Sample records for voltage security assessment

  1. IEEE TRANSACTIONS ON POWER SYSTEMS, VOL. 15, NO. 3, AUGUST 2000 1137 A Fast Voltage Security Assessment

    E-Print Network [OSTI]

    Venkatasubramanian, Mani V.

    ], the prominent methods in voltage stability analysis are those that find the system load margin, especially when system contingencies are considered. Associated with the curve, the real power margin and with the curve] and Chiang et al. [6] proposed fast curve fitting methods to calculate the limit of the nose curve; while

  2. Re-Dispatching Generation to Increase Power System Security Margin and Support Low Voltage Bus

    E-Print Network [OSTI]

    Re-Dispatching Generation to Increase Power System Security Margin and Support Low Voltage Bus by re-dispatching generator outputs, using a normal vector found at a voltage collapse boundary or a low voltage boundary (LVB). This method uses the normal vector as an indicator to change the generation

  3. Independent Oversight Assessment, Y-12 National Security Complex...

    Office of Environmental Management (EM)

    Y-12 National Security Complex - June 2012 Independent Oversight Assessment, Y-12 National Security Complex - June 2012 June 2012 Assessment of Nuclear Safety Culture at the Y-12...

  4. Enterprise Assessments Review of the Y-12 National Security Complex...

    Office of Environmental Management (EM)

    Enterprise Assessments Review of the Y-12 National Security Complex 2014 Site-Level Exercise - January 2015 Enterprise Assessments Review of the Y-12 National Security Complex 2014...

  5. Nevada National Security Site Performance Assessment Updates...

    Office of Environmental Management (EM)

    December 11 and 12, 2014 To view all the P&RA CoP 2014 Technical Exchange Meeting videos click here. Video Presentation Nevada National Security Site Performance Assessment...

  6. Multi-objective Optimal Power Flows to Evaluate Voltage Security Costs in Power Networks

    E-Print Network [OSTI]

    Cañizares, Claudio A.

    1 Multi-objective Optimal Power Flows to Evaluate Voltage Security Costs in Power Networks William Abstract-- In this paper, new optimal power flow (OPF) tech- niques are proposed based on multi- dard power flow models. The results obtained using the proposed mixed OPFs are compared and analyzed

  7. Assessing the Security Vulnerabilities of Correctional Facilities

    SciTech Connect (OSTI)

    Morrison, G.S.; Spencer, D.S.

    1998-10-27T23:59:59.000Z

    The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

  8. Enterprise Assessments Targeted Review,Y-12 National Security...

    Office of Environmental Management (EM)

    Y-12 National Security Complex - March 2015 Enterprise Assessments Targeted Review,Y-12 National Security Complex - March 2015 March 2015 Targeted Review of Work Planning and...

  9. Cyber Assessment Methods For SCADA Security

    SciTech Connect (OSTI)

    May Robin Permann; Kenneth Rohde

    2005-06-01T23:59:59.000Z

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  10. Cyber Assessment Methods for SCADA Security

    SciTech Connect (OSTI)

    Not Available

    2005-06-01T23:59:59.000Z

    The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

  11. An Impact Assessment Model for Distributed Adaptive Security Situation Assessment*

    E-Print Network [OSTI]

    California at Davis, University of

    1 An Impact Assessment Model for Distributed Adaptive Security Situation Assessment* Mark Heckman mechanism is not simply to stop attacks, but to protect a computing resource so that the resource can continue to perform its function. A computing resource, however, is only a component of a larger system

  12. Development of a Software SecurityAssessment Instrument to Reduce Software SecurityRisk

    E-Print Network [OSTI]

    Bishop, Matt

    system, has vulnerabilities. (SAT) for use in the software development and maintenance life cycle throughout the sofhvare development and maintenance life cycle. The. security assessment instrument includes security assessment for use in the software development and maintenance life cycle. Currently

  13. Research progress in dynamic security assessment

    SciTech Connect (OSTI)

    Not Available

    1982-12-01T23:59:59.000Z

    Areas discussed are power system modeling, state estimation, structure decomposition, state forecasting, clustering and security measure development. A detailed dynamic model of a multi-machine power system has been developed. A process state estimator was developed to estimate the long-term dynamic behavior of the power system. The algorithm is identical to the extended Kalman filter but has a modified process noise driving term. A two-stage structure estimation technique was proposed for identifying the power system network configuration. Two approaches to structure decomposition were investigated. A time-scale decomposition of the system equations, based on a singular perturbation approach, was evaluated using a detailed model of a generating system. Spatial decomposition was examined by applying an optimal network decomposition technique to a 39-bus test system. Stochastic approximation based approaches to estimator simplification were examined. Explicit expressions were obtained for the evolution of the first and second moments of the system state. Research into security measures proceeded in three directions. The first area involves viewing the security assessment problem as a hyperplane crossing problem for a stochastic process. The second approach examined the stability of an unforced linear system where the system coefficients are subject to future jumps. The third area of research has led to the formulation of a security measure suitable for on-line assessment of transient stability.

  14. Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution

    SciTech Connect (OSTI)

    Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

    2010-04-30T23:59:59.000Z

    Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

  15. Y-12 National Security Complex Water Assessment

    SciTech Connect (OSTI)

    Elam, Shana E.; Bassett, P.; McMordie Stoughton, Kate

    2010-11-01T23:59:59.000Z

    The Department of Energy's Federal Energy Management Program (FEMP) sponsored a water assessment at the Y 12 National Security Complex (Y 12) located in Oak Ridge, Tennessee. Driven by mandated water reduction goals of Executive Orders 13423 and 13514, the objective of the water assessment is to develop a comprehensive understanding of the current water-consuming applications and equipment at Y 12 and to identify key areas for water efficiency improvements that could be applied not only at Y-12 but at other Federal facilities as well. FEMP selected Pacific Northwest National Laboratory to coordinate and manage the water assessment. PNNL contracted Water Savers, LLC to lead the technical aspects of the water assessment. Water Savers provided key technical expertise in water auditing, metering, and cooling systems. This is the report of that effort, which concluded that the Y-12 facility could realize considerable water savings by implementing the recommended water efficiency opportunities.

  16. Strategies for Voltage Control and Transient Stability Assessment

    SciTech Connect (OSTI)

    Hiskens, Ian A.

    2013-09-25T23:59:59.000Z

    As wind generation grows, its influence on power system performance will becoming increasingly noticeable. Wind generation di#11;ffers from traditional forms of generation in numerous ways though, motivating the need to reconsider the usual approaches to power system assessment and performance enhancement. The project has investigated the impact of wind generation on transient stability and voltage control, identifying and addressing issues at three distinct levels of the power system: 1) at the device level, the physical characteristics of wind turbine generators (WTGs) are quite unlike those of synchronous machines, 2) at the wind-farm level, the provision of reactive support is achieved through coordination of numerous dissimilar devices, rather than straightforward generator control, and 3) from a systems perspective, the location of wind-farms on the sub-transmission network, coupled with the variability inherent in their power output, can cause complex voltage control issues. The project has sought to develop a thorough understanding of the dynamic behaviour of type-3 WTGs, and in particular the WECC generic model. The behaviour of such models is governed by interactions between the continuous dynamics of state variables and discrete events associated with limits. It was shown that these interactions can be quite complex, and may lead to switching deadlock that prevents continuation of the trajectory. Switching hysteresis was proposed for eliminating deadlock situations. Various type-3 WTG models include control blocks that duplicate integrators. It was shown that this leads to non-uniqueness in the conditions governing steady-state, and may result in pre- and post-disturbance equilibria not coinciding. It also gives rise to a zero eigenvalue in the linearized WTG model. In order to eliminate the anomalous behaviour revealed through this investigation, WECC has now released a new generic model for type-3 WTGs. Wind-farms typically incorporate a variety of voltage control equipment including tapchanging transformers, switched capacitors, SVCs, STATCOMs and the WTGs themselves. The project has considered the coordinated control of this equipment, and has addressed a range of issues that arise in wind-farm operation. The #12;first concerns the ability of WTGs to meet reactive power requirements when voltage saturation in the collector network restricts the reactive power availability of individual generators. Secondly, dynamic interactions between voltage regulating devices have been investigated. It was found that under certain realistic conditions, tap-changing transformers may exhibit instability. In order to meet cost, maintenance, fault tolerance and other requirements, it is desirable for voltage control equipment to be treated as an integrated system rather than as independent devices. The resulting high-level scheduling of wind-farm reactive support has been investigated. In addressing this control problem, several forms of future information were considered, including exact future knowledge and stochastic predictions. Deterministic and Stochastic Dynamic Programming techniques were used in the development of control algorithms. The results demonstrated that while exact future knowledge is very useful, simple prediction methods yield little bene#12;fit. The integration of inherently variable wind generation into weak grids, particularly subtransmission networks that are characterized by low X=R ratios, aff#11;ects bus voltages, regulating devices and line flows. The meshed structure of these networks adds to the complexity, especially when wind generation is distributed across multiple nodes. A range of techniques have been considered for analyzing the impact of wind variability on weak grids. Sensitivity analysis, based on the power-flow Jacobian, was used to highlight sections of a system that are most severely a#11;ffected by wind-power variations. A continuation power flow was used to determine parameter changes that reduce the impact of wind-power variability. It was also used to explore interactions betw

  17. NNSA Administrator Gordon Assesses Security Of the Nuclear Weapons...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Press Releases Video Gallery Photo Gallery Jobs Apply for Our Jobs Our Jobs Working at NNSA Blog Home Media Room Press Releases NNSA Administrator Gordon Assesses Security...

  18. Gordon Assesses Security At Nuclear Weapons Complex News.....

    National Nuclear Security Administration (NNSA)

    Anson Franklin, 202586-7371 September 21, 2001 NNSA Administrator Gordon Assesses Security Of the Nuclear Weapons Complex John Gordon, Administrator of the Department of Energy's...

  19. Lessons Learned from Cyber Security Assessments of SCADA and...

    Energy Savers [EERE]

    Energy Management Systems Results from ten cyber security vulnerability assessments of process control, SCADA, and energy management systems were reviewed to identify common...

  20. Security Assessment Simulation Toolkit (SAST) Final Report

    SciTech Connect (OSTI)

    Meitzler, Wayne D.; Ouderkirk, Steven J.; Hughes, Chad O.

    2009-11-15T23:59:59.000Z

    The Department of Defense Technical Support Working Group (DoD TSWG) investment in the Pacific Northwest National Laboratory (PNNL) Security Assessment Simulation Toolkit (SAST) research planted a technology seed that germinated into a suite of follow-on Research and Development (R&D) projects culminating in software that is used by multiple DoD organizations. The DoD TSWG technology transfer goal for SAST is already in progress. The Defense Information Systems Agency (DISA), the Defense-wide Information Assurance Program (DIAP), the Marine Corps, Office Of Naval Research (ONR) National Center For Advanced Secure Systems Research (NCASSR) and Office Of Secretary Of Defense International Exercise Program (OSD NII) are currently investing to take SAST to the next level. PNNL currently distributes the software to over 6 government organizations and 30 DoD users. For the past five DoD wide Bulwark Defender exercises, the adoption of this new technology created an expanding role for SAST. In 2009, SAST was also used in the OSD NII International Exercise and is currently scheduled for use in 2010.

  1. ITL BULLETIN FOR AUGUST 2010 ASSESSING THE EFFECTIVENESS OF SECURITY CONTROLS IN FEDERAL

    E-Print Network [OSTI]

    discusses the process for assessing the security controls in organizational information systems that are implemented in federal information systems. The selection and assessment of appropriate security controls Controls in Federal Information Systems and Organizations: Building Effective Security Assessment Plans

  2. Office of Security Assessments | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    security policies and programs throughout the Department, including protection of special nuclear material, and classified and sensitive information. The Office has established and...

  3. Recent applications of thermal imagers for security assessment

    SciTech Connect (OSTI)

    Bisbee, T.L.

    1997-06-01T23:59:59.000Z

    This paper discusses recent applications by Sandia National Laboratories of cooled and uncooled thermal infrared imagers to wide-area security assessment systems. Thermal imagers can solve many security assessment problems associated with the protection of high-value assets at military bases, secure installations, and commercial facilities. Thermal imagers can provide surveillance video from security areas or perimeters both day and night without expensive security lighting. Until fairly recently, thermal imagers required open-loop cryogenic cooling to operate. The high cost of these systems and associated maintenance requirements restricted their widespread use. However, recent developments in reliable, closed-loop, linear drive cryogenic coolers and uncooled infrared imagers have dramatically reduced maintenance requirements, extended MTBF, and are leading to reduced system cost. These technology developments are resulting in greater availability and practicality for military as well as civilian security applications.

  4. Control System Applicable Use Assessment of the Secure Computing Corporation - Secure Firewall (Sidewinder)

    SciTech Connect (OSTI)

    Hadley, Mark D.; Clements, Samuel L.

    2009-01-01T23:59:59.000Z

    Battelle’s National Security & Defense objective is, “applying unmatched expertise and unique facilities to deliver homeland security solutions. From detection and protection against weapons of mass destruction to emergency preparedness/response and protection of critical infrastructure, we are working with industry and government to integrate policy, operational, technological, and logistical parameters that will secure a safe future”. In an ongoing effort to meet this mission, engagements with industry that are intended to improve operational and technical attributes of commercial solutions that are related to national security initiatives are necessary. This necessity will ensure that capabilities for protecting critical infrastructure assets are considered by commercial entities in their development, design, and deployment lifecycles thus addressing the alignment of identified deficiencies and improvements needed to support national cyber security initiatives. The Secure Firewall (Sidewinder) appliance by Secure Computing was assessed for applicable use in critical infrastructure control system environments, such as electric power, nuclear and other facilities containing critical systems that require augmented protection from cyber threat. The testing was performed in the Pacific Northwest National Laboratory’s (PNNL) Electric Infrastructure Operations Center (EIOC). The Secure Firewall was tested in a network configuration that emulates a typical control center network and then evaluated. A number of observations and recommendations are included in this report relating to features currently included in the Secure Firewall that support critical infrastructure security needs.

  5. Integrated Safeguards and Security Management Self-Assessment 2004

    SciTech Connect (OSTI)

    Lunford, Dan; Ramsey, Dwayne

    2005-04-01T23:59:59.000Z

    In 2002 Ernest Orlando Lawrence Berkeley National Laboratory deployed the first Integrated Safeguards and Security Management (ISSM) Self-Assessment process, designed to measure the effect of the Laboratory's ISSM efforts. This process was recognized by DOE as a best practice and model program for self-assessment and training. In 2004, the second Self-Assessment was launched. The cornerstone of this process was an employee survey that was designed to meet several objectives: (1) Ensure that Laboratory assets are protected. (2) Provide a measurement of the Laboratory's current security status that can be compared against the 2002 Self-Assessment baseline. (3) Educate all Laboratory staff about security responsibilities, tools, and practices. (4) Provide security staff with feedback on the effectiveness of security programs. (5) Provide line management with the information they need to make informed decisions about security. This 2004 Self Assessment process began in July 2004 with every employee receiving an information packet and instructions for completing the ISSM survey. The Laboratory-wide survey contained questions designed to measure awareness and conformance to policy and best practices. The survey response was excellent--90% of Berkeley Lab employees completed the questionnaire. ISSM liaisons from each division followed up on the initial survey results with individual employees to improve awareness and resolve ambiguities uncovered by the questionnaire. As with the 2002 survey, the Self-Assessment produced immediate positive results for the ISSM program and revealed opportunities for longer-term corrective actions. Results of the questionnaire provided information for organizational profiles and an institutional summary. The overall level of security protection and awareness was very high--often above 90%. Post-survey work by the ISSM liaisons and line management consistently led to improved awareness and metrics, as shown by a comparison of profiles at the end of phase one (August 6, 2004) and phase two (November 1, 2004). The Self-Assessment confirmed that classified information is not held or processed at Berkeley Lab. The survey results also identified areas where increased employee knowledge and awareness of Laboratory policy would be beneficial, the two most prominent being password usage and wireless network service. Line management will be able to determine additional corrective actions based on the results of the Self-Assessment. Future assessments will raise the ratings bar for some existing program elements and add new elements to stimulate further improvements in Laboratory security.

  6. Risk assessment of climate systems for national security.

    SciTech Connect (OSTI)

    Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing [University of Illinois-Urbana; Conrad, Stephen Hamilton; Constantine, Paul [Stanford University; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael [National Center for Atmospheric Research; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

    2012-10-01T23:59:59.000Z

    Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

  7. Discussion Deadline: January 2003 Online Risk-Based Security Assessment

    E-Print Network [OSTI]

    Gross, George

    -making. Test results on large-scale transmission models retrieved from the energy management system of a U-Based Security Assessment Ni, M.; McCalley, J.D.; Vittal, V; Greene, S.; Ten, C.W; Ganugula, VS.; Tayyib, T. Author Affiliations: Iowa State University, USA; Siemens Energy Management, Singapore; Pricewaterhouse

  8. Random Dynamic Voltage Scaling Design to Enhance Security of NCL S-Box

    E-Print Network [OSTI]

    Ayers, Joseph

    Power management is essential to building more efficient and optimized circuits in computer architecture-- The demand for enhanced security in cryptographic systems is increasing rapidly in recent years that NCL contains all the properties to resist common forms of side-channel attack (SCA). RDVS is designed

  9. A total risk assessment methodology for security assessment.

    SciTech Connect (OSTI)

    Aguilar, Richard; Pless, Daniel J.; Kaplan, Paul Garry; Silva, Consuelo Juanita; Rhea, Ronald Edward; Wyss, Gregory Dane; Conrad, Stephen Hamilton

    2009-06-01T23:59:59.000Z

    Sandia National Laboratories performed a two-year Laboratory Directed Research and Development project to develop a new collaborative risk assessment method to enable decision makers to fully consider the interrelationships between threat, vulnerability, and consequence. A five-step Total Risk Assessment Methodology was developed to enable interdisciplinary collaborative risk assessment by experts from these disciplines. The objective of this process is promote effective risk management by enabling analysts to identify scenarios that are simultaneously achievable by an adversary, desirable to the adversary, and of concern to the system owner or to society. The basic steps are risk identification, collaborative scenario refinement and evaluation, scenario cohort identification and risk ranking, threat chain mitigation analysis, and residual risk assessment. The method is highly iterative, especially with regard to scenario refinement and evaluation. The Total Risk Assessment Methodology includes objective consideration of relative attack likelihood instead of subjective expert judgment. The 'probability of attack' is not computed, but the relative likelihood for each scenario is assessed through identifying and analyzing scenario cohort groups, which are groups of scenarios with comparable qualities to the scenario being analyzed at both this and other targets. Scenarios for the target under consideration and other targets are placed into cohort groups under an established ranking process that reflects the following three factors: known targeting, achievable consequences, and the resources required for an adversary to have a high likelihood of success. The development of these target cohort groups implements, mathematically, the idea that adversaries are actively choosing among possible attack scenarios and avoiding scenarios that would be significantly suboptimal to their objectives. An adversary who can choose among only a few comparable targets and scenarios (a small comparable target cohort group) is more likely to choose to attack the specific target under analysis because he perceives it to be a relatively unique attack opportunity. The opposite is also true. Thus, total risk is related to the number of targets that exist in each scenario cohort group. This paper describes the Total Risk Assessment Methodology and illustrates it through an example.

  10. Security

    Broader source: Energy.gov [DOE]

    Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

  11. Lessons Learned from Cyber Security Assessments of SCADA and...

    Broader source: Energy.gov (indexed) [DOE]

    of Energy Office of Electricity Delivery and Energy Reliability Enhancing control systems security in the energy sector NSTB September 2006 LESSONS LEARNED FROM CYBER SECURITY...

  12. Protection against the man-in-the-middle-attack for the Kirchhoff-loop-Johnson(-like)-noise cipher and expansion by voltage-based security

    E-Print Network [OSTI]

    Laszlo B. Kish

    2006-02-13T23:59:59.000Z

    It is shown that the original Kirchhoff-loop-Johnson(-like)-noise (KLJN) cipher is naturally protected against the man-in-the-middle (MITM) attack, if the eavesdropper is using resistors and noise voltage generators just like the sender and the receiver. The eavesdropper can extract zero bit of information before she is discovered. However, when the eavesdropper is using noise current generators, though the cipher is protected, the eavesdropper may still be able to extract one bit of information while she is discovered. For enhanced security, we expand the KLJN cipher with the comparison of the instantaneous voltages via the public channel. In this way, the sender and receiver has a full control over the security of measurable physical quantities in the Kirchhoff-loop. We show that when the sender and receiver compare not only their instantaneous current data but also their instantaneous voltage data then the zero-bit security holds even for the noise current generator case. We show that the original KLJN scheme is also zero-bit protected against that type of MITM attack when the eavesdropper uses voltage noise generators, only. In conclusion, within the idealized model scheme, the man-in-the-middle-attack does not provide any advantage compared to the regular attack considered earlier. The remaining possibility is the attack by a short, large current pulse, which described in the original paper as the only efficient type of regular attacks, and that yields the one bit security. In conclusion, the KLJN cipher is superior to known quantum communication schemes in every respect, including speed, robustness, maintenance need, price and its natural immunity against the man-in-the-middle attack.

  13. CS2SAT: THE CONTROL SYSTEMS CYBER SECURITY SELF-ASSESSMENT TOOL

    SciTech Connect (OSTI)

    Kathleen A. Lee

    2008-01-01T23:59:59.000Z

    The Department of Homeland Security National Cyber Security Division has developed the Control System Cyber Security Self-Assessment Tool (CS2SAT) that provides users with a systematic and repeatable approach for assessing the cyber-security posture of their industrial control system networks. The CS2SAT was developed by cyber security experts from Department of Energy National Laboratories and with assistance from the National Institute of Standards and Technology. The CS2SAT is a desktop software tool that guides users through a step-by-step process to collect facility-specific control system information and then makes appropriate recommendations for improving the system’s cyber-security posture. The CS2SAT provides recommendations from a database of industry available cyber-security practices, which have been adapted specifically for application to industry control system networks and components. Each recommendation is linked to a set of actions that can be applied to remediate-specific security vulnerabilities.

  14. ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS

    E-Print Network [OSTI]

    Habib, Ayman

    ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS Vulnerability Assessment Standard Rationale 1 To enable timely identification and mitigation of vulnerabilities and security flaws affecting computing devices within UofC's computing environment. Scope 2 2.1 This standard

  15. Development of an Automated Security Risk Assessment Methodology Tool for Critical Infrastructures.

    SciTech Connect (OSTI)

    Jaeger, Calvin D.; Roehrig, Nathaniel S.; Torres, Teresa M.

    2008-12-01T23:59:59.000Z

    This document presents the security automated Risk Assessment Methodology (RAM) prototype tool developed by Sandia National Laboratories (SNL). This work leverages SNL's capabilities and skills in security risk analysis and the development of vulnerability assessment/risk assessment methodologies to develop an automated prototype security RAM tool for critical infrastructures (RAM-CITM). The prototype automated RAM tool provides a user-friendly, systematic, and comprehensive risk-based tool to assist CI sector and security professionals in assessing and managing security risk from malevolent threats. The current tool is structured on the basic RAM framework developed by SNL. It is envisioned that this prototype tool will be adapted to meet the requirements of different CI sectors and thereby provide additional capabilities.

  16. Safeguards and Security Oversight and Assessments Implementation Guide

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-12-21T23:59:59.000Z

    This Guide identifies acceptable methods for implementing the safeguards and security provisions of DOE O 226.1A. Canceled by DOE N 251.80.

  17. Quantitative Methodology for Assessing State-Level Nuclear Security Measures.

    E-Print Network [OSTI]

    Myers, Christopher 1985-

    2012-01-01T23:59:59.000Z

    ??The international community faces a growing threat from nuclear terrorism. The complexity of the threats of nuclear terrorism, the variety of nuclear security measures that… (more)

  18. GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Shirley Radack, Editor

    E-Print Network [OSTI]

    , was written by Karen Scarfone and Murugiah Souppaya of NIST, and by Amanda Cody and Angela Orebaugh of Booz Allen Hamilton. The new guide replaces NIST SP 800-42, Guideline on Network Security Testing. NIST SP

  19. Quantitative Methodology for Assessing State-Level Nuclear Security Measures

    E-Print Network [OSTI]

    Myers, Christopher 1985-

    2012-11-29T23:59:59.000Z

    The international community faces a growing threat from nuclear terrorism. The complexity of the threats of nuclear terrorism, the variety of nuclear security measures that States can devote resources towards to address the threats, and the limited...

  20. Security Risk Assessment Methodologies (RAM) for Critical Infrastructures -

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %SecurityUnder BudgetEnergy

  1. Technical Qualification Program Self-Assessment Report- Office of Health, Safety and Security- 2014

    Broader source: Energy.gov [DOE]

    Beginning in April 2014, a self-assessment of the Technical Qualification Program (TQP) was performed in the Office of Health, Safety and Security (HSS). The assessment was led by the HSS TQP Manager who is assigned the responsibility for maintaining and implementing the programs.

  2. Assessing Power Substation Network Security and Survivability: A Work in Progress Report1

    E-Print Network [OSTI]

    Krings, Axel W.

    to the assessment of power substation control networks for cyber based attacks. Another goal is to r1 Assessing Power Substation Network Security and Survivability: A Work in Progress Report1 Carol experiences with identifying cyber-based threats to the survivability of power substation control networks

  3. AMI FW UPGRADEABILITY TEST PROCEDURE AND SECURITY ASSESSMENT

    SciTech Connect (OSTI)

    Snyder, Isabelle B [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    The National Institute of Standards and Technology (NIST) is producing NISTIR 7823 to define test requirements for Smart Meter upgradability. The term Smart Meter refers specifically to advanced electric meters being deployed to enhance management of electricity distribution for residential and industrial consumers. The underlying functional and security requirements for Smart Meter upgradability are specified in NEMA standard SG-AMI 1-2009. The purpose of NISTIR 7823 is to describe conformance test requirements that may be used voluntarily by testers and/or test laboratories to determine whether Smart Meters and Upgrade Management Systems conform to the requirements of NEMA SG-AMI 1-2009.

  4. Office of Cyber and Security Assessments | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen OwnedofDepartment ofJaredOakscience-based,OHAGas and OilDepartmentand Security

  5. 29.01.03.M1.26 Information Resources Security Risks Assessment Reviews Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03.M1.26 Information Resources ­ Security Risks Assessment Reviews Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.26 Information Resources ­ Information Security Risk Assessment Reviews security risk assessments are vital procedures for maintaining the security of information resources

  6. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS

    SciTech Connect (OSTI)

    Ray Fink

    2006-10-01T23:59:59.000Z

    The results from ten cyber security vulnerability assessments of process control, SCADA and energy management systems, or components of those systems were reviewed to identify common problem areas. The common vulnerabilities ranged from conventional IT security issues to specific weaknesses in control system protocols. In each vulnerability category, relative measures were assigned to the severity of the vulnerability and ease with which an attacker could exploit the vulnerability. Suggested mitigations are identified in each category. Recommended mitigations having the highest impact on reducing vulnerability are listed for asset owners and system vendors.

  7. ASSESS (Analytic System and Software for Evaluating Safeguards and Security) update: Current status and future developments

    SciTech Connect (OSTI)

    Al-Ayat, R.A. (Lawrence Livermore National Lab., CA (USA)); Cousins, T.D. (USDOE, Washington, DC (USA)); Hoover, E.R. (Sandia National Labs., Albuquerque, NM (USA))

    1990-07-15T23:59:59.000Z

    The Analytic System and Software for Evaluating Safeguards and Security (ASSESS) has been released for use by DOE field offices and their contractors. In October, 1989, we offered a prototype workshop to selected representatives of the DOE community. Based on the prototype results, we held the first training workshop at the Central Training Academy in January, 1990. Four additional workshops are scheduled for FY 1990. ASSESS is a state-of-the-art analytical tool for management to conduct integrated evaluation of safeguards systems at facilities handling facilities. Currently, ASSESS focuses on the threat of theft/diversion of special nuclear material by insiders, outsiders, and a special form of insider/outsider collusion. ASSESS also includes a neutralization module. Development of the tool is continuing. Plans are underway to expand the capabilities of ASSESS to evaluate against violent insiders, to validate the databases, to expand the neutralization module, and to assist in demonstrating compliance with DOE Material Control and Accountability (MC A) Order 5633.3. These new capabilities include the ability to: compute a weighted average for performance capability against a spectrum of insider adversaries; conduct defense-in-depth analyses; and analyze against protracted theft scenarios. As they become available, these capabilities will be incorporated in our training program. ASSESS is being developed jointly by Lawrence Livermore and Sandia National Laboratories under the sponsorship of the Department of Energy (DOE) Office of Safeguards and Security.

  8. A Weakest Chain Approach to Assessing the Overall Effectiveness of the 802.11 Wireless Network Security

    E-Print Network [OSTI]

    Tasoluk, Berker; 10.5121/ijwmn.2011.3101

    2011-01-01T23:59:59.000Z

    This study aims to assess wireless network security holistically and attempts to determine the weakest link among the parts that comprise the 'secure' aspect of the wireless networks: security protocols, wireless technologies and user habits. The assessment of security protocols is done by determining the time taken to break a specific protocol's encryption key, or to pass an access control by using brute force attack techniques. Passphrase strengths as well as encryption key strengths ranging from 40 to 256 bits are evaluated. Different scenarios are planned and created for passphrase generation, using different character sets and different number of characters. Then each scenario is evaluated based on the time taken to break that passphrase. At the end of the study, it is determined that the choice of the passphrase is the weakest part of the entire 802.11 wireless security system.

  9. The ASSESS (Analytic System and Software for Evaluating Safeguards and Security) Outsider module with multiple analyses

    SciTech Connect (OSTI)

    Snell, M.K.; Winblad, A.E. (Sandia National Labs., Albuquerque, NM (USA)); Bingham, B.; Key, B.; Walker, S. (Science and Engineering Associates, Inc., Albuquerque, NM (USA))

    1990-01-01T23:59:59.000Z

    The Analytic System and Software for Evaluating Safeguards and Security (ASSESS) includes modules for analyzing vulnerabilities against outsider and insider adversaries. The ASSESS Outsider Analysis Module has been upgraded to allow for defining, analyzing, and displaying the results of multiple analyses. Once a set of threat definitions have been defined in one Outsider file, they can be readily copied to other Outsider files. This multiple analysis, or batch, mode of operation provides an efficient way of covering the standard DOE outsider threat spectrum. A new approach for coupling the probability of interruption, P(I), values and values calculated by the ASSESS Neutralization module has been implemented in Outsider and is described. An enhanced capability for printing results of these multiple analyses is also included in the upgraded Outside module. 7 refs., 7 figs., 1 tab.

  10. The Arctic as a test case for an assessment of climate impacts on national security.

    SciTech Connect (OSTI)

    Taylor, Mark A.; Zak, Bernard Daniel; Backus, George A.; Ivey, Mark D.; Boslough, Mark Bruce Elrick

    2008-11-01T23:59:59.000Z

    The Arctic region is rapidly changing in a way that will affect the rest of the world. Parts of Alaska, western Canada, and Siberia are currently warming at twice the global rate. This warming trend is accelerating permafrost deterioration, coastal erosion, snow and ice loss, and other changes that are a direct consequence of climate change. Climatologists have long understood that changes in the Arctic would be faster and more intense than elsewhere on the planet, but the degree and speed of the changes were underestimated compared to recent observations. Policy makers have not yet had time to examine the latest evidence or appreciate the nature of the consequences. Thus, the abruptness and severity of an unfolding Arctic climate crisis has not been incorporated into long-range planning. The purpose of this report is to briefly review the physical basis for global climate change and Arctic amplification, summarize the ongoing observations, discuss the potential consequences, explain the need for an objective risk assessment, develop scenarios for future change, review existing modeling capabilities and the need for better regional models, and finally to make recommendations for Sandia's future role in preparing our leaders to deal with impacts of Arctic climate change on national security. Accurate and credible regional-scale climate models are still several years in the future, and those models are essential for estimating climate impacts around the globe. This study demonstrates how a scenario-based method may be used to give insights into climate impacts on a regional scale and possible mitigation. Because of our experience in the Arctic and widespread recognition of the Arctic's importance in the Earth climate system we chose the Arctic as a test case for an assessment of climate impacts on national security. Sandia can make a swift and significant contribution by applying modeling and simulation tools with internal collaborations as well as with outside organizations. Because changes in the Arctic environment are happening so rapidly, a successful program will be one that can adapt very quickly to new information as it becomes available, and can provide decision makers with projections on the 1-5 year time scale over which the most disruptive, high-consequence changes are likely to occur. The greatest short-term impact would be to initiate exploratory simulations to discover new emergent and robust phenomena associated with one or more of the following changing systems: Arctic hydrological cycle, sea ice extent, ocean and atmospheric circulation, permafrost deterioration, carbon mobilization, Greenland ice sheet stability, and coastal erosion. Sandia can also contribute to new technology solutions for improved observations in the Arctic, which is currently a data-sparse region. Sensitivity analyses have the potential to identify thresholds which would enable the collaborative development of 'early warning' sensor systems to seek predicted phenomena that might be precursory to major, high-consequence changes. Much of this work will require improved regional climate models and advanced computing capabilities. Socio-economic modeling tools can help define human and national security consequences. Formal uncertainty quantification must be an integral part of any results that emerge from this work.

  11. A method of assessing users' vs managers' perceptions of safety and security problems in public beach park settings

    E-Print Network [OSTI]

    Steele, Robert James Scott

    2012-06-07T23:59:59.000Z

    while answering this form of report, research has proven that the respondents are generally truthful and accurate in the in- formation they provide (Sheley 1979; Levine 1982). Due to the transitory nature of park users this system would...A METHOD OF ASSESSING USERS' VS MANAGERS' PERCEPTIONS OF SAFETY AND SECURITY PROBLEMS IN PUBLIC BEACH PARK SETTINGS A Thesis by ROBERT JAMES SCOTT STEELE Submitted to the Graduate College of Texas A&M University In Par ial Fulfillment...

  12. An Information Systems Security Risk Assessment Model Under Dempster- Schafer Theory of Belief Functions

    E-Print Network [OSTI]

    Sun, Lili; Srivastava, Rajendra P.; Mock, Theodore J.

    2006-01-01T23:59:59.000Z

    This study develops an alternative methodology for the risk analysis of information systems security (ISS), an evidential reasoning approach under the Dempster-Shafer theory of belief functions. The approach has the ...

  13. Wide Area Security Region Final Report

    SciTech Connect (OSTI)

    Makarov, Yuri V.; Lu, Shuai; Guo, Xinxin; Gronquist, James; Du, Pengwei; Nguyen, Tony B.; Burns, J. W.

    2010-03-31T23:59:59.000Z

    This report develops innovative and efficient methodologies and practical procedures to determine the wide-area security region of a power system, which take into consideration all types of system constraints including thermal, voltage, voltage stability, transient and potentially oscillatory stability limits in the system. The approach expands the idea of transmission system nomograms to a multidimensional case, involving multiple system limits and parameters such as transmission path constraints, zonal generation or load, etc., considered concurrently. The security region boundary is represented using its piecewise approximation with the help of linear inequalities (so called hyperplanes) in a multi-dimensional space, consisting of system parameters that are critical for security analyses. The goal of this approximation is to find a minimum set of hyperplanes that describe the boundary with a given accuracy. Methodologies are also developed to use the security hyperplanes, pre-calculated offline, to determine system security margins in real-time system operations, to identify weak elements in the system, and to calculate key contributing factors and sensitivities to determine the best system controls in real time and to assist in developing remedial actions and transmission system enhancements offline . A prototype program that automates the simulation procedures used to build the set of security hyperplanes has also been developed. The program makes it convenient to update the set of security hyperplanes necessitated by changes in system configurations. A prototype operational tool that uses the security hyperplanes to assess security margins and to calculate optimal control directions in real time has been built to demonstrate the project success. Numerical simulations have been conducted using the full-size Western Electricity Coordinating Council (WECC) system model, and they clearly demonstrated the feasibility and the effectiveness of the developed technology. Recommendations for the future work have also been formulated.

  14. A Security Domain Model to Assess Software for Exploitable Covert Alan B. Shaffer

    E-Print Network [OSTI]

    ; D.4.6 [Operating Systems]: Security and Protection ­ access controls, information flow controls to enforce mandatory access control policies, and is required for the successful evaluation of such systems systems be designed, developed, verified and tested using rigorous processes and formal methods

  15. Cooperative Monitoring Center Occasional Paper/8: Cooperative Border Security for Jordan: Assessment and Options

    SciTech Connect (OSTI)

    Qojas, M.

    1999-03-01T23:59:59.000Z

    This document is an analysis of options for unilateral and cooperative action to improve the security of Jordan's borders. Sections describe the current political, economic, and social interactions along Jordan's borders. Next, the document discusses border security strategy for cooperation among neighboring countries and the adoption of confidence-building measures. A practical cooperative monitoring system would consist of hardware for early warning, command and control, communications, and transportation. Technical solutions can expand opportunities for the detection and identification of intruders. Sensors (such as seismic, break-wire, pressure-sensing, etc.) can warn border security forces of intrusion and contribute to the identification of the intrusion and help formulate the response. This document describes conceptual options for cooperation, offering three scenarios that relate to three hypothetical levels (low, medium, and high) of cooperation. Potential cooperative efforts under a low cooperation scenario could include information exchanges on military equipment and schedules to prevent misunderstandings and the establishment of protocols for handling emergency situations or unusual circumstances. Measures under a medium cooperation scenario could include establishing joint monitoring groups for better communications, with hot lines and scheduled meetings. The high cooperation scenario describes coordinated responses, joint border patrols, and sharing border intrusion information. Finally, the document lists recommendations for organizational, technical, and operational initiatives that could be applicable to the current situation.

  16. Anti-addiction drug ibogaine inhibits voltage-gated ionic currents: A study to assess the drug's cardiac ion channel profile

    SciTech Connect (OSTI)

    Koenig, Xaver; Kovar, Michael; Rubi, Lena; Mike, Agnes K.; Lukacs, Peter; Gawali, Vaibhavkumar S.; Todt, Hannes [Center for Physiology and Pharmacology, Department of Neurophysiology and -pharmacology, Medical University of Vienna, 1090 Vienna (Austria); Hilber, Karlheinz, E-mail: karlheinz.hilber@meduniwien.ac.at [Center for Physiology and Pharmacology, Department of Neurophysiology and -pharmacology, Medical University of Vienna, 1090 Vienna (Austria); Sandtner, Walter [Center for Physiology and Pharmacology, Institute of Pharmacology, Medical University of Vienna, 1090 Vienna (Austria)

    2013-12-01T23:59:59.000Z

    The plant alkaloid ibogaine has promising anti-addictive properties. Albeit not licenced as a therapeutic drug, and despite hints that ibogaine may perturb the heart rhythm, this alkaloid is used to treat drug addicts. We have recently reported that ibogaine inhibits human ERG (hERG) potassium channels at concentrations similar to the drugs affinity for several of its known brain targets. Thereby the drug may disturb the heart's electrophysiology. Here, to assess the drug's cardiac ion channel profile in more detail, we studied the effects of ibogaine and its congener 18-Methoxycoronaridine (18-MC) on various cardiac voltage-gated ion channels. We confirmed that heterologously expressed hERG currents are reduced by ibogaine in low micromolar concentrations. Moreover, at higher concentrations, the drug also reduced human Na{sub v}1.5 sodium and Ca{sub v}1.2 calcium currents. Ion currents were as well reduced by 18-MC, yet with diminished potency. Unexpectedly, although blocking hERG channels, ibogaine did not prolong the action potential (AP) in guinea pig cardiomyocytes at low micromolar concentrations. Higher concentrations (? 10 ?M) even shortened the AP. These findings can be explained by the drug's calcium channel inhibition, which counteracts the AP-prolonging effect generated by hERG blockade. Implementation of ibogaine's inhibitory effects on human ion channels in a computer model of a ventricular cardiomyocyte, on the other hand, suggested that ibogaine does prolong the AP in the human heart. We conclude that therapeutic concentrations of ibogaine have the propensity to prolong the QT interval of the electrocardiogram in humans. In some cases this may lead to cardiac arrhythmias. - Highlights: • We study effects of anti-addiction drug ibogaine on ionic currents in cardiomyocytes. • We assess the cardiac ion channel profile of ibogaine. • Ibogaine inhibits hERG potassium, sodium and calcium channels. • Ibogaine’s effects on ion channels are a potential source of cardiac arrhythmias. • 18-Methoxycoronaridine has a lower affinity for cardiac ion channels than ibogaine.

  17. Energy Security Initiatives Update

    Broader source: Energy.gov (indexed) [DOE]

    -- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft...

  18. 2012 Annual Planning Summary for National Nuclear Security Administrat...

    Broader source: Energy.gov (indexed) [DOE]

    National Nuclear Security Administration 2012 Annual Planning Summary for National Nuclear Security Administration The ongoing and projected Environmental Assessments and...

  19. Transmission Line Security Monitor

    ScienceCinema (OSTI)

    None

    2013-05-28T23:59:59.000Z

    The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

  20. High Voltage Safety Act

    Broader source: Energy.gov [DOE]

    The purpose of the High Voltage Safety Act is to prevent injury to persons and property and interruptions of utility service resulting from accidental or inadvertent contact with high-voltage...

  1. Automatic voltage imbalance detector

    DOE Patents [OSTI]

    Bobbett, Ronald E. (Los Alamos, NM); McCormick, J. Byron (Los Alamos, NM); Kerwin, William J. (Tucson, AZ)

    1984-01-01T23:59:59.000Z

    A device for indicating and preventing damage to voltage cells such as galvanic cells and fuel cells connected in series by detecting sequential voltages and comparing these voltages to adjacent voltage cells. The device is implemented by using operational amplifiers and switching circuitry is provided by transistors. The device can be utilized in battery powered electric vehicles to prevent galvanic cell damage and also in series connected fuel cells to prevent fuel cell damage.

  2. Common Cyber Security Vulnerabilities Observed in Control System...

    Broader source: Energy.gov (indexed) [DOE]

    Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

  3. Oversight Reports - Y-12 National Security Complex | Department...

    Broader source: Energy.gov (indexed) [DOE]

    Oversight Assessment, Y-12 National Security Complex - June 2012 Assessment of Nuclear Safety Culture at the Y-12 National Security Complex Uranium Processing Facility Project...

  4. Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

  5. Optical voltage reference

    DOE Patents [OSTI]

    Rankin, R.; Kotter, D.

    1994-04-26T23:59:59.000Z

    An optical voltage reference for providing an alternative to a battery source is described. The optical reference apparatus provides a temperature stable, high precision, isolated voltage reference through the use of optical isolation techniques to eliminate current and impedance coupling errors. Pulse rate frequency modulation is employed to eliminate errors in the optical transmission link while phase-lock feedback is employed to stabilize the frequency to voltage transfer function. 2 figures.

  6. Voltage Control Technical Conference

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Intro Voltage Control Conference - BPA Active Power Control in Wind Parks - Siemens Interconnection Criteria for Frequency Response Requirements - NERC Model Validation...

  7. Voltage verification unit

    DOE Patents [OSTI]

    Martin, Edward J. (Virginia Beach, VA)

    2008-01-15T23:59:59.000Z

    A voltage verification unit and method for determining the absence of potentially dangerous potentials within a power supply enclosure without Mode 2 work is disclosed. With this device and method, a qualified worker, following a relatively simple protocol that involves a function test (hot, cold, hot) of the voltage verification unit before Lock Out/Tag Out and, and once the Lock Out/Tag Out is completed, testing or "trying" by simply reading a display on the voltage verification unit can be accomplished without exposure of the operator to the interior of the voltage supply enclosure. According to a preferred embodiment, the voltage verification unit includes test leads to allow diagnostics with other meters, without the necessity of accessing potentially dangerous bus bars or the like.

  8. Voltage balanced multilevel voltage source converter system

    DOE Patents [OSTI]

    Peng, Fang Zheng (Oak Ridge, TN); Lai, Jih-Sheng (Knoxville, TN)

    1997-01-01T23:59:59.000Z

    A voltage balanced multilevel converter for high power AC applications such as adjustable speed motor drives and back-to-back DC intertie of adjacent power systems. This converter provides a multilevel rectifier, a multilevel inverter, and a DC link between the rectifier and the inverter allowing voltage balancing between each of the voltage levels within the multilevel converter. The rectifier is equipped with at least one phase leg and a source input node for each of the phases. The rectifier is further equipped with a plurality of rectifier DC output nodes. The inverter is equipped with at least one phase leg and a load output node for each of the phases. The inverter is further equipped with a plurality of inverter DC input nodes. The DC link is equipped with a plurality of rectifier charging means and a plurality of inverter discharging means. The plurality of rectifier charging means are connected in series with one of the rectifier charging means disposed between and connected in an operable relationship with each adjacent pair of rectifier DC output nodes. The plurality of inverter discharging means are connected in series with one of the inverter discharging means disposed between and connected in an operable relationship with each adjacent pair of inverter DC input nodes. Each of said rectifier DC output nodes are individually electrically connected to the respective inverter DC input nodes. By this means, each of the rectifier DC output nodes and each of the inverter DC input nodes are voltage balanced by the respective charging and discharging of the rectifier charging means and the inverter discharging means.

  9. Voltage balanced multilevel voltage source converter system

    DOE Patents [OSTI]

    Peng, F.Z.; Lai, J.S.

    1997-07-01T23:59:59.000Z

    Disclosed is a voltage balanced multilevel converter for high power AC applications such as adjustable speed motor drives and back-to-back DC intertie of adjacent power systems. This converter provides a multilevel rectifier, a multilevel inverter, and a DC link between the rectifier and the inverter allowing voltage balancing between each of the voltage levels within the multilevel converter. The rectifier is equipped with at least one phase leg and a source input node for each of the phases. The rectifier is further equipped with a plurality of rectifier DC output nodes. The inverter is equipped with at least one phase leg and a load output node for each of the phases. The inverter is further equipped with a plurality of inverter DC input nodes. The DC link is equipped with a plurality of rectifier charging means and a plurality of inverter discharging means. The plurality of rectifier charging means are connected in series with one of the rectifier charging means disposed between and connected in an operable relationship with each adjacent pair of rectifier DC output nodes. The plurality of inverter discharging means are connected in series with one of the inverter discharging means disposed between and connected in an operable relationship with each adjacent pair of inverter DC input nodes. Each of said rectifier DC output nodes are individually electrically connected to the respective inverter DC input nodes. By this means, each of the rectifier DC output nodes and each of the inverter DC input nodes are voltage balanced by the respective charging and discharging of the rectifier charging means and the inverter discharging means. 15 figs.

  10. High voltage DC power supply

    DOE Patents [OSTI]

    Droege, T.F.

    1989-12-19T23:59:59.000Z

    A high voltage DC power supply having a first series resistor at the output for limiting current in the event of a short-circuited output, a second series resistor for sensing the magnitude of output current, and a voltage divider circuit for providing a source of feedback voltage for use in voltage regulation is disclosed. The voltage divider circuit is coupled to the second series resistor so as to compensate the feedback voltage for a voltage drop across the first series resistor. The power supply also includes a pulse-width modulated control circuit, having dual clock signals, which is responsive to both the feedback voltage and a command voltage, and also includes voltage and current measuring circuits responsive to the feedback voltage and the voltage developed across the second series resistor respectively. 7 figs.

  11. High voltage DC power supply

    DOE Patents [OSTI]

    Droege, Thomas F. (Batavia, IL)

    1989-01-01T23:59:59.000Z

    A high voltage DC power supply having a first series resistor at the output for limiting current in the event of a short-circuited output, a second series resistor for sensing the magnitude of output current, and a voltage divider circuit for providing a source of feedback voltage for use in voltage regulation is disclosed. The voltage divider circuit is coupled to the second series resistor so as to compensate the feedback voltage for a voltage drop across the first series resistor. The power supply also includes a pulse-width modulated control circuit, having dual clock signals, which is responsive to both the feedback voltage and a command voltage, and also includes voltage and current measuring circuits responsive to the feedback voltage and the voltage developed across the second series resistor respectively.

  12. August 2003 IT SECURITY METRICS

    E-Print Network [OSTI]

    , efficiency, effectiveness, and the impact of the security controls. The process steps need not be sequen tial metrics program and provides examples of metrics based on the criti cal elements and security controls and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

  13. T-697: Google Chrome Prior to 13.0.782.107 Multiple Security...

    Broader source: Energy.gov (indexed) [DOE]

    Chrome Prior to 13.0.782.107 Multiple Security Vulnerabilities Releases >> Chrome OS Beta: Channel Update Chromium Security >> Reporting Security Bugs IMPACT ASSESSMENT: High...

  14. ABBGroup-1-High voltage lab

    E-Print Network [OSTI]

    Basse, Nils Plesner

    oscillations are due to travelling waves in the heating volume. #12;©ABBGroup-9- 3-Sep-07 2. High voltage phase interrupts the injected current, it is stressed by the transient recovery voltage (TRV) oscillating©ABBGroup-1- 3-Sep-07 High voltage lab Research on high voltage gas circuit breakers Nils P. Basse

  15. Electron launching voltage monitor

    DOE Patents [OSTI]

    Mendel, C.W.; Savage, M.E.

    1992-03-17T23:59:59.000Z

    An electron launching voltage monitor measures MITL voltage using a relationship between anode electric field and electron current launched from a cathode-mounted perturbation. An electron launching probe extends through and is spaced from the edge of an opening in a first MITL conductor, one end of the launching probe being in the gap between the MITL conductor, the other end being adjacent a first side of the first conductor away from the second conductor. A housing surrounds the launching probe and electrically connects the first side of the first conductor to the other end of the launching probe. A detector detects the current passing through the housing to the launching probe, the detected current being representative of the voltage between the conductors. 5 figs.

  16. Voltage controlled current source

    DOE Patents [OSTI]

    Casne, Gregory M. (Pittsburgh, PA)

    1992-01-01T23:59:59.000Z

    A seven decade, voltage controlled current source is described for use in testing intermediate range nuclear instruments that covers the entire test current range of from 10 picoamperes to 100 microamperes. High accuracy is obtained throughout the entire seven decades of output current with circuitry that includes a coordinated switching scheme responsive to the input signal from a hybrid computer to control the input voltage to an antilog amplifier, and to selectively connect a resistance to the antilog amplifier output to provide a continuous output current source as a function of a preset range of input voltage. An operator controlled switch provides current adjustment for operation in either a real-time simulation test mode or a time response test mode.

  17. Physical simulation study of dynamic voltage instability

    SciTech Connect (OSTI)

    Tso, S.K.; Zhu, T.X. [Univ. of Hong Kong (Hong Kong); Zeng, Q.Y. [Electric Power Research Inst., Beijing (China); Lo, K.L. [Univ. of Strathclyde, Glasgow (United Kingdom). Dept. of Electrical and Electrical Engineering

    1995-12-31T23:59:59.000Z

    This paper presents a physical simulation of the dynamic behavior of voltage instability in an interconnected multimachine environment. The dynamic evolving process leading to eventual voltage collapse, the scenario of the progressive reactive support reduction resulting from the MXL protection relays, the OLTC operation, and the effect of switched-in capacitor banks are examined using physical facilities in the laboratory. The physical simulation results are also compared with digital simulation results. This physical investigation provides a reliable foundation for the effective development of assessment approaches and countermeasures.

  18. Physical Security System Sensitivity to DBT Perturbations

    E-Print Network [OSTI]

    Conchewski, Curtis

    2012-10-19T23:59:59.000Z

    , multiple scenarios are assessed that test different sets of adversary capabilities to better uncover and understand any security system vulnerabilities that may exist. We believe the benefit of identifying these site-specific security vulnerabilities...

  19. High voltage pulse conditioning

    DOE Patents [OSTI]

    Springfield, Ray M. (Sante Fe, NM); Wheat, Jr., Robert M. (Los Alamos, NM)

    1990-01-01T23:59:59.000Z

    Apparatus for conditioning high voltage pulses from particle accelerators in order to shorten the rise times of the pulses. Flashover switches in the cathode stalk of the transmission line hold off conduction for a determinable period of time, reflecting the early portion of the pulses. Diodes upstream of the switches divert energy into the magnetic and electrostatic storage of the capacitance and inductance inherent to the transmission line until the switches close.

  20. Continental energy security: Energy security in the North American context1

    E-Print Network [OSTI]

    Hughes, Larry

    , commissioned reports, and signed legislation in an effort to stem crude oil imports and improve energy securityERG/201101 Continental energy security: Energy security in the North American context1 Larry Hughes, Canada 24 January 2011 1 A textbox for the Global Energy Assessment's Knowledge Module 5: Energy Security

  1. Charge-pump voltage converter

    DOE Patents [OSTI]

    Brainard, John P. (Albuquerque, NM); Christenson, Todd R. (Albuquerque, NM)

    2009-11-03T23:59:59.000Z

    A charge-pump voltage converter for converting a low voltage provided by a low-voltage source to a higher voltage. Charge is inductively generated on a transfer rotor electrode during its transit past an inductor stator electrode and subsequently transferred by the rotating rotor to a collector stator electrode for storage or use. Repetition of the charge transfer process leads to a build-up of voltage on a charge-receiving device. Connection of multiple charge-pump voltage converters in series can generate higher voltages, and connection of multiple charge-pump voltage converters in parallel can generate higher currents. Microelectromechanical (MEMS) embodiments of this invention provide a small and compact high-voltage (several hundred V) voltage source starting with a few-V initial voltage source. The microscale size of many embodiments of this invention make it ideally suited for MEMS- and other micro-applications where integration of the voltage or charge source in a small package is highly desirable.

  2. INTEGRATED GHz VOLTAGE CONTROLLED OSCILLATORS

    E-Print Network [OSTI]

    Kinget, Peter

    INTEGRATED GHz VOLTAGE CONTROLLED OSCILLATORS Peter Kinget Bell Labs - Lucent Technologies Murray Hill, NJ (USA) Abstract The voltage controlled oscillator (VCO) is a critical sub. We focus on the de- sign of a critical sub-block: the voltage controlled oscillator (VCO). We review

  3. Life Cycle Assessment of the Energy Independence and Security Act of 2007: Ethanol - Global Warming Potential and Environmental Emissions

    SciTech Connect (OSTI)

    Heath, G. A.; Hsu, D. D.; Inman, D.; Aden, A.; Mann, M. K.

    2009-07-01T23:59:59.000Z

    The objective of this study is to use life cycle assessment (LCA) to evaluate the global warming potential (GWP), water use, and net energy value (NEV) associated with the EISA-mandated 16 bgy cellulosic biofuels target, which is assumed in this study to be met by cellulosic-based ethanol, and the EISA-mandated 15 bgy conventional corn ethanol target. Specifically, this study compares, on a per-kilometer-driven basis, the GWP, water use, and NEV for the year 2022 for several biomass feedstocks.

  4. Transient recovery voltage considerations in the application of medium voltage circuit breakers

    SciTech Connect (OSTI)

    Swindler, D.L.; Schwartz, P.; Hamer, P.S.; Lambert, S.R.

    1995-12-31T23:59:59.000Z

    Medium Voltage Circuit Breakers can fail to interrupt 3-phase fault currents when power systems have Transient Recovery Voltage (TRV) characteristics which exceed the rating of the circuit breaker. This paper examines the application of 13.8kV generation and load switchgear for an oil refinery in which circuit parameters as originally designed would have exceeded the 13.8kV circuit breakers TRV ratings had corrective measures not been taken. This paper illustrates this case and discusses the basis of TRV, how TRV is assessed, and alternative actions taken to bring circuits to within the 13.8 kV circuit breaker ratings.

  5. Ignition distributor voltage generator

    SciTech Connect (OSTI)

    Boyer, J.A.

    1986-11-04T23:59:59.000Z

    This patent describes a voltage pulse generator and ignition distributor comprising, a base, a shaft rotatably supported by the base, a distributor cap supported by the base having a center electrode and circumferentially spaced outer electrodes. The pulse generator and ignition distribution also include a first rotor driven by the shaft formed of electrical insulating material having electrically conductive means connected to the center terminal and a portion that rotates past the outer electrodes. The portion of the electrically conductive means that rotates past the outer electrodes is spaced from the outer electrodes to form a gap therebetween. A voltage pulse generator comprises a second rotor driven by the shaft, at least one permanent magnet and an annular pickup coil supported by the base. The pickup coil has inner turns and outer turns, the beginning turn of the inner turns connected to a first lead and the last turn of the outer turns connected to a second lead, the outer turns enclosing the inner turns. The pickup coil also has a circuit connected directly between the second lead and ground which is operative to provide a direct conductive path to ground for high frequency energy capacitively coupled to the outer turns from the gap discharge between the electrically conductive means of the first rotor and an outer electrode, the outer turns forming a grounded shield for the inner turns.

  6. Oversight Reports - Nevada National Security Site | Department...

    Broader source: Energy.gov (indexed) [DOE]

    and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems Self-Assessment October 13, 2011 Independent Oversight Review, Nevada Site Office -...

  7. 2011 Annual Planning Summary for Secure Transportation Office (OST)

    Broader source: Energy.gov [DOE]

    The ongoing and projected Environmental Assessments and Environmental Impact Statements for 2011 and 2012 within the Secure Transportation Office (OST).

  8. Transportation Security

    Broader source: Energy.gov (indexed) [DOE]

    Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

  9. Security Specialist

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

  10. Global security

    ScienceCinema (OSTI)

    Lynch, Patrick

    2014-07-15T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  11. Global security

    SciTech Connect (OSTI)

    Lynch, Patrick

    2014-07-14T23:59:59.000Z

    Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

  12. Cyber Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

  13. Humidity, Temperature, and Voltage (Presentation)

    SciTech Connect (OSTI)

    Wohlgemuth, J.

    2012-03-01T23:59:59.000Z

    An update is given on the work of the PV Quality Assurance Task Force; Group 3: studying the effects of humidity, temperature, and voltage bias.

  14. Status of the National Security Workforce

    SciTech Connect (OSTI)

    None

    2008-03-31T23:59:59.000Z

    This report documents the status of the national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. This report includes an assessment of the current workforce situation. The national security workforce is an important component of national security for our country. With the increase of global threats of terrorism, this workforce is being called upon more frequently. This has resulted in the need for an increasing number of national security personnel. It is imperative to attract and retain a skilled and competitive national security workforce.

  15. Transient voltage oscillations in coils

    SciTech Connect (OSTI)

    Chowdhuri, P.

    1985-01-01T23:59:59.000Z

    Magnet coils may be excited into internal voltage oscillations by transient voltages. Such oscillations may electrically stress the magnet's dielectric components to many times its normal stress. This may precipitate a dielectric failure, and the attendant prolonged loss of service and costly repair work. Therefore, it is important to know the natural frequencies of oscillations of a magnet during the design stage, and to determine whether the expected switching transient voltages can excite the magnet into high-voltage internal oscillations. The series capacitance of a winding significantly affects its natural frequencies. However, the series capacitance is difficult to calculate, because it may comprise complex capacitance network, consisting of intra- and inter-coil turn-to-turn capacitances of the coil sections. A method of calculating the series capacitance of a winding is proposed. This method is rigorous but simple to execute. The time-varying transient voltages along the winding are also calculated.

  16. AC system stability analysis and assessment for Shipboard Power Systems

    E-Print Network [OSTI]

    Qi, Li

    2006-04-12T23:59:59.000Z

    due to reconfiguration might cause voltage instability, such as progressive voltage decreases or voltage oscillations. SPS stability thus should be assessed to ensure the stable operation of a system during reconfiguration. In this dissertation, time...

  17. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-07-08T23:59:59.000Z

    This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

  18. Security In Information Systems

    E-Print Network [OSTI]

    Candan, Selçuk

    rights, and they are proposing security policies, security planning, personal data protection laws, etc

  19. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

  20. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

  1. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

  2. MULTIAREA SYSTEM RELIABILITY: THE ECONOMIC EVALUATION OF SYSTEM SECURITY CRITERIA

    E-Print Network [OSTI]

    Gross, George

    MULTIAREA SYSTEM RELIABILITY: THE ECONOMIC EVALUATION OF SYSTEM SECURITY CRITERIA BY TEOMAN GULER B assessment studies and the quantification of the economics of secure power system operations security and the economics of secure operations in the competitive market environment. The advent

  3. Low voltage nonprimary explosive detonator

    DOE Patents [OSTI]

    Dinegar, Robert H. (Los Alamos, NM); Kirkham, John (Newbury, GB2)

    1982-01-01T23:59:59.000Z

    A low voltage, electrically actuated, nonprimary explosive detonator is disclosed wherein said detonation is achieved by means of an explosive train in which a deflagration-to-detonation transition is made to occur. The explosive train is confined within a cylindrical body and positioned adjacent to low voltage ignition means have electrical leads extending outwardly from the cylindrical confining body. Application of a low voltage current to the electrical leads ignites a self-sustained deflagration in a donor portion of the explosive train which then is made to undergo a transition to detonation further down the train.

  4. Transportation Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

  5. Voltage tunable microwave ferrite resonator

    E-Print Network [OSTI]

    Oates, Daniel E.

    A novel method of implementing a tunable resonator using an applied voltage is presented. Stress is used to tune a microstrip resonator fabricated on a polycrystalline ferrite substrate. The stress was applied either ...

  6. Saving Megawatts with Voltage Optimization

    E-Print Network [OSTI]

    Wilson, T.; Bell, D.

    2010-01-01T23:59:59.000Z

    that had been installed at several electric utility distribution substations in the U.S. and Canada. These systems, being operated in Conservation Voltage Regulation mode, have provided significant energy conservation where they have been installed...

  7. High voltage stability performance of a gamma ray detection device

    SciTech Connect (OSTI)

    Abdullah, Nor Arymaswati; Lombigit, Lojius; Rahman, Nur Aira Abd [Technical Support Division, Malaysian Nuclear Agency, 43000 Kajang, Selangor (Malaysia)

    2014-02-12T23:59:59.000Z

    An industrial grade digital radiation survey meter device is currently being developed at Malaysian Nuclear Agency. This device used a cylindrical type Geiger Mueller (GM) which acts as a detector. GM detector operates at relatively high direct current voltages depend on the type of GM tube. This thin/thick walled cylindrical type of GM tube operates at 450-650 volts range. Proper value and stability performance of high voltage are important parameters to ensure that this device give a reliable radiation dose measurement. This paper will present an assessment of the stability and performance of the high voltage supply for radiation detector. The assessment is performed using System Identification tools box in MATLAB and mathematical statistics.

  8. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-06-20T23:59:59.000Z

    The protection and control of classified information is critical to our nation’s security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6.

  9. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

  10. Information Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-06-29T23:59:59.000Z

    Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

  11. Electronic security device

    DOE Patents [OSTI]

    Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

    1992-03-17T23:59:59.000Z

    The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

  12. Security Conditions

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-09-18T23:59:59.000Z

    To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

  13. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-27T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

  14. SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK

    E-Print Network [OSTI]

    Azevedo, Ricardo

    Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

  15. Voltage, energy and power in electric circuits

    E-Print Network [OSTI]

    Berzins, M.

    Voltage, energy and power in electric circuits Science teaching unit #12;Disclaimer The Department-2008DVD-EN Voltage, energy and power in electric circuits #12;#12;© Crown copyright 2008 1The National Strategies | Secondary Voltage, energy and power in electric circuits 00094-2008DVD-EN Contents Voltage

  16. Ancillary service details: Voltage control

    SciTech Connect (OSTI)

    Kirby, B.; Hirst, E.

    1997-12-01T23:59:59.000Z

    Voltage control is accomplished by managing reactive power on an alternating-current power system. Reactive power can be produced and absorbed by both generation and transmission equipment. Reactive-power devices differ substantially in the magnitude and speed of response and in their capital costs. System operators, transmission owners, generators, customers, power marketers, and government regulators need to pay close attention to voltage control as they restructure the U.S. electricity industry. Voltage control can affect reliability and commerce in three ways: (1) Voltages must be maintained within an acceptable range for both customer and power-system equipment to function properly. (2) The movement of reactive power consumes transmission resources, which limits the ability to move real power and worsens congestion. (3) The movement of reactive power results in real-power losses. When generators are required to supply excessive amounts of reactive power, their real-power production must be curtailed. These opportunity costs are not currently compensated for in most regions. Current tariffs are based on embedded costs. These embedded-cost tariffs average about $0.51/MWh, equivalent to $1.5 billion annually for the United States as a whole. Although this cost is low when compared with the cost of energy, it still aggregates to a significant amount of money. This report takes a basic look at why the power system requires reactive power (an appendix explains the fundamentals of real and reactive power). The report then examines the various types of generation and transmission resources used to supply reactive power and to control voltage. Finally it discusses how these resources are deployed and paid for in several reliability regions around the country. As the U.S. electricity industry is restructured, the generation, transmission, and system-control equipment and functions that maintain voltages within the appropriate ranges are being deintegrated.

  17. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

  18. Integrated Safeguards and Security Management (ISSM) Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The purpose of this Policy is to formalize an Integrated Safeguards and Security Management (ISSM) framework. Safeguards and security management systems provide a formal, organized process for planning, performing, assessing, and improving the secure conduct of work in accordance with risk-based protection strategies. These systems are institutionalized through Department of Energy (DOE) directives and contracts. Does not cancel other directives. Canceled by DOE P 470.1A.

  19. Security seal

    DOE Patents [OSTI]

    Gobeli, Garth W. (Albuquerque, NM)

    1985-01-01T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  20. Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices

    E-Print Network [OSTI]

    Kundur, Deepa

    Impact of Cyber Attacks on Transient Stability of Smart Grids with Voltage Support Devices Bo Chen--Cyber security is becoming a major concern of smart grids, as the functionality of a smart grid is highly on smart grids. This paper discusses several types of cyber attacks. Then, it presents results of studies

  1. Cyber Security and Resilient Systems

    SciTech Connect (OSTI)

    Robert S. Anderson

    2009-07-01T23:59:59.000Z

    The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nation’s cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested – both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

  2. Modulated voltage metastable ionization detector

    SciTech Connect (OSTI)

    Carle, G. C.; Humphry, D. E.; Kojiro, D. R.

    1985-08-27T23:59:59.000Z

    Metastable ionization detectors used for chromatographic analysis usually employa fixed high voltage for the ionization potential. For this reason, the operating range is limited to about three orders of magnitude. By use of the technique disclosed in the instant invention, operating ranges of about nine orders of magnitude are obtained. The output current from a metastable ionization detector (MID) is applied to a modulation voltage circuit. An adjustment is made to balance out the background current, and an output current, above background, is applied to an input of a strip chart recorder. For low level concentrations, i.e., low detected output current, the ionization potential will be at a maximum and the metastable ionization detector will operate at its most sensitive level. When the detected current from the metastable ionization detector increases above a predetermined threshold level, a voltage control circuit is activated which turns on a high voltage transistor which acts to reduce the ionization potential. The ionization potential applied to the metastable ionization detector is then varied so as to maintain the detected signal level constant. The variation in ionization potential is now related to the concentration fo the constituent and a representative amplitude is applied to another input of said strip chart recorder.

  3. E-Print Network 3.0 - assessment models final Sample Search Results

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    O N S E C U R I T Y INITIAL PUBLIC DRAFT Security Assessment Provider... Requirements and Customer Responsibilities: Building a Security Assessment Credentialing Program for...

  4. Evaluation of power system security and development of transmission pricing method

    E-Print Network [OSTI]

    Kim, Hyungchul

    2004-11-15T23:59:59.000Z

    in the long run. Under this deregulated environment, security assessment and pricing of transmission services have become important issues in power systems. This dissertation provides new methods for power system security assessment and transmission pricing...

  5. Cyberspace security system

    SciTech Connect (OSTI)

    Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

    2014-06-24T23:59:59.000Z

    A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

  6. Optimizing secure communication standards for disadvantaged networks

    E-Print Network [OSTI]

    Okano, Stephen Hiroshi

    2009-01-01T23:59:59.000Z

    We present methods for optimizing standardized cryptographic message protocols for use on disadvantaged network links. We first provide an assessment of current secure communication message packing standards and their ...

  7. PARS II New Contractor Information for Interconnection Security...

    Office of Environmental Management (EM)

    V1.0 (November 18, 2010) The Department of Energy (DOE) Headquarters Program Cyber Security Plan (PCSP), dated February 2008, requires the Project Assessment and Reporting System...

  8. Personnel Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21T23:59:59.000Z

    The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals’ eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

  9. Independent Oversight Review, Nevada Site Office and National Security Technologies, LLC- November 2011

    Broader source: Energy.gov [DOE]

    Review of Nevada Site Office and National Security Technologies, LLC, Line Oversight and Contractor Assurance Systems Self-Assessment

  10. High voltage photovoltaic power converter

    DOE Patents [OSTI]

    Haigh, Ronald E. (Arvada, CO); Wojtczuk, Steve (Cambridge, MA); Jacobson, Gerard F. (Livermore, CA); Hagans, Karla G. (Livermore, CA)

    2001-01-01T23:59:59.000Z

    An array of independently connected photovoltaic cells on a semi-insulating substrate contains reflective coatings between the cells to enhance efficiency. A uniform, flat top laser beam profile is illuminated upon the array to produce electrical current having high voltage. An essentially wireless system includes a laser energy source being fed through optic fiber and cast upon the photovoltaic cell array to prevent stray electrical signals prior to use of the current from the array. Direct bandgap, single crystal semiconductor materials, such as GaAs, are commonly used in the array. Useful applications of the system include locations where high voltages are provided to confined spaces such as in explosive detonation, accelerators, photo cathodes and medical appliances.

  11. AP1000 Design for Security

    SciTech Connect (OSTI)

    Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

    2006-07-01T23:59:59.000Z

    Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

  12. Border Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

  13. Onset voltage of corona on coated conductors

    SciTech Connect (OSTI)

    Abdel-Salam, M. [Assiut Univ. (Egypt). Electrical Engineering Dept.; Abo-Shal, Y. [SCECO-East, Dammam (Saudi Arabia). Electrical Engineering Div.

    1995-12-31T23:59:59.000Z

    This paper is aimed for investigating the effect of surface coating on the positive and negative onset voltages of corona from stressed conductor as a pre-requisite for onset-voltage calculation. The electric field is accurately calculated by the charge simulation technique. The calculated onset voltages agreed satisfactorily with those measured experimentally for bare conductors. The effect of coating-layer thickness and permittivity as well as conductor radius and height on the onset-voltage values is discussed.

  14. Security Certification & Accreditation of Federal Information Systems A Tutorial

    E-Print Network [OSTI]

    Madisetti, Vijay K.

    assessments of Security Controls in Information Systems To obtain better understanding of Agency- related to hardware, software, firmware) Security Controls in an Information System, to determine the extent to which/29/2009 Security Certification & Assurance of Federal Information Systems Tutorial Questions during C&A Process

  15. Student Experiential Opportunities in National Security Careers

    SciTech Connect (OSTI)

    None

    2007-12-31T23:59:59.000Z

    This report documents student experiential opportunities in national security careers as part of the National Security Preparedness Project (NSPP), being performed under a Department of Energy (DOE)/National Nuclear Security Administration (NNSA) grant. This report includes a brief description of how experiential opportunities assist students in the selection of a career and a list of opportunities in the private sector and government. The purpose of the NSPP is to promote national security technologies through business incubation, technology demonstration and validation, and workforce development. Workforce development activities will facilitate the hiring of students to work with professionals in both the private and public sectors, as well as assist in preparing a workforce for careers in national security. The goal of workforce development under the NSPP grant is to assess workforce needs in national security and implement strategies to develop the appropriate workforce.

  16. Designing security into software

    E-Print Network [OSTI]

    Zhang, Chang Tony

    2006-01-01T23:59:59.000Z

    When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

  17. Oak Ridge Reservation Needs Assessment | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Oak Ridge Reservation Needs Assessment Oak Ridge Reservation Needs Assessment December 1997 This Needs Assessment for former Oak Ridge National Laboratory and Y-12 Nuclear Security...

  18. Security guide for subcontractors

    SciTech Connect (OSTI)

    Adams, R.C.

    1991-01-01T23:59:59.000Z

    This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

  19. Personnel Security Activities

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-03-25T23:59:59.000Z

    Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

  20. Global Nuclear Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Global Nuclear Security Both DOE and the National Nuclear Security Administration are working to reduce the risk of nuclear proliferation and provide technologies to improve...

  1. Low power, scalable multichannel high voltage controller

    DOE Patents [OSTI]

    Stamps, James Frederick (Livermore, CA); Crocker, Robert Ward (Fremont, CA); Yee, Daniel Dadwa (Dublin, CA); Dils, David Wright (Fort Worth, TX)

    2006-03-14T23:59:59.000Z

    A low voltage control circuit is provided for individually controlling high voltage power provided over bus lines to a multitude of interconnected loads. An example of a load is a drive for capillary channels in a microfluidic system. Control is distributed from a central high voltage circuit, rather than using a number of large expensive central high voltage circuits to enable reducing circuit size and cost. Voltage is distributed to each individual load and controlled using a number of high voltage controller channel switches connected to high voltage bus lines. The channel switches each include complementary pull up and pull down photo isolator relays with photo isolator switching controlled from the central high voltage circuit to provide a desired bus line voltage. Switching of the photo isolator relays is further controlled in each channel switch using feedback from a resistor divider circuit to maintain the bus voltage swing within desired limits. Current sensing is provided using a switched resistive load in each channel switch, with switching of the resistive loads controlled from the central high voltage circuit.

  2. Low power, scalable multichannel high voltage controller

    DOE Patents [OSTI]

    Stamps, James Frederick (Livermore, CA); Crocker, Robert Ward (Fremont, CA); Yee, Daniel Dadwa (Dublin, CA); Dils, David Wright (Fort Worth, TX)

    2008-03-25T23:59:59.000Z

    A low voltage control circuit is provided for individually controlling high voltage power provided over bus lines to a multitude of interconnected loads. An example of a load is a drive for capillary channels in a microfluidic system. Control is distributed from a central high voltage circuit, rather than using a number of large expensive central high voltage circuits to enable reducing circuit size and cost. Voltage is distributed to each individual load and controlled using a number of high voltage controller channel switches connected to high voltage bus lines. The channel switches each include complementary pull up and pull down photo isolator relays with photo isolator switching controlled from the central high voltage circuit to provide a desired bus line voltage. Switching of the photo isolator relays is further controlled in each channel switch using feedback from a resistor divider circuit to maintain the bus voltage swing within desired limits. Current sensing is provided using a switched resistive load in each channel switch, with switching of the resistive loads controlled from the central high voltage circuit.

  3. Dynamic Voltage Regulation Using Distributed Energy Resources

    SciTech Connect (OSTI)

    Xu, Yan [ORNL; Rizy, D Tom [ORNL; Li, Fangxing [ORNL; Kueck, John D [ORNL

    2007-01-01T23:59:59.000Z

    Many distributed energy resources (DE) are near load centres and equipped with power electronics converters to interface with the grid, therefore it is feasible for DE to provide ancillary services such as voltage regulation, nonactive power compensation, and power factor correction. A synchronous condenser and a microturbine with an inverter interface are implemented in parallel in a distribution system to regulate the local voltage. Voltage control schemes of the inverter and the synchronous condenser are developed. The experimental results show that both the inverter and the synchronous condenser can regulate the local voltage instantaneously, while the dynamic response of the inverter is faster than the synchronous condenser; and that integrated voltage regulation (multiple DE perform voltage regulation) can increase the voltage regulation capability, increase the lifetime of the equipment, and reduce the capital and operation costs.

  4. Voltage Vehicles | Open Energy Information

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov PtyInformationSEDS data Jump to: navigation, search ToolVoith HydroVoltage

  5. Security guide for subcontractors

    SciTech Connect (OSTI)

    Adams, R.C.

    1993-06-01T23:59:59.000Z

    This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

  6. Situation Threat Assessment Policy and Protocol (Updated 9/1/11) Rowan University is committed to promoting a safe and secure learning environment. It is

    E-Print Network [OSTI]

    Rusu, Adrian

    appropriate actions, which may include suspension, expulsion, involuntary leave of absence, filing of criminal parties, or expressed in private writings. Possession of any item used as a weapon such as a firearm Threat Assessment Team will recommend actions to the Vice President for Student Life & Dean of Students

  7. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2000-11-16T23:59:59.000Z

    provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

  8. Personnel Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1998-05-22T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

  9. Office of Security Assistance

    Broader source: Energy.gov [DOE]

    The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

  10. Wind Power Plant Voltage Stability Evaluation: Preprint

    SciTech Connect (OSTI)

    Muljadi, E.; Zhang, Y. C.

    2014-09-01T23:59:59.000Z

    Voltage stability refers to the ability of a power system to maintain steady voltages at all buses in the system after being subjected to a disturbance from a given initial operating condition. Voltage stability depends on a power system's ability to maintain and/or restore equilibrium between load demand and supply. Instability that may result occurs in the form of a progressive fall or rise of voltages of some buses. Possible outcomes of voltage instability are the loss of load in an area or tripped transmission lines and other elements by their protective systems, which may lead to cascading outages. The loss of synchronism of some generators may result from these outages or from operating conditions that violate a synchronous generator's field current limit, or in the case of variable speed wind turbine generator, the current limits of power switches. This paper investigates the impact of wind power plants on power system voltage stability by using synchrophasor measurements.

  11. Cyber Security & Smart Grid

    E-Print Network [OSTI]

    Shapiro, J.

    2011-01-01T23:59:59.000Z

    Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

  12. High voltage load resistor array

    DOE Patents [OSTI]

    Lehmann, Monty Ray (Smithfield, VA)

    2005-01-18T23:59:59.000Z

    A high voltage resistor comprising an array of a plurality of parallel electrically connected resistor elements each containing a resistive solution, attached at each end thereof to an end plate, and about the circumference of each of the end plates, a corona reduction ring. Each of the resistor elements comprises an insulating tube having an electrode inserted into each end thereof and held in position by one or more hose clamps about the outer periphery of the insulating tube. According to a preferred embodiment, the electrode is fabricated from stainless steel and has a mushroom shape at one end, that inserted into the tube, and a flat end for engagement with the end plates that provides connection of the resistor array and with a load.

  13. Group 3: Humidity, Temperature, and Voltage (Presentation)

    SciTech Connect (OSTI)

    Wohlgemuth, J.

    2013-05-01T23:59:59.000Z

    Group 3 is chartered to develop accelerated stress tests that can be used as comparative predictors of module lifetime versus stresses associated with humidity, temperature and voltage.

  14. High Voltage Electrolyte for Lithium Batteries

    Broader source: Energy.gov (indexed) [DOE]

    battery using high voltage high energy cathode materials to enable large-scale, cost competitive production of the next generation of electric-drive vehicles. To...

  15. 2013 Annual Summary Report for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada National Security Site, Nye County, Nevada; Review of the Performance Assessments and Composite Analyses

    SciTech Connect (OSTI)

    Shott, Gregory [NSTec] [NSTec

    2014-03-01T23:59:59.000Z

    The Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site (National Security Technologies, LLC 2007a) requires an annual review to assess the adequacy of the performance assessments (PAs) and composite analyses (CAs), with the results submitted to the U.S. Department of Energy (DOE) Office of Environmental Management. The Disposal Authorization Statements for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) also require that such reviews be made and that secondary or minor unresolved issues be tracked and addressed as part of the maintenance plan (DOE 1999a, 2000). The U.S. Department of Energy, National Nuclear Security Administration Nevada Field Office performed an annual review of the Area 3 and Area 5 RWMS PAs and CAs for fiscal year (FY) 2013. This annual summary report presents data and conclusions from the FY 2013 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R&D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada National Security Site (NNSS) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R&D activities were reviewed to determine the adequacy of the CAs. Important developments in FY 2013 include the following: • Development of a new Area 5 RWMS closure inventory estimate based on disposals through FY 2013 • Evaluation of new or revised waste streams by special analysis • Development of version 4.115 of the Area 5 RWMS GoldSim PA/CA model The Area 3 RWMS has been in inactive status since July 1, 2006, with the last shipment received in April 2006. The FY 2013 review of operations, facility design, closure plans, monitoring results, and R&D results for the Area 3 RWMS indicates no changes that would impact PA validity. The conclusion of the annual review is that all performance objectives can be met and the Area 3 RWMS PA remains valid. There is no need to the revise the Area 3 RWMS PA. Review of Area 5 RWMS operations, design, closure plans, monitoring results, and R&D activities indicates that no significant changes have occurred. The FY 2013 PA results, generated with the Area 5 RWMS v4.115 GoldSim PA model, indicate that there continues to be a reasonable expectation of meeting all performance objectives. The results and conclusions of the Area 5 RWMS PA are judged valid, and there is no need to the revise the PA. A review of changes potentially impacting the CAs indicates that no significant changes occurred in FY 2013. The continuing adequacy of the CAs was evaluated with the new models, and no significant changes that would alter the CAs results or conclusions were found. The revision of the Area 3 RWMS CA, which will include the Yucca Flat Underground Test Area (Corrective Action Unit [CAU] 97) source term, is scheduled for FY 2024, following the completion of the Corrective Action Decision Document/Corrective Action Plan in FY 2015. Inclusion of the Frenchman Flat Underground Test Area (CAU 98) results in the Area 5 RWMS CA is scheduled for FY 2016, pending the completion of the CAU 98 Closure Report in FY 2015. Near-term R&D efforts will focus on continuing development of the PA, CA, and inventory models for the Area 3 and Area 5 RWMS.

  16. Capturing power at higher voltages from arrays of microbial fuel cells without voltage reversal

    E-Print Network [OSTI]

    is too low to be used directly for many practical applications. For example, a single light emitting diode (LED) requires a minimum voltage of 2 V.2 Thus, effective methods of boosting MFC voltages

  17. The Constant Voltage Transformer (CVT) for Mitigating Effects of Voltage Sags on Industrial Equipment

    E-Print Network [OSTI]

    Ferraro, R. J.; Osborne, R.; Stephens, R.

    ) an increase in loads that use power electronics in some type of power conversion configuration [1][2]. This paper presents applications of the constant-voltage transformer (CVT) for mitigating the effects of electric service voltage sags on industrial...

  18. Using Operational Security (OPSEC) to Support a Cyber Security...

    Broader source: Energy.gov (indexed) [DOE]

    Cyber Security: Defense in Depth Strategies The Chief Information Officer (CIO) at the U 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program...

  19. Information Security: Coordination of Federal Cyber Security...

    Broader source: Energy.gov (indexed) [DOE]

    and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue...

  20. Cyber Security Requirements for Risk Management

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-02-19T23:59:59.000Z

    The Notice ensures that system owners consistently assess the threats to and vulnerabilities of systems in order to implement adequate security controls. The Notice will also ensure compliance with the requirements of DOE O 205.1, Department of Energy Cyber Security Management Program, dated 3-21-03, and protect DOE information and information systems from unauthorized access, use, disclosure, modification, or destruction. DOE N 205.15, dated 3/18/05, extends this directive until 3/18/06.

  1. Fiber-optic voltage sensor with cladded fiber and evanescent wave variation detection

    DOE Patents [OSTI]

    Wood, C.B.

    1992-12-15T23:59:59.000Z

    A fiber optic voltage sensor is described which includes a source of light, a reference fiber for receiving a known percentage of the light and an electrostrictive element having terminals across which is applied, a voltage to be measured. The electrostrictive element is responsive to the applied voltage to assume an altered physical state. A measuring fiber also receives a known percentage of light from the light source and is secured about the electrostrictive element. The measuring fiber is provided with a cladding and exhibits an evanescent wave in the cladding. The measuring fiber has a known length which is altered when the electrostrictive element assumes its altered physical state. A differential sensor is provided which senses the intensity of light in both the reference fiber and the measuring fiber and provides an output indicative of the difference between the intensities. 3 figs.

  2. Voltage Collapse SimulationVoltage Collapse Simulation (Eastern Interconnection(Eastern Interconnection

    E-Print Network [OSTI]

    PSERC Voltage Collapse SimulationVoltage Collapse Simulation (Eastern Interconnection(Eastern Interconnection Scenario)Scenario) Simulation Prepared by Dennis J. RaySimulation Prepared by Dennis J. Ray Interconnection based on a series of generator and line outages. An actual voltage collapse may not occur due

  3. DESIGN AND IMPLEMENTATION OF A FUZZY LOGIC-BASED VOLTAGE CONTROLLER FOR VOLTAGE REGULATION

    E-Print Network [OSTI]

    LaMeres, Brock J.

    1 DESIGN AND IMPLEMENTATION OF A FUZZY LOGIC-BASED VOLTAGE CONTROLLER FOR VOLTAGE REGULATION In this paper the design and implementation of a fuzzy logic-based controller is described for regulating the output voltage of a synchronous generator. An automated fuzzy logic-based control strategy is presented

  4. Climate Change and National Security

    SciTech Connect (OSTI)

    Malone, Elizabeth L.

    2013-02-01T23:59:59.000Z

    Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities – with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

  5. Optimal Power Flow Incorporating Voltage Collapse Constraints

    E-Print Network [OSTI]

    Cañizares, Claudio A.

    Optimal Power Flow Incorporating Voltage Collapse Constraints William Rosehart Claudio Ca on the current operating con- ditions is presented. Second, an Optimal Power Flow formulation that incorporates: Voltage Collapse, Optimal Power Flow, Bifur- cations. I. Introduction As open-access market principles

  6. Voltage regulation in linear induction accelerators

    DOE Patents [OSTI]

    Parsons, William M. (Santa Fe, NM)

    1992-01-01T23:59:59.000Z

    Improvement in voltage regulation in a Linear Induction Accelerator wherein a varistor, such as a metal oxide varistor, is placed in parallel with the beam accelerating cavity and the magnetic core. The non-linear properties of the varistor result in a more stable voltage across the beam accelerating cavity than with a conventional compensating resistance.

  7. Voltage regulation in linear induction accelerators

    DOE Patents [OSTI]

    Parsons, W.M.

    1992-12-29T23:59:59.000Z

    Improvement in voltage regulation in a linear induction accelerator wherein a varistor, such as a metal oxide varistor, is placed in parallel with the beam accelerating cavity and the magnetic core is disclosed. The non-linear properties of the varistor result in a more stable voltage across the beam accelerating cavity than with a conventional compensating resistance. 4 figs.

  8. Control Systems Security Test Center - FY 2004 Program Summary

    SciTech Connect (OSTI)

    Robert E. Polk; Alen M. Snyder

    2005-04-01T23:59:59.000Z

    In May 2004, the US-CERT Control Systems Security Center (CSSC) was established at Idaho National Laboratory to execute assessment activities to reduce the vulnerability of the nation’s critical infrastructure control systems to terrorist attack. The CSSC implements a program to accomplish the five goals presented in the US-CERT National Strategy for Control Systems Security. This report summarizes the first year funding of startup activities and program achievements that took place in FY 2004 and early FY 2005. This document was prepared for the US-CERT Control Systems Security Center of the National Cyber Security Division of the Department of Homeland Security (DHS). DHS has been tasked under the Homeland Security Act of 2002 to coordinate the overall national effort to enhance the protection of the national critical infrastructure. Homeland Security Presidential Directive HSPD-7 directs federal departments to identify and prioritize the critical infrastructure and protect it from terrorist attack. The US-CERT National Strategy for Control Systems Security was prepared by the National Cyber Security Division to address the control system security component addressed in the National Strategy to Secure Cyberspace and the National Strategy for the Physical Protection of Critical Infrastructures and Key Assets. The US-CERT National Strategy for Control Systems Security identified five high-level strategic goals for improving cyber security of control systems.

  9. Non-contact current and voltage sensor

    SciTech Connect (OSTI)

    Carpenter, Gary D; El-Essawy, Wael; Ferreira, Alexandre Peixoto; Keller, Thomas Walter; Rubio, Juan C; Schappert, Michael A

    2014-03-25T23:59:59.000Z

    A detachable current and voltage sensor provides an isolated and convenient device to measure current passing through a conductor such as an AC branch circuit wire, as well as providing an indication of an electrostatic potential on the wire, which can be used to indicate the phase of the voltage on the wire, and optionally a magnitude of the voltage. The device includes a housing that contains the current and voltage sensors, which may be a ferrite cylinder with a hall effect sensor disposed in a gap along the circumference to measure current, or alternative a winding provided through the cylinder along its axis and a capacitive plate or wire disposed adjacent to, or within, the ferrite cylinder to provide the indication of the voltage.

  10. Flexible method for monitoring fuel cell voltage

    DOE Patents [OSTI]

    Mowery, Kenneth D. (Noblesville, IN); Ripley, Eugene V. (Russiaville, IN)

    2002-01-01T23:59:59.000Z

    A method for equalizing the measured voltage of each cluster in a fuel cell stack wherein at least one of the clusters has a different number of cells than the identical number of cells in the remaining clusters by creating a pseudo voltage for the different cell numbered cluster. The average cell voltage of the all of the cells in the fuel cell stack is calculated and multiplied by a constant equal to the difference in the number of cells in the identical cell clusters and the number of cells in the different numbered cell cluster. The resultant product is added to the actual voltage measured across the different numbered cell cluster to create a pseudo voltage which is equivalent in cell number to the number of cells in the other identical numbered cell clusters.

  11. Wide-range voltage modulation

    SciTech Connect (OSTI)

    Rust, K.R.; Wilson, J.M.

    1992-06-01T23:59:59.000Z

    The Superconducting Super Collider`s Medium Energy Booster Abort (MEBA) kicker modulator will supply a current pulse to the abort magnets which deflect the proton beam from the MEB ring into a designated beam stop. The abort kicker will be used extensively during testing of the Low Energy Booster (LEB) and the MEB rings. When the Collider is in full operation, the MEBA kicker modulator will abort the MEB beam in the event of a malfunction during the filling process. The modulator must generate a 14-{mu}s wide pulse with a rise time of less than 1 {mu}s, including the delay and jitter times. It must also be able to deliver a current pulse to the magnet proportional to the beam energy at any time during ramp-up of the accelerator. Tracking the beam energy, which increases from 12 GeV at injection to 200 GeV at extraction, requires the modulator to operate over a wide range of voltages (4 kV to 80 kV). A vacuum spark gap and a thyratron have been chosen for test and evaluation as candidate switches for the abort modulator. Modulator design, switching time delay, jitter and pre-fire data are presented.

  12. Information Security Group IY5512 Computer Security

    E-Print Network [OSTI]

    Mitchell, Chris

    for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

  13. INFRASTRUCTURE SECURITY & ENERGY

    E-Print Network [OSTI]

    Schrijver, Karel

    price monitoring #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERYINFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity

  14. Office of Security Policy

    Broader source: Energy.gov [DOE]

    The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

  15. Data Security ROCKVILLE, MD

    E-Print Network [OSTI]

    Rau, Don C.

    by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

  16. Proceedings Second Annual Cyber Security and Information Infrastructure Research Workshop

    SciTech Connect (OSTI)

    Sheldon, Frederick T [ORNL; Krings, Axel [ORNL; Yoo, Seong-Moo [ORNL; Mili, Ali [ORNL; Trien, Joseph P [ORNL

    2006-01-01T23:59:59.000Z

    The workshop theme is Cyber Security: Beyond the Maginot Line Recently the FBI reported that computer crime has skyrocketed costing over $67 billion in 2005 alone and affecting 2.8M+ businesses and organizations. Attack sophistication is unprecedented along with availability of open source concomitant tools. Private, academic, and public sectors invest significant resources in cyber security. Industry primarily performs cyber security research as an investment in future products and services. While the public sector also funds cyber security R&D, the majority of this activity focuses on the specific mission(s) of the funding agency. Thus, broad areas of cyber security remain neglected or underdeveloped. Consequently, this workshop endeavors to explore issues involving cyber security and related technologies toward strengthening such areas and enabling the development of new tools and methods for securing our information infrastructure critical assets. We aim to assemble new ideas and proposals about robust models on which we can build the architecture of a secure cyberspace including but not limited to: * Knowledge discovery and management * Critical infrastructure protection * De-obfuscating tools for the validation and verification of tamper-proofed software * Computer network defense technologies * Scalable information assurance strategies * Assessment-driven design for trust * Security metrics and testing methodologies * Validation of security and survivability properties * Threat assessment and risk analysis * Early accurate detection of the insider threat * Security hardened sensor networks and ubiquitous computing environments * Mobile software authentication protocols * A new "model" of the threat to replace the "Maginot Line" model and more . . .

  17. PH-315 A. La Rosa VOLTAGE-CONTROLLED OSCILLATOR

    E-Print Network [OSTI]

    PH-315 A. La Rosa VOLTAGE-CONTROLLED OSCILLATOR 1. PURPOSE: An integrator and a Schmitt Trigger voltage; hence its name "voltage-controlled oscillator." 2. VOLTAGE-CONTROLLED OSCILLATOR Figure 1 shows voltage. An unusual feature of the circuit is its operation using a single positive supply.1 #12;- + 50k V

  18. Personnel Security Program Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-07-12T23:59:59.000Z

    This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

  19. Security system signal supervision

    SciTech Connect (OSTI)

    Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

    1991-09-01T23:59:59.000Z

    This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

  20. Lemnos interoperable security project.

    SciTech Connect (OSTI)

    Halbgewachs, Ronald D.

    2010-03-01T23:59:59.000Z

    With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

  1. Electro-optical voltage sensor head

    DOE Patents [OSTI]

    Woods, Gregory K. (Idaho Falls, ID)

    1998-01-01T23:59:59.000Z

    A miniature electro-optic voltage sensor system capable of accurate operation at high voltages. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam's polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured.

  2. Tag: Security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurity Tag: Security

  3. Tag: security | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9.security Tag: security Displaying 1 -

  4. Secure Storage | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.SecureSecure Storage

  5. Researchers map atomic movements that trigger voltage fade in...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    map atomic movements that trigger voltage fade in high-energy-density batteries January 22, 2015 Voltage and capacity curves from an LMR-NMC high-energy cathode show voltage fade...

  6. What is Security? A perspective on achieving security

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-05T23:59:59.000Z

    This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

  7. EA-1532: Final Environmental Assessment | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Assessment EA-1532: Final Environmental Assessment Proposed Consolidation of Neutron Generator Tritium Target Loading Production As part of National Nuclear Security...

  8. Modular high voltage power supply for chemical analysis

    DOE Patents [OSTI]

    Stamps, James F. (Livermore, CA); Yee, Daniel D. (Dublin, CA)

    2008-07-15T23:59:59.000Z

    A high voltage power supply for use in a system such as a microfluidics system, uses a DC-DC converter in parallel with a voltage-controlled resistor. A feedback circuit provides a control signal for the DC-DC converter and voltage-controlled resistor so as to regulate the output voltage of the high voltage power supply, as well as, to sink or source current from the high voltage supply.

  9. Modular high voltage power supply for chemical analysis

    SciTech Connect (OSTI)

    Stamps, James F. (Livermore, CA); Yee, Daniel D. (Dublin, CA)

    2010-05-04T23:59:59.000Z

    A high voltage power supply for use in a system such as a microfluidics system, uses a DC-DC converter in parallel with a voltage-controlled resistor. A feedback circuit provides a control signal for the DC-DC converter and voltage-controlled resistor so as to regulate the output voltage of the high voltage power supply, as well as, to sink or source current from the high voltage supply.

  10. Modular high voltage power supply for chemical analysis

    DOE Patents [OSTI]

    Stamps, James F. (Livermore, CA); Yee, Daniel D. (Dublin, CA)

    2007-01-09T23:59:59.000Z

    A high voltage power supply for use in a system such as a microfluidics system, uses a DC--DC converter in parallel with a voltage-controlled resistor. A feedback circuit provides a control signal for the DC--DC converter and voltage-controlled resistor so as to regulate the output voltage of the high voltage power supply, as well as, to sink or source current from the high voltage supply.

  11. [1] B. Genge, C. Siaterlis, and M. Hohenadel. AMICI: an assessment platform for multi-domain security experimentation on critical infrastructures. In B. M. Hmmerli, N. Kalstad Svendsen, and

    E-Print Network [OSTI]

    Briesemeister, Linda

    critical infrastructures (NCIs), e.g., power plants. They revealed several vulnerabilities in today's NCIs: ICT, power grid and railway. Keywords: Critical Infrastructure; security; experimentation; testbed [2] B. Reaves and T. Morris. An open virtual testbed for industrial control system security research

  12. Electro-optic high voltage sensor

    DOE Patents [OSTI]

    Davidson, James R.; Seifert, Gary D.

    2003-09-16T23:59:59.000Z

    A small sized electro-optic voltage sensor capable of accurate measurement of high voltages without contact with a conductor or voltage source is provided. When placed in the presence of an electric field, the sensor receives an input beam of electromagnetic radiation. A polarization beam displacer separates the input beam into two beams with orthogonal linear polarizations and causes one linearly polarized beam to impinge a crystal at a desired angle independent of temperature. The Pockels effect elliptically polarizes the beam as it travels through the crystal. A reflector redirects the beam back through the crystal and the beam displacer. On the return path, the polarization beam displacer separates the elliptically polarized beam into two output beams of orthogonal linear polarization. The system may include a detector for converting the output beams into electrical signals and a signal processor for determining the voltage based on an analysis of the output beams.

  13. Voltage Management of Networks with Distributed Generation. 

    E-Print Network [OSTI]

    O'Donnell, James

    2008-01-01T23:59:59.000Z

    At present there is much debate about the impacts and benefits of increasing the amount of generation connected to the low voltage areas of the electricity distribution network. The UK government is under political ...

  14. Low voltage arc formation in railguns

    DOE Patents [OSTI]

    Hawke, R.S.

    1985-08-05T23:59:59.000Z

    A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile.

  15. Low voltage arc formation in railguns

    DOE Patents [OSTI]

    Hawke, R.S.

    1987-11-17T23:59:59.000Z

    A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile. 2 figs.

  16. Low voltage arc formation in railguns

    DOE Patents [OSTI]

    Hawke, Ronald S. (Livermore, CA)

    1987-01-01T23:59:59.000Z

    A low voltage plasma arc is first established across the rails behind the projectile by switching a low voltage high current source across the rails to establish a plasma arc by vaporizing a fuse mounted on the back of the projectile, maintaining the voltage across the rails below the railgun breakdown voltage to prevent arc formation ahead of the projectile. After the plasma arc has been formed behind the projectile a discriminator switches the full energy bank across the rails to accelerate the projectile. A gas gun injector may be utilized to inject a projectile into the breech of a railgun. The invention permits the use of a gas gun or gun powder injector and an evacuated barrel without the risk of spurious arc formation in front of the projectile.

  17. 2012 Annual Summary Report for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada National Security Site, Nye County, Nevada: Review of the Performance Assessments and Composite Analyses

    SciTech Connect (OSTI)

    Shott, G. [National Security Technologies, LLC

    2013-03-18T23:59:59.000Z

    The Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site (National Security Technologies, LLC 2007a) requires an annual review to assess the adequacy of the performance assessments (PAs) and composite analyses (CAs), with the results submitted to the U.S. Department of Energy (DOE) Office of Environmental Management. The Disposal Authorization Statements for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) also require that such reviews be made and that secondary or minor unresolved issues be tracked and addressed as part of the maintenance plan (DOE 1999a, 2000). The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office performed an annual review of the Area 3 and Area 5 RWMS PAs and CAs for fiscal year (FY) 2012. This annual summary report presents data and conclusions from the FY 2012 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R&D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada National Security Site (NNSS) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R&D activities were reviewed to determine the adequacy of the CAs. Important developments in FY 2012 include the following: ? Release of a special analysis for the Area 3 RWMS assessing the continuing validity of the PA and CA ? Development of a new Area 5 RWMS closure inventory estimate based on disposals through FY 2012 ? Evaluation of new or revised waste streams by special analysis ? Development of version 4.114 of the Area 5 RWMS GoldSim PA model The Area 3 RWMS has been in inactive status since July 1, 2006, with the last shipment received in April 2006. The FY 2012 review of operations, facility design, closure plans, monitoring results, and R&D results for the Area 3 RWMS indicates no changes that would impact PA validity. A special analysis using the Area 3 RWMS v2.102 GoldSim PA model was prepared to update the PA results for the Area 3 RWMS in FY 2012. The special analysis concludes that all performance objectives can be met and the Area 3 RWMS PA remains valid. There is no need to the revise the Area 3 RWMS PA. Review of Area 5 RWMS operations, design, closure plans, monitoring results, and R&D activities indicates no significant changes other than an increase in the inventory disposed. The FY 2012 PA results, generated with the Area 5 RWMS v4.114 GoldSim PA model, indicate that there continues to be a reasonable expectation of meeting all performance objectives. The results and conclusions of the Area 5 RWMS PA are judged valid, and there is no need to the revise the PA. A review of changes potentially impacting the CAs indicates that no significant changes occurred in FY 2012. The continuing adequacy of the CAs was evaluated with the new models, and no significant changes that would alter CA results or conclusions were found. The revision of the Area 3 RWMS CA, which will include the Underground Test Area source term (Corrective Action Unit [CAU] 97), is scheduled for FY 2024, following the completion of the Yucca Flat CAU 97 Corrective Action Decision Document/Corrective Action Plan in FY 2016. Inclusion of the Frenchman Flat CAU 98 results in the Area 5 RWMS CA is scheduled for FY 2016, pending the completion of the CAU 98 closure report in FY 2015. Near-term R&D efforts will focus on continuing development of the Area 3 and Area 5 RWMS GoldSim PA/CA and inventory models.

  18. Group 3: Humidity, Temperature, and Voltage

    Broader source: Energy.gov [DOE]

    This PowerPoint presentation, focused on humidity, temperature and voltage testing, was originally presented by John Wohlgemuth at the NREL 2013 PV Module Reliability Workshop on Feb. 26-27, 2013 in Denver, CO. It summarizes the activities of a working group chartered to develop accelerated stress tests that can be used as comparative predictors of module life versus stresses associated with humidity, temperature and voltage.

  19. Addressing the Voltage Fade Issue with Lithium-Manganese-Rich...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Addressing the Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials Addressing the Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials 2013 DOE...

  20. Addressing the Voltage Fade Issue with Lithium-Manganese-Rich...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials Addressing the Voltage Fade Issue with Lithium-Manganese-Rich Oxide Cathode Materials 2012 DOE Hydrogen and...

  1. High-Voltage Solid Polymer Batteries for Electric Drive Vehicles...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    High-Voltage Solid Polymer Batteries for Electric Drive Vehicles High-Voltage Solid Polymer Batteries for Electric Drive Vehicles 2012 DOE Hydrogen and Fuel Cells Program and...

  2. Vehicle Technologies Office Merit Review 2014: High-Voltage Solid...

    Broader source: Energy.gov (indexed) [DOE]

    High-Voltage Solid Polymer Batteries for Electric Drive Vehicles Vehicle Technologies Office Merit Review 2014: High-Voltage Solid Polymer Batteries for Electric Drive Vehicles...

  3. High-Voltage Solid Polymer Batteries for Electric Drive Vehicles...

    Broader source: Energy.gov (indexed) [DOE]

    High-Voltage Solid Polymer Batteries for Electric Drive Vehicles High-Voltage Solid Polymer Batteries for Electric Drive Vehicles 2013 DOE Hydrogen and Fuel Cells Program and...

  4. High voltage overhead long transmission line design and fault analysis.

    E-Print Network [OSTI]

    Elzain, Mohamed Ali

    2011-01-01T23:59:59.000Z

    ??The goal of this project is to design a reliable high voltage overhead long transmission line that satisfies specific design criteria including voltage regulation, efficiency,… (more)

  5. Securing Internet Routing Securing Internet Routing

    E-Print Network [OSTI]

    Goldberg, Sharon

    Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: · Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc · Set up paths

  6. Aligning Service-Oriented Architectures with Security Requirements

    E-Print Network [OSTI]

    Aligning Service-Oriented Architectures with Security Requirements Mattia Salnitri, Fabiano Dalpiaz of a service-oriented architecture-- representing a composite service--with security requirements. Service- oriented architectures are dynamic (services can be replaced on-the-fly), and assessing compliance

  7. 2011 Annual Summary Report for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada National Security Site, Nye County, Nevada: Review of the Performance Assessments and Composite Analyses

    SciTech Connect (OSTI)

    NSTec Environmental Management

    2012-03-20T23:59:59.000Z

    The Maintenance Plan for the Performance Assessments and Composite Analyses for the Area 3 and Area 5 Radioactive Waste Management Sites at the Nevada Test Site (National Security Technologies, LLC, 2007a) requires an annual review to assess the adequacy of the Performance Assessments (PAs) and Composite Analyses (CAs), with the results submitted annually to U.S. Department of Energy (DOE) Office of Environmental Management. The Disposal Authorization Statements for the Area 3 and Area 5 Radioactive Waste Management Sites (RWMSs) also require that such reviews be made and that secondary or minor unresolved issues be tracked and addressed as part of the maintenance plan (DOE, 1999a; 2000). The U.S. Department of Energy, National Nuclear Security Administration Nevada Site Office performed an annual review of the Area 3 and Area 5 RWMS PAs and CAs for fiscal year (FY) 2011. This annual summary report presents data and conclusions from the FY 2011 review, and determines the adequacy of the PAs and CAs. Operational factors (e.g., waste forms and containers, facility design, and waste receipts), closure plans, monitoring results, and research and development (R and D) activities were reviewed to determine the adequacy of the PAs. Likewise, the environmental restoration activities at the Nevada National Security Site (NNSS) (formerly the Nevada Test Site) relevant to the sources of residual radioactive material that are considered in the CAs, the land-use planning, and the results of the environmental monitoring and R and D activities were reviewed to determine the adequacy of the CAs. Important developments in FY 2011 include the following: (1) Operation of a new shallow land disposal unit and a new Resource Conservation and Recovery Act (RCRA)-compliant lined disposal unit at the Area 5 RWMS; (2) Development of new closure inventory estimates based on disposals through FY 2011; (3) Evaluation of new or revised waste streams by special analysis; (4) Development of version 2.102 of the Area 3 RWMS GoldSim PA model; and (5) Development of version 4.113 of the Area 5 RWMS GoldSim PA model. Analysis of the latest available data using the Area 5 RWMS v4.113 GoldSim PA model indicates that all performance objectives can be met. The results and conclusions of the Area 5 RWMS PA are judged valid, and there is no need to the revise the PA. The Area 3 RWMS has been in inactive status since July 1, 2006, with the last shipment received in April 2006. In FY 2011, there were no operational changes, monitoring results, or R and D results for the Area 3 RWMS that would impact PA validity. Despite the increase in waste volume and inventory at the Area 3 RWMS since 1996 when the PA was approved, the facility performance evaluated with the Area 3 RWMS PA GoldSim model, version 2.0 (with the final closure inventory), remains well below the performance objectives set forth in U.S. Department of Energy Order DOE O 435.1, 'Radioactive Waste Management' (DOE, 2001). The conclusions of the Area 3 RWMS PA remain valid. A special analysis was prepared to update the PA and CA results for the Area 3 RWMS in FY 2011. Release of the special analysis is planned for FY 2012. The continuing adequacy of the CAs was evaluated with the new models, and no significant changes that would alter CA results or conclusions were found. Inclusion of the Frenchman Flat Underground Test Area (UGTA) results in the Area 5 RWMS CA is scheduled for FY 2016, pending the completion of the closure report for the Frenchman Flat UGTA corrective action unit (CAU) in FY 2015. An industrial site, CAU 547, with corrective action sites near the Area 3 RWMS was found to have a significant plutonium inventory in 2009. CAU 547 will be evaluated for inclusion of future revisions or updates of the Area 3 RWMS CA. The revision of the Area 3 RWMS CA, which will include the UGTA source terms, is expected in FY 2024, following the completion of the Yucca Flat CAU Corrective Action Decision Document, scheduled for FY 2023. Near-term R and D efforts will focus on continuing development of the Are

  8. Homeland Security Challenges Facing Small Water Systems in Texas

    E-Print Network [OSTI]

    Dozier, Monty; Theodori, Gene L.; Jensen, Ricard

    2007-05-31T23:59:59.000Z

    with small water systems to develop volun- tary assessments of the homeland security threats that they face. EPA provides assistance to small systems through education work- shops and seminars, reports and guidelines, and tutorials on CD. In 2005 EPA...

  9. T-544: Cisco Security Advisory: Cisco Content Services Gateway...

    Broader source: Energy.gov (indexed) [DOE]

    Security Tracker Alert CVE-2011-0350 CVE-2011-0349 CVE-2011-0348 IMPACT ASSESSMENT: Medium Discussion: A remote user can access sites without the billing policy being...

  10. Office of Heath, Safety and Security Now Two New Offices

    Broader source: Energy.gov [DOE]

    To serve you better, DOE has structured the former HSS into to new organizations: the Office Independent Enterprise Assessment (IEA); and Office of Environment, Health, Safety and Security (EHSS).

  11. Safeguards and Security Inspection and Assessment Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-06-23T23:59:59.000Z

    Cancels DOE O 5630.12. Parargaph 7c(6), 7c(7), 7c(8)(a), and 7g (8)(f) are canceled by DOE O 231.1 dated 9-30-1995.

  12. Analytical foundations of physical security system assessment

    E-Print Network [OSTI]

    Graves, Gregory Howard

    2006-10-30T23:59:59.000Z

    - tion scenarios or systems. Peck [23] [24] and Peck and Lacombe [25] have explored unattended ground sensors with regard to their employment as part of an intrusion detection system in a force protection role for base camps. They examine environ- mental...

  13. Cyber and Security Assessments | Department of Energy

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy UsageAUDITVehiclesTankless orAChiefAppropriation FY 2012 FY 2013 FYCurrent and

  14. Office of Security Assessments | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen OwnedofDepartment ofJaredOakscience-based,OHAGasandSafety andEnergy

  15. Cyber Assessment Methods for SCADA Security

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists'Montana. DOCUMENTS AVAILABLEReport 2009Site | DepartmentOffice ofExamination Report5

  16. Energy Security Initiatives Update

    Broader source: Energy.gov [DOE]

    Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—lists Federal government energy security initiatives.

  17. Control Systems Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    systems within the nation's critical infrastructure. The CSSP assists control systems vendors and asset ownersoperators in identifying security vulnerabilities and developing...

  18. Industrial Security Specialst

    Broader source: Energy.gov [DOE]

    A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

  19. Nevada National Security Site

    Broader source: Energy.gov [DOE]

    HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities.  In support of national defense initiatives...

  20. Securing Cloud Storage Service.

    E-Print Network [OSTI]

    Zapolskas, Vytautas

    2012-01-01T23:59:59.000Z

    ?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services… (more)

  1. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    the safety, security and effectiveness of the nuclear deterrent without underground nuclear testing, consistent with the principles of the Stockpile Management Program...

  2. TEC Information Security

    Broader source: Energy.gov (indexed) [DOE]

    External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

  3. Cyber Security Architecture Guidelines

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-03-08T23:59:59.000Z

    This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

  4. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Project Reviews, etc., except those specifically reserved for the Administrator for the National Nuclear Security Administration and the Deputy Secretary. cc: Mike Hickman. NA-Stl...

  5. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

  6. Hazardous Material Security (Maryland)

    Broader source: Energy.gov [DOE]

    All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

  7. National Nuclear Security Administration

    Broader source: Energy.gov (indexed) [DOE]

    and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

  8. National Security Initiatives | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

  9. Status of Educational Efforts in National Security Workforce

    SciTech Connect (OSTI)

    None

    2008-03-31T23:59:59.000Z

    This report documents the status of educational efforts for the preparation of a national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. The need to adequately train and educate a national security workforce is at a critical juncture. Even though there are an increasing number of college graduates in the appropriate fields, many of these graduates choose to work in the private sector because of more desirable salary and benefit packages. This report includes an assessment of the current educational situation for the national security workforce.

  10. Distribution System Voltage Performance Analysis for High-Penetration Photovoltaics

    SciTech Connect (OSTI)

    Liu, E.; Bebic, J.

    2008-02-01T23:59:59.000Z

    This report examines the performance of commonly used distribution voltage regulation methods under reverse power flow.

  11. A Charge Pump that Generates Negative High Voltage with Variable Voltage , Eugene Ivanova,

    E-Print Network [OSTI]

    Ayers, Joseph

    A Charge Pump that Generates Negative High Voltage with Variable Voltage Gain Jun Zhaob, , Eugene, Massachusetts 02115, U.S.A. Abstract A cross-coupled structure based charge pump that generates negative high. The proposed negative charge pump is designed to deliver 40 uA with a wide supply range from 2.5V to 5.5V using

  12. Distributed Voltage and Current Control of Multi-Terminal High-Voltage Direct

    E-Print Network [OSTI]

    Dimarogonas, Dimos

    }@kth.se.) Abstract: High-voltage direct current (HVDC) is a commonly used technology for long-distance power for multi-terminal HVDC (MTDC) systems is proposed. Under certain conditions on the controller gains factor behind long-distance power transmission. High-voltage direct current (HVDC) is a commonly used

  13. Enhance your Cyber Security Knowledge

    E-Print Network [OSTI]

    Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

  14. Operational Security (OPSEC) Reminder | Department of Energy

    Broader source: Energy.gov (indexed) [DOE]

    Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

  15. Electronic circuit for measuring series connected electrochemical cell voltages

    DOE Patents [OSTI]

    Ashtiani, Cyrus N. (West Bloomfield, MI); Stuart, Thomas A. (Toledo, OH)

    2000-01-01T23:59:59.000Z

    An electronic circuit for measuring voltage signals in an energy storage device is disclosed. The electronic circuit includes a plurality of energy storage cells forming the energy storage device. A voltage divider circuit is connected to at least one of the energy storage cells. A current regulating circuit is provided for regulating the current through the voltage divider circuit. A voltage measurement node is associated with the voltage divider circuit for producing a voltage signal which is proportional to the voltage across the energy storage cell.

  16. REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE IN BOTH

    E-Print Network [OSTI]

    REVISED CATALOG OF SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS AND ORGANIZATIONS: FOR USE's information systems. The uniform approach to describing controls for both national security and nonnational, implement, and assess their security controls most effectively when the process is carried out as part

  17. DiSC: Benchmarking Secure Chip DBMS Nicolas Anciaux, Luc Bouganim, Philippe Pucheral, and Patrick Valduriez

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    DiSC: Benchmarking Secure Chip DBMS Nicolas Anciaux, Luc Bouganim, Philippe Pucheral, and Patrick irrelevant. The main problem faced by secure chip DBMS designers is to be able to assess various design choices and trade-offs for different applications. Our solution is to use a benchmark for secure chip DBMS

  18. Experimental validation of a high voltage pulse measurement method.

    SciTech Connect (OSTI)

    Cular, Stefan; Patel, Nishant Bhupendra; Branch, Darren W.

    2013-09-01T23:59:59.000Z

    This report describes X-cut lithium niobate's (LiNbO3) utilization for voltage sensing by monitoring the acoustic wave propagation changes through LiNbO3 resulting from applied voltage. Direct current (DC), alternating current (AC) and pulsed voltage signals were applied to the crystal. Voltage induced shift in acoustic wave propagation time scaled quadratically for DC and AC voltages and linearly for pulsed voltages. The measured values ranged from 10 - 273 ps and 189 ps - 2 ns for DC and non-DC voltages, respectively. Data suggests LiNbO3 has a frequency sensitive response to voltage. If voltage source error is eliminated through physical modeling from the uncertainty budget, the sensor's U95 estimated combined uncertainty could decrease to ~0.025% for DC, AC, and pulsed voltage measurements.

  19. Sacramento Area Voltage Support Final Environmental Impact Statement

    SciTech Connect (OSTI)

    N /A

    2003-09-19T23:59:59.000Z

    The Western Area Power Administration's Central Valley Project transmission system forms an integral part of the interconnected Sacramento area transmission grid. Western is contractually responsible to oversee that the system is operated in accordance with strict reliability standards. Growth in the greater Sacramento, California area and power imported from generation outside the region, have increased the demand on the interconnected electric transmission system, leading to transmission system overloads and reducing the reliability and security of the area power system. Western has prepared this Sacramento Area Voltage Support (SVS) Draft Environmental Impact Statement (EIS) in compliance with Federal laws, regulations and guidelines, principally the National Environmental Policy Act (NEPA). This Draft EIS evaluates the potential environmental effects of physical improvements to the area's power system. Enhancements are needed to improve system reliability and provide voltage support for the Sacramento area. The results of public scoping meetings, workshops, meetings with agencies, and earlier studies by Western and area utilities helped to develop a range of alternatives for analysis. The Proposed Action involves: (1) Constructing a new double-circuit, 230-kV transmission line paralleling the existing double-circuit, 230-kV line from the O'Banion Substation to the Elverta Substation; (2) Realigning a portion of the existing Cottonwood-Roseville single-circuit, 230-kV transmission line north of Elverta Substation; and (3) Reconductoring the existing double-circuit, 230-kV transmission line from the Elverta Substation to the Tracy Substation. Public Hearings on the Draft EIS will be held between December 9-12, 2002. Comments on this Draft EIS are encouraged and should be sent to Ms. Loreen McMahon (above). Comments must be received by December 30, 2002.

  20. Sacramento Area Voltage Support Draft Environmental Impact Statement

    SciTech Connect (OSTI)

    N /A

    2002-11-15T23:59:59.000Z

    The Western Area Power Administration's Central Valley Project transmission system forms an integral part of the interconnected Sacramento area transmission grid. Western is contractually responsible to oversee that the system is operated in accordance with strict reliability standards. Growth in the greater Sacramento, California area and power imported from generation outside the region, have increased the demand on the interconnected electric transmission system, leading to transmission system overloads and reducing the reliability and security of the area power system. Western has prepared this Sacramento Area Voltage Support (SVS) Draft Environmental Impact Statement (EIS) in compliance with Federal laws, regulations and guidelines, principally the ''National Environmental Policy Act'' (NEPA). This Draft EIS evaluates the potential environmental effects of physical improvements to the area's power system. Enhancements are needed to improve system reliability and provide voltage support for the Sacramento area. The results of public scoping meetings, workshops, meetings with agencies, and earlier studies by Western and area utilities helped to develop a range of alternatives for analysis. The Proposed Action involves: Constructing a new double-circuit, 230-kV transmission line paralleling the existing double-circuit, 230-kV line from the O'Banion Substation to the Elverta Substation; Realigning a portion of the existing Cottonwood-Roseville single-circuit, 230-kV transmission line north of Elverta Substation; and Reconductoring the existing double-circuit, 230-kV transmission line from the Elverta Substation to the Tracy Substation. Public Hearings on the Draft EIS will be held between December 9-12, 2002. Comments on this Draft EIS are encouraged and should be sent to Ms. Loreen McMahon (above). Comments must be received by December 30, 2002.

  1. Compact high voltage solid state switch

    DOE Patents [OSTI]

    Glidden, Steven C.

    2003-09-23T23:59:59.000Z

    A compact, solid state, high voltage switch capable of high conduction current with a high rate of current risetime (high di/dt) that can be used to replace thyratrons in existing and new applications. The switch has multiple thyristors packaged in a single enclosure. Each thyristor has its own gate drive circuit that circuit obtains its energy from the energy that is being switched in the main circuit. The gate drives are triggered with a low voltage, low current pulse isolated by a small inexpensive transformer. The gate circuits can also be triggered with an optical signal, eliminating the trigger transformer altogether. This approach makes it easier to connect many thyristors in series to obtain the hold off voltages of greater than 80 kV.

  2. Secure Manufacturing | Y-12 National Security Complex

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.Secure Manufacturing

  3. SiGe BiCMOS Topologies for Low-Voltage Millimeter-Wave Voltage Controlled Oscillators and Frequency Dividers

    E-Print Network [OSTI]

    Voinigescu, Sorin Petre

    SiGe BiCMOS Topologies for Low-Voltage Millimeter-Wave Voltage Controlled Oscillators and Frequency-mail: tod@eecg.toronto.edu Abstract -- BiCMOS topologies for mm-wave voltage- controlled oscillators operation for mm-wave applications. II. BICMOS VOLTAGE-CONTROLLED OSCILLATOR The Colpitts topology

  4. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1997-03-27T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

  5. December 2003 SECURITY CONSIDERATIONS

    E-Print Network [OSTI]

    Perkins, Richard A.

    December 2003 SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE Shirley security early in the information system development life cycle (SDLC), you may be able to avoid higher and a generic system development life cycle for illustrative purposes, the basic con cepts can be applied

  6. DATABASE SECURITY APPLICATIONS

    E-Print Network [OSTI]

    Sandhu, Ravi

    DATABASE SECURITY #12;APPLICATIONS #12;Polyinstantiation for Cover Stories Ravi S. Sandhu and Sushil Jajodia* Center for Secure Information Systems & Department of Information and Software Systems Engineering George Mason University Falffax, VA 22030, USA emaih {sandhu, jajodia}Qsitevax.gmu.edu Abstract

  7. Incidents of Security Concern

    SciTech Connect (OSTI)

    Atencio, Julian J.

    2014-05-01T23:59:59.000Z

    This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

  8. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-10-19T23:59:59.000Z

    To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

  9. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-12-29T23:59:59.000Z

    The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

  10. SELECTING INFORMATION TECHNOLOGY SECURITY

    E-Print Network [OSTI]

    be selected and used within the organization's overall program to man age the design, development, and maintenance of its IT security infra structure, and to protect the confiden tiality, integrity objectives and to protect information. Guide to Selecting Information Technology Security Products NIST

  11. December 2007 SECURING EXTERNAL

    E-Print Network [OSTI]

    devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

  12. Evaluation of higher distribution and/or utilization voltages. First interim report (December 1978): literature search and problem definition

    SciTech Connect (OSTI)

    Not Available

    1981-04-01T23:59:59.000Z

    A literature search has been conducted on the economics and technical problems associated with the use of higher voltages in both the primary distribution and secondary utilization systems. After a literature review and evaluation, an assessment of the state-of-the-art with regard to high voltage has been made and is presented for the primary and secondary distribution systems, end use elements, and economics and system analysis or optimization. An annotated bibliography is provided for each of the three categories. A comprehensive list of potential advantages and disadvantages of higher primary distribution and utilization voltages has also been prepared and is presented.

  13. Public key infrastructure for DOE security research

    SciTech Connect (OSTI)

    Aiken, R.; Foster, I.; Johnston, W.E. [and others

    1997-06-01T23:59:59.000Z

    This document summarizes the Department of Energy`s Second Joint Energy Research/Defence Programs Security Research Workshop. The workshop, built on the results of the first Joint Workshop which reviewed security requirements represented in a range of mission-critical ER and DP applications, discussed commonalties and differences in ER/DP requirements and approaches, and identified an integrated common set of security research priorities. One significant conclusion of the first workshop was that progress in a broad spectrum of DOE-relevant security problems and applications could best be addressed through public-key cryptography based systems, and therefore depended upon the existence of a robust, broadly deployed public-key infrastructure. Hence, public-key infrastructure ({open_quotes}PKI{close_quotes}) was adopted as a primary focus for the second workshop. The Second Joint Workshop covered a range of DOE security research and deployment efforts, as well as summaries of the state of the art in various areas relating to public-key technologies. Key findings were that a broad range of DOE applications can benefit from security architectures and technologies built on a robust, flexible, widely deployed public-key infrastructure; that there exists a collection of specific requirements for missing or undeveloped PKI functionality, together with a preliminary assessment of how these requirements can be met; that, while commercial developments can be expected to provide many relevant security technologies, there are important capabilities that commercial developments will not address, due to the unique scale, performance, diversity, distributed nature, and sensitivity of DOE applications; that DOE should encourage and support research activities intended to increase understanding of security technology requirements, and to develop critical components not forthcoming from other sources in a timely manner.

  14. Indirection and computer security.

    SciTech Connect (OSTI)

    Berg, Michael J.

    2011-09-01T23:59:59.000Z

    The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

  15. International Nuclear Security

    SciTech Connect (OSTI)

    Doyle, James E. [Los Alamos National Laboratory

    2012-08-14T23:59:59.000Z

    This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

  16. Office of Departmental Personnel Security

    Broader source: Energy.gov [DOE]

    The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

  17. Departmental Cyber Security Management Policy

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-05-08T23:59:59.000Z

    The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

  18. Electro-optic voltage sensor for sensing voltage in an E-field

    DOE Patents [OSTI]

    Woods, Gregory K. (Idaho Falls, ID); Renak, Todd W. (Idaho Falls, ID)

    1999-01-01T23:59:59.000Z

    A miniature electro-optic voltage sensor system capable of accurate operation at high voltages. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam's polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured.

  19. Electro-optic voltage sensor for sensing voltage in an E-field

    DOE Patents [OSTI]

    Woods, G.K.; Renak, T.W.

    1999-04-06T23:59:59.000Z

    A miniature electro-optic voltage sensor system capable of accurate operation at high voltages is disclosed. The system employs a transmitter, a sensor disposed adjacent to but out of direct electrical contact with a conductor on which the voltage is to be measured, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor where the beam undergoes the Pockels electro-optic effect. The electro-optic effect causes phase shifting in the beam, which is in turn converted to a pair of independent beams, from which the voltage of a system based on its E-field is determined when the two beams are normalized by the signal processor. The sensor converts the beam by splitting the beam in accordance with the axes of the beam`s polarization state (an ellipse whose ellipticity varies between -1 and +1 in proportion to voltage) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured. 18 figs.

  20. Headquarters Facilities Master Security Plan

    Energy Savers [EERE]

    Security Briefing. Failure of any employee to complete the SF-312 results in the termination of hisher security clearance and denial of access to classified matter. The badge...

  1. Energy Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

  2. Smart-Grid Security Issues

    SciTech Connect (OSTI)

    Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

    2010-01-29T23:59:59.000Z

    TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

  3. ANNUAL SECURITY FIRE SAFETY REPORT

    E-Print Network [OSTI]

    ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

  4. Group 3: Humidity, Temperature and Voltage (Presentation)

    SciTech Connect (OSTI)

    Wohlgemuth, J.

    2013-09-01T23:59:59.000Z

    This is a summary of the work of Group 3 of the International PV QA Task Force. Group 3 is chartered to develop accelerated stress tests that can be used as comparative predictors of module lifetime versus stresses associated with humidity, temperature and voltage.

  5. Voltage control on a train system

    DOE Patents [OSTI]

    Gordon, Susanna P.; Evans, John A.

    2004-01-20T23:59:59.000Z

    The present invention provides methods for preventing low train voltages and managing interference, thereby improving the efficiency, reliability, and passenger comfort associated with commuter trains. An algorithm implementing neural network technology is used to predict low voltages before they occur. Once voltages are predicted, then multiple trains can be controlled to prevent low voltage events. Further, algorithms for managing inference are presented in the present invention. Different types of interference problems are addressed in the present invention such as "Interference During Acceleration", "Interference Near Station Stops", and "Interference During Delay Recovery." Managing such interference avoids unnecessary brake/acceleration cycles during acceleration, immediately before station stops, and after substantial delays. Algorithms are demonstrated to avoid oscillatory brake/acceleration cycles due to interference and to smooth the trajectories of closely following trains. This is achieved by maintaining sufficient following distances to avoid unnecessary braking/accelerating. These methods generate smooth train trajectories, making for a more comfortable ride, and improve train motor reliability by avoiding unnecessary mode-changes between propulsion and braking. These algorithms can also have a favorable impact on traction power system requirements and energy consumption.

  6. Electro-optic high voltage sensor

    DOE Patents [OSTI]

    Davidson, James R. (Idaho Falls, ID); Seifert, Gary D. (Idaho Falls, ID)

    2002-01-01T23:59:59.000Z

    A small sized electro-optic voltage sensor capable of accurate measurement of high levels of voltages without contact with a conductor or voltage source is provided. When placed in the presence of an electric field, the sensor receives an input beam of electromagnetic radiation into the sensor. A polarization beam displacer serves as a filter to separate the input beam into two beams with orthogonal linear polarizations. The beam displacer is oriented in such a way as to rotate the linearly polarized beams such that they enter a Pockels crystal having at a preferred angle of 45 degrees. The beam displacer is therefore capable of causing a linearly polarized beam to impinge a crystal at a desired angle independent of temperature. The Pockels electro-optic effect induces a differential phase shift on the major and minor axes of the input beam as it travels through the Pockels crystal, which causes the input beam to be elliptically polarized. A reflecting prism redirects the beam back through the crystal and the beam displacer. On the return path, the polarization beam displacer separates the elliptically polarized beam into two output beams of orthogonal linear polarization representing the major and minor axes. The system may include a detector for converting the output beams into electrical signals, and a signal processor for determining the voltage based on an analysis of the output beams. The output beams are amplitude modulated by the frequency of the electric field and the amplitude of the output beams is proportional to the magnitude of the electric field, which is related to the voltage being measured.

  7. National Security Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurity

  8. March 24, 2008 Databases: Security 1 Database Security and Authorization

    E-Print Network [OSTI]

    Adam, Salah

    to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

  9. INSTITUTE FOR CYBER SECURITY Application-Centric Security

    E-Print Network [OSTI]

    Sandhu, Ravi

    INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

  10. Distribution System Voltage Regulation by Distributed Energy Resources

    SciTech Connect (OSTI)

    Ceylan, Oguzhan [ORNL; Liu, Guodong [ORNL; Xu, Yan [ORNL; Tomsovic, Kevin [University of Tennessee, Knoxville (UTK)

    2014-01-01T23:59:59.000Z

    This paper proposes a control method to regulate voltages in 3 phase unbalanced electrical distribution systems. A constrained optimization problem to minimize voltage deviations and maximize distributed energy resource (DER) active power output is solved by harmony search algorithm. IEEE 13 Bus Distribution Test System was modified to test three different cases: a) only voltage regulator controlled system b) only DER controlled system and c) both voltage regulator and DER controlled system. The simulation results show that systems with both voltage regulators and DER control provide better voltage profile.

  11. Multilevel Cascade H-bridge Inverter DC Voltage Estimation Through Output Voltage Sensing

    E-Print Network [OSTI]

    Tolbert, Leon M.

    system as the inverter power supply may vary. For example, interface of solar panels or fuel cell. The output voltage is then processed by a DSP unit that uses the signals that command the switches

  12. AMALGAMATED SECURITY COMMUNITIES

    E-Print Network [OSTI]

    Harvey, Andrew Stephen

    2011-08-31T23:59:59.000Z

    This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

  13. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1988-01-22T23:59:59.000Z

    To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

  14. Safety, Security & Fire Report

    E-Print Network [OSTI]

    Straight, Aaron

    2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

  15. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-05-25T23:59:59.000Z

    The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

  16. Operations Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1992-04-30T23:59:59.000Z

    To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

  17. Engineering secure software

    E-Print Network [OSTI]

    Jetly, Prateek

    2001-01-01T23:59:59.000Z

    In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after...

  18. Incidents of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2004-03-17T23:59:59.000Z

    Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

  19. SECURING RADIO FREQUENCY IDENTIFICATION (RFID)

    E-Print Network [OSTI]

    business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

  20. ANNUAL SECURITY & FIRE SAFETY REPORT

    E-Print Network [OSTI]

    Maxwell, Bruce D.

    ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

  1. Lemnos Interoperable Security Program

    SciTech Connect (OSTI)

    John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

    2012-01-31T23:59:59.000Z

    The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or â?? tunnelsâ?ť, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

  2. Electrical system architecture having high voltage bus

    DOE Patents [OSTI]

    Hoff, Brian Douglas (East Peoria, IL); Akasam, Sivaprasad (Peoria, IL)

    2011-03-22T23:59:59.000Z

    An electrical system architecture is disclosed. The architecture has a power source configured to generate a first power, and a first bus configured to receive the first power from the power source. The architecture also has a converter configured to receive the first power from the first bus and convert the first power to a second power, wherein a voltage of the second power is greater than a voltage of the first power, and a second bus configured to receive the second power from the converter. The architecture further has a power storage device configured to receive the second power from the second bus and deliver the second power to the second bus, a propulsion motor configured to receive the second power from the second bus, and an accessory motor configured to receive the second power from the second bus.

  3. Reactive Support and Voltage Control Service: Key Issues and Challenges

    E-Print Network [OSTI]

    Gross, George

    reactive support and voltage control services. Keywords ­ Competitive Electricity Markets, Reactive PowerReactive Support and Voltage Control Service: Key Issues and Challenges George Gross^, Paolo Marannino° and Gianfranco Chicco* ^ Department of Electrical and Computer Engineering, University

  4. Low Voltage White Phosphorescent OLED Achievements

    Broader source: Energy.gov [DOE]

    Universal Display Corporation (UDC) and its research partners at Princeton University and the University of Southern California have succeeded in developing a white phosphorescent OLED (PHOLED™) that achieved a record efficiency of 20 lumens per watt. This achievement is the result of the team's collaborative efforts to increase the efficiency of PHOLED lighting by focusing on two critical factors: lowering the drive voltages and increasing the amount of light extracted.

  5. High Voltage Electrolyte for Lithium Batteries

    Broader source: Energy.gov (indexed) [DOE]

    5.0E-04 1.0E-03 2 2.2 2.4 2.6 2.8 Voltage (V) dQdV (AhV) 1 st Charge 1.2M LiPF 6 ECEMC 37 1 st Charge 1.0M LiPF 6 TMS1NM3 55 with 2% and 4% VC 1 st Charge 1.0M LiPF 6 TMS...

  6. Measurable Control System Security through Ideal Driven Technical Metrics

    SciTech Connect (OSTI)

    Miles McQueen; Wayne Boyer; Sean McBride; Marie Farrar; Zachary Tudor

    2008-01-01T23:59:59.000Z

    The Department of Homeland Security National Cyber Security Division supported development of a small set of security ideals as a framework to establish measurable control systems security. Based on these ideals, a draft set of proposed technical metrics was developed to allow control systems owner-operators to track improvements or degradations in their individual control systems security posture. The technical metrics development effort included review and evaluation of over thirty metrics-related documents. On the bases of complexity, ambiguity, or misleading and distorting effects the metrics identified during the reviews were determined to be weaker than necessary to aid defense against the myriad threats posed by cyber-terrorism to human safety, as well as to economic prosperity. Using the results of our metrics review and the set of security ideals as a starting point for metrics development, we identified thirteen potential technical metrics - with at least one metric supporting each ideal. Two case study applications of the ideals and thirteen metrics to control systems were then performed to establish potential difficulties in applying both the ideals and the metrics. The case studies resulted in no changes to the ideals, and only a few deletions and refinements to the thirteen potential metrics. This led to a final proposed set of ten core technical metrics. To further validate the security ideals, the modifications made to the original thirteen potential metrics, and the final proposed set of ten core metrics, seven separate control systems security assessments performed over the past three years were reviewed for findings and recommended mitigations. These findings and mitigations were then mapped to the security ideals and metrics to assess gaps in their coverage. The mappings indicated that there are no gaps in the security ideals and that the ten core technical metrics provide significant coverage of standard security issues with 87% coverage. Based on the two case studies and evaluation of the seven assessments, the security ideals demonstrated their value in guiding security thinking. Further, the final set of core technical metrics has been demonstrated to be both usable in the control system environment and provide significant coverage of standard security issues.

  7. Electro-optic voltage sensor head

    DOE Patents [OSTI]

    Crawford, Thomas M. (Idaho Falls, ID); Davidson, James R. (Idaho Falls, ID); Woods, Gregory K. (Cornelius, OR)

    1999-01-01T23:59:59.000Z

    The invention is an electro-optic voltage sensor head designed for integration with existing types of high voltage transmission and distribution apparatus. The sensor head contains a transducer, which comprises a transducing material in which the Pockels electro-optic effect is observed. In the practice of the invention at least one beam of electromagnetic radiation is routed into the transducing material of the transducer in the sensor head. The beam undergoes an electro-optic effect in the sensor head when the transducing material is subjected to an E-field. The electro-optic effect is observed as a differential phase a shift, also called differential phase modulation, of the beam components in orthogonal planes of the electromagnetic radiation. In the preferred embodiment the beam is routed through the transducer along an initial axis and then reflected by a retro-reflector back substantially parallel to the initial axis, making a double pass through the transducer for increased measurement sensitivity. The preferred embodiment of the sensor head also includes a polarization state rotator and at least one beam splitter for orienting the beam along major and minor axes and for splitting the beam components into two signals which are independent converse amplitude-modulated signals carrying E-field magnitude and hence voltage information from the sensor head by way of optic fibers.

  8. Electro-optic voltage sensor head

    DOE Patents [OSTI]

    Crawford, T.M.; Davidson, J.R.; Woods, G.K.

    1999-08-17T23:59:59.000Z

    The invention is an electro-optic voltage sensor head designed for integration with existing types of high voltage transmission and distribution apparatus. The sensor head contains a transducer, which comprises a transducing material in which the Pockels electro-optic effect is observed. In the practice of the invention at least one beam of electromagnetic radiation is routed into the transducing material of the transducer in the sensor head. The beam undergoes an electro-optic effect in the sensor head when the transducing material is subjected to an E-field. The electro-optic effect is observed as a differential phase a shift, also called differential phase modulation, of the beam components in orthogonal planes of the electromagnetic radiation. In the preferred embodiment the beam is routed through the transducer along an initial axis and then reflected by a retro-reflector back substantially parallel to the initial axis, making a double pass through the transducer for increased measurement sensitivity. The preferred embodiment of the sensor head also includes a polarization state rotator and at least one beam splitter for orienting the beam along major and minor axes and for splitting the beam components into two signals which are independent converse amplitude-modulated signals carrying E-field magnitude and hence voltage information from the sensor head by way of optic fibers. 6 figs.

  9. Electrostatically screened, voltage-controlled electrostatic chuck

    DOE Patents [OSTI]

    Klebanoff, Leonard Elliott (San Ramon, CA)

    2001-01-01T23:59:59.000Z

    Employing an electrostatically screened, voltage-controlled electrostatic chuck particularly suited for holding wafers and masks in sub-atmospheric operations will significantly reduce the likelihood of contaminant deposition on the substrates. The electrostatic chuck includes (1) an insulator block having a outer perimeter and a planar surface adapted to support the substrate and comprising at least one electrode (typically a pair of electrodes that are embedded in the insulator block), (2) a source of voltage that is connected to the at least one electrode, (3) a support base to which the insulator block is attached, and (4) a primary electrostatic shield ring member that is positioned around the outer perimeter of the insulator block. The electrostatic chuck permits control of the voltage of the lithographic substrate; in addition, it provides electrostatic shielding of the stray electric fields issuing from the sides of the electrostatic chuck. The shielding effectively prevents electric fields from wrapping around to the upper or front surface of the substrate, thereby eliminating electrostatic particle deposition.

  10. Analysis and design of an electronic voltage ratchet

    E-Print Network [OSTI]

    Menendez, Jorge Carlos

    2012-06-07T23:59:59.000Z

    and decay. Impulse voltages are produced through the discharging of 0, capacitor into a shaping network consisting of resistors and a. capacitor as is shown in Figure 2. 9. The operation of the impulse generator is as follows. Capacitor Ci is charged from... voltage shaping network. as possible in order to reduce oscillations in the wavefront and wavetail portions of the impulse voltage [1). The impulse voltage generator requires a, highly charged capacitor or bank of capacitors. Capacitors may be charged...

  11. US public perspectives on security :

    SciTech Connect (OSTI)

    Herron, Kerry Gale; Jenkins-Smith, Hank C.; Silva, Carol L.

    2012-02-01T23:59:59.000Z

    We report findings from a national Internet survey and a subset of questions administered by telephone in mid-2011 on public assessments of contemporary and emerging interstate nuclear threats, support for strategic arms control, and preferences for responding to limited nuclear attacks on the United States. Additionally, we analyze public views of the threat of terrorism, including cyber attacks, assessments of progress in the struggle against terrorism, and preferences for responding to an act of radiological terrorism against the United States. Also, we report findings from an Internet survey and a subset of questions administered by telephone among the American public in mid-2011 on US energy and environmental security. Key areas of investigation include public views on energy requirements, preferences for energy sources, energy conservation versus development, energy independence, implications of events at Fukushima, Japan, for US public support of nuclear generation, preferences for managing used nuclear fuel, and trust in nuclear risk assessments from government and other public sources. Where possible, findings from each survey are compared with previous surveys in this series for analyses of trends.

  12. Selective compensation of voltage harmonics in grid-connected microgrids

    E-Print Network [OSTI]

    Vasquez, Juan Carlos

    1 Selective compensation of voltage harmonics in grid-connected microgrids Mehdi Savaghebia , Juan is proposed for selective compensation of main voltage harmonics in a grid- connected microgrid. The aim level. Keywords Distributed Generator (DG); microgrid; grid-connected; voltage harmonics compensation. 1

  13. Structural Optimization of High Voltage Transmission Line Towers considering

    E-Print Network [OSTI]

    Colominas, Ignasi

    Structural Optimization of High Voltage Transmission Line Towers considering Continuum and Discrete/or to common designs largely repeated (e.g. automotive compo- nents), and high voltage transmission towers can than conventional designs of high voltage transmission line towers. The optimization model proposed

  14. LM2907LM2917FrequencytoVoltageConverter February 1995

    E-Print Network [OSTI]

    Wedeward, Kevin

    TL H 7942 LM2907LM2917FrequencytoVoltageConverter February 1995 LM2907 LM2917 Frequency to Voltage Converter General Description The LM2907 LM2917 series are monolithic frequency to voltage converters doubling for low ripple full input protection in two versions (LM2907-8 LM2917-8) and its output swings

  15. Characterized ideal LC circuit Charge, current and voltage vary sinusoidally

    E-Print Network [OSTI]

    Bertulani, Carlos A. - Department of Physics and Astronomy, Texas A&M University

    resistance to LC circuit Oscillations become damped Charge, current and voltage still vary sinusoidally Oscillations Draw phasors for voltages of R, C and L at same time t Orient VR, VL, & VC phasors relativeReview Characterized ideal LC circuit Charge, current and voltage vary sinusoidally Added

  16. Accurately measuring current-voltage characteristics of tunnel diodes

    E-Print Network [OSTI]

    Bao, Mingqiang; Wang, Kang L

    2006-01-01T23:59:59.000Z

    of the bias voltage range of oscillations in the I–V curve.and the bias voltage range of oscillation in the I–V curve.or to know the exact voltage range of oscillation in the I–V

  17. DCS1800/WCDMA ADAPTIVE VOLTAGE-CONTROLLED OSCILLATOR

    E-Print Network [OSTI]

    Serdijn, Wouter A.

    DCS1800/WCDMA ADAPTIVE VOLTAGE-CONTROLLED OSCILLATOR Aleksandar Tasiü, Wouter A. Serdijn and John R, an adaptive 2G/3G voltage-controlled oscillator (VCO) is described in this paper. For the DCS1800 operation with this reasoning, an adaptive 2G/3G voltage- controlled oscillator, meant for a dual-standard adaptive front

  18. System for increasing corona inception voltage of insulating oils

    DOE Patents [OSTI]

    Rohwein, G.J.

    1998-05-19T23:59:59.000Z

    The Corona Inception Voltage of insulating oils is increased by repetitive cycles of prestressing the oil with a voltage greater than the corona inception voltage, and either simultaneously or serially removing byproducts of corona by evacuation and heating the oil. 5 figs.

  19. Incorporating voltage security into the planning, operation and monitoring of restructured electric energy markets

    E-Print Network [OSTI]

    Nair, Nirmal-Kumar

    2006-04-12T23:59:59.000Z

    As open access market principles are applied to power systems, significant changes are happening in their planning, operation and control. In the emerging marketplace, systems are operating under higher loading conditions as markets focus greater...

  20. Global Material Security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickr Flickr Editor'sshortGeothermal HeatStartedGirlsMaterial Security |

  1. physical security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective Actions Program LANL TRU

  2. safeguards and security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -

  3. Nuclear Security 101 | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear Science

  4. Nuclear Security Enterprise | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear

  5. International Nuclear Security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for and NovelFEG-SEMInterlibrary LoanExercises |Security

  6. Defense Nuclear Security | National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINLNuclear Security | National Nuclear

  7. Physical Security Systems | National Nuclear Security Administration

    National Nuclear Security Administration (NNSA)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartment ofofOxfordVeteransAdministrationPhysical Security Systems |

  8. Transportation System Readiness and Resiliency Assessment Framework: Readiness and Assess Resiliency of

    E-Print Network [OSTI]

    Transportation System Readiness and Resiliency Assessment Framework: Readiness and Assess Resiliency of Transportation Systems (Infrastructure, Systems, Organization and Services) to Deter, Detect Flows Passenger Flows Supply Chain Efficiency Transportation: Energy Environment Safety Security Vehicle

  9. Voltage-dependent calcium channels and currents in native neurons and other cells have been divided into high voltage

    E-Print Network [OSTI]

    Dolphin, Annette C.

    Voltage-dependent calcium channels and currents in native neurons and other cells have been divided than one subtype of channel. A new subfamily of voltage-dependent calcium channel á1 subunit genes. 1999), having four domains, each with a voltage sensor and a pore-forming P loop. However

  10. Adaptive security systems -- Combining expert systems with adaptive technologies

    SciTech Connect (OSTI)

    Argo, P.; Loveland, R.; Anderson, K. [and others

    1997-09-01T23:59:59.000Z

    The Adaptive Multisensor Integrated Security System (AMISS) uses a variety of computational intelligence techniques to reason from raw sensor data through an array of processing layers to arrive at an assessment for alarm/alert conditions based on human behavior within a secure facility. In this paper, the authors give an overview of the system and briefly describe some of the major components of the system. This system is currently under development and testing in a realistic facility setting.

  11. Applying New Network Security Technologies to SCADA Systems.

    SciTech Connect (OSTI)

    Hurd, Steven A.; Stamp, Jason E. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM; Duggan, David P. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM; Chavez, Adrian R. [Sandia National Laboratories, Albuquerque, NM] [Sandia National Laboratories, Albuquerque, NM

    2006-11-01T23:59:59.000Z

    Supervisory Control and Data Acquisition (SCADA) systems for automation are very important for critical infrastructure and manufacturing operations. They have been implemented to work in a number of physical environments using a variety of hardware, software, networking protocols, and communications technologies, often before security issues became of paramount concern. To offer solutions to security shortcomings in the short/medium term, this project was to identify technologies used to secure %22traditional%22 IT networks and systems, and then assess their efficacy with respect to SCADA systems. These proposed solutions must be relatively simple to implement, reliable, and acceptable to SCADA owners and operators. 4This page intentionally left blank.

  12. Security Administration Production Office,

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security and

  13. SecuritySmart

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0SecuritySmart March 2009

  14. Safety, Security & Environment

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguards and SecuritySafety for

  15. Method of Controlling Corona Effects and Breakdown Voltage of Small Air Gaps Stressed by Impulse Voltages

    E-Print Network [OSTI]

    Athanasios Maglaras; Trifon Kousiouris; Frangiskos Topalis; Dimitrios Katsaros; Leandros A. Maglaras; Konstantina Giannakopoulou

    2014-10-15T23:59:59.000Z

    This paper investigates the influence of a resistor on the dielectric behavior of an air gap. The resistor is connected in series with the air gap and the latter is stressed by impulse voltage. Air gap arrangements of different geometry with either the rod or the plate grounded are stressed with impulse voltages of both positive and negative polarity. The resistor is connected in series with the air gap in the return circuit connecting the gap with the impulse generator. The method followed involves the investigation of the graphs of the charging time concerning the air gaps capacitances, in connection to the value of the resistor, the geometry of the gap, the effect of grounding and the polarity effect. It is determined that the charging time of the air gap increases, as the value of the resistor increases. It is also determined that the peak voltage value of the fully charged air gap decreases as the value of the resistor increases. The results of the mathematical and simulation analysis are compared with the results of the oscillograms taken from experimental work. In addition and consequently to the above results it is concluded from the experimental work that the in series connection of the resistor in the circuit has significant influence on corona pulses (partial discharges) occurring in the gap and on the breakdown voltage of the gap. A new method of controlling the corona effects and consequently the breakdown voltage of small air gaps stressed by impulse voltage of short duration in connection to the ground effect and the polarity effect has arisen. Furthermore through mathematical analysis of the charging graphs obtained from simulation and experimental oscillograms there was a calculation of the values of the capacitance of the air gaps in relation to their geometry and the results were compared to the values calculated with mathematical analysis.

  16. Personnel Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

  17. Personnel Security - DOE Directives, Delegations, and Requirements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

  18. Security enhanced with increased vehicle inspections

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

  19. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

  20. ata security feature: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

  1. A Forrester Consulting Thought Leadership Paper Commissioned By Microsoft And RSA, The Security Division Of EMC The Value Of Corporate Secrets

    E-Print Network [OSTI]

    Narasayya, Vivek

    Division Of EMC The Value Of Corporate Secrets How Compliance And Collaboration Affect Enterprise, the security division of EMC, commissioned Forrester Consulting to assess the data security practices of North

  2. Safety and Security What do Safety/Security work with?

    E-Print Network [OSTI]

    Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

  3. GAANN -Computer Systems Security GAANN Computer Systems Security

    E-Print Network [OSTI]

    Alpay, S. Pamir

    GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

  4. Comparison of two methods to quantify cyber and physical security effectiveness.

    SciTech Connect (OSTI)

    Wyss, Gregory Dane; Gordon, Kristl A.

    2005-11-01T23:59:59.000Z

    With the increasing reliance on cyber technology to operate and control physical security system components, there is a need for methods to assess and model the interactions between the cyber system and the physical security system to understand the effects of cyber technology on overall security system effectiveness. This paper evaluates two methodologies for their applicability to the combined cyber and physical security problem. The comparison metrics include probabilities of detection (P{sub D}), interruption (P{sub I}), and neutralization (P{sub N}), which contribute to calculating the probability of system effectiveness (P{sub E}), the probability that the system can thwart an adversary attack. P{sub E} is well understood in practical applications of physical security but when the cyber security component is added, system behavior becomes more complex and difficult to model. This paper examines two approaches (Bounding Analysis Approach (BAA) and Expected Value Approach (EVA)) to determine their applicability to the combined physical and cyber security issue. These methods were assessed for a variety of security system characteristics to determine whether reasonable security decisions could be made based on their results. The assessments provided insight on an adversary's behavior depending on what part of the physical security system is cyber-controlled. Analysis showed that the BAA is more suited to facility analyses than the EVA because it has the ability to identify and model an adversary's most desirable attack path.

  5. National Security System Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2007-03-08T23:59:59.000Z

    The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

  6. Information Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

  7. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2011-07-21T23:59:59.000Z

    To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

  8. September 2004 INFORMATION SECURITY

    E-Print Network [OSTI]

    September 2004 INFORMATION SECURITY WITHIN THE SYSTEM DEVELOPMENT LIFE CYCLE Annabelle Lee of Standards and Technology Many System Development Life Cycle (SDLC) models exist that can be used. This model assumes that the system will be delivered near the end of its life cycle. Another SDLC model uses

  9. Headquarters Security Operations

    Broader source: Energy.gov [DOE]

    DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

  10. Metaphors for cyber security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

    2008-08-01T23:59:59.000Z

    This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

  11. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2010-10-12T23:59:59.000Z

    The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

  12. Information Security Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-16T23:59:59.000Z

    This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

  13. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

  14. A network security monitor

    SciTech Connect (OSTI)

    Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

    1989-11-01T23:59:59.000Z

    The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

  15. ARMY Energy Security Considerations

    E-Print Network [OSTI]

    ARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2 Situation OIL & GAS LIQUIDS 38% Rise in NTV Fuel Use 35% of DoD utilities 21% of Fed government 11

  16. Departmental Personnel Security- Clearance Automation

    Broader source: Energy.gov [DOE]

    The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

  17. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01T23:59:59.000Z

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  18. System security Dr Len Hamey

    E-Print Network [OSTI]

    Hamey, Len

    , firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

  19. Safe epoxy encapsulant for high voltage magnetics

    SciTech Connect (OSTI)

    Sanchez, R.O.; Archer, W.E.

    1998-01-01T23:59:59.000Z

    This paper describes the use of Formula 456, an aliphatic amine cured epoxy for impregnating coils and high voltage transformers. Sandia has evaluated a number of MDA-free epoxy encapsulants which relied on either anhydride or other aromatic amine curing agents. The use of aliphatic amine curing agents was more recently evaluated and has resulted in the definition of Formula 456 resin. Methylene dianiline (MDA) has been used for more than 20 years as the curing agent for various epoxy formulations throughout the Department of Energy and much of industry. Sandia National Laboratories began the process of replacing MDA with other formulations because of regulations imposed by OSHA on the use of MDA. OSHA has regulated MDA because it is a suspect carcinogen. Typically the elimination of OSHA-regulated materials provides a rare opportunity to qualify new formulations in a range of demanding applications. It was important to take full advantage of that opportunity, although the associated materials qualification effort was costly. Small high voltage transformers are one of those demanding applications. The successful implementation of the new formulation for high reliability transformers will be described. The test results that demonstrate the parts are qualified for use in DOE weapon systems will be presented.

  20. {open_quotes}Secure Bus{close_quotes} disturbance-free power at the utility substation level

    SciTech Connect (OSTI)

    Boenig, H.J. [Los Alamos National Lab., NM (United States); Jones, W.H. [El Camino Real Engineering, Inc., Corrales, NM (United States)

    1996-12-01T23:59:59.000Z

    Over the last 18 months Public Service Company of New Mexico (PNM), El Camino Real Engineering, Inc. (CRE), Los Alamos National Laboratory (LANL) and Sandia National Laboratories (SNL) have worked on the development of disturbance-free power at the medium voltage substation level. The work resulted in the Secure Bus concept, a system in which a medium voltage bus in a substation is immune to power outages and voltage sags on the utility source. The Secure Bus voltage is also immune to voltage sags resulting from faults on any distribution feeder connected to the bus. The Secure Bus concept originated from work conducted to improve power quality for large high-tech manufacturing facilities, in particular for large semiconductor manufacturing plants. For the demands on quality power of a modern facility conventional equipment is not adequate for protecting the end user. For example, the operation of conventional vacuum breakers during short circuit conditions on a feeder circuit, requiring 3 to 5 cycles for breaker opening, does not allow for fast enough current interruption to avoid a voltage dip on the main bus. A sever voltage sag could result in a shut down of sensitive equipment being supplied by the other feeder circuits, which are connected to the main bus. The circumvent the problem, a fast breaker was introduced which interrupts the short circuit before the current causes a significant voltage disturbance. To make the bus immune also to power disturbances caused by power outages, energy storage is introduced to provide the necessary energy back-up in case the primary source is not available.

  1. Review of Nevada Site Office Criticality Safety Assessments at...

    Broader source: Energy.gov (indexed) [DOE]

    an independent review of the National Nuclear Security AdministrationNevada Site Office Conduct of Operations Management Assessment Final Report, dated October 2011. The subject...

  2. NNSA to conduct Aerial Radiation Assessment Survey over Phoenix...

    National Nuclear Security Administration (NNSA)

    conduct Aerial Radiation Assessment Survey over Phoenix, Scottsdale, Glendale, Tempe Areas | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People...

  3. assessing culprit lesions: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    characteristics and community food resources as well as materials for assessing household food security, food resource accessibility, food availability and affordability, and...

  4. assessing food chain: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    characteristics and community food resources as well as materials for assessing household food security, food resource accessibility, food availability and affordability, and...

  5. assessments fiabilidad humana: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    community characteristics and community food resources as well as materials for assessing household food security, food resource accessibility, food availability and...

  6. assessing endometrial lesions: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    characteristics and community food resources as well as materials for assessing household food security, food resource accessibility, food availability and affordability, and...

  7. assess nutritional condition: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    characteristics and community food resources as well as materials for assessing household food security, food resource accessibility, food availability and affordability, and...

  8. assessing fpar source: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    community characteristics and community food resources as well as materials for assessing household food security, food resource accessibility, food availability and...

  9. assess preclinical irritation: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    community characteristics and community food resources as well as materials for assessing household food security, food resource accessibility, food availability and...

  10. assessing organ specific: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    characteristics and community food resources as well as materials for assessing household food security, food resource accessibility, food availability and affordability, and...

  11. Safeguard Security and Awareness Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2002-10-02T23:59:59.000Z

    Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

  12. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

  13. Safeguards and Security Program References

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2005-08-26T23:59:59.000Z

    The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

  14. East Asian Security in 2025

    E-Print Network [OSTI]

    Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

    2008-01-01T23:59:59.000Z

    East Asian Security in 2025 Who We Are • Reagan Heavin – Energy • Adam Hudson – State Capacity • Brandon Krueger – Military • Sean O’Neil – Demographics • Griffin Rozell – Balance of Power • Matt Suma – Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean O’Neil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda • Conclusions • Projections • Drivers • Four Outcomes • Questions East Asian Security in 2025...

  15. January 2005 INTEGRATING IT SECURITY

    E-Print Network [OSTI]

    January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS technology (IT) security and capital planning and investment control (CPIC) processes have been performed taining appropriate security controls, both at the enterprise-wide and system level, commensurate

  16. RECOMMENDED SECURITY CONTROLS FOR FEDERAL

    E-Print Network [OSTI]

    May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information-53, Recommended Security Controls for Federal Information Systems The basic questions that organizations should

  17. Positioning Security from electronic warfare

    E-Print Network [OSTI]

    Kuhn, Markus

    Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

  18. Architectural support for enhancing security in clusters

    E-Print Network [OSTI]

    Lee, Man Hee

    2009-05-15T23:59:59.000Z

    to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on Żrewalls for their security, but the Żrewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

  19. Line Management Perspective: National Nuclear Security Administration...

    Broader source: Energy.gov (indexed) [DOE]

    National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

  20. Workforce Statistics - Office of Secure Transportation | National...

    National Nuclear Security Administration (NNSA)

    Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

  1. Secretary Richardson Accepts Recommendations for Improving Security...

    National Nuclear Security Administration (NNSA)

    Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

  2. Security Science & Technology | Nuclear Science | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

  3. FOILFEST :community enabled security.

    SciTech Connect (OSTI)

    Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

    2005-09-01T23:59:59.000Z

    The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

  4. Design and applications of a flicker voltage generator

    SciTech Connect (OSTI)

    Chang, W.N.; Wu, C.J. [National Taiwan Inst. of Tech., Peitow-Taipei (Taiwan, Province of China). Dept. of Electrical Engineering

    1995-12-31T23:59:59.000Z

    In this paper, a 200W flicker voltage generator is made by using microcomputers and linear amplification circuits. The modulation amplitudes and frequencies based on the UIE {Delta}V{sub 10} evaluation can be arbitrarily assigned by software with high accuracy. The flicker voltage signals measured at the customer side also can be re-generated. Some applications, such as evaluating the effects of flicker voltage on incandescent and compact fluorescent lamps (CFLs), are also made. From experimental tests by use of the flicker voltage generator, the properties of some compact fluorescent lamps and incandescent lamps are compared. Those properties describe the relation between input voltage variation and output flux of lamps, such that there is direct description of influences of flicker voltages on lamps.

  5. PAPER ACCEPTED TO THE IEEE TRANSACTIONS ON POWER SYSTEMS 1 Sensitivity-based Security-constrained OPF Market

    E-Print Network [OSTI]

    Cañizares, Claudio A.

    PAPER ACCEPTED TO THE IEEE TRANSACTIONS ON POWER SYSTEMS 1 Sensitivity-based Security-constrained OPF Market Clearing Model F. Milano, Member, IEEE, C. A. Ca~nizares, Senior Member, IEEE, and A. J constraints that properly include voltage stability limits in the operation of competitive electricity markets

  6. NREL: Measurements and Characterization - Current Versus Voltage

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions and Achievements ofLizResultsGeothermalAnalytical MicroscopyCurrent

  7. Sequential circuit design for radiation hardened multiple voltage integrated circuits

    DOE Patents [OSTI]

    Clark, Lawrence T. (Phoenix, AZ); McIver, III, John K. (Albuquerque, NM)

    2009-11-24T23:59:59.000Z

    The present invention includes a radiation hardened sequential circuit, such as a bistable circuit, flip-flop or other suitable design that presents substantial immunity to ionizing radiation while simultaneously maintaining a low operating voltage. In one embodiment, the circuit includes a plurality of logic elements that operate on relatively low voltage, and a master and slave latches each having storage elements that operate on a relatively high voltage.

  8. Voltage controlled MESFET pulse shape generator

    SciTech Connect (OSTI)

    Burkhart, S.C.

    1994-10-26T23:59:59.000Z

    A programmable pulse shape generator capable of producing pulse shapes for Nova and Beamlet has been designed and simulated using the circuit code SPICE. The design utilizes power MESFETS, which are commonly used in microwave amplifiers. The pulse shape is varied by setting a bias voltage on each in a chain of MESFETS with a 200 ps temporal resolution. The electrical pulse then drives an integrated electro-optic modulator similar to what is on Beamlet. Pulse shapes 22 and 25, used on Nova, have been generated by this design. There is no fundamental barrier to making such a pulse generator for use on the National Ignition Facility. In fact, the longer time scales on the NIF pulse will ease the high speed requirements of the pulse shape generator allowing the use of less expensive components. The next step will be to build a prototype circuit for initial testing on Beamlet and Nova.

  9. Method for voltage-gated protein fractionation

    DOE Patents [OSTI]

    Hatch, Anson (Tracy, CA); Singh, Anup K. (Danville, CA)

    2012-04-24T23:59:59.000Z

    We report unique findings on the voltage dependence of protein exclusion from the pores of nanoporous polymer exclusion membranes. The pores are small enough that proteins are excluded from passage with low applied electric fields, but increasing the field enables proteins to pass through. The requisite field necessary for a change in exclusion is protein-specific with a correlation to protein size. The field-dependence of exclusion is important to consider for preconcentration applications. The ability to selectively gate proteins at exclusion membranes is also a promising means for manipulating and characterizing proteins. We show that field-gated exclusion can be used to selectively remove proteins from a mixture, or to selectively trap protein at one exclusion membrane in a series.

  10. Electrochemical Characterization of Voltage Fade in LMR-NMC cells

    Broader source: Energy.gov (indexed) [DOE]

    the extent of Voltage Fade December 2012 * Establish baseline data on standard materials to facilitate comparison of various datasets March 2013 * Obtain data to determine...

  11. High Temperature, High Voltage Fully Integrated Gate Driver Circuit

    Broader source: Energy.gov (indexed) [DOE]

    driver circuit, 5-V on- chip voltage regulator, short-circuit protection, undervoltage lockout, bootstrap capacitor, dead time controller and temperature sensor * 0.8-micron,...

  12. Vehicle Technologies Office Merit Review 2014: Voltage Fade,...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Voltage Fade, an ABR Deep Dive Project: Status and Outcomes Presentation given by Argonne National Laboratory at 2014 DOE Hydrogen and Fuel Cells Program and Vehicle...

  13. Nanoscale Morphological and Chemical Changes of High Voltage...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Nanoscale Morphological and Chemical Changes of High Voltage Lithium-Manganese Rich NMC Composite Cathodes with Cycling Friday, August 29, 2014 Renewable energy is critical for the...

  14. active capacitive voltage: Topics by E-print Network

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Khoman 5 Discrete Steps in the Capacitance-Voltage Characteristics of GaInNGaN Light Emitting Diode Structures Materials Science Websites Summary: Discrete Steps in the...

  15. High Voltage Electrolytes for Li-ion Batteries

    Broader source: Energy.gov (indexed) [DOE]

    or otherwise restricted information High Voltage Electrolytes for Li-ion Batteries Vehicle Technologies Program 2 Overview * Start: Sep 2008 * End: Sep 2011 * 20 %...

  16. Electrochemical Characterization of Voltage Fade in LMR-NMC cells...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Electrochemical Characterization of Voltage Fade in LMR-NMC cells 2013 DOE Hydrogen and Fuel Cells Program and Vehicle Technologies Program Annual Merit Review and Peer...

  17. Triple voltage dc-to-dc converter and method

    DOE Patents [OSTI]

    Su, Gui-Jia (Knoxville, TN)

    2008-08-05T23:59:59.000Z

    A circuit and method of providing three dc voltage buses and transforming power between a low voltage dc converter and a high voltage dc converter, by coupling a primary dc power circuit and a secondary dc power circuit through an isolation transformer; providing the gating signals to power semiconductor switches in the primary and secondary circuits to control power flow between the primary and secondary circuits and by controlling a phase shift between the primary voltage and the secondary voltage. The primary dc power circuit and the secondary dc power circuit each further comprising at least two tank capacitances arranged in series as a tank leg, at least two resonant switching devices arranged in series with each other and arranged in parallel with the tank leg, and at least one voltage source arranged in parallel with the tank leg and the resonant switching devices, said resonant switching devices including power semiconductor switches that are operated by gating signals. Additional embodiments having a center-tapped battery on the low voltage side and a plurality of modules on both the low voltage side and the high voltage side are also disclosed for the purpose of reducing ripple current and for reducing the size of the components.

  18. Security seal. [Patent application

    DOE Patents [OSTI]

    Gobeli, G.W.

    1981-11-17T23:59:59.000Z

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  19. NNSA orders security enhancements

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | National Nuclear SecurityAdministration

  20. National Security Initiatives | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear Forensics Bioinformatics

  1. Security Clearances; Limitations

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof the Americas | Department ofofDeliveredSectionSecuring theSEC. 1072.

  2. Strengthening Global Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBiSiteNeutronStrategic Plan The

  3. Lockout device for high voltage circuit breaker

    SciTech Connect (OSTI)

    Kozlowski, L.J.; Shirey, L.A.

    1993-01-26T23:59:59.000Z

    An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the respective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.

  4. Lockout device for high voltage circuit breaker

    DOE Patents [OSTI]

    Kozlowski, Lawrence J. (New Kensington, PA); Shirey, Lawrence A. (North Huntingdon, PA)

    1993-01-01T23:59:59.000Z

    An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the repsective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.

  5. Lookout device for high voltage circuit breaker

    SciTech Connect (OSTI)

    Kozlowski, L.J.; Shirey, L.A.

    1991-12-31T23:59:59.000Z

    An improved lockout assembly is provided for a circuit breaker to lock the switch handle into a selected switch position. The lockout assembly includes two main elements, each having a respective foot for engaging a portion of the upper housing wall of the circuit breaker. The first foot is inserted into a groove in the upper housing wall, and the second foot is inserted into an adjacent aperture (e.g., a slot) in the upper housing wall. The first foot is slid under and into engagement with a first portion, and the second foot is slid under and into engagement with a second portion of the upper housing wall. At the same time the respective two feet are placed in engagement with the respective portions of the upper housing wall, two holes, one on each of the respective two main elements of the assembly, are placed in registration; and a locking device, such as a special scissors equipped with a padlock, is installed through the registered holes to secure the lockout assembly on the circuit breaker. When the lockout assembly of the invention is secured on the circuit breaker, the switch handle of the circuit breaker is locked into the selected switch position and prevented from being switched to another switch position.

  6. Integrated safeguards & security for material protection, accounting, and control.

    SciTech Connect (OSTI)

    Duran, Felicia Angelica; Cipiti, Benjamin B.

    2009-10-01T23:59:59.000Z

    Traditional safeguards and security design for fuel cycle facilities is done separately and after the facility design is near completion. This can result in higher costs due to retrofits and redundant use of data. Future facilities will incorporate safeguards and security early in the design process and integrate the systems to make better use of plant data and strengthen both systems. The purpose of this project was to evaluate the integration of materials control and accounting (MC&A) measurements with physical security design for a nuclear reprocessing plant. Locations throughout the plant where data overlap occurs or where MC&A data could be a benefit were identified. This mapping is presented along with the methodology for including the additional data in existing probabilistic assessments to evaluate safeguards and security systems designs.

  7. Local Dynamic Reactive Power for Correction of System Voltage Problems

    SciTech Connect (OSTI)

    Kueck, John D [ORNL; Rizy, D Tom [ORNL; Li, Fangxing [ORNL; Xu, Yan [ORNL; Li, Huijuan [University of Tennessee, Knoxville (UTK); Adhikari, Sarina [ORNL; Irminger, Philip [ORNL

    2008-12-01T23:59:59.000Z

    Distribution systems are experiencing outages due to a phenomenon known as local voltage collapse. Local voltage collapse is occurring in part because modern air conditioner compressor motors are much more susceptible to stalling during a voltage dip than older motors. These motors can stall in less than 3 cycles (.05s) when a fault, such as on the sub-transmission system, causes voltage to sag to 70 to 60%. The reasons for this susceptibility are discussed in the report. During the local voltage collapse, voltages are depressed for a period of perhaps one or two minutes. There is a concern that these local events are interacting together over larger areas and may present a challenge to system reliability. An effective method of preventing local voltage collapse is the use of voltage regulation from Distributed Energy Resources (DER) that can supply or absorb reactive power. DER, when properly controlled, can provide a rapid correction to voltage dips and prevent motor stall. This report discusses the phenomenon and causes of local voltage collapse as well as the control methodology we have developed to counter voltage sag. The problem is growing because of the use of low inertia, high efficiency air conditioner (A/C) compressor motors and because the use of electric A/C is growing in use and becoming a larger percentage of system load. A method for local dynamic voltage regulation is discussed which uses reactive power injection or absorption from local DER. This method is independent, rapid, and will not interfere with conventional utility system voltage control. The results of simulations of this method are provided. The method has also been tested at the ORNL s Distributed Energy Communications and Control (DECC) Laboratory using our research inverter and synchronous condenser. These systems at the DECC Lab are interconnected to an actual distribution system, the ORNL distribution system, which is fed from TVA s 161kV sub-transmission backbone. The test results are also provided and discussed. The simulations and testing show that local voltage control from DER can prevent local voltage collapse. The results also show that the control can be provided so quickly, within 0.5 seconds, that is does not interfere with conventional utility methods.

  8. Executive Summary The Payment Card Industry Data Security Standard (PCI DSS) requires Level 1 merchants and

    E-Print Network [OSTI]

    Fisher, Kathleen

    system components in order to support business growth. Change control is a complex process merchants and service providers to undergo an onsite assessment of their security systems and procedures processes fail, when changes are made without adequately considering the effect on security, and when

  9. Review your system access with your company's Information Security Officer. Access that is not

    E-Print Network [OSTI]

    Shepp, Larry

    . The FBI may be able to help you determine if these contacts pose any risk to you or your company. Change unusual circumstances or noteworthy incidents to your security officer and to the FBI. Notifying the FBI and country threat assessments are available from the FBI upon request. Good security habits will help protect

  10. V-186: Drupal Login Security Module Security Bypass and Denial...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

  11. T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...

    Broader source: Energy.gov (indexed) [DOE]

    or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

  12. Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

    E-Print Network [OSTI]

    Ragsdale, G.

    Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 ? 25, 2010 ESL-HH-10-08-09 Proceedings of the 17... of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...

  13. Secure control systems with application to cyber-physical systems

    SciTech Connect (OSTI)

    Dong, Jin [ORNL] [ORNL; Djouadi, Seddik M [ORNL] [ORNL; Nutaro, James J [ORNL] [ORNL; Kuruganti, Phani Teja [ORNL] [ORNL

    2014-01-01T23:59:59.000Z

    Control systems are computer-based systems with networked units consisting of sensors, actuators, control processing units, and communication devices. The role of control system is to interact, monitor, and control physical processes. Reactive power control is a fundamental issue in ensuring the security of the power network. It is claimed that Synchronous Condensers (SC) have been used at both distribution and transmission voltage levels to improve stability and to maintain voltages within desired limits under changing load conditions and contingency situations. Performance of PI controller corresponding to various tripping faults are analyzed for SC systems. Most of the eort in protecting these systems has been in protection against random failures or reliability. However, besides failures these systems are subject to various signal attacks for which new analysis are discussed here. When a breach does occur, it is necessary to react in a time commensurate with the physical dynamics of the system as it responds to the attack. Failure to act swiftly enough may result in undesirable, and possibly irreversible, physical eects. Therefore, it is meaningful to evaluate the security of a cyber-physical system, especially to protect it from cyber-attack. Illustrative numerical examples are provided together with an application to the SC systems.

  14. Measurement of high voltage using Rutherford backscattering spectrometry

    E-Print Network [OSTI]

    Abrego, Celestino Pete

    2007-04-25T23:59:59.000Z

    A novel variation of Rutherford Backscattering Spectrometry (RBS) has been utilized to measure a high voltage collected on an aluminum target by Direct Energy Conversion. The maximum high voltage on the target was measured to be 97.5 kV +/- 2 k...

  15. A LOW-VOLTAGE TEMPERATURE-STABLE MICROMECHANICAL PIEZOELECTRIC OSCILLATOR

    E-Print Network [OSTI]

    Ayazi, Farrokh

    A LOW-VOLTAGE TEMPERATURE-STABLE MICROMECHANICAL PIEZOELECTRIC OSCILLATOR Reza Abdolvand, Hossein polarization voltages (5-20V) for operation, which complicates the design of the oscillator circuit in today reference oscillator that utilizes a temperature-stable thin- film piezoelectric-on-silicon resonator

  16. REFINED RFP LOOP VOLTAGE CALCULATION J.C. Sprott

    E-Print Network [OSTI]

    Sprott, Julien Clinton

    is the stored magnetic energy, Up is the plasma energy, and 'E is the global energy confinement time, which-of-merit for RFP devices is the loop voltage. Low loop voltage implies high plasma temperature and long energy is smallest if the loop is as close to the outside of the shell and as far from the primary windings

  17. LOW VOLTAGE ANALOG CIRCUITS USING STANDARD CMOS TECHNOLOGY

    E-Print Network [OSTI]

    Rincon-Mora, Gabriel A.

    LOW VOLTAGE ANALOG CIRCUITS USING STANDARD CMOS TECHNOLOGY Phillip E. Allen, Benjamin J. Blalock, and Gabriel A. Rincon School of Electrical and Computer Engineering Georgia Institute of Technology Atlanta supply voltages in CMOS integrated circuits. As the channel lengths of CMOS technology decrease

  18. Power Grid Voltage Integrity Verification Department of ECE

    E-Print Network [OSTI]

    Najm, Farid N.

    Power Grid Voltage Integrity Verification Maha Nizam Department of ECE University of Toronto devgan@magma-da.com ABSTRACT Full-chip verification requires one to check if the power grid is safe, i.e., if the voltage drop on the grid does not exceed a cer- tain threshold. The traditional simulation-based solution

  19. Nevada National Security Site Groundwater Program Welcomes Peer Review Team

    Broader source: Energy.gov [DOE]

    Recently, an independent peer review team was invited to assess the groundwater characterization program at the Nevada National Security Site (NNSS). This nationally recognized group of experts, from various external organizations, will examine the computer modeling approach developed to better understand how historic underground nuclear testing in Yucca Flat affected the groundwater.

  20. Nuclear Physics and National Security in an Age of Terrorism

    E-Print Network [OSTI]

    Gilfoyle, Jerry

    Nuclear Physics and National Security in an Age of Terrorism Jerry Gilfoyle Physics Department, University of Richmond, Virginia Outline: 1. How do we assess the threat? 1. Nuclear Weapons 101 2. Catching to the threat? ­ prevention ­ mitigation (i.e. cleanup, cures, etc.) ­ retaliation #12;Nuclear Weapons 101 What

  1. Enabling Secure Ubiquitous Interactions Kevin Eustice, Shane Markstrum, Venkatraman Ramakrishna,

    E-Print Network [OSTI]

    California at Los Angeles, University of

    , a solid foundation of security and safety must first be in place. Existing research has focused its energy in such environments. We require techniques to assess the appropriate level of required access for an entity within attacking our household WiFi network ­ they will also come in such forms as electronic hitchhikers who latch

  2. Living and Working Safely Around High-Voltage Power Lines.

    SciTech Connect (OSTI)

    United States. Bonneville Power Administration.

    2001-06-01T23:59:59.000Z

    High-voltage transmission lines can be just as safe as the electrical wiring in the homes--or just as dangerous. The crucial factor is ourselves: they must learn to behave safely around them. This booklet is a basic safety guide for those who live and work around power lines. It deals primarily with nuisance shocks due to induced voltages, and with potential electric shock hazards from contact with high-voltage lines. References on possible long-term biological effects of transmission lines are shown. In preparing this booklet, the Bonneville Power Administration has drawn on more than 50 years of experience with high-voltage transmission. BPA operates one of the world`s largest networks of long-distance, high-voltage lines. This system has more than 400 substations and about 15,000 miles of transmission lines, almost 4,400 miles of which are operated at 500,000 volts.

  3. E-beam high voltage switching power supply

    DOE Patents [OSTI]

    Shimer, Daniel W. (Danville, CA); Lange, Arnold C. (Livermore, CA)

    1996-01-01T23:59:59.000Z

    A high-power power supply produces a controllable, constant high voltage put under varying and arcing loads. The power supply includes a voltage regulator, an inductor, an inverter for producing a high frequency square wave current of alternating polarity, an improved inverter voltage clamping circuit, a step up transformer, an output rectifier for producing a dc voltage at the output of each module, and a current sensor for sensing output current. The power supply also provides dynamic response to varying loads by controlling the voltage regulator duty cycle and circuitry is provided for sensing incipient arc currents at the output of the power supply to simultaneously decouple the power supply circuitry from the arcing load. The power supply includes a plurality of discrete switching type dc--dc converter modules.

  4. E-beam high voltage switching power supply

    DOE Patents [OSTI]

    Shimer, D.W.; Lange, A.C.

    1996-10-15T23:59:59.000Z

    A high-power power supply produces a controllable, constant high voltage output under varying and arcing loads. The power supply includes a voltage regulator, an inductor, an inverter for producing a high frequency square wave current of alternating polarity, an improved inverter voltage clamping circuit, a step up transformer, an output rectifier for producing a dc voltage at the output of each module, and a current sensor for sensing output current. The power supply also provides dynamic response to varying loads by controlling the voltage regulator duty cycle and circuitry is provided for sensing incipient arc currents at the output of the power supply to simultaneously decouple the power supply circuitry from the arcing load. The power supply includes a plurality of discrete switching type dc--dc converter modules. 5 figs.

  5. Strategic philanthropy for cyber security : an extended cost-benefit analysis framework to study cybersecurity

    E-Print Network [OSTI]

    Cho, Yiseul

    2012-01-01T23:59:59.000Z

    The international climate of cyber security is dramatically changing and thus unpredictable. As such, agile yet sustainable solutions are needed, along with an effective and a pragmatic evaluation framework to assess and ...

  6. Dye filled security seal

    DOE Patents [OSTI]

    Wilson, Dennis C. W. (Tijeras, NM)

    1982-04-27T23:59:59.000Z

    A security seal for providing an indication of unauthorized access to a sealed object includes an elongate member to be entwined in the object such that access is denied unless the member is removed. The elongate member has a hollow, pressurizable chamber extending throughout its length that is filled with a permanent dye under greater than atmospheric pressure. Attempts to cut the member and weld it together are revealed when dye flows through a rupture in the chamber wall and stains the outside surface of the member.

  7. National Security Science

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScience National

  8. National Security Science Archive

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScienceScience »

  9. Security | Argonne National Laboratory

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduled System OutagesNews PressThemesLinksUserSecurity

  10. Security | Department of Energy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0

  11. PNNL: Security & Privacy

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 TheSteven Ashby Dr. Steven Ashby Photo Dr.1999alt=Search

  12. Energy Security Overview

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing Zirconia Nanoparticles asSecondCareerFebruaryEnergySecurity Overview We are

  13. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The National

  14. National Nuclear Security Administration

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The NationalWashington. DC

  15. Natlonal Nuclear Security Admlnlstratlon

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy2015 | JeffersonNations

  16. Spark-safe low-voltage detonator

    DOE Patents [OSTI]

    Lieberman, Morton L. (Albuquerque, NM)

    1989-01-01T23:59:59.000Z

    A column of explosive in a low-voltage detonator which makes it spark-safe ncludes an organic secondary explosive charge of HMX in the form of a thin pad disposed in a bore of a housing of the detonator in an ignition region of the explosive column and adjacent to an electrical ignition device at one end of the bore. The pad of secondary charge has an axial thickness within the range of twenty to thirty percent of its diameter. The explosive column also includes a first explosive charge of CP disposed in the housing bore in the ignition region of the explosive column next to the secondary charge pad on a side opposite from the ignition device. The first CP charge is loaded under sufficient pressure, 25 to 40 kpsi, to provide mechanical confinement of the pad of secondary charge and physical coupling thereof with the ignition device. The explosive column further includes a second explosive charge of CP disposed in the housing bore in a transition region of the explosive column next to the first CP charge on a side opposite from the pad of secondary charge. The second CP charge is loaded under sufficient pressure, about 10 kpsi, to allow occurrence of DDT. The first explosive CP charge has an axial thickness within the range of twenty to thirty percent of its diameter, whereas the second explosive CP charge contains a series of increments (nominally 4) each of which has an axial thickness-to-diameter ratio of one to two.

  17. Bonfire-safe low-voltage detonator

    DOE Patents [OSTI]

    Lieberman, Morton L. (Albuquerque, NM)

    1990-01-01T23:59:59.000Z

    A column of explosive in a low-voltage detonator which makes it bonfire-safe includes a first layer of an explosive charge of CP, or a primary explosive, and a second layer of a secondary organic explosive charge, such as PETN, which has a degradation temperature lower than the autoignition temperature of the CP or primary explosives. The first layer is composed of a pair of increments disposed in a bore of a housing of the detonator in an ignition region of the explosive column and adjacent to and in contact with an electrical ignition device at one end of the bore. The second layer is composed of a plurality of increments disposed in the housing bore in a transition region of the explosive column next to and in contact with the first layer on a side opposite from the ignition device. The first layer is loaded under a sufficient high pressure, 25 to 40 kpsi, to achieve ignition, whereas the second layer is loaded under a sufficient low pressure, about 10 kpsi, to allow occurrence of DDT. Each increment of the first and second layers has an axial length-to-diameter ratio of one-half.

  18. Bonfire-safe low-voltage detonator

    DOE Patents [OSTI]

    Lieberman, M.L.

    1988-07-01T23:59:59.000Z

    A column of explosive in a low-voltage detonator which makes it bonfire-safe includes a first layer of an explosive charge of CP, or a primary explosive, and a second layer of a secondary organic explosive charge, such as PETN, which has a degradation temperature lower than the autoignition temperature of the CP or primary explosives. The first layer is composed of a pair of increments disposed in a bore of a housing of the detonator in an ignition region of the explosive column and adjacent to and in contact with an electrical ignition device at one end of the bore. The second layer is composed of a plurality of increments disposed in the housing bore in a transition region of the explosive column next to and in contact with the first layer on a side opposite from the ignition device. The first layer is loaded under a sufficient high pressure, 25 to 40 kpsi, to achieve ignition, whereas the second layer is loaded under a sufficient low pressure, about 10 kpsi, to allow occurrence of DDT. Each increment of the first and second layers has an axial length-to-diameter ratio of one-half. 2 figs.

  19. National Security | ornl.gov

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

  20. Technology Transfer Success Stories, Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security Navigate Home About Us Contact Information Hide Thumbs First Previous Pause Next Last Set Speed Slideshow speed: 5 seconds Move Autoinduction system New Image Set...

  1. Climate Change and National Security

    E-Print Network [OSTI]

    Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

    2015-01-01T23:59:59.000Z

    CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 “Climate change acts as a threat

  2. David Telles wins NNSA Security

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    who conduct vulnerability analyses, authored the LANL Site Safeguards and Security Plan, and administered the Lab's Performance Assurance Program. Under his leadership,...

  3. Cyber Security Process Requirements Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2008-08-12T23:59:59.000Z

    The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

  4. Secure Data Center (Fact Sheet)

    SciTech Connect (OSTI)

    Not Available

    2012-08-01T23:59:59.000Z

    This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

  5. Romantic relationships and adult attachment: providing a secure base for exploration

    E-Print Network [OSTI]

    Martin, Archibald McLeish, III

    2007-09-17T23:59:59.000Z

    for this study are, ? = .87, M = 3.96, SD = .92. One of the main purposes for the project was to examine how partners influence exploration. Therefore, we developed three measures of Perceptions of Partner and Exploration (PPE). The first, a seven item... measure assesses the “secure” PPE. Participants responded on 7 point Likert scales, with “strongly agree” and “strongly disagree” as anchors. It is the “secure” version because the scale was designed to assess how much partners encourage and support...

  6. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

  7. Security classification of information

    SciTech Connect (OSTI)

    Quist, A.S.

    1993-04-01T23:59:59.000Z

    This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

  8. High voltage dc--dc converter with dynamic voltage regulation and decoupling during load-generated arcs

    DOE Patents [OSTI]

    Shimer, D.W.; Lange, A.C.

    1995-05-23T23:59:59.000Z

    A high-power power supply produces a controllable, constant high voltage output under varying and arcing loads. The power supply includes a voltage regulator, an inductor, an inverter for producing a high frequency square wave current of alternating polarity, an improved inverter voltage clamping circuit, a step up transformer, an output rectifier for producing a dc voltage at the output of each module, and a current sensor for sensing output current. The power supply also provides dynamic response to varying loads by controlling the voltage regulator duty cycle and circuitry is provided for sensing incipient arc currents at the output of the power supply to simultaneously decouple the power supply circuitry from the arcing load. The power supply includes a plurality of discrete switching type dc--dc converter modules. 5 Figs.

  9. High voltage dc-dc converter with dynamic voltage regulation and decoupling during load-generated arcs

    DOE Patents [OSTI]

    Shimer, Daniel W. (Danville, CA); Lange, Arnold C. (Livermore, CA)

    1995-01-01T23:59:59.000Z

    A high-power power supply produces a controllable, constant high voltage output under varying and arcing loads. The power supply includes a voltage regulator, an inductor, an inverter for producing a high frequency square wave current of alternating polarity, an improved inverter voltage clamping circuit, a step up transformer, an output rectifier for producing a dc voltage at the output of each module, and a current sensor for sensing output current. The power supply also provides dynamic response to varying loads by controlling the voltage regulator duty cycle and circuitry is provided for sensing incipient arc currents at the output of the power supply to simultaneously decouple the power supply circuitry from the arcing load. The power supply includes a plurality of discrete switching type dc--dc converter modules.

  10. Ideas for Security Assurance in Security Critical Software using Modelica

    E-Print Network [OSTI]

    Zhao, Yuxiao

    Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

  11. Fuel Cell Technology Status - Voltage Degradation (Presentation)

    SciTech Connect (OSTI)

    Kurtz, J.; Wipke,; Sprik, S.; Saur, G.

    2012-06-01T23:59:59.000Z

    This presentation describes an independent assessment of fuel cell durability status and discusses the project's relevance to the Department of Energy Hydrogen and Fuel Cells Program; NREL's analysis approach; the FY12 technical accomplishments including the fourth annual publication of results; and project collaborations and future work.

  12. 2014 Headquarters Facilities Master Security Plan - Chapter 8...

    Office of Environmental Management (EM)

    8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

  13. 2014 Headquarters Facilities Master Security Plan - Chapter 14...

    Office of Environmental Management (EM)

    4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

  14. 2014 Headquarters Facilities Master Security Plan - Chapter 1...

    Office of Environmental Management (EM)

    , Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

  15. 2014 Headquarters Facilities Master Security Plan - Chapter 10...

    Office of Environmental Management (EM)

    0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

  16. 2014 Headquarters Facilities Master Security Plan - Chapter 3...

    Office of Environmental Management (EM)

    3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

  17. Panel Session: Optimization Techniques in Voltage Collapse Analysis," IEEE PES Summer Meeting, San Diego, July 14, 1998. Applications of Optimization to Voltage Collapse Analysis

    E-Print Network [OSTI]

    Cañizares, Claudio A.

    Panel Session: Optimization Techniques in Voltage Collapse Analysis," IEEE PES Summer Meeting, San Diego, July 14, 1998. Applications of Optimization to Voltage Collapse Analysis Claudio A. Ca|Thispaper describesseveralapplica- tions of optimization for voltage stability analysis VSA of power systems. Voltage stability prob

  18. Spark-safe low-voltage detonator

    DOE Patents [OSTI]

    Lieberman, M.L.

    1988-07-01T23:59:59.000Z

    A column of explosive in a low-voltage detonator which makes it spark-safe includes an organic secondary explosive charge of HMX in the form of a thin pad disposed in a bore of a housing of the detonator in an ignition region of the explosive column and adjacent to an electrical ignition device at one end of the bore. The pad of secondary charge has an axial thickness within the range of twenty to thirty percent of its diameter. The explosive column also includes a first explosive charge of CP disposed in the housing bore in the ignition region of the explosive column next to the secondary charge pad on a side opposite from the ignition device. The first CP charge is loaded under sufficient pressure, 25 to 40 kpsi, to provide mechanical confinement of the pad of secondary charge and physical coupling thereof with the ignition device. The explosive column further includes a second explosive charge of CP disposed in the housing bore in a transition region of the explosive column next to the first CP charge on a side opposite from the pad of secondary charge. The second CP charge is loaded under sufficient pressure, about 10 kpsi, to allow occurrence of DDT. The first explosive CP charge has an axial thickness within the range of twenty to thirty percent of its diameter, whereas the second explosive CP charge contains a series of increments (nominally 4), each of which has an axial thickness-to-diameter ratio of one to two. 2 figs.

  19. Electro-optic voltage sensor with Multiple Beam Splitting

    DOE Patents [OSTI]

    Woods, Gregory K. (Cornelius, OR); Renak, Todd W. (Idaho Falls, ID); Crawford, Thomas M. (Idaho Falls, ID); Davidson, James R. (Idaho Falls, ID)

    2000-01-01T23:59:59.000Z

    A miniature electro-optic voltage sensor system capable of accurate operation at high voltages without use of the dedicated voltage dividing hardware. The invention achieves voltage measurement without significant error contributions from neighboring conductors or environmental perturbations. The invention employs a transmitter, a sensor, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor. Within the sensor the beam undergoes the Pockels electro-optic effect. The electro-optic effect produces a modulation of the beam's polarization, which is in turn converted to a pair of independent conversely-amplitude-modulated signals, from which the voltage of the E-field is determined by the signal processor. The use of converse AM signals enables the signal processor to better distinguish signal from noise. The sensor converts the beam by splitting the beam in accordance with the axes of the beam's polarization state (an ellipse) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured.

  20. Electro-optic voltage sensor with beam splitting

    DOE Patents [OSTI]

    Woods, Gregory K. (Cornelius, OR); Renak, Todd W. (Idaho Falls, ID); Davidson, James R. (Idaho Falls, ID); Crawford, Thomas M. (Idaho Falls, ID)

    2002-01-01T23:59:59.000Z

    The invention is a miniature electro-optic voltage sensor system capable of accurate operation at high voltages without use of the dedicated voltage dividing hardware typically found in the prior art. The invention achieves voltage measurement without significant error contributions from neighboring conductors or environmental perturbations. The invention employs a transmitter, a sensor, a detector, and a signal processor. The transmitter produces a beam of electromagnetic radiation which is routed into the sensor. Within the sensor the beam undergoes the Pockels electro-optic effect. The electro-optic effect produces a modulation of the beam's polarization, which is in turn converted to a pair of independent conversely-amplitude-modulated signals, from which the voltage of the E-field is determined by the signal processor. The use of converse AM signals enables the signal processor to better distinguish signal from noise. The sensor converts the beam by splitting the beam in accordance with the axes of the beam's polarization state (an ellipse) into at least two AM signals. These AM signals are fed into a signal processor and processed to determine the voltage between a ground conductor and the conductor on which voltage is being measured.

  1. Workshop on Education in Computer Security Page 1 Computer Security in Introductory Programming Classes

    E-Print Network [OSTI]

    Bishop, Matt

    of domains occurs in a secure manner (as defined by the site security policy) and that the change in domains

  2. Secure Interoperable Open Smart Grid Demonstration Project

    SciTech Connect (OSTI)

    Magee, Thoman

    2014-12-31T23:59:59.000Z

    The Consolidated Edison, Inc., of New York (Con Edison) Secure Interoperable Open Smart Grid Demonstration Project (SGDP), sponsored by the United States (US) Department of Energy (DOE), demonstrated that the reliability, efficiency, and flexibility of the grid can be improved through a combination of enhanced monitoring and control capabilities using systems and resources that interoperate within a secure services framework. The project demonstrated the capability to shift, balance, and reduce load where and when needed in response to system contingencies or emergencies by leveraging controllable field assets. The range of field assets includes curtailable customer loads, distributed generation (DG), battery storage, electric vehicle (EV) charging stations, building management systems (BMS), home area networks (HANs), high-voltage monitoring, and advanced metering infrastructure (AMI). The SGDP enables the seamless integration and control of these field assets through a common, cyber-secure, interoperable control platform, which integrates a number of existing legacy control and data systems, as well as new smart grid (SG) systems and applications. By integrating advanced technologies for monitoring and control, the SGDP helps target and reduce peak load growth, improves the reliability and efficiency of Con Edison’s grid, and increases the ability to accommodate the growing use of distributed resources. Con Edison is dedicated to lowering costs, improving reliability and customer service, and reducing its impact on the environment for its customers. These objectives also align with the policy objectives of New York State as a whole. To help meet these objectives, Con Edison’s long-term vision for the distribution grid relies on the successful integration and control of a growing penetration of distributed resources, including demand response (DR) resources, battery storage units, and DG. For example, Con Edison is expecting significant long-term growth of DG. The SGDP enables the efficient, flexible integration of these disparate resources and lays the architectural foundations for future scalability. Con Edison assembled an SGDP team of more than 16 different project partners, including technology vendors, and participating organizations, and the Con Edison team provided overall guidance and project management. Project team members are listed in Table 1-1.

  3. Pricing Security L. Jean Camp

    E-Print Network [OSTI]

    Camp, L. Jean

    documented, with free patches, continue to exist on the Internet(Farmer, 1999). An alternative solution on the issues of defining the good and jumpstarting a market in the information survivability workshop. Security, the lack of security on one machine can cause adverse effects on another. The most obvious example

  4. Fluid Mechanics and Homeland Security

    E-Print Network [OSTI]

    Settles, Gary S.

    Fluid Mechanics and Homeland Security Gary S. Settles Mechanical and Nuclear Engineering Department. 2006. 38:87­110 The Annual Review of Fluid Mechanics is online at fluid.annualreviews.org doi: 10 security involves many applications of fluid mechanics and offers many opportunities for research

  5. Reporting Incidents Of Security Concern

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2001-04-03T23:59:59.000Z

    To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

  6. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

  7. Cyber Security Incident Management Manual

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2009-01-08T23:59:59.000Z

    The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

  8. FOOD SECURITY: WAYS FORWARD THROUGH

    E-Print Network [OSTI]

    Zaferatos, Nicholas C.

    FOOD SECURITY: WAYS FORWARD THROUGH COOPERATIVE PRODUCTION AND MARKETING1 "Given the chance, poor. The Sustainable Community Connections project, coordinated by AWISH-HELLAS, seeks to address food security issues) olive oil-related products, with targeting of markets in the European Union (EU) and United States (US

  9. Optically triggered high voltage switch network and method for switching a high voltage

    DOE Patents [OSTI]

    El-Sharkawi, Mohamed A. (Renton, WA); Andexler, George (Everett, WA); Silberkleit, Lee I. (Mountlake Terrace, WA)

    1993-01-19T23:59:59.000Z

    An optically triggered solid state switch and method for switching a high voltage electrical current. A plurality of solid state switches (350) are connected in series for controlling electrical current flow between a compensation capacitor (112) and ground in a reactive power compensator (50, 50') that monitors the voltage and current flowing through each of three distribution lines (52a, 52b and 52c), which are supplying three-phase power to one or more inductive loads. An optical transmitter (100) controlled by the reactive power compensation system produces light pulses that are conveyed over optical fibers (102) to a switch driver (110') that includes a plurality of series connected optical triger circuits (288). Each of the optical trigger circuits controls a pair of the solid state switches and includes a plurality of series connected resistors (294, 326, 330, and 334) that equalize or balance the potential across the plurality of trigger circuits. The trigger circuits are connected to one of the distribution lines through a trigger capacitor (340). In each switch driver, the light signals activate a phototransistor (300) so that an electrical current flows from one of the energy reservoir capacitors through a pulse transformer (306) in the trigger circuit, producing gate signals that turn on the pair of serially connected solid state switches (350).

  10. Safeguards and Security Program

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    1995-09-28T23:59:59.000Z

    Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

  11. Office of Headquarters Personnel Security Operations

    Broader source: Energy.gov [DOE]

    The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

  12. Departmental Personnel Security- Policy and Procedures

    Broader source: Energy.gov [DOE]

    Departmental Personnel Security provides centralized and authoritative policy guidance and ensures consistent and effective implementation of the DOE personnel security program Department-wide to include the National Nuclear Security Administration.

  13. A capacitor-less low drop-out voltage regulator with fast transient response

    E-Print Network [OSTI]

    Milliken, Robert Jon

    2006-04-12T23:59:59.000Z

    . Most systems incorporate several voltage regulators which supply various subsystems and provide isolation among such subsystems. Low dropout (LDO) voltage regulators are generally used to supply low voltage, low noise analog circuitry. Each LDO...

  14. A Comparison of High-Voltage Switches

    SciTech Connect (OSTI)

    Chu, K.W.; Scott, G.L.

    1999-02-01T23:59:59.000Z

    This report summarizes our work on high-voltage switches during the past few years. With joint funding from the Department of Energy (DOE) and the Department of Defense (DOD), we tested a wide variety of switches to a common standard. This approach permitted meaningful comparisons between disparate switches. Most switches were purchased from commercial sources, though some were experimental devices. For the purposes of this report, we divided the switches into three generic types (gas, vacuum, and semiconductor) and selected data that best illustrates important strengths and weaknesses of each switch type. Test techniques that indicate the state of health of the switches are emphasized. For example, a good indicator of residual gas in a vacuum switch is the systematic variation of the switching delay in response to changes in temperature and/or operating conditions. We believe that the presentation of this kind of information will help engineers to select and to test switches for their particular applications. Our work was limited to switches capable of driving slappers. Also known as exploding-foil initiators, slappers are detonators that initiate a secondary explosive by direct impact with a small piece of matter moving at the detonation velocity (several thousands of meters per second). A slapper is desirable for enhanced safety (no primary explosive), but it also places extra demands on the capacitor-discharge circuit to deliver a fast-rising current pulse (greater than 10 A/ns) of several thousand amperes. The required energy is substantially less than one joule; but this energy is delivered in less than one microsecond, taking the peak power into the megawatt regime. In our study, the switches operated in the 1 kV to 3 kV range and were physically small, roughly 1 cm{sup 3} or less. Although a fuze functions only once in actual use, multiple-shot capability is important for production testing and for research work. For this reason, we restricted this report to multiple-shot switches. Furthermore, our work included only switches with submicrosecond timing precision, thereby excluding mechanical switches.

  15. Multilevel cascade voltage source inverter with seperate DC sources

    DOE Patents [OSTI]

    Peng, Fang Zheng (Oak Ridge, TN); Lai, Jih-Sheng (Knoxville, TN)

    1997-01-01T23:59:59.000Z

    A multilevel cascade voltage source inverter having separate DC sources is described herein. This inverter is applicable to high voltage, high power applications such as flexible AC transmission systems (FACTS) including static VAR generation (SVG), power line conditioning, series compensation, phase shifting and voltage balancing and fuel cell and photovoltaic utility interface systems. The M-level inverter consists of at least one phase wherein each phase has a plurality of full bridge inverters equipped with an independent DC source. This inverter develops a near sinusoidal approximation voltage waveform with only one switching per cycle as the number of levels, M, is increased. The inverter may have either single-phase or multi-phase embodiments connected in either wye or delta configurations.

  16. Multilevel cascade voltage source inverter with separate DC sources

    DOE Patents [OSTI]

    Peng, F.Z.; Lai, J.S.

    1997-06-24T23:59:59.000Z

    A multilevel cascade voltage source inverter having separate DC sources is described herein. This inverter is applicable to high voltage, high power applications such as flexible AC transmission systems (FACTS) including static VAR generation (SVG), power line conditioning, series compensation, phase shifting and voltage balancing and fuel cell and photovoltaic utility interface systems. The M-level inverter consists of at least one phase wherein each phase has a plurality of full bridge inverters equipped with an independent DC source. This inverter develops a near sinusoidal approximation voltage waveform with only one switching per cycle as the number of levels, M, is increased. The inverter may have either single-phase or multi-phase embodiments connected in either wye or delta configurations. 15 figs.

  17. Unravelling the Performance Degradation Mechanisms in High-voltage...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Unravelling the Performance Degradation Mechanisms in High-voltage Lithium-ion Battery Composite Oxide Electrodes Apr 11 2014 02:00 PM - 03:00 PM Debasish Mohanty, ORNL, Oak Ridge...

  18. Stability issues in IC Low Drop Out voltage regulators

    E-Print Network [OSTI]

    Chava, Krishna Chaitanya

    2002-01-01T23:59:59.000Z

    Performance issues of IC Low Drop Out (LDO) voltage regulators, with specific reference to stability, are discussed in this thesis. Evaluation of existing frequency compensation schemes and their performances across operating loads is presented...

  19. Operation of buck regulator with ultra-low input voltage

    E-Print Network [OSTI]

    Harris, Cory Angelo

    2014-01-01T23:59:59.000Z

    Based on the LTC3621 and LTC3624, the designed buck regulator proposed in this thesis aims to lower the allowed input voltage and increase efficiency compared to the original part without making significant changes to ...

  20. Voltage Dependent Charge Storage Modes and Capacity in Subnanometer Pores

    SciTech Connect (OSTI)

    Qiao, Rui [Clemson University; Meunier, V. [Rensselaer Polytechnic Institute (RPI); Huang, Jingsong [ORNL; Wu, Peng [ORNL; Sumpter, Bobby G [ORNL

    2012-01-01T23:59:59.000Z

    Using molecular dynamics simulations, we show that charge storage in subnanometer pores follows a distinct voltage-dependent behavior. Specifically, at lower voltages, charge storage is achieved by swapping co-ions in the pore with counterions in the bulk electrolyte. As voltage increases, further charge storage is due mainly to the removal of co-ions from the pore, leading to a capacitance increase. The capacitance eventually reaches a maximum when all co-ions are expelled from the pore. At even higher electrode voltages, additional charge storage is realized by counterion insertion into the pore, accompanied by a reduction of capacitance. The molecular mechanisms of these observations are elucidated and provide useful insight for optimizing energy storage based on supercapacitors.

  1. An Adaptive Voltage Control Algorithm with Multiple Distributed Energy

    SciTech Connect (OSTI)

    Li, Huijuan [University of Tennessee, Knoxville (UTK); Li, Fangxing [ORNL; Adhikari, Sarina [ORNL; Xu, Yan [ORNL; Rizy, D Tom [ORNL; Kueck, John D [ORNL

    2009-01-01T23:59:59.000Z

    Distributed energy resources (DE) with power electronics (PE) interfaces with the right control are capable of providing reactive power related ancillary services. Voltage regulation in particular has drawn much attention. In this paper the challenges to control multiple DEs to regulate the local voltage in distribution systems is addressed and a decentralized adaptive voltage control method is proposed. The simulation results in different system conditions show that this adaptive voltage control method is capable of satisfying the fast response speed requirement without causing oscillation or instability of the system. Since this method has high tolerance to the shortage of the system parameters and can be widely adaptive to the variable operation situations of the power systems, it is very suited for the utility application.

  2. Modeling the operating voltage of liquid metal battery cells

    E-Print Network [OSTI]

    Newhouse, Jocelyn Marie

    2014-01-01T23:59:59.000Z

    A one-dimensional, integrative model of the voltage during liquid metal battery operation has been developed to enhance the understanding of performance at the cell level. Two liquid metal batteries were studied: Mg-Sb for ...

  3. Multilevel cascade voltage source inverter with seperate DC sources

    DOE Patents [OSTI]

    Peng, Fang Zheng (Knoxville, TN); Lai, Jih-Sheng (Blacksburg, VA)

    2002-01-01T23:59:59.000Z

    A multilevel cascade voltage source inverter having separate DC sources is described herein. This inverter is applicable to high voltage, high power applications such as flexible AC transmission systems (FACTS) including static VAR generation (SVG), power line conditioning, series compensation, phase shifting and voltage balancing and fuel cell and photovoltaic utility interface systems. The M-level inverter consists of at least one phase wherein each phase has a plurality of full bridge inverters equipped with an independent DC source. This inverter develops a near sinusoidal approximation voltage waveform with only one switching per cycle as the number of levels, M, is increased. The inverter may have either single-phase or multi-phase embodiments connected in either wye or delta configurations.

  4. High frequency AC power converter for low voltage circuits

    E-Print Network [OSTI]

    Salazar, Nathaniel Jay Tobias

    2012-01-01T23:59:59.000Z

    This thesis presents a novel AC power delivery architecture that is suitable for VHF frequency (50-100MHz) polyphase AC/DC power conversion in low voltage integrated circuits. A complete AC power delivery architecture was ...

  5. Planar LTCC transformers for high voltage flyback converters: Part II.

    SciTech Connect (OSTI)

    Schofield, Daryl (NASCENTechnology, Inc., Watertown, SD); Schare, Joshua M., Ph.D.; Slama, George (NASCENTechnology, Inc., Watertown, SD); Abel, David (NASCENTechnology, Inc., Watertown, SD)

    2009-02-01T23:59:59.000Z

    This paper is a continuation of the work presented in SAND2007-2591 'Planar LTCC Transformers for High Voltage Flyback Converters'. The designs in that SAND report were all based on a ferrite tape/dielectric paste system originally developed by NASCENTechnoloy, Inc, who collaborated in the design and manufacturing of the planar LTCC flyback converters. The output/volume requirements were targeted to DoD application for hard target/mini fuzing at around 1500 V for reasonable primary peak currents. High voltages could be obtained but with considerable higher current. Work had begun on higher voltage systems and is where this report begins. Limits in material properties and processing capabilities show that the state-of-the-art has limited our practical output voltage from such a small part volume. In other words, the technology is currently limited within the allowable funding and interest.

  6. Secondary Control for Voltage Unbalance Compensation in an Islanded Microgrid

    E-Print Network [OSTI]

    Vasquez, Juan Carlos

    coupling (PCC). Unbalance compensation is achieved by proper control of distributed generators (DGs unbalance. Keywords-distributed generation; microgrid; secondary control; voltage unbalance compensation I. INTRODUCTION Distributed Generators (DGs) may be connected individually to the utility grid or be integrated

  7. IMPACT OF DYNAMIC VOLTAGE SCALING (DVS) ON CIRCUIT OPTIMIZATION

    E-Print Network [OSTI]

    Esquit Hernandez, Carlos A.

    2010-01-16T23:59:59.000Z

    Circuit designers perform optimization procedures targeting speed and power during the design of a circuit. Gate sizing can be applied to optimize for speed, while Dual-VT and Dynamic Voltage Scaling (DVS) can be applied to optimize for leakage...

  8. Design & Fabrication of a High-Voltage Photovoltaic Cell

    SciTech Connect (OSTI)

    Felder, Jennifer; /North Carolina State U. /SLAC

    2012-09-05T23:59:59.000Z

    Silicon photovoltaic (PV) cells are alternative energy sources that are important in sustainable power generation. Currently, applications of PV cells are limited by the low output voltage and somewhat low efficiency of such devices. In light of this fact, this project investigates the possibility of fabricating high-voltage PV cells on float-zone silicon wafers having output voltages ranging from 50 V to 2000 V. Three designs with different geometries of diffusion layers were simulated and compared in terms of metal coverage, recombination, built-in potential, and conduction current density. One design was then chosen and optimized to be implemented in the final device design. The results of the simulation serve as a feasibility test for the design concept and provide supportive evidence of the effectiveness of silicon PV cells as high-voltage power supplies.

  9. High-voltage air-core pulse transformers

    SciTech Connect (OSTI)

    Rohwein, G. J.

    1981-01-01T23:59:59.000Z

    General types of air core pulse transformers designed for high voltage pulse generation and energy transfer applications are discussed with special emphasis on pulse charging systems which operate up to the multi-megavolt range. The design, operation, dielectric materials, and performance are described. It is concluded that high voltage air core pulse transformers are best suited to applications outside the normal ranges of conventional magnetic core transformers. In general these include charge transfer at high power levels and fast pulse generation with comparatively low energy. When properly designed and constructed, they are capable of delivering high energy transfer efficiency and have demonstrated superior high voltage endurance. The principal disadvantage of high voltage air core transformers is that they are not generally available from commercial sources. Consequently, the potential user must become thoroughly familiar with all aspects of design, fabrication and system application before he can produce a high performance transformer system. (LCL)

  10. Time varying voltage combustion control and diagnostics sensor

    DOE Patents [OSTI]

    Chorpening, Benjamin T. (Morgantown, WV); Thornton, Jimmy D. (Morgantown, WV); Huckaby, E. David (Morgantown, WV); Fincham, William (Fairmont, WV)

    2011-04-19T23:59:59.000Z

    A time-varying voltage is applied to an electrode, or a pair of electrodes, of a sensor installed in a fuel nozzle disposed adjacent the combustion zone of a continuous combustion system, such as of the gas turbine engine type. The time-varying voltage induces a time-varying current in the flame which is measured and used to determine flame capacitance using AC electrical circuit analysis. Flame capacitance is used to accurately determine the position of the flame from the sensor and the fuel/air ratio. The fuel and/or air flow rate (s) is/are then adjusted to provide reduced flame instability problems such as flashback, combustion dynamics and lean blowout, as well as reduced emissions. The time-varying voltage may be an alternating voltage and the time-varying current may be an alternating current.

  11. Evaluation Report on "The Department's Unclassified Cyber Security Program"

    SciTech Connect (OSTI)

    None

    2009-10-01T23:59:59.000Z

    Industry experts report that security challenges and threats are continually evolving as malicious activity has become more web-based and attackers are able to rapidly adapt their attack methods. In addition, the number of data breaches continues to rise. In an effort to mitigate and address threats and protect valuable information, the Department of Energy anticipated spending about $275 million in Fiscal Year (FY) 2009 to implement cyber security measures necessary to protect its information technology resources. These systems and data are designed to support the Department's mission and business lines of energy security, nuclear security, scientific discovery and innovation, and environmental responsibility. The Federal Information Security Management Act of 2002 (FISMA) provides direction to agencies on the management and oversight of information security risks, including design and implementation of controls to protect Federal information and systems. As required by FISMA, the Office of Inspector General conducts an annual independent evaluation to determine whether the Department's unclassified cyber security program adequately protects its information systems and data. This memorandum and the attached report present the results of our evaluation for FY 2009. The Department continued to make incremental improvements in its unclassified cyber security program. Our evaluation disclosed that most sites had taken action to address weaknesses previously identified in our FY 2008 evaluation report. They improved certification and accreditation of systems; strengthened configuration management of networks and systems; performed independent assessments; and, developed and/or refined certain policies and procedures. In addition, the Department instituted a centralized incident response organization designed to eliminate duplicative efforts throughout the Department. As we have noted in previous reports, the Department continued to maintain strong network perimeter defenses against malicious intruders and other externals threats. These are positive accomplishments. However, in our judgment, additional action is required to further enhance the Department's unclassified cyber security program and help reduce risks to its systems and data. For example, our current review identified opportunities for improvements in areas such as security planning and testing, systems inventory, access controls, and configuration management. In particular, we issued a number of findings at sites managed by the National Nuclear Security Administration (NNSA). We also identified weaknesses across various Department program elements. Issues that warrant further attention include: (1) Weaknesses such as outdated security plans and not completing annual security control self-assessments were identified at several sites; (2) The Department had not yet resolved systems inventory issues and had yet to deploy a complex-wide automated asset management tool to help track information technology resources and identify interfaces between systems or networks; (3) Although certain improvements had been made to enhance access controls, we noted deficiencies such as a lack of periodic account reviews and inadequate password management at a number of sites; and (4) Previously identified weaknesses in configuration management had been corrected, however, we found problems related to weak administrator account settings and failure to install software patches, as well as incomplete implementation of the Federal Desktop Core Configuration. These internal control weaknesses existed, at least in part, because certain cyber security roles and responsibilities were not clearly delineated. Program officials also had not effectively performed monitoring and review activities essential for evaluating the adequacy of cyber security performance. In some cases, officials had not ensured that weaknesses discovered during audits and other evaluations were recorded and tracked to resolution in the organizations' Plans of Action and Milestones. Our testing disclosed that about 39 p

  12. Independent Activity Report, Office of Secure Transportation...

    Broader source: Energy.gov (indexed) [DOE]

    Office of Secure Transportation - March 2011 Independent Activity Report, Office of Secure Transportation - March 2011 March 2011 Report for the Appropriateness of Revisions to the...

  13. Independent Oversight Evaluation, Office of Secure Transportation...

    Office of Environmental Management (EM)

    Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office...

  14. Independent Oversight Inspection, Office of Secure Transportation...

    Office of Environmental Management (EM)

    Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the...

  15. Security & Defense Licenses Available | Tech Transfer | ORNL

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...

  16. Homeland Security and Emergency Management Coordination (HSEMC...

    National Nuclear Security Administration (NNSA)

    Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

  17. Preliminary Notice of Violation, National Security Technologies...

    Office of Environmental Management (EM)

    Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 August 11,...

  18. Safety and Security Enforcement Process Overview

    Broader source: Energy.gov (indexed) [DOE]

    SAFETY AND SECURITY ENFORCEMENT PROCESS OVERVIEW August 2012 OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF HEALTH, SAFETY AND SECURITY U.S. DEPARTMENT OF ENERGY AUGUST 2012 DOE...

  19. Safety and Security Enforcement Coordinator Handbook

    Broader source: Energy.gov (indexed) [DOE]

    SAFETY AND SECURITY ENFORCEMENT COORDINATOR HANDBOOK August 2012 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy AUGUST 2012 DOE...

  20. Harold Washington Social Security Administration (SSA) Center...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

  1. National Securities Technologies _NSTec_ Livermore Operations...

    Broader source: Energy.gov (indexed) [DOE]

    National Nuclear Security Administration NRTL Nationally Recognized Testing Laboratory NSTec National Security Technologies, LLC NTS Nevada Test Site OSHA Occupational Safety and...

  2. Preliminary Notice of Violation, National Security Technologies...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    a Preliminary Notice of Violation (SEA-2014-02) to National Security Technologies, LLC (NSTec), for violations of Department of Energy's classified information security program...

  3. National Nuclear Security Administration Appropriation and Program...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    4 National Nuclear Security Administration Appropriation and Program Summary Tables Outyear Appropriation Summary Tables FY 2012 BUDGET TABLES National Nuclear Security...

  4. Independent Oversight Review, Nevada National Security Site,...

    Broader source: Energy.gov (indexed) [DOE]

    and Special Door Interlock systems at the Nevada National Security Site (NNSS) Device Assembly Facility (DAF). The NNSS DAF is operated by National Security Technologies, LLC...

  5. Automated Security Compliance Tool for the Cloud.

    E-Print Network [OSTI]

    Ullah, Kazi Wali

    2012-01-01T23:59:59.000Z

    ?? Security, especially security compliance, is a major concern that is slowing down the large scale adoption of cloud computing in the enterprise environment. Business… (more)

  6. Independent Oversight Activity Report, Nevada National Security...

    Office of Environmental Management (EM)

    Report, Nevada National Security Site - March 3-6, 2014 March 2014 Operational Awareness Oversight of the Nevada National Security Site HIAR NNSS-2014-03-03 This...

  7. SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...

    Broader source: Energy.gov (indexed) [DOE]

    COUNTRIES More Documents & Publications 2014 Headquarters Facilities Master Security Plan - Chapter 6, Foreign Interaction PSH-12-0117 - In the matter of Personnel Security...

  8. Extension of DOE Directive on Cyber Security

    Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

    2003-06-04T23:59:59.000Z

    DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

  9. On Cyber Security for Networked Control Systems

    E-Print Network [OSTI]

    Amin, Saurabh

    2011-01-01T23:59:59.000Z

    cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

  10. ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING...

    Broader source: Energy.gov (indexed) [DOE]

    8: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS Protection program records include the...

  11. Enforcement Letter, Consolidated Nuclear Security, LLC | Department...

    Energy Savers [EERE]

    security incidents involving the unclassified waste stream and discrepancies in the inventory of accountable nuclear material at DOE's Y-12 National Security Complex in Oak...

  12. Sinusoidal voltage controlled oscillators using operational transconductance amplifiers

    E-Print Network [OSTI]

    Hoyle Passano, Javier Joaquin

    1985-01-01T23:59:59.000Z

    SINUSOIDAI. VOLTAGE CONTROLLED OSCILLATORS I. SING OPERATIONAL TRANSCONDUCTANCE AMPLIFIERS A Thesis JAVIFB . IOAQUIN HOYI. K I'ASSANO Suhndtted to the Graduate College ol' 'I'exes A8cM University in partial fulfillment of the requirement... for the degree of MASTER OF SCIENCE May 1985 Major Subject: Electrical Engineering SINUSOIDAL VOLTAGE CONTROLLED OSCILLATORS USING OPERATIONAI, TRANSCONDUCTANCE AMPLIFIERS A Thesis by JAVIER JOAQUIN HOYLE PASSANO Approved as to style and content by: o...

  13. Image-line voltage controlled oscillators and grating antennas

    E-Print Network [OSTI]

    Kirk, Alexander MacDonald

    1991-01-01T23:59:59.000Z

    IMAGE-LINE VOLTAGE CONTROLLED OSCILLATORS AND GRATING ANTENNAS A Thesis by ALEXANDER MacDONALD KIRK Submitted to the Office of Graduate Studies of Texas ABM University in partial fulfillment of the requirements for the degree of MASTER... OF SCIENCE May 1991 Major Subject: Electrical Engineering IMAGE-LINE VOLTAGE CONTROLLED OSCILLATORS AND GRATING ANTENNAS A Thesis by ALEXANDER MacDONALD KIRK Approved as to style and content by: Kai Chang (Chair of Committee) Robert D. Nevels...

  14. Design issues for high voltage converters for ion engines

    SciTech Connect (OSTI)

    King, R.J.; Stuart, T.A. [Univ. of Toledo, OH (United States)

    1995-12-31T23:59:59.000Z

    A design strategy is presented for a power converter for a high voltage ion engine for a spacecraft application. Various design issues such as appropriate topologies and control methods are considered. In this particular instance it was determined that a full bridge converter with phase shift gating and voltage mode control provided an efficient system with a minimum of electromagnetic interference. This system can be implemented in a straightforward manner, and it is relatively easy to protect from faults at the output.

  15. LM111/LM211/LM311 Voltage Comparator

    E-Print Network [OSTI]

    Lanterman, Aaron

    LM111/LM211/LM311 Voltage Comparator 1.0 General Description The LM111, LM211 and LM311 are voltage comparators that have input currents nearly a thousand times lower than devices like the LM106 or LM710A. Both the inputs and the outputs of the LM111, LM211 or the LM311 can be isolated from system ground

  16. Measuring Helical FCG Voltage with an Electric Field Antenna

    SciTech Connect (OSTI)

    White, A D; Anderson, R A; Javedani, J B; Reisman, D B; Goerz, D A; Ferriera, A J; Speer, R D

    2011-08-01T23:59:59.000Z

    A method of measuring the voltage produced by a helical explosive flux compression generator using a remote electric field antenna is described in detail. The diagnostic has been successfully implemented on several experiments. Measured data from the diagnostic compare favorably with voltages predicted using the code CAGEN, validating our predictive modeling tools. The measured data is important to understanding generator performance, and is measured with a low-risk, minimally intrusive approach.

  17. Chloromethyl chlorosulfate as a voltage delay inhibitor in lithium cells

    DOE Patents [OSTI]

    Delnick, F.M.

    1993-04-13T23:59:59.000Z

    Chloromethyl chlorosulfate (CMCS) is used as a passive film growth inhibitor in electrochemical cells to minimize voltage delay and low-voltage discharge. Film growth on lithium anodes is significantly diminished when CMCS is added to SOCl[sub 2] and SO[sub 2]Cl[sub 2] electrolytes of lithium batteries. The CMCS also has the effect of extending the shelf-life of Li/SOCl[sub 2] and Li/SO[sub 2]Cl[sub 2] batteries.

  18. Chloromethyl chlorosulfate as a voltage delay inhibitor in lithium cells

    DOE Patents [OSTI]

    Delnick, Frank M. (Albuquerque, NM)

    1993-01-01T23:59:59.000Z

    Chloromethyl chlorosulfate (CMCS) is used as a passive film growth inhibitor in electrochemical cells to minimize voltage delay and low-voltage discharge. Film growth on lithium anodes is significantly diminished when CMCS is added to SOCl.sub.2 and SO.sub.2 Cl.sub.2 electrolytes of lithium batteries. The CMCS also has the effect of extending the shelf-life of Li/SOCl.sub.2 and Li/SO.sub.2 Cl.sub.2 batteries.

  19. STARS Training Needs Assessment Learner Instructions 07/2009 1 STARS Training Needs Assessment

    E-Print Network [OSTI]

    Ford, James

    STARS Training Needs Assessment Learner Instructions 07/2009 1 STARS Training Needs Assessment. · Click the STARS (Training) tab. · Click My Training Needs in the left menu. · Click the secure link to continue to My Training Needs. On the Training Needs Assessment page, click the box to the left of every

  20. Centralized wind power plant voltage control with optimal power flow algorithm.

    E-Print Network [OSTI]

    Kline, Jared Andrew

    2011-01-01T23:59:59.000Z

    ??This thesis presents a method of controlling the reactive power injected into a medium-voltage collection system by multiple wind turbine generators such that the voltage… (more)