T23:59:59.000Z

    militaries (Avant 2000). Existing research has shown a steady increase in the number and employment of private security firms (PSFs) over the last five decades due to expansion of global market demand for private security (Avant 2005; Dunigan 2011; Singer... prominent role in international aviation security (Abrahamsen and Williams 2011). Because PSFs are based largely on corporate profit motivations, contract fulfillment and reputation are critical for firms to secure market share. The international market...

  2. East Asian Security in 2025

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01T23:59:59.000Z

    East Asian Security in 2025 Who We Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025...

  3. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  4. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  5. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02T23:59:59.000Z

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  6. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    initiatives to be accomplished within the next five years using light technologies and best practices to provide enterprise-wide services in a cost effective and efficient...

  7. Dual LED/incandescent security fixture

    DOE Patents [OSTI]

    Gauna, Kevin Wayne

    2005-06-21T23:59:59.000Z

    A dual LED and incandescent security lighting system uses a hybrid approach to LED illumination. It combines an ambient LED illuminator with a standard incandescent lamp on a motion control sensor. The LED illuminator will activate with the onset of darkness (daylight control) and typically remain on during the course of the night ("always on"). The LED illumination, typically amber, is sufficient to provide low to moderate level lighting coverage to the wall and ground area adjacent to and under the fixture. The incandescent lamp is integrated with a motion control circuit and sensor. When movement in the field of view is detected (after darkness), the incandescent lamp is switched on, providing an increased level of illumination to the area. Instead of an "always on" LED illuminator, the LEDs may also be switched off when the incandescent lamp is switched on.

  8. Simulated Interdiction: Proliferation Security Initiative

    E-Print Network [OSTI]

    2009-01-01T23:59:59.000Z

    ………………………………... Technical Capabilities to Support PSI ………………………………… Foreign Policy and External Relations ………………………............... Republic of Bevostan ………………………………………………………….. Geography ……………………………………………………………... iii 1 3 4 5 6 7 8 8 8 8 8 9 9 10... Security, Science and Policy Institute (NSSPI) Texas A&M University May 6, 2009 Simulated Interdiction: The Proliferation Security Initiative (PSI) Acknowledgements The National Nuclear Security Administration (NNSA) of the U.S. Department...

  9. Security and Verification Provable cryptography

    E-Print Network [OSTI]

    Gregoire, Benjamin - Institut National de Recherche en Informatique et en Automatique, Centre de recherche Sophia Antipolis

    Security and Verification Provable cryptography Benjamin Grégoire1 Tamara Rezk1 1INRIA Sophia Antipolis - Méditerranée, France Cours de Master 2 Univerisité de Nice Sophia-Antipolis Security and Verification 1/ 33 #12;Cryptanalysis-driven Security Propose a cryptographic scheme Wait for someone to come

  10. MINIMUM SECURITY REQUIREMENTS FOR FEDERAL

    E-Print Network [OSTI]

    March 2006 MINIMUM SECURITY REQUIREMENTS FOR FEDERAL INFORMATION AND INFORMATION SYSTEMS: FEDERAL INFORMATION PROCESSING STANDARD (FIPS) 200 APPROVED BY THE SECRETARY OF COMMERCE MINIMUM SECURITY REQUIREMENTS BY THE SECRETARY OF COMMERCE Shirley Radack, EditorShirley Radack, Editor Computer Security Division

  11. RECOMMENDED SECURITY CONTROLS FOR FEDERAL

    E-Print Network [OSTI]

    May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information Technology Laboratory National Institute of Standards and Technology Security controls are the management

  12. Positioning Security from electronic warfare

    E-Print Network [OSTI]

    Kuhn, Markus

    Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

  13. Information Technology Security Assessment Framework

    E-Print Network [OSTI]

    Federal Information Technology Security Assessment Framework November 28, 2000 Prepared (NIST) Computer Security Division #12;Overview Information and the systems that process it are among and maintain a program to adequately secure its information and system assets. Agency programs must: 1) assure

  14. Foundations for Designing Secure Architectures

    E-Print Network [OSTI]

    Jurjens, Jan

    Architectures This talk: foundations for designing software architectures for secure systems, based their architectures. Will apply specialized tool-support to automatically evaluate the designs for potential security weaknesses. (Based on tutorial at WICSA 2004.) #12;Jan Jürjens, TU Munich: Foundations for Designing Secure

  15. alkali-metal vapor density: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    system: Alkali metal vapor in a single-mirror arrangement Physics Websites Summary: Secondary bifurcations of hexagonal patterns in a nonlinear optical system: Alkali metal vapor...

  16. GEORG-AUGUST-UNIVERSITT Computer Security

    E-Print Network [OSTI]

    Grabowski, Jens

    GEORG-AUGUST-UNIVERSITÄT GÖTTINGEN Computer Security Overview and Introduction Computer Security Security @ Göttingen » Research group for comuter security » Prof. Dr. Konrad Rieck » 4 PhD students (+ 2 security » Research on analysis, detection and prevention of threats » Development of intelligent security

  17. SECURITY TECHNIQUES Chris J Mitchell1

    E-Print Network [OSTI]

    Mitchell, Chris

    SECURITY TECHNIQUES Chris J Mitchell1 Introduction In this paper we consider the range of security security has been exerted. However, the techniques described are of general applicability by a security technique; in doing so we will distinguish between security features and security techniques (or

  18. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12T23:59:59.000Z

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  19. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  20. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  1. The decommodified security ratio

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    are currently experiencing: changing patterns of work, the phenom- enon she calls the "breakdown in the wage furthered by the work of the International Labour Office. In particular, the programme of researchThe decommodified security ratio: A tool for assessing European social protection systems Georges

  2. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  3. Conceptualizing Energy Security

    E-Print Network [OSTI]

    Winzer, Christian

    Energy security is one of the main targets of energy policy. However, the term has not been clearly defined, which makes it hard to measure and difficult to balance against other policy objectives. We review the multitude of definitions of energy...

  4. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21T23:59:59.000Z

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  5. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  6. December 2003 SECURITY CONSIDERATIONS

    E-Print Network [OSTI]

    Perkins, Richard A.

    security early in the information system development life cycle (SDLC), you may be able to avoid higher, with tailoring, to any SDLC model or acquisition method the organization is using. The appendices to the guide.nist.gov/publications/nistpubs/ index.html. The System Development Life Cycle (SDLC) The system development life cycle starts

  7. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08T23:59:59.000Z

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  8. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01T23:59:59.000Z

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  9. Transmission Line Security Monitor

    SciTech Connect (OSTI)

    None

    2011-01-01T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  10. A network security monitor

    SciTech Connect (OSTI)

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

    1989-11-01T23:59:59.000Z

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

  11. Visitor ParkingP Blue Light Security Phones

    E-Print Network [OSTI]

    Vertes, Akos

    Hensley Residence Hall 15 Tennis Courts/Parking Garage*7 Cole Residence Hall 16 Dorothy Williamson Clock8 Entrance The Vern Express (Connects the Foggy Bottom & Mount Vernon campuses) GW Police P To: Mac

  12. Sandia National Laboratories: metal organic chemical vapor deposition

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Partnership, Research & Capabilities, Solid-State Lighting Solid state lighting (SSL), which uses light-emitting diodes (LEDs), has the potential to be 10 times more energy...

  13. Geoscience research for energy security

    SciTech Connect (OSTI)

    Not Available

    1987-02-01T23:59:59.000Z

    This report focuses on the nation's geoscience needs and recommends DOE activities to mitigate major problems that effect energy security. The report recommends new or redirected DOE geoscience research initiatives for oil and gas, coal, nuclear resources, structures and processes in the earth's crust, geothermal resources, oil shale, and waste disposal. In light of the current and near-term national energy requirements, federal budget constraints, and the diminished R and D efforts from the domestic energy industry, the Board recommends that DOE: assign highest geoscience research emphasis to shorter-term, energy priorities of the nation; particularly advanced oil and gas exploration and production technologies; establish in DOE an Office of Geoscience Research to develop and administer a strategic plan for geoscience research activities; establish oil and gas research centers within each of the six major oil and gas provinces of the United States to conduct and coordinate interdisciplinary problem-oriented research; increase oil and gas research funding by an initial annual increment of $50 million, primarily to support the regional research centers.

  14. Sustainable Office Lighting Options

    E-Print Network [OSTI]

    Massachusetts at Amherst, University of

    Sustainable Office Lighting Options Task Lighting: Task lighting is a localized method of lighting a workspace so that additional, unnecessary lighting is eliminated, decreasing energy usage and costs. Illumination levels in the targeted work areas are higher with task lighting than with the ambient levels

  15. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01T23:59:59.000Z

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  16. Controlling the vapor pressure of a mercury lamp

    DOE Patents [OSTI]

    Grossman, Mark W. (Belmont, MA); George, William A. (Rockport, MA)

    1988-01-01T23:59:59.000Z

    The invention described herein discloses a method and apparatus for controlling the Hg vapor pressure within a lamp. This is done by establishing and controlling two temperature zones within the lamp. One zone is colder than the other zone. The first zone is called the cold spot. By controlling the temperature of the cold spot, the Hg vapor pressure within the lamp is controlled. Likewise, by controlling the Hg vapor pressure of the lamp, the intensity and linewidth of the radiation emitted from the lamp is controlled.

  17. In-well vapor stripping drilling and characterization work plan

    SciTech Connect (OSTI)

    Koegler, K.J.

    1994-03-13T23:59:59.000Z

    This work plan provides the information necessary for drilling, sampling, and hydrologic testing of wells to be completed in support of a demonstration of the in-well vapor stripping system. The in-well vapor stripping system is a remediation technology designed to preferentially extract volatile organic compounds (VOCs) from contaminated groundwater by converting them to a vapor phase. Air-lift pumping is used to lift and aerate groundwater within the well. The volatiles escaping the aerated water are drawn off by a slight vacuum and treated at the surface while the water is allowed to infiltrate the vadose zone back to the watertable.

  18. Enhanced Attenuation Technologies: Passive Soil Vapor Extraction

    SciTech Connect (OSTI)

    Vangelas, K.; Looney, B.; Kamath, R.; Adamson, D.; Newell, C.

    2010-03-15T23:59:59.000Z

    Passive soil vapor extraction (PSVE) is an enhanced attenuation (EA) approach that removes volatile contaminants from soil. The extraction is driven by natural pressure gradients between the subsurface and atmosphere (Barometric Pumping), or by renewable sources of energy such as wind or solar power (Assisted PSVE). The technology is applicable for remediating sites with low levels of contamination and for transitioning sites from active source technologies such as active soil vapor extraction (ASVE) to natural attenuation. PSVE systems are simple to design and operate and are more cost effective than active systems in many scenarios. Thus, PSVE is often appropriate as an interim-remedial or polishing strategy. Over the past decade, PSVE has been demonstrated in the U.S. and in Europe. These demonstrations provide practical information to assist in selecting, designing and implementing the technology. These demonstrations indicate that the technology can be effective in achieving remedial objectives in a timely fashion. The keys to success include: (1) Application at sites where the residual source quantities, and associated fluxes to groundwater, are relatively low; (2) Selection of the appropriate passive energy source - barometric pumping in cases with a deep vadose zone and barrier (e.g., clay) layers that separate the subsurface from the atmosphere and renewable energy assisted PSVE in other settings and where higher flow rates are required. (3) Provision of sufficient access to the contaminated vadose zones through the spacing and number of extraction wells. This PSVE technology report provides a summary of the relevant technical background, real-world case study performance, key design and cost considerations, and a scenario-based cost evaluation. The key design and cost considerations are organized into a flowchart that dovetails with the Enhanced Attenuation: Chlorinated Organics Guidance of the Interstate Technology and Regulatory Council (ITRC). The PSVE flowchart provides a structured process to determine if the technology is, or is not, reasonable and defensible for a particular site. The central basis for that decision is the expected performance of PSVE under the site specific conditions. Will PSVE have sufficient mass removal rates to reduce the release, or flux, of contamination into the underlying groundwater so that the site can meet it overall remedial objectives? The summary technical information, case study experiences, and structured decision process provided in this 'user guide' should assist environmental decision-makers, regulators, and engineers in selecting and successfully implementing PSVE at appropriate sites.

  19. New Regenerative Cycle for Vapor Compression Refrigeration

    SciTech Connect (OSTI)

    Mark J. Bergander

    2005-08-29T23:59:59.000Z

    The main objective of this project is to confirm on a well-instrumented prototype the theoretically derived claims of higher efficiency and coefficient of performance for geothermal heat pumps based on a new regenerative thermodynamic cycle as comparing to existing technology. In order to demonstrate the improved performance of the prototype, it will be compared to published parameters of commercially available geothermal heat pumps manufactured by US and foreign companies. Other objectives are to optimize the design parameters and to determine the economic viability of the new technology. Background (as stated in the proposal): The proposed technology closely relates to EERE mission by improving energy efficiency, bringing clean, reliable and affordable heating and cooling to the residential and commercial buildings and reducing greenhouse gases emission. It can provide the same amount of heating and cooling with considerably less use of electrical energy and consequently has a potential of reducing our nations dependence on foreign oil. The theoretical basis for the proposed thermodynamic cycle was previously developed and was originally called a dynamic equilibrium method. This theory considers the dynamic equations of state of the working fluid and proposes the methods for modification of T-S trajectories of adiabatic transformation by changing dynamic properties of gas, such as flow rate, speed and acceleration. The substance of this proposal is a thermodynamic cycle characterized by the regenerative use of the potential energy of two-phase flow expansion, which in traditional systems is lost in expansion valves. The essential new features of the process are: (1) The application of two-step throttling of the working fluid and two-step compression of its vapor phase. (2) Use of a compressor as the initial step compression and a jet device as a second step, where throttling and compression are combined. (3) Controlled ratio of a working fluid at the first and second step of compression. In the proposed system, the compressor compresses the vapor only to 50-60% of the final pressure, while the additional compression is provided by a jet device using internal potential energy of the working fluid flow. Therefore, the amount of mechanical energy required by a compressor is significantly reduced, resulting in the increase of efficiency (either COP or EER). The novelty of the cycle is in the equipment and in the way the multi-staging is accomplished. The anticipated result will be a new refrigeration system that requires less energy to accomplish a cooling task. The application of this technology will be for more efficient designs of: (1) Industrial chillers, (2) Refrigeration plants, (3) Heat pumps, (4) Gas Liquefaction plants, (5) Cryogenic systems.

  20. Method and apparatus for simulating atmospheric absorption of solar energy due to water vapor and CO{sub 2}

    DOE Patents [OSTI]

    Sopori, B.L.

    1995-06-20T23:59:59.000Z

    A method and apparatus for improving the accuracy of the simulation of sunlight reaching the earth`s surface includes a relatively small heated chamber having an optical inlet and an optical outlet, the chamber having a cavity that can be filled with a heated stream of CO{sub 2} and water vapor. A simulated beam comprising infrared and near infrared light can be directed through the chamber cavity containing the CO{sub 2} and water vapor, whereby the spectral characteristics of the beam are altered so that the output beam from the chamber contains wavelength bands that accurately replicate atmospheric absorption of solar energy due to atmospheric CO{sub 2} and moisture. 8 figs.

  1. Method and apparatus for simulating atomospheric absorption of solar energy due to water vapor and CO.sub.2

    DOE Patents [OSTI]

    Sopori, Bhushan L. (Denver, CO)

    1995-01-01T23:59:59.000Z

    A method and apparatus for improving the accuracy of the simulation of sunlight reaching the earth's surface includes a relatively small heated chamber having an optical inlet and an optical outlet, the chamber having a cavity that can be filled with a heated stream of CO.sub.2 and water vapor. A simulated beam comprising infrared and near infrared light can be directed through the chamber cavity containing the CO.sub.2 and water vapor, whereby the spectral characteristics of the beam are altered so that the output beam from the chamber contains wavelength bands that accurately replicate atmospheric absorption of solar energy due to atmospheric CO.sub.2 and moisture.

  2. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  3. Cyber Security & Smart Grid 

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01T23:59:59.000Z

    to complexity, proprietary nature and different management teams ? Ripe for exploitation ? Intel, Microsoft, Security vendors are not focused on this technology ? Many are NOT PC?s ? Many can be infected and the devices cannot be cleaned ESL-KT-11...-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Inherent Vulnerabilities ? Two-way communications ? Distributed connectivity ? Customer usage data ? Metering devices ? Weak authentication and access control ? Lack of adequate training ? Lack...

  4. Perceptions of Security

    E-Print Network [OSTI]

    Ura, Karma

    2001-01-01T23:59:59.000Z

    followed by guerrillas, waged by the Bhutanese militia in rugged terrain. Though not written in accounts of any battles, the form of war oral sources describe suggest unconventional warfare. The natural defence position of the terrain combined with its... nor poverty in the areas adjacent to Bhutan, which are the ultimate causes of the current security problems Bhutan faces, are unfortunately on decline. Journal of Bhutan Studies 136 On the other hand, Bhutan, like several small states, has been...

  5. Security, Safety and Health

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring

  6. Information Security Management System for Microsoft's Cloud Infrastructure

    E-Print Network [OSTI]

    Chaudhuri, Surajit

    Information Security Management System for Microsoft's Cloud Infrastructure Online Services ......................................................................................................................................................................................1 Information Security Management System.......................................................................................................................7 Information Security Management Forum

  7. INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY

    SciTech Connect (OSTI)

    Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

    2011-07-01T23:59:59.000Z

    Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

  8. Photoinitiated chemical vapor depostion [sic] : mechanism and applications

    E-Print Network [OSTI]

    Baxamusa, Salmaan Husain

    2009-01-01T23:59:59.000Z

    Photoinitiated chemical vapor deposition (piCVD) is developed as a simple, solventless, and rapid method for the deposition of swellable hydrogels and functional hydrogel copolymers. Mechanistic experiments show that piCVD ...

  9. Low Level Heat Recovery Through Heat Pumps and Vapor Recompression 

    E-Print Network [OSTI]

    Gilbert, J.

    1980-01-01T23:59:59.000Z

    of each approach as a function of the source and sink temperatures and magnitude of heat flow. Generic heat pumps and vapor recompression designs are explained, costed, estimated in performance, and evaluated as a function of the economic parameters...

  10. Optical Precursors in Rubidium Vapor and Their Relation to Superradiance

    E-Print Network [OSTI]

    Yang, Wenlong

    2012-10-19T23:59:59.000Z

    Optical precursor is the sharp optical pulse front that does not show delay in absorptive media. In this thesis, optical precursor behavior in rubidium (Rb) vapor was investigated in the picoseconds regime. An amplified femtosecond laser was shaped...

  11. Applications of Mechanical Vapor Recompression to Evaporation and Crystallization

    E-Print Network [OSTI]

    Outland, J. S.

    there is no boiler plant available or when electrical power is priced competitively in comparison to steam. Vapor recompression is accomplished using centrifugal, axial-flow, or positive displacement compressors and these compressors can be powered by electricity...

  12. Melt and vapor characteristics in an electron beam evaporator

    SciTech Connect (OSTI)

    Blumenfeld, L.; Fleche, J.L.; Gonella, C. [DCC/DPE/SPEA Centre d`Etudes de Saclay, Gif-sur-Yvette (France)

    1994-12-31T23:59:59.000Z

    We compare the free surface temperatures T{sub s}, calculated by two methods, in cerium or copper evaporation experiments. The first method considers properties of the melt: by an empirical law we take into account turbulent thermal convection, instabilities and craterization of the free surface. The second method considers the vapor flow expansion and connects T{sub s} to the measured terminal parallel temperature and the terminal mean parallel velocity of the vapor jet, by Direct Simulation Monte Carlo calculations including an atom-atom inelastic collision algorithm. The agreement between the two approaches is better for cerium than for copper in the high craterization case. The analysis, from the point of view of the properties of the melt, of the terminal parameters of the vapor jet for the high beam powers shows that T{sub s} and the Knudsen number at the vapor source reach a threshold when the beam power increases.

  13. University of Oregon: GPS-based Precipitable Water Vapor (PWV)

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Vignola, F.; Andreas, A.

    A partnership with the University of Oregon and U.S. Department of Energy's National Renewable Energy Laboratory (NREL) to collect Precipitable Water Vapor (PWV) data to compliment existing resource assessment data collection by the university.

  14. Chemical vapor deposition of organosilicon and sacrificial polymer thin films

    E-Print Network [OSTI]

    Casserly, Thomas Bryan

    2005-01-01T23:59:59.000Z

    Chemical vapor deposition (CVD) produced films for a wide array of applications from a variety of organosilicon and organic precursors. The structure and properties of thin films were controlled by varying processing ...

  15. Initiated chemical vapor deposition of functional polyacrylic thin films

    E-Print Network [OSTI]

    Mao, Yu, 1975-

    2005-01-01T23:59:59.000Z

    Initiated chemical vapor deposition (iCVD) was explored as a novel method for synthesis of functional polyacrylic thin films. The process introduces a peroxide initiator, which can be decomposed at low temperatures (<200?C) ...

  16. All graphene electromechanical switch fabricated by chemical vapor deposition

    E-Print Network [OSTI]

    Milaninia, Kaveh M.

    We demonstrate an electromechanical switch comprising two polycrystalline graphene films; each deposited using ambient pressure chemical vapor deposition. The top film is pulled into electrical contact with the bottom film ...

  17. Apparent Temperature Dependence on Localized Atmospheric Water Vapor

    E-Print Network [OSTI]

    Salvaggio, Carl

    Apparent Temperature Dependence on Localized Atmospheric Water Vapor Matthew Montanaroa, Carl temperature of the target if not properly accounted for. The temperature error is defined as the difference between the target leaving apparent temperature and observed apparent temperature. The effects

  18. Low Level Heat Recovery Through Heat Pumps and Vapor Recompression

    E-Print Network [OSTI]

    Gilbert, J.

    1980-01-01T23:59:59.000Z

    The intent of this paper is to examine the methods and economics of recovering low level heat through heat pumps and vapor recompression. Actual commercially available equipment is considered to determine the near-term and future economic viability...

  19. Enabling integration of vapor-deposited polymer thin films

    E-Print Network [OSTI]

    Petruczok, Christy D. (Christy Danielle)

    2014-01-01T23:59:59.000Z

    Initiated Chemical Vapor Deposition (iCVD) is a versatile, one-step process for synthesizing conformal and functional polymer thin films on a variety of substrates. This thesis emphasizes the development of tools to further ...

  20. Systems and methods for generation of hydrogen peroxide vapor

    DOE Patents [OSTI]

    Love, Adam H; Eckels, Joel Del; Vu, Alexander K; Alcaraz, Armando; Reynolds, John G

    2014-12-02T23:59:59.000Z

    A system according to one embodiment includes a moisture trap for drying air; at least one of a first container and a second container; and a mechanism for at least one of: bubbling dried air from the moisture trap through a hydrogen peroxide solution in the first container for producing a hydrogen peroxide vapor, and passing dried air from the moisture trap into a headspace above a hydrogen peroxide solution in the second container for producing a hydrogen peroxide vapor. A method according one embodiment includes at least one of bubbling dried air through a hydrogen peroxide solution in a container for producing a first hydrogen peroxide vapor, and passing dried air from the moisture trap into a headspace above the hydrogen peroxide solution in a container for producing a second hydrogen peroxide vapor. Additional systems and methods are also presented.

  1. Type B Accident Investigation of the Acid Vapor Inhalation on...

    Broader source: Energy.gov (indexed) [DOE]

    2005, in TA-48, Building RC-1 Room 402 at the Los Alamos National Laboratory Type B Accident Investigation of the Acid Vapor Inhalation on June 7, 2005, in TA-48, Building RC-1...

  2. ARM: Microwave Radiometer data (MWR Profiles - QME), water vapor, temp, cloud liquid water, precip water retrievals

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Cadeddu, Maria

    Microwave Radiometer data (MWR Profiles - QME), water vapor, temp, cloud liquid water, precip water retrievals

  3. Intermediate Vapor Expansion Distillation and Nested Enrichment Cascade Distillation

    E-Print Network [OSTI]

    Erickson, D. C.

    INTERMEDIATE VAPOR EXPANSION DISTILLATION AND NESTED ENRICHMENT CASCADE DISTILLATION D.. C. Erickson Energy Concepts Company Annapolis, Maryland ABSTRACT Although it is known that incorporating an intermediate reboiler or reflux... condenser in a distillation ~olumn will improve column efficiency by 15 to 100%, there has been little use of this technique to date." Intermediate vapor compression heat pumping was recently introduced as one practical means of achieving this benefit...

  4. Injection locked oscillator system for pulsed metal vapor lasers

    DOE Patents [OSTI]

    Warner, Bruce E. (Livermore, CA); Ault, Earl R. (Dublin, CA)

    1988-01-01T23:59:59.000Z

    An injection locked oscillator system for pulsed metal vapor lasers is disclosed. The invention includes the combination of a seeding oscillator with an injection locked oscillator (ILO) for improving the quality, particularly the intensity, of an output laser beam pulse. The present invention includes means for matching the first seeder laser pulses from the seeding oscillator to second laser pulses of a metal vapor laser to improve the quality, and particularly the intensity, of the output laser beam pulse.

  5. Vaporizer design criteria for ethanol fueled internal combustion engines

    E-Print Network [OSTI]

    Ariyaratne, Arachchi Rallage

    1985-01-01T23:59:59.000Z

    Properties of Alcohols, Water and Petroleum Fuels. 2 Results of regression analysis. 3 Effect of various parameters on vaporization length. 51 4 Predicted tube length for different fuel requirements (Ten stainless steel tubes, 4. 7 mm ID. ). 60 ix LIST... with quality with increasing heat flux as parameter. 18 5 Reynolds Number Factor, F. 6 Suppression Factor, S. 27 27 7 Flow chart of the algorithm for vaporization length. 8 The single tube heat exchanger. 33 36 9 Thermocouple arrangement along...

  6. Optimal determination of the vapor pressure critical exponent

    E-Print Network [OSTI]

    Walton, Clifford Wayne

    1977-01-01T23:59:59.000Z

    , 1969), while scaling theory predicts about 0. 1 (Vicentini-Missoni et al. , 1969; Widom and Rowlinson, 1970). The object of this study was to determine the optimum value of 0 by means of a least squares fit of various nonanalytic vapor pressure... onal : cj ence Foundation, Grant ENG76-00692, is acknowl- edged. vi TABLE OF CONTENTS Page SCOPE. CONCLUSIONS AND SIGNII'ICANCE INTRODUCTION Theory. Development of Vapor Pressure Equations PROCEDURE. Curve Fit Method (CFN). Numerical...

  7. Implementing Information Security and Its Technology: A Line Management Perspective

    E-Print Network [OSTI]

    Barletta, William A.

    2005-01-01T23:59:59.000Z

    of an integrated information security and privacy program.An institution's information security program forms thefrom the chief information security officer, chief security

  8. 2014 Headquarters Facilities Master Security Plan - Chapter 8...

    Office of Environmental Management (EM)

    8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

  9. 2014 Headquarters Facilities Master Security Plan - Chapter 14...

    Office of Environmental Management (EM)

    4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

  10. 2014 Headquarters Facilities Master Security Plan - Chapter 1...

    Office of Environmental Management (EM)

    , Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

  11. 2014 Headquarters Facilities Master Security Plan - Chapter 10...

    Office of Environmental Management (EM)

    0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

  12. 2014 Headquarters Facilities Master Security Plan - Chapter 3...

    Office of Environmental Management (EM)

    3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

  13. Promoting India's development: energy security and climate security are convergent goals

    SciTech Connect (OSTI)

    Rajan, Gupta [Los Alamos National Laboratory; Shankar, Harihar [Los Alamos National Laboratory; Joshi, Sunjoy [INDIA

    2009-01-01T23:59:59.000Z

    This paper investigates three aspects of the energy-climate challenges faced by India. First, we examine energy security in light of anticipated growth in power generation in response to the national goal of maintaining close to 10% growth in GDP. Second, we examine possible options for mitigation and adaptation to climate change for India that it can take to the coming Copenhagen meeting on climate change. Lastly, we introduce an open web based tool for analyzing and planning global energy systems called the Global Energy Observatory (GEO).

  14. Secure Learning and Learning for Security: Research in the Intersection

    E-Print Network [OSTI]

    Rubinstein, Benjamin

    2010-01-01T23:59:59.000Z

    and Alissa Dill. 2008 CISO priorities: The right objectivesbased reactive defense. The CISO risk management problem isSecurity Officer (CISO) to manage the enterprise’s

  15. Tank Vapor Characterization Project: Annual status report for FY 1996

    SciTech Connect (OSTI)

    Silvers, K.L.; Fruchter, J.S.; Huckaby, J.L.; Almeida, T.L.; Evans, J.C. Jr.; Pool, K.H.; Simonen, C.A.; Thornton, B.M.

    1997-01-01T23:59:59.000Z

    In Fiscal Year 1996, staff at the Vapor Analytical Laboratory at Pacific Northwest National Laboratory performed work in support of characterizing the vapor composition of the headspaces of radioactive waste tanks at the Hanford Site. Work performed included support for technical issues and sampling methodologies, upgrades for analytical equipment, analytical method development, preparation of unexposed samples, analyses of tank headspaces samples, preparation of data reports, and operation of the tank vapor database. Progress made in FY 1996 included completion and issuance of 50 analytical data reports. A sampling system comparison study was initiated and completed during the fiscal year. The comparison study involved the vapor sampling system (VSS), a truck-based system, and the in situ vapor sampling system (ISVS), a cart-based system. Samples collected during the study were characterized for inorganic, permanent gases, total non-methane organic compounds and organic speciation by SUMMA{trademark} and TST methods. The study showed comparable sampling results between the systems resulting in the program switching from the VSS to the less expensive ISVS methodology in late May 1996. A temporal study was initiated in January 1996 in order to understand the influences seasonal temperatures changes have on the vapors in the headspace of Hanford waste tanks. A holding time study was initiated in the fourth quarter of FY 1996. Samples were collected from tank S-102 and rushed to the laboratory for time zero analysis. Additional samples will be analyzed at 1, 2, 4, 8, 16, and 32 weeks.

  16. Information Systems 32 (2007) 11661183 Security Attack Testing (SAT)--testing the security of

    E-Print Network [OSTI]

    2007-01-01T23:59:59.000Z

    Information Systems 32 (2007) 1166­1183 Security Attack Testing (SAT)--testing the security have been devoted into integrating security issues into information systems development practices reserved. Keywords: Information systems development methodology; Integrating security and software

  17. SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY

    E-Print Network [OSTI]

    SECURITY METRICS: MEASUREMENTS TO SUPPORT THE CONTINUED DEVELOPMENT OF INFORMATION SECURITY TECHNOLOGY Shirley Radack, Editor Computer Security Division Information Technology Laboratory National and to protect their systems and information from security threats and risks. There have been many past efforts

  18. Lighting Options for Homes.

    SciTech Connect (OSTI)

    Baker, W.S.

    1991-04-01T23:59:59.000Z

    This report covers many aspects of various lighting options for homes. Types of light sources described include natural light, artificial light, incandescent lamps, fluorescent lamps, and high intensity discharge lamps. A light source selection guide gives the physical characteristics of these, design considerations, and common applications. Color, strategies for efficient lighting, and types of lighting are discussed. There is one section giving tips for various situations in specific rooms. Rooms and types of fixtures are shown on a matrix with watts saved by using the recommended type lighting for that room and room location. A major emphasis of this report is saving energy by utilizing the most suitable, recommended lighting option. (BN)

  19. Security Policies for Downgrading Stephen Chong

    E-Print Network [OSTI]

    Myers, Andrew C.

    @cs.cornell.edu ABSTRACT A long-standing problem in information security is how to specify and enforce expressive security that incorporates them, allowing secure downgrading of information through an explicit declassification operation of Com- puting and Information Systems]: Security and Protection General Terms: Security, Languages

  20. Your Safety and Security at Syracuse University

    E-Print Network [OSTI]

    Raina, Ramesh

    programs to disclose campus crime statistics and security information. A 1998 amendment renamed the lawYour Safety and Security at Syracuse University A comprehensive report on campus security and fire and security measures on and around our campus. The need for security encompasses more than personal safety

  1. Mobile lighting apparatus

    DOE Patents [OSTI]

    Roe, George Michael; Klebanoff, Leonard Elliott; Rea, Gerald W; Drake, Robert A; Johnson, Terry A; Wingert, Steven John; Damberger, Thomas A; Skradski, Thomas J; Radley, Christopher James; Oros, James M; Schuttinger, Paul G; Grupp, David J; Prey, Stephen Carl

    2013-05-14T23:59:59.000Z

    A mobile lighting apparatus includes a portable frame such as a moveable trailer or skid having a light tower thereon. The light tower is moveable from a stowed position to a deployed position. A hydrogen-powered fuel cell is located on the portable frame to provide electrical power to an array of the energy efficient lights located on the light tower.

  2. Light disappears rapidly (exponentially)

    E-Print Network [OSTI]

    Kudela, Raphael M.

    #12;#12;#12;#12;Light disappears rapidly (exponentially) with depth At the same time, the color of the light shifts #12;#12;#12;#12;· Euphotic zone ­ plentiful light ­ 0-100 m (about) · Dysphotic zone ­ very, very little light ­ 100-1000 m (about) · Aphotic zone ­ no light ­ below 1000 m #12;Sunlight in Water

  3. Sandia National Laboratories: Climate Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    limit economic development, impact interdependent infrastructure (such as energy and agriculture), and are a fundamental source of ... Climate Security On May 13, 2011, in...

  4. Pollux | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    Pollux | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear Navy...

  5. Secure Data Center (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-08-01T23:59:59.000Z

    This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

  6. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    through these relationships that will transition into technologies that address DOE Roadmap challenges. R&D Activities: Real-time digital simulator Advanced security...

  7. Sandia National Laboratories: Infrastructure Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    from improved climate models to performance models for underground waste storage to 3D printing and digital rock physics. Marianne Walck (Director ... Recent Sandia Secure,...

  8. Sandia National Laboratories: Energy Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    States. I&C systems monitor the safe, reliable and secure generation and delivery of electricity and could have potential cyber vulnerabilities. At Sandia National Laboratories,...

  9. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  10. National Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

  11. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

  12. Contract Provisions and Ratchets: Utility Security or Customer Equity?

    E-Print Network [OSTI]

    Penkala, B. A.

    CONTRACT PROVISIONS ANO RATCHETS: UTILITY SECURITY OR CUSTOMER EQUITY? BARBARA A. PENKALA Senior Research Analyst Houston Lighting & Power Company Houston. Texas ABSTRACT The contract provisions and ratchets con tained in an electric... of customers and the magnitude of the load served. A smaller part of the cost is dependent on kilowatt-hours. or energy supplied. The high investment required in the electric utility business relative to annual revenue has an important influence on price...

  13. New Light Sources for Tomorrow's Lighting Designs

    E-Print Network [OSTI]

    Krailo, D. A.

    can ever be saved on that monthly energy bill. During the past several years, many new light sources have been developed and introduced. These product introductions have not been limited to anyone lamp type, but instead may be found in fila ment..., fluorescent and high intensity discharge lamp families. Man , ufacturers of light sources have two basic goals for new product development. These goals are high efficiency lighting and improved colo'r rendering properties. High efficiency lighting may take...

  14. McMaster Security Services Annual Report 2009 1 Security Services

    E-Print Network [OSTI]

    Thompson, Michael

    McMaster Security Services ­ Annual Report 2009 1 McMaster Security Services Annual Report 2009 #12;McMaster Security Services ­ Annual Report 2009 2 Mission Statement Developing a safe and secure to the Security Services Department. Methods and approaches to assist in achieving a safe and secure environment

  15. Cyberspace security system

    DOE Patents [OSTI]

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24T23:59:59.000Z

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  16. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated Codes |IsLoveReferenceAgendaSecurityAbout Us

  17. National Security Initiatives | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOE Office of Science (SC)Integrated CodesTransparency VisitSilver Toyota1Resource forNational Cyber Security

  18. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville Power AdministrationField8, 2000Consumption Survey (CBECS)Laboratory to HighlightSecurity Overview

  19. Securing Control Systems Modems

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory Board FollowSectionSecuring

  20. Security Clearances; Limitations

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels DataDepartment of Energy Your Density Isn'tOriginEducationVideo »UsageSecretary of Energy Advisory BoardSecuring WLANsMay 22, 2014SEC.

  1. Homeland Security Programs | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative1 First Use of Energy for All Purposes (Fuel and Nonfuel), 2002; Level: National5Sales for4,645U.S. DOEThe Bonneville PowerCherries 82981-1cnHigh School football Highdefault Sign In About |PagesHomeland Security

  2. EK101 Engineering Light Smart Lighting

    E-Print Network [OSTI]

    Bifano, Thomas

    EK101 Engineering Light Smart Lighting Homework for 9/10 1. Make an estimate (using if the patent is granted.) 3. What is a lumen? A lux? How are the two related? How would you use a lux meter, (Lux, Lumens/m2) Luminous Flux: Perceivable light power from a source, (Lumens) Use the lux meter

  3. Ideas for Security Assurance in Security Critical Software using Modelica

    E-Print Network [OSTI]

    Zhao, Yuxiao

    Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

  4. Specific light in sculpture

    E-Print Network [OSTI]

    Powell, John William

    1989-01-01T23:59:59.000Z

    Specific light is defined as light from artificial or altered natural sources. The use and manipulation of light in three dimensional sculptural work is discussed in an historic and contemporary context. The author's work ...

  5. The Transverse Optical Pumping of Rubidium using Linearly-polarized Light

    E-Print Network [OSTI]

    Gay, Timothy J.

    The Transverse Optical Pumping of Rubidium using Linearly-polarized Light L. P. Neukirch and T. J Introduction Optically-pumped alkali vapors are studied for a wide range of reasons. As an example, many accelerators throughout the world have used optically-pumped spin exchange sources to produce beams

  6. Light Duty Combustion Research: Advanced Light-Duty Combustion...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Light Duty Combustion Research: Advanced Light-Duty Combustion Experiments Light Duty Combustion Research: Advanced Light-Duty Combustion Experiments 2009 DOE Hydrogen Program and...

  7. Apparatus for isotopic alteration of mercury vapor

    DOE Patents [OSTI]

    Grossman, Mark W. (Belmont, MA); George, William A. (Gloucester, MA); Marcucci, Rudolph V. (Danvers, MA)

    1988-01-01T23:59:59.000Z

    An apparatus for enriching the isotopic Hg content of mercury is provided. The apparatus includes a reactor, a low pressure electric discharge lamp containing a fill including mercury and an inert gas. A filter is arranged concentrically around the lamp. In a preferred embodiment, constant mercury pressure is maintained in the filter by means of a water-cooled tube that depends from it, the tube having a drop of mercury disposed in it. The reactor is arranged around the filter, whereby radiation from said lamp passes through the filter and into said reactor. The lamp, the filter and the reactor are formed of a material which is transparent to ultraviolet light.

  8. Annual Security Report October 1, 2013

    E-Print Network [OSTI]

    Yates, Andrew

    ® Annual Security Report October 1, 2013 Albert Einstein College of Medicine Jack & Pearl Resnick Campus Bronx, NY #12;2 | P a g e TABLE OF CONTENTS ABOUT THE ANNUAL SECURITY REPORT ................................................................................................4 MESSAGE FROM THE EINSTEIN SECURITY DEPARTMENT

  9. Techniques for enhanced physical-layer security

    E-Print Network [OSTI]

    Pinto, Pedro C.

    Information-theoretic security--widely accepted as the strictest notion of security--relies on channel coding techniques that exploit the inherent randomness of propagation channels to strengthen the security of communications ...

  10. A Survey on Cloud Provider Security

    E-Print Network [OSTI]

    A Survey on Cloud Provider Security Measures Alex Pucher, Stratos Dimopoulos Abstract Cloud take advantage of this model already, but security and privacy concerns limit the further adoption agencies and start offering security certifications and separate tightly controlled "government" cloud

  11. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    361 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special in the National Nuclear Security Administration, including official reception and representation expenses (not Reactors appropriations including the National Nuclear Security Administration field offices. This account

  12. Annual Security Report October 1, 2012

    E-Print Network [OSTI]

    Yates, Andrew

    ® Annual Security Report October 1, 2012 Albert Einstein College of Medicine Jack & Pearl Resnick Campus Bronx, NY #12;2 | P a g e TABLE OF CONTENTS ABOUT THE ANNUAL SECURITY REPORT ................................................................................................3 MESSAGE FROM THE SECURITY DEPARTMENT

  13. DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY

    E-Print Network [OSTI]

    379 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special in the National Nuclear Security Administration, including official reception and representation expenses, and Naval Reactors appropriations including the National Nuclear Security Administration (NNSA) field of

  14. University of Connecticut Information Technology Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    University of Connecticut Information Technology Security Incident Response Plan #12;- i - Revision technology needs of the University. The Information Technology Security Office has created this Incident, affiliates, or students. Audience This document is primarily for University departmental information security

  15. INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO

    E-Print Network [OSTI]

    June 2004 INFORMATION TECHNOLOGY SECURITY SERVICES: HOW TO SELECT, IMPLEMENT, AND MANAGE Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute the security of their information tech nology (IT) systems. Whether they get this assistance from internal

  16. NISTIR 7359 Information Security Guide For

    E-Print Network [OSTI]

    NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash #12;NISTIR 7359 Information Security Guide For Government Executives Pauline Bowen Elizabeth Chew Joan Hash Computer Security Division Information Technology Laboratory National Institute of Standards

  17. Security Services for Next Generation Healthcare

    E-Print Network [OSTI]

    Fisher, Kathleen

    /HIT). The availability of electronic healthcare information dramatically changes the information security threat) available online, and thus new information privacy and security requirements were also stipulated in the Act. Among the new information security requirements, specific data confidentiality and integrity

  18. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  19. Electrochromic properties of tungsten trioxide thin films prepared by photochemical vapor deposition

    SciTech Connect (OSTI)

    Maruyama, Toshiro; Kanagawa, Tetsuya (Kyoto Univ. (Japan). Dept. of Chemical Engineering)

    1994-09-01T23:59:59.000Z

    Electrochromic tungsten trioxide thin films were prepared by a photochemical vapor deposition. The source material was tungsten carbonyl. A 6 W low pressure mercury lamp was used as a light source. Amorphous tungsten trioxide thin films were obtained at a substrate temperature of 200 C. The UV radiation enhances the oxidation of tungsten, in addition to the acceleration of the deposition of the films. Reduction and oxidation of the films in a 0.3M LiClO[sub 4] propylene carbonate solution resulted in desirable changes in optimal absorption. The bleaching time was short compared to the amorphous CVD film. Coulometry indicated that the coloration efficiency was 222 cm[sup 2]/C.

  20. Oxidation of zirconium alloys in 2.5 kPa water vapor for tritium readiness.

    SciTech Connect (OSTI)

    Mills, Bernice E.

    2007-11-01T23:59:59.000Z

    A more reactive liner material is needed for use as liner and cruciform material in tritium producing burnable absorber rods (TPBAR) in commercial light water nuclear reactors (CLWR). The function of these components is to convert any water that is released from the Li-6 enriched lithium aluminate breeder material to oxide and hydrogen that can be gettered, thus minimizing the permeation of tritium into the reactor coolant. Fourteen zirconium alloys were exposed to 2.5 kPa water vapor in a helium stream at 300 C over a period of up to 35 days. Experimental alloys with aluminum, yttrium, vanadium, titanium, and scandium, some of which also included ternaries with nickel, were included along with a high nitrogen impurity alloy and the commercial alloy Zircaloy-2. They displayed a reactivity range of almost 500, with Zircaloy-2 being the least reactive.

  1. Electronic security device

    DOE Patents [OSTI]

    Eschbach, Eugene A. (Richland, WA); LeBlanc, Edward J. (Kennewick, WA); Griffin, Jeffrey W. (Kennewick, WA)

    1992-01-01T23:59:59.000Z

    The present invention relates to a security device having a control box (12) containing an electronic system (50) and a communications loop (14) over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system (50) and a detection module (72) capable of registering changes in the voltage and phase of the signal transmitted over the loop.

  2. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  3. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01T23:59:59.000Z

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  4. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17T23:59:59.000Z

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  5. Exciting White Lighting

    Broader source: Energy.gov [DOE]

    Windows that emit light and are more energy efficient? Universal Display’s PHOLED technology enables windows that have transparent light-emitting diodes in them.

  6. Issues in Security Service Discovery and Routing

    SciTech Connect (OSTI)

    Sholander, P.; Tarman, T.

    1999-04-07T23:59:59.000Z

    The Security Specification, Version 1.0 allows security services to be provided by many devices in a network. It correctly presumes that if a virtual circuit needs these security services, then network topology and device policy will act to ensure that the appropriate security services are applied to the virtual circuit. This contribution moves that the Security Service Discovery and Routing function be included in the Security Version 2.0 work scope.

  7. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  8. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  9. Reporting Incidents Of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-04-03T23:59:59.000Z

    To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

  10. Vadose Zone Remediation Assessment: M-Area Process Sewer Soil Vapor Extraction Units 782-5M, 782-7M, and 782-8M

    SciTech Connect (OSTI)

    Riha, B.D.

    2001-04-20T23:59:59.000Z

    This study focuses on the status of the vadose zone remediation along 1600 ft of the process sewer line between the M-Area security fence and the M-Area settling basin. Three soil vapor extraction (SVE) units 782-5M, 782-7M, and 782-8M, connected to 4 vertical wells and 3 horizontal wells have been addressing the vadose zone volatile organic contamination (VOC) since 1995. The specific objectives of this study were to obtain soil gas and sediment samples, evaluate SVE units and vadose zone remediation, and make recommendations to address further remediation needs.

  11. Cyber Security Evaluation of II&C Technologies

    SciTech Connect (OSTI)

    Ken Thomas

    2014-11-01T23:59:59.000Z

    The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industry’s template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.

  12. CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

    Energy Savers [EERE]

    CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure Control Systems Are Under Way, but Challenges Remain CRITICAL INFRASTRUCTURE PROTECTION Multiple Efforts to Secure...

  13. Harold Washington Social Security Administration (SSA) Center...

    Office of Environmental Management (EM)

    Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

  14. Climate VISION: Security and Privacy Notices

    Office of Scientific and Technical Information (OSTI)

    SECURITY AND PRIVACY NOTICES Security Notice This website is part of a Federal computer system used to accomplish Federal functions. The Department of Energy uses software programs...

  15. Extension of DOE Directive on Cyber Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-06-04T23:59:59.000Z

    DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

  16. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

  17. Enforcement Letter, Consolidated Nuclear Security, LLC | Department...

    Energy Savers [EERE]

    security incidents involving the unclassified waste stream and discrepancies in the inventory of accountable nuclear material at DOE's Y-12 National Security Complex in Oak...

  18. Independent Oversight Evaluation, Office of Secure Transportation...

    Office of Environmental Management (EM)

    Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office...

  19. Independent Oversight Inspection, Office of Secure Transportation...

    Office of Environmental Management (EM)

    Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the...

  20. Security & Defense Licenses Available | Tech Transfer | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...