Powered by Deep Web Technologies
Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Germany) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Germany Coordinates...

2

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Norway) Jump to: navigation, search Project Name AFTER A Framework for electrical power sysTems vulnerability identification, dEfense and Restoration Country Norway Coordinates...

3

A systems approach to the evaluation of Radio Frequency Identification (RFID) in the defense industry  

E-Print Network [OSTI]

Radio Frequency Identification (RFID) is a wireless technology with possible applications in the supply chain. RFID tags' fast read rates, non-line-of-sight identification and large storage capacity may revolutionize supply ...

Shah, Ronak R

2005-01-01T23:59:59.000Z

4

Plutonium Vulnerability Management Plan  

SciTech Connect (OSTI)

This Plutonium Vulnerability Management Plan describes the Department of Energy`s response to the vulnerabilities identified in the Plutonium Working Group Report which are a result of the cessation of nuclear weapons production. The responses contained in this document are only part of an overall, coordinated approach designed to enable the Department to accelerate conversion of all nuclear materials, including plutonium, to forms suitable for safe, interim storage. The overall actions being taken are discussed in detail in the Department`s Implementation Plan in response to the Defense Nuclear Facilities Safety Board (DNFSB) Recommendation 94-1. This is included as Attachment B.

NONE

1995-03-01T23:59:59.000Z

5

Defense Gallery  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Defense Gallery Inside the Museum Exhibitions Norris Bradbury Museum Lobby Defense Gallery Research Gallery History Gallery TechLab Virtual Exhibits invisible utility element...

6

Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs  

E-Print Network [OSTI]

Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven, without considering how they contribute to overall attack risk. Similarly, intrusion alarms are logged threats, complexity of security data, and network growth. Our approach to network defense applies attack

Noel, Steven

7

Doctoral Defense "Thermal-hydro-mechanical model  

E-Print Network [OSTI]

Doctoral Defense "Thermal-hydro-mechanical model for freezing and thawing soils" Yao Zhang Date & Environmental Engineering Frost susceptible soils are vulnerable to frost action in seasonal freezing as well and strengthening occurs as the soils freeze, whereas settlement and thaw weakening is expected during the melting

Kamat, Vineet R.

8

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS  

E-Print Network [OSTI]

ISS-011, Vulnerability Assessment Standard 1/3 UCIT INFORMATION SECURITY STANDARDS Vulnerability Assessment Standard Rationale 1 To enable timely identification and mitigation of vulnerabilities and security flaws affecting computing devices within UofC's computing environment. Scope 2 2.1 This standard

Habib, Ayman

9

Ecosystem Vulnerability Assessment - Patterns of Climate Change...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the Southwest Ecosystem Vulnerability Assessment - Patterns of Climate Change Vulnerability in the...

10

Energy vulnerability relationships  

SciTech Connect (OSTI)

The US consumption of crude oil resources has been a steadily growing indicator of the vitality and strength of the US economy. At the same time import diversity has also been a rapidly developing dimension of the import picture. In the early 1970`s, embargoes of crude oil from Organization of Producing and Exporting Countries (OPEC) created economic and political havoc due to a significant lack of diversity and a unique set of economic, political and domestic regulatory circumstances. The continued rise of imports has again led to concerns over the security of our crude oil resource but threats to this system must be considered in light of the diversity and current setting of imported oil. This report develops several important issues concerning vulnerability to the disruption of oil imports: (1) The Middle East is not the major supplier of oil to the United States, (2) The US is not vulnerable to having its entire import stream disrupted, (3) Even in stable countries, there exist vulnerabilities to disruption of the export stream of oil, (4) Vulnerability reduction requires a focus on international solutions, and (5) DOE program and policy development must reflect the requirements of the diverse supply. Does this increasing proportion of imported oil create a {open_quotes}dependence{close_quotes}? Does this increasing proportion of imported oil present a vulnerability to {open_quotes}price shocks{close_quotes} and the tremendous dislocations experienced during the 1970`s? Finally, what is the vulnerability of supply disruptions from the current sources of imported oil? If oil is considered to be a finite, rapidly depleting resource, then the answers to these questions must be {open_quotes}yes.{close_quotes} However, if the supply of oil is expanding, and not limited, then dependence is relative to regional supply sources.

Shaw, B.R.; Boesen, J.L.

1998-02-01T23:59:59.000Z

11

UNCLASSIFIHED DEFENSE DOCUMENTATION CENTER  

E-Print Network [OSTI]

UNCLASSIFIHED AD 463473 DEFENSE DOCUMENTATION CENTER FOR SCIENTIFIC AND TECHNICAL INFORMATION .... John Barton Head OR Analysis Group R. H. Krolick Manager Applied Science Laboratory Prepared for the .J

Block, Marco

12

Common Control System Vulnerability  

SciTech Connect (OSTI)

The Control Systems Security Program and other programs within the Idaho National Laboratory have discovered a vulnerability common to control systems in all sectors that allows an attacker to penetrate most control systems, spoof the operator, and gain full control of targeted system elements. This vulnerability has been identified on several systems that have been evaluated at INL, and in each case a 100% success rate of completing the attack paths that lead to full system compromise was observed. Since these systems are employed in multiple critical infrastructure sectors, this vulnerability is deemed common to control systems in all sectors. Modern control systems architectures can be considered analogous to today's information networks, and as such are usually approached by attackers using a common attack methodology to penetrate deeper and deeper into the network. This approach often is composed of several phases, including gaining access to the control network, reconnaissance, profiling of vulnerabilities, launching attacks, escalating privilege, maintaining access, and obscuring or removing information that indicates that an intruder was on the system. With irrefutable proof that an external attack can lead to a compromise of a computing resource on the organization's business local area network (LAN), access to the control network is usually considered the first phase in the attack plan. Once the attacker gains access to the control network through direct connections and/or the business LAN, the second phase of reconnaissance begins with traffic analysis within the control domain. Thus, the communications between the workstations and the field device controllers can be monitored and evaluated, allowing an attacker to capture, analyze, and evaluate the commands sent among the control equipment. Through manipulation of the communication protocols of control systems (a process generally referred to as ''reverse engineering''), an attacker can then map out the control system processes and functions. With the detailed knowledge of how the control data functions, as well as what computers and devices communicate using this data, the attacker can use a well known Man-in-the-Middle attack to perform malicious operations virtually undetected. The control systems assessment teams have used this method to gather enough information about the system to craft an attack that intercepts and changes the information flow between the end devices (controllers) and the human machine interface (HMI and/or workstation). Using this attack, the cyber assessment team has been able to demonstrate complete manipulation of devices in control systems while simultaneously modifying the data flowing back to the operator's console to give false information of the state of the system (known as ''spoofing''). This is a very effective technique for a control system attack because it allows the attacker to manipulate the system and the operator's situational awareness of the perceived system status. The three main elements of this attack technique are: (1) network reconnaissance and data gathering, (2) reverse engineering, and (3) the Man-in-the-Middle attack. The details of this attack technique and the mitigation techniques are discussed.

Trent Nelson

2005-12-01T23:59:59.000Z

13

U-174: Serendipity Unspecified SQL Injection Vulnerability |...  

Broader source: Energy.gov (indexed) [DOE]

4: Serendipity Unspecified SQL Injection Vulnerability U-174: Serendipity Unspecified SQL Injection Vulnerability May 22, 2012 - 7:00am Addthis PROBLEM: Serendipity Unspecified SQL...

14

Defense on the Move: Ant-Based Cyber Defense  

SciTech Connect (OSTI)

Many common cyber defenses (like firewalls and IDS) are as static as trench warfare allowing the attacker freedom to probe them at will. The concept of Moving Target Defense (MTD) adds dynamism to the defender side, but puts the systems to be defended themselves in motion, potentially at great cost to the defender. An alternative approach is a mobile resilient defense that removes attackers’ ability to rely on prior experience without requiring motion in the protected infrastructure itself. The defensive technology absorbs most of the cost of motion, is resilient to attack, and is unpredictable to attackers. The Ant-Based Cyber Defense (ABCD) is a mobile resilient defense providing a set of roaming, bio-inspired, digital-ant agents working with stationary agents in a hierarchy headed by a human supervisor. The ABCD approach provides a resilient, extensible, and flexible defense that can scale to large, multi-enterprise infrastructures like the smart electric grid.

Fink, Glenn A.; Haack, Jereme N.; McKinnon, Archibald D.; Fulp, Errin W.

2014-04-15T23:59:59.000Z

15

MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES,  

E-Print Network [OSTI]

MAPPING CLIMATE CHANGE EXPOSURES, VULNERABILITIES, AND ADAPTATION TO PUBLIC HEALTH RISKS's California Climate Change Center JULY 2012 CEC5002012041 Prepared for: California Energy Commission of California. #12; ii ABSTRACT This study reviewed first available frameworks for climate change adaptation

16

V-092: Pidgin Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities have been reported in Pidgin, which can be exploited by malicious people to manipulate certain data, cause a DoS (Denial of Service), and compromise a user's system.

17

Are Vulnerability Disclosure Deadlines Justified?  

SciTech Connect (OSTI)

Vulnerability research organizations Rapid7, Google Security team, and Zero Day Initiative recently imposed grace periods for public disclosure of vulnerabilities. The grace periods ranged from 45 to 182 days, after which disclosure might occur with or without an effective mitigation from the affected software vendor. At this time there is indirect evidence that the shorter grace periods of 45 and 60 days may not be practical. However, there is strong evidence that the recently announced Zero Day Initiative grace period of 182 days yields benefit in speeding up the patch creation process, and may be practical for many software products. Unfortunately, there is also evidence that the 182 day grace period results in more vulnerability announcements without an available patch.

Miles McQueen; Jason L. Wright; Lawrence Wellman

2011-09-01T23:59:59.000Z

18

CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND  

E-Print Network [OSTI]

CLIMATE CHANGE IMPACTS, VULNERABILITIES, AND ADAPTATION IN THE SAN FRANCISCO BAY AREA Commission's California Climate Change Center JULY 2012 CEC5002012071 Prepared for: California Energy, as well as projections of future changes in climate based on modeling studies using various plausible

19

T-565: Vulnerability in Microsoft Malware Protection Engine Could...  

Broader source: Energy.gov (indexed) [DOE]

5: Vulnerability in Microsoft Malware Protection Engine Could Allow Elevation of PrivilegeVulnerability T-565: Vulnerability in Microsoft Malware Protection Engine Could Allow...

20

Security & Defense Licenses Available | Tech Transfer | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Independent Activity Report, Defense Nuclear Facilities Safety...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Defense Nuclear Facilities Safety Board Public Meeting - October 2012 Independent Activity Report, Defense Nuclear Facilities Safety Board Public Meeting - October 2012 October...

22

The future of defense and technology  

SciTech Connect (OSTI)

This document provides an insight into the future of national defense and the impacts of utilizing technology for improved defensive postures. (FI)

Teller, E.

1991-01-10T23:59:59.000Z

23

Toward directed energy planetary defense  

E-Print Network [OSTI]

Asteroids and comets that cross Earth’s orbit pose a credible risk of impact, with potentially severe disturbances to Earth and society. We propose an orbital planetary defense system capable of heating the surface of ...

Lubin, Philip

24

Cybersecurity Your Best Defense Against  

E-Print Network [OSTI]

Online Corporate Cybersecurity Awareness Program Your Best Defense Against Cybersecurity Threats created a new, cutting edge Cybersecurity Awareness Training program to address these concerns. Our online and intelligence, and leading Fortune 500 information security functions. Center for Cybersecurity Training

Maryland, Baltimore County, University of

25

Climate Vulnerabilities | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to User Group and Userof aChristinaCliff joins EMSLClimate Vulnerabilities

26

Assessing the Security Vulnerabilities of Correctional Facilities  

SciTech Connect (OSTI)

The National Institute of Justice has tasked their Satellite Facility at Sandia National Laboratories and their Southeast Regional Technology Center in Charleston, South Carolina to devise new procedures and tools for helping correctional facilities to assess their security vulnerabilities. Thus, a team is visiting selected correctional facilities and performing vulnerability assessments. A vulnerability assessment helps to identi~ the easiest paths for inmate escape, for introduction of contraband such as drugs or weapons, for unexpected intrusion fi-om outside of the facility, and for the perpetration of violent acts on other inmates and correctional employees, In addition, the vulnerability assessment helps to quantify the security risks for the facility. From these initial assessments will come better procedures for performing vulnerability assessments in general at other correctional facilities, as well as the development of tools to assist with the performance of such vulnerability assessments.

Morrison, G.S.; Spencer, D.S.

1998-10-27T23:59:59.000Z

27

T-540: Sybase EAServer Multiple Vulnerabilities | Department...  

Broader source: Energy.gov (indexed) [DOE]

and Remote Directory Traversal Vulnerability issues. Addthis Related Articles T-647: PHP File Upload Bug May Let Remote Users Overwrite Files on the Target System U-198: IBM...

28

Assessing Climate Change Impacts, Vulnerability and Adaptation...  

Open Energy Info (EERE)

The Case of Pantabangan-Carranglan Watershed Jump to: navigation, search Name Assessing Climate Change Impacts, Vulnerability and Adaptation: The Case of Pantabangan-Carranglan...

29

Proliferation Vulnerability Red Team report  

SciTech Connect (OSTI)

This report is the product of a four-month independent technical assessment of potential proliferation vulnerabilities associated with the plutonium disposition alternatives currently under review by DOE/MD. The scope of this MD-chartered/Sandia-led study was limited to technical considerations that could reduce proliferation resistance during various stages of the disposition processes below the Stored Weapon/Spent Fuel standards. Both overt and covert threats from host nation and unauthorized parties were considered. The results of this study will be integrated with complementary work by others into an overall Nonproliferation and Arms Control Assessment in support of a Secretarial Record of Decision later this year for disposition of surplus U.S. weapons plutonium.

Hinton, J.P.; Barnard, R.W.; Bennett, D.E. [and others

1996-10-01T23:59:59.000Z

30

Detecting Network Vulnerabilities Through Graph Theoretical Methods  

E-Print Network [OSTI]

vulnerabilities in power networks is an important prob- lem, as even a small number of vulnerable connections can benchmark power networks. 1 Introduction The electric power grid network is susceptible to power outages northeast and Canada, which affected an estimated 50 million people, causing over $6 billion in damage

Geddes, Cameron Guy Robinson

31

SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS  

E-Print Network [OSTI]

SEISMIC VULNERABILITY ASSESSMENT USING AMBIENT VIBRATIONS: METHOD AND VALIDATION Clotaire Michel, France cmichel@obs.ujf-grenoble.fr Abstract Seismic vulnerability in wide areas is usually assessed like USA or Italy. France is a country with moderate seismicity so that it requires lower-cost methods

Paris-Sud XI, Université de

32

Doctoral Defense "Sustainable Wastewater Management  

E-Print Network [OSTI]

Doctoral Defense "Sustainable Wastewater Management: Modeling and Decision Strategies for Unused Medications and Wastewater Solids" Sherri Cook Date: May 22, 2014 Time: 11:00 AM Location: 2355 GGB Chair to help decision-makers evaluate new practices for sustainable wastewater management. To this end

Kamat, Vineet R.

33

Control Systems Cyber Security:Defense in Depth Strategies  

SciTech Connect (OSTI)

Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: Maintenance of various field devices, telemetry collection, and/or industrial-level process systems Access to facilities via remote data link or modem Public facing services for customer or corporate operations A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

David Kuipers; Mark Fabro

2006-05-01T23:59:59.000Z

34

Control Systems Cyber Security: Defense-in-Depth Strategies  

SciTech Connect (OSTI)

Information infrastructures across many public and private domains share several common attributes regarding IT deployments and data communications. This is particularly true in the control systems domain. A majority of the systems use robust architectures to enhance business and reduce costs by increasing the integration of external, business, and control system networks. However, multi-network integration strategies often lead to vulnerabilities that greatly reduce the security of an organization, and can expose mission-critical control systems to cyber threats. This document provides guidance and direction for developing ‘defense-in-depth’ strategies for organizations that use control system networks while maintaining a multi-tier information architecture that requires: • Maintenance of various field devices, telemetry collection, and/or industrial-level process systems • Access to facilities via remote data link or modem • Public facing services for customer or corporate operations • A robust business environment that requires connections among the control system domain, the external Internet, and other peer organizations.

Mark Fabro

2007-10-01T23:59:59.000Z

35

TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding  

E-Print Network [OSTI]

TESLA-Based Defense Against Pollution Attacks in P2P Systems with Network Coding Anh Le, Athina and time asymmetry (as in TESLA [1]) to provide source authentication for the detection scheme and non; pollution; detection; identification; TESLA; homomorphic MAC. I. INTRODUCTION Peer-to-peer (P2P) systems

Markopoulou, Athina

36

T-550: Apache Denial of Service Vulnerability | Department of...  

Broader source: Energy.gov (indexed) [DOE]

1.2.8 Multiple Vulnerabilities U-221: ISC BIND 9 DNSSEC Validation CVE-2012-3817 Denial of Service Vulnerability T-616: PHP Stream Component Remote Denial of Service Vulnerability...

37

Locating Climate Insecurity: Where Are the Most Vulnerable Places...  

Open Energy Info (EERE)

disasters, (2) household and community vulnerability, (3) governance and political violence, and (4) population density. Each of these areas of vulnerability was given...

38

V-090: Adobe Flash Player / AIR Multiple Vulnerabilities | Department...  

Broader source: Energy.gov (indexed) [DOE]

0: Adobe Flash Player AIR Multiple Vulnerabilities V-090: Adobe Flash Player AIR Multiple Vulnerabilities February 13, 2013 - 12:14am Addthis PROBLEM: Adobe Flash Player AIR...

39

aquifer contamination vulnerability: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

species vulnerability to climate and land use change: the case projections of likely impacts of global change to identify the most vulner- able species. We suggest an original...

40

Common Cyber Security Vulnerabilities Observed in Control System...  

Broader source: Energy.gov (indexed) [DOE]

Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program Common Cyber Security Vulnerabilities Observed in Control System Assessments by...

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

V-106: Citrix Access Gateway Unspecified Security Bypass Vulnerability March 7, 2013 - 6:00am Addthis PROBLEM: A vulnerability has been reported in Citrix Access Gateway...

42

Homeland Security and Defense Applications  

SciTech Connect (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2014-11-06T23:59:59.000Z

43

Homeland Security and Defense Applications  

ScienceCinema (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2015-01-09T23:59:59.000Z

44

CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR  

E-Print Network [OSTI]

CLIMATE VULNERABILITY AND ADAPTATION STUDY FOR CALIFORNIA Legal Analysis of Barriers's California Climate Change Center JULY 2012 CEC5002012019 Prepared for: California Energy Commission to that framework that would facilitate adaptation to climate change. Since such changes may be difficult

45

Cancer Vulnerabilities Unveiled by Genomic Loss  

E-Print Network [OSTI]

Due to genome instability, most cancers exhibit loss of regions containing tumor suppressor genes and collateral loss of other genes. To identify cancer-specific vulnerabilities that are the result of copy number losses, ...

Nijhawan, Deepak

46

defense  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Review of theOFFICE OF CIVILAMENDMENT OF0/%2A1/%2A2/%2A/%2A en

47

Dynamic defense workshop : from research to practice.  

SciTech Connect (OSTI)

On September 5th and 6th, 2012, the Dynamic Defense Workshop: From Research to Practice brought together researchers from academia, industry, and Sandia with the goals of increasing collaboration between Sandia National Laboratories and external organizations, de ning and un- derstanding dynamic, or moving target, defense concepts and directions, and gaining a greater understanding of the state of the art for dynamic defense. Through the workshop, we broadened and re ned our de nition and understanding, identi ed new approaches to inherent challenges, and de ned principles of dynamic defense. Half of the workshop was devoted to presentations of current state-of-the-art work. Presentation topics included areas such as the failure of current defenses, threats, techniques, goals of dynamic defense, theory, foundations of dynamic defense, future directions and open research questions related to dynamic defense. The remainder of the workshop was discussion, which was broken down into sessions on de ning challenges, applications to host or mobile environments, applications to enterprise network environments, exploring research and operational taxonomies, and determining how to apply scienti c rigor to and investigating the eld of dynamic defense.

Crosby, Sean Michael; Doak, Justin E.; Haas, Jason J.; Helinski, Ryan; Lamb, Christopher C.

2013-02-01T23:59:59.000Z

48

Foundations of a defense digital platform : business systems governance in the Department of Defense  

E-Print Network [OSTI]

In 2010, the United States Department of Defense (DoD) spent more than $35 billion on information systems development and sustainment, with nearly $7 billion to defense business systems investments alone. It is not surprising ...

Ziegler, Dustin P

2012-01-01T23:59:59.000Z

49

Enhancing Energy Infrastructure Resiliency and Addressing Vulnerabilities  

Broader source: Energy.gov [DOE]

Quadrennial Energy Review Task Force Secretariat and Energy Policy and Systems Analysis Staff, U. S. Department of Energy (DOE) Public Meeting on “Enhancing Resilience in Energy Infrastructure and Addressing Vulnerabilities” On Friday, April 11, 2014, at 10 a.m. in room HVC-215 of the U.S. Capitol, the Department of Energy (DOE), acting as the Secretariat for the Quadrennial Energy Review Task Force, will hold a public meeting to discuss and receive comments on issues related to the Quadrennial Energy Review (QER). The meeting will focus on infrastructure vulnerabilities related to the electricity, natural gas and petroleum transmission, storage and distribution systems (TS&D). The meeting will consist of two facilitated panels of experts on identifying and addressing vulnerabilities within the nation’s energy TS&D infrastructure. Following the panels, an opportunity will be provided for public comment via an open microphone session. The meeting will be livestreamed at energy.gov/live

50

Statistical identification  

E-Print Network [OSTI]

Statistical identification of critical, dependent and redundant articulators Veena D Singampalli of articulatory roles Evaluation by exhaustive search and trajectory generation Summary Statistical identification, Belgium #12;Statistical identification of critical, dependent and redundant articulators Veena D

Jackson, Philip JB

51

Statistical identification  

E-Print Network [OSTI]

Statistical identification of critical, dependent and redundant articulators Philip Jackson & Veena Statistical identification of critical, dependent and redundant articulators Philip Jackson & Veena Acoustics'08 Paris #12;Statistical identification of critical, dependent and redundant articulators Philip

Jackson, Philip JB

52

Research Associate Position Defense Analysis Department  

E-Print Network [OSTI]

in analyzing social network data as well as geospatial, temporal, and standard statistical analysis of largeResearch Associate Position Defense Analysis Department Naval Postgraduate School, Monterey, CA Research Associate The Department of Defense Analysis is home to the CORE (Common Operational Research

53

Water vulnerabilities for existing coal-fired power plants.  

SciTech Connect (OSTI)

This report was funded by the U.S. Department of Energy's (DOE's) National Energy Technology Laboratory (NETL) Existing Plants Research Program, which has an energy-water research effort that focuses on water use at power plants. This study complements the Existing Plants Research Program's overall research effort by evaluating water issues that could impact power plants. Water consumption by all users in the United States over the 2005-2030 time period is projected to increase by about 7% (from about 108 billion gallons per day [bgd] to about 115 bgd) (Elcock 2010). By contrast, water consumption by coal-fired power plants over this period is projected to increase by about 21% (from about 2.4 to about 2.9 bgd) (NETL 2009b). The high projected demand for water by power plants, which is expected to increase even further as carbon-capture equipment is installed, combined with decreasing freshwater supplies in many areas, suggests that certain coal-fired plants may be particularly vulnerable to potential water demand-supply conflicts. If not addressed, these conflicts could limit power generation and lead to power disruptions or increased consumer costs. The identification of existing coal-fired plants that are vulnerable to water demand and supply concerns, along with an analysis of information about their cooling systems and related characteristics, provides information to help focus future research and development (R&D) efforts to help ensure that coal-fired generation demands are met in a cost-effective manner that supports sustainable water use. This study identified coal-fired power plants that are considered vulnerable to water demand and supply issues by using a geographical information system (GIS) that facilitated the analysis of plant-specific data for more than 500 plants in the NETL's Coal Power Plant Database (CPPDB) (NETL 2007a) simultaneously with 18 indicators of water demand and supply. Two types of demand indicators were evaluated. The first type consisted of geographical areas where specific conditions can generate demand vulnerabilities. These conditions include high projected future water consumption by thermoelectric power plants, high projected future water consumption by all users, high rates of water withdrawal per square mile (mi{sup 2}), high projected population increases, and areas projected to be in a water crisis or conflict by 2025. The second type of demand indicator was plant specific. These indicators were developed for each plant and include annual water consumption and withdrawal rates and intensities, net annual power generation, and carbon dioxide (CO{sub 2}) emissions. The supply indictors, which are also area based, include areas with low precipitation, high temperatures, low streamflow, and drought. The indicator data, which were in various formats (e.g., maps, tables, raw numbers) were converted to a GIS format and stored, along with the individual plant data from the CPPDB, in a single GIS database. The GIS database allowed the indicator data and plant data to be analyzed and visualized in any combination. To determine the extent to which a plant would be considered 'vulnerable' to a given demand or supply concern (i.e., that the plant's operations could be affected by water shortages represented by a potential demand or supply indicator), criteria were developed to categorize vulnerability according to one of three types: major, moderate, or not vulnerable. Plants with at least two major demand indicator values and/or at least four moderate demand indicator values were considered vulnerable to demand concerns. By using this approach, 144 plants were identified as being subject to demand concerns only. Plants with at least one major supply indicator value and/or at least two moderate supply indicator values were considered vulnerable to supply concerns. By using this approach, 64 plants were identified as being subject to supply concerns only. In addition, 139 plants were identified as subject to both demand and supply concerns. Therefore, a total of 347 plants were considere

Elcock, D.; Kuiper, J.; Environmental Science Division

2010-08-19T23:59:59.000Z

54

Chemical Safety Vulnerability Working Group Report  

SciTech Connect (OSTI)

This report marks the culmination of a 4-month review conducted to identify chemical safety vulnerabilities existing at DOE facilities. This review is an integral part of DOE's efforts to raise its commitment to chemical safety to the same level as that for nuclear safety.

Not Available

1994-09-01T23:59:59.000Z

55

WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE  

E-Print Network [OSTI]

WATER AND ENERGY SECTOR VULNERABILITY TO CLIMATE WARMING IN THE SIERRA NEVADA: Water Year explores the sensitivity of water indexing methods to climate change scenarios to better understand how water management decisions and allocations will be affected by climate change. Many water management

56

Fragile Networks: Identifying Vulnerabilities and Synergies  

E-Print Network [OSTI]

, Efficiency Measurement, and Vulnerability Analysis · Part II: Applications and Extensions · Part III: Mergers the foundations for transportation and logistics, for communication, energy provision, social interactions that underlie our societies and economies are large-scale and complex in nature, they are liable to be faced

Nagurney, Anna

57

T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability  

Broader source: Energy.gov [DOE]

This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

58

Defense-in-Depth, How Department of Energy Implements Radiation...  

Broader source: Energy.gov (indexed) [DOE]

Defense-in-Depth, How Department of Energy Implements Radiation Protection in Low Level Waste Disposal Defense-in-Depth, How Department of Energy Implements Radiation Protection in...

59

Energy Department to Loan Emergency Fuel to Department of Defense...  

Office of Environmental Management (EM)

Loan Emergency Fuel to Department of Defense as Part of Hurricane Sandy Response Energy Department to Loan Emergency Fuel to Department of Defense as Part of Hurricane Sandy...

60

SciTech Connect: Sequential Threat Detection for Harbor Defense...  

Office of Scientific and Technical Information (OSTI)

Sequential Threat Detection for Harbor Defense: An X-ray Physics-Based Bayesian Approach Citation Details In-Document Search Title: Sequential Threat Detection for Harbor Defense:...

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

U-171: DeltaV Products Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities have been reported in DeltaV products, which can be exploited by malicious people to conduct cross-site scripting attacks, SQL injection attacks, cause a DoS (Denial of Service), and compromise a vulnerable system.

62

Power System Extreme Event Detection: The Vulnerability Frontier  

E-Print Network [OSTI]

Figure 6. Vulnerability Frontier for a 13,374 node system.corresponding to points on the frontier suggests that theseDetection: The Vulnerability Frontier Bernard C. Lesieutre

Lesieutre, Bernard C.; Pinar, Ali; Roy, Sandip

2007-01-01T23:59:59.000Z

63

U-013: HP Data Protector Multiple Unspecified Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities were reported in HP Data Protector. A remote user can execute arbitrary code on the target system.

64

Vendor System Vulnerability Testing Test Plan  

SciTech Connect (OSTI)

The Idaho National Laboratory (INL) prepared this generic test plan to provide clients (vendors, end users, program sponsors, etc.) with a sense of the scope and depth of vulnerability testing performed at the INL’s Supervisory Control and Data Acquisition (SCADA) Test Bed and to serve as an example of such a plan. Although this test plan specifically addresses vulnerability testing of systems applied to the energy sector (electric/power transmission and distribution and oil and gas systems), it is generic enough to be applied to control systems used in other critical infrastructures such as the transportation sector, water/waste water sector, or hazardous chemical production facilities. The SCADA Test Bed is established at the INL as a testing environment to evaluate the security vulnerabilities of SCADA systems, energy management systems (EMS), and distributed control systems. It now supports multiple programs sponsored by the U.S. Department of Energy, the U.S. Department of Homeland Security, other government agencies, and private sector clients. This particular test plan applies to testing conducted on a SCADA/EMS provided by a vendor. Before performing detailed vulnerability testing of a SCADA/EMS, an as delivered baseline examination of the system is conducted, to establish a starting point for all-subsequent testing. The series of baseline tests document factory delivered defaults, system configuration, and potential configuration changes to aid in the development of a security plan for in depth vulnerability testing. The baseline test document is provided to the System Provider,a who evaluates the baseline report and provides recommendations to the system configuration to enhance the security profile of the baseline system. Vulnerability testing is then conducted at the SCADA Test Bed, which provides an in-depth security analysis of the Vendor’s system.b a. The term System Provider replaces the name of the company/organization providing the system being evaluated. This can be the system manufacturer, a system user, or a third party organization such as a government agency. b. The term Vendor (or Vendor’s) System replaces the name of the specific SCADA/EMS being tested.

James R. Davidson

2005-01-01T23:59:59.000Z

65

Scanning the Technology Energy Infrastructure Defense Systems  

E-Print Network [OSTI]

systems and to develop de- fense plans to protect the network against extreme contingencies causedScanning the Technology Energy Infrastructure Defense Systems MASSOUD AMIN, SENIOR MEMBER, IEEE Energy infrastructure faced with deregulation and coupled with interdependencies with other critical

Amin, S. Massoud

66

A Dynamic Defense Force for Japan  

E-Print Network [OSTI]

Japan Self-Defense Forces (SDF). Along with the new NDPG,set a direction for the SDF in the post-9/11 inter- nationalsituation also requires the SDF take on these “dynamic”

TAKAHASHI, Sugio

2012-01-01T23:59:59.000Z

67

Defense programs beryllium good practice guide  

SciTech Connect (OSTI)

Within the DOE, it has recently become apparent that some contractor employees who have worked (or are currently working) with and around beryllium have developed chronic beryllium disease (CBD), an occupational granulomatous lung disorder. Respiratory exposure to aerosolized beryllium, in susceptible individuals, causes an immunological reaction that can result in granulomatous scarring of the lung parenchyma, shortness of breath, cough, fatigue, weight loss, and, ultimately, respiratory failure. Beryllium disease was originally identified in the 1940s, largely in the fluorescent light industry. In 1950, the Atomic Energy Commission (AEC) introduced strict exposure standards that generally curtailed both the acute and chronic forms of the disease. Beginning in 1984, with the identification of a CBD case in a DOE contractor worker, there was increased scrutiny of both industrial hygiene practices and individuals in this workforce. To date, over 100 additional cases of beryllium-specific sensitization and/or CBD have been identified. Thus, a disease previously thought to be largely eliminated by the adoption of permissible exposure standards 45 years ago is still a health risk in certain workforces. This good practice guide forms the basis of an acceptable program for controlling workplace exposure to beryllium. It provides (1) Guidance for minimizing worker exposure to beryllium in Defense Programs facilities during all phases of beryllium-related work, including the decontamination and decommissioning (D&D) of facilities. (2) Recommended controls to be applied to the handling of metallic beryllium and beryllium alloys, beryllium oxide, and other beryllium compounds. (3) Recommendations for medical monitoring and surveillance of workers exposed (or potentially exposed) to beryllium, based on the best current understanding of beryllium disease and medical diagnostic tests available. (4) Site-specific safety procedures for all processes of beryllium that is likely to generate dusts, mists, fumes, or small particulates. A beryllium exposure control program should minimize airborne concentrations, the potential for and spread of contamination, the number of times individuals are exposed to beryllium, and the number of employees who may be potentially exposed.

Herr, M.

1997-07-01T23:59:59.000Z

68

U-187: Adobe Flash Player Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Adobe released security updates for Adobe Flash Player 11.2.202.235 and earlier versions for Windows, Macintosh and Linux, Adobe Flash Player 11.1.115.8 and earlier versions for Android 4.x, and Adobe Flash Player 11.1.111.9 and earlier versions for Android 3.x and 2.x. These updates address vulnerabilities that could cause a crash and potentially allow an attacker to take control of the affected system.

69

Telescoping MATLAB for DSP Applications PhD Thesis Defense  

E-Print Network [OSTI]

Telescoping MATLAB for DSP Applications PhD Thesis Defense Arun Chauhan Computer Science, Rice University PhD Thesis Defense July 10, 2003 #12;Two True Stories PhD Thesis Defense: Telescoping MATLABD Thesis Defense: Telescoping MATLAB for DSP Applications July 10, 2003 #12;Two True Stories · the world

Chauhan, Arun

70

Risk Assessment Using The Homeland-Defense Operational Planning System (HOPS)  

SciTech Connect (OSTI)

The Homeland-Defense Operational Planning System (HOPS), is a new operational planning tool leveraging Lawrence Livermore National Laboratory's expertise in weapons systems and in sparse information analysis to support the defense of the U.S. homeland. HOPS provides planners with a basis to make decisions to protect against acts of terrorism, focusing on the defense of facilities critical to U.S. infrastructure. Criticality of facilities, structures, and systems is evaluated on a composite matrix of specific projected casualty, economic, and sociopolitical impact bins. Based on these criteria, significant unidentified vulnerabilities are identified and secured. To provide insight into potential successes by malevolent actors, HOPS analysts strive to base their efforts mainly on unclassified open-source data. However, more cooperation is needed between HOPS analysts and facility representatives to provide an advantage to those whose task is to defend these facilities. Evaluated facilities include: refineries, major ports, nuclear power plants and other nuclear licensees, dams, government installations, convention centers, sports stadiums, tourist venues, and public and freight transportation systems. A generalized summary of analyses of U.S. infrastructure facilities will be presented.

Price, D E; Durling, R L

2005-10-10T23:59:59.000Z

71

Social vulnerability indicators as a sustainable planning tool  

SciTech Connect (OSTI)

In the face of global warming and environmental change, the conventional strategy of resource centralization will not be able to cope with a future of increasingly extreme climate events and related disasters. It may even contribute to inter-regional disparities as a result of these events. To promote sustainable development, this study offers a case study of developmental planning in Chiayi, Taiwan and a review of the relevant literature to propose a framework of social vulnerability indicators at the township level. The proposed framework can not only be used to measure the social vulnerability of individual townships in Chiayi, but also be used to capture the spatial developmental of Chiayi. Seventeen social vulnerability indicators provide information in five dimensions. Owing to limited access to relevant data, the values of only 13 indicators were calculated. By simply summarizing indicators without using weightings and by using zero-mean normalization to standardize the indicators, this study calculates social vulnerability scores for each township. To make social vulnerability indicators more useful, this study performs an overlay analysis of social vulnerability and patterns of risk associated with national disasters. The social vulnerability analysis draws on secondary data for 2012 from Taiwan's National Geographic Information System. The second layer of analysis consists of the flood potential ratings of the Taiwan Water Resources Agency as an index of biophysical vulnerability. The third layer consists of township-level administrative boundaries. Analytical results reveal that four out of the 18 townships in Chiayi not only are vulnerable to large-scale flooding during serious flood events, but also have the highest degree of social vulnerability. Administrative boundaries, on which social vulnerability is based, do not correspond precisely to “cross-administrative boundaries,” which are characteristics of the natural environment. This study adopts an exploratory approach that provides Chiayi and other government agencies with a foundation for sustainable strategic planning for environmental change. The final section offers four suggestions concerning the implications of social vulnerability for local development planning. -- Highlights: • This study proposes a framework of social vulnerability indicators at the township level in Chiayi County, Taiwan. • Seventeen social vulnerability indicators are categorized into four dimensions. • This study performs a three-layer overlay analysis of social vulnerability and natural disaster risk patterns. • 4 out of the 18 townships not only have potential for large-scale flooding, but also high degree of social vulnerability. • This study provides a foundation for sustainable strategic planning to deal with environmental change. • Four suggestions are proposed regarding the implications of social vulnerability for local development planning.

Lee, Yung-Jaan, E-mail: yungjaanlee@gmail.com

2014-01-15T23:59:59.000Z

72

Evaluating operating system vulnerability to memory errors.  

SciTech Connect (OSTI)

Reliability is of great concern to the scalability of extreme-scale systems. Of particular concern are soft errors in main memory, which are a leading cause of failures on current systems and are predicted to be the leading cause on future systems. While great effort has gone into designing algorithms and applications that can continue to make progress in the presence of these errors without restarting, the most critical software running on a node, the operating system (OS), is currently left relatively unprotected. OS resiliency is of particular importance because, though this software typically represents a small footprint of a compute node's physical memory, recent studies show more memory errors in this region of memory than the remainder of the system. In this paper, we investigate the soft error vulnerability of two operating systems used in current and future high-performance computing systems: Kitten, the lightweight kernel developed at Sandia National Laboratories, and CLE, a high-performance Linux-based operating system developed by Cray. For each of these platforms, we outline major structures and subsystems that are vulnerable to soft errors and describe methods that could be used to reconstruct damaged state. Our results show the Kitten lightweight operating system may be an easier target to harden against memory errors due to its smaller memory footprint, largely deterministic state, and simpler system structure.

Ferreira, Kurt Brian; Bridges, Patrick G. (University of New Mexico); Pedretti, Kevin Thomas Tauke; Mueller, Frank (North Carolina State University); Fiala, David (North Carolina State University); Brightwell, Ronald Brian

2012-05-01T23:59:59.000Z

73

T-544: Cisco Security Advisory: Cisco Content Services Gateway Vulnerabilities  

Broader source: Energy.gov [DOE]

Cisco IOS Software Release 12.4(24)MD1 on the Cisco CSG2 contains two vulnerabilities that can be exploited by a remote, unauthenticated attacker to create a denial of service condition that prevents traffic from passing through the CSG2. These vulnerabilities require only a single content service to be active on the Cisco CSG2 and can be exploited via crafted TCP packets. A three-way handshake is not required to exploit either of these vulnerabilities.

74

India-Vulnerability Assessment and Enhancing Adaptive Capacities...  

Open Energy Info (EERE)

Adaptive Capacities to Climate Change Jump to: navigation, search Name India-Vulnerability Assessment and Enhancing Adaptive Capacities to Climate Change AgencyCompany...

75

Mapping Climate Change Vulnerability and Impact Scenarios - A...  

Open Energy Info (EERE)

Sub-national Planners Jump to: navigation, search Tool Summary LAUNCH TOOL Name: Mapping Climate Change Vulnerability and Impact Scenarios - A Guidebook for Sub-national Planners...

76

areas vulnerabilities impacts: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

on residential electricity consumption for the nine San Francisco Bay Area counties 22 Seismic vulnerability analysis of moderate seismicity areas using in situ experimental...

77

assessing infrastructure vulnerability: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Websites Summary: , by improving the seismic hazard evaluation using probabilistic seismic hazard assessment (PSHA) methodsSeismic vulnerability assessment to slight dam- age...

78

Microsoft Word - MitigationsForVulnerabilitiesInCSNetworks.doc  

Broader source: Energy.gov (indexed) [DOE]

for Security Vulnerabilities Found in Control System Networks May Permann John Hammer Computer Security Researcher Computer Security Researcher Communications & Cyber Security...

79

T-566: Citrix Secure Gateway Unspecified Vulnerability | Department...  

Broader source: Energy.gov (indexed) [DOE]

has been reported in Citrix Secure Gateway, which can be exploited by malicious people to compromise a vulnerable system. reference LINKS: Citrix ID:CTX128168 Secunia...

80

Antioch University and EPA Webinar: Assessing Vulnerability of...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Water Conveyance Infrastructure from a Changing Climate in the Context of a Changing Landscape Antioch University and EPA Webinar: Assessing Vulnerability of Water Conveyance...

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency planning of the energy grids and energy plants considering also the ICT systems used in...

82

U-086:Linux Kernel "/proc//mem" Privilege Escalation Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability has been discovered in the Linux Kernel, which can be exploited by malicious, local users to gain escalated privileges.

83

AFTER A Framework for electrical power sysTems vulnerability...  

Open Energy Info (EERE)

:"","inlineLabel":"","visitedicon":"" Display map Period 2011-2014 References EU Smart Grid Projects Map1 Overview AFTER addresses vulnerability evaluation and contingency...

84

Defense waste transportation: cost and logistics studies  

SciTech Connect (OSTI)

Transportation of nuclear wastes from defense programs is expected to significantly increase in the 1980s and 1990s as permanent waste disposal facilities come into operation. This report uses models of the defense waste transportation system to quantify potential transportation requirements for treated and untreated contact-handled transuranic (CH-TRU) wastes and high-level defense wastes (HLDW). Alternative waste management strategies in repository siting, waste retrieval and treatment, treatment facility siting, waste packaging and transportation system configurations were examined to determine their effect on transportation cost and hardware requirements. All cost estimates used 1980 costs. No adjustments were made for future changes in these costs relative to inflation. All costs are reported in 1980 dollars. If a single repository is used for defense wastes, transportation costs for CH-TRU waste currently in surface storage and similar wastes expected to be generated by the year 2000 were estimated to be 109 million dollars. Recovery and transport of the larger buried volumes of CH-TRU waste will increase CH-TRU waste transportation costs by a factor of 70. Emphasis of truck transportation and siting of multiple repositories would reduce CH-TRU transportation costs. Transportation of HLDW to repositories for 25 years beginning in 1997 is estimated to cost $229 M in 1980 costs and dollars. HLDW transportation costs could either increase or decrease with the selection of a final canister configuration. HLDW transportation costs are reduced when multiple repositories exist and emphasis is placed on truck transport.

Andrews, W.B.; Cole, B.M.; Engel, R.L.; Oylear, J.M.

1982-08-01T23:59:59.000Z

85

Method and tool for network vulnerability analysis  

DOE Patents [OSTI]

A computer system analysis tool and method that will allow for qualitative and quantitative assessment of security attributes and vulnerabilities in systems including computer networks. The invention is based on generation of attack graphs wherein each node represents a possible attack state and each edge represents a change in state caused by a single action taken by an attacker or unwitting assistant. Edges are weighted using metrics such as attacker effort, likelihood of attack success, or time to succeed. Generation of an attack graph is accomplished by matching information about attack requirements (specified in "attack templates") to information about computer system configuration (contained in a configuration file that can be updated to reflect system changes occurring during the course of an attack) and assumed attacker capabilities (reflected in "attacker profiles"). High risk attack paths, which correspond to those considered suited to application of attack countermeasures given limited resources for applying countermeasures, are identified by finding "epsilon optimal paths."

Swiler, Laura Painton (Albuquerque, NM); Phillips, Cynthia A. (Albuquerque, NM)

2006-03-14T23:59:59.000Z

86

Japan’s Approaches to DefenseTransparency: Perspectivesfrom the Japanese and Chinese Defense Establishments  

E-Print Network [OSTI]

Japanese Self Defense Forces (SDF). Features of the Japaneseissues arise—such as the deployment of the SDF forces toIraq or Maritime SDF to the In- dian Ocean—an ad hoc

Fei, John

2012-01-01T23:59:59.000Z

87

Japan’s Defense White Paper as a Tool for Promoting Defense Transparency  

E-Print Network [OSTI]

and activities of the MOD/SDF (Part III). It is one of theof the Self-Defense Forces (SDF) came to be in- cluded inits coverage to include the SDF’s disaster respons- es and

SUKEGAWA, Yasushi

2012-01-01T23:59:59.000Z

88

Northwest Energy Coalition Renewable Northwest Project Natural Resources Defense Council  

E-Print Network [OSTI]

Northwest Energy Coalition Renewable Northwest Project Natural Resources Defense Council December 9 Coalition [Nancy Hirsh] Renewable Northwest Project[Rachel Shimshak] Natural Resources Defense Council Power Administration in Power Supply The Northwest Energy Coalition, Renewable Northwest Project, Sierra

89

Enterprise Security Planning with Department of Defense Architecture Framework (DODAF)  

E-Print Network [OSTI]

Enterprise Security Planning with Department of Defense Architecture Framework (DODAF) L. Ertaul1 as its application in dealing with enterprise security planning related issues. Keywords: Enterprise Architecture Frameworks, DoDAF, Enterprise Security Planning 1 . Introduction The Department of Defense

Ertaull, Levent

90

An alternative to present United States defense strategy  

E-Print Network [OSTI]

- hower. Secretary of Defense McNamara adopted this strategio nuclear defense policy because the Dulles policy included brinkmanship, and did. not contain any flexibility in response. The McNamara plan was based on controlled escalation and response...

Anthony, William Wallace

1971-01-01T23:59:59.000Z

91

A cognitive and economic decision theory for examining cyber defense strategies.  

SciTech Connect (OSTI)

Cyber attacks pose a major threat to modern organizations. Little is known about the social aspects of decision making among organizations that face cyber threats, nor do we have empirically-grounded models of the dynamics of cooperative behavior among vulnerable organizations. The effectiveness of cyber defense can likely be enhanced if information and resources are shared among organizations that face similar threats. Three models were created to begin to understand the cognitive and social aspects of cyber cooperation. The first simulated a cooperative cyber security program between two organizations. The second focused on a cyber security training program in which participants interact (and potentially cooperate) to solve problems. The third built upon the first two models and simulates cooperation between organizations in an information-sharing program.

Bier, Asmeret Brooke

2014-01-01T23:59:59.000Z

92

2011 Annual Planning Summary for Defense Nuclear Nonproliferation (NA-20)  

Broader source: Energy.gov [DOE]

The ongoing and projected Environmental Assessments and Environmental Impact Statements for 2011 and 2012 within Defense Nuclear Nonproliferation (NA-20).

93

T-616: PHP Stream Component Remote Denial of Service Vulnerability  

Broader source: Energy.gov [DOE]

PHP is prone to a remote denial-of-service vulnerability because the proxy server fails to handle certain FTP requests. An attacker can exploit this issue to crash the affected application, denying service to legitimate users. Versions prior to PHP 5.3.6 are vulnerable.

94

Overview of Space Business Space & Integrated Defense Systems  

E-Print Network [OSTI]

Overview of Space Business Space & Integrated Defense Systems Mitsubishi Corporation August 26 in Rio de Janeiro and Belo Horizonte #12;MC's Space Business Involved with aerospace business more than 40 years, covering civil/commercial space business, defense related space business and defense

95

Analyses Of Two End-User Software Vulnerability Exposure Metrics  

SciTech Connect (OSTI)

The risk due to software vulnerabilities will not be completely resolved in the near future. Instead, putting reliable vulnerability measures into the hands of end-users so that informed decisions can be made regarding the relative security exposure incurred by choosing one software package over another is of importance. To that end, we propose two new security metrics, average active vulnerabilities (AAV) and vulnerability free days (VFD). These metrics capture both the speed with which new vulnerabilities are reported to vendors and the rate at which software vendors fix them. We then examine how the metrics are computed using currently available datasets and demonstrate their estimation in a simulation experiment using four different browsers as a case study. Finally, we discuss how the metrics may be used by the various stakeholders of software and to software usage decisions.

Jason L. Wright; Miles McQueen; Lawrence Wellman

2012-08-01T23:59:59.000Z

96

Benjamin Livshits and Monica S. Lam 1. PHPList Admin Page SQL Injection Vulnerability  

E-Print Network [OSTI]

Escalation Vulnerability 8. Vim ModeLines Further Variant Arbitrary Command Execution Vulnerability 9. Zlib Local Race Condition Privilege Escalation Vulnerability 8. Vim ModeLines Further Variant Arbitrary

Livshits, Ben

97

EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE VULNERABILITY TO CLIMATE CHANGE: AN APPLICATION OF  

E-Print Network [OSTI]

EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE VULNERABILITY TO CLIMATE CHANGE development aid is more effective in reducing vulnerability than is emission abatement. The hypothesis, vulnerability, adaptive capacity, development #12;EMISSION ABATEMENT VERSUS DEVELOPMENT AS STRATEGIES TO REDUCE

98

ARM - Defensive Shotgun - Remington 870 Operator's Guide  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcal Documentation DataDatastreamswacrspeccmaskcopolDatastreamsxsacrslrAlaskaDefensive Shotgun - Remington 870

99

Rock mechanics contributions from defense programs  

SciTech Connect (OSTI)

An attempt is made at illustrating the many contributions to rock mechanics from US defense programs, over the past 30-plus years. Large advances have been achieved in the technology-base area covering instrumentation, material properties, physical modeling, constitutive relations and numerical simulations. In the applications field, much progress has been made in understanding and being able to predict rock mass behavior related to underground explosions, cratering, projectile penetration, and defense nuclear waste storage. All these activities stand on their own merit as benefits to national security. But their impact is even broader, because they have found widespread applications in the non-defense sector; to name a few: the prediction of the response of underground structures to major earthquakes, the physics of the earth`s interior at great depths, instrumentation for monitoring mine blasting, thermo-mechanical instrumentation useful for civilian nuclear waste repositories, dynamic properties of earthquake faults, and transient large-strain numerical modeling of geological processes, such as diapirism. There is not pretense that this summary is exhaustive. It is meant to highlight success stories representative of DOE and DOD geotechnical activities, and to point to remaining challenges.

Heuze, F.E.

1992-02-01T23:59:59.000Z

100

U-097: PHP "php_register_variable_ex()" Code Execution Vulnerability...  

Broader source: Energy.gov (indexed) [DOE]

097: PHP "phpregistervariableex()" Code Execution Vulnerability U-097: PHP "phpregistervariableex()" Code Execution Vulnerability February 7, 2012 - 9:00am Addthis PROBLEM:...

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

U-157: Ruby Mail Gem Directory Traversal and Shell Command Injection Vulnerabilities  

Broader source: Energy.gov [DOE]

Some vulnerabilities have been reported in the Mail gem for Ruby, which can be exploited by malicious people to manipulate certain data and compromise a vulnerable system.

102

E-Print Network 3.0 - attitudes perceived vulnerability Sample...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

vulnerability Page: << < 1 2 3 4 5 > >> 1 ORIGINAL ARTICLE Perceived Stress and Cognitive Vulnerability Mediate the Summary: ORIGINAL ARTICLE Perceived Stress and Cognitive...

103

T-543: Wireshark 0.8.20 through 1.2.8 Multiple Vulnerabilities...  

Broader source: Energy.gov (indexed) [DOE]

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities U-202: Apple QuickTime Multiple Stack Overflow Vulnerabilities U-207: Pidgin 'mxitshowmessage()'...

104

Automated Vulnerability Detection for Compiled Smart Grid Software  

SciTech Connect (OSTI)

While testing performed with proper experimental controls can provide scientifically quantifiable evidence that software does not contain unintentional vulnerabilities (bugs), it is insufficient to show that intentional vulnerabilities exist, and impractical to certify devices for the expected long lifetimes of use. For both of these needs, rigorous analysis of the software itself is essential. Automated software behavior computation applies rigorous static software analysis methods based on function extraction (FX) to compiled software to detect vulnerabilities, intentional or unintentional, and to verify critical functionality. This analysis is based on the compiled firmware, takes into account machine precision, and does not rely on heuristics or approximations early in the analysis.

Prowell, Stacy J [ORNL; Pleszkoch, Mark G [ORNL; Sayre, Kirk D [ORNL; Linger, Richard C [ORNL

2012-01-01T23:59:59.000Z

105

V-096: Mozilla Thunderbird / SeaMonkey Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

A weakness and multiple vulnerabilities have been reported in Mozilla Thunderbird and SeaMonkey, which can be exploited by malicious people to disclose potentially sensitive information, conduct spoofing attacks, bypass certain security restrictions, and compromise a user's system.

106

Vulnerability and social risk management in India and Mexico  

E-Print Network [OSTI]

The development of effective community, regional and national risk-management strategies, especially for systemic risks, such as natural disasters, entails understanding the determinants of social vulnerability in individuals ...

Flores Ballesteros, Luis

2008-01-01T23:59:59.000Z

107

Chemical-Terrorism Vulnerability Information Guidance Document January 7, 2011  

E-Print Network [OSTI]

.215; Not currently applicable (2) Site Security Plans under §27.225; Not currently applicable (3) Documents relating to the Department's review and approval of Security Vulnerability Assessments and Site Security Plans, including

Pawlowski, Wojtek

108

Assessing the vulnerability of the fiber infrastructure to disasters  

E-Print Network [OSTI]

Communication networks are vulnerable to natural disasters, such as earthquakes or floods, as well as to physical attacks, such as an Electromagnetic Pulse (EMP) attack. Such real- world events happen in specific geographical ...

Neumayer, Sebastian James

109

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications  

E-Print Network [OSTI]

Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

Sabatini, David M.

110

Assessing node risk and vulnerability in epidemics on networks  

E-Print Network [OSTI]

Which nodes are most vulnerable to an epidemic spreading through a network, and which carry the highest risk of causing a major outbreak if they are the source of the infection? Here we show how these questions can be answered to good approximation using the cavity method. Several curious properties of node vulnerability and risk are explored: some nodes are more vulnerable than others to weaker infections, yet less vulnerable to stronger ones; a node is always more likely to be caught in an outbreak than it is to start one, except when the disease has a deterministic lifetime; the rank order of node risk depends on the details of the distribution of infectious periods.

Rogers, Tim

2015-01-01T23:59:59.000Z

111

Toward a defense-dominated world  

SciTech Connect (OSTI)

Maintaining the large-scale peace in a defense-dominated world necessarily will require not only passive but also active defenses against large-scale aggression that are technically feasible, practical and easy to employ -- and robust against perversion into support of aggression. Such peace maintenance tool-sets will feature means for effectively rebuking aggression as well as providing timely and very widely available seaming of aggression underway anywhere. This report discusses the technology base which currently exists to provide world-wide, high-quality imagery at moderate (5--10 meter) spatial resolution or imagery of 1% of the Earth`s land surface at high ({le} 1 meter) resolution no less frequently than daily, at a total cost of the order of $1 B, with operational capability in the later `90s. Such systems could provide timely warning of aggressive actions anywhere. Similarly, space-based means of defeating aggression conducted with even quite short-range ballistic missiles anywhere in the world could be brought into existence by the end of the `90s for a total cost of about $10 B, and small high-altitude, long flight-duration robotic aircraft carrying high-performance sensors and interceptor missilery could provide both seaming and active defenses against attacks conducted with very short range ballistic missiles, as well as attacks launched with air-breathing threats such as bombers and cruise missiles, for a cost per defended area of the order of $10/km{sup 2}. It appears that all of the associated sensors can find apt dual-use as high-performance systems for monitoring physical aspects of the human environment.

Wood, L.

1993-08-01T23:59:59.000Z

112

Conceptual waste package interim product specifications and data requirements for disposal of borosilicate glass defense high-level waste forms in salt geologic repositories  

SciTech Connect (OSTI)

The conceptual waste package interim product specifications and data requirements presented are applicable specifically to the normal borosilicate glass product of the Defense Waste Processing Facility (DWPF). They provide preliminary numerical values for the defense high-level waste form parameters and properties identified in the waste form performance specification for geologic isolation in salt repositories. Subject areas treated include containment and isolation, operational period safety, criticality control, waste form/production canister identification, and waste package performance testing requirements. This document was generated for use in the development of conceptual waste package designs in salt. It will be revised as additional data, analyses, and regulatory requirements become available.

Not Available

1983-06-01T23:59:59.000Z

113

DOE weapons laboratories' contributions to the nation's defense technology base  

SciTech Connect (OSTI)

The question of how the Department of Energy (DOE) weapons laboratories can contribute to a stronger defense technology base is addressed in testimony before the Subcommittee on Defense Industry and Technology of the Senate Armed Services Committee. The importance of the defense technology base is described, the DOE technology base is also described, and some technology base management and institutional issues are discussed. Suggestions are given for promoting a more stable, long-term relationship between the DOE weapons laboratories and the Department of Defense. 12 refs., 2 figs.

Hecker, S.S.

1988-04-01T23:59:59.000Z

114

Defense, Interior Departments Pursue Renewable Energy on Federal...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

lands that are set aside for defense-related purposes, and on other onshore and offshore areas near military installations. The MOU establishes the Renewable Energy...

115

Y-12 Successfully Meets and Exceeds Defense Programs Goals During...  

National Nuclear Security Administration (NNSA)

Home Field Offices Welcome to the NNSA Production Office NPO News Releases Y-12 Successfully Meets and Exceeds Defense Programs ... Y-12 Successfully Meets and Exceeds...

116

Legacy Management Work Progresses on Defense-Related Uranium...  

Broader source: Energy.gov (indexed) [DOE]

Most recently, LM visited 84 defense-related legacy uranium mine sites located within 11 uranium mining districts in 6 western states. At these sites, photographs and global...

117

antimicrobial host defense: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

and to sustain a healthy pregnancy 2. Recent of these defenses by pathogens can lead to pregnancy complications such as preterm labor or vertical transmission Bakardjiev,...

118

China's Evolving Defense Economy: A PLA Ground Force Perspective  

E-Print Network [OSTI]

s Evolving Defense Economy: A PLA Ground Force PerspectivePeople’s Liberation Army (PLA) doctrinal developments,modernization of the PLA ground forces have incrementally

COOPER, Cortez A.

2013-01-01T23:59:59.000Z

119

Energy and Defense Departments Announce Agreement to Enhance...  

Office of Environmental Management (EM)

Agreement to Enhance Cooperation on Clean Energy and Strengthen Energy Security Energy and Defense Departments Announce Agreement to Enhance Cooperation on Clean Energy and...

120

Climate variability and climate change vulnerability and adaptation. Workshop summary  

SciTech Connect (OSTI)

Representatives from fifteen countries met in Prague, Czech Republic, on September 11-15, 1995, to share results from the analysis of vulnerability and adaptation to global climate change. The workshop focused on the issues of global climate change and its impacts on various sectors of a national economy. The U.N. Framework Convention on Climate Change (FCCC), which has been signed by more than 150 governments worldwide, calls on signatory parties to develop and communicate measures they are implementing to respond to global climate change. An analysis of a country`s vulnerability to changes in the climate helps it identify suitable adaptation measures. These analyses are designed to determine the extent of the impacts of global climate change on sensitive sectors such as agricultural crops, forests, grasslands and livestock, water resources, and coastal areas. Once it is determined how vulnerable a country may be to climate change, it is possible to identify adaptation measures for ameliorating some or all of the effects.The objectives of the vulnerability and adaptation workshop were to: The objectives of the vulnerability and adaptation workshop were to: Provide an opportunity for countries to describe their study results; Encourage countries to learn from the experience of the more complete assessments and adjust their studies accordingly; Identify issues and analyses that require further investigation; and Summarize results and experiences for governmental and intergovernmental organizations.

Bhatti, N.; Cirillo, R.R. [Argonne National Lab., IL (United States); Dixon, R.K. [U.S. Country Studies Program, Washington, DC (United States)] [and others

1995-12-31T23:59:59.000Z

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

EIS-0082: Defense Waste Processing Facility, Savannah River Plant  

Broader source: Energy.gov [DOE]

The Office of Defense Waste and Byproducts Management developed this EIS to provide environmental input into both the selection of an appropriate strategy for the permanent disposal of the high-level radioactive waste currently stored at the Savannah River Plant (SRP) and the subsequent decision to construct and operate a Defense Waste Processing Facility at the SRP site.

122

Deception used for Cyber Defense of Control Systems  

SciTech Connect (OSTI)

Control system cyber security defense mechanisms may employ deception to make it more difficult for attackers to plan and execute successful attacks. These deceptive defense mechanisms are organized and initially explored according to a specific deception taxonomy and the seven abstract dimensions of security previously proposed as a framework for the cyber security of control systems.

Wayne F. Boyer; Miles A. McQueen

2009-05-01T23:59:59.000Z

123

History of Hanford Site Defense Production (Brief)  

SciTech Connect (OSTI)

This paper acquaints the audience with the history of the Hanford Site, America's first full-scale defense plutonium production site. The paper includes the founding and basic operating history of the Hanford Site, including World War II construction and operations, three major postwar expansions (1947-55), the peak years of production (1956-63), production phase downs (1964-the present), a brief production spurt from 1984-86, the end of the Cold War, and the beginning of the waste cleanup mission. The paper also delineates historical waste practices and policies as they changed over the years at the Hanford Site, past efforts to chemically treat, ''fractionate,'' and/or immobilize Hanford's wastes, and resulting major waste legacies that remain today. This paper presents original, primary-source research into the waste history of the Hanford Site. Finally, the paper places the current Hanford Site waste remediation endeavors in the broad context of American and world history.

GERBER, M S

2001-02-01T23:59:59.000Z

124

Building Stakeholder Trust: Defensible Government Decisions - 13110  

SciTech Connect (OSTI)

Administrative decisions must be grounded in reasonable expectations, founded on sound principles, and bounded by societal norms. Without these first principles, attaining and retaining public trust is a Herculean task. Decisions made by governmental administrators must be both transparent and defensible: without the former the agency will lose the public's trust and support (possibly prompting a legal challenge to the decision) and without the latter the decision may fail to withstand judicial scrutiny. This presentation and accompanying paper delves into the process by which governmental decisions can achieve both defensibility and openness through building stakeholder trust with transparency. Achieving and maintaining stakeholder trust is crucial, especially in the environs of nuclear waste management. Proving confidence, stability, and security to the surrounding citizenry as well as those throughout the country is the goal of governmental nuclear waste remediation. Guiding administrative decision-making processes and maintaining a broad bandwidth of communication are of incalculable importance to all those charged with serving the public, but are especially essential to those whose decisional impacts will be felt for millennia. A strong, clear, and concise administrative record documenting discrete decisions and overarching policy choices is the strongest defense to a decisional challenge. However, this can be accomplished using transparency as the fundamental building block. This documentation allows the decision-makers to demonstrate the synthesis of legal and technical challenges and fortifies the ground from which challenges will be defended when necessary. Further, administrative actions which capture the public's interest and captivate that interest throughout the process will result in a better-informed, more deeply-involved, and more heavily-invested group of interested parties. Management of information, involvement, and investment on the front-end of the process reaps rewards far more efficiently than attempts to assuage and mitigate the concerns of those parties after the fact and there are a number of tools Savannah River Remediation (SRR) has deployed that render transparency an ally in this context. The makers, applicators, and beneficiaries of policies and decisions will all benefit from strong administrative records which document decisional choices in an open and transparent manner and from timely, up-front management of concerns of interested parties. The strongest defense to decisional challenges is an ability to demonstrate the basis of the decision and the reason(s) that the decision was chosen over other alternatives. Providing a sound basis for defending challenges rather than avoiding or fighting over them allows the deciding entity the greatest opportunity to produce value for its customer. Often, a transparent process that invites public participation and is open for public review and comment will thwart challenge genesis. An entity that has to devote resources to defending its choices obviously cannot utilize those resources to further its mission. (authors)

Franklin, Victor A. [Savannah River Remediation LLC, Bldg. 705-1C, Aiken, SC 29808 (United States)] [Savannah River Remediation LLC, Bldg. 705-1C, Aiken, SC 29808 (United States)

2013-07-01T23:59:59.000Z

125

Second Line of Defense Spares Program Assessment  

SciTech Connect (OSTI)

The Office of the Second Line of Defense (SLD) is part of the Department of Energy‘s (DOE) National Nuclear Security Administration (NNSA). The SLD Program accomplishes its critical global security mission by forming cooperative relationships with partner countries to install passive radiation detection systems that augment traditional inspection and law enforcement measures by alerting border officials to the presence of special nuclear or other radiological materials in cross-border traffic. An important tenet of the program is to work collaboratively with these countries to establish the necessary processes, procedures, infrastructure and conditions that will enable them to fully assume the financial and technical responsibilities for operating the equipment. As the number of operational deployments grows, the SLD Program faces an increasingly complex logistics process to promote the timely and efficient supply of spare parts.

Henderson, Dale L.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.

2012-11-20T23:59:59.000Z

126

Chemical Safety Vulnerability Working Group report. Volume 1  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains the Executive summary; Introduction; Summary of vulnerabilities; Management systems weaknesses; Commendable practices; Summary of management response plan; Conclusions; and a Glossary of chemical terms.

Not Available

1994-09-01T23:59:59.000Z

127

Next Generation Nuclear Plant Defense-in-Depth Approach  

SciTech Connect (OSTI)

The purpose of this paper is to (1) document the definition of defense-in-depth and the pproach that will be used to assure that its principles are satisfied for the NGNP project and (2) identify the specific questions proposed for preapplication discussions with the NRC. Defense-in-depth is a safety philosophy in which multiple lines of defense and conservative design and evaluation methods are applied to assure the safety of the public. The philosophy is also intended to deliver a design that is tolerant to uncertainties in knowledge of plant behavior, component reliability or operator performance that might compromise safety. This paper includes a review of the regulatory foundation for defense-in-depth, a definition of defense-in-depth that is appropriate for advanced reactor designs based on High Temperature Gas-cooled Reactor (HTGR) technology, and an explanation of how this safety philosophy is achieved in the NGNP.

Edward G. Wallace; Karl N. Fleming; Edward M. Burns

2009-12-01T23:59:59.000Z

128

Vulnerability Analysis Considerations for the Transportation of Special Nuclear Material  

SciTech Connect (OSTI)

The vulnerability analysis methodology developed for fixed nuclear material sites has proven to be extremely effective in assessing associated transportation issues. The basic methods and techniques used are directly applicable to conducting a transportation vulnerability analysis. The purpose of this paper is to illustrate that the same physical protection elements (detection, delay, and response) are present, although the response force plays a dominant role in preventing the theft or sabotage of material. Transportation systems are continuously exposed to the general public whereas the fixed site location by its very nature restricts general public access.

Nicholson, Lary G.; Purvis, James W.

1999-07-21T23:59:59.000Z

129

Contemporary Chinese Defense Industry Reforms and Civil–Military Integration in Three Key Organizations  

E-Print Network [OSTI]

in the defense industries and PLA defense research; and 3)standards organizations in the PLA, the defense industries,innovation throughout the PLA; that is, if the post-2007

Francis, Ed; Puska, Susan M

2010-01-01T23:59:59.000Z

130

Thesis Defense: Faculty advisor The thesis defense is the culmination of completing course work, laboratory research and  

E-Print Network [OSTI]

1 Thesis Defense: Faculty advisor The thesis defense is the culmination of completing course work of the student and of the advisor in these steps. Below is a brief table of what we have seen commonly being/or clear communication between the student, faculty advisor, and thesis advisory committee about degree

Sheridan, Jennifer

131

E-Print Network 3.0 - antioxidant defense enzymes Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for: antioxidant defense enzymes Page: << < 1 2 3 4 5 > >> 1 Journal of Thermal Biology 32 (2007) 227234 Oxidative stress and antioxidant defense responses by goldfish...

132

E-Print Network 3.0 - air defenses j-sead Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Summary: Distribution Warehouses z Defense Depotsp - Defense Logistics Agency Air Products & Chemicals, Inc., 2009 12... p Hydrogen Fuel forHydrogen Fuel for Material Handling...

133

PINS Testing and Modification for Explosive Identification  

SciTech Connect (OSTI)

The INL's Portable Isotopic Neutron Spectroscopy System (PINS)1 non-intrusively identifies the chemical fill of munitions and sealed containers. PINS is used routinely by the U.S. Army, the Defense Threat Reduction Agency, and foreign military units to determine the contents of munitions and other containers suspected to contain explosives, smoke-generating chemicals, and chemical warfare agents such as mustard and nerve gas. The objects assayed with PINS range from softball-sized M139 chemical bomblets to 200 gallon DOT 500X ton containers. INL had previously examined2 the feasibility of using a similar system for the identification of explosives, and based on this proof-of-principle test, the development of a dedicated system for the identification of explosives in an improvised nuclear device appears entirely feasible. INL has been tasked by NNSA NA-42 Render Safe Research and Development with the development of such a system.

E.H. Seabury; A.J. Caffrey

2011-09-01T23:59:59.000Z

134

Experimental Investigation of Microwave Vulnerabilities in CMOS Inverters  

E-Print Network [OSTI]

Experimental Investigation of Microwave Vulnerabilities in CMOS Inverters Agis A. Iliadis effects on single CMOS inverters, the fundamental building block of logic ICs, consisting of an NMOS and a PMOS transistor. The inverters were designed in our group and fabricated in the AMI-1.5µm MOSIS line

Anlage, Steven

135

Climate Change: Conflict, Security and Vulnerability Professor of Climate Change  

E-Print Network [OSTI]

Climate Change: Conflict, Security and Vulnerability Mike Hulme Professor of Climate Change Science, Society and Sustainability Group School of Environmental Sciences Rethinking Climate Change, Conflict security" "increase risk of conflicts among and within nations" #12;· from `climatic change' to `climate-change

Hulme, Mike

136

NV: Nessus Vulnerability Visualization for the Web Lane Harrison  

E-Print Network [OSTI]

NV: Nessus Vulnerability Visualization for the Web Lane Harrison Oak Ridge National Laboratory Oak Ridge TN, USA harrisonlt@ornl.gov Riley Spahn Oak Ridge National Laboratory Oak Ridge TN, USA spahnrb1@ornl.gov Mike Iannacone Oak Ridge National Laboratory Oak Ridge TN, USA iannaconemd@ornl.gov Evan

Kaiser, Gail E.

137

Vulnerability of Hydropower Projects to Climate Change Revision: 20th  

E-Print Network [OSTI]

Vulnerability of Hydropower Projects to Climate Change Revision: 20th December 2001 Dr Gareth P and increased use of renewable sources including hydropower. Paradoxically, climate change itself may alter role in whether emissions cuts are achieved. 2. Climate Change and Hydropower A rising demand

Harrison, Gareth

138

Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability  

E-Print Network [OSTI]

Climate Change, Agriculture and Poverty Vulnerabilityand Poverty Vulnerability Presentation by-Medium-High productivity ­ Implications for agricultural production, trade and poverty · The issue of climate volatility ­ Impact of extreme climate events on poverty #12;Climate Science Debate Detection: - Little doubt about

139

Increasing Automated Vulnerability Assessment Accuracy on Cloud and Grid Middleware  

E-Print Network [OSTI]

Hadron Collider by the CERN, up to industrial (water, power, electricity, oil, gas, etc.) distributed of critical and complex vulnerabilities. In addition, frequently middleware systems bases their security are safe. Therefore, security of distributed systems have been placed under the watchful eye of security

Miller, Barton P.

140

Second Line of Defense Spares Program  

SciTech Connect (OSTI)

During Fiscal Year 2012, a team from the Pacific Northwest National Laboratory (PNNL) conducted an assessment and analysis of the Second Line of Defense (SLD) Sustainability spare parts program. Spare parts management touches many aspects of the SLD Sustainability Program including contracting and integration of Local Maintenance Providers (LMP), equipment vendors, analyses and metrics on program performance, system state of health, and maintenance practices. Standardized spares management will provide better data for decisions during site transition phase and will facilitate transition to host country sustainability ownership. The effort was coordinated with related SLD Sustainability Program initiatives, including a configuration items baselining initiative, a metrics initiative, and a maintenance initiative. The spares study has also led to pilot programs for sourcing alternatives that include regional intermediate inventories and partnering agreements that leverage existing supply chains. Many partners from the SLD Sustainability program contributed to and were consulted in the course of the study. This document provides a description of the findings, recommendations, and implemented solutions that have resulted from the study.

Henderson, Dale L.; Holmes, Aimee E.; Muller, George; Mercier, Theresa M.; Brigantic, Robert T.; Perkins, Casey J.; Cooley, Scott K.; Thorsen, Darlene E.

2012-11-20T23:59:59.000Z

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies  

E-Print Network [OSTI]

Energy as a Framework for Prioritizing Conservation Vulnerabilities and Management Strategies for Prioritizing Management #12;Low-Energy Ecoregions: Greater Yellowstone Energy Richness Conservation Category systems may be vulnerable to human activities. #12;-difficult for managers to crystallize key conservation

Hansen, Andrew J.

142

T-532: Vulnerability in Graphics Rendering Engine Could Allow Remote Code Execution  

Broader source: Energy.gov [DOE]

Microsoft is investigating new public reports of a vulnerability in the Windows Graphics Rendering Engine. An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the logged-on user.

143

TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity for  

E-Print Network [OSTI]

TO APPEAR IN IEEE TRANSACTIONS ON POWER SYSTEMS 1 Vulnerability Assessment of Cybersecurity Govindarasu, Member, IEEE Abstract--Vulnerability assessment is a requirement of NERC's cybersecurity within the substation networks. Countermeasures are identified for improvement of the cybersecurity

Manimaran, Govindarasu

144

U-069: Telnet code execution vulnerability: FreeBSD and Kerberos  

Broader source: Energy.gov [DOE]

Vulnerability was reported in FreeBSD Telnet. A remote user can execute arbitrary code on the target system.

145

U.S. Department of Defense's Rebates and Incentives Regulations  

Broader source: Energy.gov [DOE]

Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—covers the U.S. Department of Defense's (DoD's) statuatory authority and financial management regulation for rebates and incentives.

146

Nuclear Weapon Surety Interface with the Department of Defense  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Order establishes Department of Energy and National Nuclear Security Administration requirements and responsibilities for addressing joint nuclear weapon and nuclear weapon system surety activities in conjunction with the Department of Defense. Cancels DOE O 452.6.

2009-05-14T23:59:59.000Z

147

A systematic analysis of defenses against code reuse attacks  

E-Print Network [OSTI]

In this thesis, we developed a systematic model of the code reuse attack space where facts about attacks and defenses were represented as propositional statements in boolean logic and the possibility of deploying malware ...

Casteel, Kelly (Kelly C.)

2013-01-01T23:59:59.000Z

148

Systematic Analysis of Defenses against Return-Oriented Programming  

E-Print Network [OSTI]

Since the introduction of return-oriented programming, increasingly complex defenses and subtle attacks that bypass them have been proposed. Unfortunately the lack of a unifying threat model among code reuse security papers ...

Skowyra, Richard

2013-01-01T23:59:59.000Z

149

Doctoral Defense "CHARACTERIZATION OF THE CYCLIC BEHAVIOR OF CORRODED STEEL  

E-Print Network [OSTI]

Doctoral Defense "CHARACTERIZATION OF THE CYCLIC BEHAVIOR OF CORRODED STEEL BRIDGE BEARINGS Chair: Jason McCormick Professor, Civil & Environmental Engineering Steel bridge bearings are widely and accommodate movements between the superstructure and substructure. These bearings include steel rocker

Kamat, Vineet R.

150

Title XXXII, National Defense Autorization Act for Fiscal year...  

National Nuclear Security Administration (NNSA)

Defense Authorization Act for Fiscal Year 2000, Pub. L. 106- 65, as amended by the Energy and Water Development Appropriations Act, 2001, Pub. L. 106-377; the Floyd D. Spence...

151

The Chinese Defense Economy in the Early 2010s  

E-Print Network [OSTI]

however, that the scale of the PLA’s acqui- sitions maybewould imply. While the PLA is by far the defense industry’sof the People’s Liberation Army (PLA) deterrent and combat

CHEUNG, Tai Ming

2013-01-01T23:59:59.000Z

152

Defense Energy Support Center: Installation Energy Commodity Business Unit  

Broader source: Energy.gov [DOE]

Presentation—given at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meeting—discusses the Defense Energy Support Center's (DESC's) Installation Energy Commodity Business Unit (CBU) including its intent, commitment, pilot project, lessons learned, and impending barriers.

153

Interface with the Defense Nuclear Facilities Safety Board  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual defines the process DOE will use to interface with the Defense Nuclear Facilities Safety Board and its staff. Canceled by DOE M 140.1-1A. Does not cancel other directives.

1996-12-30T23:59:59.000Z

154

Interface with the Defense Nuclear Facilities Safety Board  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual presents the process the Department of Energy will use to interface with the Defense Nuclear Facilities Safety Board (DNFSB) and its staff. Cancels DOE M 140.1-1A.

2001-03-30T23:59:59.000Z

155

Interface with the Defense Nuclear Facilities Safety Board  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual presents the process the Department of Energy will use to interface with the Defense Nuclear Facilities Safety Board (DNFSB) and its staff. Cancels DOE M 140.1-1.

1999-01-26T23:59:59.000Z

156

Microsoft Word - Defense Science Quarterly 02-08.doc  

National Nuclear Security Administration (NNSA)

year the team plans to complete up to 18 experiments. Monty Wood (LANL) and Don Smith (LLNL) discuss data during the alpha-can II exercise Page 4 NNSA Office of Defense...

157

Department of Defense Representatives Visit Hanford to Benchmark Safety  

Broader source: Energy.gov [DOE]

RICHLAND, Wash., December 16, 2005, Representatives of the Department of Defense's (DoD's) Voluntary Protection Program Center of Excellence (VPP CX) working to reduce injuries at selected (DoD)...

158

Identifying enterprise leverage points in Defense Acquisition Program performance  

E-Print Network [OSTI]

Large, complex systems development programs in the Department of Defense are finding it more difficult to deliver desired capabilities to the end user on time and on budget than ever before. Evidence exists that almost all ...

Wirthlin, Joseph Robert, 1970-

2009-01-01T23:59:59.000Z

159

Department of Defense Benchmarks VPP in Visit to Hanford  

Broader source: Energy.gov [DOE]

Representatives of the Department of Defense's (DoD's) Voluntary Protection Program Center of Excellence (VPP-CX) are working to meet a safety and health goal established by Secretary of Defense Donald Rumsfeld to reduce injuries at DoD sites nationwide. In order to accomplish this goal, DoD visited the Department of Energy's (DOE's) Hanford Site in southeast Washington State on December 12, 2005, to learn about its exemplary safety programs and benchmark the site's VPP effort.

160

Climate Change Vulnerability of Native and Alien Freshwater Fishes of California: A Systematic Assessment  

E-Print Network [OSTI]

Climate Change Vulnerability of Native and Alien Freshwater Fishes of California: A Systematic and climate change vulnerability scores were derived for 121 native and 43 alien fish species. The two scores baseline and greater climate change vulnerability than did alien species. Fifty percent of California

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

Vulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels to  

E-Print Network [OSTI]

Vulnerability of Xylem Vessels to Cavitation in Sugar Maple. Scaling from Individual Vessels 02318 (M.A.Z., N.M.H.) The relation between xylem vessel age and vulnerability to cavitation of sugar-related changes in vulnerability to the overall resistance to cavitation, we combined data on the pressure

Melcher, Peter

162

Climate Change and Infrastructure, Urban Systems, and Vulnerabilities  

SciTech Connect (OSTI)

This Technical Report on Climate Change and Infrastructure, Urban Systems, and Vulnerabilities has been prepared for the U.S. Department of Energy by the Oak Ridge National Laboratory in support of the U.S. National Climate Assessment (NCA). It is a summary of the currently existing knowledge base on its topic, nested within a broader framing of issues and questions that need further attention in the longer run. The report arrives at a number of assessment findings, each associated with an evaluation of the level of consensus on that issue within the expert community, the volume of evidence available to support that judgment, and the section of the report that provides an explanation for the finding. Cross-sectoral issues related to infrastructures and urban systems have not received a great deal of attention to date in research literatures in general and climate change assessments in particular. As a result, this technical report is breaking new ground as a component of climate change vulnerability and impact assessments in the U.S., which means that some of its assessment findings are rather speculative, more in the nature of propositions for further study than specific conclusions that are offered with a high level of confidence and research support. But it is a start in addressing questions that are of interest to many policymakers and stakeholders. A central theme of the report is that vulnerabilities and impacts are issues beyond physical infrastructures themselves. The concern is with the value of services provided by infrastructures, where the true consequences of impacts and disruptions involve not only the costs associated with the clean-up, repair, and/or replacement of affected infrastructures but also economic, social, and environmental effects as supply chains are disrupted, economic activities are suspended, and/or social well-being is threatened. Current knowledge indicates that vulnerability concerns tend to be focused on extreme weather events associated with climate change that can disrupt infrastructure services, often cascading across infrastructures because of extensive interdependencies threatening health and local economies, especially in areas where human populations and economic activities are concentrated in urban areas. Vulnerabilities are especially large where infrastructures are subject to multiple stresses, beyond climate change alone; when they are located in areas vulnerable to extreme weather events; and if climate change is severe rather than moderate. But the report also notes that there are promising approaches for risk management, based on emerging lessons from a number of innovative initiatives in U.S. cities and other countries, involving both structural and non-structural (e.g., operational) options.

Wilbanks, Thomas J [ORNL] [ORNL; Fernandez, Steven J [ORNL] [ORNL

2014-01-01T23:59:59.000Z

163

Peptide identification  

DOE Patents [OSTI]

Peptides are identified from a list of candidates using collision-induced dissociation tandem mass spectrometry data. A probabilistic model for the occurrence of spectral peaks corresponding to frequently observed partial peptide fragment ions is applied. As part of the identification procedure, a probability score is produced that indicates the likelihood of any given candidate being the correct match. The statistical significance of the score is known without necessarily having reference to the actual identity of the peptide. In one form of the invention, a genetic algorithm is applied to candidate peptides using an objective function that takes into account the number of shifted peaks appearing in the candidate spectrum relative to the test spectrum.

Jarman, Kristin H [Richland, WA; Cannon, William R [Richland, WA; Jarman, Kenneth D [Richland, WA; Heredia-Langner, Alejandro [Richland, WA

2011-07-12T23:59:59.000Z

164

Probabilistic Vulnerability Assessment Based on Power Flow and Voltage Distribution  

SciTech Connect (OSTI)

Risk assessment of large scale power systems has been an important problem in power system reliability study. Probabilistic technique provides a powerful tool to solve the task. In this paper, we present the results of a study on probabilistic vulnerability assessment on WECC system. Cumulant based expansion method is applied to obtain the probabilistic distribution function (PDF) and cumulative distribution function (CDF) of power flows on transmission lines and voltage. Overall risk index based on the system vulnerability analysis is calculated using the WECC system. The simulation results based on WECC system is used to demonstrate the effectiveness of the method. The methodology can be applied to the risk analysis on large scale power systems.

Ma, Jian; Huang, Zhenyu; Wong, Pak C.; Ferryman, Thomas A.

2010-04-30T23:59:59.000Z

165

Vulnerability assessment of water supply systems for insufficient fire flows  

E-Print Network [OSTI]

VULNERABILITY ASSESSMENT OF WATER SUPPLY SYSTEMS FOR INSUFFICIENT FIRE FLOWS A Thesis by LUFTHANSA RAHMAN KANTA Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements... Studies of Texas A&M University in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE Approved by: Chair of Committee, Kelly Brumbelow Committee Members, Francisco Olivera Sergiy Butenko Head of Department...

Kanta, Lufthansa Rahman

2009-05-15T23:59:59.000Z

166

T-613: Microsoft Excel Axis Properties Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Microsoft Excel is prone to a remote code-execution vulnerability because the applications fails to sufficiently validate user-supplied input. Attackers can exploit this issue by enticing an unsuspecting user to open a specially crafted Excel file. Successful exploits can allow attackers to execute arbitrary code with the privileges of the user running the application. Failed exploit attempts will result in a denial-of-service condition.

167

T-682:Double free vulnerability in MapServer  

Broader source: Energy.gov [DOE]

MapServer developers have discovered flaws in the OGC filter support in MapServer. Specific code is used in support of WFS, WMS-SLD and SOS specifications. All versions may be susceptible to SQL injection under certain circumstances. The extent of the vulnerability depends on the MapServer version, relational database and mapfile configuration being used. All users are strongly encouraged to upgrade to these latest releases.

168

Colombia-Cartagena Vulnerability Assessment | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDITOhioOglesby,Sullivan,Information Feed JumpCartagena Vulnerability

169

Report to Congress on Insular Area energy vulnerability  

SciTech Connect (OSTI)

This report was prepared in response to Section 1406 of the Energy Policy Act of 1992 (Public Law 102-486), which directed the Department of Energy (DOE) to ``conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption,`` and to ``outline how the insular areas shall gain access to vital oil supplies during times of national emergency.`` The Act defines the insular areas to be the US Virgin Islands and Puerto Rico in the Caribbean, and Guam, American Samoa, the Commonwealth of the Northern Mariana Islands (CNMI), and Palau in the Pacific. In the study, ``unique vulnerabilities`` were defined as susceptibility to: (1) more frequent or more likely interruptions of oil supplies compared to the US Mainland, and/or (2) disproportionately larger or more likely economic losses in the event of an oil supply disruption. In order to assess unique vulnerabilities, the study examined the insular areas` experience during past global disruptions of oil supplies and during local emergencies caused by natural disasters. The effects of several possible future global disruptions and local emergencies were also analyzed. Analyses were based on historical data, simulations using energy and economic models, and interviews with officials in the insular governments and the energy industry.

Not Available

1994-05-01T23:59:59.000Z

170

Climate Change Vulnerability Assessment for Idaho National Laboratory  

SciTech Connect (OSTI)

The University of Idaho (UI) was asked to participate in the development of a climate change vulnerability assessment for Idaho National Laboratory (INL). This report describes the outcome of that assessment. The climate change happening now, due in large part to human activities, is expected to continue in the future. UI and INL used a common framework for assessing vulnerability that considers exposure (future climate change), sensitivity (system or component responses to climate), impact (exposure combined with sensitivity), and adaptive capacity (capability of INL to modify operations to minimize climate change impacts) to assess vulnerability. Analyses of climate change (exposure) revealed that warming that is ongoing at INL will continue in the coming decades, with increased warming in later decades and under scenarios of greater greenhouse gas emissions. Projections of precipitation are more uncertain, with multi model means exhibiting somewhat wetter conditions and more wet days per year. Additional impacts relevant to INL include estimates of more burned area and increased evaporation and transpiration, leading to reduced soil moisture and plant growth.

Christopher P. Ischay; Ernest L. Fossum; Polly C. Buotte; Jeffrey A. Hicke; Alexander Peterson

2014-10-01T23:59:59.000Z

171

The science, technology, and politics of ballistic missile defense  

SciTech Connect (OSTI)

America's missile defense systems are deployed at home and abroad. This includes the Groundbased Missile Defense (GMD) system in Alaska and California, the Phased Adaptive Approach in Europe (EPAA), and regional systems in the Middle East and Asia. Unfortunately these systems lack workable architectures, and many of the required elements either don't work or are missing. Major review and reconsideration is needed of all elements of these systems. GMD performance in tests has gotten worse with time, when it ought to be getting better. A lack of political support is not to blame as the DoD spends about $10 billion per year, and proposes to add about $5 billion over the next five years. Russia objects to the EPAA as a threat to its ICBM forces, and to the extensive deployment of U.S. military forces in countries such as Poland, the Czech Republic and Romania, once part of the Soviet Union. Going forward the U.S. should keep working with Russia whose cooperation will be key to diplomatic gains in the Middle East and elsewhere. Meanwhile, America's missile defenses face an enduring set of issues, especially target discrimination in the face of attacks designed to overwhelm the defenses, stage separation debris, chaff, decoys, and stealth. Dealing with target discrimination while also replacing, upgrading, or adding to the many elements of U.S. missiles defenses presents daunting budget priorities. A new look at the threat is warranted, and whether the U.S. needs to consider every nation that possesses even short-range missiles a threat to America. The proliferation of missiles of all sizes around the world is a growing problem, but expecting U.S. missile defenses to deal with all those missiles everywhere is unrealistic, and U.S. missile defenses, effective or not, are justifying more and more offensive missiles.

Coyle, Philip E. [Center for Arms Control and Non-Proliferation, Washington, DC (United States)

2014-05-09T23:59:59.000Z

172

T-694: IBM Tivoli Federated Identity Manager Products Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

This Security Alert addresses a serious security issue CVE-2010-4476 (Java Runtime Environment hangs when converting "2.2250738585072012e-308" to a binary floating-point number). This vulnerability might cause the Java Runtime Environment to hang, be in infinite loop, and/or crash resulting in a denial of service exposure. This same hang might occur if the number is written without scientific notation (324 decimal places). In addition to the Application Server being exposed to this attack, any Java program using the Double.parseDouble method is also at risk of this exposure including any customer written application or third party written application.

173

V-207: Wireshark Multiple Denial of Service Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | Department

174

V-208: Google Chrome Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | Department Multiple

175

V-214: Mozilla Firefox Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities |Energy

176

Developing a Power Measurement Framework for Cyber Defense  

E-Print Network [OSTI]

substations and hydroelectric facilities is a normal part of guerilla warfare [3]. Cyber attack of EDS systems, they have become more vulnerable to cyber-attacks as well. As part of a systems health monitoring approach, Experimentation, Security. Keywords Energy Delivery Systems, malware, rootkits, cyber-attacks, Power Distribution

Pouchard, Line

177

Scanning the Issue Special Issue on Energy Infrastructure Defense Systems  

E-Print Network [OSTI]

natural disasters and physical attacks have long been recognized. In 1990, the Office of Tech- nology to absolutely defend. The report on the northeastern blackout of August 2003 by the U.S.­Canada Power System Assessment (OTA) of the U.S. Congress issued a detailed report, Physical Vulnerability of the Electric System

Amin, S. Massoud

178

AFTER A Framework for electrical power sysTems vulnerability  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartmentAUDIT REPORTOpenWende NewSowitec doWinvestFlumeFinal Reportidentification, dEfense

179

AFTER A Framework for electrical power sysTems vulnerability  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights,Information Of TheFixedidentification, dEfense and

180

AFTER A Framework for electrical power sysTems vulnerability  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 East 300 SouthWater Rights,Information Of TheFixedidentification, dEfense

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

Chemical Safety Vulnerability Working Group report. Volume 2  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 2 consists of seven appendices containing the following: Tasking memorandums; Project plan for the CSV Review; Field verification guide for the CSV Review; Field verification report, Lawrence Livermore National Lab.; Field verification report, Oak Ridge Reservation; Field verification report, Savannah River Site; and the Field verification report, Hanford Site.

Not Available

1994-09-01T23:59:59.000Z

182

Chemical Safety Vulnerability Working Group report. Volume 3  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 148 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 3 consists of eleven appendices containing the following: Field verification reports for Idaho National Engineering Lab., Rocky Flats Plant, Brookhaven National Lab., Los Alamos National Lab., and Sandia National Laboratories (NM); Mini-visits to small DOE sites; Working Group meeting, June 7--8, 1994; Commendable practices; Related chemical safety initiatives at DOE; Regulatory framework and industry initiatives related to chemical safety; and Chemical inventory data from field self-evaluation reports.

Not Available

1994-09-01T23:59:59.000Z

183

Energy Sector Vulnerability to Climate Change: Adaptation Options to Increase Resilience (Presentation)  

SciTech Connect (OSTI)

The U.S. Department of Energy is conducting an assessment of vulnerabilities of the U.S. energy sector to climate change and extreme weather. Emphasizing peer reviewed research, it seeks to quantify vulnerabilities and identify specific knowledge or technology gaps. It draws upon a July 2012 workshop, ?Climate Change and Extreme Weather Vulnerability Assessment of the US Energy Sector?, hosted by the Atlantic Council and sponsored by DOE to solicit industry input.

Newmark, R. L.; Bilello, D.; Macknick, J.; Hallet, K. C.; Anderson, R.; Tidwell, V.; Zamuda, C.

2013-02-01T23:59:59.000Z

184

HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks  

E-Print Network [OSTI]

1 HADOF: Defense Against Routing Disruptions in Mobile Ad Hoc Networks Wei Yu, Yan Sun and K. J disruptions in mobile ad hoc networks. Based on the observed behavior and the history record of each node AND BACKGROUND A mobile ad hoc network is a group of mobile nodes without requiring centralized administration

Sun, Yan Lindsay

185

Towards Attack-Agnostic Defenses David Brumley and Dawn Song  

E-Print Network [OSTI]

Towards Attack-Agnostic Defenses David Brumley and Dawn Song Carnegie Mellon University {dbrumley,dawnsong}@cs.cmu.edu Abstract Internet attackers control hundreds of thousands to per- haps millions of computers, which they can use for a va- riety of different attacks. Common attacks include spam delivery, phishing, and DDo

Brumley, David

186

POLYMER PROGRAM SEMINAR "Polymerizing Goblins and Brimstone for Energy & Defense"  

E-Print Network [OSTI]

POLYMER PROGRAM SEMINAR "Polymerizing Goblins and Brimstone for Energy & Defense" Prof. Jeffrey efforts in the polymerization of unconventional monomers to prepare novel polymeric and nanocomposite materials. We will discuss the polymerization of a novel class of polymer-nanoparticle hybrid materials

Alpay, S. Pamir

187

Are three-dimensional spider webs defensive adaptations?  

E-Print Network [OSTI]

LETTER Are three-dimensional spider webs defensive adaptations? Todd A. Blackledge1 *, Jonathan A-mail: tab42@cornell.edu Abstract Spider webs result from complex behaviours that have evolved under many selective pressures. Webs have been primarily considered to be foraging adaptations, neglecting

Blackledge, Todd

188

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Broader source: Energy.gov [DOE]

SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

189

U-126: Cisco Adaptive Security Appliances Port Forwarder ActiveX Control Buffer Overflow Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability was reported in Cisco ASA. A remote user can cause arbitrary code to be executed on the target user's system.

190

U-101: Mozilla Firefox / Thunderbird / SeaMonkey XBL Binding Use-After-Free Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability has been reported in multiple Mozilla products, which can be exploited by malicious people to compromise a user's system.

191

T-572: VMware ESX/ESXi SLPD denial of service vulnerability  

Broader source: Energy.gov [DOE]

VMware ESX/ESXi SLPD denial of service vulnerability and ESX third party updates for Service Console packages bind, pam, and rpm.

192

U-016: Cisco IOS Software HTTP Service Loading Denial of Service Vulnerability  

Broader source: Energy.gov [DOE]

An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to stop responding, resulting in a DoS condition

193

V-054: IBM WebSphere Application Server for z/OS Arbitrary Command Execution Vulnerability  

Broader source: Energy.gov [DOE]

A vulnerability was reported in the IBM HTTP Server component 5.3 in IBM WebSphere Application Server (WAS) for z/OS

194

T-655: Mozilla Firefox CVE-2011-2369 HTML Injection Vulnerability  

Broader source: Energy.gov [DOE]

Mozilla Firefox is prone to an HTML-injection vulnerability because it fails to properly sanitize user-supplied input before using it in dynamically generated content.

195

Effect of beta on Seismic Vulnerability Curve for RC Bridge Based on Double Damage Criterion  

SciTech Connect (OSTI)

In the analysis of seismic vulnerability curve based on double damage criterion, the randomness of structural parameter and randomness of seismic should be considered. Firstly, the distribution characteristics of structure capability and seismic demand are obtained based on IDA and PUSHOVER, secondly, the vulnerability of the bridge is gained based on ANN and MC and a vulnerability curve according to this bridge and seismic is drawn. Finally, the analysis for a continuous bridge is displayed as an example, and parametric analysis for the effect of beta is done, which reflects the bridge vulnerability overall from the point of total probability, and in order to reduce the discreteness, large value of beta are suggested.

Feng Qinghai [CCCC Highway, CO., Ltd. (China); Yuan Wancheng [Bridge Department, Tongji University, Shanghai (China)

2010-05-21T23:59:59.000Z

196

T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment...  

Broader source: Energy.gov (indexed) [DOE]

process termination, the PDF rendering process will restart automatically but will not resume processing the same PDF file. Successful exploitation of this vulnerability requires a...

197

Practical matters for defense contractors converting DoD technology to commercial markets  

E-Print Network [OSTI]

This thesis asks if and how the defense contractor can profitably transfer the technology and institutional learning obtained from DoD funded R&D to commercial markets. There are numerous examples of very successful defense ...

Ting, Carina Maria

2012-01-01T23:59:59.000Z

198

Tests of the coupled expression of latex and cardenolide plant defense in common milkweed (Asclepias syriaca)  

E-Print Network [OSTI]

Most plants have an incredible diversity of defensive traits (Duffey and Stout 1996, Agrawal and Fishbein 2006, Gaquerel et al. 2010). Hy- potheses for the expression of multiple defensive v www

Agrawal, Anurag

199

Inhabiting cycles of maritime obsolescence : redirecting the National Defense Reserve Fleet  

E-Print Network [OSTI]

Defense is in a state of obsolescence. The metrics of risk have changed from threat of military invasion to that of weather. Infrastructure is in a state of transition. The Maritime Administration's National Defense Reserve ...

Polansky, Nicholas W. (Nicholas Wilkes)

2014-01-01T23:59:59.000Z

200

Innovation in China’s Defense Research, Development, and Acquisition System  

E-Print Network [OSTI]

growing in- fluence as the PLA’s role in defense RDA grew,Industry Defense Industry PLA Direction of command authorityof liasion and coordination PLA centrated on select high-

CHEUNG, Tai Ming

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

E-Print Network 3.0 - air defense artillery Sample Search Results  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Defense Artillery Center (1998... pit site, U.S. Army Air Defense Artillery Center and Fort Bliss, El Paso, Texas. Water Resources... and ground-water quality of the chromic...

202

TEMPORARY INSANITY: THE STRANGE LIFE AND TIMES OF THE PERFECT DEFENSE  

E-Print Network [OSTI]

............................................................................................. 1598 I. THE MYTH AND THE REALITY OF THE PERFECT DEFENSE ................ 1603 A. Myth........................................................................................... 1603 B. Reality

Finzi, Adrien

203

Comment submitted by the Natural Resources Defense Council (NRDC) regarding the Energy Star Verification Testing Program  

Broader source: Energy.gov [DOE]

This document is a comment submitted by the Natural Resources Defense Council (NRDC) regarding the Energy Star Verification Testing Program

204

A Taxonomy of DDoS Attack and DDoS Defense Mechanisms  

E-Print Network [OSTI]

A Taxonomy of DDoS Attack and DDoS Defense Mechanisms Jelena Mirkovic 449 Smith Hall Computer the attacks and the defense approaches is overwhelming. This paper presents two taxonomies for classifying attacks and defenses, and thus provides researchers with a better understanding of the problem

Lee, Ruby B.

205

Using vulnerability assessments to design facility safeguards and security systems  

SciTech Connect (OSTI)

The Weapons Complex Reconfiguration (WCR) Program is meant to prepare the Department of Energy (DOE) weapons complex to meet the needs of the next century through construction of now facilities or upgrades-in-place at existing facilities. This paper describes how a vulnerability (VA) was used to identify potential S&S features for the conceptual design for a plutonium storage facility as part of the WCR Program. We distinguish those features of the design that need to be investigated at the conceptual stage from those that can be evaluated later. We also examined what protection features may allow reduced S&S operating costs, with the main focus on protective force costs. While some of these concepts hold the promise for significantly reducing life-cycle protective force costs, their use depends on resolving long-standing tradeoffs between S&S and safety, which are discussed in the study.

Snell, M.; Jaeger, C.

1994-08-01T23:59:59.000Z

206

Assessing Vulnerabilities, Risks, and Consequences of Damage to Critical Infrastructure  

SciTech Connect (OSTI)

Since the publication of 'Critical Foundations: Protecting America's Infrastructure,' there has been a keen understanding of the complexity, interdependencies, and shared responsibility required to protect the nation's most critical assets that are essential to our way of life. The original 5 sectors defined in 1997 have grown to 18 Critical Infrastructures and Key Resources (CIKR), which are discussed in the 2009 National Infrastructure Protection Plan (NIPP) and its supporting sector-specific plans. The NIPP provides the structure for a national program dedicated to enhanced protection and resiliency of the nation's infrastructure. Lawrence Livermore National Laboratory (LLNL) provides in-depth, multi-disciplinary assessments of threat, vulnerability, and consequence across all 18 sectors at scales ranging from specific facilities to infrastructures spanning multi-state regions, such as the Oil and Natural Gas (ONG) sector. Like many of the CIKR sectors, the ONG sector is comprised of production, processing, distribution, and storage of highly valuable and potentially dangerous commodities. Furthermore, there are significant interdependencies with other sectors, including transportation, communication, finance, and government. Understanding the potentially devastating consequences and collateral damage resulting from a terrorist attack or natural event is an important element of LLNL's infrastructure security programs. Our work began in the energy sector in the late 1990s and quickly expanded other critical infrastructure sectors. We have performed over 600 physical assessments with a particular emphasis on those sectors that utilize, store, or ship potentially hazardous materials and for whom cyber security is important. The success of our approach is based on building awareness of vulnerabilities and risks and working directly with industry partners to collectively advance infrastructure protection. This approach consists of three phases: The Pre-Assessment Phase brings together infrastructure owners and operators to identify critical assets and help the team create a structured information request. During this phase, we gain information about the critical assets from those who are most familiar with operations and interdependencies, making the time we spend on the ground conducting the assessment much more productive and enabling the team to make actionable recommendations. The Assessment Phase analyzes 10 areas: Threat environment, cyber architecture, cyber penetration, physical security, physical penetration, operations security, policies and procedures, interdependencies, consequence analysis, and risk characterization. Each of these individual tasks uses direct and indirect data collection, site inspections, and structured and facilitated workshops to gather data. Because of the importance of understanding the cyber threat, LLNL has built both fixed and mobile cyber penetration, wireless penetration and supporting tools that can be tailored to fit customer needs. The Post-Assessment Phase brings vulnerability and risk assessments to the customer in a format that facilitates implementation of mitigation options. Often the assessment findings and recommendations are briefed and discussed with several levels of management and, if appropriate, across jurisdictional boundaries. The end result is enhanced awareness and informed protective measures. Over the last 15 years, we have continued to refine our methodology and capture lessons learned and best practices. The resulting risk and decision framework thus takes into consideration real-world constraints, including regulatory, operational, and economic realities. In addition to 'on the ground' assessments focused on mitigating vulnerabilities, we have integrated our computational and atmospheric dispersion capability with easy-to-use geo-referenced visualization tools to support emergency planning and response operations. LLNL is home to the National Atmospheric Release Advisory Center (NARAC) and the Interagency Modeling and Atmospheric Assessment Center (IMAAC). NA

Suski, N; Wuest, C

2011-02-04T23:59:59.000Z

207

Response surfaces of vulnerability to climate change: the Colorado River Basin, the High Plains, and California  

E-Print Network [OSTI]

the vulnerability of water supply to shortage for the Colorado River Basin and basins of the High Plains, it becomes ever more important to assess the vulnerability of current and future water supplies to shortage more likely to experience water shortages (Barnett et al. 2004; Barnett and Pierce 2008, 2009; Cayan et

208

Finding Semantic Vulnerabilities in PHP Applications The University of Texas at Austin  

E-Print Network [OSTI]

SAFERPHP: Finding Semantic Vulnerabilities in PHP Applications Sooel Son The University of Texas the first characterization of these types of vulner- abilities in PHP applications, develop novel inter-procedural algorithms for discovering them in PHP source code, and implement these algorithms as part of SAFERPHP

Shmatikov, Vitaly

209

Indra Prasad Paneru Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu Valley  

E-Print Network [OSTI]

Indra Prasad Paneru Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu Valley Livelihood strategy and occupational vulnerability of street ice cream vendors in Kathmandu-cream vendors of Kathmandu valley, Case study of Jawalakhel, Ratnapark area and Balaju area' explores

Richner, Heinz

210

Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data  

E-Print Network [OSTI]

Geospatial analysis of vulnerable beach-foredune systems from decadal time series of lidar data, Geospatial analysis of vulnerable beach- foredune systems from decadal time series of lidar data, Journal densities; therefore, geospatial analysis, when applied to decadal lidar time series, needs to address

Mitasova, Helena

211

Impact of relief accuracy on flood simulations and road network vulnerability analysis  

E-Print Network [OSTI]

network by forcing users to take detours. In a risk preventive viewpoint, the network administrator has 1 Impact of relief accuracy on flood simulations and road network vulnerability analysis Jean in the water level and its consequences on the road network vulnerability. The first part focuses

Paris-Sud XI, Université de

212

What about vulnerability to a fault attack of the Miller algorithm during an  

E-Print Network [OSTI]

What about vulnerability to a fault attack of the Miller algorithm during an Identity Based is to analyse the weakness of the Miller algorithm when it undergoes a fault attack. We prove that the Miller algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through the resolution

Paris-Sud XI, Université de

213

What About Vulnerability to a Fault Attack of the Miller's Algorithm During an  

E-Print Network [OSTI]

What About Vulnerability to a Fault Attack of the Miller's Algorithm During an Identity Based of this article is to analyse the weakness of the Miller's algorithm when it undergoes a fault attack. We prove that the Miller's algorithm is vulnerable to a fault attack which is valid in all coordinate systems, through

Paris-Sud XI, Université de

214

Modeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack1  

E-Print Network [OSTI]

and SCADA systems such as: "Which is the most vulnerable device of our power substation under an attack to remote power substations and control centers comes with the added risk of cyber attack by hackers andModeling Complex Control Systems to Identify Remotely Accessible Devices Vulnerable to Cyber Attack

Krings, Axel W.

215

Update on the Department of Energy's 1994 plutonium vulnerability assessment for the plutonium finishing plant  

SciTech Connect (OSTI)

A review of the environmental, safety, and health vulnerabilities associated with the continued storage of PFP's inventory of plutonium bearing materials and other SNM. This report re-evaluates the five vulnerabilities identified in 1994 at the PFP that are associated with SNM storage. This new evaluation took a more detailed look and applied a risk ranking process to help focus remediation efforts.

HERZOG, K.R.

1999-09-01T23:59:59.000Z

216

Seismic vulnerability analysis of moderate seismicity areas using in situ experimental  

E-Print Network [OSTI]

Seismic vulnerability analysis of moderate seismicity areas using in situ experimental techniques (LGIT), LCPC, CNRS, Université Joseph Fourier Grenoble Abstract Seismic vulnerability analysis. This curve is particularly interesting in moderate seismic areas. This methodology is applied to the Grenoble

Paris-Sud XI, Université de

217

VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN  

E-Print Network [OSTI]

VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources VULNERABILITY ASSESSMENT OF WATER RESOURCES SYSTEMS IN THE EASTERN NILE BASIN TO ENVIRONMENTAL Resources Institute of African Research and Studies, Cairo University For the Degree of MASTER OF SCIENCE

Richner, Heinz

218

Climate change impacts and vulnerability of the southern populations of Pinus nigra subsp. salzmannii  

E-Print Network [OSTI]

vulnerability to climate change in Mediterranean mountain forests is not well developed. Climate change impactsClimate change impacts and vulnerability of the southern populations of Pinus nigra subsp-sensitive species. Trees will adapt not only to changes in mean climate variables but also to increased extreme

Herrera, Carlos M.

219

T-526: Microsoft Internet Explorer 'ReleaseInterface()' Remote Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Microsoft Internet Explorer is prone to a remote code-execution vulnerability. Successful exploits will allow an attacker to run arbitrary code in the context of the user running the application. Failed attacks will cause denial-of-service conditions. Microsoft Internet Explorer 8.0.7600.16385 is vulnerable; other versions may also be affected.

220

Materials evaluation programs at the Defense Waste Processing Facility  

SciTech Connect (OSTI)

The Savannah River Site (SRS) has been operating a nuclear fuel cycle since the 1950s to produce nuclear materials in support of the national defense effort. About 83 million gallons of high-level waste produced since operations began has been consolidated by evaporation into 33 million gallons at the waste tank farm. The Department of Energy authorized the construction of the Defense Waste Processing Facility (DWPF), the function of which is to immobilize the waste as a durable borosilicate glass contained in stainless steel canisters prior to the placement of the canisters in a federal repository. The DWPF is now mechanically complete and is undergoing commissioning and run-in activities. A brief description of the DWPF process is provided.

Gee, J.T.; Iverson, D.C.; Bickford, D.F.

1992-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Materials evaluation programs at the Defense Waste Processing Facility  

SciTech Connect (OSTI)

The Savannah River Site (SRS) has been operating a nuclear fuel cycle since the 1950s to produce nuclear materials in support of the national defense effort. About 83 million gallons of high-level waste produced since operations began has been consolidated by evaporation into 33 million gallons at the waste tank farm. The Department of Energy authorized the construction of the Defense Waste Processing Facility (DWPF), the function of which is to immobilize the waste as a durable borosilicate glass contained in stainless steel canisters prior to the placement of the canisters in a federal repository. The DWPF is now mechanically complete and is undergoing commissioning and run-in activities. A brief description of the DWPF process is provided.

Gee, J.T.; Iverson, D.C.; Bickford, D.F.

1992-12-31T23:59:59.000Z

222

Strategic defense initiatives at Los Alamos National Laboratory  

SciTech Connect (OSTI)

This presentation reviews the Strategic Defense Initiative (SDI) programs at Los Alamos National Laboratory, noting especially the needs for and applications of optics and optical technologies. Table I lists the various activities at Los Alamos contributing to SDI programs. The principal, nonnuclear SDI programs are: (1) the free-electron laser, and (2) neutral particle beams. Both should be considered as potential long-range-kill systems, but still in the futuristic category.

Rockwood, S.D.

1985-01-01T23:59:59.000Z

223

Nuclear Weapon Surety Interface with the Department of Defense  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order prescribes how the Department of Energy participates with the Department of Defense (DoD) to ensure the surety (safety, security and control) of military nuclear weapon systems deployed around the world. The Order establishes National Nuclear Security Administration requirements and responsibilities for addressing joint nuclear weapon and nuclear weapon system surety activities in conjunction with the DoD. Cancels DOE O 5610.13. Canceled by DOE O 452.6A.

2006-10-19T23:59:59.000Z

224

March 23, 1983: Strategic Defense Initiative (SDI) | Department of Energy  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |EnergyonSupport0.pdf5 OPAM SEMIANNUAL REPORTMA EnergyMagna1983: Strategic Defense Initiative

225

Indiana Office of Energy Defense Development | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to:46 - 429 Throttled (bot load) Error 429 ThrottledEnergyDefense Development Jump to:

226

Ike Skelton Defense Authorization Act | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to: navigation,Ohio:GreerHiCalifornia:ISI SolarIdanha, Oregon:Ike Skelton Defense

227

APPENDIX A: Climate Change Vulnerability Literature Review The purpose of this discussion is to review the existing literature surrounding climate change adaptation  

E-Print Network [OSTI]

1 APPENDIX A: Climate Change Vulnerability Literature Review Purpose The purpose of this discussion is to review the existing literature surrounding climate change adaptation and vulnerability with a focus thought surrounding methods for conducting climate change vulnerability assessments. The review

Brownstone, Rob

228

Safeguards Evaluation Method for evaluating vulnerability to insider threats  

SciTech Connect (OSTI)

As protection of DOE facilities against outsiders increases to acceptable levels, attention is shifting toward achieving comparable protection against insiders. Since threats and protection measures for insiders are substantially different from those for outsiders, new perspectives and approaches are needed. One such approach is the Safeguards Evaluation Method. This method helps in assessing safeguards vulnerabilities to theft or diversion of special nuclear meterial (SNM) by insiders. The Safeguards Evaluation Method-Insider Threat is a simple model that can be used by safeguards and security planners to evaluate safeguards and proposed upgrades at their own facilities. The method is used to evaluate the effectiveness of safeguards in both timely detection (in time to prevent theft) and late detection (after-the-fact). The method considers the various types of potential insider adversaries working alone or in collusion with other insiders. The approach can be used for a wide variety of facilities with various quantities and forms of SNM. An Evaluation Workbook provides documentation of the baseline assessment; this simplifies subsequent on-site appraisals. Quantitative evaluation is facilitated by an accompanying computer program. The method significantly increases an evaluation team's on-site analytical capabilities, thereby producing a more thorough and accurate safeguards evaluation.

Al-Ayat, R.A.; Judd, B.R.; Renis, T.A.

1986-01-01T23:59:59.000Z

229

A graph-based network-vulnerability analysis system  

SciTech Connect (OSTI)

This paper presents a graph based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level of effort for the attacker, various graph algorithms such as shortest path algorithms can identify the attack paths with the highest probability of success.

Swiler, L.P.; Phillips, C.; Gaylor, T.

1998-05-03T23:59:59.000Z

230

A graph-based network-vulnerability analysis system  

SciTech Connect (OSTI)

This report presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

Swiler, L.P.; Phillips, C. [Sandia National Labs., Albuquerque, NM (United States); Gaylor, T. [3M, Austin, TX (United States). Visual Systems Div.

1998-01-01T23:59:59.000Z

231

A graph-based system for network-vulnerability analysis  

SciTech Connect (OSTI)

This paper presents a graph-based approach to network vulnerability analysis. The method is flexible, allowing analysis of attacks from both outside and inside the network. It can analyze risks to a specific network asset, or examine the universe of possible consequences following a successful attack. The graph-based tool can identify the set of attack paths that have a high probability of success (or a low effort cost) for the attacker. The system could be used to test the effectiveness of making configuration changes, implementing an intrusion detection system, etc. The analysis system requires as input a database of common attacks, broken into atomic steps, specific network configuration and topology information, and an attacker profile. The attack information is matched with the network configuration information and an attacker profile to create a superset attack graph. Nodes identify a stage of attack, for example the class of machines the attacker has accessed and the user privilege level he or she has compromised. The arcs in the attack graph represent attacks or stages of attacks. By assigning probabilities of success on the arcs or costs representing level-of-effort for the attacker, various graph algorithms such as shortest-path algorithms can identify the attack paths with the highest probability of success.

Swiler, L.P.; Phillips, C.

1998-06-01T23:59:59.000Z

232

Identification in Prediction Theory  

E-Print Network [OSTI]

Identification in Prediction Theory Lars B¨aumer Bielefeld 2000 #12;Acknowledgment I wish to thank remarks. 1 #12;Contents 1 Introduction 3 2 Finite-State Predictability 7 2.1 A Universal Predictor Predictability and Identifiability . . . . . . 30 3.3 Markov Machines for Identification

Bielefeld, University of

233

United States Department of Defense | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov PtyInformation UC 19-6-401 et seq.NorthUniopolis,ParcelDefense Jump to:

234

Security & Defense Licenses Available | Tech Transfer | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security and Defense SHARE

235

Microsoft Word - Defense Science Quarterly 02-08.doc  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Review of the Yucca MountainSourceUsers6February 2008 Defense

236

Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard  

E-Print Network [OSTI]

Geographic variation in vulnerability to climate warming in a tropical Caribbean lizard Alex R temperatures (Tb) of the tropical Caribbean lizard Anolis cristatellus at nine sites representing two habitat

Leal, Manuel S.

237

A Smart Grid Vulnerability Analysis Framework for Coordinated Variable Structure Switching Attacks  

E-Print Network [OSTI]

the approach. Moreover the insights gained from the vulnerability analysis of the WECC system are consistent approach is detailed in Section III along with an illustration of the procedure on the WECC 3-machine, 9

Kundur, Deepa

238

USE OF COMPOSITE MATERIALS TO REPAIR STEEL STRUCTURES VULNERABLE TO FATIGUE DAMAGE  

E-Print Network [OSTI]

This study investigates mainly two different topics related to the use of CFRP's for strengthening and repair of steel bridges: the use of CFRP's to prevent damage in fatigue vulnerable welded connections prior to fatigue-crack initiation...

Alemdar, Fatih

2010-01-01T23:59:59.000Z

239

Seismic vulnerability of older reinforced concrete frame structures in Mid-America  

E-Print Network [OSTI]

This research quantifies the seismic vulnerability of older reinforced concrete frame structures located in Mid-America. After designing a representative three-story gravity load designed reinforced concrete frame structure, a nonlinear analytical...

Beason, Lauren Rae

2004-09-30T23:59:59.000Z

240

U-116: IBM Tivoli Provisioning Manager Express for Software Distribution Multiple Vulnerabilities  

Broader source: Energy.gov [DOE]

Multiple vulnerabilities have been reported in IBM Tivoli Provisioning Manager Express for Software Distribution, which can be exploited by malicious people to conduct SQL injection attacks and compromise a user's system

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Screening vulnerabilities in water supply networks : risk analysis of infrastructure systems  

E-Print Network [OSTI]

The extreme importance of critical infrastructures to modern society is widely known. Recognizing that society cannot afford the costs associated with absolute protection, it is necessary to prioritize the vulnerabilities ...

Michaud, David, 1975-

2005-01-01T23:59:59.000Z

242

A Role for Repressive Histone Methylation in Cocaine-Induced Vulnerability to Stress  

E-Print Network [OSTI]

Substance abuse increases an individual's vulnerability to stress-related illnesses, which is presumably mediated by drug-induced neural adaptations that alter subsequent responses to stress. Here, we identify repressive ...

Covington, Herbert E.

243

Detection of morphological markers of vulnerable atherosclerotic plaque using multimodal spectroscopy  

E-Print Network [OSTI]

Vulnerable plaques, which are responsible for most acute ischemic events, are presently invisible to x-ray angiography. Their primary morphological features include a thin or ulcerated fibrous cap, a large necrotic core, ...

Fitzmaurice, Maryann

244

T-555: Adobe Acrobat and Reader Image Parsing Arbitrary Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

Critical vulnerabilities have been identified in Adobe Reader X (10.0) for Windows and Macintosh; Adobe Reader 9.4.1 and earlier versions for Windows, Macintosh and UNIX; and Adobe Acrobat X (10.0) and earlier versions for Windows and Macintosh. These vulnerabilities could cause the application to crash and potentially allow an attacker to take control of the affected system. Risk for Adobe Reader X users is significantly lower, as none of these issues bypass Protected Mode mitigations.

245

Assessment of chemical vulnerabilities in the Hanford high-level waste tanks  

SciTech Connect (OSTI)

The purpose of this report is to summarize results of relevant data (tank farm and laboratory) and analysis related to potential chemical vulnerabilities of the Hanford Site waste tanks. Potential chemical safety vulnerabilities examined include spontaneous runaway reactions, condensed phase waste combustibility, and tank headspace flammability. The major conclusions of the report are the following: Spontaneous runaway reactions are not credible; condensed phase combustion is not likely; and periodic releases of flammable gas can be mitigated by interim stabilization.

Meacham, J.E. [and others

1996-02-15T23:59:59.000Z

246

T-528: Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities  

Broader source: Energy.gov [DOE]

Mozilla Firefox/Thunderbird/SeaMonkey Multiple HTML Injection Vulnerabilities. Mozilla Firefox, SeaMonkey, and Thunderbird are prone to multiple HTML-injection vulnerabilities. Successful exploits will allow attacker-supplied HTML and script code to run in the context of the affected browser, potentially allowing the attacker to steal cookie-based authentication credentials or to control how the site is rendered to the user. Other attacks are also possible.

247

Defense Attorneys' Perceptions of Competency to Stand Trial Evaluations in Oklahoma: A Second Look.  

E-Print Network [OSTI]

??The purpose of this study was to examine Oklahoma defense attorneys' perceptions of competency to stand trial evaluations. Participants in this study were 47 attorneys… (more)

Graham, Angila

2007-01-01T23:59:59.000Z

248

ALERTEES PAR LA MORT CELLULAIRE, NOS DEFENSES ANTIVIRALES METTENT LE TURBO  

E-Print Network [OSTI]

MORT CELLULAIRE, NOS DEFENSES ANTIVIRALES METTENT LE TURBO Genève, le 9 février 2012 SOUS EMBARGO JUSQU

Loewith, Robbie

249

Tomato-Potato Aphid Interactions: Insights into Plant Defense and the Aphid Pest  

E-Print Network [OSTI]

induced defenses in tomato on the potato aphid, Macrosiphumin arbuscular mycorrhizal potato root colonization. Funct.and behavior of the potato aphid, Macrosiphum euphorbiae.

Atamian, Hagop Sarkis

2012-01-01T23:59:59.000Z

250

An army for the people : the self- defense forces and society in postwar Japan  

E-Print Network [OSTI]

saiban kankei shiry?. SDF-related Newspapers Akashiya.Containing Protest: Anti-SDF Litigation and the Defensethe Self-Defense Forces (SDF), established close ideological

Sasaki, Tomoyuki

2009-01-01T23:59:59.000Z

251

Defense Program Equivalencies for Technical Qualification Standard Competencies12/12/1995  

Broader source: Energy.gov [DOE]

Defense Programs has undertaken an effort to compare the competencies in the GeneralTechnical Base Qualification Standard and the Functional Area Qualification Standards withvarious positions in...

252

An army for the people : the self- defense forces and society in postwar Japan  

E-Print Network [OSTI]

purpose of defense. ” Judge Fukushima, however, stated thatof the base. Judge Fukushima Shigeo argued that tree fellingfiled their lawsuit. Judge Fukushima Shigeo, the same judge

Sasaki, Tomoyuki

2009-01-01T23:59:59.000Z

253

Materials for defense/aerospace applications (NON-SV)  

SciTech Connect (OSTI)

Through this effort, Sandia and Lockheed Martin Aeronautics Company (LM Aero) sought to assess the feasibility of (1) applying special materials to a defense application; (2) developing a piezoelectric-based micro thermophotovoltaic (TPV) cell; and (3) building and delivering a prototype laboratory emission measurement system. This project supported the Stockpile Research & Development Program by contributing to the development of radio frequency (RF) MEMS- and optical MEMS-based components - such as switches, phase shifters, oscillators, and filters - with improved performance and reduced weight and size. Investigation of failure mechanisms and solutions helped to ensure that MEMS-based technology will meet performance requirements and long term reliability goals in the specified environments dictated by Lockheed Martin's commercial and defense applications. The objectives of this project were to (1) fabricate and test materials for military applications; (2) perform a feasibility study of a piezoelectric-based micro TPV cell; and (3) build and deliver a prototype laboratory emission measurement system. Sandia fabricated and tested properties of materials, studied options for manufacturing scale-up, and delivered a prototype IR Emissometer. LM Aero provided material requirements and designs. Both participated in the investigation of attachment methods and environmental effects on material performance, a feasibility study of piezoelectric TPV cells, an investigation and development of new approaches to implement the required material functionality, and analysis and validation of material performance physics, numerical models, and experimental metrology.

Ellis, A. R.

2012-03-01T23:59:59.000Z

254

Defense High-Level Waste Leaching Mechanisms Program. Final report  

SciTech Connect (OSTI)

The Defense High-Level Waste Leaching Mechanisms Program brought six major US laboratories together for three years of cooperative research. The participants reached a consensus that solubility of the leached glass species, particularly solubility in the altered surface layer, is the dominant factor controlling the leaching behavior of defense waste glass in a system in which the flow of leachant is constrained, as it will be in a deep geologic repository. Also, once the surface of waste glass is contacted by ground water, the kinetics of establishing solubility control are relatively rapid. The concentrations of leached species reach saturation, or steady-state concentrations, within a few months to a year at 70 to 90/sup 0/C. Thus, reaction kinetics, which were the main subject of earlier leaching mechanisms studies, are now shown to assume much less importance. The dominance of solubility means that the leach rate is, in fact, directly proportional to ground water flow rate. Doubling the flow rate doubles the effective leach rate. This relationship is expected to obtain in most, if not all, repository situations.

Mendel, J.E. (compiler)

1984-08-01T23:59:59.000Z

255

Unmanned and Unattended Response Capability for Homeland Defense  

SciTech Connect (OSTI)

An analysis was conducted of the potential for unmanned and unattended robotic technologies for forward-based, immediate response capabilities that enables access and controlled task performance. The authors analyze high-impact response scenarios in conjunction with homeland security organizations, such as the NNSA Office of Emergency Response, the FBI, the National Guard, and the Army Technical Escort Unit, to cover a range of radiological, chemical and biological threats. They conducted an analysis of the potential of forward-based, unmanned and unattended robotic technologies to accelerate and enhance emergency and crisis response by Homeland Defense organizations. Response systems concepts were developed utilizing new technologies supported by existing emerging threats base technologies to meet the defined response scenarios. These systems will pre-position robotic and remote sensing capabilities stationed close to multiple sites for immediate action. Analysis of assembled systems included experimental activities to determine potential efficacy in the response scenarios, and iteration on systems concepts and remote sensing and robotic technologies, creating new immediate response capabilities for Homeland Defense.

BENNETT, PHIL C.

2002-11-01T23:59:59.000Z

256

Defense waste vitrification studies during FY-1981. Summary report  

SciTech Connect (OSTI)

Both simulated alkaline defense wastes and simulated acidic defense wastes (formed by treating alkaline waste with formic acid) were successfully vitrified in direct liquid-fed melter experiments. The vitrification process was improved while using the formate-treated waste. Leach resistance was essentially the same. Off-gas entrainment was the primary mechanism for material exiting the melter. When formate waste was vitrified, the flow behavior of the off gas from the melter changed dramatically from an erratic surging behavior to a more quiet, even flow. Hydrogen and CO were detectable while processing formate feed; however, levels exceeding the flamability limits in air were never approached. Two types of melter operation were tested during the year, one involving boost power. Several boosting methods located within the melter plenum were tested. When lid heating was being used, water spray cooling in the off gas was required. Countercurrent spray cooling was more effective than cocurrent spray cooling. Materials of construction for the off-gas system were examined. Inconel-690 is preferred in the plenum area. Inspection of the pilot-scale melter found that corrosion of the K-3 refractory and Inconel-690 electrodes was minimal. An overheating incident occurred with the LFCM in which glass temperatures up to 1480/sup 0/C were experienced. Lab-scale vitrification tests to study mercury behavior were also completed this year. 53 figures, 63 tables.

Bjorklund, W.J. (comp.)

1982-09-01T23:59:59.000Z

257

An approach to determine a defensible spent fuel ratio.  

SciTech Connect (OSTI)

Sabotage of spent nuclear fuel casks remains a concern nearly forty years after attacks against shipment casks were first analyzed and has a renewed relevance in the post-9/11 environment. A limited number of full-scale tests and supporting efforts using surrogate materials, typically depleted uranium dioxide (DUO2), have been conducted in the interim to more definitively determine the source term from these postulated events. In all the previous studies, the postulated attack of greatest interest was by a conical shape charge (CSC) that focuses the explosive energy much more efficiently than bulk explosives. However, the validity of these large-scale results remain in question due to the lack of a defensible Spent Fuel Ratio (SFR), defined as the amount of respirable aerosol generated by an attack on a mass of spent fuel compared to that of an otherwise identical DUO2 surrogate. Previous attempts to define the SFR have resulted in estimates ranging from 0.42 to 12 and include suboptimal experimental techniques and data comparisons. Different researchers have suggested using SFR values of 3 to 5.6. Sound technical arguments exist that the SFR does not exceed a value of unity. A defensible determination of the SFR in this lower range would greatly reduce the calculated risk associated with the transport and dry storage of spent nuclear fuel. Currently, Oak Ridge National Laboratory (ORNL) is in possession of several samples of spent nuclear fuel (SNF) that were used in the original SFR studies in the 1980's and were intended for use in a modern effort at Sandia National Laboratories (SNL) in the 2000's. A portion of these samples are being used for a variety of research efforts. However, the entirety of SNF samples at ORNL is scheduled for disposition at the Waste Isolation Pilot Plant (WIPP) by approximately the end of 2015. If a defensible SFR is to be determined for use in storage and transportation security analyses, the need to begin this effort is urgent in order to secure the only known available SNF samples with a clearly defined path to disposal.

Durbin, Samuel G.; Lindgren, Eric Richard

2014-03-01T23:59:59.000Z

258

Comments of the Renewable Northwest Project And the Natural Resources Defense Council  

E-Print Network [OSTI]

Comments of the Renewable Northwest Project And the Natural Resources Defense Council, 2004 The Renewable Northwest Project (RNP) and the Natural Resources Defense Council (NRDC) appreciate to the recommendations on renewable resources. We agree with many of the comments submitted by the NW Energy coalition

259

Cross-Layer Attack and Defense in Cognitive Radio Networks Wenkai Wang and Yan (Lindsay) Sun  

E-Print Network [OSTI]

Cross-Layer Attack and Defense in Cognitive Radio Networks Wenkai Wang and Yan (Lindsay) Sun ECE research on security issues in cognitive radio networks mainly focuses on attack and defense in individual network layers. However, the attackers do not necessarily restrict themselves within the boundaries

Sun, Yan Lindsay

260

Defense programs industrial partnerships at Los Alamos National Laboratory  

SciTech Connect (OSTI)

The US Department of Energy`s Defense Programs face unprecedented challenges of stewardship for an aging nuclear stockpile, cessation of nuclear testing, reduced federal budgets, and a smaller manufacturing complex. Partnerships with industry are essential in developing technology, modernizing the manufacturing complex, and maintaining the safety and reliability of the nation`s nuclear capability. The past decade of federal support for industrial partnerships has promoted benefits to US industrial competitiveness. Recent shifts in government policy have re-emphasized the importance of industrial partnerships in accomplishing agency missions. Nevertheless, abundant opportunities exist for dual-benefit, mission-driven partnerships between the national laboratories and industry. Experience at Los Alamos National Laboratory with this transition is presented.

Freese, K.B. [Los Alamos National Lab., NM (United States). Industrial Partnership Office

1996-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Defensive Investments and the Demand for Air Quality: Evidence from the NOx Budget Program and Ozone Reductions  

E-Print Network [OSTI]

Willingness to pay for air quality is a function of health and the costly defensive investments that contribute to health, but there is little research assessing the empirical importance of defensive investments. The setting ...

Deschęnes, Olivier

262

U-148: ActiveScriptRuby GRScript18.dll ActiveX Control Ruby Code Execution Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to an error in GRScript18.dll and can be exploited to execute arbitrary Ruby commands.

263

Environmental management requirements/defensible costs project. Final report  

SciTech Connect (OSTI)

Lockheed Idaho Technologies Company (LITCO) used a systems engineering approach to develop the first formal requirements baseline for Idaho National Engineering Laboratory (INEL) Environmental Management (EM) Programs. The recently signed Settlement Agreement with the State of Idaho (Batt Agreement), along with dramatically reduced EM funding targets from Department of Energy (DOE) headquarters, drove the immediacy of this effort. Programs have linked top-level requirements to work scope to cost estimates. All EM work, grouped by decision units, was scrubbed by INEL EM programs and by an independent {open_quotes}Murder Board.{close_quotes} Direct participation of upper level management from LITCO and the DOE-Idaho Operations Office ensured best information and decisions. The result is a scrubbed down, defensible budget tied to top-level requirements for use in the upcoming DOE-Headquarters` budget workout, the Internal Review Board, the FY98 Activity Data Sheets submittal, and preparation of the FY97 control accounts and out-year plans. In addition to the remarkable accomplishments during the past eight weeks, major issues were identified and documented and follow-on tasks are underway which will lead to further improvements in INEL EM program management.

NONE

1996-02-01T23:59:59.000Z

264

Accident Fault Trees for Defense Waste Processing Facility  

SciTech Connect (OSTI)

The purpose of this report is to document fault tree analyses which have been completed for the Defense Waste Processing Facility (DWPF) safety analysis. Logic models for equipment failures and human error combinations that could lead to flammable gas explosions in various process tanks, or failure of critical support systems were developed for internal initiating events and for earthquakes. These fault trees provide frequency estimates for support systems failures and accidents that could lead to radioactive and hazardous chemical releases both on-site and off-site. Top event frequency results from these fault trees will be used in further APET analyses to calculate accident risk associated with DWPF facility operations. This report lists and explains important underlying assumptions, provides references for failure data sources, and briefly describes the fault tree method used. Specific commitments from DWPF to provide new procedural/administrative controls or system design changes are listed in the ''Facility Commitments'' section. The purpose of the ''Assumptions'' section is to clarify the basis for fault tree modeling, and is not necessarily a list of items required to be protected by Technical Safety Requirements (TSRs).

Sarrack, A.G.

1999-06-22T23:59:59.000Z

265

Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS).  

SciTech Connect (OSTI)

Sandia National Laboratories was tasked with developing the Defense Nuclear Material Stewardship Integrated Inventory Information Management System (IIIMS) with the sponsorship of NA-125.3 and the concurrence of DOE/NNSA field and area offices. The purpose of IIIMS was to modernize nuclear materials management information systems at the enterprise level. Projects over the course of several years attempted to spearhead this modernization. The scope of IIIMS was broken into broad enterprise-oriented materials management and materials forecasting. The IIIMS prototype was developed to allow multiple participating user groups to explore nuclear material requirements and needs in detail. The purpose of material forecasting was to determine nuclear material availability over a 10 to 15 year period in light of the dynamic nature of nuclear materials management. Formal DOE Directives (requirements) were needed to direct IIIMS efforts but were never issued and the project has been halted. When restarted, duplicating or re-engineering the activities from 1999 to 2003 is unnecessary, and in fact future initiatives can build on previous work. IIIMS requirements should be structured to provide high confidence that discrepancies are detected, and classified information is not divulged. Enterprise-wide materials management systems maintained by the military can be used as overall models to base IIIMS implementation concepts upon.

Aas, Christopher A.; Lenhart, James E.; Bray, Olin H.; Witcher, Christina Jenkin

2004-11-01T23:59:59.000Z

266

Long-range master plan for defense transuranic waste management  

SciTech Connect (OSTI)

The Long Range Master Plan for the Defense Transuranic Waste Program (DTWP), or ''Master Plan,'' details current TRU waste management plans and serves as a framework for the DTWP. Not all final decisions concerning activities presented in the Master Plan have been made (e.g., land withdrawal legislation, the WIPP Compliance and Operational Plan and the TRUPACT Certificate of Compliance). It is the goal of the DTWP to end interim storage and achieve permanent disposal of TRU waste. To accomplish this goal, as much TRU waste as possible will be certified to meet the WIPP Acceptance Criteria (WAC). The certified waste will then be disposed of at WIPP. The small quantity of waste which is not practical to certify will be disposed of via alternative methods that require DOE Headquarters approval and shall comply with the National Environmental Policy Act requirements and EPA/State Regulations. The definition of TRU waste is ''without regard to source or form, waste that is contaminated with alpha-emitting transuranium radionuclides with half-lives greater than 20 years and concentrations greater than 100 nanocuries/gram (nCi/g) at the time of assay. Heads of Field Elements can determine that other alpha contaminated wastes, peculiar to a specific site, must be managed as transuranic waste.''

Not Available

1988-12-01T23:59:59.000Z

267

Cognitive decision errors and organization vulnerabilities in nuclear power plant safety management: Modeling using the TOGA meta-theory framework  

SciTech Connect (OSTI)

In the field of nuclear power plant (NPP) safety modeling, the perception of the role of socio-cognitive engineering (SCE) is continuously increasing. Today, the focus is especially on the identification of human and organization decisional errors caused by operators and managers under high-risk conditions, as evident by analyzing reports on nuclear incidents occurred in the past. At present, the engineering and social safety requirements need to enlarge their domain of interest in such a way to include all possible losses generating events that could be the consequences of an abnormal state of a NPP. Socio-cognitive modeling of Integrated Nuclear Safety Management (INSM) using the TOGA meta-theory has been discussed during the ICCAP 2011 Conference. In this paper, more detailed aspects of the cognitive decision-making and its possible human errors and organizational vulnerability are presented. The formal TOGA-based network model for cognitive decision-making enables to indicate and analyze nodes and arcs in which plant operators and managers errors may appear. The TOGA's multi-level IPK (Information, Preferences, Knowledge) model of abstract intelligent agents (AIAs) is applied. In the NPP context, super-safety approach is also discussed, by taking under consideration unexpected events and managing them from a systemic perspective. As the nature of human errors depends on the specific properties of the decision-maker and the decisional context of operation, a classification of decision-making using IPK is suggested. Several types of initial situations of decision-making useful for the diagnosis of NPP operators and managers errors are considered. The developed models can be used as a basis for applications to NPP educational or engineering simulators to be used for training the NPP executive staff. (authors)

Cappelli, M. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Gadomski, A. M. [ECONA, Centro Interuniversitario Elaborazione Cognitiva Sistemi Naturali e Artificiali, via dei Marsi 47, Rome (Italy); Sepiellis, M. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Wronikowska, M. W. [UTFISST, ENEA Casaccia, via Anguillarese 301, Rome (Italy); Poznan School of Social Sciences (Poland)

2012-07-01T23:59:59.000Z

268

The Potential Role of Optical Coherence Tomography in the Evaluation of Vulnerable Carotid Atheromatous Plaques: A Pilot Study  

SciTech Connect (OSTI)

Purpose. The decision to intervene surgically in patients with carotid artery disease is based on the presence of symptoms, along with the severity of carotid artery stenosis as assessed by ultrasound or X-ray computed tomography (CT). Optical coherence tomography (OCT) is a relatively new imaging technique that offers potential in the identification of, as well as the distinction between, stable and unstable atherosclerotic plaques. The purpose of our study was to evaluate whether OCT can be used as a noninvasive diagnostic tool to reveal the morphology of carotid stenosis from the adventitial surface of the carotid artery. To achieve this aim, excised atheromatous plaques were scanned by OCT from the external surface. Methods. Plaques removed at carotid endarterectomy were scanned by OCT from the external surface within 72 hr of surgery and then examined histologically. The images of the histologic slides and the scans were then compared. Results. We examined 10 carotid endarterectomy specimens and were able to identify calcification, cholesterol crystal clefts, and lipid deposits in the OCT images with histologic correlation. The strong light scattering from the calcified tissue and cholesterol crystal clefts limited the depth of light penetration, making observation of the intimal surface and the detail of the fibrous cap difficult. However, we were able to confidently identify the absence of an atherosclerotic plaque by OCT scans even from the external surface. Conclusion. The results of this pilot study demonstrate that OCT can reveal the main features of carotid stenosis but that plaque vulnerability cannot be reliably and precisely assessed if scanned from the external surface with OCT in its present form.

Prabhudesai, Vikramaditya [St. Joseph's Hospital, Diagnostic Imaging (Canada); Phelan, Cordelia [University Hospital of North Staffordshire, NHS Trust, Department of Pathology (United Kingdom); Yang, Ying [Institute of Science and Technology in Medicine, Keele University (United Kingdom)], E-mail: bea00@keele.ac.uk; Wang, Ruikang K. [Oregon Health and Science University, Department of Biomedical Engineering (United States); Cowling, Mark G. [University Hospital of North Staffordshire, NHS Trust, Department of Radiology (United Kingdom)

2006-12-15T23:59:59.000Z

269

29.01.03.M1.01 Network Scanning and Vulnerability Assessments Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE  

E-Print Network [OSTI]

29.01.03.M1.01 Network Scanning and Vulnerability Assessments Page 1 of 3 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.01 Network Scanning and Vulnerability Assessments Approved October 1, 2002 Revised review: August 14, 2016 Statement and Reason for Standard Administrative Procedure The purpose

270

Vulnerability of the New York City Metropolitan Area to Coastal Hazards,  

E-Print Network [OSTI]

Trade Center site in Lower Manhattan, and of the Brooklyn water- front, long home to the former Brooklyn-Level Rise: Inferences for Urban Coastal Risk Management and Adaptation Policies Klaus Jacob, Vivien Gornitz at or near sea level. Major coastal urban centers have long been vulnerable to natural hazards, such as storm

271

educating | innovating | transforming | advocating | strengthening vulnerable families social workuniversity of illinois at urbana-champaign  

E-Print Network [OSTI]

educating | innovating | transforming | advocating | strengthening vulnerable families social innovative efforts and collaborations are having on the lives of people in need. Whose lives? Those of · Low to work through the social barriers hindering the project. "We needed to gain trust from the local

Gilbert, Matthew

272

Secure Fragment Allocation in a Distributed Storage System with Heterogeneous Vulnerabilities  

E-Print Network [OSTI]

Secure Fragment Allocation in a Distributed Storage System with Heterogeneous Vulnerabilities Yun--There is a growing demand for large-scale dis- tributed storage systems to support resource sharing and fault attention has yet been paid to security solutions designed for distributed storage systems

Qin, Xiao

273

U-199: Drupal Drag & Drop Gallery Module Arbitrary File Upload Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to the sites/all/modules/dragdrop_gallery/upload.php script improperly validating uploaded files, which can be exploited to execute arbitrary PHP code by uploading a PHP file with e.g. an appended ".gif" file extension.

274

Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste  

E-Print Network [OSTI]

Title: Climate Change Vulnerability and Adaptation Options for Coastal Communities in Timor-Leste Summary Climate change is a major global challenge, particularly for world's coastal communities in low 2008, Kelman & West 2009, Veitayaki 2010). Within these regions, climate change impacts are already

275

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard  

E-Print Network [OSTI]

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard #3; May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC

276

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard  

E-Print Network [OSTI]

Vulnerability of SSL to Chosen-Plaintext Attack Gregory V. Bard May 11, 2004 Abstract The Secure Sockets Layer (SSL) protocol is widely used for securing communication over the Internet. When utilizing block ciphers for encryption, the SSL standard mandates the use of the cipher block chaining (CBC) mode

277

Vulnerability of national economies to the impacts of climate change on fisheries  

E-Print Network [OSTI]

economies and diets, and limited societal capacity to adapt to potential impacts and opportunities. Many the world's poorest and twice as reliant on fish, which provides 27% of dietary protein compared to 13 but lack the capacity to adapt. Keywords Adaptation, climate change, fisheries, poverty, vulnerability

Reynolds, John D.

278

T-527: OpenSC Smart Card Serial Number Multiple Buffer Overflow Vulnerabilities  

Broader source: Energy.gov [DOE]

OpenSC is prone to multiple buffer-overflow vulnerabilities because the application fails to perform adequate boundary checks on user-supplied input. Attackers may leverage these issues to execute arbitrary code in the context of the application. Failed attacks will cause denial-of-service conditions.

279

Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin and Laurie Williams  

E-Print Network [OSTI]

Can Fault Prediction Models and Metrics be Used for Vulnerability Prediction? Yonghee Shin to prioritize security inspection and testing efforts may be better served by a prediction model that indicates commonalities that may allow development teams to use traditional fault prediction models and metrics

Young, R. Michael

280

Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Daz-Ramrez  

E-Print Network [OSTI]

Detection of Vulnerable Road Users in Smart Cities Francisco Guayante, Arnoldo Díaz. In order to cope with the problems of the growing urban communities, the concept of smart cities has emerged. A smart city is based on the use of smart computing technologies, such as Intelligent

Mejia-Alvarez, Pedro

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Seismic vulnerability assessment to slight dam-age based on experimental modal parameters  

E-Print Network [OSTI]

Seismic vulnerability assessment to slight dam- age based on experimental modal parameters Clotaire Federal Institute of Technology, Zuerich, Switzerland. Michel C., Gueguen P., Causse M. 2011. Seismic higher modes and full seismic ground motion, (2) using a single-degree of freedom model considering

Paris-Sud XI, Université de

282

PHS 650-section 052: Healthcare Quality Improvement and Evaluation for Vulnerable Populations  

E-Print Network [OSTI]

can contribute to global health system reform and realization of the Millennium Development Goals. II. Learning Objectives To understand how quality health care has been defined and implemented with vulnerable health care quality" BMJ 2004; 328: 1124-9 Bloom BS. "Crossing the quality chasm: a new health system

Sheridan, Jennifer

283

Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous-Reliability Memory  

E-Print Network [OSTI]

Characterizing Application Memory Error Vulnerability to Optimize Datacenter Cost via Heterogeneous--Memory devices represent a key component of datacenter total cost of ownership (TCO), and techniques used, we make three main con- tributions to enable highly-reliable servers at low datacenter cost. First

Mutlu, Onur

284

American Journal of Botany 87(9): 12871299. 2000. VULNERABILITY TO XYLEM CAVITATION AND THE  

E-Print Network [OSTI]

1287 American Journal of Botany 87(9): 1287­1299. 2000. VULNERABILITY TO XYLEM CAVITATION to evaluate how the limitation of xylem pressure ( x) by cavitation corresponded with plant distribution along xylem, which shows the decrease in hydraulic conductance from cavitation as a function of x and the crit

Pockman, William T.

285

International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities and Solutions  

E-Print Network [OSTI]

International Journal of Smart Grid and Clean Energy Smart Grid Security: Threats, Vulnerabilities is currently evolving into the smart grid. Smart grid integrates the traditional electrical power grid, controlling and managing the demands of customers. A smart grid is a huge complex network composed of millions

Aloul, Fadi

286

Spatial Modelling with Geographic Information Systems for Determination of Water Resources Vulnerability  

E-Print Network [OSTI]

(river or well). This method is based on spatial analysis tools integrated in Geographical Information is proposed. The vulnerability of a water resource is defined as the risk that the resource will become (rivers or aquifers) against pollution is an important challenge for decision- makers in water resources

Paris-Sud XI, Université de

287

Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia  

E-Print Network [OSTI]

Educational Access i Educational Access for Orphans and Vulnerable Children in Woliso, Ethiopia ABSTRACT The appalling rise in the number of orphans in Ethiopia has reached epidemic proportions. The United Nations Fund-Ethiopia (2007) estimates there are 4.6 million orphaned children, 85 % of which do

Scheel, David

288

1900 CROP SCIENCE, VOL. 44, NOVEMBERDECEMBER 2004 Reducing the Genetic Vulnerability of Cotton  

E-Print Network [OSTI]

1900 CROP SCIENCE, VOL. 44, NOVEMBER­DECEMBER 2004 Reducing the Genetic Vulnerability of Cotton. Lloyd May, and C. Wayne Smith change in cotton yields has steadily declined since 1985. The u.s. cotton (Gossypium spp.) production system By 1998, absolute cotton yields (not just the rate ofexemplifies

Chee, Peng W.

289

Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices  

E-Print Network [OSTI]

Vulnerability Analysis of a Nuclear Power Plant Considering Detonations of Explosive Devices Marko threats to a nuclear power plant in the year 1991 and after the 9/11 events in 2001. The methodology which strength and injuries of human beings with nuclear power plant models used in probabilistic safety

Cizelj, Leon

290

Vulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1  

E-Print Network [OSTI]

and smallmouth bass is low, especially in the presence of an alternative fish prey. Introduction SturgeonVulnerability of age-0 pallid sturgeon Scaphirhynchus albus to fish predation By W. E. French1 , B, Brookings, SD, USA; 2 USGS South Dakota Cooperative Fish & Wildlife Research Unit, Department of Wildlife

291

Proline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass  

E-Print Network [OSTI]

'. an estimated largemouth bass density of 84 fish/ha and a biomass of 33.6 kg/ha. Knox Pond. a 1.3·ha private largemouth bass less than 200 rom long. but did not estimate their number. Marked fish were releasedProline Nal. 22(2):107-112. 1990. Vulnerability of Largemouth Bass to Angling in Two Small South

292

Experimental Studies of Vulnerabilities in Devices and On-Chip Protection  

E-Print Network [OSTI]

Experimental Studies of Vulnerabilities in Devices and On-Chip Protection Agis A. Iliadis effects on the fundamental units of IC circuits, ie individual devices (MOSFETs) and gates (CMOS Inverters MOSFET devices as on-chip sensing and protecting elements. · Develop on-chip sensing, registration

Anlage, Steven

293

Centrality and vulnerability in liner shipping networks: revisiting the Northeast Asian port hierarchy  

E-Print Network [OSTI]

1 Centrality and vulnerability in liner shipping networks: revisiting the Northeast Asian port@parisgeo.cnrs.fr Sung-Woo LEE Korea Maritime Institute Shipping, Port & Logistics Research Department KBS media Center: revisiting the Northeast Asian port hierarchy Abstract This paper is essentially an empirical investigation

Paris-Sud XI, Université de

294

E-Print Network 3.0 - antifungal chemical defense Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Sciences and Ecology 46 Pain relievers Acetaminophen (compare to Tylenol Summary: cough drops 64 Halls Defense cough drops with Vitamin C 1.66 NyQuil 6 oz. 4......

295

Design for affordability in defense and aerospace systems using tradespace-based methods  

E-Print Network [OSTI]

Program failures have plagued the defense and aerospace industry for decades, as unanticipated cost and schedule overruns have rendered the development of systems ineffective in terms of time and cost considerations. This ...

Wu, Marcus Shihong

2014-01-01T23:59:59.000Z

296

Defense acquisition program manager as program leader : improving program outcomes through key competencies and relationship management  

E-Print Network [OSTI]

The US defense acquisition system is a massive enterprise charged with developing and acquiring state-of-the-art military technology and systems. For the past 65 years, many broad-reaching studies and commissions have ...

Baumann, B. Marc

2013-01-01T23:59:59.000Z

297

Feasibility of very deep borehole disposal of US nuclear defense wastes  

E-Print Network [OSTI]

This thesis analyzes the feasibility of emplacing DOE-owned defense nuclear waste from weapons production into a permanent borehole repository drilled ~4 km into granite basement rock. Two canister options were analyzed ...

Dozier, Frances Elizabeth

2011-01-01T23:59:59.000Z

298

The Insanity of the Mens Rea Model: Due Process and the Abolition of the Insanity Defense  

E-Print Network [OSTI]

In the last 15 years a flurry of legislative activity has taken place as states have attempted to redefine the insanity defense. This article focuses on those states who chose not just to refine the definition of insanity, ...

Gilles Phillips, Jean K.; Woodman, Rebecca E.

2007-01-01T23:59:59.000Z

299

E-Print Network 3.0 - article defense department Sample Search...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

of Theoretical Biology 245 (2007) 595596 Letter to the editor Summary: of defenses of the tree, then trees with bright leaves may avoid being colonised by insects (for example......

300

Higher Education and China’s Defense Science and Technology Establishment  

E-Print Network [OSTI]

People’s Liberation Army (PLA) to better prepare to fightindustry. Second, the PLA has more than 60 universitiesof Defense Technology, the PLA’s premier univer- sity for

ALDERMAN, Daniel

2015-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

China’s Defense High-Tech Leadership: Implications for S&T Innovation  

E-Print Network [OSTI]

People’s Liberation Army (PLA) has sought to establish anthe most senior body in the PLA and advises on high-tech andfuture defense innovation that the PLA needs. The Study of

Hagt, Eric

2011-01-01T23:59:59.000Z

302

China's Second Ballistic Missile Defense Test: A Search for Strategic Stability  

E-Print Network [OSTI]

of_Conduct.pdf. Study of Innovation and Technology in Chinabut preliminary step in China’s missile defense program.Warning Satellites. ” 18 “China Warns of Response to U.S.

POLLPETER, Kevin

2013-01-01T23:59:59.000Z

303

Building flexibility in the volatile aftermarket parts : supply chains of the defense aerospace industry  

E-Print Network [OSTI]

Within the Integrated Defense Systems of The Boeing Company, aftermarket support of military aircraft serves as an increasingly large source of revenue. One of the newest contracts between Boeing and the U.S. Government ...

Myers, Kevin Michael

2007-01-01T23:59:59.000Z

304

Energy Vulnerability Assessment for the US Pacific Islands. Technical Appendix 2  

SciTech Connect (OSTI)

The study, Energy Vulnerability Assessment of the US Pacific Islands, was mandated by the Congress of the United States as stated in House Resolution 776-220 of 1992, Section 1406. The resolution states that the US Secretary of Energy shall conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption. Such study shall outline how the insular areas shall gain access to vital oil supplies during times of national emergency. The resolution defines insular areas as the US Virgin Islands, Puerto Rico, Guam, American Samoa, the Commonwealth of the Northern Mariana Islands, and Palau. The US Virgin Islands and Puerto Rico are not included in this report. The US Department of Energy (USDOE) has broadened the scope of the study contained in the House Resolution to include emergency preparedness and response strategies which would reduce vulnerability to an oil supply disruption as well as steps to ameliorate adverse economic consequences. This includes a review of alternative energy technologies with respect to their potential for reducing dependence on imported petroleum. USDOE has outlined the four tasks of the energy vulnerability assessment as the following: (1) for each island, determine crude oil and refined product demand/supply, and characterize energy and economic infrastructure; (2) forecast global and regional oil trade flow patterns, energy demand/supply, and economic activities; (3) formulate oil supply disruption scenarios and ascertain the general and unique vulnerabilities of these islands to oil supply disruptions; and (4) outline emergency preparedness and response options to secure oil supplies in the short run, and reduce dependence on imported oil in the longer term.

Fesharaki, F.; Rizer, J.P.; Greer, L.S.

1994-05-01T23:59:59.000Z

305

Demonstration of Natural Gas Engine Driven Air Compressor Technology at Department of Defense Industrial Facilities  

E-Print Network [OSTI]

of incorporating the NGEDAC performance data directly into their overall energy management control system. All Army industrial installations will be screened for technology application. Technology transfer will be coordinated with Air Force, Navy, and Defense... Technology & Management Paul A. Wenner Laboratory Services, Inc. XENERGY, Inc. Champaign, Illinois Gaithersburg, Maryland Worthington, Ohio ABSTRACT Recent downsizing and consolidation of Department of Defense (DOD) facilities provides an opportunity...

Lin, M.; Aylor, S. W.; Van Ormer, H.

306

Defense Waste Processing Facility wasteform and canister description: Revision 2  

SciTech Connect (OSTI)

This document describes the reference wasteform and canister for the Defense Waste Processing Facility (DWPF). The principal changes include revised feed and glass product compositions, an estimate of glass product characteristics as a function of time after the start of vitrification, and additional data on glass leaching performance. The feed and glass product composition data are identical to that described in the DWPF Basic Data Report, Revision 90/91. The DWPF facility is located at the Savannah River Plant in Aiken, SC, and it is scheduled for construction completion during December 1989. The wasteform is borosilicate glass containing approximately 28 wt % sludge oxides, with the balance consisting of glass-forming chemicals, primarily glass frit. Borosilicate glass was chosen because of its stability toward reaction with potential repository groundwaters, its relatively high ability to incorporate nuclides found in the sludge into the solid matrix, and its reasonably low melting temperature. The glass frit contains approximately 71% SiO/sub 2/, 12% B/sub 2/O/sub 3/, and 10% Na/sub 2/O. Tests to quantify the stability of DWPF waste glass have been performed under a wide variety of conditions, including simulations of potential repository environments. Based on these tests, DWPF waste glass should easily meet repository criteria. The canister is filled with about 3700 lb of glass which occupies 85% of the free canister volume. The filled canister will generate approximately 690 watts when filled with oxides from 5-year-old sludge and precipitate from 15-year-old supernate. The radionuclide activity of the canister is about 233,000 curies, with an estimated radiation level of 5600 rad/hour at the canister surface. 14 figs., 28 tabs.

Baxter, R.G.

1988-12-01T23:59:59.000Z

307

Sarkar, Papiya "Solid Waste Management In Delhi A Social Vulnerability Study" in Martin J. Bunch, V. Madha Suresh and T. Vasantha Kumaran, eds., Proceedings of the Third  

E-Print Network [OSTI]

1 Sarkar, Papiya "Solid Waste Management In Delhi ­ A Social Vulnerability Study" in Martin J IN DELHI ­ A SOCIAL VULNERABILITY STUDY Papiya Sarkar· Toxics Link, New Delhi, India. Abstract Management

Columbia University

308

PINS Spectrum Identification Guide  

SciTech Connect (OSTI)

The Portable Isotopic Neutron Spectroscopy—PINS, for short—system identifies the chemicals inside munitions and containers without opening them, a decided safety advantage if the fill chemical is a hazardous substance like a chemical warfare agent or an explosive. The PINS Spectrum Identification Guide is intended as a reference for technical professionals responsible for the interpretation of PINS gamma-ray spectra. The guide is divided into two parts. The three chapters that constitute Part I cover the science and technology of PINS. Neutron activation analysis is the focus of Chapter 1. Chapter 2 explores PINS hardware, software, and related operational issues. Gamma-ray spectral analysis basics are introduced in Chapter 3. The six chapters of Part II cover the identification of PINS spectra in detail. Like the PINS decision tree logic, these chapters are organized by chemical element: phosphorus-based chemicals, chlorine-based chemicals, etc. These descriptions of hazardous, toxic, and/or explosive chemicals conclude with a chapter on the identification of the inert chemicals, e.g. sand, used to fill practice munitions.

A.J. Caffrey

2012-03-01T23:59:59.000Z

309

Planning for Water Scarcity: The Vulnerability of the Laguna Region, Mexico  

E-Print Network [OSTI]

this problem, a combination of quantitative and qualitative techniques were used. A systems theory simulation model was used to measure the economic vulnerability of the main agricultural products at different scenarios of water volume in the aquifer.... Statistical analyses were used to support the results of the quantitative assessments. The results of the simulation model showed a significant impact on economic production given different scenarios of water volume and of higher probabilities of droughts...

Sanchez Flores, Maria Del Rosario

2010-10-12T23:59:59.000Z

310

Children with disabilities in the context of disaster: A social vulnerability perspective  

E-Print Network [OSTI]

draw on empirical studies from disaster researchers and focus on the adverse physical, psychological, and educational vulnera- bilities that children with disabilities may experi- ence in the context of disaster. We conclude with a discussion... of the theory of resilience as it per- tains to children with disabilities in disaster and outline additional research needs. Social Vulnerability and Disaster Historically, disasters have been viewed as random events that cause indiscriminate losses and suffer...

Stough, Laura

2010-01-01T23:59:59.000Z

311

Management response plan for the Chemical Safety Vulnerability Working Group report. Volume 1  

SciTech Connect (OSTI)

The Chemical Safety Vulnerability (CSV) Working Group was established to identify adverse conditions involving hazardous chemicals at DOE facilities that might result in fires or explosions, release of hazardous chemicals to the environment, or exposure of workers or the public to chemicals. A CSV Review was conducted in 146 facilities at 29 sites. Eight generic vulnerabilities were documented related to: abandoned chemicals and chemical residuals; past chemical spills and ground releases; characterization of legacy chemicals and wastes; disposition of legacy chemicals; storage facilities and conditions; condition of facilities and support systems; unanalyzed and unaddressed hazards; and inventory control and tracking. Weaknesses in five programmatic areas were also identified related to: management commitment and planning; chemical safety management programs; aging facilities that continue to operate; nonoperating facilities awaiting deactivation; and resource allocations. Volume 1 contains a discussion of the chemical safety improvements planned or already underway at DOE sites to correct facility or site-specific vulnerabilities. The main part of the report is a discussion of each of the programmatic deficiencies; a description of the tasks to be accomplished; the specific actions to be taken; and the organizational responsibilities for implementation.

Not Available

1994-09-01T23:59:59.000Z

312

Insular Area energy vulnerability, Puerto Rico, US Virgin Islands. Technical Appendix 1  

SciTech Connect (OSTI)

This report was prepared in response to Section 1406 of the Energy Policy Act of 1992 (P.L. 192-486). The Act directed the Department of Energy (DOE) to ``conduct a study of the implications of the unique vulnerabilities of the insular areas to an oil supply disruption,`` and to ``outline how the insular areas shall gain access to vital oil supplies during times of national emergency.`` The Act defines the insular areas to be the US Virgin Islands and Puerto Rico in the Caribbean, and Guam, American Samoa, the Commonwealth of the Northern Mariana Islands (CNMI), and Palau in the Pacific. This report is the analysis of Puerto Rico and the US Virgin Islands. In the study, ``unique vulnerabilities`` were defined as susceptibility to: (1) more frequent or more likely interruptions of oil supplies compared to the mainland, and/or (2) disproportionately larger or more likely economic losses in the event of an oil supply disruption. In order to asses unique vulnerabilities, the study examined in the insular areas` experience during past global disruptions of oil supplies and during local emergencies caused by natural disasters. The effects of several possible future global disruptions and local emergencies were also analyzed. Analyses were based on historical data, simulations using energy and economic models, and interviews with officials in the insular governments and the energy industry.

Stern, M.; Willard, E.E.; Efferding, S. [Ensys Energy & Systems, Inc., Flemington, NJ (United States)

1994-05-01T23:59:59.000Z

313

Vulnerability of larval and juvenile white sturgeon to barotrauma: can they handle the pressure?  

SciTech Connect (OSTI)

Techniques were developed to determine which life stages of fish are vulnerable to barotrauma from expansion of internal gases during decompression. Eggs, larvae and juvenile hatchery-reared white sturgeon (Acipenser transmontanus; up to 91 days post hatch; dph), were decompressed to assess vulnerability to barotrauma and identify initial swim bladder inflation. Barotrauma related injury and mortality were first observed 9 dph, on the same day as initial exogenous feeding. However, barotrauma related injury did not occur again until swim bladder inflation 75 dph (visible from necropsy and x-ray radiographs). Swim bladder inflation was not consistent among individuals, with only 44% being inflated 91 dph. Additionally, swim bladder inflation did not appear to be size dependent among fish ranging in total length from 61-153 mm at 91 dph. The use of a combination of decompression tests and x-ray radiography was validated as a method to determine initial swim bladder inflation and vulnerability to barotrauma. Extending these techniques to other species and life history stages would help to determine fish susceptibility to hydroturbine passage and aid in fish conservation.

Brown, Richard S.; Cook, Katrina V.; Pflugrath, Brett D.; Rozeboom, Latricia L.; Johnson, Rachelle C.; McLellan, Jason; Linley, Timothy J.; Gao, Yong; Baumgartner, Lee J.; Dowell, Frederick E.; Miller, Erin A.; White, Timothy A.

2013-07-01T23:59:59.000Z

314

Crucial role of detailed function, task, timeline, link and human vulnerability analyses in HRA  

SciTech Connect (OSTI)

This paper addresses one major cause for large uncertainties in human reliability analysis (HRA) results, that is, an absence of detailed function, task, timeline, link and human vulnerability analyses. All too often this crucial step in the HRA process is done in a cursory fashion using word of mouth or written procedures which themselves may incompletely or inaccurately represent the human action sequences and human error vulnerabilities being analyzed. The paper examines the potential contributions these detailed analyses can make in achieving quantitative and qualitative HRA results which are: (1) creditable, that is, minimize uncertainty, (2) auditable, that is, systematically linking quantitative results and qualitative information from which the results are derived, (3) capable of supporting root cause analyses on human reliability factors determined to be major contributors to risk, and (4) capable of repeated measures and being combined with similar results from other analyses to examine HRA issues transcending individual systems and facilities. Based on experience analyzing test and commercial nuclear reactors, and medical applications of nuclear technology, an iterative process is suggested for doing detailed function, task, timeline, link and human vulnerability analyses using documentation reviews, open-ended and structured interviews, direct observations, and group techniques. Finally, the paper concludes that detailed analyses done in this manner by knowledgeable human factors practitioners, can contribute significantly to the credibility, auditability, causal factor analysis, and combining goals of the HRA.

Ryan, T.G.; Haney, L.N.; Ostrom, L.T.

1992-10-01T23:59:59.000Z

315

Fiscal year 1986 program plan for the Defense Transuranic Waste Program (DTWP)  

SciTech Connect (OSTI)

The Defense TRU Waste Program (DTWP) is the focal point for the Department of Energy is national planning, integration, and technical development for TRU waste management. The scope of this program extends from the point of TRU waste generation through delivery to a permanent repository. The TRU program maintains a close interface with repository development to ensure program compatibility and coordination. The defense TRU program does not directly address commercial activities that generate TRU waste. Instead, it is concerned with providing alternatives to manage existing and future defense TRU wastes. The FY 86 Program Plan is consistent with the Defense TRU Waste Program goals and objectives stated in the Defense Transuranic Waste Program Strategy Document, January 1984. The roles of participants, the responsibilities and authorities for Research Development (R D), the organizational interfaces and communication channels for R D and the establishment of procedures for planning, reporting, and budgeting of all R D activities meet requirements tated in the Technical Management Plan for the Transuranic Waste Management Program. The Program Plan is revised as needed. Detailed budget planning (i.e., programmatic funding and capital equipment) is presented for FY 86; outyear budget projections are presented for future years.

Not Available

1985-11-01T23:59:59.000Z

316

Cervical cancer, proxies for HPV exposure, screening scare and use of proximal and distal defense behaviors in fear buffering.  

E-Print Network [OSTI]

??As study about risk behavior in relation to getting infected with HPV, fear intensity and screening behavior of women and the use of psychological defense… (more)

Leckie, Glenn

2010-01-01T23:59:59.000Z

317

Network attack detection and defense – Manifesto of the Dagstuhl Perspective Workshop, March 2nd–6th, 2008  

E-Print Network [OSTI]

y REGULÄRE BEITRÄGE Network attack detection and defense –Perspective Workshop Network Attack Detection and Defensefor the detection of network attacks, should more strongly

Carle, Georg; Dressler, Falko; Kemmerer, Richard A.; Koenig, Hartmut; Kruegel, Christopher; Laskov, Pavel

2009-01-01T23:59:59.000Z

318

A systems-based approach to the design, management and integration of enterprise-level change in defense shipbuilding  

E-Print Network [OSTI]

Continually declining Navy surface combatant acquisitions, the war on terror, shifting Congressional priorities and a consolidated shipbuilding industrial base are forcing fundamental changes in the defense shipbuilding ...

Bond, Andrew S., 1975-

2005-01-01T23:59:59.000Z

319

U-152: OpenSSL "asn1_d2i_read_bio()" DER Format Data Processing Vulnerability  

Broader source: Energy.gov [DOE]

The vulnerability is caused due to a type casting error in the "asn1_d2i_read_bio()" function when processing DER format data and can be exploited to cause a heap-based buffer overflow.

320

Summary Xylem vulnerability to cavitation is a promising criterion for identifying trees with high drought tolerance, but  

E-Print Network [OSTI]

Summary Xylem vulnerability to cavitation is a promising criterion for identifying trees with high drought tolerance, but traditional techniques for measuring cavitation resistance are unsuitablefor throughput screening of cavitation resistance in five poplar (Populus spp.) andfour willow (Salix spp

Mencuccini, Maurizio

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Systematic investigation of genetic vulnerabilities across cancer cell lines reveals lineage-specific dependencies in ovarian cancer  

E-Print Network [OSTI]

A comprehensive understanding of the molecular vulnerabilities of every type of cancer will provide a powerful roadmap to guide therapeutic approaches. Efforts such as The Cancer Genome Atlas Project will identify genes ...

Ren, Yin

322

July 28, 2013 Project Identification  

E-Print Network [OSTI]

://ernd.mosti.gov.my/eScience/Appli/frmApp_App_ProjId... 2 of 2 28/07/2013 14:10 #12;July 28, 2013 Project to expense codes).Only direct project expenses are funded by ScienceFund. Expense Category Year 1 (2010) YearJuly 28, 2013 Project Identification Project Identification Project Objectives Research Background

Bargiela, Andrzej

323

July 28, 2013 Project Identification  

E-Print Network [OSTI]

.gov.my/eScience/Appli/frmApp_App_ProjId... 1 of 1 28/07/2013 14:12 #12;July 28, 2013 Project Cost project expenses are funded by ScienceFund. Expense Category Year 1 (2008) Year 2 (2009) Year 3 (2010July 28, 2013 Project Identification Project Identification Project Objectives Research Background

Bargiela, Andrzej

324

Portable Source Identification Device  

SciTech Connect (OSTI)

U.S. Customs and Border Protection (CBP) is the primary enforcement agency protecting the nation’s ports of entry. CBP is enhancing its capability to interdict the illicit import of nuclear and radiological materials and devices that may be used by terrorists. Pacific Northwest National Laboratory (PNNL) is providing scientific and technical support to CBP in their goal to enable rapid deployment of nuclear and radiation detection systems at U. S. ports of entry to monitor 100% of the incoming international traffic and cargo while not adversely impacting the operations or throughput of the ports. As the deployment of radiation detection systems proceeds, there is a need to adapt the baseline radiation portal monitor (RPM) system technology to operations at these diverse ports of entry. When screening produces an alarm in the primary inspection RPM, the alarming vehicle is removed from the flow of commerce and the alarm is typically confirmed in a secondary inspection RPM. The portable source identification device (PSID) is a radiation sensor panel (RSP), based on thallium-doped sodium iodide (NaI(Tl)) scintillation detector and gamma spectroscopic analysis hardware and software, mounted on a scissor lift on a small truck. The lift supports a box containing a commercial off-the-shelf (COTS) sodium iodide detector that provides real-time isotopic identification, including neutron detectors to interdict Weapons of Mass Destruction (WMD) and radiation dispersion devices (RDD). The scissor lift will lower the detectors to within a foot off the ground and raise them to approximately 24 feet in the air, allowing a wide vertical scanning range.

Andersen, Eric S.; Samuel, Todd J.; Gervais, Kevin L.

2005-08-01T23:59:59.000Z

325

INSTRUCTIONS TO CONTRACTING OFFICERS: The Special Contract Requirement "Workers Compensation Insurance (Defense Base Act) Services (OCT 2008)"  

E-Print Network [OSTI]

INSTRUCTIONS TO CONTRACTING OFFICERS: The Special Contract Requirement "Workers Compensation Insurance (Defense Base Act) ­ Services (OCT 2008)" shall be included in the contract as applicable. Whenever Defense Base Act (DBA) insurance is required under the contract for services, the following

US Army Corps of Engineers

326

NAC Ad-Hoc Task Force on Planetary Defense August 17 and 20, 2010 1 NASA ADVISORY COUNCIL (NAC)  

E-Print Network [OSTI]

NAC Ad-Hoc Task Force on Planetary Defense August 17 and 20, 2010 1 NASA ADVISORY COUNCIL (NAC) Ad-Hoc Task Force on Planetary Defense MINUTES Meeting Date: August 17 and 20, 2010 AGENDA: · Ad-Hoc Task Force Final Report and Recommendations ATTENDING: Ad-Hoc Task Force: Tom Jones (Co-Chair), Rusty

Waliser, Duane E.

327

)Pieris rapaeMayolenes: Labile defensive lipids from the glandular hairs of a caterpillar ( Renwick, Ronald Rutowski, and Thomas Eisner  

E-Print Network [OSTI]

)Pieris rapaeMayolenes: Labile defensive lipids from the glandular hairs of a caterpillar ( Renwick defensive lipids from the glandular hairs of a caterpillar (Pieris rapae) Scott R. Smedley*, Frank C), are beset with glandular hairs, bearing droplets of a clear oily secretion at their tip. The fluid consists

Weibel, Douglas B.

328

Commercial nuclear fuel from U.S. and Russian surplus defense inventories: Materials, policies, and market effects  

SciTech Connect (OSTI)

Nuclear materials declared by the US and Russian governments as surplus to defense programs are being converted into fuel for commercial nuclear reactors. This report presents the results of an analysis estimating the market effects that would likely result from current plans to commercialize surplus defense inventories. The analysis focuses on two key issues: (1) the extent by which traditional sources of supply, such as production from uranium mines and enrichment plants, would be displaced by the commercialization of surplus defense inventories or, conversely, would be required in the event of disruptions to planned commercialization, and (2) the future price of uranium considering the potential availability of surplus defense inventories. Finally, the report provides an estimate of the savings in uranium procurement costs that could be realized by US nuclear power generating companies with access to competitively priced uranium supplied from surplus defense inventories.

NONE

1998-05-01T23:59:59.000Z

329

LOCA with consequential or delayed LOOP accidents: Unique issues, plant vulnerability, and CDF contributions  

SciTech Connect (OSTI)

A loss-of-coolant accident (LOCA) can cause a loss-of-offsite power (LOOP) wherein the LOOP is usually delayed by few seconds or longer. Such an accident is called LOCA with consequential LOOP, or LOCA with delayed LOOP (here, abbreviated as LOCA/LOOP). This paper analyzes the unique conditions that are associated with a LOCA/LOOP, presents a model, and quantifies its contribution to core damage frequency (CDF). The results show that the CDF contribution can be a dominant contributor to risk for certain plant designs, although boiling water reactors (BWRs) are less vulnerable than pressurized water reactors (PWRs).

Martinez-Guridi, G.; Samanta, P.; Chu, L.; Yang, J.

1998-08-01T23:59:59.000Z

330

California GAMA Program: A Contamination Vulnerability Assessment for the Bakersfield Area  

SciTech Connect (OSTI)

In response to concerns expressed by the California Legislature and the citizenry of the State of California, the State Water Resources Control Board (SWRCB), implemented a program to assess groundwater quality, and provide a predictive capability for identifying areas that are vulnerable to contamination. The program was initiated in response to concern over public supply well closures due to contamination by chemicals such as MTBE from gasoline, and solvents from industrial operations. As a result of this increased awareness regarding groundwater quality, the Supplemental Report of the 1999 Budget Act mandated the SWRCB to develop a comprehensive ambient groundwater-monitoring plan, and led to the initiation of the Groundwater Ambient Monitoring and Assessment (GAMA) Program. The primary objective of the GAMA Program is to assess the water quality and to predict the relative susceptibility to contamination of groundwater resources throughout the state of California. Under the GAMA program, scientists from Lawrence Livermore National Laboratory (LLNL) collaborate with the SWRCB, the U.S. Geological Survey (USGS), the California Department of Health Services (DHS), and the California Department of Water Resources (DWR) to implement this groundwater assessment program. In 2003, LLNL carried out this vulnerability study in the groundwater basin that underlies Bakersfield, in the southern San Joaquin Valley. The goal of the study is to provide a probabilistic assessment of the relative vulnerability of groundwater used for the public water supply to contamination from surface sources. This assessment of relative contamination vulnerability is made based on the results of two types of analyses that are not routinely carried out at public water supply wells: ultra low-level measurement of volatile organic compounds (VOCs), and groundwater age dating (using the tritium-helium-3 method). In addition, stable oxygen isotope measurements help determine the recharge water source location. Interpreted together, and in the context of existing water quality and hydrogeologic data, these observable parameters help define the flow field of a groundwater basin, and indicate the degree of vertical communication between near-surface sources (or potential sources) of contamination, and deeper groundwater pumped at high capacity production wells.

Moran, J E; Hudson, G B; Eaton, G F; Leif, R

2004-11-01T23:59:59.000Z

331

Genomic and biochemical approaches in the discovery of mechanisms for selective neuronal vulnerability to oxidative stress  

E-Print Network [OSTI]

ral ssBioMed CentBMC Neuroscience Open AcceResearch article Genomic and biochemical approaches in the discovery of mechanisms for selective neuronal vulnerability to oxidative stress Xinkun Wang*1,2, Asma Zaidi2,3, Ranu Pal1,2, Alexander S Garrett4...: Daiichi Sankyo Inc., Two Hilton Court, Parsippany, NJ 07054, USA Email: Xinkun Wang* - xwang@ku.edu; Asma Zaidi - azaidi@kcumb.edu; Ranu Pal - ranupal@ku.edu; Alexander S Garrett - asg@stowers- institute.org; Rogelio Braceras - rbraceras@dsus.com; Xue...

Wang, Xinkun; Zaidi, Asma; Pal, Ranu; Garrett, Alexander S.; Braceras, Rogelio; Chen, Xue-wen; Michaelis, Mary L.; Michaelis, Elias K.

2009-02-19T23:59:59.000Z

332

Methodology for prioritizing cyber-vulnerable critical infrastructure equipment and mitigation strategies.  

SciTech Connect (OSTI)

The Department of Homeland Security (DHS), National Cyber Security Division (NSCD), Control Systems Security Program (CSSP), contracted Sandia National Laboratories to develop a generic methodology for prioritizing cyber-vulnerable, critical infrastructure assets and the development of mitigation strategies for their loss or compromise. The initial project has been divided into three discrete deliverables: (1) A generic methodology report suitable to all Critical Infrastructure and Key Resource (CIKR) Sectors (this report); (2) a sector-specific report for Electrical Power Distribution; and (3) a sector-specific report for the water sector, including generation, water treatment, and wastewater systems. Specific reports for the water and electric sectors are available from Sandia National Laboratories.

Dawson, Lon Andrew; Stinebaugh, Jennifer A.

2010-04-01T23:59:59.000Z

333

V-057: eXtplorer "ext_find_user()" Authentication Bypass Vulnerability |  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of EnergyEnergyENERGYWomen Owned SmallOf The 2012Nuclear Guide Remote Access08: DebianVulnerabilities

334

T-551: Cisco Security Advisory: Multiple Cisco WebEx Player Vulnerabilities  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of Energy Strain Rate4SuperhardSuspectEnginesSystems forVulnerabilities ||

335

U-196: Cisco AnyConnect VPN Client Two Vulnerabilities | Department of  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of EnergyofProject is on Track | Department ofLLCU-023: Debian||Vulnerability

336

V-211: IBM iNotes Multiple Vulnerabilities | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities | DepartmentMultiple

337

V-213: PuTTY SSH Handshake Integer Overflow Vulnerabilities | Department of  

Broader source: Energy.gov (indexed) [DOE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarly Career Scientists' Research Petroleum ReserveDepartmentScriptingVulnerabilities |Energy SEARCH-LAB

338

The Synchronization Attack and Defense on Energy-Efficient Listen-Sleep Slotted MAC  

E-Print Network [OSTI]

Xiaoming Lu, Matt Spear, Karl Levitt and S. Felix Wu Department of Computer Science UC Davis, Davis, CAThe Synchronization Attack and Defense on Energy-Efficient Listen-Sleep Slotted MAC Protocols, many listen- sleep Medium Access Control (MAC) protocols have been pro- posed to reduce energy

California at Davis, University of

339

The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses  

E-Print Network [OSTI]

The Pollution Attack in P2P Live Video Streaming: Measurement Results and Defenses Prithula Dhungel in the recent years. In this paper, we examine the stream pollution attack, for which the attacker mixes polluted chunks into the P2P distribu- tion, degrading the quality of the rendered media at the receivers

Saxena, Nitesh

340

Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems  

E-Print Network [OSTI]

1 Pollution Attacks and Defenses in Wireless Inter-flow Network Coding Systems Jing Dong, Reza Abstract--We study data pollution attacks in wireless inter-flow network coding systems. Although several the existing systems, and use it to analyze the impact of pollution attacks. Our analysis shows

Curtmola, Reza

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

APOBEC3G: a Double Agent in Defense Harold C. Smith  

E-Print Network [OSTI]

APOBEC3G: a Double Agent in Defense Harold C. Smith Department of Biochemistry and Biophysics to A3G having a requirement for a ssDNA Corresponding Author contacts: Harold C. Smith, Department and Dentistry, Rochester, NY 14642 USA, harold.smith@rochester.edu Voice: (585) 275-4267, FAX: (585) 275

Levin, Judith G.

342

CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment  

E-Print Network [OSTI]

CBF: A Packet Filtering Method for DDoS Attack Defense in Cloud Environment Qi Chen, Wenmin Lin-of-Service attack (DDoS) is a major threat for cloud environment. Traditional defending approaches cannot be easily, in this paper. Concretely speaking, the method is deployed by two periods, i.e., non-attack period and attack

Eustice, Ryan

343

Implementation of Section 1072 of the National Defense Authorization Act for Fiscal Year 2008  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice provides guidance for implementing the mandates of Section 1072 of the National Defense Authorization Act for Fiscal Year 2008, commonly referred to as the Bond Amendment. Extended until 9-28-11 by DOE N 251.90 dated 9-28-10. Canceled by DOE O 472.2. Does not cancel other directives.

2009-08-12T23:59:59.000Z

344

Inhibition of pulmonary antibacterial defense by interferon-g during recovery from influenza infection  

E-Print Network [OSTI]

Inhibition of pulmonary antibacterial defense by interferon-g during recovery from influenza infection Keer Sun & Dennis W Metzger Secondary bacterial infection often occurs after pulmonary virus burden, and leads to enhanced susceptibility to secondary pneumococcal infection, which can be prevented

345

Mayolenes: Labile defensive lipids from the glandular hairs of a caterpillar (Pieris rapae)  

E-Print Network [OSTI]

Mayolenes: Labile defensive lipids from the glandular hairs of a caterpillar (Pieris rapae) Scott R, Pieris rapae (Pieridae), are beset with glandular hairs, bearing droplets of a clear oily secretion at their tip. The fluid consists primarily of a series of chemically labile, unsaturated lipids, the mayolenes

Rutowski, Ronald L.

346

RateGuard: A Robust Distributed Denial of Service (DDoS) Defense System  

E-Print Network [OSTI]

, USA chao@poly.edu Abstract--One of the major threats to cyber security is the Distributed Denial-Rate TCP Attacks. I. INTRODUCTION One of the major threats to cyber security is the Distributed DenialRateGuard: A Robust Distributed Denial of Service (DDoS) Defense System Huizhong Sun ECE

Chao, Jonathan

347

Ecology Letters, (2003) 6: 13-18 Are three-dimensional spider webs defensive  

E-Print Network [OSTI]

LETTER Ecology Letters, (2003) 6: 13-18 Are three-dimensional spider webs defensive adaptations? Abstract Spider webs result from complex behaviours that have evolved under many selective pressures. Webs risk in the evolution of web architecture. The ecological success of spiders has been attributed to key

Mathis, Wayne N.

348

Nest Defense Behaviors of Native Cavity-Nesting Birds to European Starlings1  

E-Print Network [OSTI]

457 Nest Defense Behaviors of Native Cavity- Nesting Birds to European Starlings1 Rodney G. Olsen,2 for nest sites and the extent to which European Starlings (Sturnus vulgaris) are seen as a threat by native of aggressive behavior of four species of native cavity-nesting birds to starlings at active nests in trees

Standiford, Richard B.

349

Fiscal Year 1985 Congressional budget request. Volume 1. Atomic energy defense activities  

SciTech Connect (OSTI)

Contents include: summaries of estimates by appropriation, savings from management initiatives, staffing by subcommittee, staffing appropriation; appropriation language; amounts available for obligation; estimates by major category; program overview; weapons activities; verification and control technology; materials production; defense waste and by-products management; nuclear safeguards and security; security investigations; and naval reactors development.

Not Available

1984-02-01T23:59:59.000Z

350

Identification of telomerase in dog  

E-Print Network [OSTI]

the telomeres from diminishing during replication and ensures immortality to the cancerous cell. As the result, telomerase can be used as an identification test for malignant tissues. In humans, even though important, there are may other ways to determine...

Lyuksyutova, Anna

2013-02-22T23:59:59.000Z

351

CONSULTANT REPORT IDENTIFICATION OF LOWIMPACT  

E-Print Network [OSTI]

CONSULTANT REPORT IDENTIFICATION OF LOWIMPACT INTERCONNECTION SITES FOR WHOLESALE electric power sources strains existing processes to safely interconnect wholesale distributed resources for wholesale photovoltaic systems on the grid. The model, which integrates transmission and distribution

352

Cosmic bombardment V: Threat object-dispersing approaches to active planetary defense  

SciTech Connect (OSTI)

Earth-impacting comets and asteroids with diameters {approx}0.03 - 10 km pose the greatest threats to the terrestrial biosphere in terms of impact frequency-weighted impact consequences, and thus are of most concern to designers of active planetary defenses. Specific gravitational binding energies of such objects range from 10{sup -7} to 10{sup -2} J/gm, and are small compared with the specific energies of 1x10{sup 3} to 3x10{sup 3} J/gm required to vaporize objects of typical composition or the specific energies required to pulverize them, which are 10{sup -1} to 10 J/gm. All of these are small compared to the specific kinetic energy of these objects in the Earth- centered frame, which is 2x10{sup 5} to 2x10{sup 6} J/gm. The prospect naturally arises of negating all such threats by deflecting, pulverizing or vaporizing the objects. Pulverization-with-dispersal is an attractive option of reasonable defensive robustness. Examples of such equipments - which employ no explosives of any type - are given. Vaporization is the maximally robust defensive option, and may be invoked to negate threat objects not observed until little time is left until Earth-strike, and pulverization-with-dispersal has proven inadequate. Physically larger threats may be vaporized with nuclear explosives. No contemporary technical means of any kind appear capable of directly dispersing the -100 km diameter scale Charon- class cometary objects recently observed in the outer solar system, although such objects may be deflected to defensively useful extents. Means of implementing defenses of each of these types are proposed for specificity, and areas for optimization noted. Biospheric impacts of threat object debris are briefly considered, for bounding purposes. Experiments are suggested on cometary and asteroidal objects.

Teller, E.; Wood, L. [Stanford Univ., CA (United States). Hoover Institution on War, Revolution and Peace]|[Lawrence Livermore National Lab., CA (United States); Ishikawa, M. [Stanford Univ., CA (United States). Dept. of Aeronautics and Astronautics]|[Lawrence Livermore National Lab., CA (United States); Hyde, R. [Lawrence Livermore National Lab., CA (United States)

1995-05-24T23:59:59.000Z

353

Pileup Per Particle Identification  

E-Print Network [OSTI]

We propose a new method for pileup mitigation by implementing "pileup per particle identification" (PUPPI). For each particle we first define a local shape $\\alpha$ which probes the collinear versus soft diffuse structure in the neighborhood of the particle. The former is indicative of particles originating from the hard scatter and the latter of particles originating from pileup interactions. The distribution of $\\alpha$ for charged pileup, assumed as a proxy for all pileup, is used on an event-by-event basis to calculate a weight for each particle. The weights describe the degree to which particles are pileup-like and are used to rescale their four-momenta, superseding the need for jet-based corrections. Furthermore, the algorithm flexibly allows combination with other, possibly experimental, probabilistic information associated with particles such as vertexing and timing performance. We demonstrate the algorithm improves over existing methods by looking at jet $p_T$ and jet mass. We also find an improvement on non-jet quantities like missing transverse energy.

Daniele Bertolini; Philip Harris; Matthew Low; Nhan Tran

2014-09-30T23:59:59.000Z

354

Google Earth as a geospatial tool for development organisations: mapping climate change vulnerability   

E-Print Network [OSTI]

needed to represent the issue of vulnerability, and Google Earth allows for users to explore and understand even more information. This study draws examples from a mapping project of climate change vulnerability in Niger, and discusses the lessons...Geographical Information Systems have not been as successful in the non-governmental humanitarian sector as GIS professionals had hoped. If geospatial tools are to become more widely used and valuable within the humanitarian sector, it is perhaps time for a new approach to be taken. A debate is currently underway about the potential role of Google Earth in emergency relief operations. This research extends the scope of this discussion into the wider development sector, and asks whether Google Earth has the potential to become a useful tool in various aspects of development NGO work. Information management tools need to have wide support within an organisation to be successful, and it seems that many are very interested in what can be done using compromise geospatial/geovisualisation tools such as Google Earth. However there is also scepticism about its usefulness. This research suggests practical applications and recommendations for good use so that actors within the development sector can take the research further....

Crossley, Janet Ruth

2008-01-01T23:59:59.000Z

355

Climate Change Vulnerability and Resilience: Current Status and Trends for Mexico  

SciTech Connect (OSTI)

Climate change alters different localities on the planet in different ways. The impact on each region depends mainly on the degree of vulnerability that natural ecosystems and human-made infrastructure have to changes in climate and extreme meteorological events, as well as on the coping and adaptation capacity towards new environmental conditions. This study assesses the current resilience of Mexico and Mexican states to such changes, as well as how this resilience will look in the future. In recent studies (Moss et al. 2000, Brenkert and Malone 2005, Malone and Brenket 2008, Ibarrarán et al. 2007), the Vulnerability-Resilience Indicators Model (VRIM) is used to integrate a set of proxy variables that determine the resilience of a region to climate change. Resilience, or the ability of a region to respond to climate variations and natural events that result from climate change, is given by its adaptation and coping capacity and its sensitivity. On the one hand, the sensitivity of a region to climate change is assessed, emphasizing its infrastructure, food security, water resources, and the health of the population and regional ecosystems. On the other hand, coping and adaptation capacity is based on the availability of human resources, economic capacity and environmental capacity.

Ibarraran , Maria E.; Malone, Elizabeth L.; Brenkert, Antoinette L.

2008-12-30T23:59:59.000Z

356

Capturing value from Item Unique Identification (IUID)  

E-Print Network [OSTI]

The Department of Defense has issued a mandate aimed at improving its capabilities in determining the location, value, quantity, and condition of government assets. The mandate requires marking specified assemblies and ...

Salamini, Alexey

2006-01-01T23:59:59.000Z

357

In Silico Identification Software (ISIS): A Machine Learning...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Silico Identification Software (ISIS): A Machine Learning Approach to Tandem Mass Spectral Identification of Lipids. In Silico Identification Software (ISIS): A Machine Learning...

358

High-level waste storage tank farms/242-A evaporator standards/requirements identification document (S/RID), Vol. 7  

SciTech Connect (OSTI)

This Requirements Identification Document (RID) describes an Occupational Health and Safety Program as defined through the Relevant DOE Orders, regulations, industry codes/standards, industry guidance documents and, as appropriate, good industry practice. The definition of an Occupational Health and Safety Program as specified by this document is intended to address Defense Nuclear Facilities Safety Board Recommendations 90-2 and 91-1, which call for the strengthening of DOE complex activities through the identification and application of relevant standards which supplement or exceed requirements mandated by DOE Orders. This RID applies to the activities, personnel, structures, systems, components, and programs involved in maintaining the facility and executing the mission of the High-Level Waste Storage Tank Farms.

Not Available

1994-04-01T23:59:59.000Z

359

Concealed identification symbols and nondestructive determination of the identification symbols  

DOE Patents [OSTI]

The concealing of one or more identification symbols into a target object and the subsequent determination or reading of such symbols through non-destructive testing is described. The symbols can be concealed in a manner so that they are not visible to the human eye and/or cannot be readily revealed to the human eye without damage or destruction of the target object. The identification symbols can be determined after concealment by e.g., the compilation of multiple X-ray images. As such, the present invention can also provide e.g., a deterrent to theft and the recovery of lost or stolen objects.

Nance, Thomas A.; Gibbs, Kenneth M.

2014-09-16T23:59:59.000Z

360

Broad Overview of Energy Efficiency and Renewable Energy Opportunities for Department of Defense Installations  

SciTech Connect (OSTI)

The Strategic Environmental Research and Developmental Program (SERDP)/Environmental Security Technology Certification Program (ESTCP) is the Department of Defense?s (DOD) environmental science and technology program focusing on issues related to environment and energy for the military services. The SERDP/ESTCP Office requested that the National Renewable Energy Laboratory (NREL) provide technical assistance with strategic planning by evaluating the potential for several types of renewable energy technologies at DOD installations. NREL was tasked to provide technical expertise and strategic advice for the feasibility of geothermal resources, waste-to-energy technology, photovoltaics (PV), wind, microgrids, and building system technologies on military installations. This technical report is the deliverable for these tasks.

Anderson, E.; Antkowiak, M.; Butt, R.; Davis, J.; Dean, J.; Hillesheim, M.; Hotchkiss, E.; Hunsberger, R.; Kandt, A.; Lund, J.; Massey, K.; Robichaud, R.; Stafford, B.; Visser, C.

2011-08-01T23:59:59.000Z

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

Multi-service briefing on radioisotope systems for defense applications, briefing notes and supporting information  

SciTech Connect (OSTI)

A briefing on isotope systems technology and applications was held at the Pentagon on 9 May 1990, cosponsored by the Department of Defense and the Department of Energy. The objective was to provide isotope systems information to interested individuals and offices from the DOD and the Services, and then to discuss potential uses of this technology within the defense community. Presentations were given on the useful characteristics of radioactive decay, isotope sources, properties of specific isotopes, and details of isotope systems that have been deployed for terrestrial and space applications. Application areas covered included: electrical, thermal and mechanical energy conversion systems; radiation applications; and radioluminescent lights. Talks were also given on system licensing and approvals, and conclusions from the 1986 workshop on isotope systems applications. This document contains the meeting agenda, copies of the vu-graphs used in the presentations, face sheets given to meeting attendees, a list of attendees, and supplementary information requested during the meeting.

Jarrett, J.H.; Tingey, G.L.

1990-05-01T23:59:59.000Z

362

Progress of the High Level Waste Program at the Defense Waste Processing Facility - 13178  

SciTech Connect (OSTI)

The Defense Waste Processing Facility at the Savannah River Site treats and immobilizes High Level Waste into a durable borosilicate glass for safe, permanent storage. The High Level Waste program significantly reduces environmental risks associated with the storage of radioactive waste from legacy efforts to separate fissionable nuclear material from irradiated targets and fuels. In an effort to support the disposition of radioactive waste and accelerate tank closure at the Savannah River Site, the Defense Waste Processing Facility recently implemented facility and flowsheet modifications to improve production by 25%. These improvements, while low in cost, translated to record facility production in fiscal years 2011 and 2012. In addition, significant progress has been accomplished on longer term projects aimed at simplifying and expanding the flexibility of the existing flowsheet in order to accommodate future processing needs and goals. (authors)

Bricker, Jonathan M.; Fellinger, Terri L.; Staub, Aaron V.; Ray, Jeff W.; Iaukea, John F. [Savannah River Remediation, Aiken, South Carolina, 29808 (United States)] [Savannah River Remediation, Aiken, South Carolina, 29808 (United States)

2013-07-01T23:59:59.000Z

363

Joint probability safety assessment for NPP defense infrastructure against extreme external natural hazards  

SciTech Connect (OSTI)

With the increasing tendency of natural hazards, the typhoon, hurricane and tropical Cyclone induced surge, wave, precipitation, flood and wind as extreme external loads menacing Nuclear Power Plants (NPP) in coastal and inland provinces of China. For all of planned, designed And constructed NPP the National Nuclear Safety Administration of China and IAEA recommended Probable Maximum Hurricane /Typhoon/(PMH/T), Probable Maximum Storm Surge (PMSS), Probable Maximum Flood (PMF), Design Basis Flood (DBF) as safety regulations for NPP defense infrastructures. This paper discusses the joint probability analysis of simultaneous occurrence typhoon induced extreme external hazards and compare with IAEA 2006-2009 recommended safety regulation design criteria for some NPP defense infrastructures along China coast. (authors)

Guilin, L. [College of Engineering, Ocean Univ. ot China, Yushan Road No. 5, Qingdao 266003 (China); Defu, L. [Disaster Prevention Research Inst., Ocean Univ. ot China, Yushan Road No. 5, Qingdao 266003 (China); Huajun, L. [College of Engineering, Ocean Univ. ot China, Yushan Road No. 5, Qingdao 266003 (China); Fengqing, W. [Disaster Prevention Research Inst., Ocean Univ. of China, Songling Road No.238, Qingdao 266100 (China); Tao, Z. [College of Engineering, Ocean Univ. of China, Songling Road No.238, Qingdao 266100 (China)

2012-07-01T23:59:59.000Z

364

Checkout and start-up of the integrated DWPF (Defense Waste Processing Facility) melter system  

SciTech Connect (OSTI)

The Integrated DWPF Melter System (IDMS) is a one-ninth-scale demonstration of the Defense Waste Processing Facility (DWPF) feed preparation, melter, and off-gas systems. The IDMS will be the first engineering-scale melter system at SRL to process mercury and flowsheet levels of halides and sulfates. This report includes a summary of the IDMS program objectives, system and equipment descriptions, and detailed discussions of the system checkout and start-up. 10 refs., 44 figs., 20 tabs.

Smith, M.E.; Hutson, N.D.; Miller, D.H.; Morrison, J.; Shah, H.; Shuford, J.A.; Glascock, J.; Wurzinger, F.H.; Zamecnik, J.R.

1989-11-11T23:59:59.000Z

365

Comments of the Natural Resources Defense Council (NRDC), The Wilderness Society,  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE:YearRound-Up fromDepartmentTieCelebrate Earth Codesthe Natural Resources Defense Council (NRDC),

366

Dissection of defense responses of skl, an ethylene insensitive mutant of Medicago truncatula  

E-Print Network [OSTI]

the ethylene signal. To complement the study, expression analyses of defense response genes in this interaction were studied by real time RTPCR of Phytophthora-infected and mock- infected roots. The genes analyzed were PAL, CHS, IFR, ACC oxidase, GST...........................................................112 22 In silica analysis of PAL gene expression........................................................114 23 In silica analysis of CHS gene expression .......................................................117 24 In silica analysis of IFR...

Pedro, Uribe Mejia

2004-11-15T23:59:59.000Z

367

Preliminary technical data summary No. 3 for the Defense Waste Processing Facility  

SciTech Connect (OSTI)

This document presents an update on the best information presently available for the purpose of establishing the basis for the design of a Defense Waste Processing Facility. Objective of this project is to provide a facility to fix the radionuclides present in Savannah River Plant (SRP) high-level liquid waste in a high-integrity form (glass). Flowsheets and material balances reflect the alternate CAB case including the incorporation of low-level supernate in concrete. (DLC)

Landon, L.F. (comp.)

1980-05-01T23:59:59.000Z

368

Assessing the Vulnerability of Large Critical Infrastructure Using Fully-Coupled Blast Effects Modeling  

SciTech Connect (OSTI)

Structural failures, such as the MacArthur Maze I-880 overpass in Oakland, California and the I-35 bridge in Minneapolis, Minnesota, are recent examples of our national infrastructure's fragility and serve as an important reminder of such infrastructure in our everyday lives. These two failures, as well as the World Trade Center's collapse and the levee failures in New Orleans, highlight the national importance of protecting our infrastructure as much as possible against acts of terrorism and natural hazards. This paper describes a process for evaluating the vulnerability of critical infrastructure to large blast loads using a fully-coupled finite element approach. A description of the finite element software and modeling technique is discussed along with the experimental validation of the numerical tools. We discuss how such an approach can be used for specific problems such as modeling the progressive collapse of a building.

McMichael, L D; Noble, C R; Margraf, J D; Glascoe, L G

2009-03-26T23:59:59.000Z

369

Sublethal Oxygen–Glucose Deprivation Alters Hippocampal Neuronal AMPA Receptor Expression and Vulnerability to  

E-Print Network [OSTI]

Recent studies have suggested that rats subjected to transient global brain ischemia develop depressed expression of GluR-B in CA1 hippocampal neurons. The present study was performed to determine whether a similar change in AMPA receptor expression could be triggered in vitro by sublethal oxygen–glucose deprivation in rat hippocampal neuronal cultures. mRNA was extracted from individual hippocampal neurons via patch electrodes and amplified by RT-PCR 24–48 hr after sublethal oxygen–glucose deprivation. Compared with controls, insulted neurons expressed increased levels of GluR-D flop. As an indication that this change in receptor expression was functionally significant, insulted cultures exhibited increased AMPA- or kainate-induced 45 Ca 2 ? accumulation sensitive to Joro spider toxin and increased vulnerability to kainate-induced death. These data support the hypothesis that exposure to ischemia may enhance subsequent hippocampal

Kainate-induced Death; Howard S. Ying; Jochen H. Weishaupt; Margaret Grabb; Lorella M. T. Canzoniero; Stefano L. Sensi; Christian T. Sheline; Hannah Monyer; Dennis W. Choi

370

The 'secureplan' bomb utility: A PC-based analytic tool for bomb defense  

SciTech Connect (OSTI)

This paper illustrates a recently developed, PC-based software system for simulating the effects of an infinite variety of hypothetical bomb blasts on structures and personnel in the immediate vicinity of such blasts. The system incorporates two basic rectangular geometries in which blast assessments can be made - an external configuration (highly vented) and an internal configuration (vented and unvented). A variety of explosives can be used - each is translated to an equivalent TNT weight. Provisions in the program account for bomb cases (person, satchel, case and vehicle), mixes of explosives and shrapnel aggregates and detonation altitudes. The software permits architects, engineers, security personnel and facility managers, without specific knowledge of explosives, to incorporate realistic construction hardening, screening programs, barriers and stand-off provisions in the design and/or operation of diverse facilities. System outputs - generally represented as peak incident or reflected overpressure or impulses - are both graphic and analytic and integrate damage threshold data for common construction materials including window glazing. The effects of bomb blasts on humans is estimated in terms of temporary and permanent hearing damage, lung damage (lethality) and whole body translation injury. The software system has been used in the field in providing bomb defense services to a number of commercial clients since July of 1986. In addition to the design of siting, screening and hardening components of bomb defense programs, the software has proven very useful in post-incident analysis and repair scenarios and as a teaching tool for bomb defense training.

Massa, R.J.

1987-07-01T23:59:59.000Z

371

Final Report for Bio-Inspired Approaches to Moving-Target Defense Strategies  

SciTech Connect (OSTI)

This report records the work and contributions of the NITRD-funded Bio-Inspired Approaches to Moving-Target Defense Strategies project performed by Pacific Northwest National Laboratory under the technical guidance of the National Security Agency’s R6 division. The project has incorporated a number of bio-inspired cyber defensive technologies within an elastic framework provided by the Digital Ants. This project has created the first scalable, real-world prototype of the Digital Ants Framework (DAF)[11] and integrated five technologies into this flexible, decentralized framework: (1) Ant-Based Cyber Defense (ABCD), (2) Behavioral Indicators, (3) Bioinformatic Clas- sification, (4) Moving-Target Reconfiguration, and (5) Ambient Collaboration. The DAF can be used operationally to decentralize many such data intensive applications that normally rely on collection of large amounts of data in a central repository. In this work, we have shown how these component applications may be decentralized and may perform analysis at the edge. Operationally, this will enable analytics to scale far beyond current limitations while not suffering from the bandwidth or computational limitations of centralized analysis. This effort has advanced the R6 Cyber Security research program to secure digital infrastructures by developing a dynamic means to adaptively defend complex cyber systems. We hope that this work will benefit both our client’s efforts in system behavior modeling and cyber security to the overall benefit of the nation.

Fink, Glenn A.; Oehmen, Christopher S.

2012-09-01T23:59:59.000Z

372

Similarities of host defense mechanisms against pulmonary infectious disease in animals and man  

SciTech Connect (OSTI)

Evidence linking exposure to air pollutants with increased susceptibility to infectious diseases in humans comes from epidemiological, clinical, and experimental laboratory studies. The data suggest that the most common, and perhaps the most sensitive, index of the pulmonary effect of air pollutant exposure is on post upper respiratory infection, prolonged cough, phlegm, and purulent sputum. Experimental models of these relationships for extrapolation to humans should be able to measure such minor changes in symptomatology and physiology rather than require major lethal events. The bacterial aerosol model for quantifying nonspecific defense mechanisms of the bronchopulmonary tree utilizing nonpathogenic organisms fulfills this criterion. The function of the six major components of pulmonary antimicrobial defense mechanisms - including aerodynamic filtration, secretory respiratory tract fluid, fluid transport at the alveolar and bronchial levels, the phagocytic function of alveolar macrophages, the augmenting mechanisms of blood-derived inflammatory cells, and the secretory and cellular-specific immune mechanisms and their mediator products - can all be quantified by this experimental animal model system. The defensive functions are remarkably similar across animal species, and available human data suggest that findings obtained using the model may be extrapolatred to humans.

Green, G.M.

1984-01-01T23:59:59.000Z

373

LAVA (Los Alamos Vulnerability and Risk Assessment Methodology): A conceptual framework for automated risk analysis  

SciTech Connect (OSTI)

At Los Alamos National Laboratory, we have developed an original methodology for performing risk analyses on subject systems characterized by a general set of asset categories, a general spectrum of threats, a definable system-specific set of safeguards protecting the assets from the threats, and a general set of outcomes resulting from threats exploiting weaknesses in the safeguards system. The Los Alamos Vulnerability and Risk Assessment Methodology (LAVA) models complex systems having large amounts of ''soft'' information about both the system itself and occurrences related to the system. Its structure lends itself well to automation on a portable computer, making it possible to analyze numerous similar but geographically separated installations consistently and in as much depth as the subject system warrants. LAVA is based on hierarchical systems theory, event trees, fuzzy sets, natural-language processing, decision theory, and utility theory. LAVA's framework is a hierarchical set of fuzzy event trees that relate the results of several embedded (or sub-) analyses: a vulnerability assessment providing information about the presence and efficacy of system safeguards, a threat analysis providing information about static (background) and dynamic (changing) threat components coupled with an analysis of asset ''attractiveness'' to the dynamic threat, and a consequence analysis providing information about the outcome spectrum's severity measures and impact values. By using LAVA, we have modeled our widely used computer security application as well as LAVA/CS systems for physical protection, transborder data flow, contract awards, and property management. It is presently being applied for modeling risk management in embedded systems, survivability systems, and weapons systems security. LAVA is especially effective in modeling subject systems that include a large human component.

Smith, S.T.; Lim, J.J.; Phillips, J.R.; Tisinger, R.M.; Brown, D.C.; FitzGerald, P.D.

1986-01-01T23:59:59.000Z

374

Parameters Identification for Motorcycle Simulator's Platform Characterization  

E-Print Network [OSTI]

Parameters Identification for Motorcycle Simulator's Platform Characterization L. Nehaoua H modeling and parameters identification of a motorcycle simulator's platform. This model begins with some (cars and motorcycles) is possible by taking in care some characteristics of land vehicles. Indeed

Paris-Sud XI, Université de

375

Nonlethal Self-Defense, (Almost Entirely) Nonlethal Weapons, and the Rights to Keep and Bear Arms and Defend Life  

E-Print Network [OSTI]

near the same force to stun guns and to irritant sprays.the self-defense arguments against gun bans do apply to suchthemselves nonlethally with stun guns ought to be protected—

Volokh, Eugene

2010-01-01T23:59:59.000Z

376

EIS-0113: Disposal of Hanford Defense High-Level, Transuranic and Tank Waste, Hanford Site, Richland, Washington  

Broader source: Energy.gov [DOE]

The U.S. Department of Energy developed this EIS to examine the potential environmental impacts of final disposal options for legacy and future radioactive defense wastes stored at the Hanford Site.

377

Women and Sustainability: Creating Community based literacy for climate solutions Women are particularly vulnerable to economic downturns and the impacts of climate change may  

E-Print Network [OSTI]

Accord (2009) acknowledges disproportionate impacts of climate change on women in developing countries are particularly vulnerable to economic downturns and the impacts of climate change may increase that vulnerability. Water is the biggest limiting factor in Colorado and climate change is anticipated to reduce its

Boone, Randall B.

378

Limiting sediment deposition on roadways: topographic controls on vulnerable roads and cost analysis of planting grass buffer  

E-Print Network [OSTI]

Limiting sediment deposition on roadways: topographic controls on vulnerable roads and cost and summer storms lead to large scale sediment deposition on roadways, and cleanup costs are a major concern characteristics which control sediment deposition on roadways in order to compare the cost of planting grass

Boyer, Edmond

379

Combining particle-tracking and geochemical data to assess public supply well vulnerability to arsenic and uranium q  

E-Print Network [OSTI]

. Bhattacharya, Associate Editor Keywords: Vulnerability Particle-tracking Arsenic Uranium Classification tree through aquifer systems and also through specific redox and pH zones within aquifers. Time were generally strongest for variables computed for distinct redox zones. Classification tree analysis

380

The waters of Southeastern Wisconsin are vast but vulnerable. We depend on our waters for drinking water, irrigation, industry, transportation,  

E-Print Network [OSTI]

The waters of Southeastern Wisconsin are vast but vulnerable. We depend on our waters for drinking for drinking water is rising in the United States and around the world due to population growth. At the same water, irrigation, industry, transportation, power production, recreation and scenic beauty

Saldin, Dilano

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

CHARACTERIZATION OF A PRECIPITATE REACTOR FEED TANK (PRFT) SAMPLE FROM THE DEFENSE WASTE PROCESSING FACILITY (DWPF)  

SciTech Connect (OSTI)

A sample of from the Defense Waste Processing Facility (DWPF) Precipitate Reactor Feed Tank (PRFT) was pulled and sent to the Savannah River National Laboratory (SRNL) in June of 2013. The PRFT in DWPF receives Actinide Removal Process (ARP)/ Monosodium Titanate (MST) material from the 512-S Facility via the 511-S Facility. This 2.2 L sample was to be used in small-scale DWPF chemical process cell testing in the Shielded Cells Facility of SRNL. A 1L sub-sample portion was characterized to determine the physical properties such as weight percent solids, density, particle size distribution and crystalline phase identification. Further chemical analysis of the PRFT filtrate and dissolved slurry included metals and anions as well as carbon and base analysis. This technical report describes the characterization and analysis of the PRFT sample from DWPF. At SRNL, the 2.2 L PRFT sample was composited from eleven separate samples received from DWPF. The visible solids were observed to be relatively quick settling which allowed for the rinsing of the original shipping vials with PRFT supernate on the same day as compositing. Most analyses were performed in triplicate except for particle size distribution (PSD), X-ray diffraction (XRD), Scanning Electron Microscopy (SEM) and thermogravimetric analysis (TGA). PRFT slurry samples were dissolved using a mixed HNO3/HF acid for subsequent Inductively Coupled Plasma Atomic Emission Spectroscopy (ICPAES) and Inductively Coupled Plasma Mass Spectroscopy (ICP-MS) analyses performed by SRNL Analytical Development (AD). Per the task request for this work, analysis of the PRFT slurry and filtrate for metals, anions, carbon and base were primarily performed to support the planned chemical process cell testing and to provide additional component concentrations in addition to the limited data available from DWPF. Analysis of the insoluble solids portion of the PRFT slurry was aimed at detailed characterization of these solids (TGA, PSD, XRD and SEM) in support of the Salt IPT chemistry team. The overall conclusions from analyses performed in this study are that the PRFT slurry consists of 0.61 Wt.% insoluble MST solids suspended in a 0.77 M [Na+] caustic solution containing various anions such as nitrate, nitrite, sulfate, carbonate and oxalate. The corresponding measured sulfur level in the PRFT slurry, a critical element for determining how much of the PRFT slurry gets blended into the SRAT, is 0.437 Wt.% TS. The PRFT slurry does not contain insoluble oxalates nor significant quantities of high activity sludge solids. The lack of sludge solids has been alluded to by the Salt IPT chemistry team in citing that the mixing pump has been removed from Tank 49H, the feed tank to ARP-MCU, thus allowing the sludge solids to settle out. ? The PRFT aqueous slurry from DWPF was found to contain 5.96 Wt.% total dried solids. Of these total dried solids, relatively low levels of insoluble solids (0.61 Wt.%) were measured. The densities of both the filtrate and slurry were 1.05 g/mL. ? Particle size distribution of the PRFT solids in filtered caustic simulant and XRD analysis of washed/dried PRFT solids indicate that the PRFT slurry contains a bimodal distribution of particles in the range of 1 and 6 ?m and that the particles contain sodium titanium oxide hydroxide Na2Ti2O4(OH)2 crystalline material as determined by XRD. These data are in excellent agreement with similar data obtained from laboratory sampling of vendor supplied MST. Scanning Electron Microscopy (SEM) combined with Energy Dispersive X-ray Spectroscopy (EDS) analysis of washed/dried PRFT solids shows the particles to be like previous MST analyses consisting of irregular shaped micron-sized solids consisting primarily of Na and Ti. ? Thermogravimetric analysis of the washed and unwashed PRFT solids shows that the washed solids are very similar to MST solids. The TGA mass loss signal for the unwashed solids shows similar features to TGA performed on cellulose nitrate filter paper indicating significant presence of the deteriorated filter

Crawford, C.; Bannochie, C.

2014-05-12T23:59:59.000Z

382

SECURING RADIO FREQUENCY IDENTIFICATION (RFID)  

E-Print Network [OSTI]

business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

383

Defense Gallery  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINL

384

defense programs  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartmentNationalRestart of the Review of theOFFICE OF CIVILAMENDMENT

385

Discrete event simulation of the Defense Waste Processing Facility (DWPF) analytical laboratory  

SciTech Connect (OSTI)

A discrete event simulation of the Savannah River Site (SRS) Defense Waste Processing Facility (DWPF) analytical laboratory has been constructed in the GPSS language. It was used to estimate laboratory analysis times at process analytical hold points and to study the effect of sample number on those times. Typical results are presented for three different simultaneous representing increasing levels of complexity, and for different sampling schemes. Example equipment utilization time plots are also included. SRS DWPF laboratory management and chemists found the simulations very useful for resource and schedule planning.

Shanahan, K.L.

1992-02-01T23:59:59.000Z

386

DESIGN ANALYSIS FOR THE DEFENSE HIGH-LEVEL WASTE DISPOSAL CONTAINER  

SciTech Connect (OSTI)

The purpose of ''Design Analysis for the Defense High-Level Waste Disposal Container'' analysis is to technically define the defense high-level waste (DHLW) disposal container/waste package using the Waste Package Department's (WPD) design methods, as documented in ''Waste Package Design Methodology Report'' (CRWMS M&O [Civilian Radioactive Waste Management System Management and Operating Contractor] 2000a). The DHLW disposal container is intended for disposal of commercial high-level waste (HLW) and DHLW (including immobilized plutonium waste forms), placed within disposable canisters. The U.S. Department of Energy (DOE)-managed spent nuclear fuel (SNF) in disposable canisters may also be placed in a DHLW disposal container along with HLW forms. The objective of this analysis is to demonstrate that the DHLW disposal container/waste package satisfies the project requirements, as embodied in Defense High Level Waste Disposal Container System Description Document (SDD) (CRWMS M&O 1999a), and additional criteria, as identified in Waste Package Design Sensitivity Report (CRWMS M&Q 2000b, Table 4). The analysis briefly describes the analytical methods appropriate for the design of the DHLW disposal contained waste package, and summarizes the results of the calculations that illustrate the analytical methods. However, the analysis is limited to the calculations selected for the DHLW disposal container in support of the Site Recommendation (SR) (CRWMS M&O 2000b, Section 7). The scope of this analysis is restricted to the design of the codisposal waste package of the Savannah River Site (SRS) DHLW glass canisters and the Training, Research, Isotopes General Atomics (TRIGA) SNF loaded in a short 18-in.-outer diameter (OD) DOE standardized SNF canister. This waste package is representative of the waste packages that consist of the DHLW disposal container, the DHLW/HLW glass canisters, and the DOE-managed SNF in disposable canisters. The intended use of this analysis is to support Site Recommendation reports and to assist in the development of WPD drawings. Activities described in this analysis were conducted in accordance with the Development Plan ''Design Analysis for the Defense High-Level Waste Disposal Container'' (CRWMS M&O 2000c) with no deviations from the plan.

G. Radulesscu; J.S. Tang

2000-06-07T23:59:59.000Z

387

Self-Defense: What's a Jury Got to Do with It?  

E-Print Network [OSTI]

. 93, 117 (1936). Raymond finds evidence for the strict liability concept as late as 1118. Id. at 95. Quoting from a group of Anglo- Saxon laws, Raymond writes: “It is the law: one who does wrong unknowingly must suffer for it knowingly... homicide. Id. Green does caution that the statistics should be loosely relied on as it is impossible to tell the frequency of acquittal when self-defense was not alleged. Id. 123. Sir Henry Bracton was a cleric and judge whose writings heavily...

Gilles Phillips, Jean K.; Cateforis, Elizabeth

2009-06-01T23:59:59.000Z

388

Report on Separate Disposal of Defense High-Level Radioactive Waste |  

Office of Environmental Management (EM)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "of Energy Power.pdf11-161-LNG |September 15,2015Department of Energy on Separate Disposal of Defense

389

LysM receptor-like kinases to improve plant defense response against fungal pathogens  

DOE Patents [OSTI]

Perception of chitin fragments (chitooligosaccharides) is an important first step in plant defense response against fungal pathogen. LysM receptor-like kinases (LysM RLKs) are instrumental in this perception process. LysM RLKs also play a role in activating transcription of chitin-responsive genes (CRGs) in plants. Mutations in the LysM kinase receptor genes or the downstream CRGs may affect the fungal susceptibility of a plant. Mutations in LysM RLKs or transgenes carrying the same may be beneficial in imparting resistance against fungal pathogens.

Wan, Jinrong (Columbia, MO); Stacey, Gary (Columbia, MO); Stacey, Minviluz (Columbia, MO); Zhang, Xuecheng (Columbia, MO)

2012-01-17T23:59:59.000Z

390

Development of an ASTM standard guide on performing vulnerability assessments for nuclear facilities  

SciTech Connect (OSTI)

This paper describes an effort undertaken by subcommittee C26.12 (Safeguards) of the American Society for Testing and Materials (ASTM) to develop a standard guide for performing vulnerability assessments (VAs). VAs are performed to determine the effectiveness of safeguards and security systems for both domestic and international nuclear facilities. These assessments address a range of threats, including theft of nuclear material and sabotage, and use an array of methods. The approach to performing and documenting VAs is varied and is largely dependent upon the tools used to perform them. This diversity can lead to tools being misused, making validation of VAs more difficult. The development of a standard guide for performing VAs would, if generally accepted, alleviate these concerns. ASTM provides a forum for developing guides that includes a high level of peer review to assure that the result is acceptable to all potential users. Additionally, the ASTM is widely recognized for setting standards, and endorsement by the Society may increase the likelihood of acceptance by the nuclear community. The goal of this work is to develop a guide that is independent of the tools being used to perform the VA and applicable to the spectrum of threats described above.

Wilkey, D.D.

1995-09-01T23:59:59.000Z

391

Plutonium working group report on environmental, safety and health vulnerabilities associated with the Department`s plutonium storage. Volume II, part 7: Mound working group assessment team report  

SciTech Connect (OSTI)

This is the report of a visit to the Mound site by the Working Group Assessment Team (WGAT) to assess plutonium vulnerabilities. Purposes of the visit were: to review results of the site`s self assessment of current practices for handling and storing plutonium; to conduct an independent assessment of these practices; to reconcile differences and assemble a final list of vulnerabilities; to calculate consequences and probability for each vulnerability; and to issue a report to the Working Group. This report, representing completion of the Mound visit, will be compiled along with those from all other sites with plutonium inventories as part of a final report to the Secretary of Energy.

NONE

1994-09-01T23:59:59.000Z

392

Determination of Solar Energy Transition Potential of Large Organizations| An Application to Department of Defense Facilities and Non-Tactical Vehicles.  

E-Print Network [OSTI]

?? The Department of Defense offers a great opportunity to implement solar energy solutions across its United States bases. It is the single largest energy… (more)

Castillo, Ariel S.

2011-01-01T23:59:59.000Z

393

DWPF (Defense Waste Processing Facility) canister impact testing and analyses for the Transportation Technology Center  

SciTech Connect (OSTI)

A legal weight truck cask design has been developed for the US Department of Energy by GA Technologies, Inc. The cask will be used to transport defense high-level waste canisters produced by the Defense Waste Processing Facility (DWPF) at the Savannah River Plant. The development of the cask required the collection of impact data for the DWPF canisters. The Materials Characterization Center (MCC) performed this work under the guidance of the Transportation Technology Center (TTC) at Sandia National Laboratories. Two full-scale DWPF canisters filled with nonradioactive borosilicate glass were impacted under ''normal'' and ''hypothetical'' accident conditions. Two canisters, supplied by the DWPF, were tested. Each canister was vertically dropped on the bottom end from a height of either 0.3 m or 9.1 m (for normal or hypothetical accident conditions, respectively). The structural integrity of each canister was then examined using helium leak and dye penetrant testing. The canisters' diameters and heights, which had been previously measured, were then remeasured to determine how the canister dimensions had changed. Following structural integrity testing, the canisters were flaw leak tested. For transportation flaw leak testing, four holes were fabricated into the shell of canister A-27 (0.3 m drop height). The canister was then transported a total distance of 2069 miles. During transport, the waste form material that fell from each flaw was collected to determine the amount of size distribution of each flaw release. 2 refs., 8 figs., 12 tabs.

Farnsworth, R.K.; Mishima, J.

1988-12-01T23:59:59.000Z

394

Alternate approaches to verifying the structural adequacy of the Defense High Level Waste Shipping Cask  

SciTech Connect (OSTI)

In the early 1980s, the US Department of Energy/Defense Programs (DOE/DP) initiated a project to develop a safe and efficient transportation system for defense high level waste (DHLW). A long-standing objective of the DHLW transportation project is to develop a truck cask that represents the leading edge of cask technology as well as one that fully complies with all applicable DOE, Nuclear Regulatory Commission (NRC), and Department of Transportation (DOT) regulations. General Atomics (GA) designed the DHLW Truck Shipping Cask using state-of-the-art analytical techniques verified by model testing performed by Sandia National Laboratories (SNL). The analytical techniques include two approaches, inelastic analysis and elastic analysis. This topical report presents the results of the two analytical approaches and the model testing results. The purpose of this work is to show that there are two viable analytical alternatives to verify the structural adequacy of a Type B package and to obtain an NRC license. It addition, this data will help to support the future acceptance by the NRC of inelastic analysis as a tool in packaging design and licensing.

Zimmer, A.; Koploy, M.

1991-12-01T23:59:59.000Z

395

Erosion/corrosion concerns in feed preparation systems at the Defense Waste Processing Facility  

SciTech Connect (OSTI)

The Savannah River Site (SRS) has been operating a nuclear fuel cycle since the 1950`s to produce nuclear materials in support of the national defense effort. The Department of Energy authorized the construction of the Defense Waste Processing Facility (DWPF) to immobilize the high level radioactive waste resulting from these processes as a durable borosilicate glass. The DWPF, after having undergone extensive testing, has been approved for operations and is currently immobilizing radioactive waste. To ensure reliability of the DWPF remote canyon processing equipment, a materials evaluation program was performed prior to radioactive operations to determine to what extent erosion/corrosion would impact design life of equipment. The program consisted of performing pre-service baseline inspections on critical equipment and follow-up inspections after completion of DWPF cold chemical demonstration runs. Non-destructive examination (NDE) techniques were used to assess erosion/corrosion as well as evaluation of corrosion coupon racks. These results were used to arrive at predicted equipment life for selected feed preparation equipment. It was concluded with the exception of the coil and agitator for the slurry mix evaporator (SME), which are exposed to erosive glass frit particles, all of the equipment should meet its design life.

Gee, J.T.; Chandler, C.T.; Daugherty, W.L.; Imrich, K.J.; Jenkins, C.F.

1997-12-31T23:59:59.000Z

396

Crucial role of detailed function, task, timeline, link and human vulnerability analyses in HRA. [Human Reliability Analysis (HRA)  

SciTech Connect (OSTI)

This paper addresses one major cause for large uncertainties in human reliability analysis (HRA) results, that is, an absence of detailed function, task, timeline, link and human vulnerability analyses. All too often this crucial step in the HRA process is done in a cursory fashion using word of mouth or written procedures which themselves may incompletely or inaccurately represent the human action sequences and human error vulnerabilities being analyzed. The paper examines the potential contributions these detailed analyses can make in achieving quantitative and qualitative HRA results which are: (1) creditable, that is, minimize uncertainty, (2) auditable, that is, systematically linking quantitative results and qualitative information from which the results are derived, (3) capable of supporting root cause analyses on human reliability factors determined to be major contributors to risk, and (4) capable of repeated measures and being combined with similar results from other analyses to examine HRA issues transcending individual systems and facilities. Based on experience analyzing test and commercial nuclear reactors, and medical applications of nuclear technology, an iterative process is suggested for doing detailed function, task, timeline, link and human vulnerability analyses using documentation reviews, open-ended and structured interviews, direct observations, and group techniques. Finally, the paper concludes that detailed analyses done in this manner by knowledgeable human factors practitioners, can contribute significantly to the credibility, auditability, causal factor analysis, and combining goals of the HRA.

Ryan, T.G.; Haney, L.N.; Ostrom, L.T.

1992-01-01T23:59:59.000Z

397

Overview of the Defense Programs Research and Technology Development Program for fiscal year 1993. Appendix II research laboratories and facilities  

SciTech Connect (OSTI)

This document contains summaries of the research facilities that support the Defense Programs Research and Technology Development Program for FY 1993. The nine program elements are aggregated into three program clusters as follows: (1) Advanced materials sciences and technologies; chemistry and materials, explosives, special nuclear materials (SNM), and tritium. (2) Design sciences and advanced computation; physics, conceptual design and assessment, and computation and modeling. (3) Advanced manufacturing technologies and capabilities; system engineering science and technology, and electronics, photonics, sensors, and mechanical components. Section I gives a brief summary of 23 major defense program (DP) research and technology facilities and shows how these major facilities are organized by program elements. Section II gives a more detailed breakdown of the over 200 research and technology facilities being used at the Laboratories to support the Defense Programs mission.

Not Available

1993-09-30T23:59:59.000Z

398

Identification of Hazards, 3/9/95  

Broader source: Energy.gov [DOE]

The objective of this surveillance is to evaluate the effectiveness of the contractor's hazards identification programs.  Surveillance activities encompass maintenance and implementation of safety...

399

Terminating Safeguards on Excess Special Nuclear Material: Defense TRU Waste Clean-up and Nonproliferation - 12426  

SciTech Connect (OSTI)

The Department of Energy (DOE) and the National Nuclear Security Administration (NNSA) manages defense nuclear material that has been determined to be excess to programmatic needs and declared waste. When these wastes contain plutonium, they almost always meet the definition of defense transuranic (TRU) waste and are thus eligible for disposal at the Waste Isolation Pilot Plant (WIPP). The DOE operates the WIPP in a manner that physical protections for attractiveness level D or higher special nuclear material (SNM) are not the normal operating condition. Therefore, there is currently a requirement to terminate safeguards before disposal of these wastes at the WIPP. Presented are the processes used to terminate safeguards, lessons learned during the termination process, and how these approaches might be useful for future defense TRU waste needing safeguards termination prior to shipment and disposal at the WIPP. Also described is a new criticality control container, which will increase the amount of fissile material that can be loaded per container, and how it will save significant taxpayer dollars. Retrieval, compliant packaging and shipment of retrievably stored legacy TRU waste has dominated disposal operations at WIPP since it began operations 12 years ago. But because most of this legacy waste has successfully been emplaced in WIPP, the TRU waste clean-up focus is turning to newly-generated TRU materials. A major component will be transuranic SNM, currently managed in safeguards-protected vaults around the weapons complex. As DOE and NNSA continue to consolidate and shrink the weapons complex footprint, it is expected that significant quantities of transuranic SNM will be declared surplus to the nation's needs. Safeguards termination of SNM varies due to the wide range of attractiveness level of the potential material that may be directly discarded as waste. To enhance the efficiency of shipping waste with high TRU fissile content to WIPP, DOE designed an over-pack container, similar to the pipe component, called the criticality control over-pack, which will significantly enhance the efficiency of disposal. Hundreds of shipments of transuranic SNM, suitably packaged to meet WIPP waste acceptance criteria and with safeguards terminated have been successfully emplaced at WIPP (primarily from the Rocky Flats site clean-up) since WIPP opened. DOE expects that thousands more may eventually result from SNM consolidation efforts throughout the weapons complex. (authors)

Hayes, Timothy [Los Alamos National Laboratory, Carlsbad Operations Group (United States); Nelson, Roger [Department Of Energy, Carlsbad Operations Office (United States)

2012-07-01T23:59:59.000Z

400

Identification of Learning Disabled Adolescents: A Bayesian Approach  

E-Print Network [OSTI]

The identification of learning disabled adolescents for program placement is a major concern of school personnel. The identification model discussed in this article addresses an array of problems associated with identification ...

Alley, Gordon R.; Deshler, Donald D.; Warner, Michael M.

1980-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

NAC Ad-Hoc Task Force on Planetary Defense Apr 15-16, 2010 CORRECTED 6/10/10 1 NASA ADVISORY COUNCIL (NAC)  

E-Print Network [OSTI]

NAC Ad-Hoc Task Force on Planetary Defense Apr 15-16, 2010 ­ CORRECTED 6/10/10 1 NASA ADVISORY COUNCIL (NAC) Ad-Hoc Task Force on Planetary Defense CORRECTED MINUTES Meeting Date: April 15-16, 2010 AGENDA: · Ad-Hoc Task Force Terms of Reference · NASA Near Earth Objects Observation (NEOO) Program

Waliser, Duane E.

402

Second Line of Defense Megaports Initiative Operational Testing and Evaluation Plan Colon Container Terminal (CCT) Panama  

SciTech Connect (OSTI)

Report on the Operational Testing and Evaluation to validate and baseline an operable system that meets the Second Line of Defense (SLD) mission requirements. An SLD system is defined as the detection technology and associated equipment, the system operators from the host country, the standard operating procedures (SOPs), and other elements such as training and maintenance which support long-term system sustainment. To this end, the activities conducted during the OT&E phase must demonstrate that the Megaports System can be operated effectively in real-time by Panama Direccion General de Aduanas (DGA Panama Customs) personnel to the standards of the U.S. Department of Energy/National Nuclear Security Administration (DOE/NNSA).

Newhouse, Robert N.

2010-01-01T23:59:59.000Z

403

The paradox of federal energy and defense installations in the West  

SciTech Connect (OSTI)

Most planners working west of the 100th meridian are aware that federal lands make up a large portion of the lands in the western states. In fact, federal lands comprise nearly 49% of the area of the fourteen states that make up the WPR family. These lands are usually under the Department of Agriculture (USFS) and the Department of Interior (BLM and NPS), but the Departments of Defense (DOD) and Energy (DOE) are also federal stewards of western lands. These federal military and energy installations play an important role in local and regional western communities and economies. They also play an important role in regional ecologies. It is a paradox that some of these sites have their share of legacy contamination from earlier missions, but they also include some of the most pristine remaining western ecosystems. In some cases, the sites are located near or surrounded by encroaching urbanization, making them particularly valuable lands both for recreation and habitat preservation.

Pava, Daniel S [Los Alamos National Laboratory

2008-01-01T23:59:59.000Z

404

Design and construction of the defense waste processing facility project at the Savannah River Plant  

SciTech Connect (OSTI)

The Du Pont Company is building for the Department of Energy a facility to vitrify high-level radioactive waste at the Savannah River Plant (SRP) near Aiken, South Carolina. The Defense Waste Processing Facility (DWPF) will solidify existing and future radioactive wastes by immobilizing the waste in Processing Facility (DWPF) will solidify existing and future radioactives wastes by immobilizing the waste in borosilicate glass contained in stainless steel canisters. The canisters will be sealed, decontaminated and stored, prior to emplacement in a federal repository. At the present time, engineering and design is 90% complete, construction is 25% complete, and radioactive processing in the $870 million facility is expected to begin by late 1989. This paper describes the SRP waste characteristics, the DWPF processing, building and equipment features, and construction progress of the facility.

Baxter, R G

1986-01-01T23:59:59.000Z

405

INVESTIGATION Allele Identification for Transcriptome-Based  

E-Print Network [OSTI]

INVESTIGATION Allele Identification for Transcriptome-Based Population Genomics in the Invasive, and AllelePipe for clustering of loci and allele identification in assembled datasets with or without are now making bulk sequencing of the genome practical for allele discovery in nonmodel and outbred study

Rieseberg, Loren

406

GRiP - A flexible approach for calculating risk as a function of consequence, vulnerability, and threat.  

SciTech Connect (OSTI)

Get a GRiP (Gravitational Risk Procedure) on risk by using an approach inspired by the physics of gravitational forces between body masses! In April 2010, U.S. Department of Homeland Security Special Events staff (Protective Security Advisors [PSAs]) expressed concern about how to calculate risk given measures of consequence, vulnerability, and threat. The PSAs believed that it is not 'right' to assign zero risk, as a multiplicative formula would imply, to cases in which the threat is reported to be extremely small, and perhaps could even be assigned a value of zero, but for which consequences and vulnerability are potentially high. They needed a different way to aggregate the components into an overall measure of risk. To address these concerns, GRiP was proposed and developed. The inspiration for GRiP is Sir Isaac Newton's Universal Law of Gravitation: the attractive force between two bodies is directly proportional to the product of their masses and inversely proportional to the squares of the distance between them. The total force on one body is the sum of the forces from 'other bodies' that influence that body. In the case of risk, the 'other bodies' are the components of risk (R): consequence, vulnerability, and threat (which we denote as C, V, and T, respectively). GRiP treats risk as if it were a body within a cube. Each vertex (corner) of the cube represents one of the eight combinations of minimum and maximum 'values' for consequence, vulnerability, and threat. The risk at each of the vertices is a variable that can be set. Naturally, maximum risk occurs when consequence, vulnerability, and threat are at their maximum values; minimum risk occurs when they are at their minimum values. Analogous to gravitational forces among body masses, the GRiP formula for risk states that the risk at any interior point of the box depends on the squares of the distances from that point to each of the eight vertices. The risk value at an interior (movable) point will be dominated by the value of one vertex as that point moves closer and closer to that one vertex. GRiP is a visualization tool that helps analysts better understand risk and its relationship to consequence, vulnerability, and threat. Estimates of consequence, vulnerability, and threat are external to GRiP; however, the GRiP approach can be linked to models or data that provide estimates of consequence, vulnerability, and threat. For example, the Enhanced Critical Infrastructure Program/Infrastructure Survey Tool produces a vulnerability index (scaled from 0 to 100) that can be used for the vulnerability component of GRiP. We recognize that the values used for risk components can be point estimates and that, in fact, there is uncertainty regarding the exact values of C, V, and T. When we use T = t{sub o} (where t{sub o} is a value of threat in its range), we mean that threat is believed to be in an interval around t{sub o}. Hence, a value of t{sub o} = 0 indicates a 'best estimate' that the threat level is equal to zero, but still allows that it is not impossible for the threat to occur. When t{sub o} = 0 but is potentially small and not exactly zero, there will be little impact on the overall risk value as long as the C and V components are not large. However, when C and/or V have large values, there can be large differences in risk given t{sub o} = 0, and t{sub o} = epsilon (where epsilon is small but greater than a value of zero). We believe this scenario explains the PSA's intuition that risk is not equal to zero when t{sub o} = 0 and C and/or V have large values. (They may also be thinking that if C has an extremely large value, it is unlikely that T is equal to 0; in the terrorist context, T would likely be dependent on C when C is extremely large.) The PSAs are implicitly recognizing the potential that t{sub o} = epsilon. One way to take this possible scenario into account is to replace point estimates for risk with interval values that reflect the uncertainty in the risk components. In fact, one could argue that T never equals zero for a man-made hazard. This

Whitfield, R. G.; Buehring, W. A.; Bassett, G. W. (Decision and Information Sciences)

2011-04-08T23:59:59.000Z

407

animal identification systems: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the performance of the new algorithm1 . I. Introduction Blind identification Reilly, James P. 178 Fuzzy membership function optimization for system identification using an...

408

aerosol source identification: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the performance of the new algorithm1 . I. Introduction Blind identification Reilly, James P. 60 Mid-Infrared Identification of Faint Submillimeter Sources Astrophysics...

409

STEPS: A Grid Search Methodology for Optimized Peptide Identification...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

A Grid Search Methodology for Optimized Peptide Identification Filtering of MSMS Database Search Results. STEPS: A Grid Search Methodology for Optimized Peptide Identification...

410

System identification for robust control design  

SciTech Connect (OSTI)

System identification for the purpose of robust control design involves estimating a nominal model of a physical system and the uncertainty bounds of that nominal model via the use of experimentally measured input/output data. Although many algorithms have been developed to identify nominal models, little effort has been directed towards identifying uncertainty bounds. Therefore, in this document, a discussion of both nominal model identification and bounded output multiplicative uncertainty identification will be presented. This document is divided into several sections. Background information relevant to system identification and control design will be presented. A derivation of eigensystem realization type algorithms will be presented. An algorithm will be developed for calculating the maximum singular value of output multiplicative uncertainty from measured data. An application will be given involving the identification of a complex system with aliased dynamics, feedback control, and exogenous noise disturbances. And, finally, a short discussion of results will be presented.

Dohner, J.L.

1995-04-01T23:59:59.000Z

411

Vulnerability of the Superficial Zone of Immature Articular Cartilage to Compressive Injury  

SciTech Connect (OSTI)

The zonal composition and functioning of adult articular cartilage causes depth-dependent responses to compressive injury. In immature cartilage, shear and compressive moduli as well as collagen and sulfated glycosaminoglycan (sGAG) content also vary with depth. However, there is little understanding of the depth-dependent damage caused by injury. Since injury to immature knee joints most often causes articular cartilage lesions, this study was undertaken to characterize the zonal dependence of biomechanical, biochemical, and matrix-associated changes caused by compressive injury. Disks from the superficial and deeper zones of bovine calves were biomechanically characterized. Injury to the disks was achieved by applying a final strain of 50% compression at 100%/second, followed by biomechanical recharacterization. Tissue compaction upon injury as well as sGAG density, sGAG loss, and biosynthesis were measured. Collagen fiber orientation and matrix damage were assessed using histology, diffraction-enhanced x-ray imaging, and texture analysis. Injured superficial zone disks showed surface disruption, tissue compaction by 20.3 {+-} 4.3% (mean {+-} SEM), and immediate biomechanical impairment that was revealed by a mean {+-} SEM decrease in dynamic stiffness to 7.1 {+-} 3.3% of the value before injury and equilibrium moduli that were below the level of detection. Tissue areas that appeared intact on histology showed clear textural alterations. Injured deeper zone disks showed collagen crimping but remained undamaged and biomechanically intact. Superficial zone disks did not lose sGAG immediately after injury, but lost 17.8 {+-} 1.4% of sGAG after 48 hours; deeper zone disks lost only 2.8 {+-} 0.3% of sGAG content. Biomechanical impairment was associated primarily with structural damage. The soft superficial zone of immature cartilage is vulnerable to compressive injury, causing superficial matrix disruption, extensive compaction, and textural alteration, which results in immediate loss of biomechanical function. In conjunction with delayed superficial sGAG loss, these changes may predispose the articular surface to further softening and tissue damage, thus increasing the risk of development of secondary osteoarthritis.

Rolauffs, R.; Muehleman, C; Li, J; Kurz, B; Kuettner, K; Frank, E; Grodzinsky, A

2010-01-01T23:59:59.000Z

412

NU to partner in major defense research effort OCTOBER 11, 2012 2:45 PM BY KEVIN ABOUREZK /  

E-Print Network [OSTI]

years, and the university anticipates additional future funding. "The UARC is good for the university of the Diocles project. The university has increased its funding from the Department of Defense from $7.3 million / LINCOLN JOURNAL STAR OMAHA -- The University of Nebraska has won an $84 million contract with the United

Umstadter, Donald

413

Northwest Energy Coalition Renewable Northwest Project Sierra Club Natural Resources Defense Council Citizens' Utility Board of Oregon  

E-Print Network [OSTI]

Northwest Energy Coalition Renewable Northwest Project Sierra Club Natural Resources Defense and renewable resources will be acquired and by whom. Strong accountability for results through measurement; second to renewable resources..." [16 U.S. Code section 839b(e)(1)] BPA's utility customers have released

414

Vol. 120, No. 2 The American Naturalist August 1982 DEFENSE OF RIPE FRUIT FROM PESTS: ITS SIGNIFICANCE IN  

E-Print Network [OSTI]

Vol. 120, No. 2 The American Naturalist August 1982 DEFENSE OF RIPE FRUIT FROM PESTS: ITS for the dispersal of their seeds (Ridley 1930; van der Pijl 1972).Fruits, discrete packages containing some seeds for germination. Fruit features (color, size, nutrient content of flesh), fruiting patterns (crop size, ripening

Herrera, Carlos M.

415

Supply Chain Management Series Presenter Mike O'Donnell, Iowa State University, worked in the defense industry for six years  

E-Print Network [OSTI]

Supply Chain Management Series Presenter Mike O'Donnell, Iowa State University, worked in the defense industry for six years in a variety of manufacturing, project and program management roles various posi- tions, his focus has been on operations management and process/quality improvement in all as

Lin, Zhiqun

416

Host-defense peptides isolated from the skin secretions of the Northern red-legged frog Rana aurora aurora  

E-Print Network [OSTI]

Host-defense peptides isolated from the skin secretions of the Northern red-legged frog Rana aurora aurora J. Michael Conlona,*, Agnes Sonnevendb , Carlos Davidsonc , Anni Demandtd , Thierry Jouennee-stimulated skin secretions of the Northern red-legged frog Rana aurora aurora and their primary structures

Davidson, Carlos

417

Abstract--The safe operation of electrical power systems is an ongoing problem. Despite the existing defense lines in the  

E-Print Network [OSTI]

consumer, Smart grids, Soft load shedding, Voltage stability. I. INTRODUCTION N electrical power systems of integrated networks (concept of smart grids), then we can imagine that in case of an incident leading to tripping of most consumers. In the defense plans against these major incidents, selective load

Paris-Sud XI, Université de

418

EIS-0063: Waste Management Operations, Double-Shell Tanks for Defense High Level Radioactive Waste Storage, Hanford Site, Richland, Washington  

Broader source: Energy.gov [DOE]

The U.S. Department of Energy developed this statement to evaluate the existing tank design and consider additional specific design and safety feature alternatives for the thirteen tanks being constructed for storage of defense high-level radioactive liquid waste at the Hanford Site in Richland, Washington. This statement supplements ERDA-1538, "Final Environmental Statement on Waste Management Operation."

419

T-668: Vulnerability in a BlackBerry Enterprise Server component could allow information disclosure and partial denial of service  

Broader source: Energy.gov [DOE]

This advisory describes a security issue in the BlackBerry Administration API component. Successful exploitation of the vulnerability could result in information disclosure and partial denial of service (DoS). The BlackBerry Administration API is a BlackBerry Enterprise Server component that is installed on the server that hosts the BlackBerry Administration Service. The BlackBerry Administration API contains multiple web services that receive API requests from client applications. The BlackBerry Administration API then translates requests into a format that the BlackBerry Administration Service can process.

420

Enhancer Identification through Comparative Genomics  

SciTech Connect (OSTI)

With the availability of genomic sequence from numerousvertebrates, a paradigm shift has occurred in the identification ofdistant-acting gene regulatory elements. In contrast to traditionalgene-centric studies in which investigators randomly scanned genomicfragments that flank genes of interest in functional assays, the modernapproach begins electronically with publicly available comparativesequence datasets that provide investigators with prioritized lists ofputative functional sequences based on their evolutionary conservation.However, although a large number of tools and resources are nowavailable, application of comparative genomic approaches remains far fromtrivial. In particular, it requires users to dynamically consider thespecies and methods for comparison depending on the specific biologicalquestion under investigation. While there is currently no single generalrule to this end, it is clear that when applied appropriately,comparative genomic approaches exponentially increase our power ingenerating biological hypotheses for subsequent experimentaltesting.

Visel, Axel; Bristow, James; Pennacchio, Len A.

2006-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

Identification of process suitable diluent  

SciTech Connect (OSTI)

The Sigma Team for Minor Actinide Separation (STMAS) was formed within the USDOE Fuel Cycle Research and Development (FCRD) program in order to develop more efficient methods for the separation of americium and other minor actinides (MA) from used nuclear fuel. The development of processes for MA separations is driven by the potential benefits; reduced long-term radiotoxicty of waste placed in a geologic repository, reduced timeframe of waste storage, reduced repository heat load, the possibility of increased repository capacity, and increased utilization of energy potential of used nuclear fuel. The research conducted within the STMAS framework is focused upon the realization of significant simplifications to aqueous recycle processes proposed for MA separations. This report describes the research efforts focused upon the identification of a process suitable diluent for a flowsheet concept for the separation of MA which is based upon the dithiophosphinic acid (DPAH) extractants previously developed at the Idaho National Laboratory (INL).

Dean R. Peterman

2014-01-01T23:59:59.000Z

422

Development of a novel technique to assess the vulnerability of micro-mechanical system components to environmentally assisted cracking.  

SciTech Connect (OSTI)

Microelectromechanical systems (MEMS) will play an important functional role in future DOE weapon and Homeland Security applications. If these emerging technologies are to be applied successfully, it is imperative that the long-term degradation of the materials of construction be understood. Unlike electrical devices, MEMS devices have a mechanical aspect to their function. Some components (e.g., springs) will be subjected to stresses beyond whatever residual stresses exist from fabrication. These stresses, combined with possible abnormal exposure environments (e.g., humidity, contamination), introduce a vulnerability to environmentally assisted cracking (EAC). EAC is manifested as the nucleation and propagation of a stable crack at mechanical loads/stresses far below what would be expected based solely upon the materials mechanical properties. If not addressed, EAC can lead to sudden, catastrophic failure. Considering the materials of construction and the very small feature size, EAC represents a high-risk environmentally induced degradation mode for MEMS devices. Currently, the lack of applicable characterization techniques is preventing the needed vulnerability assessment. The objective of this work is to address this deficiency by developing techniques to detect and quantify EAC in MEMS materials and structures. Such techniques will allow real-time detection of crack initiation and propagation. The information gained will establish the appropriate combinations of environment (defining packaging requirements), local stress levels, and metallurgical factors (composition, grain size and orientation) that must be achieved to prevent EAC.

Enos, David George; Goods, Steven Howard

2006-11-01T23:59:59.000Z

423

"Defense-in-Depth" Laser Safety and the National Ignition Facility  

SciTech Connect (OSTI)

The National Ignition Facility (NIF) is the largest and most energetic laser in the world contained in a complex the size of a football stadium. From the initial laser pulse, provided by telecommunication style infrared nanoJoule pulsed lasers, to the final 192 laser beams (1.8 Mega Joules total energy in the ultraviolet) converging on a target the size of a pencil eraser, laser safety is of paramount concern. In addition to this, there are numerous high-powered (Class 3B and 4) diagnostic lasers in use that can potentially send their laser radiation travelling throughout the facility. With individual beam paths of up to 1500 meters and a workforce of more than one thousand, the potential for exposure is significant. Simple laser safety practices utilized in typical laser labs just don't apply. To mitigate these hazards, NIF incorporates a multi layered approach to laser safety or 'Defense in Depth.' Most typical high-powered laser operations are contained and controlled within a single room using relatively simplistic controls to protect both the worker and the public. Laser workers are trained, use a standard operating procedure, and are required to wear Personal Protective Equipment (PPE) such as Laser Protective Eyewear (LPE) if the system is not fully enclosed. Non-workers are protected by means of posting the room with a warning sign and a flashing light. In the best of cases, a Safety Interlock System (SIS) will be employed which will 'safe' the laser in the case of unauthorized access. This type of laser operation is relatively easy to employ and manage. As the operation becomes more complex, higher levels of control are required to ensure personnel safety. Examples requiring enhanced controls are outdoor and multi-room laser operations. At the NIF there are 192 beam lines and numerous other Class 4 diagnostic lasers that can potentially deliver their hazardous energy to locations far from the laser source. This presents a serious and complex potential hazard to personnel. Because of this, a multilayered approach to safety is taken. This paper presents the philosophy and approach taken at the NIF in the multi-layered 'defense-in-depth' approach to laser safety.

King, J J

2010-12-02T23:59:59.000Z

424

Delaware Transportation Infrastructure Forum Problem Identification Statements  

E-Print Network [OSTI]

2013 Delaware Transportation Infrastructure Forum Problem Identification Statements Sponsored by The Delaware Center for Transportation and the Delaware Department of Transportation Delaware Center for Transportation Your main resource for transportation education and research Identifying Important Issues Related

Firestone, Jeremy

425

Identification and control of a flexible structure  

E-Print Network [OSTI]

This thesis describes the identification and vibration ics. control of a cantilevered beam with piezoelectric material as actuators and sensors. The Euler-Bernoulli beam equation is used and gravity contribution to the stiffness matrix is included...

Huang, Haiming

1998-01-01T23:59:59.000Z

426

Ethnic identification among blacks and whites  

E-Print Network [OSTI]

Two central questions drive this research: (1) Are there trends in ethnic identification among blacks and whites; and (2) Are there meaningful differences between groups that identify differently? I use descriptive and regression analysis...

Glass, Teresa Gail

1996-01-01T23:59:59.000Z

427

Feature identification framework and applications (FIFA)  

E-Print Network [OSTI]

collections that provides a general framework for applications while allowing decisions about the details of document representation and features identification to be deferred to domain specific implementations of that framework. These deferred decisions...

Audenaert, Michael Neal

2006-04-12T23:59:59.000Z

428

Radio Frequency Identification : regulating information privacy protection  

E-Print Network [OSTI]

As applications of Radio Frequency Identification (RFID) become more profuse, the technology itself is stirring up some controversy. Due to its potential for amassing large amounts of information about both people and ...

Laufer, Deanna (Deanna Raquel)

2007-01-01T23:59:59.000Z

429

SOFA Component Revision Identification 1 Premysl Brada  

E-Print Network [OSTI]

SOFA Component Revision Identification 1 Premysl Brada Department of Computer Science versions, component revision numbers and change indications are derived as a well- founded version called "component revisions" and the basic fine-grained "type revisions", can subsequently be used

430

Security approaches for Radio Frequency Identification systems  

E-Print Network [OSTI]

In this thesis, I explore the challenges related to the security of the Electronic Product Code (EPC) class of Radio Frequency Identification (RFID) tags and associated data. RFID systems can be used to improve supply chain ...

Foley, Joseph Timothy, 1976-

2007-01-01T23:59:59.000Z

431

Online Identification and Stochastic Control for Autonomous  

E-Print Network [OSTI]

Online Identification and Stochastic Control for Autonomous Internal Combustion Engines Andreas A Advanced internal combustion engine technologies have afforded an increase in the number of controllable economy, pollutant emissions, and engine acceleration. In engine use, table values are interpo- lated

Papalambros, Panos

432

Nonlinear system identification using the MRAS technique and hyperstability concepts  

E-Print Network [OSTI]

is presented. The algorithm is theoretically derived and proved hyperstable by extension of previous linear, hyperstabie response error MRAS identification techniques. Generalization and unification of pre- vious empirical nonlinear identification... Identification - Application of Hyperstability An important MRAS identification approach is known as "parallel MRAS" or response error (RE), Fig. 4. This method of identification was developed by Landau [17-18], Hang [15-16], and Johnson [19...

Schatte, Alvin Robert

1982-01-01T23:59:59.000Z

433

Basic Data Report -- Defense Waste Processing Facility Sludge Plant, Savannah River Plant 200-S Area  

SciTech Connect (OSTI)

This Basic Data Report for the Defense Waste Processing Facility (DWPF)--Sludge Plant was prepared to supplement the Technical Data Summary. Jointly, the two reports were intended to form the basis for the design and construction of the DWPF. To the extent that conflicting information may appear, the Basic Data Report takes precedence over the Technical Data Summary. It describes project objectives and design requirements. Pertinent data on the geology, hydrology, and climate of the site are included. Functions and requirements of the major structures are described to provide guidance in the design of the facilities. Revision 9 of the Basic Data Report was prepared to eliminate inconsistencies between the Technical Data Summary, Basic Data Report and Scopes of Work which were used to prepare the September, 1982 updated CAB. Concurrently, pertinent data (material balance, curie balance, etc.) have also been placed in the Basic Data Report. It is intended that these balances be used as a basis for the continuing design of the DWPF even though minor revisions may be made in these balances in future revisions to the Technical Data Summary.

Amerine, D.B.

1982-09-01T23:59:59.000Z

434

In Defense of the National Labs and Big-Budget Science  

SciTech Connect (OSTI)

The purpose of this paper is to present the unofficial and unsanctioned opinions of a Visiting Scientist at Lawrence Livermore National Laboratory on the values of LLNL and the other National Labs. The basic founding value and goal of the National Labs is big-budget scientific research, along with smaller-budget scientific research that cannot easily be done elsewhere. The most important example in the latter category is classified defense-related research. The historical guiding light here is the Manhattan Project. This endeavor was unique in human history, and might remain so. The scientific expertise and wealth of an entire nation was tapped in a project that was huge beyond reckoning, with no advance guarantee of success. It was in many respects a clash of scientific titans, with a large supporting cast, collaborating toward a single well-defined goal. Never had scientists received so much respect, so much money, and so much intellectual freedom to pursue scientific progress. And never was the gap between theory and implementation so rapidly narrowed, with results that changed the world, completely. Enormous resources are spent at the national or international level on large-scale scientific projects. LLNL has the most powerful computer in the world, Blue Gene/L. (Oops, Los Alamos just seized the title with Roadrunner; such titles regularly change hands.) LLNL also has the largest laser in the world, the National Ignition Facility (NIF). Lawrence Berkeley National Lab (LBNL) has the most powerful microscope in the world. Not only is it beyond the resources of most large corporations to make such expenditures, but the risk exceeds the possible rewards for those corporations that could. Nor can most small countries afford to finance large scientific projects, and not even the richest can afford largess, especially if Congress is under major budget pressure. Some big-budget research efforts are funded by international consortiums, such as the Large Hadron Collider (LHC) at CERN, and the International Tokamak Experimental Reactor (ITER) in Cadarache, France, a magnetic-confinement fusion research project. The postWWII histories of particle and fusion physics contain remarkable examples of both international competition, with an emphasis on secrecy, and international cooperation, with an emphasis on shared knowledge and resources. Initiatives to share sometimes came from surprising directions. Most large-scale scientific projects have potential defense applications. NIF certainly does; it is primarily designed to create small-scale fusion explosions. Blue Gene/L operates in part in service to NIF, and in part to various defense projects. The most important defense projects include stewardship of the national nuclear weapons stockpile, and the proposed redesign and replacement of those weapons with fewer, safer, more reliable, longer-lived, and less apocalyptic warheads. Many well-meaning people will consider the optimal lifetime of a nuclear weapon to be zero, but most thoughtful people, when asked how much longer they think this nation will require them, will ask for some time to think. NIF is also designed to create exothermic small-scale fusion explosions. The malapropos 'exothermic' here is a convenience to cover a profusion of complexities, but the basic idea is that the explosions will create more recoverable energy than was used to create them. One can hope that the primary future benefits of success for NIF will be in cost-effective generation of electrical power through controlled small-scale fusion reactions, rather than in improved large-scale fusion explosions. Blue Gene/L also services climate research, genomic research, materials research, and a myriad of other computational problems that become more feasible, reliable, and precise the larger the number of computational nodes employed. Blue Gene/L has to be sited within a security complex for obvious reasons, but its value extends to the nation and the world. There is a duality here between large-scale scientific research machines and the supercomputers used

Goodwin, J R

2008-07-29T23:59:59.000Z

435

National cyber defense high performance computing and analysis : concepts, planning and roadmap.  

SciTech Connect (OSTI)

There is a national cyber dilemma that threatens the very fabric of government, commercial and private use operations worldwide. Much is written about 'what' the problem is, and though the basis for this paper is an assessment of the problem space, we target the 'how' solution space of the wide-area national information infrastructure through the advancement of science, technology, evaluation and analysis with actionable results intended to produce a more secure national information infrastructure and a comprehensive national cyber defense capability. This cybersecurity High Performance Computing (HPC) analysis concepts, planning and roadmap activity was conducted as an assessment of cybersecurity analysis as a fertile area of research and investment for high value cybersecurity wide-area solutions. This report and a related SAND2010-4765 Assessment of Current Cybersecurity Practices in the Public Domain: Cyber Indications and Warnings Domain report are intended to provoke discussion throughout a broad audience about developing a cohesive HPC centric solution to wide-area cybersecurity problems.

Hamlet, Jason R.; Keliiaa, Curtis M.

2010-09-01T23:59:59.000Z

436

Predictive Fallout Composition Modeling: Improvements and Applications of the Defense Land Fallout Interpretive Code  

SciTech Connect (OSTI)

This paper outlines several improvements to the Particle Activity Module of the Defense Land Fallout Interpretive Code (DELFIC). The modeling of each phase of the fallout process is discussed within DELFIC to demonstrate the capabilities and limitations with the code for modeling and simulation. Expansion of the DELFIC isotopic library to include actinides and light elements is shown. Several key features of the new library are demonstrated, including compliance with ENDF/B-VII standards, augmentation of hardwired activated soil and actinide decay calculations with exact Bateman calculations, and full physical and chemical fractionation of all material inventories. Improvements to the radionuclide source term are demonstrated, including the ability to specify heterogeneous fission types and the ability to import source terms from irradiation calculations using the Oak Ridge Isotope Generation (ORIGEN) code. Additionally, the dose, kerma, and effective dose conversion factors are revised. Finally, the application of DELFIC for consequence management planning and forensic analysis is presented. For consequence management, DELFIC is shown to provide disaster recovery teams with simulations of real-time events, including the location, composition, time of arrival, activity rates, and dose rates of fallout, accounting for site-specific atmospheric effects. The results from DELFIC are also demonstrated for use by nuclear forensics teams to plan collection routes (including the determination of optimal collection locations), estimate dose rates to collectors, and anticipate the composition of material at collection sites. These capabilities give mission planners the ability to maximize their effectiveness in the field while minimizing risk to their collectors.

Hooper, David A [ORNL; Jodoin, Vincent J [ORNL; Lee, Ronald W [ORNL; Monterial, Mateusz [ORNL

2012-01-01T23:59:59.000Z

437

IMPACTS OF ANTIFOAM ADDITIONS AND ARGON BUBBLING ON DEFENSE WASTE PROCESSING FACILITY REDUCTION/OXIDATION  

SciTech Connect (OSTI)

During melting of HLW glass, the REDOX of the melt pool cannot be measured. Therefore, the Fe{sup +2}/{Sigma}Fe ratio in the glass poured from the melter must be related to melter feed organic and oxidant concentrations to ensure production of a high quality glass without impacting production rate (e.g., foaming) or melter life (e.g., metal formation and accumulation). A production facility such as the Defense Waste Processing Facility (DWPF) cannot wait until the melt or waste glass has been made to assess its acceptability, since by then no further changes to the glass composition and acceptability are possible. therefore, the acceptability decision is made on the upstream process, rather than on the downstream melt or glass product. That is, it is based on 'feed foward' statistical process control (SPC) rather than statistical quality control (SQC). In SPC, the feed composition to the melter is controlled prior to vitrification. Use of the DWPF REDOX model has controlled the balanjce of feed reductants and oxidants in the Sludge Receipt and Adjustment Tank (SRAT). Once the alkali/alkaline earth salts (both reduced and oxidized) are formed during reflux in the SRAT, the REDOX can only change if (1) additional reductants or oxidants are added to the SRAT, the Slurry Mix Evaporator (SME), or the Melter Feed Tank (MFT) or (2) if the melt pool is bubble dwith an oxidizing gas or sparging gas that imposes a different REDOX target than the chemical balance set during reflux in the SRAT.

Jantzen, C.; Johnson, F.

2012-06-05T23:59:59.000Z

438

THE DEVELOPMENT OF COAL-BASED TECHNOLOGIES FOR DEPARTMENT OF DEFENSE FACILITIES  

SciTech Connect (OSTI)

The third phase of a three-phase project investigating the development of coal-based technologies for US Department of Defense (DOD) facilities was completed. The objectives of the project were to: decrease DOD's dependence on foreign oil and increase its use of coal; promote public and private sector deployment of technologies for utilizing coal-based fuels in oil-designed combustion equipment; and provide a continuing environment for research and development of coal-based fuel technologies for small-scale applications at a time when market conditions in the US are not favorable for the introduction of coal-fired equipment in the commercial and industrial capacity ranges. The Phase III activities were focused on evaluating deeply-cleaned coals as fuels for industrial boilers and investigating emissions control strategies for providing ultra-low emissions when firing coal-based fuels. This was addressed by performing coal beneficiation and preparation studies, and bench- to demonstration-scale emissions reduction studies. In addition, economic studies were conducted focused on determining cost and market penetration, selection of incentives, and regional economic impacts of coal-based technologies.

Bruce G. Miller; Sharon Falcone Miller; Sarma V. Pisupati; Chunshan Song; Ronald S. Wasco; Ronald T. Wincek; Xiaochun Xu; Alan W. Scaroni; Richard Hogg; Subhash Chander; M. Thaddeus Ityokumbul; Mark S. Klima; Peter T. Luckie; Adam Rose; Richard L. Gordon; Jeffrey Lazo; A. Michael Schaal

2004-01-30T23:59:59.000Z

439

ANION ANALYSES BY ION CHROMATOGRAPHY FOR THE ALTERNATE REDUCTANT DEMONSTRATION FOR THE DEFENSE WASTE PROCESSING FACILITY  

SciTech Connect (OSTI)

The Process Science Analytical Laboratory (PSAL) at the Savannah River National Laboratory was requested by the Defense Waste Processing Facility (DWPF) to develop and demonstrate an Ion Chromatography (IC) method for the analysis of glycolate, in addition to eight other anions (fluoride, formate, chloride, nitrite, nitrate, sulfate, oxalate and phosphate) in Sludge Receipt and Adjustment Tank (SRAT) and Slurry Mix Evaporator (SME) samples. The method will be used to analyze anions for samples generated from the Alternate Reductant Demonstrations to be performed for the DWPF at the Aiken County Technology Laboratory (ACTL). The method is specific to the characterization of anions in the simulant flowsheet work. Additional work will be needed for the analyses of anions in radiological samples by Analytical Development (AD) and DWPF. The documentation of the development and demonstration of the method fulfills the third requirement in the TTQAP, SRNL-RP-2010-00105, 'Task Technical and Quality Assurance Plan for Glycolic-Formic Acid Flowsheet Development, Definition and Demonstrations Tasks 1-3'.

Best, D.

2010-08-04T23:59:59.000Z

440

Potential Collaborative Research topics with Korea’s Agency for Defense Development  

SciTech Connect (OSTI)

This presentation provides a high level summary of current research activities at the Los Alamos National Laboratory (LANL)-University of California Jacobs School of Engineering (UCSD) Engineering Institute that will be presented at Korea's Agency for Defense Development (ADD). These research activities are at the basic engineering science level with different level of maturity ranging from initial concepts to field proof-of-concept demonstrations. We believe that all of these activities are appropriate for collaborative research activities with ADD subject to approval by each institution. All the activities summarized herein have the common theme that they are multi-disciplinary in nature and typically involved the integration of high-fidelity predictive modeling, advanced sensing technologies and new development in information technology. These activities include: Wireless Sensor Systems, Swarming Robot sensor systems, Advanced signal processing (compressed sensing) and pattern recognition, Model Verification and Validation, Optimal/robust sensor system design, Haptic systems for large-scale data processing, Cyber-physical security for robots, Multi-source energy harvesting, Reliability-based approaches to damage prognosis, SHMTools software development, and Cyber-physical systems advanced study institute.

Farrar, Charles R. [Los Alamos National Laboratory; Todd, Michael D. [Univ. of California, San Diego

2012-08-23T23:59:59.000Z

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Trust Management Considerations For the Cooperative Infrastructure Defense Framework: Trust Relationships, Evidence, and Decisions  

SciTech Connect (OSTI)

Cooperative Infrastructure Defense (CID) is a hierarchical, agent-based, adaptive, cyber-security framework designed to collaboratively protect multiple enclaves or organizations participating in a complex infrastructure. CID employs a swarm of lightweight, mobile agents called Sensors designed to roam hosts throughout a security enclave to find indications of anomalies and report them to host-based Sentinels. The Sensors’ findings become pieces of a larger puzzle, which the Sentinel puts together to determine the problem and respond per policy as given by the enclave-level Sergeant agent. Horizontally across multiple enclaves and vertically within each enclave, authentication and access control technologies are necessary but insufficient authorization mechanisms to ensure that CID agents continue to fulfill their roles in a trustworthy manner. Trust management fills the gap, providing mechanisms to detect malicious agents and offering more robust mechanisms for authorization. This paper identifies the trust relationships throughout the CID hierarchy, the types of trust evidence that could be gathered, and the actions that the CID system could take if an entity is determined to be untrustworthy.

Maiden, Wendy M.

2009-12-01T23:59:59.000Z

442

Potential for substitution of geothermal energy at domestic defense installations and White Sands Missile Range  

SciTech Connect (OSTI)

Geothermal resources that might provide substitute energy at any of 76 defense installations are identified and evaluated. The geologic characteristics and related economics of potential geothermal resources located at or near the 76 installations were estimated. The geologic assessment identified 18 installations with possible geothermal resources and 4 Atlantic Coastal Plain resource configurations that represented the alternatives available to East Coast bases. These 18 locations and 4 resource configurations, together with 2 possible resources at the White Sands Missile Range and a potential resource at Kings Bay, Georgia, were examined to determine the relative economics of substituting potential geothermal energy for part or all of the existing oil, gas, and electrical energy usage. Four of the military installations - Mountain Home, Norton, Hawthorne, and Sierra - appear to be co-located with possible geothermal resources which, if present, might provide substitute energy at or below current market prices for oil. Six additional locations - Ellsworth, Luke, Williams, Bliss, Fallon, and Twentynine Palms - could become economically attractive under certain conditions. No geothermal resource was found to be economically competitive with natural gas at current controlled prices. Generation of electric power at the locations studied is estimated to be uneconomic at present.

Bakewell, C.A.; Renner, J.L.

1982-01-01T23:59:59.000Z

443

INSTALLATION OF BUBBLERS IN THE SAVANNAH RIVER SITED DEFENSE WASTE PROCESSING FACILITY MELTER  

SciTech Connect (OSTI)

Savannah River Remediation (SRR) LLC assumed the liquid waste contract at the Savannah River Site (SRS) in the summer of 2009. The main contractual agreement was to close 22 High Level Waste (HLW) tanks in eight years. To achieve this aggressive commitment, faster waste processing throughout the SRS liquid waste facilities will be required. Part of the approach to achieve faster waste processing is to increase the canister production rate of the Defense Waste Processing Facility (DWPF) from approximately 200 canisters filled with radioactive waste glass per year to 400 canisters per year. To reach this rate for melter throughput, four bubblers were installed in the DWPF Melter in the late summer of 2010. This effort required collaboration between SRR, SRR critical subcontractor EnergySolutions, and Savannah River Nuclear Solutions, including the Savannah River National Laboratory (SRNL). The tasks included design and fabrication of the bubblers and related equipment, testing of the bubblers for various technical issues, the actual installation of the bubblers and related equipment, and the initial successful operation of the bubblers in the DWPF Melter.

Smith, M.; Iverson, D.

2010-12-08T23:59:59.000Z

444

An Analysis of Department of Defense Instruction 8500.2 'Information Assurance (IA) Implementation.'  

SciTech Connect (OSTI)

The Department of Defense (DoD) provides its standard for information assurance in its Instruction 8500.2, dated February 6, 2003. This Instruction lists 157 'IA Controls' for nine 'baseline IA levels.' Aside from distinguishing IA Controls that call for elevated levels of 'robustness' and grouping the IA Controls into eight 'subject areas' 8500.2 does not examine the nature of this set of controls, determining, for example, which controls do not vary in robustness, how this set of controls compares with other such sets, or even which controls are required for all nine baseline IA levels. This report analyzes (1) the IA Controls, (2) the subject areas, and (3) the Baseline IA levels. For example, this report notes that there are only 109 core IA Controls (which this report refers to as 'ICGs'), that 43 of these core IA Controls apply without variation to all nine baseline IA levels and that an additional 31 apply with variations. This report maps the IA Controls of 8500.2 to the controls in NIST 800-53 and ITGI's CoBIT. The result of this analysis and mapping, as shown in this report, serves as a companion to 8500.2. (An electronic spreadsheet accompanies this report.)

Campbell, Philip LaRoche

2012-01-01T23:59:59.000Z

445

IMPACT OF THE SMALL COLUMN ION EXCHANGE PROCESS ON THE DEFENSE WASTE PROCESSING FACILITY - 12112  

SciTech Connect (OSTI)

The Savannah River Site (SRS) is investigating the deployment of a parallel technology to the Salt Waste Processing Facility (SWPF, presently under construction) to accelerate high activity salt waste processing. The proposed technology combines large waste tank strikes of monosodium titanate (MST) to sorb strontium and actinides with two ion exchange columns packed with crystalline silicotitanate (CST) resin to sorb cesium. The new process was designated Small Column Ion Exchange (SCIX), since the ion exchange columns were sized to fit within a waste storage tank riser. Loaded resins are to be combined with high activity sludge waste and fed to the Defense Waste Processing Facility (DWPF) for incorporation into the current glass waste form. Decontaminated salt solution produced by SCIX will be fed to the SRS Saltstone Facility for on-site immobilization as a grout waste form. Determining the potential impact of SCIX resins on DWPF processing was the basis for this study. Accelerated salt waste treatment is projected to produce a significant savings in the overall life cycle cost of waste treatment at SRS.

Koopman, D.; Lambert, D.; Fox, K.; Stone, M.

2011-11-07T23:59:59.000Z

446

Process of Integrating Screening and Detailed Risk-based Modeling Analyses to Ensure Consistent and Scientifically Defensible Results  

SciTech Connect (OSTI)

To support cleanup and closure of these tanks, modeling is performed to understand and predict potential impacts to human health and the environment. Pacific Northwest National Laboratory developed a screening tool for the United States Department of Energy, Office of River Protection that estimates the long-term human health risk, from a strategic planning perspective, posed by potential tank releases to the environment. This tool is being conditioned to more detailed model analyses to ensure consistency between studies and to provide scientific defensibility. Once the conditioning is complete, the system will be used to screen alternative cleanup and closure strategies. The integration of screening and detailed models provides consistent analyses, efficiencies in resources, and positive feedback between the various modeling groups. This approach of conditioning a screening methodology to more detailed analyses provides decision-makers with timely and defensible information and increases confidence in the results on the part of clients, regulators, and stakeholders.

Buck, John W.; McDonald, John P.; Taira, Randal Y.

2002-11-01T23:59:59.000Z

447

Annual report to Congress: Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, Calendar Year 1999  

SciTech Connect (OSTI)

This is the tenth Annual Report to the Congress describing Department of Energy activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board (Board). The Board, an independent executive-branch agency established in 1988, provides advice and recommendations to the Secretary of Energy regarding public health and safety issues at the Department's defense nuclear facilities. The Board also reviews and evaluates the content and implementation of health and safety standards, as well as other requirements, relating to the design, construction, operation, and decommissioning of the Department's defense nuclear facilities. During 1999, Departmental activities resulted in the closure of nine Board recommendations. In addition, the Department has completed all implementation plan milestones associated with three Board recommendations. One new Board recommendation was received and accepted by the Department in 1999, and a new implementation plan is being developed to address this recommendation. The Department has also made significant progress with a number of broad-based initiatives to improve safety. These include expanded implementation of integrated safety management at field sites, opening of a repository for long-term storage of transuranic wastes, and continued progress on stabilizing excess nuclear materials to achieve significant risk reduction.

None

2000-02-01T23:59:59.000Z

448

Annual report to Congress: Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, calendar year 1998  

SciTech Connect (OSTI)

This is the ninth Annual Report to the Congress describing Department of Energy (Department) activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board (Board). The Board, an independent executive-branch agency established in 1988, provides advice and recommendations to the Secretary of energy regarding public health and safety issues at the Department`s defense nuclear facilities. The Board also reviews and evaluates the content and implementation of health and safety standards, as well as other requirements, relating to the design, construction, operation, and decommissioning of the Department`s defense nuclear facilities. The locations of the major Department facilities are provided. During 1998, Departmental activities resulted in the proposed closure of one Board recommendation. In addition, the Department has completed all implementation plan milestones associated with four other Board recommendations. Two new Board recommendations were received and accepted by the Department in 1998, and two new implementation plans are being developed to address these recommendations. The Department has also made significant progress with a number of broad-based initiatives to improve safety. These include expanded implementation of integrated safety management at field sites, a renewed effort to increase the technical capabilities of the federal workforce, and a revised plan for stabilizing excess nuclear materials to achieve significant risk reduction.

NONE

1999-02-01T23:59:59.000Z

449

Particle Identification The particle identification (PID) in BRAHMS is accomplished by a combination of  

E-Print Network [OSTI]

Chapter 7 Particle Identification The particle identification (PID) in BRAHMS is accomplished detectors. This chapter first gives an overview of the PID scheme in the forward and mid­rapidity armsV/c in the angular range 2 ffi ! ` ! 18 ffi , and is the only PID for 18 ffi ! ` ! 35 ffi where the measurements

450

An Assessment of the Degree of Implementation of the Lean Aerospace Initiative Principles and Practices within the US Aerospace and Defense Industry  

E-Print Network [OSTI]

This report is a formal documentation of the results of an assessment of the degree to which Lean Principles and Practices have been implemented in the US Aerospace and Defense Industry. An Industry Association team prepared ...

Shaw, Thomas E.

451

Executive Summary At a time when 82% of all application vulnerabilities are found in web applications1  

E-Print Network [OSTI]

program which tracks issues from identification to resolution. Organizations that implement an application-traditional approach that leverages existing quality assurance (QA) or quality control (QC) groups to perform high-level functional security testing. The goal of this approach is not necessarily to turn QA/QC groups into ethical

Fisher, Kathleen

452

RADIO FREQUENCY IDENTIFICATION DEVICES: EFFECTIVENESS IN IMPROVING SAFEGUARDS AT GAS-CENTRIFUGE URANIUM-ENRICHMENT PLANTS.  

SciTech Connect (OSTI)

Recent advances in radio frequency identification devices (RFIDs) have engendered a growing interest among international safeguards experts. Potentially, RFIDs could reduce inspection work, viz. the number of inspections, number of samples, and duration of the visits, and thus improve the efficiency and effectiveness of international safeguards. This study systematically examined the applications of RFIDs for IAEA safeguards at large gas-centrifuge enrichment plants (GCEPs). These analyses are expected to help identify the requirements and desirable properties for RFIDs, to provide insights into which vulnerabilities matter most, and help formulate the required assurance tests. This work, specifically assesses the application of RFIDs for the ''Option 4'' safeguards approach, proposed by Bruce Moran, U. S. Nuclear Regulatory Commission (NRC), for large gas-centrifuge uranium-enrichment plants. The features of ''Option 4'' safeguards include placing RFIDs on all feed, product and tails (F/P/T) cylinders, along with WID readers in all FP/T stations and accountability scales. Other features of Moran's ''Option 4'' are Mailbox declarations, monitoring of load-cell-based weighing systems at the F/P/T stations and accountability scales, and continuous enrichment monitors. Relevant diversion paths were explored to evaluate how RFIDs improve the efficiency and effectiveness of safeguards. Additionally, the analysis addresses the use of RFIDs in conjunction with video monitoring and neutron detectors in a perimeter-monitoring approach to show that RFIDs can help to detect unidentified cylinders.

JOE,J.

2007-07-08T23:59:59.000Z

453

Department of Energy plan for recovery and utilization of nuclear byproducts from defense wastes. Volume 2  

SciTech Connect (OSTI)

Nuclear wastes from the defense production cycle contain many uniquely useful, intrinsically valuable, and strategically important materials. These materials have a wide range of known and potential applications in food technology, agriculture, energy, public health, medicine, industrial technology, and national security. Furthermore, their removal from the nuclear waste stream can facilitate waste management and yield economic, safety, and environmental advantages in the management and disposal of the residual nuclear wastes that have no redemptive value. This document is the program plan for implementing the recovery and beneficial use of these valuable materials. An Executive Summary of this document, DOE/DP-0013, Vol. 1, January 1983, is available. Program policy, goals and strategy are stated in Section 2. Implementation tasks, schedule and funding are detailed in Section 3. The remaining five sections and the appendixes provide necessary background information to support these two sections. Section 4 reviews some of the unique properties of the individual byproduct materials and describes both demonstrated and potential applications. The amounts of byproduct materials that are available now for research and demonstration purposes, and the amounts that could be recovered in the future for expanded applications are detailed in Section 5. Section 6 describes the effects byproduct recovery and utilization have on the management and final disposal of nuclear wastes. The institutional issues that affect the recovery, processing and utilization of nuclear byproducts are discussed in Section 7. Finally, Section 8 presents a generalized mathematical process by which applications can be evaluated and prioritized (rank-ordered) to provide planning data for program management.

Not Available

1983-08-01T23:59:59.000Z

454

Formic Acid Free Flowsheet Development To Eliminate Catalytic Hydrogen Generation In The Defense Waste Processing  

SciTech Connect (OSTI)

The Defense Waste Processing Facility (DWPF) processes legacy nuclear waste generated at the Savannah River Site (SRS) during production of plutonium and tritium demanded by the Cold War. The nuclear waste is first treated via a complex sequence of controlled chemical reactions and then vitrified into a borosilicate glass form and poured into stainless steel canisters. Converting the nuclear waste into borosilicate glass canisters is a safe, effective way to reduce the volume of the waste and stabilize the radionuclides. Testing was initiated to determine whether the elimination of formic acid from the DWPF's chemical processing flowsheet would eliminate catalytic hydrogen generation. Historically, hydrogen is generated in chemical processing of alkaline High Level Waste sludge in DWPF. In current processing, sludge is combined with nitric and formic acid to neutralize the waste, reduce mercury and manganese, destroy nitrite, and modify (thin) the slurry rheology. The noble metal catalyzed formic acid decomposition produces hydrogen and carbon dioxide. Elimination of formic acid by replacement with glycolic acid has the potential to eliminate the production of catalytic hydrogen. Flowsheet testing was performed to develop the nitric-glycolic acid flowsheet as an alternative to the nitric-formic flowsheet currently being processed at the DWPF. This new flowsheet has shown that mercury can be reduced and removed by steam stripping in DWPF with no catalytic hydrogen generation. All processing objectives were also met, including greatly reducing the Slurry Mix Evaporator (SME) product yield stress as compared to the baseline nitric/formic flowsheet. Ten DWPF tests were performed with nonradioactive simulants designed to cover a broad compositional range. No hydrogen was generated in testing without formic acid.

Lambert, Dan P.; Stone, Michael E.; Newell, J. David; Fellinger, Terri L.; Bricker, Jonathan M.

2012-09-14T23:59:59.000Z

455

T-534: Vulnerability in the PDF distiller of the BlackBerry Attachment Service for the BlackBerry Enterprise Server  

Broader source: Energy.gov [DOE]

BlackBerry advisory describes a security issue that the BlackBerry Attachment Service component of the BlackBerry Enterprise Server is susceptible to. The issue relates to a known vulnerability in the PDF distiller component of the BlackBerry Attachment Service that affects how the BlackBerry Attachment Service processes PDF files.

456

Ordered transport and identification of particles  

DOE Patents [OSTI]

A method and apparatus are provided for application of electrical field gradients to induce particle velocities to enable particle sequence and identification information to be obtained. Particle sequence is maintained by providing electroosmotic flow for an electrolytic solution in a particle transport tube. The transport tube and electrolytic solution are selected to provide an electroosmotic radius of >100 so that a plug flow profile is obtained for the electrolytic solution in the transport tube. Thus, particles are maintained in the same order in which they are introduced in the transport tube. When the particles also have known electrophoretic velocities, the field gradients introduce an electrophoretic velocity component onto the electroosmotic velocity. The time that the particles pass selected locations along the transport tube may then be detected and the electrophoretic velocity component calculated for particle identification. One particular application is the ordered transport and identification of labeled nucleotides sequentially cleaved from a strand of DNA.

Shera, E.B.

1993-05-11T23:59:59.000Z

457

Ordered transport and identification of particles  

DOE Patents [OSTI]

A method and apparatus are provided for application of electrical field gradients to induce particle velocities to enable particle sequence and identification information to be obtained. Particle sequence is maintained by providing electroosmotic flow for an electrolytic solution in a particle transport tube. The transport tube and electrolytic solution are selected to provide an electroosmotic radius of >100 so that a plug flow profile is obtained for the electrolytic solution in the transport tube. Thus, particles are maintained in the same order in which they are introduced in the transport tube. When the particles also have known electrophoretic velocities, the field gradients introduce an electrophoretic velocity component onto the electroosmotic velocity. The time that the particles pass selected locations along the transport tube may then be detected and the electrophoretic velocity component calculated for particle identification. One particular application is the ordered transport and identification of labeled nucleotides sequentially cleaved from a strand of DNA.

Shera, E. Brooks (Los Alamos, NM)

1993-01-01T23:59:59.000Z

458

Plutonium working group report on environmental, safety and health vulnerabilities associated with the Department`s plutonium storage. Volume 2, Appendix A: Process and protocol  

SciTech Connect (OSTI)

This appendix contains documentation prepared by the Plutonium ES and H Vulnerability Working Group for conducting the Plutonium ES and H Vulnerability Assessment and training the assessment teams. It has the following five parts. (1) The Project Plan describes the genesis of the project, sets forth the goals, objectives and scope, provides definitions, the projected schedule, and elements of protocol. (2) The Assessment Plan provides a detailed methodology necessary to guide the many professionals who have been recruited to conduct the DOE-wide assessment. It provides guidance on which types and forms of plutonium are to be considered within the scope of the assessment, and lays out the assessment methodology to be used. (3) The memorandum from the Project to Operations Office Managers provides the protocol and direction for participation in the assessment by external stakeholders and members of the public; and the guidance for the physical inspection of plutonium materials in storage. (4) The memorandum from the Project to the assessment teams provides guidance for vulnerability screening criteria, vulnerability evaluation and prioritization process, and vulnerability quantification for prioritization. (5) The Team Training manual was used at the training session held in Colorado Springs on April 19--21, 1994 for all members of the Working Group Assessment Teams and for the leaders of the Site Assessment Teams. The goal was to provide the same training to all of the individuals who would be conducting the assessments, and thereby provide consistency in the conduct of the assessments and uniformity in reporting of the results. The training manual in Section A.5 includes supplemental material provided to the attendees after the meeting.

NONE

1994-09-01T23:59:59.000Z

459

A procedure for oscillatory parameter identification  

SciTech Connect (OSTI)

A procedure is proposed where a power system is excited with a low-level pseduo-random probing signal and the frequency, damping, magnitude, and shape of oscillatory modes are identified using spectral density estimation and frequency-domain transfer-function identification. Attention is focussed on identifying system modes in the presence of noise. Two examples cases are studied: identification of electromechanical oscillation modes in a 16-machine power system; and turbine-generator shaft modes of a 3-machine power plant feeding a series-compensated 500-kV network.

Trudnowski, D.J.; Donnelly, M.K. [Pacific Northwest Lab., Richland, WA (United States); Hauer, J.F. [Bonneville Power Administration, Portland, OR (United States)

1994-02-01T23:59:59.000Z

460

Sediment Toxicity Identification Evaluations San Francisco Bay Regional Monitoring  

E-Print Network [OSTI]

Sediment Toxicity Identification Evaluations San Francisco Bay Regional Monitoring Program chemicals of concern that may impact the estuary's ecosystem. Toxicity Identification Evaluation (TIE identified weak associations between mortality and bulk-phase chlordane and silver concentrations at Redwood

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

EXPERIMENTAL IDENTIFICATION OF COHESIVE ZONE MODELS FROM THERMOMECHANICAL IMAGING TECHNIQUES  

E-Print Network [OSTI]

1 EXPERIMENTAL IDENTIFICATION OF COHESIVE ZONE MODELS FROM THERMOMECHANICAL IMAGING TECHNIQUES S]. Although CZMs are becoming increasingly powerful, the identification of these models still remains of the ductile material into a purely elastoplastic behaviour related to the bulk response (hardening

Paris-Sud XI, Université de

462

Coordinated Searching and Target Identification Using Teams of Autonomous Agents  

E-Print Network [OSTI]

Coordinated Searching and Target Identification Using Teams of Autonomous Agents Christopher Lum;#12;University of Washington Abstract Coordinated Searching and Target Identification Using Teams of Autonomous & Astronautics Many modern autonomous systems actually require significant human involvement. Often, the amount

Washington at Seattle, University of

463

Multichannel Blind Identification: From Subspace to Maximum Likelihood Methods  

E-Print Network [OSTI]

Multichannel Blind Identification: From Subspace to Maximum Likelihood Methods LANG TONG, MEMBER, IEEE, AND SYLVIE PERREAU Invited Paper A review of recent blind channel estimation algorithms is pre-- Blind equalization, parameter estimation, system identification. I. INTRODUCTION A. What Is Blind

Tong, Lang

464

Comparative gene identification in mammalian, fly, and fungal genomes  

E-Print Network [OSTI]

An important step in genome interpretation is the accurate identification of protein-coding genes. One approach to gene identification is comparative analysis of the genomes of several related species, to find genes that ...

Lin, Michael F. (Michael Fong-Jay)

2006-01-01T23:59:59.000Z

465

Mercury Reduction and Removal from High Level Waste at the Defense Waste Processing Facility - 12511  

SciTech Connect (OSTI)

The Defense Waste Processing Facility processes legacy nuclear waste generated at the Savannah River Site during production of enriched uranium and plutonium required by the Cold War. The nuclear waste is first treated via a complex sequence of controlled chemical reactions and then vitrified into a borosilicate glass form and poured into stainless steel canisters. Converting the nuclear waste into borosilicate glass is a safe, effective way to reduce the volume of the waste and stabilize the radionuclides. One of the constituents in the nuclear waste is mercury, which is present because it served as a catalyst in the dissolution of uranium-aluminum alloy fuel rods. At high temperatures mercury is corrosive to off-gas equipment, this poses a major challenge to the overall vitrification process in separating mercury from the waste stream prior to feeding the high temperature melter. Mercury is currently removed during the chemical process via formic acid reduction followed by steam stripping, which allows elemental mercury to be evaporated with the water vapor generated during boiling. The vapors are then condensed and sent to a hold tank where mercury coalesces and is recovered in the tank's sump via gravity settling. Next, mercury is transferred from the tank sump to a purification cell where it is washed with water and nitric acid and removed from the facility. Throughout the chemical processing cell, compounds of mercury exist in the sludge, condensate, and off-gas; all of which present unique challenges. Mercury removal from sludge waste being fed to the DWPF melter is required to avoid exhausting it to the environment or any negative impacts to the Melter Off-Gas system. The mercury concentration must be reduced to a level of 0.8 wt% or less before being introduced to the melter. Even though this is being successfully accomplished, the material balances accounting for incoming and collected mercury are not equal. In addition, mercury has not been effectively purified and collected in the Mercury Purification Cell (MPC) since 2008. A significant cleaning campaign aims to bring the MPC back up to facility housekeeping standards. Two significant investigations are being undertaken to restore mercury collection. The SMECT mercury pump has been removed from the tank and will be functionally tested. Also, research is being conducted by the Savannah River National Laboratory to determine the effects of antifoam addition on the behavior of mercury. These path forward items will help us better understand what is occurring in the mercury collection system and ultimately lead to an improved DWPF production rate and mercury recovery rate. (authors)

Behrouzi, Aria [Savannah River Remediation, LLC (United States); Zamecnik, Jack [Savannah River National Laboratory, Aiken, South Carolina, 29808 (United States)

2012-07-01T23:59:59.000Z

466

Qualification of the Nippon Instrumentation for use in Measuring Mercury at the Defense Waste Processing Facility  

SciTech Connect (OSTI)

The Nippon Mercury/RA-3000 system installed in 221-S M-14 has been qualified for use. The qualification was a side-by-side comparison of the Nippon Mercury/RA-3000 system with the currently used Bacharach Mercury Analyzer. The side-by-side testing included standards for instrument calibration verifications, spiked samples and unspiked samples. The standards were traceable back to the National Institute of Standards and Technology (NIST). The side-by-side work included the analysis of Sludge Receipt and Adjustment Tank (SRAT) Receipt, SRAT Product, and Slurry Mix Evaporator (SME) samples. With the qualification of the Nippon Mercury/RA-3000 system in M-14, the DWPF lab will be able to perform a head to head comparison of a second Nippon Mercury/RA-3000 system once the system is installed. The Defense Waste Processing Facility (DWPF) analyzes receipt and product samples from the Sludge Receipt and Adjustment Tank (SRAT) to determine the mercury (Hg) concentration in the sludge slurry. The SRAT receipt is typically sampled and analyzed for the first ten SRAT batches of a new sludge batch to obtain an average Hg concentration. This average Hg concentration is then used to determine the amount of steam stripping required during the concentration/reflux step of the SRAT cycle to achieve a less than 0.6 wt% Hg in the SRAT product solids. After processing is complete, the SRAT product is sampled and analyzed for mercury to ensure that the mercury concentration does not exceed the 0.45 wt% limit in the Slurry Mix Evaporator (SME). The DWPF Laboratory utilizes Bacharach Analyzers to support these Hg analyses at this facility. These analyzers are more than 10 years old, and they are no longer supported by the manufacturer. Due to these difficulties, the Bacharach Analyzers are to be replaced by new Nippon Mercury/RA-3000 systems. DWPF issued a Technical Task Request (TTR) for the Savannah River National Laboratory (SRNL) to assist in the qualification of the new systems. SRNL prepared a task technical and quality assurance (TT&QA) plan that outlined the activities that are necessary and sufficient to meet the objectives of the TTR. In addition, TT&QA plan also included a test plan that provided guidance to the DWPF Lab in collecting the data needed to qualify the new Nippon Mercury/RA-3000 systems.

Edwards, T.; Mahannah, R.

2011-07-05T23:59:59.000Z

467

Elimination Of Catalytic Hydrogen Generation In Defense Waste Processing Facility Slurries  

SciTech Connect (OSTI)

Based on lab-scale simulations of Defense Waste Processing Facility (DWPF) slurry chemistry, the addition of sodium nitrite and sodium hydroxide to waste slurries at concentrations sufficient to take the aqueous phase into the alkaline region (pH > 7) with approximately 500 mg nitrite ion/kg slurry (assuming <25 wt% total solids, or equivalently 2,000 mg nitrite/kg total solids) is sufficient to effectively deactivate the noble metal catalysts at temperatures between room temperature and boiling. This is a potential strategy for eliminating catalytic hydrogen generation from the list of concerns for sludge carried over into the DWPF Slurry Mix Evaporator Condensate Tank (SMECT) or Recycle Collection Tank (RCT). These conclusions are drawn in large part from the various phases of the DWPF catalytic hydrogen generation program conducted between 2005 and 2009. The findings could apply to various situations, including a solids carry-over from either the Sludge Receipt and Adjustment Tank (SRAT) or Slurry Mix Evaporator (SME) into the SMECT with subsequent transfer to the RCT, as well as a spill of formic acid into the sump system and transfer into an RCT that already contains sludge solids. There are other potential mitigating factors for the SMECT and RCT, since these vessels are typically operated at temperatures close to the minimum temperatures that catalytic hydrogen has been observed to occur in either the SRAT or SME (pure slurry case), and these vessels are also likely to be considerably more dilute in both noble metals and formate ion (the two essential components to catalytic hydrogen generation) than the two primary process vessels. Rhodium certainly, and ruthenium likely, are present as metal-ligand complexes that are favored under certain concentrations of the surrounding species. Therefore, in the SMECT or RCT, where a small volume of SRAT or SME material would be significantly diluted, conditions would be less optimal for forming or sustaining the catalytic ligand species. Such conditions are likely to adversely impact the ability of the transferred mass to produce hydrogen at the same rate (per unit mass SRAT or SME slurry) as in the SRAT or SME vessels.

Koopman, D. C.

2013-01-22T23:59:59.000Z

468

The development of a speaker identification research facility  

E-Print Network [OSTI]

related research today is speaker identification Ll, 4]. Speaker identification is the process of identifying an individual by using only information derived from the person's voice. If speaker identification could be practically implemented, it would...THE DL'VELOPFU:NT Ol A SPEAKER IDENTIFICATION RESEARCH FACILITY A Thesis by DALE PETER RUSPINO Submitted to the Craduate College of Texas A&M University in partial fulfillment of the requirement for the degree of MASTER OF SCIENCE August...

Ruspino, Dale Peter

1974-01-01T23:59:59.000Z

469

Notes 14. Experimental identification of bearing force coefficients  

E-Print Network [OSTI]

An example of system parameter identification (Hybrid Brush Seal) Luis San Andr?s (lecturer) Thanks to Adolfo Delgado, Jos? Baker (RAs) & support from Siemens Power Generation MEEN 617 - April 2008 Structural parameters K shaft = 243 lbf/in (42...Notes 14. IDENTIFICATION OF BEARING FORCE COEFFICIENTS. ? Dr. Luis San Andr?s (2009) 1 Handout # 14 (MEEN 626) Application example Experimental identification of bearing force coefficients Experimental identification of the dynamic force...

San Andres, Luis

2009-01-01T23:59:59.000Z

470

Effect of in vivo heart irradiation on the development of antioxidant defenses and cardiac functions in the rat  

SciTech Connect (OSTI)

During radiotherapy of thoracic tumors, the heart is often included in the primary treatment volume, and chronic impairment of myocardial function occurs. The cellular biomolecules are altered directly by radiation or damaged indirectly by free radical production. The purpose of this investigation was to evaluate the biochemical and functional response of the rat heart to a single high dose of radiation. The effect of 20 Gy local X irradiation was determined in the heart of Wistar rats under general anesthesia. Mechanical performances were measured in vitro using an isolated perfused working heart model, and cardiac antioxidant defenses were also evaluated. Hearts were studied at 1 and 4 months after irradiation. This single dose of radiation induced a marked drop in the mechanical activity of the rat heart: aortic output was significantly reduced (18% less than control values) at 1 month postirradiation and remained depressed for the rest of the experimental period (21% less than control 4 months after treatment). This suggests the development of myocardial failure after irradiation. The decline of functional parameters was associated with changes in antioxidant defenses. The decrease in cardiac levels of vitamin E (-30%) was associated with an increase in the levels of Mn-SOD and glustathione peroxidase (+45.5% and +32%, respectively, at 4 months postirradiation). However, cardiac vitamin C and catalase levels remained constant. Since these antioxidant defenses were activated relatively long after irradiation, it is suggested that this was probable due to the production of free radical species associated with the development of inflammation. 49 refs., 8 figs., 1 tab.

Benderitter, M.; Assem, M.; Maupoil, V. [Facultes de Medecine et de Pharmacie, Dijon (France)] [and others

1995-10-01T23:59:59.000Z

471

University of Michigan and NBER "Identification of Discrete Choice  

E-Print Network [OSTI]

Presenter: Jeremy Fox University of Michigan and NBER "Identification of Discrete Choice Models;Identification of Discrete Choice Models for Bundles and Binary Games Jeremy T. Fox University of Michigan and NBER Natalia Lazzati University of Michigan March 2014 Abstract We study nonparametric identification

472

Biografo: An Integrated Tool for Forensic Writer Identification  

E-Print Network [OSTI]

Biografo: An Integrated Tool for Forensic Writer Identification Javier Galbally, Santiago Gonzalez of a practical integrated tool for writer identification in forensic scenarios is presented. The tool has been designed to help forensic examiners along the complete identification process: from the data acquisition

Autonoma de Madrid, Universidad

473

Second Line of Defense, Port of Buenos Aires and Exolgan Container Terminal Operational Testing and Evaluation Plan, Buenos Aires, Argentina  

SciTech Connect (OSTI)

The Office of the Second Line of Defense (SLD) Megaports project team for Argentina will conduct operational testing and evaluation (OT&E) at Exolgan Container Terminal at the Port of Dock Sud from July 16-20, 2012; and at the Port of Buenos Aires from September 3-7, 2012. SLD is installing radiation detection equipment to screen export, import, and transshipment containers at these locations. The purpose of OT&E is to validate and baseline an operable system that meets the SLD mission and to ensure the system continues to perform as expected in an operational environment with Argentina Customs effectively adjudicating alarms.

Roberts, Bryan W.

2012-08-23T23:59:59.000Z

474

Thrips on Onions: Identification and Management  

E-Print Network [OSTI]

L-5397 7-01 Thrips on Onions Identification and Management A.N. Sparks, Jr. and T.-X. Liu Extension Entomologist and Research Entomologist The Texas A&M University System T hrips are the major arthropod pests of onions throughout Texas. They can...

Liu, Tong-Xian; Sparks Jr., Alton N.

2001-08-10T23:59:59.000Z

475

System Identification: Time Varying and Nonlinear Methods  

E-Print Network [OSTI]

that the choice of the generalized time varying ARX model (GTV-ARX) can be set to realize a time varying dead beat observer. Methods to use the developed algorithm(s) in this research are then considered for application to the identification of system models...

Majji, Manoranjan

2010-07-14T23:59:59.000Z

476

Identification in Posthumanist Rhetoric: Trauma and Empathy  

E-Print Network [OSTI]

of the rhetorical strategies used to build them have yet to be worked out. Identification, a key aim of rhetoric in the theory of Kenneth Burke and others, can persuade an audience to value others. However, it can also obscure the realities of who does and does...

Larsen, Amy Marie 1984-

2012-11-21T23:59:59.000Z

477

Identification for a Nonlinear Periodic Wave Equation  

SciTech Connect (OSTI)

This work is concerned with an approximation process for the identification of nonlinearities in the nonlinear periodic wave equation. It is based on the least-squares approach and on a splitting method. A numerical algorithm of gradient type and the numerical implementation are given.

Morosanu, C. [Department of Mathematics, University 'Al.I.Cuza', 6600 Iasi (Romania); Trenchea, C. [Institute of Mathematics of Romanian Academy, 6600 Iasi (Romania)

2001-07-01T23:59:59.000Z

478

groundwater nitrogen source identification and remediation  

E-Print Network [OSTI]

producer profits. This will, in turn, benefit water bodies in the area that receive stream baseflow fromgroundwater nitrogen source identification and remediation The Seymour Aquifer is a shallow aquifer water withdraws are used for irrigation while the cities of Vernon, Burk- burnett and Electra and many

479

Privacy Impact Assessment (PIA) I. System Identification  

E-Print Network [OSTI]

Privacy Impact Assessment (PIA) I. System Identification 1. IT System Name: NPM Current Public editing done at the time of entry. 2. Why the information is being collected. The NPM Education Department of the current permanent NPM Education Department staff only. The file resides on a server and access

Mathis, Wayne N.

480

Privacy Impact Assessment (PIA) I. System Identification  

E-Print Network [OSTI]

Privacy Impact Assessment (PIA) I. System Identification 1. IT System Name: NPM Public Program is being collected. The NPM Education Department manages numerous volunteers. A spreadsheet is required is shared with members of the current permanent NPM Education Department staff only. The file resides

Mathis, Wayne N.

Note: This page contains sample records for the topic "vulnerability identification defense" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Kaval: Cooperative Signature Identification on Mobile  

E-Print Network [OSTI]

Kaval: Cooperative Signature Identification on Mobile Devices Kaval is an Android-based signature in near real-time to multiple users. How It worKS Technological advances have made mobile devices device. Using a mobile device allows users to capture data from a team of users and process that data

482

Studies of positron identification with the  

E-Print Network [OSTI]

and PAMELA has been acquiring data for approximately four years. The detector was designed and optimised production in hadronic cascades within the context of positron identification. The number of 0 s produced Collaboration in 2009 were applied to simulations in the energy range 20 - 100 GeV. Results of this analysis

Haviland, David

483

Tier identification (TID) for tiered memory characteristics  

DOE Patents [OSTI]

A tier identification (TID) is to indicate a characteristic of a memory region associated with a virtual address in a tiered memory system. A thread may be serviced according to a first path based on the TID indicating a first characteristic. The thread may be serviced according to a second path based on the TID indicating a second characteristic.

Chang, Jichuan; Lim, Kevin T; Ranganathan, Parthasarathy

2014-03-25T23:59:59.000Z

484

EVALUATION OF A TURBIDITY METER FOR USE AT THE DEFENSE WASTE PROCESSING FACILITY  

SciTech Connect (OSTI)

Savannah River Remediation’s (SRR’s) Defense Waste Processing Facility (DWPF) Laboratory currently tests for sludge carry-over into the Recycle Collection Tank (RCT) by evaluating the iron concentration in the Slurry Mix Evaporator Condensate Tank (SMECT) and relating this iron concentration to the amount of sludge solids present. A new method was proposed for detecting the amount of sludge in the SMECT that involves the use of an Optek turbidity sensor. Waste Services Laboratory (WSL) personnel conducted testing on two of these units following a test plan developed by Waste Solidification Engineering (WSE). Both Optek units (SN64217 and SN65164) use sensor model AF16-N and signal converter model series C4000. The sensor body of each unit was modified to hold a standard DWPF 12 cc sample vial, also known as a “peanut” vial. The purpose of this testing was to evaluate the use of this model of turbidity sensor, or meter, to provide a measurement of the sludge solids present in the SMECT based upon samples from that tank. During discussions of the results from this study by WSE, WSL, and Savannah River National Laboratory (SRNL) personnel, an upper limit on the acceptable level of solids in SMECT samples was set at 0.14 weight percent (wt%). A “go/no-go” decision criterion was to be developed for the critical turbidity response, which is expressed in concentration units (CUs), for each Optek unit based upon the 0.14 wt% solids value. An acceptable or a “go” decision for the SMECT should reflect the situation that there is an identified risk (e.g. 5%) for a CU response from the Optek unit to be less than the critical CU value when the solids content of the SMECT is actually 0.14 wt% or greater, while a “no-go” determination (i.e., an Optek CU response above the critical CU value, a conservative decision relative to risk) would lead to additional evaluations of the SMECT to better quantify the possible solids content of the tank. Subsequent to the issuance of the initial version of this report but under the scope of the original request for technical assistance, WSE asked for this report to be revised to include the “go/no-go” CU value corresponding to 0.28 wt% solids. It was this request that led to the preparation of Revision 1 of the report. The results for the 0.28 wt% solids value were developed following the same approach as that utilized for the 0.14 wt% solids value. A sludge simulant was used to develop standards for testing both Optek units and to determine the viability of a “go/no-go” CU response for each of the units. Statistical methods were used by SRNL to develop the critical CU value for the “go/no-go” decision for these standards for each Optek unit. Since only one sludge simulant was available for this testing, the sensitivity of these results to other simulants and to actual sludge material is not known. However, limited testing with samples from the actual DWPF process (both SRAT product samples and SMECT samples) demonstrated that the use of the “go/no-go” criteria developed from the sludge simulant testing was conservative for these samples taken from the sludge batch, Sludge Batch 7b, being processed at the time of this testing. While both of the Optek units performed very reliably during this testing, there were statistically significant differences (although small on a practical scale) between the two units. Thus, testing should be conducted on any new unit of this Optek model to qualify it before it is used to support the DWPF operation.

Mahannah, R.; Edwards, T.

2013-06-04T23:59:59.000Z

485

SUMMARY OF FY11 SULFATE RETENTION STUDIES FOR DEFENSE WASTE PROCESSING FACILITY GLASS  

SciTech Connect (OSTI)

This report describes the results of studies related to the incorporation of sulfate in high level waste (HLW) borosilicate glass produced at the Savannah River Site (SRS) Defense Waste Processing Facility (DWPF). A group of simulated HLW glasses produced for earlier sulfate retention studies was selected for full chemical composition measurements to determine whether there is any clear link between composition and sulfate retention over the compositional region evaluated. In addition, the viscosity of several glasses was measured to support future efforts in modeling sulfate solubility as a function of predicted viscosity. The intent of these studies was to develop a better understanding of sulfate retention in borosilicate HLW glass to allow for higher loadings of sulfate containing waste. Based on the results of these and other studies, the ability to improve sulfate solubility in DWPF borosilicate glasses lies in reducing the connectivity of the glass network structure. This can be achieved, as an example, by increasing the concentration of alkali species in the glass. However, this must be balanced with other effects of reduced network connectivity, such as reduced viscosity, potentially lower chemical durability, and in the case of higher sodium and aluminum concentrations, the propensity for nepheline crystallization. Future DWPF processing is likely to target higher waste loadings and higher sludge sodium concentrations, meaning that alkali concentrations in the glass will already be relatively high. It is therefore unlikely that there will be the ability to target significantly higher total alkali concentrations in the glass solely to support increased sulfate solubility without the increased alkali concentration causing failure of other Product Composition Control System (PCCS) constraints, such as low viscosity and durability. No individual components were found to provide a significant improvement in sulfate retention (i.e., an increase of the magnitude necessary to have a dramatic impact on blending, washing, or waste loading strategies for DWPF) for the glasses studied here. In general, the concentrations of those species that significantly improve sulfate solubility in a borosilicate glass must be added in relatively large concentrations (e.g., 13 to 38 wt % or more of the frit) in order to have a substantial impact. For DWPF, these concentrations would constitute too large of a portion of the frit to be practical. Therefore, it is unlikely that specific additives may be introduced into the DWPF glass via the frit to significantly improve sulfate solubility. The results presented here continue to show that sulfate solubility or retention is a function of individual glass compositions, rather than a property of a broad glass composition region. It would therefore be inappropriate to set a single sulfate concentration limit for a range of DWPF glass compositions. Sulfate concentration limits should continue to be identified and implemented for each sludge batch. The current PCCS limit is 0.4 wt % SO{sub 4}{sup 2-} in glass, although frit development efforts have led to an increased limit of 0.6 wt % for recent sludge batches. Slightly higher limits (perhaps 0.7-0.8 wt %) may be possible for future sludge batches. An opportunity for allowing a higher sulfate concentration limit at DWPF may lay lie in improving the laboratory experiments used to set this limit. That is, there are several differences between the crucible-scale testing currently used to define a limit for DWPF operation and the actual conditions within the DWPF melter. In particular, no allowance is currently made for sulfur partitioning (volatility versus retention) during melter processing as the sulfate limit is set for a specific sludge batch. A better understanding of the partitioning of sulfur in a bubbled melter operating with a cold cap as well as the impacts of sulfur on the off-gas system may allow a higher sulfate concentration limit to be established for the melter feed. This approach would have to be taken carefully to ensure that a

Fox, K.; Edwards, T.

2012-05-08T23:59:59.000Z

486

Qualification of the First ICS-3000 ION Chromatograph for use at the Defense Waste Processing Facility  

SciTech Connect (OSTI)

The ICS-3000 Ion Chromatography (IC) system installed in 221-S M-13 has been qualified for use. The qualification was a head to head comparison of the ICS-3000 with the currently used DX-500 IC system. The crosscheck work included standards for instrument calibration and calibration verifications and standards for individual anion analysis, where the standards were traceable back to the National Institute of Standards and Technology (NIST). In addition the crosscheck work included the analysis of simulated Sludge Receipt Adjustment Tank (SRAT) Receipt, SRAT Product, and Slurry Mix Evaporator (SME) samples, along with radioactive Sludge Batch 5 material from the SRAT and SME tanks. Based upon the successful qualification of the ICS-3000 in M-13, it is recommended that this task proceed in developing the data to qualify, by a head to head comparison of the two ICS-3000 instruments, a second ICS-3000 to be installed in M-14. The Defense Waste Processing Facility (DWPF) requires the analysis of specific anions at various stages of its processing of high level waste (HLW). The anions of interest to the DWPF are fluoride, formate, chloride, nitrite, nitrate, sulfate, oxalate, and phosphate. The anion analysis is used to evaluate process chemistry including formic acid/nitric acid additions to establish optimum conditions for mercury stripping, reduction-oxidation (REDOX) chemistry for the melter, nitrite destruction, organic acid constituents, etc. The DWPF Laboratory (Lab) has been using Dionex DX-500 ion chromatography (IC) systems since 1998. The vendor informed DWPF in 2006 that the instruments would no longer be supported by service contracts after 2008. DWPF purchased three new ICS-3000 systems in September of 2006. The ICS-3000 instruments are (a) designed to be more stable using an eluent generator to make eluent, (b) require virtually no daily chemical handling by the analysts, (c) require less line breaks in the hood, and (d) generally require less maintenance due to the pump configuration only using water versus the current system where the pump uses various hydroxide concentrations. The ICS-3000 instruments also allow the DWPF to maintain current service contracts, which support routine preventive maintenance and emergency support for larger problems such as component failure. One of the three new systems was set up in the DWPF Lab trailers in January of 2007 to be used for the development of methods and procedures. This system will continue to be used for training, new method development and potential improvements to current methods. The qualification of the other two ICS-3000 instruments is to be a phased effort. This effort is to be supported by the Applied Computational Engineering and Statistical (ACES) group of the Savannah River National Laboratory (SRNL) as authorized by the Technical Task Request (TTR) and as directed by the corresponding Task Technical and Quality Assurance (TT&QA) plan. The installation of the first 'rad' system into the M-13 Lab module required modifications to both the Lab module and to the radiohood. The installation was completed in July 2008. The testing of this system was conducted as directed by the TT&QA plan. The purpose of this technical report is to provide a review of the data generated by these tests that will lead to the recommendation for the qualification of the M-13 ICS-3000 instrument. With the successful qualification of this first ICS-3000, plans will be developed for the installation of the second 'rad' system in the M-14 Lab module later in fiscal year 2009. When the second 'rad' ICS-3000 system is installed, the DX-500 systems will be removed and retired from service.

Edwards, T; Mahannah, R.

2011-07-05T23:59:59.000Z

487

Structural system identification: Structural dynamics model validation  

SciTech Connect (OSTI)

Structural system identification is concerned with the development of systematic procedures and tools for developing predictive analytical models based on a physical structure`s dynamic response characteristics. It is a multidisciplinary process that involves the ability (1) to define high fidelity physics-based analysis models, (2) to acquire accurate test-derived information for physical specimens using diagnostic experiments, (3) to validate the numerical simulation model by reconciling differences that inevitably exist between the analysis model and the experimental data, and (4) to quantify uncertainties in the final system models and subsequent numerical simulations. The goal of this project was to develop structural system identification techniques and software suitable for both research and production applications in code and model validation.

Red-Horse, J.R.

1997-04-01T23:59:59.000Z

488

A Very High Momentum Particle Identification Detector  

E-Print Network [OSTI]

The construction of a new detector is proposed to extend the capabilities of ALICE in the high transverse momentum (pT) region. This Very High Momentum Particle Identification Detector (VHMPID) performs charged hadron identification on a track-by-track basis in the 5 GeV/c < p < 25 GeV/c momentum range and provides ALICE with new opportunities to study parton-medium interactions at LHC energies. The VHMPID covers up to 30% of the ALICE central barrel and presents sufficient acceptance for triggered- and tagged-jet studies, allowing for the first time identified charged hadron measurements in jets. This Letter of Intent summarizes the physics motivations for such a detector as well as its layout and integration into ALICE.

T. V. Acconcia; A. G. Agocs; F. Barile; G. G. Barnafoldi; R. Bellwied; G. Bencedi; G. Bencze; D. Berenyi; L. Boldizsar; S. Chattopadhyay; F. Cindolo; D. D. Chinellato; S. D'Ambrosio; D. Das; K. Das; L. Das-Bose; A. K. Dash; G. De Cataldo; S. De Pasquale; D. Di Bari; A. Di Mauro; E. Futo; E. Garcia; G. Hamar; A. Harton; G. Iannone; R. T. Jimenez; D. W. Kim; J. S. Kim; A. Knospe; L. Kovacs; P. Levai; E. Nappi; C. Markert; P. Martinengo; D. Mayani; L. Molnar; L. Olah; G. Paic; C. Pastore; G. Patimo; M. E. Patino; V. Peskov; L. Pinsky; F. Piuz; S. Pochybova; I. Sgura; T. Sinha; J. Song; J. Takahashi; A. Timmins; J. B. Van Beelen; D. Varga; G. Volpe; M. Weber; L. Xaplanteris; J. Yi; I. K. Yoo

2013-09-24T23:59:59.000Z

489

Cascade Training Technique for Particle Identification  

E-Print Network [OSTI]

The cascade training technique which was developed during our work on the MiniBooNE particle identification has been found to be a very efficient way to improve the selection performance, especially when very low background contamination levels are desired. The detailed description of this technique is presented here based on the MiniBooNE detector Monte Carlo simulations, using both artifical neural networks and boosted decision trees as examples.

Yong Liu; Ion Stancu

2006-11-27T23:59:59.000Z

490

In Silico Identification Software (ISIS): A Machine Learning Approach to Tandem Mass Spectral Identification of Lipids  

SciTech Connect (OSTI)

Liquid chromatography-mass spectrometry-based metabolomics has gained importance in the life sciences, yet it is not supported by software tools for high throughput identification of metabolites based on their fragmentation spectra. An algorithm (ISIS: in silico identification software) and its implementation are presented and show great promise in generating in silico spectra of lipids for the purpose of structural identification. Instead of using chemical reaction rate equations or rules-based fragmentation libraries, the algorithm uses machine learning to find accurate bond cleavage rates in a mass spectrometer employing collision-induced dissocia-tion tandem mass spectrometry. A preliminary test of the algorithm with 45 lipids from a subset of lipid classes shows both high sensitivity and specificity.

Kangas, Lars J.; Metz, Thomas O.; Isaac, Georgis; Schrom, Brian T.; Ginovska-Pangovska, Bojana; Wang, Luning; Tan, Li; Lewis, Robert R.; Miller, John H.

2012-05-15T23:59:59.000Z

491

Department of Energy plan for recovery and utilization of nuclear byproducts from defense wastes. Volume 1. Executive summary  

SciTech Connect (OSTI)

Nuclear byproducts are a major national resource that has yet to be incorporated into the economy. The current Defense Byproducts Program is designed to match specific military and commercial needs with the availability of valuable products which are currently treated as waste at considerable expense in waste management costs. This program plan focuses on a few specific areas with the greatest potential for near-term development and application. It also recognizes the need for a continuing effort to develop new applications for byproducts and to continue to assess the impacts on waste management. The entire program has been, and will continue to be structured so as to ensure the safety of the public and maintain the purity of the environment. Social and institutional concerns have been recognized and will be handled appropriately. A significant effort will be undertaken to inform the public of the benefits of byproduct use and of the care being taken to ensure safe, efficient operation.

None

1983-08-01T23:59:59.000Z

492

Reevaluation Of Vitrified High-Level Waste Form Criteria For Potential Cost Savings At The Defense Waste Processing Facility  

SciTech Connect (OSTI)

At the Savannah River Site (SRS) the Defense Waste Processing Facility (DWPF) has been immobilizing SRS's radioactive high level waste (HLW) sludge into a durable borosilicate glass since 1996. Currently the DWPF has poured over 3,500 canisters, all of which are compliant with the U. S. Department of Energy's (DOE) Waste Acceptance Product Specifications for Vitrified High-Level Waste Forms (WAPS) and therefore ready to be shipped to a federal geologic repository for permanent disposal. Due to DOE petitioning to withdraw the Yucca Mountain License Application (LA) from the Nuclear Regulatory Commission (NRC) in 2010 and thus no clear disposal path for SRS canistered waste forms, there are opportunities for cost savings with future canister production at DWPF and other DOE producer sites by reevaluating high-level waste form requirements and compliance strategies and reducing/eliminating those that will not negatively impact the quality of the canistered waste form.

Ray, J. W.; Marra, S. L.; Herman, C. C.

2013-01-09T23:59:59.000Z

493

Reevaluation of Vitrified High-Level Waste Form Criteria for Potential Cost Savings at the Defense Waste Processing Facility - 13598  

SciTech Connect (OSTI)

At the Savannah River Site (SRS) the Defense Waste Processing Facility (DWPF) has been immobilizing SRS's radioactive high level waste (HLW) sludge into a durable borosilicate glass since 1996. Currently the DWPF has poured over 3,500 canisters, all of which are compliant with the U. S. Department of Energy's (DOE) Waste Acceptance Product Specifications for Vitrified High-Level Waste Forms (WAPS) and therefore ready to be shipped to a federal geologic repository for permanent disposal. Due to DOE petitioning to withdraw the Yucca Mountain License Application (LA) from the Nuclear Regulatory Commission (NRC) in 2010 and thus no clear disposal path for SRS canistered waste forms, there are opportunities for cost savings with future canister production at DWPF and other DOE producer sites by reevaluating high-level waste form requirements and compliance strategies and reducing/eliminating those that will not negatively impact the quality of the canistered waste form. (authors)

Ray, J.W. [Savannah River Remediation (United States)] [Savannah River Remediation (United States); Marra, S.L.; Herman, C.C. [Savannah River National Laboratory, Savannah River Site, Aiken, SC 29808 (United States)] [Savannah River National Laboratory, Savannah River Site, Aiken, SC 29808 (United States)

2013-07-01T23:59:59.000Z

494

Improving central heating plant performance at the defense construction supply center (DCSC): Advanced operation and maintenance methods. Final report  

SciTech Connect (OSTI)

A 1987 air pollution emissions test done by the U.S. Army Environmental Hygiene Agency (USAEHA) identified several problems with the central heating plant (CHP) at the Defense Construction Supply Center (DCSC), Columbus, OH. Though DCSC repaired the specified problems, improved coal specifications, and tried to reduce air infiltration, CHP performance remained at unacceptable levels. Consequently, DCSC contracted the U.S. Army Construction Engineering Research Laboratories (USACERL) to apply advanced operation and maintenance procedures to improve its combustion system. This study employed a system-wide approach to evaluate the CHP 5 fuel storage, combustion, heat distribution, and the control of air emissions. Many short-term improvements to the CHP were identified and tested. Subsequent combustion and air emissions tests revealed that the recommended improvements successfully increased CHP efficiency. Long-term improvements were also recommended to help maintain the short-term improvements.

Savoie, M.J.; Standerfer, J.; Schmidt, C.M.; Gostich, J.; Mignacca, J.

1994-11-01T23:59:59.000Z

495

MvirDB: Microbial Database of Protein Toxins, Virulence Factors and Antibiotic Resistance Genes for Bio-Defense Applications  

DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

MvirDB is a cenntralized resource (data warehouse) comprising all publicly accessible, organized sequence data for protein toxins, virulence factors, and antibiotic resistance genes. Protein entries in MvirDB are annotated using a high-throughput, fully automated computational annotation system; annotations are updated periodically to ensure that results are derived using current public database and open-source tool releases. Tools provided for using MvirDB include a web-based browser tool and BLAST interfaces. MvirDB serves researchers in the bio-defense and medical fields. (taken from page 3 of PI's paper of same title published in Nucleic Acids Research, 2007, Vol.35, Database Issue (Open Source)

Zhou, C. E.; Smith, J.; Lam, M.; Zemla, M. D.; Slezak, T.

496

Annual report to Congress. Department of Energy activities relating to the Defense Nuclear Facilities Safety Board, calendar year 2000  

SciTech Connect (OSTI)

This Annual Report to the Congress describes the Department of Energy's activities in response to formal recommendations and other interactions with the Defense Nuclear Facilities Safety Board. During 2000, the Department completed its implementation and proposed closure of one Board recommendation and completed all implementation plan milestones associated with two additional Board recommendations. Also in 2000, the Department formally accepted two new Board recommendations and developed implementation plans in response to those recommendations. The Department also made significant progress with a number of broad-based safety initiatives. These include initial implementation of integrated safety management at field sites and within headquarters program offices, issuance of a nuclear safety rule, and continued progress on stabilizing excess nuclear materials to achieve significant risk reduction.

None

2001-03-01T23:59:59.000Z

497

Silicate Based Glass Formulations for Immobilization of U.S. Defense Wastes Using Cold Crucible Induction Melters  

SciTech Connect (OSTI)

The cold crucible induction melter (CCIM) is an alternative technology to the currently deployed liquid-fed, ceramic-lined, Joule-heated melter for immobilizing of U.S. tank waste generated from defense related reprocessing. In order to accurately evaluate the potential benefits of deploying a CCIM, glasses must be developed specifically for that melting technology. Related glass formulation efforts have been conducted since the 1990s including a recent study that is first documented in this report. The purpose of this report is to summarize the silicate base glass formulation efforts for CCIM testing of U.S. tank wastes. Summaries of phosphate based glass formulation and phosphate and silicate based CCIM demonstration tests are reported separately (Day and Ray 2013 and Marra 2013, respectively). Combined these three reports summarize the current state of knowledge related to waste form development and process testing of CCIM technology for U.S. tank wastes.

Smith, Gary L.; Kim, Dong-Sang; Schweiger, Michael J.; Marra, James C.; Lang, Jesse B.; Crum, Jarrod V.; Crawford, Charles L.; Vienna, John D.

2014-05-22T23:59:59.000Z

498

Vulnerability of Northwestern  

E-Print Network [OSTI]

, USDA Forest Service Warren Lab, provided funding, inspiration, and a steady review of our analysis with geospatial data on their forest stands. We are grateful to Wendell Wallace, Laura Drake, Andrea Hille, Ed-parametric method of statistical analysis called Classification and Regression Tree analysis (CART®) on data about

499

Nuclear Fuel Cycle & Vulnerabilities  

SciTech Connect (OSTI)

The objective of safeguards is the timely detection of diversion of significant quantities of nuclear material from peaceful nuclear activities to the manufacture of nuclear weapons or of other nuclear explosive devices or for purposes unknown, and deterrence of such diversion by the risk of early detection. The safeguards system should be designed to provide credible assurances that there has been no diversion of declared nuclear material and no undeclared nuclear material and activities.

Boyer, Brian D. [Los Alamos National Laboratory

2012-06-18T23:59:59.000Z

500

Notes 15. Identification of parameters in mechanical systems  

E-Print Network [OSTI]

Notes 15. Identification of bearing force coefficients. ? Dr. Luis San Andr?s (2008) 1 Handout # 15 (MEEN 617) Application example Experimental identification of bearing force coefficients Consider a test bearing or seal element as a point mass... for your self-study and further learning. References Diaz, S., and L. San Andr?s, 1999, "A Method for Identification of Bearing Force Coefficients and its Application to a Squeeze Film Damper with a Bubbly Lubricant,? STLE Tribology Transactions...

San Andres, Luis

2008-01-01T23:59:59.000Z