Powered by Deep Web Technologies
Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 15, NO. 3, AUGUST 2000 1137 A Fast Voltage Security Assessment  

E-Print Network [OSTI]

], the prominent methods in voltage stability analysis are those that find the system load margin, especially when system contingencies are considered. Associated with the curve, the real power margin and with the curve] and Chiang et al. [6] proposed fast curve fitting methods to calculate the limit of the nose curve; while

Venkatasubramanian, Mani V.

2

Re-Dispatching Generation to Increase Power System Security Margin and Support Low Voltage Bus  

E-Print Network [OSTI]

Re-Dispatching Generation to Increase Power System Security Margin and Support Low Voltage Bus by re-dispatching generator outputs, using a normal vector found at a voltage collapse boundary or a low voltage boundary (LVB). This method uses the normal vector as an indicator to change the generation

3

Independent Oversight Assessment, Y-12 National Security Complex...  

Office of Environmental Management (EM)

Y-12 National Security Complex - June 2012 Independent Oversight Assessment, Y-12 National Security Complex - June 2012 June 2012 Assessment of Nuclear Safety Culture at the Y-12...

4

Enterprise Assessments Review of the Y-12 National Security Complex...  

Office of Environmental Management (EM)

Enterprise Assessments Review of the Y-12 National Security Complex 2014 Site-Level Exercise - January 2015 Enterprise Assessments Review of the Y-12 National Security Complex 2014...

5

Nevada National Security Site Performance Assessment Updates...  

Office of Environmental Management (EM)

December 11 and 12, 2014 To view all the P&RA CoP 2014 Technical Exchange Meeting videos click here. Video Presentation Nevada National Security Site Performance Assessment...

6

Multi-objective Optimal Power Flows to Evaluate Voltage Security Costs in Power Networks  

E-Print Network [OSTI]

1 Multi-objective Optimal Power Flows to Evaluate Voltage Security Costs in Power Networks William Abstract-- In this paper, new optimal power flow (OPF) tech- niques are proposed based on multi- dard power flow models. The results obtained using the proposed mixed OPFs are compared and analyzed

Cañizares, Claudio A.

7

Assessing the Security Vulnerabilities of Correctional Facilities  

SciTech Connect (OSTI)

The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

Morrison, G.S.; Spencer, D.S.

1998-10-27T23:59:59.000Z

8

Enterprise Assessments Targeted Review,Y-12 National Security...  

Office of Environmental Management (EM)

Y-12 National Security Complex - March 2015 Enterprise Assessments Targeted Review,Y-12 National Security Complex - March 2015 March 2015 Targeted Review of Work Planning and...

9

Cyber Assessment Methods For SCADA Security  

SciTech Connect (OSTI)

The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

May Robin Permann; Kenneth Rohde

2005-06-01T23:59:59.000Z

10

Cyber Assessment Methods for SCADA Security  

SciTech Connect (OSTI)

The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

Not Available

2005-06-01T23:59:59.000Z

11

An Impact Assessment Model for Distributed Adaptive Security Situation Assessment*  

E-Print Network [OSTI]

1 An Impact Assessment Model for Distributed Adaptive Security Situation Assessment* Mark Heckman mechanism is not simply to stop attacks, but to protect a computing resource so that the resource can continue to perform its function. A computing resource, however, is only a component of a larger system

California at Davis, University of

12

Development of a Software SecurityAssessment Instrument to Reduce Software SecurityRisk  

E-Print Network [OSTI]

system, has vulnerabilities. (SAT) for use in the software development and maintenance life cycle throughout the sofhvare development and maintenance life cycle. The. security assessment instrument includes security assessment for use in the software development and maintenance life cycle. Currently

Bishop, Matt

13

Research progress in dynamic security assessment  

SciTech Connect (OSTI)

Areas discussed are power system modeling, state estimation, structure decomposition, state forecasting, clustering and security measure development. A detailed dynamic model of a multi-machine power system has been developed. A process state estimator was developed to estimate the long-term dynamic behavior of the power system. The algorithm is identical to the extended Kalman filter but has a modified process noise driving term. A two-stage structure estimation technique was proposed for identifying the power system network configuration. Two approaches to structure decomposition were investigated. A time-scale decomposition of the system equations, based on a singular perturbation approach, was evaluated using a detailed model of a generating system. Spatial decomposition was examined by applying an optimal network decomposition technique to a 39-bus test system. Stochastic approximation based approaches to estimator simplification were examined. Explicit expressions were obtained for the evolution of the first and second moments of the system state. Research into security measures proceeded in three directions. The first area involves viewing the security assessment problem as a hyperplane crossing problem for a stochastic process. The second approach examined the stability of an unforced linear system where the system coefficients are subject to future jumps. The third area of research has led to the formulation of a security measure suitable for on-line assessment of transient stability.

Not Available

1982-12-01T23:59:59.000Z

14

Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution  

SciTech Connect (OSTI)

Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

2010-04-30T23:59:59.000Z

15

Y-12 National Security Complex Water Assessment  

SciTech Connect (OSTI)

The Department of Energy's Federal Energy Management Program (FEMP) sponsored a water assessment at the Y 12 National Security Complex (Y 12) located in Oak Ridge, Tennessee. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment is to develop a comprehensive understanding of the current water-consuming applications and equipment at Y 12 and to identify key areas for water efficiency improvements that could be applied not only at Y-12 but at other Federal facilities as well. FEMP selected Pacific Northwest National Laboratory to coordinate and manage the water assessment. PNNL contracted Water Savers, LLC to lead the technical aspects of the water assessment. Water Savers provided key technical expertise in water auditing, metering, and cooling systems. This is the report of that effort, which concluded that the Y-12 facility could realize considerable water savings by implementing the recommended water efficiency opportunities.

Elam, Shana E.; Bassett, P.; McMordie Stoughton, Kate

2010-11-01T23:59:59.000Z

16

Strategies for Voltage Control and Transient Stability Assessment  

SciTech Connect (OSTI)

As wind generation grows, its influence on power system performance will becoming increasingly noticeable. Wind generation di#11;ffers from traditional forms of generation in numerous ways though, motivating the need to reconsider the usual approaches to power system assessment and performance enhancement. The project has investigated the impact of wind generation on transient stability and voltage control, identifying and addressing issues at three distinct levels of the power system: 1) at the device level, the physical characteristics of wind turbine generators (WTGs) are quite unlike those of synchronous machines, 2) at the wind-farm level, the provision of reactive support is achieved through coordination of numerous dissimilar devices, rather than straightforward generator control, and 3) from a systems perspective, the location of wind-farms on the sub-transmission network, coupled with the variability inherent in their power output, can cause complex voltage control issues. The project has sought to develop a thorough understanding of the dynamic behaviour of type-3 WTGs, and in particular the WECC generic model. The behaviour of such models is governed by interactions between the continuous dynamics of state variables and discrete events associated with limits. It was shown that these interactions can be quite complex, and may lead to switching deadlock that prevents continuation of the trajectory. Switching hysteresis was proposed for eliminating deadlock situations. Various type-3 WTG models include control blocks that duplicate integrators. It was shown that this leads to non-uniqueness in the conditions governing steady-state, and may result in pre- and post-disturbance equilibria not coinciding. It also gives rise to a zero eigenvalue in the linearized WTG model. In order to eliminate the anomalous behaviour revealed through this investigation, WECC has now released a new generic model for type-3 WTGs. Wind-farms typically incorporate a variety of voltage control equipment including tapchanging transformers, switched capacitors, SVCs, STATCOMs and the WTGs themselves. The project has considered the coordinated control of this equipment, and has addressed a range of issues that arise in wind-farm operation. The #12;first concerns the ability of WTGs to meet reactive power requirements when voltage saturation in the collector network restricts the reactive power availability of individual generators. Secondly, dynamic interactions between voltage regulating devices have been investigated. It was found that under certain realistic conditions, tap-changing transformers may exhibit instability. In order to meet cost, maintenance, fault tolerance and other requirements, it is desirable for voltage control equipment to be treated as an integrated system rather than as independent devices. The resulting high-level scheduling of wind-farm reactive support has been investigated. In addressing this control problem, several forms of future information were considered, including exact future knowledge and stochastic predictions. Deterministic and Stochastic Dynamic Programming techniques were used in the development of control algorithms. The results demonstrated that while exact future knowledge is very useful, simple prediction methods yield little bene#12;fit. The integration of inherently variable wind generation into weak grids, particularly subtransmission networks that are characterized by low X=R ratios, aff#11;ects bus voltages, regulating devices and line flows. The meshed structure of these networks adds to the complexity, especially when wind generation is distributed across multiple nodes. A range of techniques have been considered for analyzing the impact of wind variability on weak grids. Sensitivity analysis, based on the power-flow Jacobian, was used to highlight sections of a system that are most severely a#11;ffected by wind-power variations. A continuation power flow was used to determine parameter changes that reduce the impact of wind-power variability. It was also used to explore interactions betw

Hiskens, Ian A.

2013-09-25T23:59:59.000Z

17

NNSA Administrator Gordon Assesses Security Of the Nuclear Weapons...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Press Releases Video Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home Media Room Press Releases NNSA Administrator Gordon Assesses Security...

18

Gordon Assesses Security At Nuclear Weapons Complex News.....  

National Nuclear Security Administration (NNSA)

Anson Franklin, 202586-7371 September 21, 2001 NNSA Administrator Gordon Assesses Security Of the Nuclear Weapons Complex John Gordon, Administrator of the Department of Energy's...

19

Lessons Learned from Cyber Security Assessments of SCADA and...  

Energy Savers [EERE]

Energy Management Systems Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems were reviewed to identify common...

20

Security Assessment Simulation Toolkit (SAST) Final Report  

SciTech Connect (OSTI)

The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSD NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.

Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.

2009-11-15T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

ITL BULLETIN FOR AUGUST 2010 ASSESSING THE EFFECTIVENESS OF SECURITY CONTROLS IN FEDERAL  

E-Print Network [OSTI]

discusses the process for assessing the security controls in organizational information systems that are implemented in federal information systems. The selection and assessment of appropriate security controls Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans

22

Office of Security Assessments | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

security policies and programs throughout the Department, including protection of special nuclear material, and classified and sensitive information. The Office has established and...

23

Recent applications of thermal imagers for security assessment  

SciTech Connect (OSTI)

This paper discusses recent applications by Sandia National Laboratories of cooled and uncooled thermal infrared imagers to wide-area security assessment systems. Thermal imagers can solve many security assessment problems associated with the protection of high-value assets at military bases, secure installations, and commercial facilities. Thermal imagers can provide surveillance video from security areas or perimeters both day and night without expensive security lighting. Until fairly recently, thermal imagers required open-loop cryogenic cooling to operate. The high cost of these systems and associated maintenance requirements restricted their widespread use. However, recent developments in reliable, closed-loop, linear drive cryogenic coolers and uncooled infrared imagers have dramatically reduced maintenance requirements, extended MTBF, and are leading to reduced system cost. These technology developments are resulting in greater availability and practicality for military as well as civilian security applications.

Bisbee, T.L.

1997-06-01T23:59:59.000Z

24

Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)  

SciTech Connect (OSTI)

Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

Hadley, Mark D.; Clements, Samuel L.

2009-01-01T23:59:59.000Z

25

Integrated Safeguards and Security Management Self-Assessment 2004  

SciTech Connect (OSTI)

In 2002 Ernest Orlando Lawrence Berkeley National Laboratory deployed the first Integrated Safeguards and Security Management (ISSM) Self-Assessment process, designed to measure the effect of the Laboratory's ISSM efforts. This process was recognized by DOE as a best practice and model program for self-assessment and training. In 2004, the second Self-Assessment was launched. The cornerstone of this process was an employee survey that was designed to meet several objectives: (1) Ensure that Laboratory assets are protected. (2) Provide a measurement of the Laboratory's current security status that can be compared against the 2002 Self-Assessment baseline. (3) Educate all Laboratory staff about security responsibilities, tools, and practices. (4) Provide security staff with feedback on the effectiveness of security programs. (5) Provide line management with the information they need to make informed decisions about security. This 2004 Self Assessment process began in July 2004 with every employee receiving an information packet and instructions for completing the ISSM survey. The Laboratory-wide survey contained questions designed to measure awareness and conformance to policy and best practices. The survey response was excellent--90% of Berkeley Lab employees completed the questionnaire. ISSM liaisons from each division followed up on the initial survey results with individual employees to improve awareness and resolve ambiguities uncovered by the questionnaire. As with the 2002 survey, the Self-Assessment produced immediate positive results for the ISSM program and revealed opportunities for longer-term corrective actions. Results of the questionnaire provided information for organizational profiles and an institutional summary. The overall level of security protection and awareness was very high--often above 90%. Post-survey work by the ISSM liaisons and line management consistently led to improved awareness and metrics, as shown by a comparison of profiles at the end of phase one (August 6, 2004) and phase two (November 1, 2004). The Self-Assessment confirmed that classified information is not held or processed at Berkeley Lab. The survey results also identified areas where increased employee knowledge and awareness of Laboratory policy would be beneficial, the two most prominent being password usage and wireless network service. Line management will be able to determine additional corrective actions based on the results of the Self-Assessment. Future assessments will raise the ratings bar for some existing program elements and add new elements to stimulate further improvements in Laboratory security.

Lunford, Dan; Ramsey, Dwayne

2005-04-01T23:59:59.000Z

26

Risk assessment of climate systems for national security.  

SciTech Connect (OSTI)

Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing [University of Illinois-Urbana; Conrad, Stephen Hamilton; Constantine, Paul [Stanford University; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael [National Center for Atmospheric Research; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

2012-10-01T23:59:59.000Z

27

Discussion Deadline: January 2003 Online Risk-Based Security Assessment  

E-Print Network [OSTI]

-making. Test results on large-scale transmission models retrieved from the energy management system of a U-Based Security Assessment Ni, M.; McCalley, J.D.; Vittal, V; Greene, S.; Ten, C.W; Ganugula, VS.; Tayyib, T. Author Affiliations: Iowa State University, USA; Siemens Energy Management, Singapore; Pricewaterhouse

Gross, George

28

Random Dynamic Voltage Scaling Design to Enhance Security of NCL S-Box  

E-Print Network [OSTI]

Power management is essential to building more efficient and optimized circuits in computer architecture-- The demand for enhanced security in cryptographic systems is increasing rapidly in recent years that NCL contains all the properties to resist common forms of side-channel attack (SCA). RDVS is designed

Ayers, Joseph

29

A total risk assessment methodology for security assessment.  

SciTech Connect (OSTI)

Sandia National Laboratories performed a two-year Laboratory Directed Research and Development project to develop a new collaborative risk assessment method to enable decision makers to fully consider the interrelationships between threat, vulnerability, and consequence. A five-step Total Risk Assessment Methodology was developed to enable interdisciplinary collaborative risk assessment by experts from these disciplines. The objective of this process is promote effective risk management by enabling analysts to identify scenarios that are simultaneously achievable by an adversary, desirable to the adversary, and of concern to the system owner or to society. The basic steps are risk identification, collaborative scenario refinement and evaluation, scenario cohort identification and risk ranking, threat chain mitigation analysis, and residual risk assessment. The method is highly iterative, especially with regard to scenario refinement and evaluation. The Total Risk Assessment Methodology includes objective consideration of relative attack likelihood instead of subjective expert judgment. The 'probability of attack' is not computed, but the relative likelihood for each scenario is assessed through identifying and analyzing scenario cohort groups, which are groups of scenarios with comparable qualities to the scenario being analyzed at both this and other targets. Scenarios for the target under consideration and other targets are placed into cohort groups under an established ranking process that reflects the following three factors: known targeting, achievable consequences, and the resources required for an adversary to have a high likelihood of success. The development of these target cohort groups implements, mathematically, the idea that adversaries are actively choosing among possible attack scenarios and avoiding scenarios that would be significantly suboptimal to their objectives. An adversary who can choose among only a few comparable targets and scenarios (a small comparable target cohort group) is more likely to choose to attack the specific target under analysis because he perceives it to be a relatively unique attack opportunity. The opposite is also true. Thus, total risk is related to the number of targets that exist in each scenario cohort group. This paper describes the Total Risk Assessment Methodology and illustrates it through an example.

Aguilar, Richard; Pless, Daniel J.; Kaplan, Paul Garry; Silva, Consuelo Juanita; Rhea, Ronald Edward; Wyss, Gregory Dane; Conrad, Stephen Hamilton

2009-06-01T23:59:59.000Z

30

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

31

Lessons Learned from Cyber Security Assessments of SCADA and...  

Broader source: Energy.gov (indexed) [DOE]

of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY...

32

Protection against the man-in-the-middle-attack for the Kirchhoff-loop-Johnson(-like)-noise cipher and expansion by voltage-based security  

E-Print Network [OSTI]

It is shown that the original Kirchhoff-loop-Johnson(-like)-noise (KLJN) cipher is naturally protected against the man-in-the-middle (MITM) attack, if the eavesdropper is using resistors and noise voltage generators just like the sender and the receiver. The eavesdropper can extract zero bit of information before she is discovered. However, when the eavesdropper is using noise current generators, though the cipher is protected, the eavesdropper may still be able to extract one bit of information while she is discovered. For enhanced security, we expand the KLJN cipher with the comparison of the instantaneous voltages via the public channel. In this way, the sender and receiver has a full control over the security of measurable physical quantities in the Kirchhoff-loop. We show that when the sender and receiver compare not only their instantaneous current data but also their instantaneous voltage data then the zero-bit security holds even for the noise current generator case. We show that the original KLJN scheme is also zero-bit protected against that type of MITM attack when the eavesdropper uses voltage noise generators, only. In conclusion, within the idealized model scheme, the man-in-the-middle-attack does not provide any advantage compared to the regular attack considered earlier. The remaining possibility is the attack by a short, large current pulse, which described in the original paper as the only efficient type of regular attacks, and that yields the one bit security. In conclusion, the KLJN cipher is superior to known quantum communication schemes in every respect, including speed, robustness, maintenance need, price and its natural immunity against the man-in-the-middle attack.

Laszlo B. Kish

2006-02-13T23:59:59.000Z

33

CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL  

SciTech Connect (OSTI)

The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the system’s cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

Kathleen A. Lee

2008-01-01T23:59:59.000Z

34

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS  

E-Print Network [OSTI]

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS Vulnerability Assessment Standard Rationale 1 To enable timely identification and mitigation of vulnerabilities and security flaws affecting computing devices within UofC's computing environment. Scope 2 2.1 This standard

Habib, Ayman

35

Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures.  

SciTech Connect (OSTI)

This document presents the security automated Risk Assessment Methodology (RAM) prototype tool developed by Sandia National Laboratories (SNL). This work leverages SNL's capabilities and skills in security risk analysis and the development of vulnerability assessment/risk assessment methodologies to develop an automated prototype security RAM tool for critical infrastructures (RAM-CITM). The prototype automated RAM tool provides a user-friendly, systematic, and comprehensive risk-based tool to assist CI sector and security professionals in assessing and managing security risk from malevolent threats. The current tool is structured on the basic RAM framework developed by SNL. It is envisioned that this prototype tool will be adapted to meet the requirements of different CI sectors and thereby provide additional capabilities.

Jaeger, Calvin D.; Roehrig, Nathaniel S.; Torres, Teresa M.

2008-12-01T23:59:59.000Z

36

Safeguards and Security Oversight and Assessments Implementation Guide  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide identifies acceptable methods for implementing the safeguards and security provisions of DOE O 226.1A. Canceled by DOE N 251.80.

2007-12-21T23:59:59.000Z

37

Quantitative Methodology for Assessing State-Level Nuclear Security Measures.  

E-Print Network [OSTI]

??The international community faces a growing threat from nuclear terrorism. The complexity of the threats of nuclear terrorism, the variety of nuclear security measures that… (more)

Myers, Christopher 1985-

2012-01-01T23:59:59.000Z

38

GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Shirley Radack, Editor  

E-Print Network [OSTI]

, was written by Karen Scarfone and Murugiah Souppaya of NIST, and by Amanda Cody and Angela Orebaugh of Booz Allen Hamilton. The new guide replaces NIST SP 800-42, Guideline on Network Security Testing. NIST SP

39

Quantitative Methodology for Assessing State-Level Nuclear Security Measures  

E-Print Network [OSTI]

The international community faces a growing threat from nuclear terrorism. The complexity of the threats of nuclear terrorism, the variety of nuclear security measures that States can devote resources towards to address the threats, and the limited...

Myers, Christopher 1985-

2012-11-29T23:59:59.000Z

40

Security Risk Assessment Methodologies (RAM) for Critical Infrastructures -  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %SecurityUnder BudgetEnergy

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Technical Qualification Program Self-Assessment Report- Office of Health, Safety and Security- 2014  

Broader source: Energy.gov [DOE]

Beginning in April 2014, a self-assessment of the Technical Qualification Program (TQP) was performed in the Office of Health, Safety and Security (HSS). The assessment was led by the HSS TQP Manager who is assigned the responsibility for maintaining and implementing the programs.

42

Assessing Power Substation Network Security and Survivability: A Work in Progress Report1  

E-Print Network [OSTI]

to the assessment of power substation control networks for cyber based attacks. Another goal is to r1 Assessing Power Substation Network Security and Survivability: A Work in Progress Report1 Carol experiences with identifying cyber-based threats to the survivability of power substation control networks

Krings, Axel W.

43

AMI FW UPGRADEABILITY TEST PROCEDURE AND SECURITY ASSESSMENT  

SciTech Connect (OSTI)

The National Institute of Standards and Technology (NIST) is producing NISTIR 7823 to define test requirements for Smart Meter upgradability. The term Smart Meter refers specifically to advanced electric meters being deployed to enhance management of electricity distribution for residential and industrial consumers. The underlying functional and security requirements for Smart Meter upgradability are specified in NEMA standard SG-AMI 1-2009. The purpose of NISTIR 7823 is to describe conformance test requirements that may be used voluntarily by testers and/or test laboratories to determine whether Smart Meters and Upgrade Management Systems conform to the requirements of NEMA SG-AMI 1-2009.

Snyder, Isabelle B [ORNL] [ORNL

2014-01-01T23:59:59.000Z

44

Office of Cyber and Security Assessments | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen OwnedofDepartment ofJaredOakscience-based,OHAGas and OilDepartmentand Security

45

29.01.03.M1.26 Information Resources Security Risks Assessment Reviews Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE  

E-Print Network [OSTI]

29.01.03.M1.26 Information Resources ­ Security Risks Assessment Reviews Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.26 Information Resources ­ Information Security Risk Assessment Reviews security risk assessments are vital procedures for maintaining the security of information resources

46

LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS  

SciTech Connect (OSTI)

The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

Ray Fink

2006-10-01T23:59:59.000Z

47

ASSESS (Analytic System and Software for Evaluating Safeguards and Security) update: Current status and future developments  

SciTech Connect (OSTI)

The Analytic System and Software for Evaluating Safeguards and Security (ASSESS) has been released for use by DOE field offices and their contractors. In October, 1989, we offered a prototype workshop to selected representatives of the DOE community. Based on the prototype results, we held the first training workshop at the Central Training Academy in January, 1990. Four additional workshops are scheduled for FY 1990. ASSESS is a state-of-the-art analytical tool for management to conduct integrated evaluation of safeguards systems at facilities handling facilities. Currently, ASSESS focuses on the threat of theft/diversion of special nuclear material by insiders, outsiders, and a special form of insider/outsider collusion. ASSESS also includes a neutralization module. Development of the tool is continuing. Plans are underway to expand the capabilities of ASSESS to evaluate against violent insiders, to validate the databases, to expand the neutralization module, and to assist in demonstrating compliance with DOE Material Control and Accountability (MC A) Order 5633.3. These new capabilities include the ability to: compute a weighted average for performance capability against a spectrum of insider adversaries; conduct defense-in-depth analyses; and analyze against protracted theft scenarios. As they become available, these capabilities will be incorporated in our training program. ASSESS is being developed jointly by Lawrence Livermore and Sandia National Laboratories under the sponsorship of the Department of Energy (DOE) Office of Safeguards and Security.

Al-Ayat, R.A. (Lawrence Livermore National Lab., CA (USA)); Cousins, T.D. (USDOE, Washington, DC (USA)); Hoover, E.R. (Sandia National Labs., Albuquerque, NM (USA))

1990-07-15T23:59:59.000Z

48

A Weakest Chain Approach to Assessing the Overall Effectiveness of the 802.11 Wireless Network Security  

E-Print Network [OSTI]

This study aims to assess wireless network security holistically and attempts to determine the weakest link among the parts that comprise the 'secure' aspect of the wireless networks: security protocols, wireless technologies and user habits. The assessment of security protocols is done by determining the time taken to break a specific protocol's encryption key, or to pass an access control by using brute force attack techniques. Passphrase strengths as well as encryption key strengths ranging from 40 to 256 bits are evaluated. Different scenarios are planned and created for passphrase generation, using different character sets and different number of characters. Then each scenario is evaluated based on the time taken to break that passphrase. At the end of the study, it is determined that the choice of the passphrase is the weakest part of the entire 802.11 wireless security system.

Tasoluk, Berker; 10.5121/ijwmn.2011.3101

2011-01-01T23:59:59.000Z

49

The ASSESS (Analytic System and Software for Evaluating Safeguards and Security) Outsider module with multiple analyses  

SciTech Connect (OSTI)

The Analytic System and Software for Evaluating Safeguards and Security (ASSESS) includes modules for analyzing vulnerabilities against outsider and insider adversaries. The ASSESS Outsider Analysis Module has been upgraded to allow for defining, analyzing, and displaying the results of multiple analyses. Once a set of threat definitions have been defined in one Outsider file, they can be readily copied to other Outsider files. This multiple analysis, or batch, mode of operation provides an efficient way of covering the standard DOE outsider threat spectrum. A new approach for coupling the probability of interruption, P(I), values and values calculated by the ASSESS Neutralization module has been implemented in Outsider and is described. An enhanced capability for printing results of these multiple analyses is also included in the upgraded Outside module. 7 refs., 7 figs., 1 tab.

Snell, M.K.; Winblad, A.E. (Sandia National Labs., Albuquerque, NM (USA)); Bingham, B.; Key, B.; Walker, S. (Science and Engineering Associates, Inc., Albuquerque, NM (USA))

1990-01-01T23:59:59.000Z

50

The Arctic as a test case for an assessment of climate impacts on national security.  

SciTech Connect (OSTI)

The Arctic region is rapidly changing in a way that will affect the rest of the world. Parts of Alaska, western Canada, and Siberia are currently warming at twice the global rate. This warming trend is accelerating permafrost deterioration, coastal erosion, snow and ice loss, and other changes that are a direct consequence of climate change. Climatologists have long understood that changes in the Arctic would be faster and more intense than elsewhere on the planet, but the degree and speed of the changes were underestimated compared to recent observations. Policy makers have not yet had time to examine the latest evidence or appreciate the nature of the consequences. Thus, the abruptness and severity of an unfolding Arctic climate crisis has not been incorporated into long-range planning. The purpose of this report is to briefly review the physical basis for global climate change and Arctic amplification, summarize the ongoing observations, discuss the potential consequences, explain the need for an objective risk assessment, develop scenarios for future change, review existing modeling capabilities and the need for better regional models, and finally to make recommendations for Sandia's future role in preparing our leaders to deal with impacts of Arctic climate change on national security. Accurate and credible regional-scale climate models are still several years in the future, and those models are essential for estimating climate impacts around the globe. This study demonstrates how a scenario-based method may be used to give insights into climate impacts on a regional scale and possible mitigation. Because of our experience in the Arctic and widespread recognition of the Arctic's importance in the Earth climate system we chose the Arctic as a test case for an assessment of climate impacts on national security. Sandia can make a swift and significant contribution by applying modeling and simulation tools with internal collaborations as well as with outside organizations. Because changes in the Arctic environment are happening so rapidly, a successful program will be one that can adapt very quickly to new information as it becomes available, and can provide decision makers with projections on the 1-5 year time scale over which the most disruptive, high-consequence changes are likely to occur. The greatest short-term impact would be to initiate exploratory simulations to discover new emergent and robust phenomena associated with one or more of the following changing systems: Arctic hydrological cycle, sea ice extent, ocean and atmospheric circulation, permafrost deterioration, carbon mobilization, Greenland ice sheet stability, and coastal erosion. Sandia can also contribute to new technology solutions for improved observations in the Arctic, which is currently a data-sparse region. Sensitivity analyses have the potential to identify thresholds which would enable the collaborative development of 'early warning' sensor systems to seek predicted phenomena that might be precursory to major, high-consequence changes. Much of this work will require improved regional climate models and advanced computing capabilities. Socio-economic modeling tools can help define human and national security consequences. Formal uncertainty quantification must be an integral part of any results that emerge from this work.

Taylor, Mark A.; Zak, Bernard Daniel; Backus, George A.; Ivey, Mark D.; Boslough, Mark Bruce Elrick

2008-11-01T23:59:59.000Z

51

A method of assessing users' vs managers' perceptions of safety and security problems in public beach park settings  

E-Print Network [OSTI]

while answering this form of report, research has proven that the respondents are generally truthful and accurate in the in- formation they provide (Sheley 1979; Levine 1982). Due to the transitory nature of park users this system would...A METHOD OF ASSESSING USERS' VS MANAGERS' PERCEPTIONS OF SAFETY AND SECURITY PROBLEMS IN PUBLIC BEACH PARK SETTINGS A Thesis by ROBERT JAMES SCOTT STEELE Submitted to the Graduate College of Texas A&M University In Par ial Fulfillment...

Steele, Robert James Scott

2012-06-07T23:59:59.000Z

52

An Information Systems Security Risk Assessment Model Under Dempster- Schafer Theory of Belief Functions  

E-Print Network [OSTI]

This study develops an alternative methodology for the risk analysis of information systems security (ISS), an evidential reasoning approach under the Dempster-Shafer theory of belief functions. The approach has the ...

Sun, Lili; Srivastava, Rajendra P.; Mock, Theodore J.

2006-01-01T23:59:59.000Z

53

Wide Area Security Region Final Report  

SciTech Connect (OSTI)

This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of system parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed technology. Recommendations for the future work have also been formulated.

Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin; Gronquist, James; Du, Pengwei; Nguyen, Tony B.; Burns, J. W.

2010-03-31T23:59:59.000Z

54

A Security Domain Model to Assess Software for Exploitable Covert Alan B. Shaffer  

E-Print Network [OSTI]

; D.4.6 [Operating Systems]: Security and Protection ­ access controls, information flow controls to enforce mandatory access control policies, and is required for the successful evaluation of such systems systems be designed, developed, verified and tested using rigorous processes and formal methods

55

Cooperative Monitoring Center Occasional Paper/8: Cooperative Border Security for Jordan: Assessment and Options  

SciTech Connect (OSTI)

This document is an analysis of options for unilateral and cooperative action to improve the security of Jordan's borders. Sections describe the current political, economic, and social interactions along Jordan's borders. Next, the document discusses border security strategy for cooperation among neighboring countries and the adoption of confidence-building measures. A practical cooperative monitoring system would consist of hardware for early warning, command and control, communications, and transportation. Technical solutions can expand opportunities for the detection and identification of intruders. Sensors (such as seismic, break-wire, pressure-sensing, etc.) can warn border security forces of intrusion and contribute to the identification of the intrusion and help formulate the response. This document describes conceptual options for cooperation, offering three scenarios that relate to three hypothetical levels (low, medium, and high) of cooperation. Potential cooperative efforts under a low cooperation scenario could include information exchanges on military equipment and schedules to prevent misunderstandings and the establishment of protocols for handling emergency situations or unusual circumstances. Measures under a medium cooperation scenario could include establishing joint monitoring groups for better communications, with hot lines and scheduled meetings. The high cooperation scenario describes coordinated responses, joint border patrols, and sharing border intrusion information. Finally, the document lists recommendations for organizational, technical, and operational initiatives that could be applicable to the current situation.

Qojas, M.

1999-03-01T23:59:59.000Z

56

Anti-addiction drug ibogaine inhibits voltage-gated ionic currents: A study to assess the drug's cardiac ion channel profile  

SciTech Connect (OSTI)

The plant alkaloid ibogaine has promising anti-addictive properties. Albeit not licenced as a therapeutic drug, and despite hints that ibogaine may perturb the heart rhythm, this alkaloid is used to treat drug addicts. We have recently reported that ibogaine inhibits human ERG (hERG) potassium channels at concentrations similar to the drugs affinity for several of its known brain targets. Thereby the drug may disturb the heart's electrophysiology. Here, to assess the drug's cardiac ion channel profile in more detail, we studied the effects of ibogaine and its congener 18-Methoxycoronaridine (18-MC) on various cardiac voltage-gated ion channels. We confirmed that heterologously expressed hERG currents are reduced by ibogaine in low micromolar concentrations. Moreover, at higher concentrations, the drug also reduced human Na{sub v}1.5 sodium and Ca{sub v}1.2 calcium currents. Ion currents were as well reduced by 18-MC, yet with diminished potency. Unexpectedly, although blocking hERG channels, ibogaine did not prolong the action potential (AP) in guinea pig cardiomyocytes at low micromolar concentrations. Higher concentrations (? 10 ?M) even shortened the AP. These findings can be explained by the drug's calcium channel inhibition, which counteracts the AP-prolonging effect generated by hERG blockade. Implementation of ibogaine's inhibitory effects on human ion channels in a computer model of a ventricular cardiomyocyte, on the other hand, suggested that ibogaine does prolong the AP in the human heart. We conclude that therapeutic concentrations of ibogaine have the propensity to prolong the QT interval of the electrocardiogram in humans. In some cases this may lead to cardiac arrhythmias. - Highlights: • We study effects of anti-addiction drug ibogaine on ionic currents in cardiomyocytes. • We assess the cardiac ion channel profile of ibogaine. • Ibogaine inhibits hERG potassium, sodium and calcium channels. • Ibogaine’s effects on ion channels are a potential source of cardiac arrhythmias. • 18-Methoxycoronaridine has a lower affinity for cardiac ion channels than ibogaine.

Koenig, Xaver; Kovar, Michael; Rubi, Lena; Mike, Agnes K.; Lukacs, Peter; Gawali, Vaibhavkumar S.; Todt, Hannes [Center for Physiology and Pharmacology, Department of Neurophysiology and -pharmacology, Medical University of Vienna, 1090 Vienna (Austria); Hilber, Karlheinz, E-mail: karlheinz.hilber@meduniwien.ac.at [Center for Physiology and Pharmacology, Department of Neurophysiology and -pharmacology, Medical University of Vienna, 1090 Vienna (Austria); Sandtner, Walter [Center for Physiology and Pharmacology, Institute of Pharmacology, Medical University of Vienna, 1090 Vienna (Austria)

2013-12-01T23:59:59.000Z

57

Energy Security Initiatives Update  

Broader source: Energy.gov (indexed) [DOE]

-- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft...

58

2012 Annual Planning Summary for National Nuclear Security Administrat...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration 2012 Annual Planning Summary for National Nuclear Security Administration The ongoing and projected Environmental Assessments and...

59

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

60

High Voltage Safety Act  

Broader source: Energy.gov [DOE]

The purpose of the High Voltage Safety Act is to prevent injury to persons and property and interruptions of utility service resulting from accidental or inadvertent contact with high-voltage...

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

Automatic voltage imbalance detector  

DOE Patents [OSTI]

A device for indicating and preventing damage to voltage cells such as galvanic cells and fuel cells connected in series by detecting sequential voltages and comparing these voltages to adjacent voltage cells. The device is implemented by using operational amplifiers and switching circuitry is provided by transistors. The device can be utilized in battery powered electric vehicles to prevent galvanic cell damage and also in series connected fuel cells to prevent fuel cell damage.

Bobbett, Ronald E. (Los Alamos, NM); McCormick, J. Byron (Los Alamos, NM); Kerwin, William J. (Tucson, AZ)

1984-01-01T23:59:59.000Z

62

Common Cyber Security Vulnerabilities Observed in Control System...  

Broader source: Energy.gov (indexed) [DOE]

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

63

Oversight Reports - Y-12 National Security Complex | Department...  

Broader source: Energy.gov (indexed) [DOE]

Oversight Assessment, Y-12 National Security Complex - June 2012 Assessment of Nuclear Safety Culture at the Y-12 National Security Complex Uranium Processing Facility Project...

64

Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

65

Optical voltage reference  

DOE Patents [OSTI]

An optical voltage reference for providing an alternative to a battery source is described. The optical reference apparatus provides a temperature stable, high precision, isolated voltage reference through the use of optical isolation techniques to eliminate current and impedance coupling errors. Pulse rate frequency modulation is employed to eliminate errors in the optical transmission link while phase-lock feedback is employed to stabilize the frequency to voltage transfer function. 2 figures.

Rankin, R.; Kotter, D.

1994-04-26T23:59:59.000Z

66

Voltage Control Technical Conference  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Intro Voltage Control Conference - BPA Active Power Control in Wind Parks - Siemens Interconnection Criteria for Frequency Response Requirements - NERC Model Validation...

67

Voltage verification unit  

DOE Patents [OSTI]

A voltage verification unit and method for determining the absence of potentially dangerous potentials within a power supply enclosure without Mode 2 work is disclosed. With this device and method, a qualified worker, following a relatively simple protocol that involves a function test (hot, cold, hot) of the voltage verification unit before Lock Out/Tag Out and, and once the Lock Out/Tag Out is completed, testing or "trying" by simply reading a display on the voltage verification unit can be accomplished without exposure of the operator to the interior of the voltage supply enclosure. According to a preferred embodiment, the voltage verification unit includes test leads to allow diagnostics with other meters, without the necessity of accessing potentially dangerous bus bars or the like.

Martin, Edward J. (Virginia Beach, VA)

2008-01-15T23:59:59.000Z

68

Voltage balanced multilevel voltage source converter system  

DOE Patents [OSTI]

A voltage balanced multilevel converter for high power AC applications such as adjustable speed motor drives and back-to-back DC intertie of adjacent power systems. This converter provides a multilevel rectifier, a multilevel inverter, and a DC link between the rectifier and the inverter allowing voltage balancing between each of the voltage levels within the multilevel converter. The rectifier is equipped with at least one phase leg and a source input node for each of the phases. The rectifier is further equipped with a plurality of rectifier DC output nodes. The inverter is equipped with at least one phase leg and a load output node for each of the phases. The inverter is further equipped with a plurality of inverter DC input nodes. The DC link is equipped with a plurality of rectifier charging means and a plurality of inverter discharging means. The plurality of rectifier charging means are connected in series with one of the rectifier charging means disposed between and connected in an operable relationship with each adjacent pair of rectifier DC output nodes. The plurality of inverter discharging means are connected in series with one of the inverter discharging means disposed between and connected in an operable relationship with each adjacent pair of inverter DC input nodes. Each of said rectifier DC output nodes are individually electrically connected to the respective inverter DC input nodes. By this means, each of the rectifier DC output nodes and each of the inverter DC input nodes are voltage balanced by the respective charging and discharging of the rectifier charging means and the inverter discharging means.

Peng, Fang Zheng (Oak Ridge, TN); Lai, Jih-Sheng (Knoxville, TN)

1997-01-01T23:59:59.000Z

69

Voltage balanced multilevel voltage source converter system  

DOE Patents [OSTI]

Disclosed is a voltage balanced multilevel converter for high power AC applications such as adjustable speed motor drives and back-to-back DC intertie of adjacent power systems. This converter provides a multilevel rectifier, a multilevel inverter, and a DC link between the rectifier and the inverter allowing voltage balancing between each of the voltage levels within the multilevel converter. The rectifier is equipped with at least one phase leg and a source input node for each of the phases. The rectifier is further equipped with a plurality of rectifier DC output nodes. The inverter is equipped with at least one phase leg and a load output node for each of the phases. The inverter is further equipped with a plurality of inverter DC input nodes. The DC link is equipped with a plurality of rectifier charging means and a plurality of inverter discharging means. The plurality of rectifier charging means are connected in series with one of the rectifier charging means disposed between and connected in an operable relationship with each adjacent pair of rectifier DC output nodes. The plurality of inverter discharging means are connected in series with one of the inverter discharging means disposed between and connected in an operable relationship with each adjacent pair of inverter DC input nodes. Each of said rectifier DC output nodes are individually electrically connected to the respective inverter DC input nodes. By this means, each of the rectifier DC output nodes and each of the inverter DC input nodes are voltage balanced by the respective charging and discharging of the rectifier charging means and the inverter discharging means. 15 figs.

Peng, F.Z.; Lai, J.S.

1997-07-01T23:59:59.000Z

70

High voltage DC power supply  

DOE Patents [OSTI]

A high voltage DC power supply having a first series resistor at the output for limiting current in the event of a short-circuited output, a second series resistor for sensing the magnitude of output current, and a voltage divider circuit for providing a source of feedback voltage for use in voltage regulation is disclosed. The voltage divider circuit is coupled to the second series resistor so as to compensate the feedback voltage for a voltage drop across the first series resistor. The power supply also includes a pulse-width modulated control circuit, having dual clock signals, which is responsive to both the feedback voltage and a command voltage, and also includes voltage and current measuring circuits responsive to the feedback voltage and the voltage developed across the second series resistor respectively. 7 figs.

Droege, T.F.

1989-12-19T23:59:59.000Z

71

High voltage DC power supply  

DOE Patents [OSTI]

A high voltage DC power supply having a first series resistor at the output for limiting current in the event of a short-circuited output, a second series resistor for sensing the magnitude of output current, and a voltage divider circuit for providing a source of feedback voltage for use in voltage regulation is disclosed. The voltage divider circuit is coupled to the second series resistor so as to compensate the feedback voltage for a voltage drop across the first series resistor. The power supply also includes a pulse-width modulated control circuit, having dual clock signals, which is responsive to both the feedback voltage and a command voltage, and also includes voltage and current measuring circuits responsive to the feedback voltage and the voltage developed across the second series resistor respectively.

Droege, Thomas F. (Batavia, IL)

1989-01-01T23:59:59.000Z

72

August 2003 IT SECURITY METRICS  

E-Print Network [OSTI]

, efficiency, effectiveness, and the impact of the security controls. The process steps need not be sequen tial metrics program and provides examples of metrics based on the criti cal elements and security controls and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

73

T-697: Google Chrome Prior to 13.0.782.107 Multiple Security...  

Broader source: Energy.gov (indexed) [DOE]

Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Releases >> Chrome OS Beta: Channel Update Chromium Security >> Reporting Security Bugs IMPACT ASSESSMENT: High...

74

ABBGroup-1-High voltage lab  

E-Print Network [OSTI]

oscillations are due to travelling waves in the heating volume. #12;©ABBGroup-9- 3-Sep-07 2. High voltage phase interrupts the injected current, it is stressed by the transient recovery voltage (TRV) oscillating©ABBGroup-1- 3-Sep-07 High voltage lab Research on high voltage gas circuit breakers Nils P. Basse

Basse, Nils Plesner

75

Electron launching voltage monitor  

DOE Patents [OSTI]

An electron launching voltage monitor measures MITL voltage using a relationship between anode electric field and electron current launched from a cathode-mounted perturbation. An electron launching probe extends through and is spaced from the edge of an opening in a first MITL conductor, one end of the launching probe being in the gap between the MITL conductor, the other end being adjacent a first side of the first conductor away from the second conductor. A housing surrounds the launching probe and electrically connects the first side of the first conductor to the other end of the launching probe. A detector detects the current passing through the housing to the launching probe, the detected current being representative of the voltage between the conductors. 5 figs.

Mendel, C.W.; Savage, M.E.

1992-03-17T23:59:59.000Z

76

Voltage controlled current source  

DOE Patents [OSTI]

A seven decade, voltage controlled current source is described for use in testing intermediate range nuclear instruments that covers the entire test current range of from 10 picoamperes to 100 microamperes. High accuracy is obtained throughout the entire seven decades of output current with circuitry that includes a coordinated switching scheme responsive to the input signal from a hybrid computer to control the input voltage to an antilog amplifier, and to selectively connect a resistance to the antilog amplifier output to provide a continuous output current source as a function of a preset range of input voltage. An operator controlled switch provides current adjustment for operation in either a real-time simulation test mode or a time response test mode.

Casne, Gregory M. (Pittsburgh, PA)

1992-01-01T23:59:59.000Z

77

Physical simulation study of dynamic voltage instability  

SciTech Connect (OSTI)

This paper presents a physical simulation of the dynamic behavior of voltage instability in an interconnected multimachine environment. The dynamic evolving process leading to eventual voltage collapse, the scenario of the progressive reactive support reduction resulting from the MXL protection relays, the OLTC operation, and the effect of switched-in capacitor banks are examined using physical facilities in the laboratory. The physical simulation results are also compared with digital simulation results. This physical investigation provides a reliable foundation for the effective development of assessment approaches and countermeasures.

Tso, S.K.; Zhu, T.X. [Univ. of Hong Kong (Hong Kong); Zeng, Q.Y. [Electric Power Research Inst., Beijing (China); Lo, K.L. [Univ. of Strathclyde, Glasgow (United Kingdom). Dept. of Electrical and Electrical Engineering

1995-12-31T23:59:59.000Z

78

Physical Security System Sensitivity to DBT Perturbations  

E-Print Network [OSTI]

, multiple scenarios are assessed that test different sets of adversary capabilities to better uncover and understand any security system vulnerabilities that may exist. We believe the benefit of identifying these site-specific security vulnerabilities...

Conchewski, Curtis

2012-10-19T23:59:59.000Z

79

High voltage pulse conditioning  

DOE Patents [OSTI]

Apparatus for conditioning high voltage pulses from particle accelerators in order to shorten the rise times of the pulses. Flashover switches in the cathode stalk of the transmission line hold off conduction for a determinable period of time, reflecting the early portion of the pulses. Diodes upstream of the switches divert energy into the magnetic and electrostatic storage of the capacitance and inductance inherent to the transmission line until the switches close.

Springfield, Ray M. (Sante Fe, NM); Wheat, Jr., Robert M. (Los Alamos, NM)

1990-01-01T23:59:59.000Z

80

Continental energy security: Energy security in the North American context1  

E-Print Network [OSTI]

, commissioned reports, and signed legislation in an effort to stem crude oil imports and improve energy securityERG/201101 Continental energy security: Energy security in the North American context1 Larry Hughes, Canada 24 January 2011 1 A textbox for the Global Energy Assessment's Knowledge Module 5: Energy Security

Hughes, Larry

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Charge-pump voltage converter  

DOE Patents [OSTI]

A charge-pump voltage converter for converting a low voltage provided by a low-voltage source to a higher voltage. Charge is inductively generated on a transfer rotor electrode during its transit past an inductor stator electrode and subsequently transferred by the rotating rotor to a collector stator electrode for storage or use. Repetition of the charge transfer process leads to a build-up of voltage on a charge-receiving device. Connection of multiple charge-pump voltage converters in series can generate higher voltages, and connection of multiple charge-pump voltage converters in parallel can generate higher currents. Microelectromechanical (MEMS) embodiments of this invention provide a small and compact high-voltage (several hundred V) voltage source starting with a few-V initial voltage source. The microscale size of many embodiments of this invention make it ideally suited for MEMS- and other micro-applications where integration of the voltage or charge source in a small package is highly desirable.

Brainard, John P. (Albuquerque, NM); Christenson, Todd R. (Albuquerque, NM)

2009-11-03T23:59:59.000Z

82

INTEGRATED GHz VOLTAGE CONTROLLED OSCILLATORS  

E-Print Network [OSTI]

INTEGRATED GHz VOLTAGE CONTROLLED OSCILLATORS Peter Kinget Bell Labs - Lucent Technologies Murray Hill, NJ (USA) Abstract The voltage controlled oscillator (VCO) is a critical sub. We focus on the de- sign of a critical sub-block: the voltage controlled oscillator (VCO). We review

Kinget, Peter

83

Life Cycle Assessment of the Energy Independence and Security Act of 2007: Ethanol - Global Warming Potential and Environmental Emissions  

SciTech Connect (OSTI)

The objective of this study is to use life cycle assessment (LCA) to evaluate the global warming potential (GWP), water use, and net energy value (NEV) associated with the EISA-mandated 16 bgy cellulosic biofuels target, which is assumed in this study to be met by cellulosic-based ethanol, and the EISA-mandated 15 bgy conventional corn ethanol target. Specifically, this study compares, on a per-kilometer-driven basis, the GWP, water use, and NEV for the year 2022 for several biomass feedstocks.

Heath, G. A.; Hsu, D. D.; Inman, D.; Aden, A.; Mann, M. K.

2009-07-01T23:59:59.000Z

84

Transient recovery voltage considerations in the application of medium voltage circuit breakers  

SciTech Connect (OSTI)

Medium Voltage Circuit Breakers can fail to interrupt 3-phase fault currents when power systems have Transient Recovery Voltage (TRV) characteristics which exceed the rating of the circuit breaker. This paper examines the application of 13.8kV generation and load switchgear for an oil refinery in which circuit parameters as originally designed would have exceeded the 13.8kV circuit breakers TRV ratings had corrective measures not been taken. This paper illustrates this case and discusses the basis of TRV, how TRV is assessed, and alternative actions taken to bring circuits to within the 13.8 kV circuit breaker ratings.

Swindler, D.L.; Schwartz, P.; Hamer, P.S.; Lambert, S.R.

1995-12-31T23:59:59.000Z

85

Ignition distributor voltage generator  

SciTech Connect (OSTI)

This patent describes a voltage pulse generator and ignition distributor comprising, a base, a shaft rotatably supported by the base, a distributor cap supported by the base having a center electrode and circumferentially spaced outer electrodes. The pulse generator and ignition distribution also include a first rotor driven by the shaft formed of electrical insulating material having electrically conductive means connected to the center terminal and a portion that rotates past the outer electrodes. The portion of the electrically conductive means that rotates past the outer electrodes is spaced from the outer electrodes to form a gap therebetween. A voltage pulse generator comprises a second rotor driven by the shaft, at least one permanent magnet and an annular pickup coil supported by the base. The pickup coil has inner turns and outer turns, the beginning turn of the inner turns connected to a first lead and the last turn of the outer turns connected to a second lead, the outer turns enclosing the inner turns. The pickup coil also has a circuit connected directly between the second lead and ground which is operative to provide a direct conductive path to ground for high frequency energy capacitively coupled to the outer turns from the gap discharge between the electrically conductive means of the first rotor and an outer electrode, the outer turns forming a grounded shield for the inner turns.

Boyer, J.A.

1986-11-04T23:59:59.000Z

86

Oversight Reports - Nevada National Security Site | Department...  

Broader source: Energy.gov (indexed) [DOE]

and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems Self-Assessment October 13, 2011 Independent Oversight Review, Nevada Site Office -...

87

2011 Annual Planning Summary for Secure Transportation Office (OST)  

Broader source: Energy.gov [DOE]

The ongoing and projected Environmental Assessments and Environmental Impact Statements for 2011 and 2012 within the Secure Transportation Office (OST).

88

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

89

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

90

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

91

Global security  

SciTech Connect (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

92

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

93

Humidity, Temperature, and Voltage (Presentation)  

SciTech Connect (OSTI)

An update is given on the work of the PV Quality Assurance Task Force; Group 3: studying the effects of humidity, temperature, and voltage bias.

Wohlgemuth, J.

2012-03-01T23:59:59.000Z

94

Status of the National Security Workforce  

SciTech Connect (OSTI)

This report documents the status of the national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. This report includes an assessment of the current workforce situation. The national security workforce is an important component of national security for our country. With the increase of global threats of terrorism, this workforce is being called upon more frequently. This has resulted in the need for an increasing number of national security personnel. It is imperative to attract and retain a skilled and competitive national security workforce.

None

2008-03-31T23:59:59.000Z

95

Transient voltage oscillations in coils  

SciTech Connect (OSTI)

Magnet coils may be excited into internal voltage oscillations by transient voltages. Such oscillations may electrically stress the magnet's dielectric components to many times its normal stress. This may precipitate a dielectric failure, and the attendant prolonged loss of service and costly repair work. Therefore, it is important to know the natural frequencies of oscillations of a magnet during the design stage, and to determine whether the expected switching transient voltages can excite the magnet into high-voltage internal oscillations. The series capacitance of a winding significantly affects its natural frequencies. However, the series capacitance is difficult to calculate, because it may comprise complex capacitance network, consisting of intra- and inter-coil turn-to-turn capacitances of the coil sections. A method of calculating the series capacitance of a winding is proposed. This method is rigorous but simple to execute. The time-varying transient voltages along the winding are also calculated.

Chowdhuri, P.

1985-01-01T23:59:59.000Z

96

AC system stability analysis and assessment for Shipboard Power Systems  

E-Print Network [OSTI]

due to reconfiguration might cause voltage instability, such as progressive voltage decreases or voltage oscillations. SPS stability thus should be assessed to ensure the stable operation of a system during reconfiguration. In this dissertation, time...

Qi, Li

2006-04-12T23:59:59.000Z

97

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

2004-07-08T23:59:59.000Z

98

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

99

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

100

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

2011-06-20T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

102

MULTIAREA SYSTEM RELIABILITY: THE ECONOMIC EVALUATION OF SYSTEM SECURITY CRITERIA  

E-Print Network [OSTI]

MULTIAREA SYSTEM RELIABILITY: THE ECONOMIC EVALUATION OF SYSTEM SECURITY CRITERIA BY TEOMAN GULER B assessment studies and the quantification of the economics of secure power system operations security and the economics of secure operations in the competitive market environment. The advent

Gross, George

103

Low voltage nonprimary explosive detonator  

DOE Patents [OSTI]

A low voltage, electrically actuated, nonprimary explosive detonator is disclosed wherein said detonation is achieved by means of an explosive train in which a deflagration-to-detonation transition is made to occur. The explosive train is confined within a cylindrical body and positioned adjacent to low voltage ignition means have electrical leads extending outwardly from the cylindrical confining body. Application of a low voltage current to the electrical leads ignites a self-sustained deflagration in a donor portion of the explosive train which then is made to undergo a transition to detonation further down the train.

Dinegar, Robert H. (Los Alamos, NM); Kirkham, John (Newbury, GB2)

1982-01-01T23:59:59.000Z

104

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

105

Voltage tunable microwave ferrite resonator  

E-Print Network [OSTI]

A novel method of implementing a tunable resonator using an applied voltage is presented. Stress is used to tune a microstrip resonator fabricated on a polycrystalline ferrite substrate. The stress was applied either ...

Oates, Daniel E.

106

Saving Megawatts with Voltage Optimization  

E-Print Network [OSTI]

that had been installed at several electric utility distribution substations in the U.S. and Canada. These systems, being operated in Conservation Voltage Regulation mode, have provided significant energy conservation where they have been installed...

Wilson, T.; Bell, D.

2010-01-01T23:59:59.000Z

107

High voltage stability performance of a gamma ray detection device  

SciTech Connect (OSTI)

An industrial grade digital radiation survey meter device is currently being developed at Malaysian Nuclear Agency. This device used a cylindrical type Geiger Mueller (GM) which acts as a detector. GM detector operates at relatively high direct current voltages depend on the type of GM tube. This thin/thick walled cylindrical type of GM tube operates at 450-650 volts range. Proper value and stability performance of high voltage are important parameters to ensure that this device give a reliable radiation dose measurement. This paper will present an assessment of the stability and performance of the high voltage supply for radiation detector. The assessment is performed using System Identification tools box in MATLAB and mathematical statistics.

Abdullah, Nor Arymaswati; Lombigit, Lojius; Rahman, Nur Aira Abd [Technical Support Division, Malaysian Nuclear Agency, 43000 Kajang, Selangor (Malaysia)

2014-02-12T23:59:59.000Z

108

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6.

2011-06-20T23:59:59.000Z

109

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

110

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

111

Electronic security device  

DOE Patents [OSTI]

The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

1992-03-17T23:59:59.000Z

112

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

113

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

114

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network [OSTI]

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

115

Voltage, energy and power in electric circuits  

E-Print Network [OSTI]

Voltage, energy and power in electric circuits Science teaching unit #12;Disclaimer The Department-2008DVD-EN Voltage, energy and power in electric circuits #12;#12;© Crown copyright 2008 1The National Strategies | Secondary Voltage, energy and power in electric circuits 00094-2008DVD-EN Contents Voltage

Berzins, M.

116

Ancillary service details: Voltage control  

SciTech Connect (OSTI)

Voltage control is accomplished by managing reactive power on an alternating-current power system. Reactive power can be produced and absorbed by both generation and transmission equipment. Reactive-power devices differ substantially in the magnitude and speed of response and in their capital costs. System operators, transmission owners, generators, customers, power marketers, and government regulators need to pay close attention to voltage control as they restructure the U.S. electricity industry. Voltage control can affect reliability and commerce in three ways: (1) Voltages must be maintained within an acceptable range for both customer and power-system equipment to function properly. (2) The movement of reactive power consumes transmission resources, which limits the ability to move real power and worsens congestion. (3) The movement of reactive power results in real-power losses. When generators are required to supply excessive amounts of reactive power, their real-power production must be curtailed. These opportunity costs are not currently compensated for in most regions. Current tariffs are based on embedded costs. These embedded-cost tariffs average about $0.51/MWh, equivalent to $1.5 billion annually for the United States as a whole. Although this cost is low when compared with the cost of energy, it still aggregates to a significant amount of money. This report takes a basic look at why the power system requires reactive power (an appendix explains the fundamentals of real and reactive power). The report then examines the various types of generation and transmission resources used to supply reactive power and to control voltage. Finally it discusses how these resources are deployed and paid for in several reliability regions around the country. As the U.S. electricity industry is restructured, the generation, transmission, and system-control equipment and functions that maintain voltages within the appropriate ranges are being deintegrated.

Kirby, B.; Hirst, E.

1997-12-01T23:59:59.000Z

117

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

118

Integrated Safeguards and Security Management (ISSM) Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of this Policy is to formalize an Integrated Safeguards and Security Management (ISSM) framework. Safeguards and security management systems provide a formal, organized process for planning, performing, assessing, and improving the secure conduct of work in accordance with risk-based protection strategies. These systems are institutionalized through Department of Energy (DOE) directives and contracts. Does not cancel other directives. Canceled by DOE P 470.1A.

2001-05-08T23:59:59.000Z

119

Security seal  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

120

Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices  

E-Print Network [OSTI]

Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices Bo Chen--Cyber security is becoming a major concern of smart grids, as the functionality of a smart grid is highly on smart grids. This paper discusses several types of cyber attacks. Then, it presents results of studies

Kundur, Deepa

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Cyber Security and Resilient Systems  

SciTech Connect (OSTI)

The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

Robert S. Anderson

2009-07-01T23:59:59.000Z

122

Modulated voltage metastable ionization detector  

SciTech Connect (OSTI)

Metastable ionization detectors used for chromatographic analysis usually employa fixed high voltage for the ionization potential. For this reason, the operating range is limited to about three orders of magnitude. By use of the technique disclosed in the instant invention, operating ranges of about nine orders of magnitude are obtained. The output current from a metastable ionization detector (MID) is applied to a modulation voltage circuit. An adjustment is made to balance out the background current, and an output current, above background, is applied to an input of a strip chart recorder. For low level concentrations, i.e., low detected output current, the ionization potential will be at a maximum and the metastable ionization detector will operate at its most sensitive level. When the detected current from the metastable ionization detector increases above a predetermined threshold level, a voltage control circuit is activated which turns on a high voltage transistor which acts to reduce the ionization potential. The ionization potential applied to the metastable ionization detector is then varied so as to maintain the detected signal level constant. The variation in ionization potential is now related to the concentration fo the constituent and a representative amplitude is applied to another input of said strip chart recorder.

Carle, G. C.; Humphry, D. E.; Kojiro, D. R.

1985-08-27T23:59:59.000Z

123

E-Print Network 3.0 - assessment models final Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

O N S E C U R I T Y INITIAL PUBLIC DRAFT Security Assessment Provider... Requirements and Customer Responsibilities: Building a Security Assessment Credentialing Program for...

124

Evaluation of power system security and development of transmission pricing method  

E-Print Network [OSTI]

in the long run. Under this deregulated environment, security assessment and pricing of transmission services have become important issues in power systems. This dissertation provides new methods for power system security assessment and transmission pricing...

Kim, Hyungchul

2004-11-15T23:59:59.000Z

125

Cyberspace security system  

SciTech Connect (OSTI)

A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

2014-06-24T23:59:59.000Z

126

Optimizing secure communication standards for disadvantaged networks  

E-Print Network [OSTI]

We present methods for optimizing standardized cryptographic message protocols for use on disadvantaged network links. We first provide an assessment of current secure communication message packing standards and their ...

Okano, Stephen Hiroshi

2009-01-01T23:59:59.000Z

127

PARS II New Contractor Information for Interconnection Security...  

Office of Environmental Management (EM)

V1.0 (November 18, 2010) The Department of Energy (DOE) Headquarters Program Cyber Security Plan (PCSP), dated February 2008, requires the Project Assessment and Reporting System...

128

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

2011-07-21T23:59:59.000Z

129

Independent Oversight Review, Nevada Site Office and National Security Technologies, LLC- November 2011  

Broader source: Energy.gov [DOE]

Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems Self-Assessment

130

High voltage photovoltaic power converter  

DOE Patents [OSTI]

An array of independently connected photovoltaic cells on a semi-insulating substrate contains reflective coatings between the cells to enhance efficiency. A uniform, flat top laser beam profile is illuminated upon the array to produce electrical current having high voltage. An essentially wireless system includes a laser energy source being fed through optic fiber and cast upon the photovoltaic cell array to prevent stray electrical signals prior to use of the current from the array. Direct bandgap, single crystal semiconductor materials, such as GaAs, are commonly used in the array. Useful applications of the system include locations where high voltages are provided to confined spaces such as in explosive detonation, accelerators, photo cathodes and medical appliances.

Haigh, Ronald E. (Arvada, CO); Wojtczuk, Steve (Cambridge, MA); Jacobson, Gerard F. (Livermore, CA); Hagans, Karla G. (Livermore, CA)

2001-01-01T23:59:59.000Z

131

AP1000 Design for Security  

SciTech Connect (OSTI)

Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

2006-07-01T23:59:59.000Z

132

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

133

Onset voltage of corona on coated conductors  

SciTech Connect (OSTI)

This paper is aimed for investigating the effect of surface coating on the positive and negative onset voltages of corona from stressed conductor as a pre-requisite for onset-voltage calculation. The electric field is accurately calculated by the charge simulation technique. The calculated onset voltages agreed satisfactorily with those measured experimentally for bare conductors. The effect of coating-layer thickness and permittivity as well as conductor radius and height on the onset-voltage values is discussed.

Abdel-Salam, M. [Assiut Univ. (Egypt). Electrical Engineering Dept.; Abo-Shal, Y. [SCECO-East, Dammam (Saudi Arabia). Electrical Engineering Div.

1995-12-31T23:59:59.000Z

134

Security Certification & Accreditation of Federal Information Systems A Tutorial  

E-Print Network [OSTI]

assessments of Security Controls in Information Systems To obtain better understanding of Agency- related to hardware, software, firmware) Security Controls in an Information System, to determine the extent to which/29/2009 Security Certification & Assurance of Federal Information Systems Tutorial Questions during C&A Process

Madisetti, Vijay K.

135

Student Experiential Opportunities in National Security Careers  

SciTech Connect (OSTI)

This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

None

2007-12-31T23:59:59.000Z

136

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

137

Oak Ridge Reservation Needs Assessment | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Oak Ridge Reservation Needs Assessment Oak Ridge Reservation Needs Assessment December 1997 This Needs Assessment for former Oak Ridge National Laboratory and Y-12 Nuclear Security...

138

Security guide for subcontractors  

SciTech Connect (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

139

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

140

Global Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Nuclear Security Both DOE and the National Nuclear Security Administration are working to reduce the risk of nuclear proliferation and provide technologies to improve...

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Low power, scalable multichannel high voltage controller  

DOE Patents [OSTI]

A low voltage control circuit is provided for individually controlling high voltage power provided over bus lines to a multitude of interconnected loads. An example of a load is a drive for capillary channels in a microfluidic system. Control is distributed from a central high voltage circuit, rather than using a number of large expensive central high voltage circuits to enable reducing circuit size and cost. Voltage is distributed to each individual load and controlled using a number of high voltage controller channel switches connected to high voltage bus lines. The channel switches each include complementary pull up and pull down photo isolator relays with photo isolator switching controlled from the central high voltage circuit to provide a desired bus line voltage. Switching of the photo isolator relays is further controlled in each channel switch using feedback from a resistor divider circuit to maintain the bus voltage swing within desired limits. Current sensing is provided using a switched resistive load in each channel switch, with switching of the resistive loads controlled from the central high voltage circuit.

Stamps, James Frederick (Livermore, CA); Crocker, Robert Ward (Fremont, CA); Yee, Daniel Dadwa (Dublin, CA); Dils, David Wright (Fort Worth, TX)

2006-03-14T23:59:59.000Z

142

Low power, scalable multichannel high voltage controller  

DOE Patents [OSTI]

A low voltage control circuit is provided for individually controlling high voltage power provided over bus lines to a multitude of interconnected loads. An example of a load is a drive for capillary channels in a microfluidic system. Control is distributed from a central high voltage circuit, rather than using a number of large expensive central high voltage circuits to enable reducing circuit size and cost. Voltage is distributed to each individual load and controlled using a number of high voltage controller channel switches connected to high voltage bus lines. The channel switches each include complementary pull up and pull down photo isolator relays with photo isolator switching controlled from the central high voltage circuit to provide a desired bus line voltage. Switching of the photo isolator relays is further controlled in each channel switch using feedback from a resistor divider circuit to maintain the bus voltage swing within desired limits. Current sensing is provided using a switched resistive load in each channel switch, with switching of the resistive loads controlled from the central high voltage circuit.

Stamps, James Frederick (Livermore, CA); Crocker, Robert Ward (Fremont, CA); Yee, Daniel Dadwa (Dublin, CA); Dils, David Wright (Fort Worth, TX)

2008-03-25T23:59:59.000Z

143

Dynamic Voltage Regulation Using Distributed Energy Resources  

SciTech Connect (OSTI)

Many distributed energy resources (DE) are near load centres and equipped with power electronics converters to interface with the grid, therefore it is feasible for DE to provide ancillary services such as voltage regulation, nonactive power compensation, and power factor correction. A synchronous condenser and a microturbine with an inverter interface are implemented in parallel in a distribution system to regulate the local voltage. Voltage control schemes of the inverter and the synchronous condenser are developed. The experimental results show that both the inverter and the synchronous condenser can regulate the local voltage instantaneously, while the dynamic response of the inverter is faster than the synchronous condenser; and that integrated voltage regulation (multiple DE perform voltage regulation) can increase the voltage regulation capability, increase the lifetime of the equipment, and reduce the capital and operation costs.

Xu, Yan [ORNL; Rizy, D Tom [ORNL; Li, Fangxing [ORNL; Kueck, John D [ORNL

2007-01-01T23:59:59.000Z

144

Voltage Vehicles | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov PtyInformationSEDS data Jump to: navigation, search ToolVoith HydroVoltage

145

Security guide for subcontractors  

SciTech Connect (OSTI)

This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

Adams, R.C.

1993-06-01T23:59:59.000Z

146

Situation Threat Assessment Policy and Protocol (Updated 9/1/11) Rowan University is committed to promoting a safe and secure learning environment. It is  

E-Print Network [OSTI]

appropriate actions, which may include suspension, expulsion, involuntary leave of absence, filing of criminal parties, or expressed in private writings. Possession of any item used as a weapon such as a firearm Threat Assessment Team will recommend actions to the Vice President for Student Life & Dean of Students

Rusu, Adrian

147

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

148

Personnel Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

149

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

150

Wind Power Plant Voltage Stability Evaluation: Preprint  

SciTech Connect (OSTI)

Voltage stability refers to the ability of a power system to maintain steady voltages at all buses in the system after being subjected to a disturbance from a given initial operating condition. Voltage stability depends on a power system's ability to maintain and/or restore equilibrium between load demand and supply. Instability that may result occurs in the form of a progressive fall or rise of voltages of some buses. Possible outcomes of voltage instability are the loss of load in an area or tripped transmission lines and other elements by their protective systems, which may lead to cascading outages. The loss of synchronism of some generators may result from these outages or from operating conditions that violate a synchronous generator's field current limit, or in the case of variable speed wind turbine generator, the current limits of power switches. This paper investigates the impact of wind power plants on power system voltage stability by using synchrophasor measurements.

Muljadi, E.; Zhang, Y. C.

2014-09-01T23:59:59.000Z

151

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

152

High voltage load resistor array  

DOE Patents [OSTI]

A high voltage resistor comprising an array of a plurality of parallel electrically connected resistor elements each containing a resistive solution, attached at each end thereof to an end plate, and about the circumference of each of the end plates, a corona reduction ring. Each of the resistor elements comprises an insulating tube having an electrode inserted into each end thereof and held in position by one or more hose clamps about the outer periphery of the insulating tube. According to a preferred embodiment, the electrode is fabricated from stainless steel and has a mushroom shape at one end, that inserted into the tube, and a flat end for engagement with the end plates that provides connection of the resistor array and with a load.

Lehmann, Monty Ray (Smithfield, VA)

2005-01-18T23:59:59.000Z

153

Group 3: Humidity, Temperature, and Voltage (Presentation)  

SciTech Connect (OSTI)

Group 3 is chartered to develop accelerated stress tests that can be used as comparative predictors of module lifetime versus stresses associated with humidity, temperature and voltage.

Wohlgemuth, J.

2013-05-01T23:59:59.000Z

154

High Voltage Electrolyte for Lithium Batteries  

Broader source: Energy.gov (indexed) [DOE]

battery using high voltage high energy cathode materials to enable large-scale, cost competitive production of the next generation of electric-drive vehicles. To...

155

2013 Annual Summary Report for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada National Security Site, Nye County, Nevada; Review of the Performance Assessments and Composite Analyses  

SciTech Connect (OSTI)

The Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site (National Security Technologies, LLC 2007a) requires an annual review to assess the adequacy of the performance assessments (PAs) and composite analyses (CAs), with the results submitted to the U.S. Department of Energy (DOE) Office of Environmental Management. The Disposal Authorization Statements for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) also require that such reviews be made and that secondary or minor unresolved issues be tracked and addressed as part of the maintenance plan (DOE 1999a, 2000). The U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office performed an annual review of the Area 3 and Area 5 RWMS PAs and CAs for fiscal year (FY) 2013. This annual summary report presents data and conclusions from the FY 2013 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R&D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada National Security Site (NNSS) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R&D activities were reviewed to determine the adequacy of the CAs. Important developments in FY 2013 include the following: • Development of a new Area 5 RWMS closure inventory estimate based on disposals through FY 2013 • Evaluation of new or revised waste streams by special analysis • Development of version 4.115 of the Area 5 RWMS GoldSim PA/CA model The Area 3 RWMS has been in inactive status since July 1, 2006, with the last shipment received in April 2006. The FY 2013 review of operations, facility design, closure plans, monitoring results, and R&D results for the Area 3 RWMS indicates no changes that would impact PA validity. The conclusion of the annual review is that all performance objectives can be met and the Area 3 RWMS PA remains valid. There is no need to the revise the Area 3 RWMS PA. Review of Area 5 RWMS operations, design, closure plans, monitoring results, and R&D activities indicates that no significant changes have occurred. The FY 2013 PA results, generated with the Area 5 RWMS v4.115 GoldSim PA model, indicate that there continues to be a reasonable expectation of meeting all performance objectives. The results and conclusions of the Area 5 RWMS PA are judged valid, and there is no need to the revise the PA. A review of changes potentially impacting the CAs indicates that no significant changes occurred in FY 2013. The continuing adequacy of the CAs was evaluated with the new models, and no significant changes that would alter the CAs results or conclusions were found. The revision of the Area 3 RWMS CA, which will include the Yucca Flat Underground Test Area (Corrective Action Unit [CAU] 97) source term, is scheduled for FY 2024, following the completion of the Corrective Action Decision Document/Corrective Action Plan in FY 2015. Inclusion of the Frenchman Flat Underground Test Area (CAU 98) results in the Area 5 RWMS CA is scheduled for FY 2016, pending the completion of the CAU 98 Closure Report in FY 2015. Near-term R&D efforts will focus on continuing development of the PA, CA, and inventory models for the Area 3 and Area 5 RWMS.

Shott, Gregory [NSTec] [NSTec

2014-03-01T23:59:59.000Z

156

Capturing power at higher voltages from arrays of microbial fuel cells without voltage reversal  

E-Print Network [OSTI]

is too low to be used directly for many practical applications. For example, a single light emitting diode (LED) requires a minimum voltage of 2 V.2 Thus, effective methods of boosting MFC voltages

157

The Constant Voltage Transformer (CVT) for Mitigating Effects of Voltage Sags on Industrial Equipment  

E-Print Network [OSTI]

) an increase in loads that use power electronics in some type of power conversion configuration [1][2]. This paper presents applications of the constant-voltage transformer (CVT) for mitigating the effects of electric service voltage sags on industrial...

Ferraro, R. J.; Osborne, R.; Stephens, R.

158

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security: Defense in Depth Strategies The Chief Information Officer (CIO) at the U 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program...

159

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue...

160

Cyber Security Requirements for Risk Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

2004-02-19T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Fiber-optic voltage sensor with cladded fiber and evanescent wave variation detection  

DOE Patents [OSTI]

A fiber optic voltage sensor is described which includes a source of light, a reference fiber for receiving a known percentage of the light and an electrostrictive element having terminals across which is applied, a voltage to be measured. The electrostrictive element is responsive to the applied voltage to assume an altered physical state. A measuring fiber also receives a known percentage of light from the light source and is secured about the electrostrictive element. The measuring fiber is provided with a cladding and exhibits an evanescent wave in the cladding. The measuring fiber has a known length which is altered when the electrostrictive element assumes its altered physical state. A differential sensor is provided which senses the intensity of light in both the reference fiber and the measuring fiber and provides an output indicative of the difference between the intensities. 3 figs.

Wood, C.B.

1992-12-15T23:59:59.000Z

162

Voltage Collapse SimulationVoltage Collapse Simulation (Eastern Interconnection(Eastern Interconnection  

E-Print Network [OSTI]

PSERC Voltage Collapse SimulationVoltage Collapse Simulation (Eastern Interconnection(Eastern Interconnection Scenario)Scenario) Simulation Prepared by Dennis J. RaySimulation Prepared by Dennis J. Ray Interconnection based on a series of generator and line outages. An actual voltage collapse may not occur due

163

DESIGN AND IMPLEMENTATION OF A FUZZY LOGIC-BASED VOLTAGE CONTROLLER FOR VOLTAGE REGULATION  

E-Print Network [OSTI]

1 DESIGN AND IMPLEMENTATION OF A FUZZY LOGIC-BASED VOLTAGE CONTROLLER FOR VOLTAGE REGULATION In this paper the design and implementation of a fuzzy logic-based controller is described for regulating the output voltage of a synchronous generator. An automated fuzzy logic-based control strategy is presented

LaMeres, Brock J.

164

Climate Change and National Security  

SciTech Connect (OSTI)

Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities – with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

Malone, Elizabeth L.

2013-02-01T23:59:59.000Z

165

Optimal Power Flow Incorporating Voltage Collapse Constraints  

E-Print Network [OSTI]

Optimal Power Flow Incorporating Voltage Collapse Constraints William Rosehart Claudio Ca on the current operating con- ditions is presented. Second, an Optimal Power Flow formulation that incorporates: Voltage Collapse, Optimal Power Flow, Bifur- cations. I. Introduction As open-access market principles

Cañizares, Claudio A.

166

Voltage regulation in linear induction accelerators  

DOE Patents [OSTI]

Improvement in voltage regulation in a Linear Induction Accelerator wherein a varistor, such as a metal oxide varistor, is placed in parallel with the beam accelerating cavity and the magnetic core. The non-linear properties of the varistor result in a more stable voltage across the beam accelerating cavity than with a conventional compensating resistance.

Parsons, William M. (Santa Fe, NM)

1992-01-01T23:59:59.000Z

167

Voltage regulation in linear induction accelerators  

DOE Patents [OSTI]

Improvement in voltage regulation in a linear induction accelerator wherein a varistor, such as a metal oxide varistor, is placed in parallel with the beam accelerating cavity and the magnetic core is disclosed. The non-linear properties of the varistor result in a more stable voltage across the beam accelerating cavity than with a conventional compensating resistance. 4 figs.

Parsons, W.M.

1992-12-29T23:59:59.000Z

168

Control Systems Security Test Center - FY 2004 Program Summary  

SciTech Connect (OSTI)

In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

Robert E. Polk; Alen M. Snyder

2005-04-01T23:59:59.000Z

169

Non-contact current and voltage sensor  

SciTech Connect (OSTI)

A detachable current and voltage sensor provides an isolated and convenient device to measure current passing through a conductor such as an AC branch circuit wire, as well as providing an indication of an electrostatic potential on the wire, which can be used to indicate the phase of the voltage on the wire, and optionally a magnitude of the voltage. The device includes a housing that contains the current and voltage sensors, which may be a ferrite cylinder with a hall effect sensor disposed in a gap along the circumference to measure current, or alternative a winding provided through the cylinder along its axis and a capacitive plate or wire disposed adjacent to, or within, the ferrite cylinder to provide the indication of the voltage.

Carpenter, Gary D; El-Essawy, Wael; Ferreira, Alexandre Peixoto; Keller, Thomas Walter; Rubio, Juan C; Schappert, Michael A

2014-03-25T23:59:59.000Z

170

Flexible method for monitoring fuel cell voltage  

DOE Patents [OSTI]

A method for equalizing the measured voltage of each cluster in a fuel cell stack wherein at least one of the clusters has a different number of cells than the identical number of cells in the remaining clusters by creating a pseudo voltage for the different cell numbered cluster. The average cell voltage of the all of the cells in the fuel cell stack is calculated and multiplied by a constant equal to the difference in the number of cells in the identical cell clusters and the number of cells in the different numbered cell cluster. The resultant product is added to the actual voltage measured across the different numbered cell cluster to create a pseudo voltage which is equivalent in cell number to the number of cells in the other identical numbered cell clusters.

Mowery, Kenneth D. (Noblesville, IN); Ripley, Eugene V. (Russiaville, IN)

2002-01-01T23:59:59.000Z

171

Wide-range voltage modulation  

SciTech Connect (OSTI)

The Superconducting Super Collider`s Medium Energy Booster Abort (MEBA) kicker modulator will supply a current pulse to the abort magnets which deflect the proton beam from the MEB ring into a designated beam stop. The abort kicker will be used extensively during testing of the Low Energy Booster (LEB) and the MEB rings. When the Collider is in full operation, the MEBA kicker modulator will abort the MEB beam in the event of a malfunction during the filling process. The modulator must generate a 14-{mu}s wide pulse with a rise time of less than 1 {mu}s, including the delay and jitter times. It must also be able to deliver a current pulse to the magnet proportional to the beam energy at any time during ramp-up of the accelerator. Tracking the beam energy, which increases from 12 GeV at injection to 200 GeV at extraction, requires the modulator to operate over a wide range of voltages (4 kV to 80 kV). A vacuum spark gap and a thyratron have been chosen for test and evaluation as candidate switches for the abort modulator. Modulator design, switching time delay, jitter and pre-fire data are presented.

Rust, K.R.; Wilson, J.M.

1992-06-01T23:59:59.000Z

172

Information Security Group IY5512 Computer Security  

E-Print Network [OSTI]

for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

Mitchell, Chris

173

INFRASTRUCTURE SECURITY & ENERGY  

E-Print Network [OSTI]

price monitoring #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERYINFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity

Schrijver, Karel

174

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

175

Data Security ROCKVILLE, MD  

E-Print Network [OSTI]

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

176

Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop  

SciTech Connect (OSTI)

The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Yoo, Seong-Moo [ORNL; Mili, Ali [ORNL; Trien, Joseph P [ORNL

2006-01-01T23:59:59.000Z

177

PH-315 A. La Rosa VOLTAGE-CONTROLLED OSCILLATOR  

E-Print Network [OSTI]

PH-315 A. La Rosa VOLTAGE-CONTROLLED OSCILLATOR 1. PURPOSE: An integrator and a Schmitt Trigger voltage; hence its name "voltage-controlled oscillator." 2. VOLTAGE-CONTROLLED OSCILLATOR Figure 1 shows voltage. An unusual feature of the circuit is its operation using a single positive supply.1 #12;- + 50k V

178

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

179

Security system signal supervision  

SciTech Connect (OSTI)

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

180

Lemnos interoperable security project.  

SciTech Connect (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Electro-optical voltage sensor head  

DOE Patents [OSTI]

A miniature electro-optic voltage sensor system capable of accurate operation at high voltages. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam's polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured.

Woods, Gregory K. (Idaho Falls, ID)

1998-01-01T23:59:59.000Z

182

Tag: Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurity Tag: Security

183

Tag: security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9.security Tag: security Displaying 1 -

184

Secure Storage | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.SecureSecure Storage

185

Researchers map atomic movements that trigger voltage fade in...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

map atomic movements that trigger voltage fade in high-energy-density batteries January 22, 2015 Voltage and capacity curves from an LMR-NMC high-energy cathode show voltage fade...

186

What is Security? A perspective on achieving security  

SciTech Connect (OSTI)

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

187

EA-1532: Final Environmental Assessment | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Assessment EA-1532: Final Environmental Assessment Proposed Consolidation of Neutron Generator Tritium Target Loading Production As part of National Nuclear Security...

188

Modular high voltage power supply for chemical analysis  

DOE Patents [OSTI]

A high voltage power supply for use in a system such as a microfluidics system, uses a DC-DC converter in parallel with a voltage-controlled resistor. A feedback circuit provides a control signal for the DC-DC converter and voltage-controlled resistor so as to regulate the output voltage of the high voltage power supply, as well as, to sink or source current from the high voltage supply.

Stamps, James F. (Livermore, CA); Yee, Daniel D. (Dublin, CA)

2008-07-15T23:59:59.000Z

189

Modular high voltage power supply for chemical analysis  

SciTech Connect (OSTI)

A high voltage power supply for use in a system such as a microfluidics system, uses a DC-DC converter in parallel with a voltage-controlled resistor. A feedback circuit provides a control signal for the DC-DC converter and voltage-controlled resistor so as to regulate the output voltage of the high voltage power supply, as well as, to sink or source current from the high voltage supply.

Stamps, James F. (Livermore, CA); Yee, Daniel D. (Dublin, CA)

2010-05-04T23:59:59.000Z

190

Modular high voltage power supply for chemical analysis  

DOE Patents [OSTI]

A high voltage power supply for use in a system such as a microfluidics system, uses a DC--DC converter in parallel with a voltage-controlled resistor. A feedback circuit provides a control signal for the DC--DC converter and voltage-controlled resistor so as to regulate the output voltage of the high voltage power supply, as well as, to sink or source current from the high voltage supply.

Stamps, James F. (Livermore, CA); Yee, Daniel D. (Dublin, CA)

2007-01-09T23:59:59.000Z

191

[1] B. Genge, C. Siaterlis, and M. Hohenadel. AMICI: an assessment platform for multi-domain security experimentation on critical infrastructures. In B. M. Hmmerli, N. Kalstad Svendsen, and  

E-Print Network [OSTI]

critical infrastructures (NCIs), e.g., power plants. They revealed several vulnerabilities in today's NCIs: ICT, power grid and railway. Keywords: Critical Infrastructure; security; experimentation; testbed [2] B. Reaves and T. Morris. An open virtual testbed for industrial control system security research

Briesemeister, Linda

192

Electro-optic high voltage sensor  

DOE Patents [OSTI]

A small sized electro-optic voltage sensor capable of accurate measurement of high voltages without contact with a conductor or voltage source is provided. When placed in the presence of an electric field, the sensor receives an input beam of electromagnetic radiation. A polarization beam displacer separates the input beam into two beams with orthogonal linear polarizations and causes one linearly polarized beam to impinge a crystal at a desired angle independent of temperature. The Pockels effect elliptically polarizes the beam as it travels through the crystal. A reflector redirects the beam back through the crystal and the beam displacer. On the return path, the polarization beam displacer separates the elliptically polarized beam into two output beams of orthogonal linear polarization. The system may include a detector for converting the output beams into electrical signals and a signal processor for determining the voltage based on an analysis of the output beams.

Davidson, James R.; Seifert, Gary D.

2003-09-16T23:59:59.000Z

193

Voltage Management of Networks with Distributed Generation.   

E-Print Network [OSTI]

At present there is much debate about the impacts and benefits of increasing the amount of generation connected to the low voltage areas of the electricity distribution network. The UK government is under political ...

O'Donnell, James

2008-01-01T23:59:59.000Z

194

Low voltage arc formation in railguns  

DOE Patents [OSTI]

A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile.

Hawke, R.S.

1985-08-05T23:59:59.000Z

195

Low voltage arc formation in railguns  

DOE Patents [OSTI]

A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile. 2 figs.

Hawke, R.S.

1987-11-17T23:59:59.000Z

196

Low voltage arc formation in railguns  

DOE Patents [OSTI]

A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile.

Hawke, Ronald S. (Livermore, CA)

1987-01-01T23:59:59.000Z

197

2012 Annual Summary Report for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada National Security Site, Nye County, Nevada: Review of the Performance Assessments and Composite Analyses  

SciTech Connect (OSTI)

The Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site (National Security Technologies, LLC 2007a) requires an annual review to assess the adequacy of the performance assessments (PAs) and composite analyses (CAs), with the results submitted to the U.S. Department of Energy (DOE) Office of Environmental Management. The Disposal Authorization Statements for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) also require that such reviews be made and that secondary or minor unresolved issues be tracked and addressed as part of the maintenance plan (DOE 1999a, 2000). The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office performed an annual review of the Area 3 and Area 5 RWMS PAs and CAs for fiscal year (FY) 2012. This annual summary report presents data and conclusions from the FY 2012 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R&D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada National Security Site (NNSS) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R&D activities were reviewed to determine the adequacy of the CAs. Important developments in FY 2012 include the following: ? Release of a special analysis for the Area 3 RWMS assessing the continuing validity of the PA and CA ? Development of a new Area 5 RWMS closure inventory estimate based on disposals through FY 2012 ? Evaluation of new or revised waste streams by special analysis ? Development of version 4.114 of the Area 5 RWMS GoldSim PA model The Area 3 RWMS has been in inactive status since July 1, 2006, with the last shipment received in April 2006. The FY 2012 review of operations, facility design, closure plans, monitoring results, and R&D results for the Area 3 RWMS indicates no changes that would impact PA validity. A special analysis using the Area 3 RWMS v2.102 GoldSim PA model was prepared to update the PA results for the Area 3 RWMS in FY 2012. The special analysis concludes that all performance objectives can be met and the Area 3 RWMS PA remains valid. There is no need to the revise the Area 3 RWMS PA. Review of Area 5 RWMS operations, design, closure plans, monitoring results, and R&D activities indicates no significant changes other than an increase in the inventory disposed. The FY 2012 PA results, generated with the Area 5 RWMS v4.114 GoldSim PA model, indicate that there continues to be a reasonable expectation of meeting all performance objectives. The results and conclusions of the Area 5 RWMS PA are judged valid, and there is no need to the revise the PA. A review of changes potentially impacting the CAs indicates that no significant changes occurred in FY 2012. The continuing adequacy of the CAs was evaluated with the new models, and no significant changes that would alter CA results or conclusions were found. The revision of the Area 3 RWMS CA, which will include the Underground Test Area source term (Corrective Action Unit [CAU] 97), is scheduled for FY 2024, following the completion of the Yucca Flat CAU 97 Corrective Action Decision Document/Corrective Action Plan in FY 2016. Inclusion of the Frenchman Flat CAU 98 results in the Area 5 RWMS CA is scheduled for FY 2016, pending the completion of the CAU 98 closure report in FY 2015. Near-term R&D efforts will focus on continuing development of the Area 3 and Area 5 RWMS GoldSim PA/CA and inventory models.

Shott, G. [National Security Technologies, LLC

2013-03-18T23:59:59.000Z

198

Group 3: Humidity, Temperature, and Voltage  

Broader source: Energy.gov [DOE]

This PowerPoint presentation, focused on humidity, temperature and voltage testing, was originally presented by John Wohlgemuth at the NREL 2013 PV Module Reliability Workshop on Feb. 26-27, 2013 in Denver, CO. It summarizes the activities of a working group chartered to develop accelerated stress tests that can be used as comparative predictors of module life versus stresses associated with humidity, temperature and voltage.

199

Addressing the Voltage Fade Issue with Lithium-Manganese-Rich...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Addressing the Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials Addressing the Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials 2013 DOE...

200

Addressing the Voltage Fade Issue with Lithium-Manganese-Rich...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials Addressing the Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials 2012 DOE Hydrogen and...

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

High-Voltage Solid Polymer Batteries for Electric Drive Vehicles...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

High-Voltage Solid Polymer Batteries for Electric Drive Vehicles High-Voltage Solid Polymer Batteries for Electric Drive Vehicles 2012 DOE Hydrogen and Fuel Cells Program and...

202

Vehicle Technologies Office Merit Review 2014: High-Voltage Solid...  

Broader source: Energy.gov (indexed) [DOE]

High-Voltage Solid Polymer Batteries for Electric Drive Vehicles Vehicle Technologies Office Merit Review 2014: High-Voltage Solid Polymer Batteries for Electric Drive Vehicles...

203

High-Voltage Solid Polymer Batteries for Electric Drive Vehicles...  

Broader source: Energy.gov (indexed) [DOE]

High-Voltage Solid Polymer Batteries for Electric Drive Vehicles High-Voltage Solid Polymer Batteries for Electric Drive Vehicles 2013 DOE Hydrogen and Fuel Cells Program and...

204

High voltage overhead long transmission line design and fault analysis.  

E-Print Network [OSTI]

??The goal of this project is to design a reliable high voltage overhead long transmission line that satisfies specific design criteria including voltage regulation, efficiency,… (more)

Elzain, Mohamed Ali

2011-01-01T23:59:59.000Z

205

Securing Internet Routing Securing Internet Routing  

E-Print Network [OSTI]

Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: · Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths

Goldberg, Sharon

206

Aligning Service-Oriented Architectures with Security Requirements  

E-Print Network [OSTI]

Aligning Service-Oriented Architectures with Security Requirements Mattia Salnitri, Fabiano Dalpiaz of a service-oriented architecture-- representing a composite service--with security requirements. Service- oriented architectures are dynamic (services can be replaced on-the-fly), and assessing compliance

207

2011 Annual Summary Report for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada National Security Site, Nye County, Nevada: Review of the Performance Assessments and Composite Analyses  

SciTech Connect (OSTI)

The Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site (National Security Technologies, LLC, 2007a) requires an annual review to assess the adequacy of the Performance Assessments (PAs) and Composite Analyses (CAs), with the results submitted annually to U.S. Department of Energy (DOE) Office of Environmental Management. The Disposal Authorization Statements for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) also require that such reviews be made and that secondary or minor unresolved issues be tracked and addressed as part of the maintenance plan (DOE, 1999a; 2000). The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office performed an annual review of the Area 3 and Area 5 RWMS PAs and CAs for fiscal year (FY) 2011. This annual summary report presents data and conclusions from the FY 2011 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R and D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R and D activities were reviewed to determine the adequacy of the CAs. Important developments in FY 2011 include the following: (1) Operation of a new shallow land disposal unit and a new Resource Conservation and Recovery Act (RCRA)-compliant lined disposal unit at the Area 5 RWMS; (2) Development of new closure inventory estimates based on disposals through FY 2011; (3) Evaluation of new or revised waste streams by special analysis; (4) Development of version 2.102 of the Area 3 RWMS GoldSim PA model; and (5) Development of version 4.113 of the Area 5 RWMS GoldSim PA model. Analysis of the latest available data using the Area 5 RWMS v4.113 GoldSim PA model indicates that all performance objectives can be met. The results and conclusions of the Area 5 RWMS PA are judged valid, and there is no need to the revise the PA. The Area 3 RWMS has been in inactive status since July 1, 2006, with the last shipment received in April 2006. In FY 2011, there were no operational changes, monitoring results, or R and D results for the Area 3 RWMS that would impact PA validity. Despite the increase in waste volume and inventory at the Area 3 RWMS since 1996 when the PA was approved, the facility performance evaluated with the Area 3 RWMS PA GoldSim model, version 2.0 (with the final closure inventory), remains well below the performance objectives set forth in U.S. Department of Energy Order DOE O 435.1, 'Radioactive Waste Management' (DOE, 2001). The conclusions of the Area 3 RWMS PA remain valid. A special analysis was prepared to update the PA and CA results for the Area 3 RWMS in FY 2011. Release of the special analysis is planned for FY 2012. The continuing adequacy of the CAs was evaluated with the new models, and no significant changes that would alter CA results or conclusions were found. Inclusion of the Frenchman Flat Underground Test Area (UGTA) results in the Area 5 RWMS CA is scheduled for FY 2016, pending the completion of the closure report for the Frenchman Flat UGTA corrective action unit (CAU) in FY 2015. An industrial site, CAU 547, with corrective action sites near the Area 3 RWMS was found to have a significant plutonium inventory in 2009. CAU 547 will be evaluated for inclusion of future revisions or updates of the Area 3 RWMS CA. The revision of the Area 3 RWMS CA, which will include the UGTA source terms, is expected in FY 2024, following the completion of the Yucca Flat CAU Corrective Action Decision Document, scheduled for FY 2023. Near-term R and D efforts will focus on continuing development of the Are

NSTec Environmental Management

2012-03-20T23:59:59.000Z

208

Homeland Security Challenges Facing Small Water Systems in Texas  

E-Print Network [OSTI]

with small water systems to develop volun- tary assessments of the homeland security threats that they face. EPA provides assistance to small systems through education work- shops and seminars, reports and guidelines, and tutorials on CD. In 2005 EPA...

Dozier, Monty; Theodori, Gene L.; Jensen, Ricard

2007-05-31T23:59:59.000Z

209

T-544: Cisco Security Advisory: Cisco Content Services Gateway...  

Broader source: Energy.gov (indexed) [DOE]

Security Tracker Alert CVE-2011-0350 CVE-2011-0349 CVE-2011-0348 IMPACT ASSESSMENT: Medium Discussion: A remote user can access sites without the billing policy being...

210

Office of Heath, Safety and Security Now Two New Offices  

Broader source: Energy.gov [DOE]

To serve you better, DOE has structured the former HSS into to new organizations: the Office Independent Enterprise Assessment (IEA); and Office of Environment, Health, Safety and Security (EHSS).

211

Safeguards and Security Inspection and Assessment Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Cancels DOE O 5630.12. Parargaph 7c(6), 7c(7), 7c(8)(a), and 7g (8)(f) are canceled by DOE O 231.1 dated 9-30-1995.

1992-06-23T23:59:59.000Z

212

Analytical foundations of physical security system assessment  

E-Print Network [OSTI]

- tion scenarios or systems. Peck [23] [24] and Peck and Lacombe [25] have explored unattended ground sensors with regard to their employment as part of an intrusion detection system in a force protection role for base camps. They examine environ- mental...

Graves, Gregory Howard

2006-10-30T23:59:59.000Z

213

Cyber and Security Assessments | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy UsageAUDITVehiclesTankless orAChiefAppropriation FY 2012 FY 2013 FYCurrent and

214

Office of Security Assessments | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen OwnedofDepartment ofJaredOakscience-based,OHAGasandSafety andEnergy

215

Cyber Assessment Methods for SCADA Security  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists'Montana. DOCUMENTS AVAILABLEReport 2009Site | DepartmentOffice ofExamination Report5

216

Energy Security Initiatives Update  

Broader source: Energy.gov [DOE]

Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

217

Control Systems Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

systems within the nation's critical infrastructure. The CSSP assists control systems vendors and asset ownersoperators in identifying security vulnerabilities and developing...

218

Industrial Security Specialst  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

219

Nevada National Security Site  

Broader source: Energy.gov [DOE]

HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities.  In support of national defense initiatives...

220

Securing Cloud Storage Service.  

E-Print Network [OSTI]

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services… (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the safety, security and effectiveness of the nuclear deterrent without underground nuclear testing, consistent with the principles of the Stockpile Management Program...

222

TEC Information Security  

Broader source: Energy.gov (indexed) [DOE]

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

223

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

224

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Project Reviews, etc., except those specifically reserved for the Administrator for the National Nuclear Security Administration and the Deputy Secretary. cc: Mike Hickman. NA-Stl...

225

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

226

Hazardous Material Security (Maryland)  

Broader source: Energy.gov [DOE]

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

227

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

228

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

229

Status of Educational Efforts in National Security Workforce  

SciTech Connect (OSTI)

This report documents the status of educational efforts for the preparation of a national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This report includes an assessment of the current educational situation for the national security workforce.

None

2008-03-31T23:59:59.000Z

230

Distribution System Voltage Performance Analysis for High-Penetration Photovoltaics  

SciTech Connect (OSTI)

This report examines the performance of commonly used distribution voltage regulation methods under reverse power flow.

Liu, E.; Bebic, J.

2008-02-01T23:59:59.000Z

231

A Charge Pump that Generates Negative High Voltage with Variable Voltage , Eugene Ivanova,  

E-Print Network [OSTI]

A Charge Pump that Generates Negative High Voltage with Variable Voltage Gain Jun Zhaob, , Eugene, Massachusetts 02115, U.S.A. Abstract A cross-coupled structure based charge pump that generates negative high. The proposed negative charge pump is designed to deliver 40 uA with a wide supply range from 2.5V to 5.5V using

Ayers, Joseph

232

Distributed Voltage and Current Control of Multi-Terminal High-Voltage Direct  

E-Print Network [OSTI]

}@kth.se.) Abstract: High-voltage direct current (HVDC) is a commonly used technology for long-distance power for multi-terminal HVDC (MTDC) systems is proposed. Under certain conditions on the controller gains factor behind long-distance power transmission. High-voltage direct current (HVDC) is a commonly used

Dimarogonas, Dimos

233

Enhance your Cyber Security Knowledge  

E-Print Network [OSTI]

Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

234

Operational Security (OPSEC) Reminder | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

235

Electronic circuit for measuring series connected electrochemical cell voltages  

DOE Patents [OSTI]

An electronic circuit for measuring voltage signals in an energy storage device is disclosed. The electronic circuit includes a plurality of energy storage cells forming the energy storage device. A voltage divider circuit is connected to at least one of the energy storage cells. A current regulating circuit is provided for regulating the current through the voltage divider circuit. A voltage measurement node is associated with the voltage divider circuit for producing a voltage signal which is proportional to the voltage across the energy storage cell.

Ashtiani, Cyrus N. (West Bloomfield, MI); Stuart, Thomas A. (Toledo, OH)

2000-01-01T23:59:59.000Z

236

REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE IN BOTH  

E-Print Network [OSTI]

REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE's information systems. The uniform approach to describing controls for both national security and nonnational, implement, and assess their security controls most effectively when the process is carried out as part

237

DiSC: Benchmarking Secure Chip DBMS Nicolas Anciaux, Luc Bouganim, Philippe Pucheral, and Patrick Valduriez  

E-Print Network [OSTI]

DiSC: Benchmarking Secure Chip DBMS Nicolas Anciaux, Luc Bouganim, Philippe Pucheral, and Patrick irrelevant. The main problem faced by secure chip DBMS designers is to be able to assess various design choices and trade-offs for different applications. Our solution is to use a benchmark for secure chip DBMS

Paris-Sud XI, Université de

238

Experimental validation of a high voltage pulse measurement method.  

SciTech Connect (OSTI)

This report describes X-cut lithium niobate's (LiNbO3) utilization for voltage sensing by monitoring the acoustic wave propagation changes through LiNbO3 resulting from applied voltage. Direct current (DC), alternating current (AC) and pulsed voltage signals were applied to the crystal. Voltage induced shift in acoustic wave propagation time scaled quadratically for DC and AC voltages and linearly for pulsed voltages. The measured values ranged from 10 - 273 ps and 189 ps - 2 ns for DC and non-DC voltages, respectively. Data suggests LiNbO3 has a frequency sensitive response to voltage. If voltage source error is eliminated through physical modeling from the uncertainty budget, the sensor's U95 estimated combined uncertainty could decrease to ~0.025% for DC, AC, and pulsed voltage measurements.

Cular, Stefan; Patel, Nishant Bhupendra; Branch, Darren W.

2013-09-01T23:59:59.000Z

239

Sacramento Area Voltage Support Final Environmental Impact Statement  

SciTech Connect (OSTI)

The Western Area Power Administration's Central Valley Project transmission system forms an integral part of the interconnected Sacramento area transmission grid. Western is contractually responsible to oversee that the system is operated in accordance with strict reliability standards. Growth in the greater Sacramento, California area and power imported from generation outside the region, have increased the demand on the interconnected electric transmission system, leading to transmission system overloads and reducing the reliability and security of the area power system. Western has prepared this Sacramento Area Voltage Support (SVS) Draft Environmental Impact Statement (EIS) in compliance with Federal laws, regulations and guidelines, principally the National Environmental Policy Act (NEPA). This Draft EIS evaluates the potential environmental effects of physical improvements to the area's power system. Enhancements are needed to improve system reliability and provide voltage support for the Sacramento area. The results of public scoping meetings, workshops, meetings with agencies, and earlier studies by Western and area utilities helped to develop a range of alternatives for analysis. The Proposed Action involves: (1) Constructing a new double-circuit, 230-kV transmission line paralleling the existing double-circuit, 230-kV line from the O'Banion Substation to the Elverta Substation; (2) Realigning a portion of the existing Cottonwood-Roseville single-circuit, 230-kV transmission line north of Elverta Substation; and (3) Reconductoring the existing double-circuit, 230-kV transmission line from the Elverta Substation to the Tracy Substation. Public Hearings on the Draft EIS will be held between December 9-12, 2002. Comments on this Draft EIS are encouraged and should be sent to Ms. Loreen McMahon (above). Comments must be received by December 30, 2002.

N /A

2003-09-19T23:59:59.000Z

240

Sacramento Area Voltage Support Draft Environmental Impact Statement  

SciTech Connect (OSTI)

The Western Area Power Administration's Central Valley Project transmission system forms an integral part of the interconnected Sacramento area transmission grid. Western is contractually responsible to oversee that the system is operated in accordance with strict reliability standards. Growth in the greater Sacramento, California area and power imported from generation outside the region, have increased the demand on the interconnected electric transmission system, leading to transmission system overloads and reducing the reliability and security of the area power system. Western has prepared this Sacramento Area Voltage Support (SVS) Draft Environmental Impact Statement (EIS) in compliance with Federal laws, regulations and guidelines, principally the ''National Environmental Policy Act'' (NEPA). This Draft EIS evaluates the potential environmental effects of physical improvements to the area's power system. Enhancements are needed to improve system reliability and provide voltage support for the Sacramento area. The results of public scoping meetings, workshops, meetings with agencies, and earlier studies by Western and area utilities helped to develop a range of alternatives for analysis. The Proposed Action involves: Constructing a new double-circuit, 230-kV transmission line paralleling the existing double-circuit, 230-kV line from the O'Banion Substation to the Elverta Substation; Realigning a portion of the existing Cottonwood-Roseville single-circuit, 230-kV transmission line north of Elverta Substation; and Reconductoring the existing double-circuit, 230-kV transmission line from the Elverta Substation to the Tracy Substation. Public Hearings on the Draft EIS will be held between December 9-12, 2002. Comments on this Draft EIS are encouraged and should be sent to Ms. Loreen McMahon (above). Comments must be received by December 30, 2002.

N /A

2002-11-15T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Compact high voltage solid state switch  

DOE Patents [OSTI]

A compact, solid state, high voltage switch capable of high conduction current with a high rate of current risetime (high di/dt) that can be used to replace thyratrons in existing and new applications. The switch has multiple thyristors packaged in a single enclosure. Each thyristor has its own gate drive circuit that circuit obtains its energy from the energy that is being switched in the main circuit. The gate drives are triggered with a low voltage, low current pulse isolated by a small inexpensive transformer. The gate circuits can also be triggered with an optical signal, eliminating the trigger transformer altogether. This approach makes it easier to connect many thyristors in series to obtain the hold off voltages of greater than 80 kV.

Glidden, Steven C.

2003-09-23T23:59:59.000Z

242

Secure Manufacturing | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.Secure Manufacturing

243

SiGe BiCMOS Topologies for Low-Voltage Millimeter-Wave Voltage Controlled Oscillators and Frequency Dividers  

E-Print Network [OSTI]

SiGe BiCMOS Topologies for Low-Voltage Millimeter-Wave Voltage Controlled Oscillators and Frequency-mail: tod@eecg.toronto.edu Abstract -- BiCMOS topologies for mm-wave voltage- controlled oscillators operation for mm-wave applications. II. BICMOS VOLTAGE-CONTROLLED OSCILLATOR The Colpitts topology

Voinigescu, Sorin Petre

244

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

245

December 2003 SECURITY CONSIDERATIONS  

E-Print Network [OSTI]

December 2003 SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE Shirley security early in the information system development life cycle (SDLC), you may be able to avoid higher and a generic system development life cycle for illustrative purposes, the basic con cepts can be applied

Perkins, Richard A.

246

DATABASE SECURITY APPLICATIONS  

E-Print Network [OSTI]

DATABASE SECURITY #12;APPLICATIONS #12;Polyinstantiation for Cover Stories Ravi S. Sandhu and Sushil Jajodia* Center for Secure Information Systems & Department of Information and Software Systems Engineering George Mason University Falffax, VA 22030, USA emaih {sandhu, jajodia}Qsitevax.gmu.edu Abstract

Sandhu, Ravi

247

Incidents of Security Concern  

SciTech Connect (OSTI)

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

248

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

249

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

250

SELECTING INFORMATION TECHNOLOGY SECURITY  

E-Print Network [OSTI]

be selected and used within the organization's overall program to man age the design, development, and maintenance of its IT security infra structure, and to protect the confiden tiality, integrity objectives and to protect information. Guide to Selecting Information Technology Security Products NIST

251

December 2007 SECURING EXTERNAL  

E-Print Network [OSTI]

devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

252

Evaluation of higher distribution and/or utilization voltages. First interim report (December 1978): literature search and problem definition  

SciTech Connect (OSTI)

A literature search has been conducted on the economics and technical problems associated with the use of higher voltages in both the primary distribution and secondary utilization systems. After a literature review and evaluation, an assessment of the state-of-the-art with regard to high voltage has been made and is presented for the primary and secondary distribution systems, end use elements, and economics and system analysis or optimization. An annotated bibliography is provided for each of the three categories. A comprehensive list of potential advantages and disadvantages of higher primary distribution and utilization voltages has also been prepared and is presented.

Not Available

1981-04-01T23:59:59.000Z

253

Public key infrastructure for DOE security research  

SciTech Connect (OSTI)

This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

Aiken, R.; Foster, I.; Johnston, W.E. [and others

1997-06-01T23:59:59.000Z

254

Indirection and computer security.  

SciTech Connect (OSTI)

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

255

International Nuclear Security  

SciTech Connect (OSTI)

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

256

Office of Departmental Personnel Security  

Broader source: Energy.gov [DOE]

The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

257

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

258

Electro-optic voltage sensor for sensing voltage in an E-field  

DOE Patents [OSTI]

A miniature electro-optic voltage sensor system capable of accurate operation at high voltages. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam's polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured.

Woods, Gregory K. (Idaho Falls, ID); Renak, Todd W. (Idaho Falls, ID)

1999-01-01T23:59:59.000Z

259

Electro-optic voltage sensor for sensing voltage in an E-field  

DOE Patents [OSTI]

A miniature electro-optic voltage sensor system capable of accurate operation at high voltages is disclosed. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam`s polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured. 18 figs.

Woods, G.K.; Renak, T.W.

1999-04-06T23:59:59.000Z

260

Headquarters Facilities Master Security Plan  

Energy Savers [EERE]

Security Briefing. Failure of any employee to complete the SF-312 results in the termination of hisher security clearance and denial of access to classified matter. The badge...

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

262

Smart-Grid Security Issues  

SciTech Connect (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

263

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

264

Group 3: Humidity, Temperature and Voltage (Presentation)  

SciTech Connect (OSTI)

This is a summary of the work of Group 3 of the International PV QA Task Force. Group 3 is chartered to develop accelerated stress tests that can be used as comparative predictors of module lifetime versus stresses associated with humidity, temperature and voltage.

Wohlgemuth, J.

2013-09-01T23:59:59.000Z

265

Voltage control on a train system  

DOE Patents [OSTI]

The present invention provides methods for preventing low train voltages and managing interference, thereby improving the efficiency, reliability, and passenger comfort associated with commuter trains. An algorithm implementing neural network technology is used to predict low voltages before they occur. Once voltages are predicted, then multiple trains can be controlled to prevent low voltage events. Further, algorithms for managing inference are presented in the present invention. Different types of interference problems are addressed in the present invention such as "Interference During Acceleration", "Interference Near Station Stops", and "Interference During Delay Recovery." Managing such interference avoids unnecessary brake/acceleration cycles during acceleration, immediately before station stops, and after substantial delays. Algorithms are demonstrated to avoid oscillatory brake/acceleration cycles due to interference and to smooth the trajectories of closely following trains. This is achieved by maintaining sufficient following distances to avoid unnecessary braking/accelerating. These methods generate smooth train trajectories, making for a more comfortable ride, and improve train motor reliability by avoiding unnecessary mode-changes between propulsion and braking. These algorithms can also have a favorable impact on traction power system requirements and energy consumption.

Gordon, Susanna P.; Evans, John A.

2004-01-20T23:59:59.000Z

266

Electro-optic high voltage sensor  

DOE Patents [OSTI]

A small sized electro-optic voltage sensor capable of accurate measurement of high levels of voltages without contact with a conductor or voltage source is provided. When placed in the presence of an electric field, the sensor receives an input beam of electromagnetic radiation into the sensor. A polarization beam displacer serves as a filter to separate the input beam into two beams with orthogonal linear polarizations. The beam displacer is oriented in such a way as to rotate the linearly polarized beams such that they enter a Pockels crystal having at a preferred angle of 45 degrees. The beam displacer is therefore capable of causing a linearly polarized beam to impinge a crystal at a desired angle independent of temperature. The Pockels electro-optic effect induces a differential phase shift on the major and minor axes of the input beam as it travels through the Pockels crystal, which causes the input beam to be elliptically polarized. A reflecting prism redirects the beam back through the crystal and the beam displacer. On the return path, the polarization beam displacer separates the elliptically polarized beam into two output beams of orthogonal linear polarization representing the major and minor axes. The system may include a detector for converting the output beams into electrical signals, and a signal processor for determining the voltage based on an analysis of the output beams. The output beams are amplitude modulated by the frequency of the electric field and the amplitude of the output beams is proportional to the magnitude of the electric field, which is related to the voltage being measured.

Davidson, James R. (Idaho Falls, ID); Seifert, Gary D. (Idaho Falls, ID)

2002-01-01T23:59:59.000Z

267

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurity

268

March 24, 2008 Databases: Security 1 Database Security and Authorization  

E-Print Network [OSTI]

to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

Adam, Salah

269

INSTITUTE FOR CYBER SECURITY Application-Centric Security  

E-Print Network [OSTI]

INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

Sandhu, Ravi

270

Distribution System Voltage Regulation by Distributed Energy Resources  

SciTech Connect (OSTI)

This paper proposes a control method to regulate voltages in 3 phase unbalanced electrical distribution systems. A constrained optimization problem to minimize voltage deviations and maximize distributed energy resource (DER) active power output is solved by harmony search algorithm. IEEE 13 Bus Distribution Test System was modified to test three different cases: a) only voltage regulator controlled system b) only DER controlled system and c) both voltage regulator and DER controlled system. The simulation results show that systems with both voltage regulators and DER control provide better voltage profile.

Ceylan, Oguzhan [ORNL; Liu, Guodong [ORNL; Xu, Yan [ORNL; Tomsovic, Kevin [University of Tennessee, Knoxville (UTK)

2014-01-01T23:59:59.000Z

271

Multilevel Cascade H-bridge Inverter DC Voltage Estimation Through Output Voltage Sensing  

E-Print Network [OSTI]

system as the inverter power supply may vary. For example, interface of solar panels or fuel cell. The output voltage is then processed by a DSP unit that uses the signals that command the switches

Tolbert, Leon M.

272

AMALGAMATED SECURITY COMMUNITIES  

E-Print Network [OSTI]

This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

Harvey, Andrew Stephen

2011-08-31T23:59:59.000Z

273

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

274

Safety, Security & Fire Report  

E-Print Network [OSTI]

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

275

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

276

Operations Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

277

Engineering secure software  

E-Print Network [OSTI]

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after...

Jetly, Prateek

2001-01-01T23:59:59.000Z

278

Incidents of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

279

SECURING RADIO FREQUENCY IDENTIFICATION (RFID)  

E-Print Network [OSTI]

business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

280

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Lemnos Interoperable Security Program  

SciTech Connect (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

282

Electrical system architecture having high voltage bus  

DOE Patents [OSTI]

An electrical system architecture is disclosed. The architecture has a power source configured to generate a first power, and a first bus configured to receive the first power from the power source. The architecture also has a converter configured to receive the first power from the first bus and convert the first power to a second power, wherein a voltage of the second power is greater than a voltage of the first power, and a second bus configured to receive the second power from the converter. The architecture further has a power storage device configured to receive the second power from the second bus and deliver the second power to the second bus, a propulsion motor configured to receive the second power from the second bus, and an accessory motor configured to receive the second power from the second bus.

Hoff, Brian Douglas (East Peoria, IL); Akasam, Sivaprasad (Peoria, IL)

2011-03-22T23:59:59.000Z

283

Reactive Support and Voltage Control Service: Key Issues and Challenges  

E-Print Network [OSTI]

reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

Gross, George

284

Low Voltage White Phosphorescent OLED Achievements  

Broader source: Energy.gov [DOE]

Universal Display Corporation (UDC) and its research partners at Princeton University and the University of Southern California have succeeded in developing a white phosphorescent OLED (PHOLED™) that achieved a record efficiency of 20 lumens per watt. This achievement is the result of the team's collaborative efforts to increase the efficiency of PHOLED lighting by focusing on two critical factors: lowering the drive voltages and increasing the amount of light extracted.

285

High Voltage Electrolyte for Lithium Batteries  

Broader source: Energy.gov (indexed) [DOE]

5.0E-04 1.0E-03 2 2.2 2.4 2.6 2.8 Voltage (V) dQdV (AhV) 1 st Charge 1.2M LiPF 6 ECEMC 37 1 st Charge 1.0M LiPF 6 TMS1NM3 55 with 2% and 4% VC 1 st Charge 1.0M LiPF 6 TMS...

286

Measurable Control System Security through Ideal Driven Technical Metrics  

SciTech Connect (OSTI)

The Department of Homeland Security National Cyber Security Division supported development of a small set of security ideals as a framework to establish measurable control systems security. Based on these ideals, a draft set of proposed technical metrics was developed to allow control systems owner-operators to track improvements or degradations in their individual control systems security posture. The technical metrics development effort included review and evaluation of over thirty metrics-related documents. On the bases of complexity, ambiguity, or misleading and distorting effects the metrics identified during the reviews were determined to be weaker than necessary to aid defense against the myriad threats posed by cyber-terrorism to human safety, as well as to economic prosperity. Using the results of our metrics review and the set of security ideals as a starting point for metrics development, we identified thirteen potential technical metrics - with at least one metric supporting each ideal. Two case study applications of the ideals and thirteen metrics to control systems were then performed to establish potential difficulties in applying both the ideals and the metrics. The case studies resulted in no changes to the ideals, and only a few deletions and refinements to the thirteen potential metrics. This led to a final proposed set of ten core technical metrics. To further validate the security ideals, the modifications made to the original thirteen potential metrics, and the final proposed set of ten core metrics, seven separate control systems security assessments performed over the past three years were reviewed for findings and recommended mitigations. These findings and mitigations were then mapped to the security ideals and metrics to assess gaps in their coverage. The mappings indicated that there are no gaps in the security ideals and that the ten core technical metrics provide significant coverage of standard security issues with 87% coverage. Based on the two case studies and evaluation of the seven assessments, the security ideals demonstrated their value in guiding security thinking. Further, the final set of core technical metrics has been demonstrated to be both usable in the control system environment and provide significant coverage of standard security issues.

Miles McQueen; Wayne Boyer; Sean McBride; Marie Farrar; Zachary Tudor

2008-01-01T23:59:59.000Z

287

Electro-optic voltage sensor head  

DOE Patents [OSTI]

The invention is an electro-optic voltage sensor head designed for integration with existing types of high voltage transmission and distribution apparatus. The sensor head contains a transducer, which comprises a transducing material in which the Pockels electro-optic effect is observed. In the practice of the invention at least one beam of electromagnetic radiation is routed into the transducing material of the transducer in the sensor head. The beam undergoes an electro-optic effect in the sensor head when the transducing material is subjected to an E-field. The electro-optic effect is observed as a differential phase a shift, also called differential phase modulation, of the beam components in orthogonal planes of the electromagnetic radiation. In the preferred embodiment the beam is routed through the transducer along an initial axis and then reflected by a retro-reflector back substantially parallel to the initial axis, making a double pass through the transducer for increased measurement sensitivity. The preferred embodiment of the sensor head also includes a polarization state rotator and at least one beam splitter for orienting the beam along major and minor axes and for splitting the beam components into two signals which are independent converse amplitude-modulated signals carrying E-field magnitude and hence voltage information from the sensor head by way of optic fibers.

Crawford, Thomas M. (Idaho Falls, ID); Davidson, James R. (Idaho Falls, ID); Woods, Gregory K. (Cornelius, OR)

1999-01-01T23:59:59.000Z

288

Electro-optic voltage sensor head  

DOE Patents [OSTI]

The invention is an electro-optic voltage sensor head designed for integration with existing types of high voltage transmission and distribution apparatus. The sensor head contains a transducer, which comprises a transducing material in which the Pockels electro-optic effect is observed. In the practice of the invention at least one beam of electromagnetic radiation is routed into the transducing material of the transducer in the sensor head. The beam undergoes an electro-optic effect in the sensor head when the transducing material is subjected to an E-field. The electro-optic effect is observed as a differential phase a shift, also called differential phase modulation, of the beam components in orthogonal planes of the electromagnetic radiation. In the preferred embodiment the beam is routed through the transducer along an initial axis and then reflected by a retro-reflector back substantially parallel to the initial axis, making a double pass through the transducer for increased measurement sensitivity. The preferred embodiment of the sensor head also includes a polarization state rotator and at least one beam splitter for orienting the beam along major and minor axes and for splitting the beam components into two signals which are independent converse amplitude-modulated signals carrying E-field magnitude and hence voltage information from the sensor head by way of optic fibers. 6 figs.

Crawford, T.M.; Davidson, J.R.; Woods, G.K.

1999-08-17T23:59:59.000Z

289

Electrostatically screened, voltage-controlled electrostatic chuck  

DOE Patents [OSTI]

Employing an electrostatically screened, voltage-controlled electrostatic chuck particularly suited for holding wafers and masks in sub-atmospheric operations will significantly reduce the likelihood of contaminant deposition on the substrates. The electrostatic chuck includes (1) an insulator block having a outer perimeter and a planar surface adapted to support the substrate and comprising at least one electrode (typically a pair of electrodes that are embedded in the insulator block), (2) a source of voltage that is connected to the at least one electrode, (3) a support base to which the insulator block is attached, and (4) a primary electrostatic shield ring member that is positioned around the outer perimeter of the insulator block. The electrostatic chuck permits control of the voltage of the lithographic substrate; in addition, it provides electrostatic shielding of the stray electric fields issuing from the sides of the electrostatic chuck. The shielding effectively prevents electric fields from wrapping around to the upper or front surface of the substrate, thereby eliminating electrostatic particle deposition.

Klebanoff, Leonard Elliott (San Ramon, CA)

2001-01-01T23:59:59.000Z

290

Analysis and design of an electronic voltage ratchet  

E-Print Network [OSTI]

and decay. Impulse voltages are produced through the discharging of 0, capacitor into a shaping network consisting of resistors and a. capacitor as is shown in Figure 2. 9. The operation of the impulse generator is as follows. Capacitor Ci is charged from... voltage shaping network. as possible in order to reduce oscillations in the wavefront and wavetail portions of the impulse voltage [1). The impulse voltage generator requires a, highly charged capacitor or bank of capacitors. Capacitors may be charged...

Menendez, Jorge Carlos

2012-06-07T23:59:59.000Z

291

US public perspectives on security :  

SciTech Connect (OSTI)

We report findings from a national Internet survey and a subset of questions administered by telephone in mid-2011 on public assessments of contemporary and emerging interstate nuclear threats, support for strategic arms control, and preferences for responding to limited nuclear attacks on the United States. Additionally, we analyze public views of the threat of terrorism, including cyber attacks, assessments of progress in the struggle against terrorism, and preferences for responding to an act of radiological terrorism against the United States. Also, we report findings from an Internet survey and a subset of questions administered by telephone among the American public in mid-2011 on US energy and environmental security. Key areas of investigation include public views on energy requirements, preferences for energy sources, energy conservation versus development, energy independence, implications of events at Fukushima, Japan, for US public support of nuclear generation, preferences for managing used nuclear fuel, and trust in nuclear risk assessments from government and other public sources. Where possible, findings from each survey are compared with previous surveys in this series for analyses of trends.

Herron, Kerry Gale; Jenkins-Smith, Hank C.; Silva, Carol L.

2012-02-01T23:59:59.000Z

292

Selective compensation of voltage harmonics in grid-connected microgrids  

E-Print Network [OSTI]

1 Selective compensation of voltage harmonics in grid-connected microgrids Mehdi Savaghebia , Juan is proposed for selective compensation of main voltage harmonics in a grid- connected microgrid. The aim level. Keywords Distributed Generator (DG); microgrid; grid-connected; voltage harmonics compensation. 1

Vasquez, Juan Carlos

293

Structural Optimization of High Voltage Transmission Line Towers considering  

E-Print Network [OSTI]

Structural Optimization of High Voltage Transmission Line Towers considering Continuum and Discrete/or to common designs largely repeated (e.g. automotive compo- nents), and high voltage transmission towers can than conventional designs of high voltage transmission line towers. The optimization model proposed

Colominas, Ignasi

294

LM2907LM2917FrequencytoVoltageConverter February 1995  

E-Print Network [OSTI]

TL H 7942 LM2907LM2917FrequencytoVoltageConverter February 1995 LM2907 LM2917 Frequency to Voltage Converter General Description The LM2907 LM2917 series are monolithic frequency to voltage converters doubling for low ripple full input protection in two versions (LM2907-8 LM2917-8) and its output swings

Wedeward, Kevin

295

Characterized ideal LC circuit Charge, current and voltage vary sinusoidally  

E-Print Network [OSTI]

resistance to LC circuit Oscillations become damped Charge, current and voltage still vary sinusoidally Oscillations Draw phasors for voltages of R, C and L at same time t Orient VR, VL, & VC phasors relativeReview Characterized ideal LC circuit Charge, current and voltage vary sinusoidally Added

Bertulani, Carlos A. - Department of Physics and Astronomy, Texas A&M University

296

Accurately measuring current-voltage characteristics of tunnel diodes  

E-Print Network [OSTI]

of the bias voltage range of oscillations in the I–V curve.and the bias voltage range of oscillation in the I–V curve.or to know the exact voltage range of oscillation in the I–V

Bao, Mingqiang; Wang, Kang L

2006-01-01T23:59:59.000Z

297

DCS1800/WCDMA ADAPTIVE VOLTAGE-CONTROLLED OSCILLATOR  

E-Print Network [OSTI]

DCS1800/WCDMA ADAPTIVE VOLTAGE-CONTROLLED OSCILLATOR Aleksandar Tasiü, Wouter A. Serdijn and John R, an adaptive 2G/3G voltage-controlled oscillator (VCO) is described in this paper. For the DCS1800 operation with this reasoning, an adaptive 2G/3G voltage- controlled oscillator, meant for a dual-standard adaptive front

Serdijn, Wouter A.

298

System for increasing corona inception voltage of insulating oils  

DOE Patents [OSTI]

The Corona Inception Voltage of insulating oils is increased by repetitive cycles of prestressing the oil with a voltage greater than the corona inception voltage, and either simultaneously or serially removing byproducts of corona by evacuation and heating the oil. 5 figs.

Rohwein, G.J.

1998-05-19T23:59:59.000Z

299

Incorporating voltage security into the planning, operation and monitoring of restructured electric energy markets  

E-Print Network [OSTI]

As open access market principles are applied to power systems, significant changes are happening in their planning, operation and control. In the emerging marketplace, systems are operating under higher loading conditions as markets focus greater...

Nair, Nirmal-Kumar

2006-04-12T23:59:59.000Z

300

Global Material Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickr Flickr Editor'sshortGeothermal HeatStartedGirlsMaterial Security |

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

physical security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective Actions Program LANL TRU

302

safeguards and security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -

303

Nuclear Security 101 | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear Science

304

Nuclear Security Enterprise | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear

305

International Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for and NovelFEG-SEMInterlibrary LoanExercises |Security

306

Defense Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINLNuclear Security | National Nuclear

307

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartment ofofOxfordVeteransAdministrationPhysical Security Systems |

308

Transportation System Readiness and Resiliency Assessment Framework: Readiness and Assess Resiliency of  

E-Print Network [OSTI]

Transportation System Readiness and Resiliency Assessment Framework: Readiness and Assess Resiliency of Transportation Systems (Infrastructure, Systems, Organization and Services) to Deter, Detect Flows Passenger Flows Supply Chain Efficiency Transportation: Energy Environment Safety Security Vehicle

309

Voltage-dependent calcium channels and currents in native neurons and other cells have been divided into high voltage  

E-Print Network [OSTI]

Voltage-dependent calcium channels and currents in native neurons and other cells have been divided than one subtype of channel. A new subfamily of voltage-dependent calcium channel á1 subunit genes. 1999), having four domains, each with a voltage sensor and a pore-forming P loop. However

Dolphin, Annette C.

310

Adaptive security systems -- Combining expert systems with adaptive technologies  

SciTech Connect (OSTI)

The Adaptive Multisensor Integrated Security System (AMISS) uses a variety of computational intelligence techniques to reason from raw sensor data through an array of processing layers to arrive at an assessment for alarm/alert conditions based on human behavior within a secure facility. In this paper, the authors give an overview of the system and briefly describe some of the major components of the system. This system is currently under development and testing in a realistic facility setting.

Argo, P.; Loveland, R.; Anderson, K. [and others

1997-09-01T23:59:59.000Z

311

Applying New Network Security Technologies to SCADA Systems.  

SciTech Connect (OSTI)

Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure %22traditional%22 IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

Hurd, Steven A.; Stamp, Jason E. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM; Duggan, David P. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM; Chavez, Adrian R. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM

2006-11-01T23:59:59.000Z

312

Security Administration Production Office,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security and

313

SecuritySmart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0SecuritySmart March 2009

314

Safety, Security & Environment  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguards and SecuritySafety for

315

Method of Controlling Corona Effects and Breakdown Voltage of Small Air Gaps Stressed by Impulse Voltages  

E-Print Network [OSTI]

This paper investigates the influence of a resistor on the dielectric behavior of an air gap. The resistor is connected in series with the air gap and the latter is stressed by impulse voltage. Air gap arrangements of different geometry with either the rod or the plate grounded are stressed with impulse voltages of both positive and negative polarity. The resistor is connected in series with the air gap in the return circuit connecting the gap with the impulse generator. The method followed involves the investigation of the graphs of the charging time concerning the air gaps capacitances, in connection to the value of the resistor, the geometry of the gap, the effect of grounding and the polarity effect. It is determined that the charging time of the air gap increases, as the value of the resistor increases. It is also determined that the peak voltage value of the fully charged air gap decreases as the value of the resistor increases. The results of the mathematical and simulation analysis are compared with the results of the oscillograms taken from experimental work. In addition and consequently to the above results it is concluded from the experimental work that the in series connection of the resistor in the circuit has significant influence on corona pulses (partial discharges) occurring in the gap and on the breakdown voltage of the gap. A new method of controlling the corona effects and consequently the breakdown voltage of small air gaps stressed by impulse voltage of short duration in connection to the ground effect and the polarity effect has arisen. Furthermore through mathematical analysis of the charging graphs obtained from simulation and experimental oscillograms there was a calculation of the values of the capacitance of the air gaps in relation to their geometry and the results were compared to the values calculated with mathematical analysis.

Athanasios Maglaras; Trifon Kousiouris; Frangiskos Topalis; Dimitrios Katsaros; Leandros A. Maglaras; Konstantina Giannakopoulou

2014-10-15T23:59:59.000Z

316

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

317

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

318

Security enhanced with increased vehicle inspections  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

319

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

Amin, Saurabh

2011-01-01T23:59:59.000Z

320

ata security feature: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

A Forrester Consulting Thought Leadership Paper Commissioned By Microsoft And RSA, The Security Division Of EMC The Value Of Corporate Secrets  

E-Print Network [OSTI]

Division Of EMC The Value Of Corporate Secrets How Compliance And Collaboration Affect Enterprise, the security division of EMC, commissioned Forrester Consulting to assess the data security practices of North

Narasayya, Vivek

322

Safety and Security What do Safety/Security work with?  

E-Print Network [OSTI]

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

323

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network [OSTI]

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

324

Comparison of two methods to quantify cyber and physical security effectiveness.  

SciTech Connect (OSTI)

With the increasing reliance on cyber technology to operate and control physical security system components, there is a need for methods to assess and model the interactions between the cyber system and the physical security system to understand the effects of cyber technology on overall security system effectiveness. This paper evaluates two methodologies for their applicability to the combined cyber and physical security problem. The comparison metrics include probabilities of detection (P{sub D}), interruption (P{sub I}), and neutralization (P{sub N}), which contribute to calculating the probability of system effectiveness (P{sub E}), the probability that the system can thwart an adversary attack. P{sub E} is well understood in practical applications of physical security but when the cyber security component is added, system behavior becomes more complex and difficult to model. This paper examines two approaches (Bounding Analysis Approach (BAA) and Expected Value Approach (EVA)) to determine their applicability to the combined physical and cyber security issue. These methods were assessed for a variety of security system characteristics to determine whether reasonable security decisions could be made based on their results. The assessments provided insight on an adversary's behavior depending on what part of the physical security system is cyber-controlled. Analysis showed that the BAA is more suited to facility analyses than the EVA because it has the ability to identify and model an adversary's most desirable attack path.

Wyss, Gregory Dane; Gordon, Kristl A.

2005-11-01T23:59:59.000Z

325

National Security System Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

326

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

327

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

2011-07-21T23:59:59.000Z

328

September 2004 INFORMATION SECURITY  

E-Print Network [OSTI]

September 2004 INFORMATION SECURITY WITHIN THE SYSTEM DEVELOPMENT LIFE CYCLE Annabelle Lee of Standards and Technology Many System Development Life Cycle (SDLC) models exist that can be used. This model assumes that the system will be delivered near the end of its life cycle. Another SDLC model uses

329

Headquarters Security Operations  

Broader source: Energy.gov [DOE]

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

330

Metaphors for cyber security.  

SciTech Connect (OSTI)

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

331

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

332

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

333

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

2005-08-26T23:59:59.000Z

334

A network security monitor  

SciTech Connect (OSTI)

The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

1989-11-01T23:59:59.000Z

335

ARMY Energy Security Considerations  

E-Print Network [OSTI]

ARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2 Situation OIL & GAS LIQUIDS 38% Rise in NTV Fuel Use 35% of DoD utilities 21% of Fed government 11

336

Departmental Personnel Security- Clearance Automation  

Broader source: Energy.gov [DOE]

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

337

Database Security: A Historical Perspective  

E-Print Network [OSTI]

The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

Lesov, Paul

2010-01-01T23:59:59.000Z

338

System security Dr Len Hamey  

E-Print Network [OSTI]

, firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

Hamey, Len

339

Safe epoxy encapsulant for high voltage magnetics  

SciTech Connect (OSTI)

This paper describes the use of Formula 456, an aliphatic amine cured epoxy for impregnating coils and high voltage transformers. Sandia has evaluated a number of MDA-free epoxy encapsulants which relied on either anhydride or other aromatic amine curing agents. The use of aliphatic amine curing agents was more recently evaluated and has resulted in the definition of Formula 456 resin. Methylene dianiline (MDA) has been used for more than 20 years as the curing agent for various epoxy formulations throughout the Department of Energy and much of industry. Sandia National Laboratories began the process of replacing MDA with other formulations because of regulations imposed by OSHA on the use of MDA. OSHA has regulated MDA because it is a suspect carcinogen. Typically the elimination of OSHA-regulated materials provides a rare opportunity to qualify new formulations in a range of demanding applications. It was important to take full advantage of that opportunity, although the associated materials qualification effort was costly. Small high voltage transformers are one of those demanding applications. The successful implementation of the new formulation for high reliability transformers will be described. The test results that demonstrate the parts are qualified for use in DOE weapon systems will be presented.

Sanchez, R.O.; Archer, W.E.

1998-01-01T23:59:59.000Z

340

{open_quotes}Secure Bus{close_quotes} disturbance-free power at the utility substation level  

SciTech Connect (OSTI)

Over the last 18 months Public Service Company of New Mexico (PNM), El Camino Real Engineering, Inc. (CRE), Los Alamos National Laboratory (LANL) and Sandia National Laboratories (SNL) have worked on the development of disturbance-free power at the medium voltage substation level. The work resulted in the Secure Bus concept, a system in which a medium voltage bus in a substation is immune to power outages and voltage sags on the utility source. The Secure Bus voltage is also immune to voltage sags resulting from faults on any distribution feeder connected to the bus. The Secure Bus concept originated from work conducted to improve power quality for large high-tech manufacturing facilities, in particular for large semiconductor manufacturing plants. For the demands on quality power of a modern facility conventional equipment is not adequate for protecting the end user. For example, the operation of conventional vacuum breakers during short circuit conditions on a feeder circuit, requiring 3 to 5 cycles for breaker opening, does not allow for fast enough current interruption to avoid a voltage dip on the main bus. A sever voltage sag could result in a shut down of sensitive equipment being supplied by the other feeder circuits, which are connected to the main bus. The circumvent the problem, a fast breaker was introduced which interrupts the short circuit before the current causes a significant voltage disturbance. To make the bus immune also to power disturbances caused by power outages, energy storage is introduced to provide the necessary energy back-up in case the primary source is not available.

Boenig, H.J. [Los Alamos National Lab., NM (United States); Jones, W.H. [El Camino Real Engineering, Inc., Corrales, NM (United States)

1996-12-01T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Review of Nevada Site Office Criticality Safety Assessments at...  

Broader source: Energy.gov (indexed) [DOE]

an independent review of the National Nuclear Security AdministrationNevada Site Office Conduct of Operations Management Assessment Final Report, dated October 2011. The subject...

342

NNSA to conduct Aerial Radiation Assessment Survey over Phoenix...  

National Nuclear Security Administration (NNSA)

conduct Aerial Radiation Assessment Survey over Phoenix, Scottsdale, Glendale, Tempe Areas | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People...

343

assessing culprit lesions: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

characteristics and community food resources as well as materials for assessing household food security, food resource accessibility, food availability and affordability, and...

344

assessing food chain: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

characteristics and community food resources as well as materials for assessing household food security, food resource accessibility, food availability and affordability, and...

345

assessments fiabilidad humana: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

community characteristics and community food resources as well as materials for assessing household food security, food resource accessibility, food availability and...

346

assessing endometrial lesions: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

characteristics and community food resources as well as materials for assessing household food security, food resource accessibility, food availability and affordability, and...

347

assess nutritional condition: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

characteristics and community food resources as well as materials for assessing household food security, food resource accessibility, food availability and affordability, and...

348

assessing fpar source: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

community characteristics and community food resources as well as materials for assessing household food security, food resource accessibility, food availability and...

349

assess preclinical irritation: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

community characteristics and community food resources as well as materials for assessing household food security, food resource accessibility, food availability and...

350

assessing organ specific: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

characteristics and community food resources as well as materials for assessing household food security, food resource accessibility, food availability and affordability, and...

351

Safeguard Security and Awareness Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

2002-10-02T23:59:59.000Z

352

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

353

Safeguards and Security Program References  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

2005-08-26T23:59:59.000Z

354

East Asian Security in 2025  

E-Print Network [OSTI]

East Asian Security in 2025 Who We Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025...

Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

2008-01-01T23:59:59.000Z

355

January 2005 INTEGRATING IT SECURITY  

E-Print Network [OSTI]

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS technology (IT) security and capital planning and investment control (CPIC) processes have been performed taining appropriate security controls, both at the enterprise-wide and system level, commensurate

356

RECOMMENDED SECURITY CONTROLS FOR FEDERAL  

E-Print Network [OSTI]

May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information-53, Recommended Security Controls for Federal Information Systems The basic questions that organizations should

357

Positioning Security from electronic warfare  

E-Print Network [OSTI]

Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

Kuhn, Markus

358

Architectural support for enhancing security in clusters  

E-Print Network [OSTI]

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on Żrewalls for their security, but the Żrewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

359

Line Management Perspective: National Nuclear Security Administration...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

360

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Secretary Richardson Accepts Recommendations for Improving Security...  

National Nuclear Security Administration (NNSA)

Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

362

Security Science & Technology | Nuclear Science | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

363

FOILFEST :community enabled security.  

SciTech Connect (OSTI)

The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

2005-09-01T23:59:59.000Z

364

Design and applications of a flicker voltage generator  

SciTech Connect (OSTI)

In this paper, a 200W flicker voltage generator is made by using microcomputers and linear amplification circuits. The modulation amplitudes and frequencies based on the UIE {Delta}V{sub 10} evaluation can be arbitrarily assigned by software with high accuracy. The flicker voltage signals measured at the customer side also can be re-generated. Some applications, such as evaluating the effects of flicker voltage on incandescent and compact fluorescent lamps (CFLs), are also made. From experimental tests by use of the flicker voltage generator, the properties of some compact fluorescent lamps and incandescent lamps are compared. Those properties describe the relation between input voltage variation and output flux of lamps, such that there is direct description of influences of flicker voltages on lamps.

Chang, W.N.; Wu, C.J. [National Taiwan Inst. of Tech., Peitow-Taipei (Taiwan, Province of China). Dept. of Electrical Engineering

1995-12-31T23:59:59.000Z

365

PAPER ACCEPTED TO THE IEEE TRANSACTIONS ON POWER SYSTEMS 1 Sensitivity-based Security-constrained OPF Market  

E-Print Network [OSTI]

PAPER ACCEPTED TO THE IEEE TRANSACTIONS ON POWER SYSTEMS 1 Sensitivity-based Security-constrained OPF Market Clearing Model F. Milano, Member, IEEE, C. A. Ca~nizares, Senior Member, IEEE, and A. J constraints that properly include voltage stability limits in the operation of competitive electricity markets

Cañizares, Claudio A.

366

NREL: Measurements and Characterization - Current Versus Voltage  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions and Achievements ofLizResultsGeothermalAnalytical MicroscopyCurrent

367

Sequential circuit design for radiation hardened multiple voltage integrated circuits  

DOE Patents [OSTI]

The present invention includes a radiation hardened sequential circuit, such as a bistable circuit, flip-flop or other suitable design that presents substantial immunity to ionizing radiation while simultaneously maintaining a low operating voltage. In one embodiment, the circuit includes a plurality of logic elements that operate on relatively low voltage, and a master and slave latches each having storage elements that operate on a relatively high voltage.

Clark, Lawrence T. (Phoenix, AZ); McIver, III, John K. (Albuquerque, NM)

2009-11-24T23:59:59.000Z

368

Voltage controlled MESFET pulse shape generator  

SciTech Connect (OSTI)

A programmable pulse shape generator capable of producing pulse shapes for Nova and Beamlet has been designed and simulated using the circuit code SPICE. The design utilizes power MESFETS, which are commonly used in microwave amplifiers. The pulse shape is varied by setting a bias voltage on each in a chain of MESFETS with a 200 ps temporal resolution. The electrical pulse then drives an integrated electro-optic modulator similar to what is on Beamlet. Pulse shapes 22 and 25, used on Nova, have been generated by this design. There is no fundamental barrier to making such a pulse generator for use on the National Ignition Facility. In fact, the longer time scales on the NIF pulse will ease the high speed requirements of the pulse shape generator allowing the use of less expensive components. The next step will be to build a prototype circuit for initial testing on Beamlet and Nova.

Burkhart, S.C.

1994-10-26T23:59:59.000Z

369

Method for voltage-gated protein fractionation  

DOE Patents [OSTI]

We report unique findings on the voltage dependence of protein exclusion from the pores of nanoporous polymer exclusion membranes. The pores are small enough that proteins are excluded from passage with low applied electric fields, but increasing the field enables proteins to pass through. The requisite field necessary for a change in exclusion is protein-specific with a correlation to protein size. The field-dependence of exclusion is important to consider for preconcentration applications. The ability to selectively gate proteins at exclusion membranes is also a promising means for manipulating and characterizing proteins. We show that field-gated exclusion can be used to selectively remove proteins from a mixture, or to selectively trap protein at one exclusion membrane in a series.

Hatch, Anson (Tracy, CA); Singh, Anup K. (Danville, CA)

2012-04-24T23:59:59.000Z

370

Electrochemical Characterization of Voltage Fade in LMR-NMC cells  

Broader source: Energy.gov (indexed) [DOE]

the extent of Voltage Fade December 2012 * Establish baseline data on standard materials to facilitate comparison of various datasets March 2013 * Obtain data to determine...

371

High Temperature, High Voltage Fully Integrated Gate Driver Circuit  

Broader source: Energy.gov (indexed) [DOE]

driver circuit, 5-V on- chip voltage regulator, short-circuit protection, undervoltage lockout, bootstrap capacitor, dead time controller and temperature sensor * 0.8-micron,...

372

Vehicle Technologies Office Merit Review 2014: Voltage Fade,...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Voltage Fade, an ABR Deep Dive Project: Status and Outcomes Presentation given by Argonne National Laboratory at 2014 DOE Hydrogen and Fuel Cells Program and Vehicle...

373

Nanoscale Morphological and Chemical Changes of High Voltage...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nanoscale Morphological and Chemical Changes of High Voltage Lithium-Manganese Rich NMC Composite Cathodes with Cycling Friday, August 29, 2014 Renewable energy is critical for the...

374

active capacitive voltage: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Khoman 5 Discrete Steps in the Capacitance-Voltage Characteristics of GaInNGaN Light Emitting Diode Structures Materials Science Websites Summary: Discrete Steps in the...

375

High Voltage Electrolytes for Li-ion Batteries  

Broader source: Energy.gov (indexed) [DOE]

or otherwise restricted information High Voltage Electrolytes for Li-ion Batteries Vehicle Technologies Program 2 Overview * Start: Sep 2008 * End: Sep 2011 * 20 %...

376

Electrochemical Characterization of Voltage Fade in LMR-NMC cells...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Electrochemical Characterization of Voltage Fade in LMR-NMC cells 2013 DOE Hydrogen and Fuel Cells Program and Vehicle Technologies Program Annual Merit Review and Peer...

377

Triple voltage dc-to-dc converter and method  

DOE Patents [OSTI]

A circuit and method of providing three dc voltage buses and transforming power between a low voltage dc converter and a high voltage dc converter, by coupling a primary dc power circuit and a secondary dc power circuit through an isolation transformer; providing the gating signals to power semiconductor switches in the primary and secondary circuits to control power flow between the primary and secondary circuits and by controlling a phase shift between the primary voltage and the secondary voltage. The primary dc power circuit and the secondary dc power circuit each further comprising at least two tank capacitances arranged in series as a tank leg, at least two resonant switching devices arranged in series with each other and arranged in parallel with the tank leg, and at least one voltage source arranged in parallel with the tank leg and the resonant switching devices, said resonant switching devices including power semiconductor switches that are operated by gating signals. Additional embodiments having a center-tapped battery on the low voltage side and a plurality of modules on both the low voltage side and the high voltage side are also disclosed for the purpose of reducing ripple current and for reducing the size of the components.

Su, Gui-Jia (Knoxville, TN)

2008-08-05T23:59:59.000Z

378

Security seal. [Patent application  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, G.W.

1981-11-17T23:59:59.000Z

379

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | National Nuclear SecurityAdministration

380

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear Forensics Bioinformatics

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Security Clearances; Limitations  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof the Americas | Department ofofDeliveredSectionSecuring theSEC. 1072.

382

Strengthening Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBiSiteNeutronStrategic Plan The

383

Lockout device for high voltage circuit breaker  

SciTech Connect (OSTI)

An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the respective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.

Kozlowski, L.J.; Shirey, L.A.

1993-01-26T23:59:59.000Z

384

Lockout device for high voltage circuit breaker  

DOE Patents [OSTI]

An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the repsective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.

Kozlowski, Lawrence J. (New Kensington, PA); Shirey, Lawrence A. (North Huntingdon, PA)

1993-01-01T23:59:59.000Z

385

Lookout device for high voltage circuit breaker  

SciTech Connect (OSTI)

An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the respective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.

Kozlowski, L.J.; Shirey, L.A.

1991-12-31T23:59:59.000Z

386

Integrated safeguards & security for material protection, accounting, and control.  

SciTech Connect (OSTI)

Traditional safeguards and security design for fuel cycle facilities is done separately and after the facility design is near completion. This can result in higher costs due to retrofits and redundant use of data. Future facilities will incorporate safeguards and security early in the design process and integrate the systems to make better use of plant data and strengthen both systems. The purpose of this project was to evaluate the integration of materials control and accounting (MC&A) measurements with physical security design for a nuclear reprocessing plant. Locations throughout the plant where data overlap occurs or where MC&A data could be a benefit were identified. This mapping is presented along with the methodology for including the additional data in existing probabilistic assessments to evaluate safeguards and security systems designs.

Duran, Felicia Angelica; Cipiti, Benjamin B.

2009-10-01T23:59:59.000Z

387

Local Dynamic Reactive Power for Correction of System Voltage Problems  

SciTech Connect (OSTI)

Distribution systems are experiencing outages due to a phenomenon known as local voltage collapse. Local voltage collapse is occurring in part because modern air conditioner compressor motors are much more susceptible to stalling during a voltage dip than older motors. These motors can stall in less than 3 cycles (.05s) when a fault, such as on the sub-transmission system, causes voltage to sag to 70 to 60%. The reasons for this susceptibility are discussed in the report. During the local voltage collapse, voltages are depressed for a period of perhaps one or two minutes. There is a concern that these local events are interacting together over larger areas and may present a challenge to system reliability. An effective method of preventing local voltage collapse is the use of voltage regulation from Distributed Energy Resources (DER) that can supply or absorb reactive power. DER, when properly controlled, can provide a rapid correction to voltage dips and prevent motor stall. This report discusses the phenomenon and causes of local voltage collapse as well as the control methodology we have developed to counter voltage sag. The problem is growing because of the use of low inertia, high efficiency air conditioner (A/C) compressor motors and because the use of electric A/C is growing in use and becoming a larger percentage of system load. A method for local dynamic voltage regulation is discussed which uses reactive power injection or absorption from local DER. This method is independent, rapid, and will not interfere with conventional utility system voltage control. The results of simulations of this method are provided. The method has also been tested at the ORNL s Distributed Energy Communications and Control (DECC) Laboratory using our research inverter and synchronous condenser. These systems at the DECC Lab are interconnected to an actual distribution system, the ORNL distribution system, which is fed from TVA s 161kV sub-transmission backbone. The test results are also provided and discussed. The simulations and testing show that local voltage control from DER can prevent local voltage collapse. The results also show that the control can be provided so quickly, within 0.5 seconds, that is does not interfere with conventional utility methods.

Kueck, John D [ORNL; Rizy, D Tom [ORNL; Li, Fangxing [ORNL; Xu, Yan [ORNL; Li, Huijuan [University of Tennessee, Knoxville (UTK); Adhikari, Sarina [ORNL; Irminger, Philip [ORNL

2008-12-01T23:59:59.000Z

388

Executive Summary The Payment Card Industry Data Security Standard (PCI DSS) requires Level 1 merchants and  

E-Print Network [OSTI]

system components in order to support business growth. Change control is a complex process merchants and service providers to undergo an onsite assessment of their security systems and procedures processes fail, when changes are made without adequately considering the effect on security, and when

Fisher, Kathleen

389

Review your system access with your company's Information Security Officer. Access that is not  

E-Print Network [OSTI]

. The FBI may be able to help you determine if these contacts pose any risk to you or your company. Change unusual circumstances or noteworthy incidents to your security officer and to the FBI. Notifying the FBI and country threat assessments are available from the FBI upon request. Good security habits will help protect

Shepp, Larry

390

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

391

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

392

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network [OSTI]

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 ? 25, 2010 ESL-HH-10-08-09 Proceedings of the 17... of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...

Ragsdale, G.

393

Secure control systems with application to cyber-physical systems  

SciTech Connect (OSTI)

Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

Dong, Jin [ORNL] [ORNL; Djouadi, Seddik M [ORNL] [ORNL; Nutaro, James J [ORNL] [ORNL; Kuruganti, Phani Teja [ORNL] [ORNL

2014-01-01T23:59:59.000Z

394

Measurement of high voltage using Rutherford backscattering spectrometry  

E-Print Network [OSTI]

A novel variation of Rutherford Backscattering Spectrometry (RBS) has been utilized to measure a high voltage collected on an aluminum target by Direct Energy Conversion. The maximum high voltage on the target was measured to be 97.5 kV +/- 2 k...

Abrego, Celestino Pete

2007-04-25T23:59:59.000Z

395

A LOW-VOLTAGE TEMPERATURE-STABLE MICROMECHANICAL PIEZOELECTRIC OSCILLATOR  

E-Print Network [OSTI]

A LOW-VOLTAGE TEMPERATURE-STABLE MICROMECHANICAL PIEZOELECTRIC OSCILLATOR Reza Abdolvand, Hossein polarization voltages (5-20V) for operation, which complicates the design of the oscillator circuit in today reference oscillator that utilizes a temperature-stable thin- film piezoelectric-on-silicon resonator

Ayazi, Farrokh

396

REFINED RFP LOOP VOLTAGE CALCULATION J.C. Sprott  

E-Print Network [OSTI]

is the stored magnetic energy, Up is the plasma energy, and 'E is the global energy confinement time, which-of-merit for RFP devices is the loop voltage. Low loop voltage implies high plasma temperature and long energy is smallest if the loop is as close to the outside of the shell and as far from the primary windings

Sprott, Julien Clinton

397

LOW VOLTAGE ANALOG CIRCUITS USING STANDARD CMOS TECHNOLOGY  

E-Print Network [OSTI]

LOW VOLTAGE ANALOG CIRCUITS USING STANDARD CMOS TECHNOLOGY Phillip E. Allen, Benjamin J. Blalock, and Gabriel A. Rincon School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta supply voltages in CMOS integrated circuits. As the channel lengths of CMOS technology decrease

Rincon-Mora, Gabriel A.

398

Power Grid Voltage Integrity Verification Department of ECE  

E-Print Network [OSTI]

Power Grid Voltage Integrity Verification Maha Nizam Department of ECE University of Toronto devgan@magma-da.com ABSTRACT Full-chip verification requires one to check if the power grid is safe, i.e., if the voltage drop on the grid does not exceed a cer- tain threshold. The traditional simulation-based solution

Najm, Farid N.

399

Nevada National Security Site Groundwater Program Welcomes Peer Review Team  

Broader source: Energy.gov [DOE]

Recently, an independent peer review team was invited to assess the groundwater characterization program at the Nevada National Security Site (NNSS). This nationally recognized group of experts, from various external organizations, will examine the computer modeling approach developed to better understand how historic underground nuclear testing in Yucca Flat affected the groundwater.

400

Nuclear Physics and National Security in an Age of Terrorism  

E-Print Network [OSTI]

Nuclear Physics and National Security in an Age of Terrorism Jerry Gilfoyle Physics Department, University of Richmond, Virginia Outline: 1. How do we assess the threat? 1. Nuclear Weapons 101 2. Catching to the threat? ­ prevention ­ mitigation (i.e. cleanup, cures, etc.) ­ retaliation #12;Nuclear Weapons 101 What

Gilfoyle, Jerry

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Enabling Secure Ubiquitous Interactions Kevin Eustice, Shane Markstrum, Venkatraman Ramakrishna,  

E-Print Network [OSTI]

, a solid foundation of security and safety must first be in place. Existing research has focused its energy in such environments. We require techniques to assess the appropriate level of required access for an entity within attacking our household WiFi network ­ they will also come in such forms as electronic hitchhikers who latch

California at Los Angeles, University of

402

Living and Working Safely Around High-Voltage Power Lines.  

SciTech Connect (OSTI)

High-voltage transmission lines can be just as safe as the electrical wiring in the homes--or just as dangerous. The crucial factor is ourselves: they must learn to behave safely around them. This booklet is a basic safety guide for those who live and work around power lines. It deals primarily with nuisance shocks due to induced voltages, and with potential electric shock hazards from contact with high-voltage lines. References on possible long-term biological effects of transmission lines are shown. In preparing this booklet, the Bonneville Power Administration has drawn on more than 50 years of experience with high-voltage transmission. BPA operates one of the world`s largest networks of long-distance, high-voltage lines. This system has more than 400 substations and about 15,000 miles of transmission lines, almost 4,400 miles of which are operated at 500,000 volts.

United States. Bonneville Power Administration.

2001-06-01T23:59:59.000Z

403

E-beam high voltage switching power supply  

DOE Patents [OSTI]

A high-power power supply produces a controllable, constant high voltage put under varying and arcing loads. The power supply includes a voltage regulator, an inductor, an inverter for producing a high frequency square wave current of alternating polarity, an improved inverter voltage clamping circuit, a step up transformer, an output rectifier for producing a dc voltage at the output of each module, and a current sensor for sensing output current. The power supply also provides dynamic response to varying loads by controlling the voltage regulator duty cycle and circuitry is provided for sensing incipient arc currents at the output of the power supply to simultaneously decouple the power supply circuitry from the arcing load. The power supply includes a plurality of discrete switching type dc--dc converter modules.

Shimer, Daniel W. (Danville, CA); Lange, Arnold C. (Livermore, CA)

1996-01-01T23:59:59.000Z

404

E-beam high voltage switching power supply  

DOE Patents [OSTI]

A high-power power supply produces a controllable, constant high voltage output under varying and arcing loads. The power supply includes a voltage regulator, an inductor, an inverter for producing a high frequency square wave current of alternating polarity, an improved inverter voltage clamping circuit, a step up transformer, an output rectifier for producing a dc voltage at the output of each module, and a current sensor for sensing output current. The power supply also provides dynamic response to varying loads by controlling the voltage regulator duty cycle and circuitry is provided for sensing incipient arc currents at the output of the power supply to simultaneously decouple the power supply circuitry from the arcing load. The power supply includes a plurality of discrete switching type dc--dc converter modules. 5 figs.

Shimer, D.W.; Lange, A.C.

1996-10-15T23:59:59.000Z

405

Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity  

E-Print Network [OSTI]

The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and ...

Cho, Yiseul

2012-01-01T23:59:59.000Z

406

Dye filled security seal  

DOE Patents [OSTI]

A security seal for providing an indication of unauthorized access to a sealed object includes an elongate member to be entwined in the object such that access is denied unless the member is removed. The elongate member has a hollow, pressurizable chamber extending throughout its length that is filled with a permanent dye under greater than atmospheric pressure. Attempts to cut the member and weld it together are revealed when dye flows through a rupture in the chamber wall and stains the outside surface of the member.

Wilson, Dennis C. W. (Tijeras, NM)

1982-04-27T23:59:59.000Z

407

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScience National

408

National Security Science Archive  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScienceScience »

409

Security | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduled System OutagesNews PressThemesLinksUserSecurity

410

Security | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0

411

PNNL: Security & Privacy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 TheSteven Ashby Dr. Steven Ashby Photo Dr.1999alt=Search

412

Energy Security Overview  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing Zirconia Nanoparticles asSecondCareerFebruaryEnergySecurity Overview We are

413

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The National

414

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The NationalWashington. DC

415

Natlonal Nuclear Security Admlnlstratlon  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy2015 | JeffersonNations

416

Spark-safe low-voltage detonator  

DOE Patents [OSTI]

A column of explosive in a low-voltage detonator which makes it spark-safe ncludes an organic secondary explosive charge of HMX in the form of a thin pad disposed in a bore of a housing of the detonator in an ignition region of the explosive column and adjacent to an electrical ignition device at one end of the bore. The pad of secondary charge has an axial thickness within the range of twenty to thirty percent of its diameter. The explosive column also includes a first explosive charge of CP disposed in the housing bore in the ignition region of the explosive column next to the secondary charge pad on a side opposite from the ignition device. The first CP charge is loaded under sufficient pressure, 25 to 40 kpsi, to provide mechanical confinement of the pad of secondary charge and physical coupling thereof with the ignition device. The explosive column further includes a second explosive charge of CP disposed in the housing bore in a transition region of the explosive column next to the first CP charge on a side opposite from the pad of secondary charge. The second CP charge is loaded under sufficient pressure, about 10 kpsi, to allow occurrence of DDT. The first explosive CP charge has an axial thickness within the range of twenty to thirty percent of its diameter, whereas the second explosive CP charge contains a series of increments (nominally 4) each of which has an axial thickness-to-diameter ratio of one to two.

Lieberman, Morton L. (Albuquerque, NM)

1989-01-01T23:59:59.000Z

417

Bonfire-safe low-voltage detonator  

DOE Patents [OSTI]

A column of explosive in a low-voltage detonator which makes it bonfire-safe includes a first layer of an explosive charge of CP, or a primary explosive, and a second layer of a secondary organic explosive charge, such as PETN, which has a degradation temperature lower than the autoignition temperature of the CP or primary explosives. The first layer is composed of a pair of increments disposed in a bore of a housing of the detonator in an ignition region of the explosive column and adjacent to and in contact with an electrical ignition device at one end of the bore. The second layer is composed of a plurality of increments disposed in the housing bore in a transition region of the explosive column next to and in contact with the first layer on a side opposite from the ignition device. The first layer is loaded under a sufficient high pressure, 25 to 40 kpsi, to achieve ignition, whereas the second layer is loaded under a sufficient low pressure, about 10 kpsi, to allow occurrence of DDT. Each increment of the first and second layers has an axial length-to-diameter ratio of one-half.

Lieberman, Morton L. (Albuquerque, NM)

1990-01-01T23:59:59.000Z

418

Bonfire-safe low-voltage detonator  

DOE Patents [OSTI]

A column of explosive in a low-voltage detonator which makes it bonfire-safe includes a first layer of an explosive charge of CP, or a primary explosive, and a second layer of a secondary organic explosive charge, such as PETN, which has a degradation temperature lower than the autoignition temperature of the CP or primary explosives. The first layer is composed of a pair of increments disposed in a bore of a housing of the detonator in an ignition region of the explosive column and adjacent to and in contact with an electrical ignition device at one end of the bore. The second layer is composed of a plurality of increments disposed in the housing bore in a transition region of the explosive column next to and in contact with the first layer on a side opposite from the ignition device. The first layer is loaded under a sufficient high pressure, 25 to 40 kpsi, to achieve ignition, whereas the second layer is loaded under a sufficient low pressure, about 10 kpsi, to allow occurrence of DDT. Each increment of the first and second layers has an axial length-to-diameter ratio of one-half. 2 figs.

Lieberman, M.L.

1988-07-01T23:59:59.000Z

419

National Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

420

Technology Transfer Success Stories, Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Navigate Home About Us Contact Information Hide Thumbs First Previous Pause Next Last Set Speed Slideshow speed: 5 seconds Move Autoinduction system New Image Set...

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Climate Change and National Security  

E-Print Network [OSTI]

CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

2015-01-01T23:59:59.000Z

422

David Telles wins NNSA Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

who conduct vulnerability analyses, authored the LANL Site Safeguards and Security Plan, and administered the Lab's Performance Assurance Program. Under his leadership,...

423

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

2008-08-12T23:59:59.000Z

424

Secure Data Center (Fact Sheet)  

SciTech Connect (OSTI)

This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

Not Available

2012-08-01T23:59:59.000Z

425

Romantic relationships and adult attachment: providing a secure base for exploration  

E-Print Network [OSTI]

for this study are, ? = .87, M = 3.96, SD = .92. One of the main purposes for the project was to examine how partners influence exploration. Therefore, we developed three measures of Perceptions of Partner and Exploration (PPE). The first, a seven item... measure assesses the “secure” PPE. Participants responded on 7 point Likert scales, with “strongly agree” and “strongly disagree” as anchors. It is the “secure” version because the scale was designed to assess how much partners encourage and support...

Martin, Archibald McLeish, III

2007-09-17T23:59:59.000Z

426

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

1995-09-28T23:59:59.000Z

427

Security classification of information  

SciTech Connect (OSTI)

This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

Quist, A.S.

1993-04-01T23:59:59.000Z

428

High voltage dc--dc converter with dynamic voltage regulation and decoupling during load-generated arcs  

DOE Patents [OSTI]

A high-power power supply produces a controllable, constant high voltage output under varying and arcing loads. The power supply includes a voltage regulator, an inductor, an inverter for producing a high frequency square wave current of alternating polarity, an improved inverter voltage clamping circuit, a step up transformer, an output rectifier for producing a dc voltage at the output of each module, and a current sensor for sensing output current. The power supply also provides dynamic response to varying loads by controlling the voltage regulator duty cycle and circuitry is provided for sensing incipient arc currents at the output of the power supply to simultaneously decouple the power supply circuitry from the arcing load. The power supply includes a plurality of discrete switching type dc--dc converter modules. 5 Figs.

Shimer, D.W.; Lange, A.C.

1995-05-23T23:59:59.000Z

429

High voltage dc-dc converter with dynamic voltage regulation and decoupling during load-generated arcs  

DOE Patents [OSTI]

A high-power power supply produces a controllable, constant high voltage output under varying and arcing loads. The power supply includes a voltage regulator, an inductor, an inverter for producing a high frequency square wave current of alternating polarity, an improved inverter voltage clamping circuit, a step up transformer, an output rectifier for producing a dc voltage at the output of each module, and a current sensor for sensing output current. The power supply also provides dynamic response to varying loads by controlling the voltage regulator duty cycle and circuitry is provided for sensing incipient arc currents at the output of the power supply to simultaneously decouple the power supply circuitry from the arcing load. The power supply includes a plurality of discrete switching type dc--dc converter modules.

Shimer, Daniel W. (Danville, CA); Lange, Arnold C. (Livermore, CA)

1995-01-01T23:59:59.000Z

430

Ideas for Security Assurance in Security Critical Software using Modelica  

E-Print Network [OSTI]

Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

Zhao, Yuxiao

431

Fuel Cell Technology Status - Voltage Degradation (Presentation)  

SciTech Connect (OSTI)

This presentation describes an independent assessment of fuel cell durability status and discusses the project's relevance to the Department of Energy Hydrogen and Fuel Cells Program; NREL's analysis approach; the FY12 technical accomplishments including the fourth annual publication of results; and project collaborations and future work.

Kurtz, J.; Wipke,; Sprik, S.; Saur, G.

2012-06-01T23:59:59.000Z

432

2014 Headquarters Facilities Master Security Plan - Chapter 8...  

Office of Environmental Management (EM)

8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

433

2014 Headquarters Facilities Master Security Plan - Chapter 14...  

Office of Environmental Management (EM)

4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

434

2014 Headquarters Facilities Master Security Plan - Chapter 1...  

Office of Environmental Management (EM)

, Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

435

2014 Headquarters Facilities Master Security Plan - Chapter 10...  

Office of Environmental Management (EM)

0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

436

2014 Headquarters Facilities Master Security Plan - Chapter 3...  

Office of Environmental Management (EM)

3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

437

Panel Session: Optimization Techniques in Voltage Collapse Analysis," IEEE PES Summer Meeting, San Diego, July 14, 1998. Applications of Optimization to Voltage Collapse Analysis  

E-Print Network [OSTI]

Panel Session: Optimization Techniques in Voltage Collapse Analysis," IEEE PES Summer Meeting, San Diego, July 14, 1998. Applications of Optimization to Voltage Collapse Analysis Claudio A. Ca|Thispaper describesseveralapplica- tions of optimization for voltage stability analysis VSA of power systems. Voltage stability prob

Cañizares, Claudio A.

438

Spark-safe low-voltage detonator  

DOE Patents [OSTI]

A column of explosive in a low-voltage detonator which makes it spark-safe includes an organic secondary explosive charge of HMX in the form of a thin pad disposed in a bore of a housing of the detonator in an ignition region of the explosive column and adjacent to an electrical ignition device at one end of the bore. The pad of secondary charge has an axial thickness within the range of twenty to thirty percent of its diameter. The explosive column also includes a first explosive charge of CP disposed in the housing bore in the ignition region of the explosive column next to the secondary charge pad on a side opposite from the ignition device. The first CP charge is loaded under sufficient pressure, 25 to 40 kpsi, to provide mechanical confinement of the pad of secondary charge and physical coupling thereof with the ignition device. The explosive column further includes a second explosive charge of CP disposed in the housing bore in a transition region of the explosive column next to the first CP charge on a side opposite from the pad of secondary charge. The second CP charge is loaded under sufficient pressure, about 10 kpsi, to allow occurrence of DDT. The first explosive CP charge has an axial thickness within the range of twenty to thirty percent of its diameter, whereas the second explosive CP charge contains a series of increments (nominally 4), each of which has an axial thickness-to-diameter ratio of one to two. 2 figs.

Lieberman, M.L.

1988-07-01T23:59:59.000Z

439

Electro-optic voltage sensor with Multiple Beam Splitting  

DOE Patents [OSTI]

A miniature electro-optic voltage sensor system capable of accurate operation at high voltages without use of the dedicated voltage dividing hardware. The invention achieves voltage measurement without significant error contributions from neighboring conductors or environmental perturbations. The invention employs a transmitter, a sensor, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor. Within the sensor the beam undergoes the Pockels electro-optic effect. The electro-optic effect produces a modulation of the beam's polarization, which is in turn converted to a pair of independent conversely-amplitude-modulated signals, from which the voltage of the E-field is determined by the signal processor. The use of converse AM signals enables the signal processor to better distinguish signal from noise. The sensor converts the beam by splitting the beam in accordance with the axes of the beam's polarization state (an ellipse) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured.

Woods, Gregory K. (Cornelius, OR); Renak, Todd W. (Idaho Falls, ID); Crawford, Thomas M. (Idaho Falls, ID); Davidson, James R. (Idaho Falls, ID)

2000-01-01T23:59:59.000Z

440

Electro-optic voltage sensor with beam splitting  

DOE Patents [OSTI]

The invention is a miniature electro-optic voltage sensor system capable of accurate operation at high voltages without use of the dedicated voltage dividing hardware typically found in the prior art. The invention achieves voltage measurement without significant error contributions from neighboring conductors or environmental perturbations. The invention employs a transmitter, a sensor, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor. Within the sensor the beam undergoes the Pockels electro-optic effect. The electro-optic effect produces a modulation of the beam's polarization, which is in turn converted to a pair of independent conversely-amplitude-modulated signals, from which the voltage of the E-field is determined by the signal processor. The use of converse AM signals enables the signal processor to better distinguish signal from noise. The sensor converts the beam by splitting the beam in accordance with the axes of the beam's polarization state (an ellipse) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured.

Woods, Gregory K. (Cornelius, OR); Renak, Todd W. (Idaho Falls, ID); Davidson, James R. (Idaho Falls, ID); Crawford, Thomas M. (Idaho Falls, ID)

2002-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Workshop on Education in Computer Security Page 1 Computer Security in Introductory Programming Classes  

E-Print Network [OSTI]

of domains occurs in a secure manner (as defined by the site security policy) and that the change in domains

Bishop, Matt

442

Secure Interoperable Open Smart Grid Demonstration Project  

SciTech Connect (OSTI)

The Consolidated Edison, Inc., of New York (Con Edison) Secure Interoperable Open Smart Grid Demonstration Project (SGDP), sponsored by the United States (US) Department of Energy (DOE), demonstrated that the reliability, efficiency, and flexibility of the grid can be improved through a combination of enhanced monitoring and control capabilities using systems and resources that interoperate within a secure services framework. The project demonstrated the capability to shift, balance, and reduce load where and when needed in response to system contingencies or emergencies by leveraging controllable field assets. The range of field assets includes curtailable customer loads, distributed generation (DG), battery storage, electric vehicle (EV) charging stations, building management systems (BMS), home area networks (HANs), high-voltage monitoring, and advanced metering infrastructure (AMI). The SGDP enables the seamless integration and control of these field assets through a common, cyber-secure, interoperable control platform, which integrates a number of existing legacy control and data systems, as well as new smart grid (SG) systems and applications. By integrating advanced technologies for monitoring and control, the SGDP helps target and reduce peak load growth, improves the reliability and efficiency of Con Edison’s grid, and increases the ability to accommodate the growing use of distributed resources. Con Edison is dedicated to lowering costs, improving reliability and customer service, and reducing its impact on the environment for its customers. These objectives also align with the policy objectives of New York State as a whole. To help meet these objectives, Con Edison’s long-term vision for the distribution grid relies on the successful integration and control of a growing penetration of distributed resources, including demand response (DR) resources, battery storage units, and DG. For example, Con Edison is expecting significant long-term growth of DG. The SGDP enables the efficient, flexible integration of these disparate resources and lays the architectural foundations for future scalability. Con Edison assembled an SGDP team of more than 16 different project partners, including technology vendors, and participating organizations, and the Con Edison team provided overall guidance and project management. Project team members are listed in Table 1-1.

Magee, Thoman

2014-12-31T23:59:59.000Z

443

Pricing Security L. Jean Camp  

E-Print Network [OSTI]

documented, with free patches, continue to exist on the Internet(Farmer, 1999). An alternative solution on the issues of defining the good and jumpstarting a market in the information survivability workshop. Security, the lack of security on one machine can cause adverse effects on another. The most obvious example

Camp, L. Jean

444

Fluid Mechanics and Homeland Security  

E-Print Network [OSTI]

Fluid Mechanics and Homeland Security Gary S. Settles Mechanical and Nuclear Engineering Department. 2006. 38:87­110 The Annual Review of Fluid Mechanics is online at fluid.annualreviews.org doi: 10 security involves many applications of fluid mechanics and offers many opportunities for research

Settles, Gary S.

445

Reporting Incidents Of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

2001-04-03T23:59:59.000Z

446

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

447

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

448

FOOD SECURITY: WAYS FORWARD THROUGH  

E-Print Network [OSTI]

FOOD SECURITY: WAYS FORWARD THROUGH COOPERATIVE PRODUCTION AND MARKETING1 "Given the chance, poor. The Sustainable Community Connections project, coordinated by AWISH-HELLAS, seeks to address food security issues) olive oil-related products, with targeting of markets in the European Union (EU) and United States (US

Zaferatos, Nicholas C.

449

Optically triggered high voltage switch network and method for switching a high voltage  

DOE Patents [OSTI]

An optically triggered solid state switch and method for switching a high voltage electrical current. A plurality of solid state switches (350) are connected in series for controlling electrical current flow between a compensation capacitor (112) and ground in a reactive power compensator (50, 50') that monitors the voltage and current flowing through each of three distribution lines (52a, 52b and 52c), which are supplying three-phase power to one or more inductive loads. An optical transmitter (100) controlled by the reactive power compensation system produces light pulses that are conveyed over optical fibers (102) to a switch driver (110') that includes a plurality of series connected optical triger circuits (288). Each of the optical trigger circuits controls a pair of the solid state switches and includes a plurality of series connected resistors (294, 326, 330, and 334) that equalize or balance the potential across the plurality of trigger circuits. The trigger circuits are connected to one of the distribution lines through a trigger capacitor (340). In each switch driver, the light signals activate a phototransistor (300) so that an electrical current flows from one of the energy reservoir capacitors through a pulse transformer (306) in the trigger circuit, producing gate signals that turn on the pair of serially connected solid state switches (350).

El-Sharkawi, Mohamed A. (Renton, WA); Andexler, George (Everett, WA); Silberkleit, Lee I. (Mountlake Terrace, WA)

1993-01-19T23:59:59.000Z

450

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

1995-09-28T23:59:59.000Z

451

Office of Headquarters Personnel Security Operations  

Broader source: Energy.gov [DOE]

The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

452

Departmental Personnel Security- Policy and Procedures  

Broader source: Energy.gov [DOE]

Departmental Personnel Security provides centralized and authoritative policy guidance and ensures consistent and effective implementation of the DOE personnel security program Department-wide to include the National Nuclear Security Administration.

453

A capacitor-less low drop-out voltage regulator with fast transient response  

E-Print Network [OSTI]

. Most systems incorporate several voltage regulators which supply various subsystems and provide isolation among such subsystems. Low dropout (LDO) voltage regulators are generally used to supply low voltage, low noise analog circuitry. Each LDO...

Milliken, Robert Jon

2006-04-12T23:59:59.000Z

454

A Comparison of High-Voltage Switches  

SciTech Connect (OSTI)

This report summarizes our work on high-voltage switches during the past few years. With joint funding from the Department of Energy (DOE) and the Department of Defense (DOD), we tested a wide variety of switches to a common standard. This approach permitted meaningful comparisons between disparate switches. Most switches were purchased from commercial sources, though some were experimental devices. For the purposes of this report, we divided the switches into three generic types (gas, vacuum, and semiconductor) and selected data that best illustrates important strengths and weaknesses of each switch type. Test techniques that indicate the state of health of the switches are emphasized. For example, a good indicator of residual gas in a vacuum switch is the systematic variation of the switching delay in response to changes in temperature and/or operating conditions. We believe that the presentation of this kind of information will help engineers to select and to test switches for their particular applications. Our work was limited to switches capable of driving slappers. Also known as exploding-foil initiators, slappers are detonators that initiate a secondary explosive by direct impact with a small piece of matter moving at the detonation velocity (several thousands of meters per second). A slapper is desirable for enhanced safety (no primary explosive), but it also places extra demands on the capacitor-discharge circuit to deliver a fast-rising current pulse (greater than 10 A/ns) of several thousand amperes. The required energy is substantially less than one joule; but this energy is delivered in less than one microsecond, taking the peak power into the megawatt regime. In our study, the switches operated in the 1 kV to 3 kV range and were physically small, roughly 1 cm{sup 3} or less. Although a fuze functions only once in actual use, multiple-shot capability is important for production testing and for research work. For this reason, we restricted this report to multiple-shot switches. Furthermore, our work included only switches with submicrosecond timing precision, thereby excluding mechanical switches.

Chu, K.W.; Scott, G.L.

1999-02-01T23:59:59.000Z

455

Multilevel cascade voltage source inverter with seperate DC sources  

DOE Patents [OSTI]

A multilevel cascade voltage source inverter having separate DC sources is described herein. This inverter is applicable to high voltage, high power applications such as flexible AC transmission systems (FACTS) including static VAR generation (SVG), power line conditioning, series compensation, phase shifting and voltage balancing and fuel cell and photovoltaic utility interface systems. The M-level inverter consists of at least one phase wherein each phase has a plurality of full bridge inverters equipped with an independent DC source. This inverter develops a near sinusoidal approximation voltage waveform with only one switching per cycle as the number of levels, M, is increased. The inverter may have either single-phase or multi-phase embodiments connected in either wye or delta configurations.

Peng, Fang Zheng (Oak Ridge, TN); Lai, Jih-Sheng (Knoxville, TN)

1997-01-01T23:59:59.000Z

456

Multilevel cascade voltage source inverter with separate DC sources  

DOE Patents [OSTI]

A multilevel cascade voltage source inverter having separate DC sources is described herein. This inverter is applicable to high voltage, high power applications such as flexible AC transmission systems (FACTS) including static VAR generation (SVG), power line conditioning, series compensation, phase shifting and voltage balancing and fuel cell and photovoltaic utility interface systems. The M-level inverter consists of at least one phase wherein each phase has a plurality of full bridge inverters equipped with an independent DC source. This inverter develops a near sinusoidal approximation voltage waveform with only one switching per cycle as the number of levels, M, is increased. The inverter may have either single-phase or multi-phase embodiments connected in either wye or delta configurations. 15 figs.

Peng, F.Z.; Lai, J.S.

1997-06-24T23:59:59.000Z

457

Unravelling the Performance Degradation Mechanisms in High-voltage...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Unravelling the Performance Degradation Mechanisms in High-voltage Lithium-ion Battery Composite Oxide Electrodes Apr 11 2014 02:00 PM - 03:00 PM Debasish Mohanty, ORNL, Oak Ridge...

458

Stability issues in IC Low Drop Out voltage regulators  

E-Print Network [OSTI]

Performance issues of IC Low Drop Out (LDO) voltage regulators, with specific reference to stability, are discussed in this thesis. Evaluation of existing frequency compensation schemes and their performances across operating loads is presented...

Chava, Krishna Chaitanya

2002-01-01T23:59:59.000Z

459

Operation of buck regulator with ultra-low input voltage  

E-Print Network [OSTI]

Based on the LTC3621 and LTC3624, the designed buck regulator proposed in this thesis aims to lower the allowed input voltage and increase efficiency compared to the original part without making significant changes to ...

Harris, Cory Angelo

2014-01-01T23:59:59.000Z

460

Voltage Dependent Charge Storage Modes and Capacity in Subnanometer Pores  

SciTech Connect (OSTI)

Using molecular dynamics simulations, we show that charge storage in subnanometer pores follows a distinct voltage-dependent behavior. Specifically, at lower voltages, charge storage is achieved by swapping co-ions in the pore with counterions in the bulk electrolyte. As voltage increases, further charge storage is due mainly to the removal of co-ions from the pore, leading to a capacitance increase. The capacitance eventually reaches a maximum when all co-ions are expelled from the pore. At even higher electrode voltages, additional charge storage is realized by counterion insertion into the pore, accompanied by a reduction of capacitance. The molecular mechanisms of these observations are elucidated and provide useful insight for optimizing energy storage based on supercapacitors.

Qiao, Rui [Clemson University; Meunier, V. [Rensselaer Polytechnic Institute (RPI); Huang, Jingsong [ORNL; Wu, Peng [ORNL; Sumpter, Bobby G [ORNL

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

An Adaptive Voltage Control Algorithm with Multiple Distributed Energy  

SciTech Connect (OSTI)

Distributed energy resources (DE) with power electronics (PE) interfaces with the right control are capable of providing reactive power related ancillary services. Voltage regulation in particular has drawn much attention. In this paper the challenges to control multiple DEs to regulate the local voltage in distribution systems is addressed and a decentralized adaptive voltage control method is proposed. The simulation results in different system conditions show that this adaptive voltage control method is capable of satisfying the fast response speed requirement without causing oscillation or instability of the system. Since this method has high tolerance to the shortage of the system parameters and can be widely adaptive to the variable operation situations of the power systems, it is very suited for the utility application.

Li, Huijuan [University of Tennessee, Knoxville (UTK); Li, Fangxing [ORNL; Adhikari, Sarina [ORNL; Xu, Yan [ORNL; Rizy, D Tom [ORNL; Kueck, John D [ORNL

2009-01-01T23:59:59.000Z

462

Modeling the operating voltage of liquid metal battery cells  

E-Print Network [OSTI]

A one-dimensional, integrative model of the voltage during liquid metal battery operation has been developed to enhance the understanding of performance at the cell level. Two liquid metal batteries were studied: Mg-Sb for ...

Newhouse, Jocelyn Marie

2014-01-01T23:59:59.000Z

463

Multilevel cascade voltage source inverter with seperate DC sources  

DOE Patents [OSTI]

A multilevel cascade voltage source inverter having separate DC sources is described herein. This inverter is applicable to high voltage, high power applications such as flexible AC transmission systems (FACTS) including static VAR generation (SVG), power line conditioning, series compensation, phase shifting and voltage balancing and fuel cell and photovoltaic utility interface systems. The M-level inverter consists of at least one phase wherein each phase has a plurality of full bridge inverters equipped with an independent DC source. This inverter develops a near sinusoidal approximation voltage waveform with only one switching per cycle as the number of levels, M, is increased. The inverter may have either single-phase or multi-phase embodiments connected in either wye or delta configurations.

Peng, Fang Zheng (Knoxville, TN); Lai, Jih-Sheng (Blacksburg, VA)

2002-01-01T23:59:59.000Z

464

High frequency AC power converter for low voltage circuits  

E-Print Network [OSTI]

This thesis presents a novel AC power delivery architecture that is suitable for VHF frequency (50-100MHz) polyphase AC/DC power conversion in low voltage integrated circuits. A complete AC power delivery architecture was ...

Salazar, Nathaniel Jay Tobias

2012-01-01T23:59:59.000Z

465

Planar LTCC transformers for high voltage flyback converters: Part II.  

SciTech Connect (OSTI)

This paper is a continuation of the work presented in SAND2007-2591 'Planar LTCC Transformers for High Voltage Flyback Converters'. The designs in that SAND report were all based on a ferrite tape/dielectric paste system originally developed by NASCENTechnoloy, Inc, who collaborated in the design and manufacturing of the planar LTCC flyback converters. The output/volume requirements were targeted to DoD application for hard target/mini fuzing at around 1500 V for reasonable primary peak currents. High voltages could be obtained but with considerable higher current. Work had begun on higher voltage systems and is where this report begins. Limits in material properties and processing capabilities show that the state-of-the-art has limited our practical output voltage from such a small part volume. In other words, the technology is currently limited within the allowable funding and interest.

Schofield, Daryl (NASCENTechnology, Inc., Watertown, SD); Schare, Joshua M., Ph.D.; Slama, George (NASCENTechnology, Inc., Watertown, SD); Abel, David (NASCENTechnology, Inc., Watertown, SD)

2009-02-01T23:59:59.000Z

466

Secondary Control for Voltage Unbalance Compensation in an Islanded Microgrid  

E-Print Network [OSTI]

coupling (PCC). Unbalance compensation is achieved by proper control of distributed generators (DGs unbalance. Keywords-distributed generation; microgrid; secondary control; voltage unbalance compensation I. INTRODUCTION Distributed Generators (DGs) may be connected individually to the utility grid or be integrated

Vasquez, Juan Carlos

467

IMPACT OF DYNAMIC VOLTAGE SCALING (DVS) ON CIRCUIT OPTIMIZATION  

E-Print Network [OSTI]

Circuit designers perform optimization procedures targeting speed and power during the design of a circuit. Gate sizing can be applied to optimize for speed, while Dual-VT and Dynamic Voltage Scaling (DVS) can be applied to optimize for leakage...

Esquit Hernandez, Carlos A.

2010-01-16T23:59:59.000Z

468

Design & Fabrication of a High-Voltage Photovoltaic Cell  

SciTech Connect (OSTI)

Silicon photovoltaic (PV) cells are alternative energy sources that are important in sustainable power generation. Currently, applications of PV cells are limited by the low output voltage and somewhat low efficiency of such devices. In light of this fact, this project investigates the possibility of fabricating high-voltage PV cells on float-zone silicon wafers having output voltages ranging from 50 V to 2000 V. Three designs with different geometries of diffusion layers were simulated and compared in terms of metal coverage, recombination, built-in potential, and conduction current density. One design was then chosen and optimized to be implemented in the final device design. The results of the simulation serve as a feasibility test for the design concept and provide supportive evidence of the effectiveness of silicon PV cells as high-voltage power supplies.

Felder, Jennifer; /North Carolina State U. /SLAC

2012-09-05T23:59:59.000Z

469

High-voltage air-core pulse transformers  

SciTech Connect (OSTI)

General types of air core pulse transformers designed for high voltage pulse generation and energy transfer applications are discussed with special emphasis on pulse charging systems which operate up to the multi-megavolt range. The design, operation, dielectric materials, and performance are described. It is concluded that high voltage air core pulse transformers are best suited to applications outside the normal ranges of conventional magnetic core transformers. In general these include charge transfer at high power levels and fast pulse generation with comparatively low energy. When properly designed and constructed, they are capable of delivering high energy transfer efficiency and have demonstrated superior high voltage endurance. The principal disadvantage of high voltage air core transformers is that they are not generally available from commercial sources. Consequently, the potential user must become thoroughly familiar with all aspects of design, fabrication and system application before he can produce a high performance transformer system. (LCL)

Rohwein, G. J.

1981-01-01T23:59:59.000Z

470

Time varying voltage combustion control and diagnostics sensor  

DOE Patents [OSTI]

A time-varying voltage is applied to an electrode, or a pair of electrodes, of a sensor installed in a fuel nozzle disposed adjacent the combustion zone of a continuous combustion system, such as of the gas turbine engine type. The time-varying voltage induces a time-varying current in the flame which is measured and used to determine flame capacitance using AC electrical circuit analysis. Flame capacitance is used to accurately determine the position of the flame from the sensor and the fuel/air ratio. The fuel and/or air flow rate (s) is/are then adjusted to provide reduced flame instability problems such as flashback, combustion dynamics and lean blowout, as well as reduced emissions. The time-varying voltage may be an alternating voltage and the time-varying current may be an alternating current.

Chorpening, Benjamin T. (Morgantown, WV); Thornton, Jimmy D. (Morgantown, WV); Huckaby, E. David (Morgantown, WV); Fincham, William (Fairmont, WV)

2011-04-19T23:59:59.000Z

471

Evaluation Report on "The Department's Unclassified Cyber Security Program"  

SciTech Connect (OSTI)

Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to resolution in the organizations' Plans of Action and Milestones. Our testing disclosed that about 39 p

None

2009-10-01T23:59:59.000Z

472

Independent Activity Report, Office of Secure Transportation...  

Broader source: Energy.gov (indexed) [DOE]

Office of Secure Transportation - March 2011 Independent Activity Report, Office of Secure Transportation - March 2011 March 2011 Report for the Appropriateness of Revisions to the...

473

Independent Oversight Evaluation, Office of Secure Transportation...  

Office of Environmental Management (EM)

Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office...

474

Independent Oversight Inspection, Office of Secure Transportation...  

Office of Environmental Management (EM)

Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the...

475

Security & Defense Licenses Available | Tech Transfer | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...

476

Homeland Security and Emergency Management Coordination (HSEMC...  

National Nuclear Security Administration (NNSA)

Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

477

Preliminary Notice of Violation, National Security Technologies...  

Office of Environmental Management (EM)

Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 August 11,...

478

Safety and Security Enforcement Process Overview  

Broader source: Energy.gov (indexed) [DOE]

SAFETY AND SECURITY ENFORCEMENT PROCESS OVERVIEW August 2012 OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF HEALTH, SAFETY AND SECURITY U.S. DEPARTMENT OF ENERGY AUGUST 2012 DOE...

479

Safety and Security Enforcement Coordinator Handbook  

Broader source: Energy.gov (indexed) [DOE]

SAFETY AND SECURITY ENFORCEMENT COORDINATOR HANDBOOK August 2012 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy AUGUST 2012 DOE...

480

Harold Washington Social Security Administration (SSA) Center...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

Note: This page contains sample records for the topic "voltage security assessment" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

National Securities Technologies _NSTec_ Livermore Operations...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration NRTL Nationally Recognized Testing Laboratory NSTec National Security Technologies, LLC NTS Nevada Test Site OSHA Occupational Safety and...

482

Preliminary Notice of Violation, National Security Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

a Preliminary Notice of Violation (SEA-2014-02) to National Security Technologies, LLC (NSTec), for violations of Department of Energy's classified information security program...

483

National Nuclear Security Administration Appropriation and Program...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4 National Nuclear Security Administration Appropriation and Program Summary Tables Outyear Appropriation Summary Tables FY 2012 BUDGET TABLES National Nuclear Security...

484

Independent Oversight Review, Nevada National Security Site,...  

Broader source: Energy.gov (indexed) [DOE]

and Special Door Interlock systems at the Nevada National Security Site (NNSS) Device Assembly Facility (DAF). The NNSS DAF is operated by National Security Technologies, LLC...

485

Automated Security Compliance Tool for the Cloud.  

E-Print Network [OSTI]

?? Security, especially security compliance, is a major concern that is slowing down the large scale adoption of cloud computing in the enterprise environment. Business… (more)

Ullah, Kazi Wali

2012-01-01T23:59:59.000Z

486

Independent Oversight Activity Report, Nevada National Security...  

Office of Environmental Management (EM)

Report, Nevada National Security Site - March 3-6, 2014 March 2014 Operational Awareness Oversight of the Nevada National Security Site HIAR NNSS-2014-03-03 This...

487

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Broader source: Energy.gov (indexed) [DOE]

COUNTRIES More Documents & Publications 2014 Headquarters Facilities Master Security Plan - Chapter 6, Foreign Interaction PSH-12-0117 - In the matter of Personnel Security...

488

Extension of DOE Directive on Cyber Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

2003-06-04T23:59:59.000Z

489

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

Amin, Saurabh

2011-01-01T23:59:59.000Z

490

ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING...  

Broader source: Energy.gov (indexed) [DOE]

8: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS Protection program records include the...

491

Enforcement Letter, Consolidated Nuclear Security, LLC | Department...  

Energy Savers [EERE]

security incidents involving the unclassified waste stream and discrepancies in the inventory of accountable nuclear material at DOE's Y-12 National Security Complex in Oak...

492

Sinusoidal voltage controlled oscillators using operational transconductance amplifiers  

E-Print Network [OSTI]

SINUSOIDAI. VOLTAGE CONTROLLED OSCILLATORS I. SING OPERATIONAL TRANSCONDUCTANCE AMPLIFIERS A Thesis JAVIFB . IOAQUIN HOYI. K I'ASSANO Suhndtted to the Graduate College ol' 'I'exes A8cM University in partial fulfillment of the requirement... for the degree of MASTER OF SCIENCE May 1985 Major Subject: Electrical Engineering SINUSOIDAL VOLTAGE CONTROLLED OSCILLATORS USING OPERATIONAI, TRANSCONDUCTANCE AMPLIFIERS A Thesis by JAVIER JOAQUIN HOYLE PASSANO Approved as to style and content by: o...

Hoyle Passano, Javier Joaquin

1985-01-01T23:59:59.000Z

493

Image-line voltage controlled oscillators and grating antennas  

E-Print Network [OSTI]

IMAGE-LINE VOLTAGE CONTROLLED OSCILLATORS AND GRATING ANTENNAS A Thesis by ALEXANDER MacDONALD KIRK Submitted to the Office of Graduate Studies of Texas ABM University in partial fulfillment of the requirements for the degree of MASTER... OF SCIENCE May 1991 Major Subject: Electrical Engineering IMAGE-LINE VOLTAGE CONTROLLED OSCILLATORS AND GRATING ANTENNAS A Thesis by ALEXANDER MacDONALD KIRK Approved as to style and content by: Kai Chang (Chair of Committee) Robert D. Nevels...

Kirk, Alexander MacDonald

1991-01-01T23:59:59.000Z

494

Design issues for high voltage converters for ion engines  

SciTech Connect (OSTI)

A design strategy is presented for a power converter for a high voltage ion engine for a spacecraft application. Various design issues such as appropriate topologies and control methods are considered. In this particular instance it was determined that a full bridge converter with phase shift gating and voltage mode control provided an efficient system with a minimum of electromagnetic interference. This system can be implemented in a straightforward manner, and it is relatively easy to protect from faults at the output.

King, R.J.; Stuart, T.A. [Univ. of Toledo, OH (United States)

1995-12-31T23:59:59.000Z

495

LM111/LM211/LM311 Voltage Comparator  

E-Print Network [OSTI]

LM111/LM211/LM311 Voltage Comparator 1.0 General Description The LM111, LM211 and LM311 are voltage comparators that have input currents nearly a thousand times lower than devices like the LM106 or LM710A. Both the inputs and the outputs of the LM111, LM211 or the LM311 can be isolated from system ground

Lanterman, Aaron

496

Measuring Helical FCG Voltage with an Electric Field Antenna  

SciTech Connect (OSTI)

A method of measuring the voltage produced by a helical explosive flux compression generator using a remote electric field antenna is described in detail. The diagnostic has been successfully implemented on several experiments. Measured data from the diagnostic compare favorably with voltages predicted using the code CAGEN, validating our predictive modeling tools. The measured data is important to understanding generator performance, and is measured with a low-risk, minimally intrusive approach.

White, A D; Anderson, R A; Javedani, J B; Reisman, D B; Goerz, D A; Ferriera, A J; Speer, R D

2011-08-01T23:59:59.000Z

497

Chloromethyl chlorosulfate as a voltage delay inhibitor in lithium cells  

DOE Patents [OSTI]

Chloromethyl chlorosulfate (CMCS) is used as a passive film growth inhibitor in electrochemical cells to minimize voltage delay and low-voltage discharge. Film growth on lithium anodes is significantly diminished when CMCS is added to SOCl[sub 2] and SO[sub 2]Cl[sub 2] electrolytes of lithium batteries. The CMCS also has the effect of extending the shelf-life of Li/SOCl[sub 2] and Li/SO[sub 2]Cl[sub 2] batteries.

Delnick, F.M.

1993-04-13T23:59:59.000Z

498

Chloromethyl chlorosulfate as a voltage delay inhibitor in lithium cells  

DOE Patents [OSTI]

Chloromethyl chlorosulfate (CMCS) is used as a passive film growth inhibitor in electrochemical cells to minimize voltage delay and low-voltage discharge. Film growth on lithium anodes is significantly diminished when CMCS is added to SOCl.sub.2 and SO.sub.2 Cl.sub.2 electrolytes of lithium batteries. The CMCS also has the effect of extending the shelf-life of Li/SOCl.sub.2 and Li/SO.sub.2 Cl.sub.2 batteries.

Delnick, Frank M. (Albuquerque, NM)

1993-01-01T23:59:59.000Z

499

STARS Training Needs Assessment Learner Instructions 07/2009 1 STARS Training Needs Assessment  

E-Print Network [OSTI]

STARS Training Needs Assessment Learner Instructions 07/2009 1 STARS Training Needs Assessment. · Click the STARS (Training) tab. · Click My Training Needs in the left menu. · Click the secure link to continue to My Training Needs. On the Training Needs Assessment page, click the box to the left of every

Ford, James

500

Centralized wind power plant voltage control with optimal power flow algorithm.  

E-Print Network [OSTI]

??This thesis presents a method of controlling the reactive power injected into a medium-voltage collection system by multiple wind turbine generators such that the voltage… (more)

Kline, Jared Andrew

2011-01-01T23:59:59.000Z