Powered by Deep Web Technologies
Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


1

Do it yourself lighting power survey: lighting power audit for use with the Massachusetts type watts per square foot method of calculating a building's lighting power budget  

SciTech Connect (OSTI)

Advantages of the self-audit approach to energy conservation are presented. These are that it is cheaper to do it yourself; the employees become part of the corporate conservation effect; and no one knows the building and its needs better than the occupant. Steps described in the lighting survey procedure are: (1) divide the building into categories; (2) determine the total square footage for each category; (3) assign a power allowance for each category; (4) multiply the total square footage for each category by the respective power allowances; (5) add the budget sub-totals for each category to determine total building budget; and (6) walk through the building room-by-room and calculate the connected lighting load fixture-by-fixture. Some worksheets are provided. (MCW)

Not Available

1980-06-01T23:59:59.000Z

2

WASTE TO WATTS Waste is a Resource!  

E-Print Network [OSTI]

to Climate protection in light of the· Waste Framework Directive. The "energy package", e.g. the RenewablesWASTE TO WATTS Waste is a Resource! energy forum Case Studies from Estonia, Switzerland, Germany Bossart,· ABB Waste-to-Energy Plants Edmund Fleck,· ESWET Marcel van Berlo,· Afval Energie Bedrijf From

Columbia University

3

Diffusion-Confusion based Light-weight Security for Item-RFID Tag-Reader Communication  

E-Print Network [OSTI]

privacy while carrying tagged items. Keywords: RFID, Tag-Reader communication security, Light item recall etc. As a result, very soon we can expect to see RFID tagged consumer items at manyDiffusion-Confusion based Light-weight Security for Item-RFID Tag-Reader Communication DIVYAN M

Kim, Kwangjo

4

GEORGE WATTS HILL ALUMNI CENTER  

E-Print Network [OSTI]

BR IN KH O U S- BU LLITT CHILLER BUILDING F KENAN STADIUM GEORGE WATTS HILL ALUMNI CENTER EHRINGHAUS FIELD DEPARTMENT OF PUBLIC SAFETY C AR PEN TRY SH O P CHILLER BUILDING NEURO SCIENCES WATER TOWER ITS MANNING CHILLER BUILDING PUBLIC SAFETY BLDG. MORRISON RIDGEROAD EHRINGHAUS BOSHAMER BASEBALL STADIUM

North Carolina at Chapel Hill, University of

5

Security  

Broader source: Energy.gov [DOE]

Security refers to the security of the stream of principal and interest repayments and what happens in the event that a secured loan defaults.

6

Tennessee Nuclear Profile - Watts Bar Nuclear Plant  

U.S. Energy Information Administration (EIA) Indexed Site

Watts Bar Nuclear Plant" "Unit","Summer capacity (mw)","Net generation (thousand mwh)","Summer capacity factor (percent)","Type","Commercial operation date","License expiration...

7

Science and the Energy Security Challenge: The Example of Solid-State Lighting  

ScienceCinema (OSTI)

Securing a viable, carbon neutral energy future for humankind will require an effort of gargantuan proportions. As outlined clearly in a series of workshops sponsored by the DOE Office of Basic Energy Sciences (http://www.sc.doe.gov/bes/reports/list.html), fundamental advances in scientific understanding are needed to broadly implement many of the technologies that are held out as promising options to meet future energy needs, ranging from solar energy, to nuclear energy, to approaches to clean combustion. Using solid state lighting based on inorganic materials as an example, I will discuss some recent results and new directions, emphasizing the multidisciplinary, team nature of the endeavor. I will also offer some thoughts about how to encourage translation of the science into attractive, widely available products ? a significant challenge that cannot be ignored. This case study offers insight into approaches that are likely to be beneficial for addressing other aspects of the energy security challenge.

Julia Phillips

2010-01-08T23:59:59.000Z

8

Reading Municipal Light Department- Residential Renewable Energy Rebates  

Broader source: Energy.gov [DOE]

Reading Municipal Light Department (RMLD) offers rebates of $1.00/watt for solar photovoltaic and small wind installations for residential customers. A $0.25/watt adder is available for using local...

9

ORNL Trusted Corridors Project: Watts Bar Dam Inland Waterway Project  

SciTech Connect (OSTI)

Radiation has existed everywhere in the environment since the Earth's formation - in rocks, soil, water, and plants. The mining and processing of naturally occurring radioactive materials for use in medicine, power generation, consumer products, and industry inevitably generate emissions and waste. Radiological measuring devices have been used by industry for years to measure for radiation in undesired locations or simply identify radioactive materials. Since the terrorist attacks on the United States on 9-11-01 these radiation measuring devices have proliferated in many places in our nation's commerce system. DOE, TVA, the Army Corps and ORNL collaborated to test the usefulness of these devices in our nation's waterway system on this project. The purpose of the Watts Bar Dam ORNL Trusted Corridors project was to investigate the security, safety and enforcement needs of local, state and federal government entities for state-of-the-art sensor monitoring in regards to illegal cargo including utilization of the existing infrastructure. TVA's inland waterways lock system is a recognized and accepted infrastructure by the commercial carrier industry. Safety Monitoring activities included tow boat operators, commercial barges and vessels, recreational watercraft and their cargo, identification of unsafe vessels and carriers, and, monitoring of domestic and foreign commercial vessels and cargo identification. Safety Enforcement activities included cargo safety, tracking, identification of hazardous materials, waterway safety regulations, and hazardous materials regulations. Homeland Security and Law Enforcement Applications included Radiological Dispersive Devices (RDD) identification, identification of unsafe or illicit transport of hazardous materials including chemicals and radiological materials, and screening for shipments of illicit drugs. In the Fall of 2005 the SensorNet funding for the project expired. After several unsuccessful attempts to find a Federal sponsor to continue with the project, the Watts Bar Dam Project was canceled and the Exploranium radiation monitors were removed from the doors of Watts Bar Dam in early 2006. The DHS Domestic Nuclear Detection Office decided to proceed with a Pilot building on the ORNL work performed at the TN and SC weigh stations in the highway sector of the Trusted Corridors project and eventually expanded it to other southern states under the name of Southeastern Corridor Pilot Project (SETCP). Many of the Phase I goals were achieved however real-world test data of private watercraft and barges was never obtained.

Walker, Randy M [ORNL; Gross, Ian G [ORNL; Smith, Cyrus M [ORNL; Hill, David E [ORNL

2011-11-01T23:59:59.000Z

10

Safeguards and security requirements for weapons plutonium disposition in light water reactors  

SciTech Connect (OSTI)

This paper explores the issues surrounding the safeguarding of the plutonium disposition process in support of the United States nuclear weapons dismantlement program. It focuses on the disposition of the plutonium by burning mixed oxide fuel in light water reactors (LWR) and addresses physical protection, material control and accountability, personnel security and international safeguards. The S and S system needs to meet the requirements of the DOE Orders, NRC Regulations and international safeguards agreements. Experience has shown that incorporating S and S measures into early facility designs and integrating them into operations provides S and S that is more effective, more economical, and less intrusive. The plutonium disposition safeguards requirements with which the US has the least experience are the implementation of international safeguards on plutonium metal; the large scale commercialization of the mixed oxide fuel fabrication; and the transportation to and loading in the LWRs of fresh mixed oxide fuel. It is in these areas where the effort needs to be concentrated if the US is to develop safeguards and security systems that are effective and efficient.

Thomas, L.L.; Strait, R.S. [Lawrence Livermore National Lab., CA (United States). Fission Energy and Systems Safety Program

1994-10-01T23:59:59.000Z

11

GlobalWatt Inc | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia: Energy Resources Jump to: navigation,Ohio: Energy Resources Jump to: navigation,OpenBusGEFEnergyGlobalWatt Inc

12

Industrial Lighting Techniques and New Developments  

E-Print Network [OSTI]

families customarily categorized in three major groupings Incandescent, Fluorescent, and High Intensity Discharge sources. In the incandescent family, halogen capsule 'technology has led to many new general lighting sources the 90-Watt and 45-Watt... Par 38 lamps deliver the same light output in the beam as conventional 150- and 75-Watt incandescent Par sources while using 40\\ less wattage and maintaining lamp life. By reducing voltage to the filament in halogen ~apsule sources, lamps can...

Colotti, M. A.

13

Novel phosphors for solid state lighting  

E-Print Network [OSTI]

Solid state white light emitting diode lighting devices outperform conventional light sources in terms of lifetime, durability, and lumens per watt. However, the capital contribution is still to high to encourage widespread adoption. Furthermore...

Furman, Joshua D

2010-11-16T23:59:59.000Z

14

600 New Lights Bulbs to Improve Energy Efficiency at DOE | Department...  

Broader source: Energy.gov (indexed) [DOE]

our Washington, D.C., Forrestal North Building canopy with state of the art Light Emitting Diode (LED) fixtures. Every new bulb now uses just 23 watts instead of 205 watts....

15

Development of a 500 Watt High Temperature Thermoelectric Generator...  

Broader source: Energy.gov (indexed) [DOE]

More Documents & Publications Development of a 100-Watt High Temperature Thermoelectric Generator Automotive Waste Heat Conversion to Power Program Automotive Waste Heat...

16

Development of a 100-Watt High Temperature Thermoelectric Generator...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Generator Development of a 100-Watt High Temperature Thermoelectric Generator Test results for low and high temperature thermoelectric generators (TEG) those for a...

17

AstroWatt | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home5b9fcbce19 NoPublic Utilities Address: 160 EastMaine: Energy Resources JumpAspen Aerogels JumpRenewableAstroWatt Jump to:

18

Watt Does It Cost To Use It?  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion |Energy Usage »of| Department ofDepartment of Energy Watch itEnergyOptimizationWatt

19

Watch the Watts: Tips for Buying a New Television | Department...  

Broader source: Energy.gov (indexed) [DOE]

LED TV that uses 79 watts. The good news for consumers is the process of comparing energy consumption is about to get easier. Televisions manufactured after May 10, 2011 are...

20

Trico Electric Cooperative- SunWatts Incentive Program  

Broader source: Energy.gov [DOE]

Through the SunWatts Program, Trico Electric Cooperative offers residential and business customers a rebate for installing photovoltaic (PV) systems and solar water heaters. The up-front rebate for...

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


21

Duncan Valley Electric Cooperative- SunWatts Rebate Program (Arizona)  

Broader source: Energy.gov [DOE]

Duncan Valley Electric Cooperative is providing rebates to for the purchase of renewable energy systems through its SunWatts program. Photovoltaic (PV) and wind energy systems 10 kilowatts (kW) or...

22

Sulphur Springs Valley EC- SunWatts Rebate Program  

Broader source: Energy.gov [DOE]

The SunWatts Program offers home and business owners two different incentive options. Customers installing a photovoltaic (PV) system up to 10 kW and/or a system that costs less than $75,000 have...

23

Lead test assembly irradiation and analysis Watts Bar Nuclear Plant, Tennessee and Hanford Site, Richland, Washington  

SciTech Connect (OSTI)

The U.S. Department of Energy (DOE) needs to confirm the viability of using a commercial light water reactor (CLWR) as a potential source for maintaining the nation`s supply of tritium. The Proposed Action discussed in this environmental assessment is a limited scale confirmatory test that would provide DOE with information needed to assess that option. This document contains the environmental assessment results for the Lead test assembly irradiation and analysis for the Watts Bar Nuclear Plant, Tennessee, and the Hanford Site in Richland, Washington.

NONE

1997-07-01T23:59:59.000Z

24

Lighting Options for Homes.  

SciTech Connect (OSTI)

This report covers many aspects of various lighting options for homes. Types of light sources described include natural light, artificial light, incandescent lamps, fluorescent lamps, and high intensity discharge lamps. A light source selection guide gives the physical characteristics of these, design considerations, and common applications. Color, strategies for efficient lighting, and types of lighting are discussed. There is one section giving tips for various situations in specific rooms. Rooms and types of fixtures are shown on a matrix with watts saved by using the recommended type lighting for that room and room location. A major emphasis of this report is saving energy by utilizing the most suitable, recommended lighting option. (BN)

Baker, W.S.

1991-04-01T23:59:59.000Z

25

MANDATORY MEASURES OUTDOOR LIGHTING CONTROLS  

E-Print Network [OSTI]

MANDATORY MEASURES OUTDOOR LIGHTING CONTROLS (Reference: Sub-Chapter 4, Section 130.2) #12;SECTION level of each multi-tier garage. · General lighting must have occupant sensing controls with at least one control step between 20% and 50% of design lighting power · No more than 500 watts of rated

California at Davis, University of

26

Replacement of Lighting Fixtures with LED Energy Efficient Lights at the Parking Facility, Milwaukee, Wisconsin  

SciTech Connect (OSTI)

The Forest County Potawatomi Community (FCPC or Tribe) owns a six-story parking facility adjacent to its Potawatomi Bingo Casino (the Casino) in Milwaukee, Wisconsin, as well as a valet parking facility under the Casino (collectively, the Parking Facility). The Parking Facility contained 205-watt metal halide-type lights that, for security reasons, operated 24 hours per day, 7 days per week. Starting on August 30, 2010, the Tribe replaced these fixtures with 1,760 state-of-the-art, energy efficient 55-Watt LED lights. This project resulted in an immediate average reduction in monthly peak demand of 238 kW over the fourth quarter of 2010. The average reduction in monthly peak demand from October 1 through December 31, 2010 translates into a forecast annual electrical energy reduction of approximately 1,995,000 kWh or 47.3% of the pre-project demand. This project was technically effective, economically feasible, and beneficial to the public not only in terms of long term energy efficiency and associated emissions reductions, but also in the short-term jobs provided for the S.E. Wisconsin region. The project was implemented, from approval by U.S. Department of Energy (DOE) to completion, in less than 6 months. The project utilized off-the-shelf proven technologies that were fabricated locally and installed by local trade contractors.

David Brien

2012-06-21T23:59:59.000Z

27

Luminous Efficacy Standards for General Purpose Lights  

Broader source: Energy.gov [DOE]

Assembly Bill 178, adopted in June 2007, established efficacy* standards for general purpose lights sold in the state of Nevada. The bill set the required efficacy at 25 lumens per watt (lm/W) of...

28

Chicopee Electric Light- Residential Solar Rebate Program  

Broader source: Energy.gov [DOE]

Chicopee Electric Light offered rebates to residential customers who install solar photovoltaic systems on their homes. Customer rebates are $0.50 per watt for a maximum of $2,500 per installation.

29

Chapter 21: Residential Lighting Evaluation Protocol. Uniform...  

Energy Savers [EERE]

of use HVAC heating, ventilation, and air conditioning ISR in-service rate LED light-emitting diode TRM Technical Reference Manual W Watt v This report is available at no cost...

30

A Practical Approach to Dynamic Load Balancing Jerrell Watts  

E-Print Network [OSTI]

Transfer Vector Calculation ¢ ¡ ¢ £ ¤ £ ¢ ¡ ¢ ¢ ¡ ¢ ¡ ¢ ¡ ¢ £ ¤ £ ¢ ¤ £ ¢ 8 2.3.1 Heat DiffusionA Practical Approach to Dynamic Load Balancing Jerrell Watts Scalable Concurrent Programming versions of the node adaption and movement routines which were used by the load balancing code; he also

31

Stray capacitances in the watt balance operation: electrostatic forces  

E-Print Network [OSTI]

In a watt balance, stray capacitances exist between the coil and the magnet. Since the electric current flowing in the coil originates a difference between the coil and magnet electric-potentials, their electrostatic interactions must be taken into account. This paper reports the results of a finite element analysis of the forces acting on the coil.

Quagliotti, Danilo

2014-01-01T23:59:59.000Z

32

SPEED LIGHTING TECHNOLOGY SHOWCASE AT UC SANTA BARBARA  

E-Print Network [OSTI]

and WattStopper Occupancy Sensor Lagoon Road NETWORKED RAODWAY LED Cree XSP Luminaire with LumewaveSwap with Lumewave Controls & WattStopper Occupancy Sensor ROADWAY LIGHTING Lagoon Road Initial pilot utilized Luminaire with Lumewave Controls Photo:zeronetenergy.blogspot.com ABOUT THE STATE PARTNERSHIP FOR ENERGY

California at Davis, University of

33

White LED Benchmark of 65 Lumens Per Watt Achieved  

Broader source: Energy.gov [DOE]

Novel chip design and the balance of multiple interrelated design parameters have enabled Cree, Inc.'s Santa Barbara Technology Center to demonstrate white LEDs with efficacies greater than 65 lumens per watt at 350 mA. The results are particularly significant because they were achieved with a pre-production prototype chip using the same package used in Cree's commercially available XLamp 7090 high power LED, rather than a laboratory device.

34

Taunton Municipal Lighting Plant- Residential PV Rebate Program  

Broader source: Energy.gov [DOE]

Customers of Taunton Municipal Lighting Plant (TMLP) may be eligible for $2.00/watt rebate on solar photovoltaic (PV) installations. The minimum system size eligible for this rebate is 1 kilowatt ...

35

Watts Community, Oklahoma: Energy Resources | Open Energy Information  

Open Energy Info (EERE)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data CenterFranconia, Virginia:FAQ < RAPID Jump to:Seadov PtyInformationSEDS dataIndiana:CoopWaspa|Wattner and Scheuten JV Jump to:Watts

36

STATE OF CALIFORNIA HSPP/PSPP INSTALLATION; COOLING COIL AIRFLOW & FAN WATT DRAW TEST  

E-Print Network [OSTI]

STATE OF CALIFORNIA HSPP/PSPP INSTALLATION; COOLING COIL AIRFLOW & FAN WATT DRAW TEST CEC- CF-4R TESTING CF-4R-MECH-22 HSPP/PSPP Installation; Cooling Coil Airflow & Fan Watt Draw Test (Page 1 of 3) Site of a Static Pressure Probe (HSPP), and Permanently installed Static Pressure Probe (PSPP) in the supply plenum

37

STATE OF CALIFORNIA HSPP/PSPP INSTALLATION; COOLING COIL AIRFLOW & FAN WATT DRAW TEST  

E-Print Network [OSTI]

STATE OF CALIFORNIA HSPP/PSPP INSTALLATION; COOLING COIL AIRFLOW & FAN WATT DRAW TEST CEC-CF-6R/PSPP Installation; Cooling Coil Airflow & Fan Watt Draw Test (Page 1 of 3) Site Address: Enforcement Agency: Permit), and Permanently installed Static Pressure Probe (PSPP) in the supply plenum When the Certificate of Compliance (CF

38

Further testing and development of an 11-watt Stirling converter  

SciTech Connect (OSTI)

Three previous IECEC papers describe the development of an 11-watt Radioisotope Stirling Generator (RSG) intended for remote power applications. This paper describes more recent testing and development activities. Testing of the engineering model (EM) was performed to determine the effect of heat rejection temperature, thermal input and initial charge pressure on thermal efficiency. Shock testing of the generator included a drop test and 3 hours of testing in a random vibration environment where g{sup 2}/Hz = 0.04. Endurance testing of a complete Stirling converter continues, with over 15,000 maintenance-free operating hours. Endurance testing of critical subsystems and components has achieved 14,000 to 26,000 hours of operation without failure. Minor changes to the RSG prototype design, based on the development of the EM, are described.

Ross, B.A.; Montgomery, W.L. [Stirling Technology Co., Richland, WA (United States)

1995-12-31T23:59:59.000Z

39

New Light Sources for Tomorrow's Lighting Designs  

E-Print Network [OSTI]

, pioneered for headlam~for the automotive industry, has led to the development of halo en capsule lamps for general lighting. The original90-watt family PAR 38 lamps using tungsten halogen capsules produces the sa amount of useful light in the beam as a I... quartz PAR lamps with similar benefi . Each of these tungsten halogen capsule PAR wattages are av ilable in narrow spot, spot, and flood beam patterns. The most recent developments in the PAR halogen psule family include two entirely new lamp designs...

Krailo, D. A.

40

Simulation of Watts Bar Unit 1 Initial Startup Tests with Continuous Energy Monte Carlo Methods  

SciTech Connect (OSTI)

The Consortium for Advanced Simulation of Light Water Reactors* is developing a collection of methods and software products known as VERA, the Virtual Environment for Reactor Applications. One component of the testing and validation plan for VERA is comparison of neutronics results to a set of continuous energy Monte Carlo solutions for a range of pressurized water reactor geometries using the SCALE component KENO-VI developed by Oak Ridge National Laboratory. Recent improvements in data, methods, and parallelism have enabled KENO, previously utilized predominately as a criticality safety code, to demonstrate excellent capability and performance for reactor physics applications. The highly detailed and rigorous KENO solutions provide a reliable nu-meric reference for VERAneutronics and also demonstrate the most accurate predictions achievable by modeling and simulations tools for comparison to operating plant data. This paper demonstrates the performance of KENO-VI for the Watts Bar Unit 1 Cycle 1 zero power physics tests, including reactor criticality, control rod worths, and isothermal temperature coefficients.

Godfrey, Andrew T [ORNL; Gehin, Jess C [ORNL; Bekar, Kursat B [ORNL; Celik, Cihangir [ORNL

2014-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


41

Watts Bar Unit 1 Cycle Zero Power Physics Tests Analysis with VERA-CS  

SciTech Connect (OSTI)

The Consortium for Advanced Simulation of Light Water Reactors (CASL) is developing a collection of methods and software products known as VERA, the Virtual Environment for Reactor Applications, including a core simulation capability called VERA-CS. A key milestone for this endeavor is to validate VERA against measurements from operating nuclear power reactors. The first step in validation against plant data is to determine the ability of VERA to accurately simulate the initial startup physics tests for Watts Bar Nuclear Power Station, Unit 1 (WBN1) cycle 1. VERA-CS calculations were performed with the Insilico code developed at ORNL using cross section processing from the SCALE system and the transport capabilities within the Denovo transport code using the SPN method. The calculations were performed with ENDF/B-VII.0 cross sections in 252 groups (collapsed to 23 groups for the 3D transport solution). The key results of the comparison of calculations with measurements include initial criticality, control rod worth critical configurations, control rod worth, differential boron worth, and isothermal temperature reactivity coefficient (ITC). The VERA results for these parameters show good agreement with measurements, with the exception of the ITC, which requires additional investigation. Results are also compared to those obtained with Monte Carlo methods and a current industry core simulator.

Gehin, Jess C [ORNL; Godfrey, Andrew T [ORNL; Evans, Thomas M [ORNL; Hamilton, Steven P [ORNL; Francheschini, F. [Westinghouse Electric Company, Cranberry Township

2014-01-01T23:59:59.000Z

42

CoServ Electric Cooperative- Commercial Energy Efficient Lighting Rebate Program  

Broader source: Energy.gov [DOE]

CoServ Electric Cooperative provides rebates for commercial and industrial customers who upgrade to high efficiency lighting for the workplace. A rebate of $0.30/watt saved is available on custom...

43

Is the hourly data I get from NREL's PV Watts program adjusted...  

Open Energy Info (EERE)

get from NREL's PV Watts program adjusted for daylight savings time. Home I take the hourly AC output numbers and apply them to a program I built that assigns a dollar value to the...

44

The Kill-a-Watt Competition at University of Central Florida...  

Broader source: Energy.gov (indexed) [DOE]

with the clean-energy economy. My first link was actually was actually to work with UCF Sustainability in a - in a large energy competition called Kill-a-Watt. ALEXANDRA KENNEDY:...

45

Relating productivity to visibility and lighting  

SciTech Connect (OSTI)

The problem of determining the appropriate light levels for visual tasks is a cost-benefit problem. Existing light level recommendations seriously underweight the importance of economic factors. Furthermore, the relative importance of the visibility factors in determining the optimal light levels appears inconsistent with the importance of these factors in determining visibility and visual performance. It is shown that calculations based on acuities give a lower limit of 100 to 200 lux for cost-effective light levels for office tasks. Upper limits are calculated from correlations of task performance to visibility levels. Visibility levels become progressively insensitive to luminance as luminance increases. Average power densities above 100 watts/m/sup 2/ are cost-effective only when visibility is very low. However, there is a 3-to-10 times larger increase in benefits from improving contrast or contrast sensitivity than from using more than 10 watts/m/sup 2/. Contrast or contrast sensitivity can be improved by using forms with larger print, using xerographic copy instead of carbon or mimeo, making sure office workers have the right eyeglasses, or even by transferring workers with visual problems to less visually demanding tasks. Once these changes are made it is no longer cost-effective to use more than 10 watts/m/sup 2/. This conclusion raises serious questions about recommendations that lead to greater than about 10 watts/m/sup 2/ of installed lighting for general office work.

Clear, R.; Berman, S.

1982-01-01T23:59:59.000Z

46

Third generation development of an 11-watt Stirling converter  

SciTech Connect (OSTI)

This paper describes recent design enhancements, performance results, and development of an artificial neural network (ANN) model related to the Radioisotope Stirling Generator (RSG), an 11-watt converter designed for remote power applications. Design enhancements include minor changes to improve performance, increase reliability, facilitate fabrication and assembly for limited production, and reduce mass. Innovative modifications were effected to increase performance and improve reliability of the vacuum foil insulation (VFI) package and linear alternator. High and low operating temperature acceptance testing of the Engineering Model (EM) demonstrated the robust system characteristics. These tests were conducted for 1 week of operation each, with rejector temperatures of 95 C and 20 C, respectively. Endurance testing continues for a complete Stirling converter, the Development Model (DM), with over 25,000 hours of maintenance-free operation. Endurance testing of flexures has attained over 540 flexure-years and endurance testing of linear motors/alternators has achieved nearly 27,000 hours of operation without failure. An ANN model was developed and tested successfully on the DM. Rejection temperatures were varied between 3 C and 75 C while load voltages ranged between engine stall and displacer overstroke. The trained ANN model, based solely on externally measured parameters, predicted values of piston amplitude, displacer amplitude, and piston-displacer phase angle within {+-}2% of the measured values over the entire operating regime. The ANN model demonstrated its effectiveness in the long-term evaluation of free-piston Stirling machines without adding the complexity, reduced reliability, and increased cost of sophisticated diagnostic instrumentation.

Montgomery, W.L.; Ross, B.A.; Penswick, L.B. [Stirling Technology Co., Kennewick, WA (United States)

1996-12-31T23:59:59.000Z

47

Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy analyzes, develops and interprets safeguards and security policy governing national security functions and the protection of related critical assets entrusted to the...

48

Idaho National Laboratory/Nuclear Power Industry Strategic Plan for Light Water Reactor Research and Development An Industry-Government Partnership to Address Climate Change and Energy Security  

SciTech Connect (OSTI)

The dual issues of energy security and climate change mitigation are driving a renewed debate over how to best provide safe, secure, reliable and environmentally responsible electricity to our nation. The combination of growing energy demand and aging electricity generation infrastructure suggests major new capacity additions will be required in the years ahead.

Electric Power Research

2007-11-01T23:59:59.000Z

49

INVERTED ECHO SOUNDER DEVELOPMENT G. F. Chaplin and D. Randolph Watts  

E-Print Network [OSTI]

INVERTED ECHO SOUNDER DEVELOPMENT G. F. Chaplin and D. Randolph Watts Graduate School of Oceanography University of Rhode Island Narragansett, RI 02882 ABSTRACT The Inverted Echo Sounder (IES and, consequently, the acoustic travel time through the water column change. The inverted echo sounder

Rhode Island, University of

50

La question du privilge en France pour la machine de Watt Paul Naegel,  

E-Print Network [OSTI]

;2 The steam engine, invented and patented in 1769 by James Watt, then marketed by him in association of very large diameter. Started in England, matters related to the new steam engines were obtained opportunities were based in France on already known applications, made with Newcomen fire engines

Paris-Sud XI, Université de

51

University of Hawai`i Watt Watcher: Energy Consumption Data Analysis  

E-Print Network [OSTI]

University of Hawai`i Watt Watcher: Energy Consumption Data Analysis Phase I Interim Report Prepared for the U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Under of the United States Government. Neither the United States Government nor any agency thereof, nor any

52

University of Hawai`i Watt Watcher: Energy Consumption Data Analysis  

E-Print Network [OSTI]

University of Hawai`i Watt Watcher: Energy Consumption Data Analysis Phase I Final Report Prepared for the U.S. Department of Energy Office of Electricity Delivery and Energy Reliability Under Award No. DE: This report was prepared as an account of work sponsored by an agency of the United States Government. Neither

53

Statistical analysis of wind energy in Chile David Watts a,b,*, Danilo Jara a  

E-Print Network [OSTI]

Data Bank Statistical analysis of wind energy in Chile David Watts a,b,*, Danilo Jara December 2010 Keywords: Wind Wind speed Energy Capacity factor Electricity Chile a b s t r a c t Bearing role in any future national energy generation matrix. With a view to understanding the local wind

Catholic University of Chile (Universidad Católica de Chile)

54

A 5-WATT, 37-GHz MONOLITHIC GRID AMPLIFIER Blythe Deckman1  

E-Print Network [OSTI]

of the fabricated active grid. Thermal Management Previous grid amplifiers lacked a heat spreader, so Figure 1A 5-WATT, 37-GHz MONOLITHIC GRID AMPLIFIER Blythe Deckman1 , Donald S. Deakin, Jr.2 , Emilio Sovero has been demonstrated. The area of the grid am- plifier is 1 cm2, and there are 512 transistors

55

Rigid Deployable Solar Array A.M. Watt and S. Pellegrino  

E-Print Network [OSTI]

with the design of low-cost rigid-panel deployable solar arrays with self- locking tape-spring hinges. The reportRigid Deployable Solar Array A.M. Watt and S. Pellegrino CUED/D-STRUCT/TR214 Department on the deployment of a solar array wing are evaluated experimentally. #12;#12;Contents 1 Introduction 1 1.1 Layout

Pellegrino, Sergio

56

MULTI-WATT ELECTRIC POWER FROM A MICROFABRICATED PERMANENT-MAGNET GENERATOR  

E-Print Network [OSTI]

MULTI-WATT ELECTRIC POWER FROM A MICROFABRICATED PERMANENT-MAGNET GENERATOR S. Das1 , D. P. Arnold2 presents the design, fabrication, and characterization of permanent-magnet (PM) generators for use, coupled to a transformer and rectifier, delivers 1.1 W of DC electrical power to a resistive load

57

HMM adaptation and voice conversion for the synthesis of child speech: a Oliver Watts1  

E-Print Network [OSTI]

, Junichi Yamagishi1 , Simon King1 , Kay Berkling2 1 Centre for Speech Technology Research, University of Edinburgh, UK 2 Inline Internet Online Dienste GmbH, Germany O.S.Watts@sms.ed.ac.uk jyamagis- netically balanced, consistently read, and cleanly recorded. The type of child speech typically available

Edinburgh, University of

58

Port security and information technology  

E-Print Network [OSTI]

The terrorist attacks of September 11th 2001 on New York and Washington DC shed light on the many security shortcomings that sea ports and the entire import and export process face. A primary source of these problems is ...

Petrakakos, Nikolaos Harilaos

2005-01-01T23:59:59.000Z

59

Optimizing performance per watt on GPUs in High Performance Computing: temperature, frequency and voltage effects  

E-Print Network [OSTI]

The magnitude of the real-time digital signal processing challenge attached to large radio astronomical antenna arrays motivates use of high performance computing (HPC) systems. The need for high power efficiency (performance per watt) at remote observatory sites parallels that in HPC broadly, where efficiency is an emerging critical metric. We investigate how the performance per watt of graphics processing units (GPUs) is affected by temperature, core clock frequency and voltage. Our results highlight how the underlying physical processes that govern transistor operation affect power efficiency. In particular, we show experimentally that GPU power consumption grows non-linearly with both temperature and supply voltage, as predicted by physical transistor models. We show lowering GPU supply voltage and increasing clock frequency while maintaining a low die temperature increases the power efficiency of an NVIDIA K20 GPU by up to 37-48% over default settings when running xGPU, a compute-bound code used in radio...

Price, D C; Barsdell, B R; Babich, R; Greenhill, L J

2014-01-01T23:59:59.000Z

60

Zinc and cadmium residues in striped bass from Cherokee, Norris, and Watts Bar reservoirs  

SciTech Connect (OSTI)

Zinc and cadmium concentrations in muscle, liver, and kidney were measured in striped bass (Morone saxatilis) from Cherokee, Norris, and Watts Bar reservoirs in East Tennessee to determine if these metals had contributed to fish kills observed in Cherokee during the 1970's. The range of mean concentrations of zinc from collections of Cherokee striped bass (muscle 11-14, liver 98-106, kidney 88-105 mg Zn/kg dry weight) were comparable to ranges in fish from Norris and Watts Bar (muscle 12-13, liver 83-132, kidney 96-108 mg/kg dry weight). With the exception of concentrations in the kidneys of one collection, cadmium residues from Cherokee striped bass (muscle 0.02-0.09, liver 0.3-0.7, kidney 0.2-4.0 mg Cd/kg dry weight) were also similar to residues from Norris and Watts Bar fish (muscle 0.05-0.13, liver 0.3-2.1, kidney 0.3-0.5 mg Cd/kg dry weight). There were significant differences in tissue residues among seasons (summer 1979, spring 1980, summer 1980) in Cherokee Reservoir, as well as significant differences among the three reservoirs (Cherokee, Norris, Watts Bar) during the same season (spring 1980). All concentrations, however, were well below those reported for fish exposed to the maximum non-harmful concentrations of zinc and the lowest potentially harmful concentration of cadmium and moreover, were within the range typically reported for fish tissues. It is, therefore, believed that in at least the last two years, zinc and cadmium in the tissues of striped bass from Cherokee Reservoir have not been harmful to the fish.

Tisa, M.S.; Strange, R.J.

1981-10-01T23:59:59.000Z

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


61

The distribution of the electric current in a watt-balance coil  

E-Print Network [OSTI]

In the watt balance experiment, separate measurements of the Lorentz and electromotive forces in a coil in a radial magnetic field enable a virtual comparison between mechanical and electric powers to be carried out, which lead to an accurate measurement of the Planck constant. This paper investigates the effect of a spatially inhomogeneous distribution of the electric current in the coil due to the higher or lower resistance of the outer or inner paths.

Sasso, Carlo Paolo; Mana, Giovanni

2013-01-01T23:59:59.000Z

62

Parametric design study of ``mini-generator`` with 6-watt heat source  

SciTech Connect (OSTI)

The Fairchild study showed that generator designs based on a single 1-watt RHU had very poor thermal efficiencies. At their optimum operating point, more than half of the generated heat was lost through the thermal insulation. This resulted in system efficiency of only 2.2%, compared to 7.2% for current Radioisotope Thermoelectric Generators (RTGs). Moreover, there were serious doubts about the fabricability of the required multicouples, particularly of the series/parallel connections between the large number (900) of thermoelectric legs of very small cross-section (0.21 mm square). All in all, the preceding paper showed that neither JPL`s Power Stick design nor the Fairchild-generated derivatives based on the 1-watt heat source looked promising. The present paper describes a similar parametric study of a mini-generator based on a 6-watt heat source, and compares its performance and fabricability to that of the optimum Power Stick derivative and of the current RTG design for the same mission. {copyright} 1995 {ital American} {ital Institute} {ital of} {ital Physics}

Schock, A.; Or, C.T. [Orbital Sciences Corporation, 20301 Century Blvd., Germantown, Maryland 20874 (United States)

1995-01-20T23:59:59.000Z

63

Acoustic Emission Monitoring of ASME Section III Hydrostatic Test: Watts Bar Unit 1 Nuclear Reactor  

SciTech Connect (OSTI)

Through the cooperation of the Tennessee Valley Authority, Pacific Northwest Laboratory has installed instrumentation on Watts Bar Nuclear Power Plant Unit 1 for the purpose of test and evaluation of acoustic emission (AE) monitoring of nuclear reactor pressure vessels and piping for flaw detection. This report describes the acoustic emission monitoring performed during the ASME Section III hydrostatic testing of Watts Bar Nuclear Power Plant Unit 1 and the results obtained. Highlights of the results are: Spontaneous AE was detected from a nozzle area during final pressurization. Evaluation of the apparent source of the spontaneous AE using an empirically derived AE/fracture mechanics relationship agreed within a factor of two with an evaluation by ASME Section XI Code procedures. AE was detected from a fracture specimen which was pressure coupled to the 10-inch accumulator nozzle. This provided reassurance of adequate system sensitivity. High background noise was observed when all four reactor coolant pumps were operating. Work is continuing at Watts Bar Unit 1 toward AE monitoring hot functional testing and subsequently monitoring during reactor operation.

Hutton,, P. H.; Taylor,, T. T.; Dawson,, J. F.; Pappas,, R. A.; Kurtz,, R. J.

1982-06-01T23:59:59.000Z

64

Breakthroughs in Practical-Sized, High Quality OLED Light Panel Source  

Broader source: Energy.gov [DOE]

General Electric Global Research has achieved a major breakthrough, developing a fully functional 2 ft. x 2 ft. light panel that produces more than 1200 lumens of quality white light with an efficacy of 15 lumens per watt. This device offers 50% better energy performance than their previous device, breaking two world records.

65

Lumen Maintenance Testing of the Philips 60-Watt Replacement Lamp L Prize Entry  

SciTech Connect (OSTI)

This paper describes testing conducted to evaluate the Philips' L Prize award winning 60-watt LED replacement product's ability to meet the lifetime/lumen maintenance requirement of the competition, which was: "having 70 percent of the lumen value under subparagraph (A) [producing a luminous flux greater than 900 lumens] exceeding 25,000 hours under typical conditions expected in residential use." A custom test apparatus was designed and constructed for this testing and a statistical approach was developed for use in evaluating the test results. This will be the only publicly available, third-party data set of long-term LED product operation.

Gordon, Kelly L.; Hafen, Ryan P.; Hathaway, John E.; McCullough, Jeffrey J.

2012-09-01T23:59:59.000Z

66

Acoustic emission monitoring of hot functional testing: Watts Bar Unit 1 Nuclear Reactor  

SciTech Connect (OSTI)

Acoustic emission (AE) monitoring of selected pressure boundary areas at TVA's Watts Bar, Unit 1 Nuclear Power Plant during hot functional preservice testing is described in this report. The report deals with background, methodology, and results. The work discussed here is a major milestone in a program supported by NRC to develop and demonstrate application of AE monitoring for continuous surveillance of reactor pressure boundaries to detect and evaluate growing flaws. The subject work demonstrated that anticipated problem areas can be overcome. Work is continuing toward AE monitoring during reactor operation.

Hutton, P.H.; Dawson, J.F.; Friesel, M.A.; Harris, J.C.; Pappas, R.A.

1984-06-01T23:59:59.000Z

67

Lower Watts Bar Reservoir Clinch River/Poplar Creek | Department of Energy  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankCombustion | Department of Energy Low-Temperature Combustion DemonstratorEast Fork Poplar CreekWatts

68

Special Analysis for the Disposal of the Idaho National Laboratory Unirradiated Light Water Breeder Reactor Rods and Pellets Waste Stream at the Area 5 Radioactive Waste Management Site, Nevada National Security Site, Nye County, Nevada  

SciTech Connect (OSTI)

The purpose of this special analysis (SA) is to determine if the Idaho National Laboratory (INL) Unirradiated Light Water Breeder Reactor (LWBR) Rods and Pellets waste stream (INEL103597TR2, Revision 2) is suitable for disposal by shallow land burial (SLB) at the Area 5 Radioactive Waste Management Site (RWMS). The INL Unirradiated LWBR Rods and Pellets waste stream consists of 24 containers with unirradiated fabricated rods and pellets composed of uranium oxide (UO2) and thorium oxide (ThO2) fuel in zirconium cladding. The INL Unirradiated LWBR Rods and Pellets waste stream requires an SA because the 229Th, 230Th, 232U, 233U, and 234U activity concentrations exceed the Nevada National Security Site (NNSS) Waste Acceptance Criteria (WAC) Action Levels.

Shott, Gregory [NSTec

2014-08-31T23:59:59.000Z

69

Lighting Research Group FinalReportOctober1999  

E-Print Network [OSTI]

Lighting Research Group FinalReportOctober1999 Lighting Recommendations for the Social Security Administration Frank Hagel Federal Building in Richmond CA #12;Final Report Lighting Recommendations to improve the lighting quality and energy efficiency of the lighting system at the Social Security

70

Energy and lighting  

SciTech Connect (OSTI)

Advances in research for new types of lighting with increased efficacies (lumens/watt) are discussed in the following areas: (1) high-frequency, solid-state ballasts, (2) isotopic enhancement of mercury isotopes, (3) magnetic augmentation, (4) electrodeless, ultra-high frequency, (5) tuned phosphors, (6) two-photon phosphors, (7) heat mirrors, and (3) advanced control circuits to take advantage of daylight and occupancy. As of 1985, improvements in efficacy have been accomplished on an economic basis to save energy for (1) high-frequency ballasts (25%), (2) isotopic enhancement (5%), and (8) advanced control circuits (up to 50%). Most of these advances depend on a deeper understanding of the weakly ionized plasma as a radiating and diffusing medium. 3 figures, 4 tables.

Berman, S.

1985-01-01T23:59:59.000Z

71

Transportation Security  

Broader source: Energy.gov (indexed) [DOE]

Preliminary Draft - For Review Only 1 Transportation Security Draft Annotated Bibliography Review July 2007 Preliminary Draft - For Review Only 2 Work Plan Task * TEC STG Work...

72

Security Specialist  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve as a Security Specialist with responsibility as the performance monitor for protective force operations conducts line management oversight of the...

73

Global security  

ScienceCinema (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-15T23:59:59.000Z

74

Global security  

SciTech Connect (OSTI)

Patrick Lynch helps technical staff, academic leaders and governments around the world improve the safety and security of their nuclear power programs.

Lynch, Patrick

2014-07-14T23:59:59.000Z

75

Cyber Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cyber Security Previous cybersecurity evaluations and designs were often dependent upon personal experience and limited empirical evidence. An LDRD project focused on cybersecurity...

76

Field representation of a watt balance magnet by partial profile measurements  

E-Print Network [OSTI]

Permanent magnets with high-permeability yokes have been widely used in watt balances for supplying a robust and strong magnetic field at the coil position. Subjected to the mechanical realization, only several $B_r(z)$ (radial magnetic field along the vertical direction) profiles can be measured by coils for field characterization. In this article, we present an algorithm that can construct the global magnetic field of the air gap based on $N(N\\geq1)$ additional measurements of $B_r(z)$ profiles. The proposed algorithm is realized by polynomially estimating the $B_z(r)$ function with analysis of basic relations between two magnetic components in air gap, i.e., $B_r(r,z)$ and $B_z(r,z)$, following the Maxwell's equations. The algorithm, verified by FEM simulations, can characterize the three-dimensional contribution of the magnetic field for a watt balance magnet with acceptable accuracy, which would supply basic field parameters for alignment and misalignment corrections.

Li, Shisong; Zhao, Wei; Huang, Songling

2015-01-01T23:59:59.000Z

77

NNSA Administrator Looks to Future of Nuclear Security at STRATCOM Symposium  

ScienceCinema (OSTI)

Administrator Thomas P. DAgostino of the National Nuclear Security Administration (NNSA) discusses the future of the Nuclear Security Enterprise and its strategic deterrence mission in light of President Obamas unprecedented nuclear security agenda.

Thomas D'Agostino

2010-09-01T23:59:59.000Z

78

High Efficiency LED Lamp for Solid-State Lighting  

SciTech Connect (OSTI)

This report contains a summary of technical achievements during a three-year project to demonstrate high efficiency, solid-state lamps based on gallium nitride/silicon carbide light-emitting diodes. Novel chip designs and fabrication processes are described for a new type of nitride light-emitting diode with the potential for very high efficiency. This work resulted in the demonstration of blue light-emitting diodes in the one watt class that achieved up to 495 mW of light output at 350 mA drive current, corresponding to quantum and wall plug efficiencies of 51% and 45%, respectively. When combined with a phosphor in Cree's 7090 XLamp package, these advanced blue-emitting devices resulted in white light-emitting diodes whose efficacy exceeded 85 lumens per watt. In addition, up to 1040 lumens at greater than 85 lumens per watt was achieved by combining multiple devices to make a compact white lamp module with high optical efficiency.

James Ibbetson

2006-12-31T23:59:59.000Z

79

Residential Lighting  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared atEffectquestionnairesU.S. EnergyEnergy EfficiencyLighting

80

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Notice ensures that DOE uniformly meets the requirements of the Homeland Security Advisory System outlined in Homeland Security Presidential Directive-3, Threat Conditions and Associated Protective Measures, dated 3-11-02, and provides responses specified in Presidential Decision Directive 39, U.S. Policy on Counterterrorism (U), dated 6-21-95. It cancels DOE N 473.8, Security Conditions, dated 8-7-02. Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels DOE N 473.8

2004-07-08T23:59:59.000Z

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


81

Security In Information Systems  

E-Print Network [OSTI]

rights, and they are proposing security policies, security planning, personal data protection laws, etc

Candan, Selçuk

82

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes the overall objectives and requirements for the Department of Energy Personnel Security Program. Cancels DOE M 472.1-1B. Canceled by DOE O 472.2.

2005-08-26T23:59:59.000Z

83

Introduction The Fiber-Lite MI-150 is a 150 Watt quartz halogen fiber optic illuminator designed for general microscopy  

E-Print Network [OSTI]

Introduction ® The Fiber-Lite MI-150 is a 150 Watt quartz halogen fiber optic illuminator designed for general microscopy use. When used with specialty fiber optic cables the MI-150 illuminator can also Illuminator from the carton and retain the manual and any additional documents. ! Remove the fiber optic cable

Kleinfeld, David

84

Heriot-Watt University has consolidated and updated its various logos to form a single more distinctive identity.  

E-Print Network [OSTI]

Brand Identity USING THE LOGO It is essential that a consistent use of colour and positioning-Watt Brand Identity. The logo should always appear in Pantone 293 and 30% Pantone 293 with a white keyline, it is necessary to consider the printers normal image parameters. The logo should therefore be positioned using

Glasbey, Chris

85

Policy on the Moderation of Assessment: Approved by the Senate, 22 May 2013 Heriot-Watt University  

E-Print Network [OSTI]

1 Policy on the Moderation of Assessment: Approved by the Senate, 22 May 2013 Heriot-Watt University Policy on the Moderation of Assessment With diversity in form of assessment across multi in all disciplines, across all Schools and in all modes or locations of study. The University Policy

Painter, Kevin

86

A watt-class 1-THz backward-wave oscillator based on sine waveguide  

SciTech Connect (OSTI)

A novel backward wave oscillator was proposed by utilizing a concise sine waveguide slow-wave structure combined with sheet electron beam to operate at terahertz frequency band. First, the design method was described, and the dispersion curve and interaction impedance of the sine waveguide were calculated, then the device oscillation frequency and operating voltage were determined. Next, the circuit transmission losses were learned over the tunable frequency range. Finally, the particle-in-cell simulation method was applied to predict its signal generation performance. The investigation results show that, the backward wave oscillator can produce over 1.9 -W peak power output at the central operating frequency of 1-THz under 27-kV operating voltage and 5-mA beam current. And the interaction efficiency at 1-THz is more than 1.4% with a circuit length of 7.2-mm. It, therefore, will be considered as a promising watt-class terahertz radiation source.

Xu Xiong; Wei Yanyu; Shen Fei; Yin Hairong; Xu Jin; Gong Yubin; Wang Wenxiang

2012-01-15T23:59:59.000Z

87

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D.

2011-06-20T23:59:59.000Z

88

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes requirements for a successful, efficient and cost-effective personnel security program to ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and fitness for placement or retention in national security positions. Cancels DOE M 470.4-5, DOE N 470.4 and DOE N 470.5. Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

89

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Transportation Security SHARE Global Threat Reduction Initiative Transportation Security Cooperation Secure Transport Operations (STOP) Box Security of radioactive material while...

90

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The protection and control of classified information is critical to our nations security. This Order establishes requirements and responsibilities for Department of Energy (DOE) Departmental Elements, including the National Nuclear Security Administration (NNSA), to protect and control classified information as required by statutes, regulation, Executive Orders, government-wide policy directives and guidelines, and DOE policy and directives. Cancels DOE M 470.4-4A Chg except for Section D. Admin Chg 1, dated 11-23-2012, cancels DOE O 471.6.

2011-06-20T23:59:59.000Z

91

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Attachment E, Technical Surveillance Countermeasures Program, is for Official Use Only. Contact the Office of Security and Safety Performance Assurance at 301-903-3653 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A.

2005-08-26T23:59:59.000Z

92

Information Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes security requirements for the protection and control of information and matter required to be classified or controlled by statutes, regulations, or Department of Energy directives. Section E, Technical Surveillance Countermeasures Program, is Official Use Only. Please contact the DOE Office of Health, Safety and Security at 301-903-0292 if your official duties require you to have access to this part of the directive. Cancels: DOE M 471.2-1B, DOE M 471.2-1C, DOE M 471.2-4, and DOE O 471.2A

2007-06-29T23:59:59.000Z

93

Interactive Montages of Sprites for Indexing and Summarizing Security Video  

E-Print Network [OSTI]

for indexing and visualizing video in the context of security applications. We wish to index security video that contains relatively rare but important events, such as security video taken from large public or industrial slowly occurring lighting changes and alterations of camera position. To achieve this, we compute a MAP

Pal, Chris

94

Security Conditions  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To ensure that DOE uniformly meets the protection requirements specified in Presidential Decision Directive 39, "U.S. Policy on Counterterrorism (U)." Attachment 2 is no longer available online. Please e-mail your request for the Attachment to: Security.Directives@hq.doe.gov. DOE N 251.44, dated 05/06/02, extends this directive until 12/31/02.

2000-09-18T23:59:59.000Z

95

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). Admin Chg 1, 10-8-13.

2011-07-27T23:59:59.000Z

96

SECURITY HANDBOOK 2 UH IT SECURITY HANDBOOK  

E-Print Network [OSTI]

Administration · 2-Factor Authentication Administration for PCI compliance · Web Site Security Scanning, please contact security@uh.edu. · Web Site Security Scanning · 2-Factor Authentication Administration

Azevedo, Ricardo

97

A nonlinearity in permanent-magnet systems used in watt balances  

E-Print Network [OSTI]

Watt balances are used to measure the Planck constant and will be used in the future to realize mass at the kilogram level. They increasingly rely on permanent magnet systems to generate the magnetic flux. It has been known that the weighing current might effect the magnetization state of the permanent magnetic system used in these systems causing a systematic bias that can lead to an error in the result if not accounted for. In this article a simple model explaining the effect of the weighing current on the yoke of the magnet is developed. This model leads to a nonlinear dependence of the magnetic flux density in the gap that is proportional to the squared value of the coil current. The effect arises from changing the reluctance of the yoke by the additional field produced by the coil. Our analysis shows that the effect depends on the width of the air gap, the magnetic flux density in the air gap, and the $BH$ curve of the yoke material. Suggestions to reduce the nonlinear effect are discussed.

Li, Shisong; Pratt, Jon

2014-01-01T23:59:59.000Z

98

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

FROM: SUBJECT: USIUK Memorandum of Understanding between National Nuclear Security Administration's (NNSA) Associate Administrator for Defense Nuclear Security (AADNS)...

99

Security seal  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, Garth W. (Albuquerque, NM)

1985-01-01T23:59:59.000Z

100

White Light Emitting Diode Development for General Illumination Applications  

SciTech Connect (OSTI)

This report contains a summary of technical achievements during a 3-year project aimed at developing the chip and packaging technology necessary to demonstrate efficient, high flux light-emitting diode (LED) arrays using Cree's gallium nitride/silicon carbide (GaN/SiC) LED technology as the starting point. Novel chip designs and fabrication processes are described that led to high power blue LEDs that achieved 310 mW of light output at 350 mA drive current, corresponding to quantum and wall plug efficiencies of 32.5% and 26.5%, respectively. When combined with phosphor, high power white LEDs with luminous output of 67 lumens and efficacy of 57 lumens per watt were also demonstrated. Advances in packaging technology are described that enabled compact, multi-chip white LED lamp modules with 800-1000 lumens output at efficacies of up to 55 lumens per watt. Lamp modules with junction-to-ambient thermal resistance as low as 1.7 C/watt have also been demonstrated.

James Ibbetson

2006-05-01T23:59:59.000Z

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


101

Personnel Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The order establishes requirements that will enable DOE to operate a successful, efficient, cost-effective personnel security program that will ensure accurate, timely and equitable determinations of individuals eligibility for access to classified information and Special Nuclear Material (SNM). This limited revision will ensure that individuals holding dual citizenship receive proper consideration from a counterintelligence perspective prior to being granted access to classified matter or Special Nuclear Material. Pg Chg 1, 7-9-14 cancels DOE O 472.2 Admin Chg 1.

2011-07-21T23:59:59.000Z

102

A high-efficiency indirect lighting system utilizing the solar 1000 sulfur lamp  

SciTech Connect (OSTI)

High-lumen light sources represent unique challenges and opportunities for the design of practical and efficient interior lighting systems. High-output sources require a means of large-scale distribution and avoidance of high-luminance glare while providing efficient delivery. An indirect lighting system has been developed for use with a 1,000 Watt sulfur lamp that efficiently utilizes the high-output source to provide quality interior lighting. This paper briefly describes the design and initial testing of this new system.

Siminovitch, M.; Gould, C.; Page, E.

1997-06-01T23:59:59.000Z

103

Border Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Border Security SHARE Border Security Testing of unmanned aerial surveillance equipment. ORNL performs border security research at the Security Sciences Field Laboratory (SSFL),...

104

Summary References | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Authority) 2007. Final Supplemental Environmental Impact Statement, Completion and Operation of Watts Bar Nuclear Plant Unit 2, Rhea County, Tennessee. June. Available online...

105

Designing security into software  

E-Print Network [OSTI]

When people talk about software security, they usually refer to security applications such as antivirus software, firewalls and intrusion detection systems. There is little emphasis on the security in the software itself. ...

Zhang, Chang Tony

2006-01-01T23:59:59.000Z

106

Security guide for subcontractors  

SciTech Connect (OSTI)

This security guide of the Department of Energy covers contractor and subcontractor access to DOE and Mound facilities. The topics of the security guide include responsibilities, physical barriers, personnel identification system, personnel and vehicular access controls, classified document control, protecting classified matter in use, storing classified matter repository combinations, violations, security education clearance terminations, security infractions, classified information nondisclosure agreement, personnel security clearances, visitor control, travel to communist-controlled or sensitive countries, shipment security, and surreptitious listening devices.

Adams, R.C.

1991-01-01T23:59:59.000Z

107

Final project report on arsenic biogeochemistry in the Clinch River and Watts Bar Reservoir: Volume 2, Quality assurance/quality control summary report for arsenic biogeochemistry in the Clinch River and Watts Bar Reservoir. Environmental Restoration Program  

SciTech Connect (OSTI)

Arsenic contamination was studied in the Clinch River/Watts Bar Reservoir (CR/WBR) system downstream from the US Department of Energy`s Oak Ridge Reservation (ORR). Arsenic is of particular interest and concern because (1) it occurs commonly in coal-bearing rock and waste products such as fly ash associated with the burning of coal, (2) it is classified as a Class A carcinogen by the US Environmental Protection Agency, and (3) disposal of fly ash, both on and off the ORR, may have contaminated surface water and sediments in the Clinch River and Watts Bar Reservoir. The present study dffers from previous reports on arsenic concentrations in the CR/WBR system in the use of much more sensitive and precise processing and analytical techniques to measure arsenic species (arsenate, arsenite, and organic arsenic) at levels well below the ecological and human health risk screening criteria. The absolute detection limits using these techniques are approximately 20 to 40 pmol/L or 0.0015 to 0.003 {mu}g/L.

Newman, K.A.; Ford, C.J.; Byrd, J.T.

1995-04-01T23:59:59.000Z

108

Personnel Security Activities  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes objectives, requirements and responsibilities for the Personnel Security Program and Personnel Security Assurance Program. Cancels DOE O 472.1B

2003-03-25T23:59:59.000Z

109

Global Nuclear Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Global Nuclear Security Both DOE and the National Nuclear Security Administration are working to reduce the risk of nuclear proliferation and provide technologies to improve...

110

Climate-derived tensions in Arctic security.  

SciTech Connect (OSTI)

Globally, there is no lack of security threats. Many of them demand priority engagement and there can never be adequate resources to address all threats. In this context, climate is just another aspect of global security and the Arctic just another region. In light of physical and budgetary constraints, new security needs must be integrated and prioritized with existing ones. This discussion approaches the security impacts of climate from that perspective, starting with the broad security picture and establishing how climate may affect it. This method provides a different view from one that starts with climate and projects it, in isolation, as the source of a hypothetical security burden. That said, the Arctic does appear to present high-priority security challenges. Uncertainty in the timing of an ice-free Arctic affects how quickly it will become a security priority. Uncertainty in the emergent extreme and variable weather conditions will determine the difficulty (cost) of maintaining adequate security (order) in the area. The resolution of sovereignty boundaries affects the ability to enforce security measures, and the U.S. will most probably need a military presence to back-up negotiated sovereignty agreements. Without additional global warming, technology already allows the Arctic to become a strategic link in the global supply chain, possibly with northern Russia as its main hub. Additionally, the multinational corporations reaping the economic bounty may affect security tensions more than nation-states themselves. Countries will depend ever more heavily on the global supply chains. China has particular needs to protect its trade flows. In matters of security, nation-state and multinational-corporate interests will become heavily intertwined.

Backus, George A.; Strickland, James Hassler

2008-09-01T23:59:59.000Z

111

Security guide for subcontractors  

SciTech Connect (OSTI)

This guide is provided to aid in the achievement of security objectives in the Department of Energy (DOE) contractor/subcontractor program. The objectives of security are to protect information that, if released, would endanger the common defense and security of the nation and to safeguard plants and installations of the DOE and its contractors to prevent the interruption of research and production programs. The security objective and means of achieving the objective are described. Specific security measures discussed in this guide include physical barriers, personnel identification systems, personnel and vehicular access control, classified document control, protection of classified matter in use, storing classified matter, and repository combinations. Means of dealing with security violations and security infractions are described. Maintenance of a security education program is discussed. Also discussed are methods of handling clearance terminations, visitor control, travel to sensitive countries, and shipment security. The Technical Surveillance Countermeasures Program (TSCM), the Computer Security Program, and the Operations Security Plan (OPSEC) are examined.

Adams, R.C.

1993-06-01T23:59:59.000Z

112

Development testing of the two-watt RTG heat source and Hastelloy-S/T-111 alloy compatibility studies  

SciTech Connect (OSTI)

The two-watt radioisotope thermoelectric generator heat source capsules were tested to determine their survivability under extreme environmental conditions: high external pressure, high impact, and high internal pressure. Test results showed that the capsules could withstand external pressures of 1,000 bars and impacts at velocities near 150 meters per second. However, the results of the internal pressure tests (stress-rupture) were not so favorable, possibly because of copper contamination, leading to a recommendation for additional testing. A material compatibility study examined the use of Hastelloy-S as a material to clad the tantalum strength member of the two-watt radioisotopic heat source. Test capsules were subjected to high temperatures for various lengths of time, then cross sectioned and examined with a scanning electron microscope. Results of the study indicate that Hastelloy-S would be compatible with the underlying alloy, not only at the normal operating temperatures of the heat source, but also when exposed to the much higher temperatures of a credible accident scenario.

Howell, E.I.; Teaney, P.E.

1993-09-29T23:59:59.000Z

113

Demonstration Assessment of Light Emitting Diode (LED) Commercial Garage Lights In the Providence Portland Medical Center, Portland, Oregon  

SciTech Connect (OSTI)

This U.S. Department of Energy GATEWAY Demonstration project studied the applicability of light-emitting diode (LED) luminaires for commercial parking garage applications. High-pressure sodium (HPS) area luminaires were replaced with new LED area luminaires. The project was supported under the U.S. Department of Energy (DOE) Solid State Lighting Program. Other participants in the demonstration project included Providence Portland Medical Center in Portland, Oregon, the Energy Trust of Oregon, and Lighting Sciences Group (LSG) Inc. Pacific Northwest National Laboratory (PNNL) conducted the measurements and analysis of the results. PNNL manages GATEWAY demonstrations for DOE and represents their perspective in the conduct of the work. Quantitative and qualitative measurements of light and electrical power were taken at the site for both HPS and LED light sources. Economic costs were estimated and garage users responses to the new light sources were gauged with a survey. Six LED luminaires were installed in the below-ground parking level A, replacing six existing 150W HPS lamps spread out over two rows of parking spaces. Illuminance measurements were taken at floor level approximately every 4 ft on a 60-ft x 40-ft grid to measure light output of these LED luminaires which were termed the Version 1 luminaires. PNNL conducted power measurements of the circuit in the garage to which the 6 luminaires were connected and determined that they drew an average of 82 W per lamp. An improved LED luminaire, Version 2, was installed in Level B of the parking garage. Illuminance measurements were not made of this second luminaire on site due to higher traffic conditions, but photometric measurements of this lamp and Version 1 were made in an independent testing laboratory and power usage for Version 2 was also measured. Version 1 was found to produce 3600 lumens and Version 2 was found to produce 4700 lumens of light and to consume 78 Watts. Maximum and minimum light levels were measured for the HPS and LED Version 1 luminaires and projected for the Version 2 luminaires. Maximum light levels were 23.51 foot candles, 20.54 fc, and 26.7 fc respectively and minimum light levels were 1.49 fc, 1.45 fc, and 1.88 fc. These results indicate very similar or even slightly higher light levels produced by the LED lamps, despite the higher lumen output of the HPS lamp. The LED lamps provide higher luminaire efficacy because all of the light is directed down and out. None of it is lost in the fixture. Also the HPS luminaire had poorly designed optics and a plastic covering that tended to get dirty and cracked, further decreasing the realized light output.[is this an accurate way to say this?] Consumer perceptions of the Version 2 LED were collected via a written survey form given to maintenance and security personnel. More than half felt the LED luminaires provided more light than the HPS lamps and a majority expressed a preference for the new lamps when viewing the relamped area through a security camera. Respondents commented that the LED luminaires were less glary, created less shadows, had a positive impact on visibility, and improved the overall appearance of the area. PNNL conducted an economic analysis and found that the Version 1 lamp produced annual energy savings of 955 kWh and energy cost savings of $76.39 per lamp at electricity rates of 6.5 cents per kWh and $105.03 at 11 cents per kWh. PNNL found that the Version 2 lamp produced annual energy savings of 991 kWh and energy cost savings of $79.26 per lamp at electricity rates of 6.5 cents per kWh and $108.98 at 11 cents per kWh. PNNL also calculated simple payback and found that Version 1 showed paybacks of 5.4 yrs at 6.5c/kWh and 4.1 yrs at 11c/kWh while Version 2 showed paybacks of 5.2 yrs at 6.5c/kWh and 3.9 yrs at 11c/kWh.

Ton, My K.; Richman, Eric E.; Gilbride, Theresa L.

2008-11-11T23:59:59.000Z

114

Environmental test report on the CTI-Cryogenics 1-watt integral Stirling cooler (long-life HD-1033d). Final report, 16 June-24 July 1988  

SciTech Connect (OSTI)

This final report describes and provides the data on the environmental testing of the CTI-Cryogenics 1-Watt Integral Stirling Cooler (Long-Life HD-1033D). The 1-Watt Integral Cooler (HD-1033B/C) is currently used in the M1 FLIR, M60 FLIR, and the Advanced Attack Helicopter FLIR. The long life cooler (clearance seal) improves life of the cooler by approximately two and one half times. C2NVEO evaluated the cooler performance at environmental extremes per the purchase description, PD-0182-001(CR). The cooler successfully passed all the environmental tests with no failures.

Doggett, G.; Dunmire, H.; Samuels, R.; Shaffer, J.

1989-04-01T23:59:59.000Z

115

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

provides detailed requirements and procedures to supplement DOE O 472.1B, PERSONNEL SECURITY ACTIVITIES, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Cancels DOE M 472.1-1

2000-11-16T23:59:59.000Z

116

Personnel Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE). This Manual addresses only the Personnel Security Program.

1998-05-22T23:59:59.000Z

117

Office of Security Assistance  

Broader source: Energy.gov [DOE]

The Office of Security Assistance manages the Technology Deployment Program to improve the security posture of the Department of Energy and the protection of its assets and facilities through the deployment of new safeguards and security technologies and development of advanced technologies that reduce operating costs, save protective force lives, and improve security effectiveness.

118

Cyber Security & Smart Grid  

E-Print Network [OSTI]

Cyber Security & Smart Grid Jonathan Shapiro Texas Institute The Clean Air Through Energy Efficiency (CATEE) Conference Cyber Security & Smart Grid ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Cyber Security and The Smart... and communication protocols. ESL-KT-11-11-23 CATEE 2011, Dallas, Texas, Nov. 7 ? 9, 2011 Smart Grid Systems ?Current Cyber Security Issues ? Advanced Metering Infrastructure (AMI) Security ? The wireless devices are used in the smart meters located...

Shapiro, J.

2011-01-01T23:59:59.000Z

119

Using Operational Security (OPSEC) to Support a Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

Cyber Security: Defense in Depth Strategies The Chief Information Officer (CIO) at the U 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program...

120

Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without restriction, subject to copyright controls.)  

E-Print Network [OSTI]

the event for their gain. The Threats: Internet watch groups and cyber security experts have already potential cyber threats please visit the Center for Internet Security website at CISecurity.org. #12;Traffic Light Protocol: WHITE Traffic Light Protocol: WHITE (information may be distributed without

Thomas, Andrew

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


121

Information Security: Coordination of Federal Cyber Security...  

Broader source: Energy.gov (indexed) [DOE]

and Technology Policy establish timelines for developing a federal agenda for cyber security research. GAO also recommends that the Office of Management and Budget (OMB) issue...

122

Commercial Lighting  

Broader source: Energy.gov [DOE]

Commercial lighting accounts for more than 20 percent of total commercial building energy use. The Energy Department works to reduce lighting energy use through research and deployment.

123

Unified Description of Bulk and Interface-Enhanced Spin Pumping S. M. Watts, J. Grollier,* C. H. van der Wal, and B. J. van Wees  

E-Print Network [OSTI]

Unified Description of Bulk and Interface-Enhanced Spin Pumping S. M. Watts, J. Grollier,* C. H in semiconductors or metals by rf magnetic field pumping. With a semiclassical model we show that a rotating applied dynamics of a ferromagnetic electrode into or out of which the spin currents flow. In spin-pumping devices

van der Wal, Caspar H.

124

3866 JOURNAL OF LIGHTWAVE TECHNOLOGY, VOL. 26, NO. 24, DECEMBER 15, 2008 Room-Temperature Stable Generation of 19 Watts of  

E-Print Network [OSTI]

-mode-area fibers has enabled the realization of 100-W- class diffraction-limited infrared sources with optical sources possessing excellent beam quality with overall optical efficiencies well over 10%. However, high-damage Generation of 19 Watts of Single-Frequency 532-nm Radiation in a Periodically Poled Lithium Tantalate Crystal

Byer, Robert L.

125

OLEDS FOR GENERAL LIGHTING  

SciTech Connect (OSTI)

The goal of this program was to reduce the long term technical risks that were keeping the lighting industry from embracing and developing organic light-emitting diode (OLED) technology for general illumination. The specific goal was to develop OLEDs for lighting to the point where it was possible to demonstrate a large area white light panel with brightness and light quality comparable to a fluorescence source and with an efficacy comparable to that of an incandescent source. it was recognized that achieving this would require significant advances in three area: (1) the improvement of white light quality for illumination, (2) the improvement of OLED energy efficiency at high brightness, and (3) the development of cost-effective large area fabrication techniques. The program was organized such that, each year, a ''deliverable'' device would be fabricated which demonstrated progress in one or more of the three critical research areas. In the first year (2001), effort concentrated on developing an OLED capable of generating high illumination-quality white light. Ultimately, a down-conversion method where a blue OLED was coupled with various down-conversion layers was chosen. Various color and scattering models were developed to aid in material development and device optimization. The first year utilized this approach to deliver a 1 inch x 1 inch OLED with higher illumination-quality than available fluorescent sources. A picture of this device is shown and performance metrics are listed. To their knowledge, this was the first demonstration of true illumination-quality light from an OLED. During the second year, effort concentrated on developing a scalable approach to large area devices. A novel device architecture consisting of dividing the device area into smaller elements that are monolithically connected in series was developed. In the course of this development, it was realized that, in addition to being scalable, this approach made the device tolerant to the most common OLED defect--electrical shorts. This architecture enabled the fabrication of a 6 inch x 6 inch OLED deliverable for 2002. A picture of this deliverable is shown and the performance metrics are listed. At the time, this was the highest efficiency, highest lumen output illumination-quality OLED in existence. The third year effort concentrated on improving the fabrication yield of the 6 inch x 6 inch devices and improving the underlying blue device efficiency. An efficiency breakthrough was achieved through the invention of a new device structure such that now 15 lumen per watt devices could be fabricated. A 2 feet x 2 feet OLED panel consisting of sixteen 6 inch x 6 inch high efficiency devices tiled together was then fabricated. Pictures of this panel are shown with performance metrics listed. This panel met all project objectives and was the final deliverable for the project. It is now the highest efficiency, highest lumen output, illumination-quality OLED in existence.

Anil Duggal; Don Foust; Chris Heller; Bill Nealon; Larry Turner; Joe Shiang; Nick Baynes; Tim Butler; Nalin Patel

2004-02-29T23:59:59.000Z

126

Lecture 13: Control System Cyber Security  

E-Print Network [OSTI]

Today, the industralized world lives in symbiosis with control systems: it depends on power distribution, oil production, public transport, automatic production lines. While the convenience is at hand, still too many control systems are designed without any security in mind, lack basic security protections, and are not even robust enough to withstand basic attacks. The Stuxnet worm attacking Siemens PLCs in 2010 was another close call. Attackers currently enjoy hacking control systems, and aim to switch lights off. This presentation shall recap the current situation and outline why the presenter is still waiting for a change in paradigm. Stefan Lders, PhD, graduated from the Swiss Federal Institute of Technology in Zurich and joined CERN in 2002. Being initially developer of a common safety system used in all four experiments at the Large Hadron Collider, he gathered expertise in cyber-security issues of control systems. Consequently in 2004, he took over responsibilities in securing CERN's accelerator and...

CERN. Geneva

2013-01-01T23:59:59.000Z

127

Information Security Group IY5512 Computer Security  

E-Print Network [OSTI]

for process that controls interactions between users and resources. · Access control system implements Information Security Group Agenda · Access control basics · ACLs and capabilities · Information flow policies· Information flow policies · Bell-LaPadula Model · Role-Based Access Control · Resources 3 Information Security

Mitchell, Chris

128

Transportation Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2Topo II:LIGHT-DUTYTransportation Safeguards

129

INFRASTRUCTURE SECURITY & ENERGY  

E-Print Network [OSTI]

price monitoring #12;INFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERYINFRASTRUCTURE SECURITY & ENERGY RESTORATION OFFICE of ELECTRICITY DELIVERY & ENERGY RELIABILITY Real Time Monitoring of Energy Infrastructure Status Patrick Willging, PE Office of Electricity

Schrijver, Karel

130

Office of Security Policy  

Broader source: Energy.gov [DOE]

The Office of Security Policy is the central source within the Department of Energy for the development and analysis of safeguards and security policies and standards affecting facilities, nuclear materials, personnel, and classified information.

131

Data Security ROCKVILLE, MD  

E-Print Network [OSTI]

by respondent identification. Thus, data security plans must be tailored to the unique needs and concerns of each data set: a "one-security-plan-fits-all" approach is neither feasible nor desirable. Nevertheless

Rau, Don C.

132

Personnel Security Program Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual provides detailed requirements and procedures to supplement DOE O 472.1B, Personnel Security Activities, which establishes the overall objectives, requirements, and responsibilities for implementation and operation of the Personnel Security Program and the Personnel Security Assurance Program in the Department of Energy (DOE), including the National Nuclear Security Administration (NNSA). Extended until 7-7-06 by DOE N 251.64, dated 7-7-05 Cancels: DOE M 472.1-1A.

2001-07-12T23:59:59.000Z

133

Security system signal supervision  

SciTech Connect (OSTI)

This purpose of this NUREG is to present technical information that should be useful to NRC licensees for understanding and applying line supervision techniques to security communication links. A review of security communication links is followed by detailed discussions of link physical protection and DC/AC static supervision and dynamic supervision techniques. Material is also presented on security for atmospheric transmission and video line supervision. A glossary of security communication line supervision terms is appended. 16 figs.

Chritton, M.R. (BE, Inc., Barnwell, SC (United States)); Matter, J.C. (Sandia National Labs., Albuquerque, NM (United States))

1991-09-01T23:59:59.000Z

134

Energy Efficiency and Conservation Block Grant Program  

Broader source: Energy.gov (indexed) [DOE]

approximately 277 conventional60-watt light bulbs in tribal homes with 13-watt Light Emitting Diode (LED) bulbs; * Replacement of approximately 18 40-watt conventional fluorescent...

135

CX-004575: Categorical Exclusion Determination | Department of...  

Broader source: Energy.gov (indexed) [DOE]

approximately 277 conventional 60-watt light bulbs in tribal homes with 13-watt Light Emitting Diode (LED) bulbs; ? Replacement of approximately 18 40-watt conventional fluorescent...

136

Lemnos interoperable security project.  

SciTech Connect (OSTI)

With the Lemnos framework, interoperability of control security equipment is straightforward. To obtain interoperability between proprietary security appliance units, one or both vendors must now write cumbersome 'translation code.' If one party changes something, the translation code 'breaks.' The Lemnos project is developing and testing a framework that uses widely available security functions and protocols like IPsec - to form a secure communications channel - and Syslog, to exchange security log messages. Using this model, security appliances from two or more different vendors can clearly and securely exchange information, helping to better protect the total system. Simplify regulatory compliance in a complicated security environment by leveraging the Lemnos framework. As an electric utility, are you struggling to implement the NERC CIP standards and other regulations? Are you weighing the misery of multiple management interfaces against committing to a ubiquitous single-vendor solution? When vendors build their security appliances to interoperate using the Lemnos framework, it becomes practical to match best-of-breed offerings from an assortment of vendors to your specific control systems needs. The Lemnos project is developing and testing a framework that uses widely available open-source security functions and protocols like IPsec and Syslog to create a secure communications channel between appliances in order to exchange security data.

Halbgewachs, Ronald D.

2010-03-01T23:59:59.000Z

137

Tag: Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurity Tag: Security

138

Tag: security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9.security Tag: security Displaying 1 -

139

Secure Storage | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.SecureSecure Storage

140

What is Security? A perspective on achieving security  

SciTech Connect (OSTI)

This presentation provides a perspective on achieving security in an organization. It touches upon security as a mindset, ability to adhere to rules, cultivating awareness of the reason for a security mindset, the quality of a security program, willingness to admit fault or acknowledge failure, peer review in security, science as a model that can be applied to the security profession, the security vision, security partnering, staleness in the security program, security responsibilities, and achievement of success over time despite the impossibility of perfection.

Atencio, Julian J.

2014-05-05T23:59:59.000Z

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


141

Technical evaluation report TMI action -- NUREG-0737 (II.D.1). Relief and safety valve testing, Watts Bar Nuclear Plant, Units 1 and 2 (Dockets 50-390 and 50-391)  

SciTech Connect (OSTI)

In the past, safety and relief valves installed in the primary coolant system of light water reactors have performed improperly. As a result, the authors of NUREG-0578 (TMI-2 Lessons Learned Task Force Status Report and Short-Term Recommendations) and, subsequently, NUREG-0737 (Clarification of TMI Action Plan Requirements) recommended development and completion of programs to do two things. First, they should reevaluate the functional performance capabilities of pressurized water reactor safety, relief, and block valves. Second, they should verify the integrity of the pressurizer safety and relief valve piping systems for normal, transient, and accident conditions. This report documents the review of those programs by Lockheed Idaho Technologies Company. Specifically, this report documents the review of the Watts Bar Nuclear Plant, Units 1 and 2, Applicant response to the requirements of NUREG-0578 and NUREG-0737. This review found the Applicant provided an acceptable response reconfirming they met General Design Criteria 14, 15, and 30 of Appendix A to 10 CFR 50 for the subject equipment. It should also be noted Lockheed Idaho performed this review for both Units 1 and 2. However, the applicability of this review to Unit 2 depends on verifying that the Unit 2 as-built system conforms to the Unit 1 design reviewed in this report.

Fineman, C.P.

1995-02-01T23:59:59.000Z

142

European Commissions Antitrust Investigation against Gazprom - Implications for the Energy Security of Russia and the European Union.  

E-Print Network [OSTI]

??This master thesis analyzes the European and Russian energy security, in light of political science and international political economy. The aim of the study is (more)

Re, Anni

2013-01-01T23:59:59.000Z

143

Recent applications of thermal imagers for security assessment  

SciTech Connect (OSTI)

This paper discusses recent applications by Sandia National Laboratories of cooled and uncooled thermal infrared imagers to wide-area security assessment systems. Thermal imagers can solve many security assessment problems associated with the protection of high-value assets at military bases, secure installations, and commercial facilities. Thermal imagers can provide surveillance video from security areas or perimeters both day and night without expensive security lighting. Until fairly recently, thermal imagers required open-loop cryogenic cooling to operate. The high cost of these systems and associated maintenance requirements restricted their widespread use. However, recent developments in reliable, closed-loop, linear drive cryogenic coolers and uncooled infrared imagers have dramatically reduced maintenance requirements, extended MTBF, and are leading to reduced system cost. These technology developments are resulting in greater availability and practicality for military as well as civilian security applications.

Bisbee, T.L.

1997-06-01T23:59:59.000Z

144

Securing Internet Routing Securing Internet Routing  

E-Print Network [OSTI]

Plane (Routing protocols): S h b d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc Set up paths between nodes [Kent Lynn Seo 00] Listen-Whisper, etc., Data Plane: Given d Secure BGP [Kent Lynn Seo 00] soBGP, IRV, SPV, pgBGP, psBGP, Listen Whisper etc Set up paths

Goldberg, Sharon

145

Advanced Security Infrastructures for Grid Education  

E-Print Network [OSTI]

Sinnott,R.O. Watt,J. Stell,A.J. Chadwick,D.W. The 12th International Conference on Information Systems Analysis and Synthesis (ISAS 2006), Orlando, Florida, July 2006

Sinnott, R.O.

146

A summary of the Planck constant measurements using a watt balance with a superconducting solenoid at NIST  

E-Print Network [OSTI]

Researchers at the National Institute of Standards and Technology have been using a watt balance, NIST-3, to measure the Planck constant $h$ for over ten years. Two recently published values disagree by more than one standard uncertainty. The motivation for the present manuscript is twofold. First, we correct the latest published number to take into account a recently discovered systematic error in mass dissemination at the Bureau International des Poids et Mesures (BIPM). Second, we provide guidance on how to combine the two numbers into one final result. In order to adequately reflect the discrepancy, we added an additional systematic uncertainty to the published uncertainty budgets. The final value of $h$ measured with NIST-3 is $h = 6.626\\,069\\,36(37)\\times 10^{-34}\\,\\mbox{J\\,s}$. This result is $77(57) \\times 10^{-9}$ fractionally higher than $h_{\\mathrm{90}}$. Each number in parentheses gives the value of the standard uncertainty in the last two digits of the respective value and $h_{\\mathrm{90}}$ is th...

Schlamminger, S; Haddad, D; Newell, D B; Seifert, F; Chao, L S; Liu, R; Williams, E R; Pratt, J R

2015-01-01T23:59:59.000Z

147

Reproductive effects assessment of largemouth bass and bluegill in the Watts Bar Lake/Clinch River system  

SciTech Connect (OSTI)

Successful reproduction is key to the survival and maintenance of viable fish populations and therefore an important consideration in ecological risk assessments. In order to evaluate the reproductive health of fish in the Watts Bar Lake/Clinch River system downstream of the Department of Energy facilities in Oak Ridge, TN, largemouth bass (Micropterus salmoides) and bluegill sunfish (Lepomis macrochirus) were collected from seven sites at the beginning of the spawning period and a suite of parameters indicative of reproductive condition were measured. Measures of reproductive condition common to male and female fish included gonadal somatic index (GSI), and plasma concentrations of reproductive hormones. Gender specific analyses included a histological examination of the testes in males and a quantitative evaluation of ovarian parameters in females including determinations of fecundity, the number of vitellogenic and atretic oocytes, and the incidences of ovarian parasites. Evidence of reproductive impairment in largemouth bass at the two sites immediately adjacent to the Oak Ridge Reservation included lower GSIs and reproductive hormone levels (males and females), and reduced fecundity and an increase in the number of atretic oocytes (females). Similar trends were not observed in bluegill sunfish. These findings suggest that reproduction in a top-level predatory fish species, the largemouth bass, may be negatively affected by activities on the Oak Ridge Reservation.

Niemela, S.L.; McCracken, M.K.; Ivey, L.J.; Greeley, M.S. Jr. [Oak Ridge National Lab., TN (United States)

1995-12-31T23:59:59.000Z

148

Estimate of federal relighting potential and demand for efficient lighting products  

SciTech Connect (OSTI)

The increasing level of electric utility rebates for energy-efficient lighting retrofits has recently prompted concern over the adequacy of the market supply of energy-efficient lighting products (Energy User News 1991). In support of the U.S. Department of Energy`s Federal Energy Management Program, Pacific Northwest Laboratory (PNL) has developed an estimate of the total potential for energy-efficient lighting retrofits in federally owned buildings. This estimate can be used to address the issue of the impact of federal relighting projects on the supply of energy-efficient lighting products. The estimate was developed in 1992, using 1991 data. Any investments in energy-efficient lighting products that occurred in 1992 will reduce the potential estimated here. This analysis proceeds by estimating the existing stock of lighting fixtures in federally owned buildings. The lighting technology screening matrix is then used to determine the minimum life-cycle cost retrofit for each type of existing lighting fixture. Estimates of the existing stock are developed for (1) four types of fluorescent lighting fixtures (2-, 3-, and 4-lamp, F40 4-foot fixtures, and 2-lamp, F96 8-foot fixtures, all with standard magnetic ballasts); (2) one type of incandescent fixture (a 75-watt single bulb fixture); and (3) one type of exit sign (containing two 20-watt incandescent bulbs). Estimates of the existing stock of lighting fixtures in federally owned buildings, estimates of the total potential demand for energy-efficient lighting products if all cost-effective retrofits were undertaken immediately, and total potential annual energy savings (in MWh and dollars), the total investment required to obtain the energy savings and the present value of the efficiency investment, are presented.

Shankle, S.A.; Dirks, J.A.; Elliott, D.B.; Richman, E.E.; Grover, S.E.

1993-11-01T23:59:59.000Z

149

Smart Lighting Controller!! Smart lighting!  

E-Print Network [OSTI]

1! Smart Lighting Controller!! #12;2! Smart lighting! No need to spend energy lighting the room if://blogs.stthomas.edu/realestate/2011/01/24/residential-real-estate-professionals-how-do-you- develop feedback! There is a connection between the output and the input! Therefore forces inputs to same voltage

Anderson, Betty Lise

150

A review of "The Arts of 17th-Century Science: Representations of the Natural World in European and North American Culture." by Claire Jowitt and Diane Watt, eds.  

E-Print Network [OSTI]

: Planetary Astronomy in the Development of the Western World, [1957] 260). Claire Jowitt and Diane Watt, eds. The Arts of 17 th -Century Science: Representations of the Natural World in European and North Ameri- can Culture. Aldershot, U.K.: Ashgate... sources of the early modern period overlapped and influenced each other. Editors Claire Jowitt and Diane Watt skillfully separated the volume into four major topics, did a fine job selecting essays that explored these subjects, and placed essays...

Karol K. Weaver

2003-01-01T23:59:59.000Z

151

Energy Security Initiatives Update  

Broader source: Energy.gov (indexed) [DOE]

-- Aurora Electrical System Vulnerability Assessment and Mitigation Actions FUPWG-EEI CA Net Zero Energy Initiative (Vandenberg AFB, CA) Energy Security Tiger Team Visit (Ft...

152

Energy Security Initiatives Update  

Broader source: Energy.gov [DOE]

Presentationgiven at the Spring 2009 Federal Utility Partnership Working Group (FUPWG) meetinglists Federal government energy security initiatives.

153

Control Systems Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

systems within the nation's critical infrastructure. The CSSP assists control systems vendors and asset ownersoperators in identifying security vulnerabilities and developing...

154

Industrial Security Specialst  

Broader source: Energy.gov [DOE]

A successful candidate in this position will serve in a developmental capacity assisting senior specialists in carrying out a variety of industrial security and oversight functions.

155

Nevada National Security Site  

Broader source: Energy.gov [DOE]

HISTORYIn 1950, President Truman established what is now known as the Nevada National Security Site (NNSS) to perform nuclear weapons testing activities. In support of national defense initiatives...

156

Securing Cloud Storage Service.  

E-Print Network [OSTI]

?? Cloud computing brought flexibility, scalability, and capital cost savings to the IT industry. As more companies turn to cloud solutions, securing cloud based services (more)

Zapolskas, Vytautas

2012-01-01T23:59:59.000Z

157

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

the safety, security and effectiveness of the nuclear deterrent without underground nuclear testing, consistent with the principles of the Stockpile Management Program...

158

TEC Information Security  

Broader source: Energy.gov (indexed) [DOE]

External Coordination Working Group Information Security E. Ralph Smith, Manager Institutional Programs April 22, 2004 Albuquerque, NM WIPP * Open communications * Notifications *...

159

Cyber Security Architecture Guidelines  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Guide provides supplemental information on the implementation of cyber security architectures throughout the Department of Energy. Canceled by DOE N 205.18

2001-03-08T23:59:59.000Z

160

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Project Reviews, etc., except those specifically reserved for the Administrator for the National Nuclear Security Administration and the Deputy Secretary. cc: Mike Hickman. NA-Stl...

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


161

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

badge or valid driver's license) before proceeding, and will be asked to vouch for other vehicle occupants. LOS ALAMOS, N. M., Dec. 21, 2012-The National Nuclear Security...

162

Hazardous Material Security (Maryland)  

Broader source: Energy.gov [DOE]

All facilities processing, storing, managing, or transporting hazardous materials must be evaluated every five years for security issues. A report must be submitted to the Department of the...

163

National Nuclear Security Administration  

Broader source: Energy.gov (indexed) [DOE]

and Related Structures within TA-3 at Los Alamos National Laboratory, Los Alamos, New Mexico U. S. Department of Energy National Nuclear Security Administration Los Alamos Area...

164

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Our Primary Thrusts A science-based approach to cyber security Develop breakthrough nuclear forensic science Expand bioinformatics program to address critical biosurveillance gaps...

165

Commercial Lighting and LED Lighting Incentives  

Broader source: Energy.gov [DOE]

Incentives for energy efficient commercial lighting equipment as well as commercial LED lighting equipment are available to businesses under the Efficiency Vermont Lighting and LED Lighting...

166

Enhance your Cyber Security Knowledge  

E-Print Network [OSTI]

Enhance your Cyber Security Knowledge About NPS CS FUNDAMENTALS: Create a strong foundational by increasing the effectiveness of the armed forces of the United States and its allies. Cyber Security-4015 About CISR #12;Cyber Security Adversarial Techniques Cyber Security Defense Cyber Security Fundamentals

167

Operational Security (OPSEC) Reminder | Department of Energy  

Broader source: Energy.gov (indexed) [DOE]

Operational Security (OPSEC) Reminder Operational Security (OPSEC) Reminder June 3, 2014 - 1:24pm Addthis Operational Security (OPSEC) Reminder Operational Security (OPSEC)...

168

Secure Manufacturing | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 % bP.Secure Manufacturing

169

Lighting Renovations  

Broader source: Energy.gov [DOE]

When undertaking a lighting renovation in a Federal building, daylighting is the primary renewable energy opportunity. Photovoltaics (PV) also present an excellent opportunity. While this guide...

170

Cerenkov Light  

ScienceCinema (OSTI)

The bright blue glow from nuclear reactors is Cerenkov light. Karl Slifer describes how nuclear physicists can use this phenomenon to study the nucleus of the atom.

Slifer, Karl

2014-05-22T23:59:59.000Z

171

Cerenkov Light  

SciTech Connect (OSTI)

The bright blue glow from nuclear reactors is Cerenkov light. Karl Slifer describes how nuclear physicists can use this phenomenon to study the nucleus of the atom.

Slifer, Karl

2013-06-13T23:59:59.000Z

172

High Hats, Swiss Cheese, and Fluorescent Lighting?  

SciTech Connect (OSTI)

For DOE, PNNL is conducting a competitive procurement to promote market introduction of new residential recessed downlights (also known as ''recessed cans'' or ''high hats'') that are airtight, rated for insulated ceilings, and hard-wired for CFLs. This paper discusses the potential energy savings of new high-efficiency downlights, and the results of product testing to date. Recessed downlights are the most popular residential lighting fixtures in the United States, with 21.7 million fixtures sold in 2000. An estimated 350 million are currently installed in American homes. Recessed cans are relatively inexpensive, and provide an unobtrusive, directed source of light for kitchens, hallways, and living rooms. Recessed cans are energy-intensive in three ways. First, virtually all recessed cans currently installed in the residential sector use incandescent light sources, typically reflector-type lamps drawing 65-150 watts. Second, heat from incandescent lamps adds to air-conditioning loads. Third, most installed recessed cans are not airtight, so they allow conditioned air to escape from the living area into unconditioned spaces such as attics. Addressing both lighting energy use and air leakage in recessed cans has proven challenging. Lighting energy efficiency is greatly improved by using CFLs. Air leakage can be addressed by making fixtures airtight. But when CFLs are used in an airtight recessed can, heat generated by the lamp and ballast is trapped within the fixture. Excessive heat causes reduced light output and shorter lifespan of the CFL. The procurement was designed to overcome these technical challenges and make new products available in the marketplace.

McCullough, Jeffrey J.; Gordon, Kelly L.

2002-08-30T23:59:59.000Z

173

Quantum-Secure Authentication with a Classical Key  

E-Print Network [OSTI]

Authentication provides the trust people need to engage in transactions. The advent of physical keys that are impossible to copy promises to revolutionize this field. Up to now, such keys have been verified by classical challenge-response protocols. Such protocols are in general susceptible to emulation attacks. Here we demonstrate Quantum-Secure Authentication ("QSA") of an unclonable classical physical key in a way that is inherently secure by virtue of quantum-physical principles. Our quantum-secure authentication operates in the limit of a large number of channels, represented by the more than thousand degrees of freedom of an optical wavefront shaped with a spatial light modulator. This allows us to reach quantum security with weak coherent pulses of light containing dozens of photons, too few for an adversary to determine their complex spatial shapes, thereby rigorously preventing emulation.

Sebastianus A. Goorden; Marcel Horstmann; Allard P. Mosk; Boris kori?; Pepijn W. H. Pinkse

2014-06-03T23:59:59.000Z

174

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. DOE O 471.2A, Information Security Program, dated 3/27/1997, extended by DOE N 251.57, dated 4/28/2004. Cancels: DOE O 471.2

1997-03-27T23:59:59.000Z

175

December 2003 SECURITY CONSIDERATIONS  

E-Print Network [OSTI]

December 2003 SECURITY CONSIDERATIONS IN THE INFORMATION SYSTEM DEVELOPMENT LIFE CYCLE Shirley security early in the information system development life cycle (SDLC), you may be able to avoid higher and a generic system development life cycle for illustrative purposes, the basic con cepts can be applied

Perkins, Richard A.

176

DATABASE SECURITY APPLICATIONS  

E-Print Network [OSTI]

DATABASE SECURITY #12;APPLICATIONS #12;Polyinstantiation for Cover Stories Ravi S. Sandhu and Sushil Jajodia* Center for Secure Information Systems & Department of Information and Software Systems Engineering George Mason University Falffax, VA 22030, USA emaih {sandhu, jajodia}Qsitevax.gmu.edu Abstract

Sandhu, Ravi

177

Incidents of Security Concern  

SciTech Connect (OSTI)

This presentation addresses incidents of security concern and an incident program for addressing them. It addresses the phases of an inquiry, and it divides incidents into categories based on severity and interest types based on whether security, management, or procedural interests are involved. A few scenarios are then analyzed according to these breakdowns.

Atencio, Julian J.

2014-05-01T23:59:59.000Z

178

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy (DOE) Information Security Program and set forth policies, procedures and responsibilities for the protection and control of classified and sensitive information. The Information Security Program is a system of elements which serve to deter collection activities, This directive does not cancel another directive. Canceled by DOE O 471.2 of 9-28-1995.

1992-10-19T23:59:59.000Z

179

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Safeguards and Security Program ensures that the Department of Energy efficiently and effectively meets all its obligations to protect Special Nuclear Material, other nuclear materials, classified matter, sensitive information, government property, and the safety and security of employees, contractors, and the general public. Cancels DOE P 470.1.

2010-12-29T23:59:59.000Z

180

SELECTING INFORMATION TECHNOLOGY SECURITY  

E-Print Network [OSTI]

be selected and used within the organization's overall program to man age the design, development, and maintenance of its IT security infra structure, and to protect the confiden tiality, integrity objectives and to protect information. Guide to Selecting Information Technology Security Products NIST

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


181

December 2007 SECURING EXTERNAL  

E-Print Network [OSTI]

devices such as desktop and laptop computers, personal digital assistants (PDAs), and cell phones. These teleworkers use devices such as desktop and laptop computers, personal digital assistants (PDAs), and cellDecember 2007 SECURING EXTERNAL COMPUTERS AND OTHER DEVICES USED BY TELEWORKERS SECURING EXTERNAL

182

User Oriented Access to Secure Biomedical Resources through the Grid  

E-Print Network [OSTI]

Sinnott,R.O. Ajayi,O. Stell,A.J. Watt,J.P. Jiang,J. Life Science Grid Conference, Yokohama, Japan, October 2006

Sinnott, R.O.

183

Indirection and computer security.  

SciTech Connect (OSTI)

The discipline of computer science is built on indirection. David Wheeler famously said, 'All problems in computer science can be solved by another layer of indirection. But that usually will create another problem'. We propose that every computer security vulnerability is yet another problem created by the indirections in system designs and that focusing on the indirections involved is a better way to design, evaluate, and compare security solutions. We are not proposing that indirection be avoided when solving problems, but that understanding the relationships between indirections and vulnerabilities is key to securing computer systems. Using this perspective, we analyze common vulnerabilities that plague our computer systems, consider the effectiveness of currently available security solutions, and propose several new security solutions.

Berg, Michael J.

2011-09-01T23:59:59.000Z

184

International Nuclear Security  

SciTech Connect (OSTI)

This presentation discusses: (1) Definitions of international nuclear security; (2) What degree of security do we have now; (3) Limitations of a nuclear security strategy focused on national lock-downs of fissile materials and weapons; (4) What do current trends say about the future; and (5) How can nuclear security be strengthened? Nuclear security can be strengthened by: (1) More accurate baseline inventories; (2) Better physical protection, control and accounting; (3) Effective personnel reliability programs; (4) Minimize weapons-usable materials and consolidate to fewer locations; (5) Consider local threat environment when siting facilities; (6) Implement pledges made in the NSS process; and (7) More robust interdiction, emergency response and special operations capabilities. International cooperation is desirable, but not always possible.

Doyle, James E. [Los Alamos National Laboratory

2012-08-14T23:59:59.000Z

185

LED traffic lights: New technology signals major energy savings  

SciTech Connect (OSTI)

Using light-emitting diode technology to replace incandescent lamps in traffic signals promises energy savings upwards of 60 percent for each of the estimated quarter of a million controlled intersections in the United States. LED units use only 9 to 25 watts instead of the 67 to 150 watts used by each incandescent lamp. Though their first cost is relatively high, energy savings result in paybacks of 1 to 5 years. LED retrofit kits are available for red signal disks and arrows, and installations in several states have proven successful, although minor improvements are addressing concerns about varying light output and controller circuitry. Retrofitting green lamps is not yet feasible, because color standards of the Institute of Traffic Engineers cannot be met with existing LED technology. Yellow lamps have such low duty factors (they`re on only 3 percent of the time) that retrofitting with LED signals is not cost-effective. LEDs last much longer than incandescents, allowing municipalities to not only reduce their electricity bills, but to save on maintenance costs as well. As further incentive, some utilities are beginning to implement rebate programs for LED traffic signal retrofits. Full approval of LED units is still awaited from the Institute of Traffic Engineers (ITE), the standard-setting body for traffic safety devices. Local and state governments ultimately decide what specifications to require for traffic lights, and the growing body of successful field experience with LEDs appears to be raising their comfort level with the technology. The California Department of Transportation is developing an LED traffic light specification, and two California utilities, Southern California Edison and Pacific Gas and Electric, have provided rebates for some pilot installations.

Houghton, D.

1994-12-31T23:59:59.000Z

186

Office of Departmental Personnel Security  

Broader source: Energy.gov [DOE]

The Office of Departmental Personnel Security serves as the central leader and advocate vested with the authority to ensure consistent and effective implementation of personnel security programs Department-wide (including for the National Nuclear Security Administration (NNSA).

187

Departmental Cyber Security Management Policy  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Departmental Cyber Security Management (DCSM) Policy was developed to further clarify and support the elements of the Integrated Safeguards and Security Management (ISSM) Policy regarding cyber security. Certified 9-23-10. No cancellation.

2001-05-08T23:59:59.000Z

188

Cyber Assessment Methods For SCADA Security  

SciTech Connect (OSTI)

The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

May Robin Permann; Kenneth Rohde

2005-06-01T23:59:59.000Z

189

Cyber Assessment Methods for SCADA Security  

SciTech Connect (OSTI)

The terrorist attacks of September 11, 2001 brought to light threats and vulnerabilities that face the United States. In response, the U.S. Government is directing the effort to secure the nation's critical infrastructure by creating programs to implement the National Strategy to Secure Cyberspace (1). One part of this effort involves assessing Supervisory Control and Data Acquisition (SCADA) systems. These systems are essential to the control of critical elements of our national infrastructure, such as electric power, oil, and gas production and distribution. Since their incapacitation or destruction would have a debilitating impact on the defense or economic security of the United States, one of the main objectives of this program is to identify vulnerabilities and encourage the public and private sectors to work together to design secure control systems that resolve these weaknesses. This paper describes vulnerability assessment methodologies used in ongoing research and assessment activities designed to identify and resolve vulnerabilities so as to improve the security of the nation's critical infrastructure.

Not Available

2005-06-01T23:59:59.000Z

190

Headquarters Facilities Master Security Plan  

Energy Savers [EERE]

Security Briefing. Failure of any employee to complete the SF-312 results in the termination of hisher security clearance and denial of access to classified matter. The badge...

191

Energy Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Energy Security SHARE Energy Security ORNL has supported the DOE Cybersecurity for Energy Delivery Systems (CEDS) program in making advances in cybersecurity capabilities for...

192

Smart-Grid Security Issues  

SciTech Connect (OSTI)

TITLE: Smart-Grid Security Issues (Editorial Material, English) IEEE SECURITY & PRIVACY 8 (1). JAN-FEB 2010. p.81-85 IEEE COMPUTER SOC, LOS ALAMITOS

Khurana, Himanshu; Hadley, Mark D.; Lu, Ning; Frincke, Deborah A.

2010-01-29T23:59:59.000Z

193

ANNUAL SECURITY FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY AND FIRE SAFETY REPORT OCTOBER 1, 2013 DARTMOUTH COLLEGE http................................................................................................................................................................... 7 ANNUAL SECURITY REPORT........................................................................................................................9 PREPARATION OF THE REPORT AND DISCLOSURE OF CRIME STATISTICS

194

High Efficiency, Illumination Quality OLEDs for Lighting  

SciTech Connect (OSTI)

The goal of the program was to demonstrate a 45 lumen per watt white light device based upon the use of multiple emission colors through the use of solution processing. This performance level is a dramatic extension of the team's previous 15 LPW large area illumination device. The fundamental material system was based upon commercial polymer materials. The team was largely able to achieve these goals, and was able to deliver to DOE a 90 lumen illumination source that had an average performance of 34 LPW a 1000 cd/m{sup 2} with peak performances near 40LPW. The average color temperature is 3200K and the calculated CRI 85. The device operated at a brightness of approximately 1000cd/m{sup 2}. The use of multiple emission colors particularly red and blue, provided additional degrees of design flexibility in achieving white light, but also required the use of a multilayered structure to separate the different recombination zones and prevent interconversion of blue emission to red emission. The use of commercial materials had the advantage that improvements by the chemical manufacturers in charge transport efficiency, operating life and material purity could be rapidly incorporated without the expenditure of additional effort. The program was designed to take maximum advantage of the known characteristics of these material and proceeded in seven steps. (1) Identify the most promising materials, (2) assemble them into multi-layer structures to control excitation and transport within the OLED, (3) identify materials development needs that would optimize performance within multilayer structures, (4) build a prototype that demonstrates the potential entitlement of the novel multilayer OLED architecture (5) integrate all of the developments to find the single best materials set to implement the novel multilayer architecture, (6) further optimize the best materials set, (7) make a large area high illumination quality white OLED. A photo of the final deliverable is shown. In 2003, a large area, OLED based illumination source was demonstrated that could provide light with a quality, quantity, and efficiency on par with what can be achieved with traditional light sources. The demonstration source was made by tiling together 16 separate 6-inch x 6-inch blue-emitting OLEDs. The efficiency, total lumen output, and lifetime of the OLED based illumination source were the same as what would be achieved with an 80 watt incandescent bulb. The devices had an average efficacy of 15 LPW and used solution-processed OLEDs. The individual 6-inch x 6-inch devices incorporated three technology strategies developed specifically for OLED lighting -- downconversion for white light generation, scattering for outcoupling efficiency enhancement, and a scalable monolithic series architecture to enable large area devices. The downconversion approach consists of optically coupling a blue-emitting OLED to a set of luminescent layers. The layers are chosen to absorb the blue OLED emission and then luminescence with high efficiency at longer wavelengths. The composition and number of layers are chosen so that the unabsorbed blue emission and the longer wavelength re-emission combine to make white light. A downconversion approach has the advantage of allowing a wide variety of colors to be made from a limited set of blue emitters. In addition, one does not have to carefully tune the emission wavelength of the individual electro-luminescent species within the OLED device in order to achieve white light. The downconversion architecture used to develop the 15LPW large area light source consisted of a polymer-based blue-emitting OLED and three downconversion layers. Two of the layers utilized perylene based dyes from BASF AG of Germany with high quantum efficiency (>98%) and one of the layers consisted of inorganic phosphor particles (Y(Gd)AG:Ce) with a quantum efficiency of {approx}85%. By independently varying the optical density of the downconversion layers, the overall emission spectrum could be adjusted to maximize performance for lighting (e.g. blackbody temp

Joseph Shiang; James Cella; Kelly Chichak; Anil Duggal; Kevin Janora; Chris Heller; Gautam Parthasarathy; Jeffery Youmans; Joseph Shiang

2008-03-31T23:59:59.000Z

195

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurity

196

March 24, 2008 Databases: Security 1 Database Security and Authorization  

E-Print Network [OSTI]

to control login process by the DBMS Inference control The countermeasures to statistical database security database #12;March 24, 2008 Databases: Security 3 Chapter Outline Introduction Access Control Methods Policy System-related Security levels and categories Security Threats Loss of integrity Loss

Adam, Salah

197

INSTITUTE FOR CYBER SECURITY Application-Centric Security  

E-Print Network [OSTI]

INSTITUTE FOR CYBER SECURITY Application-Centric Security: How to Get There Prof. Ravi Sandhu Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio Executive Director and Endowed Chair Institute for Cyber Security (ICS) University of Texas at San Antonio

Sandhu, Ravi

198

AMALGAMATED SECURITY COMMUNITIES  

E-Print Network [OSTI]

This dissertation examines the process of the formation and dissolution of Amalgamated Security Communities, a topic that has been ignored by the academic community except as a side note when the origins of Pluralistic ...

Harvey, Andrew Stephen

2011-08-31T23:59:59.000Z

199

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the policy and responsibilities for the Department of Energy safeguards and security program. Does not cancel another directive. Canceled by DOE O 5630.11A dated 12-7-92.

1988-01-22T23:59:59.000Z

200

Safety, Security & Fire Report  

E-Print Network [OSTI]

2013 Safety, Security & Fire Report Stanford University #12;Table of Contents Public Safety About the Stanford University Department of Public Safety Community Outreach & Education Programs Emergency Access Transportation Safety Bicycle Safety The Jeanne Clery and Higher Education Act Timely Warning

Straight, Aaron

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


201

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Order establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels DOE O 470.4. Canceled by DOE O 470.4B

2007-05-25T23:59:59.000Z

202

Operations Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish policies, responsibilities and authorities for implementing and sustaining the Department of Energy (DOE) Operations Security (OPSEC) Program. Cancels DOE O 5632.3B. Canceled by DOE O 471.2 of 9-28-1995.

1992-04-30T23:59:59.000Z

203

Engineering secure software  

E-Print Network [OSTI]

In recent years computer software has gained notoriety for the endemic nature of security problems in software. These problems have been exploited with malicious intent by attackers. Most attempts at fixing these problems have been after...

Jetly, Prateek

2001-01-01T23:59:59.000Z

204

Safety evaluation report related to the operation of Watts Bar Nuclear Plant, Units 1 and 2 (Docket Nos. 50-390 and 50-391). Supplement No. 14  

SciTech Connect (OSTI)

Supplement No. 14 to the Safety Evaluation Report for the application filed by the Tennessee Valley Authority for license to operate Watts Bar Nuclear Plant, Units 1 and 2, Docket Nos. 50-390 and 50-391, located in Rhea County, Tennessee, has been prepared by the Office of Nuclear Reactor Regulation of the Nuclear Regulatory Commission. The purpose of this supplement is to update the Safety Evaluation with additional information submitted by the applicant since Supplement No. 13 was issued, and matters that the staff had under review when Supplement No. 13 was issued.

Tam, P.S.

1994-12-01T23:59:59.000Z

205

Incidents of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Sets forth requirements for the DOE Incidents of Security Concern Program, including timely identification and notification of, response to, inquiry into, reporting of, and closure actions for incidents of security concern. Cancels Chapter VII of DOE O 470.1; DOE N 471.3; and Chapter IV of DOE M 471.2-1B (Note: Paragraphs 1 and 2 of Chapter III remain in effect.) Canceled by DOE O 470.4.

2004-03-17T23:59:59.000Z

206

SECURING RADIO FREQUENCY IDENTIFICATION (RFID)  

E-Print Network [OSTI]

business process for an organization; as a result, the security risks for RFID systems and the controls for an organization; as a result, the security risks for RFID systems and the controls available to address themMay 2007 SECURING RADIO FREQUENCY IDENTIFICATION (RFID) SYSTEMS SECURING RADIO FREQUENCY

207

ANNUAL SECURITY & FIRE SAFETY REPORT  

E-Print Network [OSTI]

ANNUAL SECURITY & FIRE SAFETY REPORT 2014 A guide to policies, procedures, practices, and programs implemented to keep students, faculty, and staff safe and facilities secure. www.montana.edu/reports/security.pdf #12;Inside this Report 2014 Annual Security and Fire Safety Report for Reporting Year 2013

Maxwell, Bruce D.

208

Lemnos Interoperable Security Program  

SciTech Connect (OSTI)

The manner in which the control systems are being designed and operated in the energy sector is undergoing some of the most significant changes in history due to the evolution of technology and the increasing number of interconnections to other system. With these changes however come two significant challenges that the energy sector must face; 1) Cyber security is more important than ever before, and 2) Cyber security is more complicated than ever before. A key requirement in helping utilities and vendors alike in meeting these challenges is interoperability. While interoperability has been present in much of the discussions relating to technology utilized within the energy sector and especially the Smart Grid, it has been absent in the context of cyber security. The Lemnos project addresses these challenges by focusing on the interoperability of devices utilized within utility control systems which support critical cyber security functions. In theory, interoperability is possible with many of the cyber security solutions available to utilities today. The reality is that the effort required to achieve cyber security interoperability is often a barrier for utilities. For example, consider IPSec, a widely-used Internet Protocol to define Virtual Private Networks, or ?? tunnels?, to communicate securely through untrusted public and private networks. The IPSec protocol suite has a significant number of configuration options and encryption parameters to choose from, which must be agreed upon and adopted by both parties establishing the tunnel. The exercise in getting software or devices from different vendors to interoperate is labor intensive and requires a significant amount of security expertise by the end user. Scale this effort to a significant number of devices operating over a large geographical area and the challenge becomes so overwhelming that it often leads utilities to pursue solutions from a single vendor. These single vendor solutions may inadvertently lock utilities into proprietary and closed systems Lemnos is built on the successes of Open PCS Security Architecture for Interoperable Design (OPSAID), a previous DOE National SCADA Test Bed (NSTB) project. It enhances security interoperability by identifying basic cyber security functions based on utility requirements and then selecting open source solutions, namely Internet Engineering Task Force (IETF) RFCs, to support these functions. Once identified, specific configuration parameters for each RFC suitable for the electric utility control system environment are identified and documented. These configuration parameters are referred to as Interoperable Configuration Profiles (ICP) and their effectiveness within the utility control systems environment is verified with comprehensive testing as the final step in the process. The project focused on development of ICPs for four security protocols (IPsec, SSH, LDAP, and Syslog) which represent fundamental building blocks which can be utilized for securing utility control systems. These ICPs are product agnostic and can be applied modularly to any device (router, substation gateway, intelligent electronic device, etc.) within the utility control system as the end user deems necessary for their unique system architecture. The Lemnos Interoperable Security Program is a public-private partnership under the U.S. Department of Energy (DOE) Office of Electricity Delivery and Energy Reliability's Cybersecurity for Energy Delivery Systems (CEDS) program and supports The Roadmap to Secure Energy Delivery Systems. In addition to EnerNex, the core team supporting the effort includes Tennessee Valley Authority, Sandia National Laboratories, and Schweitzer Engineering Laboratories. Adding to the core team effort is collaboration from additional industry participants in the project including the Electric Power Research Institute (EPRI), Alien Vault, Cisco, Encore Networks, GarrettCom, Industrial Defender, N-Dimension Solutions, Phoenix Contact, RuggedCom, and Siemens.

John Stewart; Ron Halbgewachs; Adrian Chavez; Rhett Smith; David Teumim

2012-01-31T23:59:59.000Z

209

Front lighted optical tooling method and apparatus  

DOE Patents [OSTI]

An optical tooling method and apparatus uses a front lighted shadowgraphic technique to enhance visual contrast of reflected light. The apparatus includes an optical assembly including a fiducial mark, such as cross hairs, reflecting polarized light with a first polarization, a polarizing element backing the fiducial mark and a reflective surface backing the polarizing element for reflecting polarized light bypassing the fiducial mark and traveling through the polarizing element. The light reflected by the reflecting surface is directed through a second pass of the polarizing element toward the frontal direction with a polarization differing from the polarization of the light reflected by the fiducial mark. When used as a tooling target, the optical assembly may be mounted directly to a reference surface or may be secured in a mounting, such as a magnetic mounting. The optical assembly may also be mounted in a plane defining structure and used as a spherometer in conjunction with an optical depth measuring instrument.

Stone, W.J.

1983-06-30T23:59:59.000Z

210

Safety evaluation report related to the operation of Watts Bar Nuclear Plant, Units 1 and 2 (Docket Nos. 50-390 and 50-391). Supplement No. 15  

SciTech Connect (OSTI)

This report supplements the Safety Evaluation Report (SER), NUREG-0847 (June 1982), Supplement No. 1 (September 1982), Supplement No. 2 (January 1984), Supplement No. 3 (January 1985), Supplement No. 4 (March 1985), Supplement No. 5 (November 1990), Supplement No. 6 (April 1991), Supplement No. 7 (September 1991), Supplement No. 8 (January 1992), Supplement No. 9 (June 1992), Supplement No. 10 (October 1992), Supplement No. 11 (April 1993), Supplement No. 12 (October 1993), Supplement No. 13 (April 1994), and Supplement No. 14 (December 1994) issued by the Office of Nuclear Reactor Regulation of the US Nuclear Regulatory Commission with respect to the application filed by the Tennessee Valley Authority, as applicant and owner, for licenses to operate the Watts Bar Nuclear Plant, Units 1 and 2 (Docket Nos. 50-390 and 50-391). The facility is located in Rhea County, Tennessee, near the Watts Bar Dam on the Tennessee River. This supplement provides recent information regarding resolution of some of the outstanding and confirmatory items, and proposed license conditions identified in the SER.

Tam, P.S.

1995-06-01T23:59:59.000Z

211

Safety Evaluation Report related to the operation of Watts Bar Nuclear Plant, Units 1 and 2 (Docket Numbers 50-390 and 50-391). Supplement Number 13  

SciTech Connect (OSTI)

This report supplements the Safety Evaluation Report (SER), NUREG-0847 (June 1982), Supplement No. 1 (September 1982), Supplement No. 2 (January 1984), Supplement No. 3 (January 1985), Supplement No. 4 (March 1985), Supplement No. 5 (November 1990), Supplement No. 6 (April 1991), Supplement No. 7 (September 1991), Supplement No. 8 (January 1992), Supplement No. 9 (June 1992), Supplement No. 10 (October 1992), Supplement No. 11 (April 1993), and Supplement No. 12 (October 1993), issued by the Office of Nuclear Reactor Regulation of the US Nuclear Regulatory Commission with respect to the application filed by the Tennessee Valley Authority, as applicant and owner, for licenses to operate the Watts Bar Nuclear Plant, Units 1 and 2 (Docket Nos. 50-390 and 50-391). The facility is located in Rhea County, Tennessee, near the Watts Bar Dam on the Tennessee River. This supplement provides recent information regarding resolution of some of the outstanding and confirmatory items, and proposed license conditions identified in the SER. These issues relate to: Design criteria -- structures, components, equipment, and systems; Reactor; Instrumentation and controls; Electrical power systems; Auxiliary systems; Conduct of operations; Accident analysis; and Quality assurance.

Not Available

1994-04-01T23:59:59.000Z

212

Global Material Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickr Flickr Editor'sshortGeothermal HeatStartedGirlsMaterial Security |

213

physical security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective Actions Program LANL TRU

214

safeguards and security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -

215

Nuclear Security 101 | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear Science

216

Nuclear Security Enterprise | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohnSecurityControls |Navy NuclearNuclear

217

International Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-SeriesFlickrinformation for and NovelFEG-SEMInterlibrary LoanExercises |Security

218

Defense Nuclear Security | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsruc DocumentationP-Series to UserProduct: CrudeOffice ofINLNuclear Security | National Nuclear

219

Physical Security Systems | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary) "ofEarlyEnergyDepartment ofDepartment ofofOxfordVeteransAdministrationPhysical Security Systems |

220

Light Computing  

E-Print Network [OSTI]

A configuration of light pulses is generated, together with emitters and receptors, that allows computing. The computing is extraordinarily high in number of flops per second, exceeding the capability of a quantum computer for a given size and coherence region. The emitters and receptors are based on the quantum diode, which can emit and detect individual photons with high accuracy.

Gordon Chalmers

2006-10-13T23:59:59.000Z

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


221

Interference between electronic lighting and other appliances  

SciTech Connect (OSTI)

This paper presents empirical data from the laboratory and the field to provide an overview of electromagnetic interference between high-efficiency electronic lighting and certain other electronic devices, such as power-line carrier systems, security systems, and remote controls for televisions and VCRs. Reported cases involving both electronic lighting emissions and immunity in building power systems are summarized according to basic interference mechanisms. To illustrate the potential complexities of this problem, the paper describes a case where high-efficiency lighting interfered with a hearing aid. The hearing aid case includes a field survey, laboratory investigations, and recommended solutions to the problem.

Schwabe, R.J.; Zelingher, S. [New York Power Authority, New York, NY (United States); Key, T.; Phipps, K. [EPRI Power Electronics Applications Center, Knoxville, TN (United States)

1995-12-31T23:59:59.000Z

222

Operating temperatures for a convectively cooled recessed incandescent light fixture  

SciTech Connect (OSTI)

Test results are given for the operation of a recessed incandescent light fixture intended for residential use. The fixture is labeled for use in direct contact with attic thermal insulation. Temperature control of the powered fixture is provided by convective heat transfer from the ceiling side of the fixture. The fixture was operated at power levels up to two times the rated power of 75 watts and under thermal insulations up to R-40. In all operating configurations tested the fixture surface in contact with attic insulation was found to be less than 175/sup 0/C. The observed surface temperatures are judged to be safe for operation in contact with loose-fill or batt-type insulations. It was observed that the power leads inside one fixture configuration are exposed to temperatures as high as 168/sup 0/C. The electrical insulation could, therefore, have a limited life. The properties of the internal fixture wiring were not, however, studied in detail.

Yarbrough, D.W.; Toor, I.

1980-12-01T23:59:59.000Z

223

Security Administration Production Office,  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security and

224

SecuritySmart  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0SecuritySmart March 2009

225

Safety, Security & Environment  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguards and SecuritySafety for

226

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

2.2 Admin Chg 1, Personnel Security by Mark Pekrul Functional areas: Administrative Change, Personnel Security, Safety and Security The order establishes requirements that will...

227

Personnel Security - DOE Directives, Delegations, and Requirements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

72.2 Chg 1, Personnel Security by Mark Pekrul Functional areas: Personnel Security, Security, Human Capital The order establishes requirements that will enable DOE to operate a...

228

Security enhanced with increased vehicle inspections  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security enhanced with increased vehicle inspections Security measures increase as of March: vehicle inspections won't delay traffic New increased security procedures meet LANL's...

229

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

her students on security of process control systems. I amcyber-security tools for process control systems. In theon the security mechanisms of process control systems, few

Amin, Saurabh

2011-01-01T23:59:59.000Z

230

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

initiatives to be accomplished within the next five years using light technologies and best practices to provide enterprise-wide services in a cost effective and efficient...

231

ata security feature: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

232

Safety and Security What do Safety/Security work with?  

E-Print Network [OSTI]

Safety and Security on campus #12;Agenda · What do Safety/Security work with? · If something happens · Opening hours · Remember · Website · How to find us #12;The Section for Safety and Security work with Police reports · Education in "First medical aid" · Education in laboratory safety #12;If something

233

GAANN -Computer Systems Security GAANN Computer Systems Security  

E-Print Network [OSTI]

GAANN - Computer Systems Security GAANN ­ Computer Systems Security · What is computer systems security? ­ The protection of all aspects of a computer system from unauthorized use · Why is it important? ­ Computing devices have a large impact on our daily life ­ Guaranteeing that the devices perform as desired

Alpay, S. Pamir

234

National Security System Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual provides baseline requirements and controls for the graded protection of the confidentiality, integrity, and availability of classified information and information systems used or operated by the Department of Energy (DOE), contractors, and any other organization on behalf of DOE, including the National Nuclear Security Administration. Cancels DOE M 471.2-2. Canceled by DOE O 205.1B.

2007-03-08T23:59:59.000Z

235

Information Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes an Information Security Program for the protection and control of classified and sensitive information. Cancels DOE 5630.8A, DOE 5639.1, DOE 5639.5, DOE 5639.6A, DOE 5639.7, DOE M 5632.1C-1, Chapter III, Para. 1, 2, and 4-9

1995-09-28T23:59:59.000Z

236

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish responsibilities for the U.S. Department of Energy (DOE) Safeguards and Security (S&S) Program, and to establish program planning and management requirements for the S&S Program. Cancels DOE O 470.4A, DOE M 470.4-1, Chg. 2, and DOE O 142.1.

2011-07-21T23:59:59.000Z

237

September 2004 INFORMATION SECURITY  

E-Print Network [OSTI]

September 2004 INFORMATION SECURITY WITHIN THE SYSTEM DEVELOPMENT LIFE CYCLE Annabelle Lee of Standards and Technology Many System Development Life Cycle (SDLC) models exist that can be used. This model assumes that the system will be delivered near the end of its life cycle. Another SDLC model uses

238

Headquarters Security Operations  

Broader source: Energy.gov [DOE]

DOE strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; manages access authorization functions; ensures that executives and dignitaries are fully protected, and supports efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

239

Metaphors for cyber security.  

SciTech Connect (OSTI)

This report is based upon a workshop, called 'CyberFest', held at Sandia National Laboratories on May 27-30, 2008. Participants in the workshop came from organizations both outside and inside Sandia. The premise of the workshop was that thinking about cyber security from a metaphorical perspective could lead to a deeper understanding of current approaches to cyber defense and perhaps to some creative new approaches. A wide range of metaphors was considered, including those relating to: military and other types of conflict, biological, health care, markets, three-dimensional space, and physical asset protection. These in turn led to consideration of a variety of possible approaches for improving cyber security in the future. From the proposed approaches, three were formulated for further discussion. These approaches were labeled 'Heterogeneity' (drawing primarily on the metaphor of biological diversity), 'Motivating Secure Behavior' (taking a market perspective on the adoption of cyber security measures) and 'Cyber Wellness' (exploring analogies with efforts to improve individual and public health).

Moore, Judy Hennessey; Parrott, Lori K.; Karas, Thomas H.

2008-08-01T23:59:59.000Z

240

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy (DOE) directives. Original dated dated 1-16-09. Canceled by DOE O 471.6--except for Section D.

2010-10-12T23:59:59.000Z

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


241

Information Security Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

This Manual establishes security requirements for the protection and control of matter required to be classified or controlled by statutes, regulations, or U.S. Department of Energy directives. Cancels DOE M 470.4-4 Chg 1. DOE M 470.4-4A Chg 1 issued 10-12-10.

2009-01-16T23:59:59.000Z

242

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes roles and responsibilities for the Department of Energy Safeguards and Security Program. Cancels: DOE O 470.1, DOE O 471.2A, DOE O 471.4, DOE O 472.1C, DOE O 473.1, DOE O 473.2, DOE O 474.1A. Canceled by DOE O 470.4A.

2005-08-26T23:59:59.000Z

243

A network security monitor  

SciTech Connect (OSTI)

The study of security in computer networks is a rapidly growing area of interest because of the proliferation of networks and the paucity of security measures in most current networks. Since most networks consist of a collection of inter-connected local area networks (LANs), this paper concentrates on the security-related issues in a single broadcast LAN such as Ethernet. Specifically, we formalize various possible network attacks and outline methods of detecting them. Our basic strategy is to develop profiles of usage of network resources and then compare current usage patterns with the historical profile to determine possible security violations. Thus, our work is similar to the host-based intrusion-detection systems such as SRI's IDES. Different from such systems, however, is our use of a hierarchical model to refine the focus of the intrusion-detection mechanism. We also report on the development of our experimental LAN monitor currently under implementation. Several network attacks have been simulated and results on how the monitor has been able to detect these attacks are also analyzed. Initial results demonstrate that many network attacks are detectable with our monitor, although it can surely be defeated. Current work is focusing on the integration of network monitoring with host-based techniques. 20 refs., 2 figs.

Heberlein, L.T.; Dias, G.V.; Levitt, K.N.; Mukherjee, B.; Wood, J.; Wolber, D. (California Univ., Davis, CA (USA). Dept. of Electrical Engineering and Computer Science)

1989-11-01T23:59:59.000Z

244

ARMY Energy Security Considerations  

E-Print Network [OSTI]

ARMY Energy Security Considerations Don Juhasz, PE, CEM HQDA, OACSIM, DAIM-FDF Telephone: (703-FDF (703) 601-0374 (DSN 329) / don.juhasz@hqda.army.mil 5 April 2007 Army Energy · · · · FOREIGN OIL 2 Situation OIL & GAS LIQUIDS 38% Rise in NTV Fuel Use 35% of DoD utilities 21% of Fed government 11

245

Transmission Line Security Monitor  

ScienceCinema (OSTI)

The Transmission Line Security Monitor is a multi-sensor monitor that mounts directly on high-voltage transmission lines to detect, characterize and communicate terrorist activity, human tampering and threatening conditions around support towers. For more information about INL's critical infrastructure protection research, visit http://www.facebook.com/idahonationallaboratory.

None

2013-05-28T23:59:59.000Z

246

Departmental Personnel Security- Clearance Automation  

Broader source: Energy.gov [DOE]

The primary objective of the DOE Integrated Security System (eDISS+) Initiative is to support the integration of multiple DOE security systems and databases. This integrated environment provides...

247

Database Security: A Historical Perspective  

E-Print Network [OSTI]

The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

Lesov, Paul

2010-01-01T23:59:59.000Z

248

System security Dr Len Hamey  

E-Print Network [OSTI]

, firewalls, detecting intrusions) Security process cycle policy implementation administration audit risk access with firewall Use generic service banners Use intrusion detection system that can detect;2 Security Services Confidentiality service. Authentication service. Integrity service. Access Control

Hamey, Len

249

Safeguard Security and Awareness Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Provides detailed requirements and procedures to supplement DOE O 470.1, Safeguards and Security Program, Chapter IV.

2002-10-02T23:59:59.000Z

250

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation.

2008-08-12T23:59:59.000Z

251

Safeguards and Security Program References  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes definitions for terms related to the Department of Energy Safeguards and Security (S&S) Program and includes lists of references and acronyms/abbreviations applicable to S&S Program directives. Cancels the Safeguards and Security Glossary of Terms, dated 12-18-95. Current Safeguards and Security Program References can also be found at Safeguards and Security Policy Information Resource (http://pir.pnl.gov/)

2005-08-26T23:59:59.000Z

252

East Asian Security in 2025  

E-Print Network [OSTI]

East Asian Security in 2025 Who We Are Reagan Heavin Energy Adam Hudson State Capacity Brandon Krueger Military Sean ONeil Demographics Griffin Rozell Balance of Power Matt Suma Economy East Asian Security in 2025 China...: Competition, Cooperation, Plateau? Reagan Heavin Adam Hudson Brandon Krueger Sean ONeil Griffin Rozell Matt Suma 24 April 2008 East Asian Security in 2025 Agenda Conclusions Projections Drivers Four Outcomes Questions East Asian Security in 2025...

Heavin, Reagan; Hudson, Adam; Krueger, Brandon; O'Neil, Sean; Rozell, Griffin; Suma, Matt

2008-01-01T23:59:59.000Z

253

Sandia National Laboratories: Stray Light  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -theErikGroundbreakingStandards Solar ThermochemicalStorage Protected:Stray Light

254

Shedding Light on Nanocrystal Defects  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2)Sharing Smart Grid Experiences throughandShedding Light on

255

Shedding Light on Nanocrystal Defects  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2)Sharing Smart Grid Experiences throughandShedding Light

256

Visitor ParkingP Blue Light Security Phones  

E-Print Network [OSTI]

Hensley Residence Hall 15 Tennis Courts/Parking Garage*7 Cole Residence Hall 16 Dorothy Williamson Clock8 Entrance The Vern Express (Connects the Foggy Bottom & Mount Vernon campuses) GW Police P To: Mac

Vertes, Akos

257

January 2005 INTEGRATING IT SECURITY  

E-Print Network [OSTI]

January 2005 INTEGRATING IT SECURITY INTO THE CAPITAL PLANNING AND INVESTMENT CONTROL PROCESS technology (IT) security and capital planning and investment control (CPIC) processes have been performed taining appropriate security controls, both at the enterprise-wide and system level, commensurate

258

RECOMMENDED SECURITY CONTROLS FOR FEDERAL  

E-Print Network [OSTI]

May 2005 RECOMMENDED SECURITY CONTROLS FOR FEDERAL INFORMATION SYSTEMS: GUIDANCE FOR SELECTING COST-EFFECTIVE CONTROLS USING A RISK-BASED PROCESS Shirley Radack, Editor, Computer Security Division, Information-53, Recommended Security Controls for Federal Information Systems The basic questions that organizations should

259

August 2003 IT SECURITY METRICS  

E-Print Network [OSTI]

, efficiency, effectiveness, and the impact of the security controls. The process steps need not be sequen tial metrics program and provides examples of metrics based on the criti cal elements and security controls and techniques contained in NIST SP 800-26, Security Self-Assessment Guide for Information Technology Systems

260

Positioning Security from electronic warfare  

E-Print Network [OSTI]

Positioning Security from electronic warfare to cheating RFID and road-tax systems Markus Kuhn;Military positioning-security concerns Electronic warfare is primarily about denying or falsifying location of the importance of global positioning security has led to the military discipline of "navigation warfare". 5 #12

Kuhn, Markus

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


261

Architectural support for enhancing security in clusters  

E-Print Network [OSTI]

to security, numerous security loopholes in cluster servers come to the forefront. Clusters usually rely on rewalls for their security, but the rewalls cannot prevent all security attacks; therefore, cluster systems should be designed to be robust...

Lee, Man Hee

2009-05-15T23:59:59.000Z

262

Lighting Inventory Lighting Theatre and Drama  

E-Print Network [OSTI]

Lighting Inventory Lighting Theatre and Drama Description Totals R.Halls Wells- Metz Light ERS ETC SourceFour 25 25 50 degree ERS Strand Lighting 64 14 24 12 14 36 degree ERS ETC Source Four 15 15 36 degree ERS Strand Lighting 124 60 58 2 4 26 degree ERS ETC SourceFour 2 2 26 degree ERS Strand

Indiana University

263

Dual LED/incandescent security fixture  

DOE Patents [OSTI]

A dual LED and incandescent security lighting system uses a hybrid approach to LED illumination. It combines an ambient LED illuminator with a standard incandescent lamp on a motion control sensor. The LED illuminator will activate with the onset of darkness (daylight control) and typically remain on during the course of the night ("always on"). The LED illumination, typically amber, is sufficient to provide low to moderate level lighting coverage to the wall and ground area adjacent to and under the fixture. The incandescent lamp is integrated with a motion control circuit and sensor. When movement in the field of view is detected (after darkness), the incandescent lamp is switched on, providing an increased level of illumination to the area. Instead of an "always on" LED illuminator, the LEDs may also be switched off when the incandescent lamp is switched on.

Gauna, Kevin Wayne

2005-06-21T23:59:59.000Z

264

Lighting system with thermal management system having point contact synthetic jets  

DOE Patents [OSTI]

Lighting system having unique configurations are provided. For instance, the lighting system may include a light source, a thermal management system and driver electronics, each contained within a housing structure. The light source is configured to provide illumination visible through an opening in the housing structure. The thermal management system includes a plurality of synthetic jets. The synthetic jets are arranged within the lighting system such that they are secured at contact points.

Arik, Mehmet; Weaver, Stanton Earl; Kuenzler, Glenn Howard; Wolfe, Jr., Charles Franklin; Sharma, Rajdeep

2013-12-10T23:59:59.000Z

265

Determination of the Planck constant using a watt balance with a superconducting magnet system at the National Institute of Standards and Technology  

E-Print Network [OSTI]

For the past two years, measurements have been performed with a watt balance at the National Institute of Standards and Technology (NIST) to determine the Planck constant. A detailed analysis of these measurements and their uncertainties has led to the value $h=6.626\\,069\\,79(30)\\times 10^{-34}\\,$J$\\,$s. The relative standard uncertainty is $ 45\\times 10^{-9}$. This result is $141\\times 10^{-9}$ fractionally higher than $h_{90}$. Here $h_{90}$ is the conventional value of the Planck constant given by $h_{90}\\equiv 4 /( K_{\\mathrm{J-90}}^2R_{\\mathrm{K-90}})$, where $K_{\\mathrm{J-90}}$ and $R_{\\mathrm{K-90}}$ denote the conventional values of the Josephson and von Klitzing constants, respectively.

Schlamminger, Stephan; Seifert, Frank; Chao, Leon S; Newell, David B; Liu, Ruimin; Steiner, Richard L; Pratt, Jon R

2014-01-01T23:59:59.000Z

266

Line Management Perspective: National Nuclear Security Administration...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration (NNSA) Line Management Perspective: National Nuclear Security Administration (NNSA) Addthis Description Slide Presentation by Jim...

267

Workforce Statistics - Office of Secure Transportation | National...  

National Nuclear Security Administration (NNSA)

Office of Secure Transportation | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

268

Secretary Richardson Accepts Recommendations for Improving Security...  

National Nuclear Security Administration (NNSA)

Secretary Richardson Accepts Recommendations for Improving Security at Nuclear Weapons Laboratories | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS...

269

Security Science & Technology | Nuclear Science | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Nuclear Security Science & Technology Border Security Comprehensive Vulnerability and Threat Analysis Consequence Management, Safeguards, and Non-Proliferation Tools Export...

270

Geoscience research for energy security  

SciTech Connect (OSTI)

This report focuses on the nation's geoscience needs and recommends DOE activities to mitigate major problems that effect energy security. The report recommends new or redirected DOE geoscience research initiatives for oil and gas, coal, nuclear resources, structures and processes in the earth's crust, geothermal resources, oil shale, and waste disposal. In light of the current and near-term national energy requirements, federal budget constraints, and the diminished R and D efforts from the domestic energy industry, the Board recommends that DOE: assign highest geoscience research emphasis to shorter-term, energy priorities of the nation; particularly advanced oil and gas exploration and production technologies; establish in DOE an Office of Geoscience Research to develop and administer a strategic plan for geoscience research activities; establish oil and gas research centers within each of the six major oil and gas provinces of the United States to conduct and coordinate interdisciplinary problem-oriented research; increase oil and gas research funding by an initial annual increment of $50 million, primarily to support the regional research centers.

Not Available

1987-02-01T23:59:59.000Z

271

FOILFEST :community enabled security.  

SciTech Connect (OSTI)

The Advanced Concepts Group of Sandia National Laboratories hosted a workshop, ''FOILFest: Community Enabled Security'', on July 18-21, 2005, in Albuquerque, NM. This was a far-reaching look into the future of physical protection consisting of a series of structured brainstorming sessions focused on preventing and foiling attacks on public places and soft targets such as airports, shopping malls, hotels, and public events. These facilities are difficult to protect using traditional security devices since they could easily be pushed out of business through the addition of arduous and expensive security measures. The idea behind this Fest was to explore how the public, which is vital to the function of these institutions, can be leveraged as part of a physical protection system. The workshop considered procedures, space design, and approaches for building community through technology. The workshop explored ways to make the ''good guys'' in public places feel safe and be vigilant while making potential perpetrators of harm feel exposed and convinced that they will not succeed. Participants in the Fest included operators of public places, social scientists, technology experts, representatives of government agencies including DHS and the intelligence community, writers and media experts. Many innovative ideas were explored during the fest with most of the time spent on airports, including consideration of the local airport, the Albuquerque Sunport. Some provocative ideas included: (1) sniffers installed in passage areas like revolving door, escalators, (2) a ''jumbotron'' showing current camera shots in the public space, (3) transparent portal screeners allowing viewing of the screening, (4) a layered open/funnel/open/funnel design where open spaces are used to encourage a sense of ''communitas'' and take advantage of citizen ''sensing'' and funnels are technological tunnels of sensors (the tunnels of truth), (5) curved benches with blast proof walls or backs, (6) making it easy for the public to report, even if not sure/''non-event'' (e.g. ''I'm uncomfortable'') and processing those reports in aggregate not individually, (7) transforming the resident working population into a part-time undercover security/sensor force through more innovative training and (8) adding ambassadors/security that engage in unexpected conversation with the public. The group recommended that we take actions to pursue the following ideas next: (a) A concept for a mobile sensor transport (JMP); (b) Conduct a follow-on workshop; (c) Conduct social experiments/activities to see how people would react to the concepts related to community and security; (d) Explore further aesthetically pleasing, blast-resistance seating areas; and (e) The Art of Freedom (an educational, multi-media campaign).

Moore, Judy Hennessey; Johnson, Curtis Martin; Whitley, John B.; Drayer, Darryl Donald; Cummings, John C., Jr. (.,; .)

2005-09-01T23:59:59.000Z

272

Light Source  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: VegetationEquipment Surfaces and Interfaces Sample6, 2011 LawrenceEfeedstocks and the climateLife a Light

273

Light' Darkness  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: VegetationEquipment Surfaces and Interfaces Sample6, 2011 LawrenceEfeedstocks and the climateLifeLight to

274

Light Water Reactor Sustainability  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

3 Light Water Reactor Sustainability Program ACCOMPLISHMENTS REPORT 2013 Accomplishments Report | Light Water Reactor Sustainability 2 T he mission of the Light Water Reactor...

275

Light Water Reactor Sustainability  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4 Light Water Reactor Sustainability ACCOMPLISHMENTS REPORT 2014 Accomplishments Report | Light Water Reactor Sustainability 2 T he mission of the Light Water Reactor...

276

Security seal. [Patent application  

DOE Patents [OSTI]

Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to fingerprints are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

Gobeli, G.W.

1981-11-17T23:59:59.000Z

277

NNSA orders security enhancements  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | National Nuclear SecurityAdministration

278

National Security Initiatives | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear Forensics Bioinformatics

279

Security Clearances; Limitations  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof the Americas | Department ofofDeliveredSectionSecuring theSEC. 1072.

280

Strengthening Global Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBiSiteNeutronStrategic Plan The

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


281

Sustainable Office Lighting Options  

E-Print Network [OSTI]

Sustainable Office Lighting Options Task Lighting: Task lighting is a localized method of lighting a workspace so that additional, unnecessary lighting is eliminated, decreasing energy usage and costs. Illumination levels in the targeted work areas are higher with task lighting than with the ambient levels

Massachusetts at Amherst, University of

282

V-186: Drupal Login Security Module Security Bypass and Denial...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

U-162: Drupal Multiple Vulnerabilities V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

283

T-674: Drupal Secure Password Hashes Module Security Bypass Vulnerabil...  

Broader source: Energy.gov (indexed) [DOE]

or later. Addthis Related Articles V-052: Drupal Core Access Bypass and Arbitrary PHP Code Execution Vulnerabilities V-216: Drupal Monster Menus Module Security Bypass and...

284

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability  

E-Print Network [OSTI]

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 ? 25, 2010 ESL-HH-10-08-09 Proceedings of the 17... of Smart Grid devices ? Describe progress made in Smart Grid security ? Propose a more robust approach to SG security ? Describe needs for further research and development ESL-HH-10-08-09 Proceedings of the 17th Symposium for Improving Building Systems...

Ragsdale, G.

285

Supporting Decentralized, Security focused Dynamic Virtual Organizations across the Grid  

E-Print Network [OSTI]

Sinnott,R.O. Watt,J. Koetsier,J. Chadwick,D.W. Otenko,O. Nguyen,T. Proceedings of 2nd IEEE International Conference on e-Science and Grid Computing, Amsterdam, December 2006

Sinnott, R.O.

286

INDUSTRIAL CONTROL SYSTEM CYBER SECURITY: QUESTIONS AND ANSWERS RELEVANT TO NUCLEAR FACILITIES, SAFEGUARDS AND SECURITY  

SciTech Connect (OSTI)

Typical questions surrounding industrial control system (ICS) cyber security always lead back to: What could a cyber attack do to my system(s) and; how much should I worry about it? These two leading questions represent only a fraction of questions asked when discussing cyber security as it applies to any program, company, business, or organization. The intent of this paper is to open a dialog of important pertinent questions and answers that managers of nuclear facilities engaged in nuclear facility security and safeguards should examine, i.e., what questions should be asked; and how do the answers affect an organization's ability to effectively safeguard and secure nuclear material. When a cyber intrusion is reported, what does that mean? Can an intrusion be detected or go un-noticed? Are nuclear security or safeguards systems potentially vulnerable? What about the digital systems employed in process monitoring, and international safeguards? Organizations expend considerable efforts to ensure that their facilities can maintain continuity of operations against physical threats. However, cyber threats particularly on ICSs may not be well known or understood, and often do not receive adequate attention. With the disclosure of the Stuxnet virus that has recently attacked nuclear infrastructure, many organizations have recognized the need for an urgent interest in cyber attacks and defenses against them. Several questions arise including discussions about the insider threat, adequate cyber protections, program readiness, encryption, and many more. These questions, among others, are discussed so as to raise the awareness and shed light on ways to protect nuclear facilities and materials against such attacks.

Robert S. Anderson; Mark Schanfein; Trond Bjornard; Paul Moskowitz

2011-07-01T23:59:59.000Z

287

Dye filled security seal  

DOE Patents [OSTI]

A security seal for providing an indication of unauthorized access to a sealed object includes an elongate member to be entwined in the object such that access is denied unless the member is removed. The elongate member has a hollow, pressurizable chamber extending throughout its length that is filled with a permanent dye under greater than atmospheric pressure. Attempts to cut the member and weld it together are revealed when dye flows through a rupture in the chamber wall and stains the outside surface of the member.

Wilson, Dennis C. W. (Tijeras, NM)

1982-04-27T23:59:59.000Z

288

Cyberspace security system  

SciTech Connect (OSTI)

A system evaluates reliability, performance and/or safety by automatically assessing the targeted system's requirements. A cost metric quantifies the impact of failures as a function of failure cost per unit of time. The metrics or measurements may render real-time (or near real-time) outcomes by initiating active response against one or more high ranked threats. The system may support or may be executed in many domains including physical domains, cyber security domains, cyber-physical domains, infrastructure domains, etc. or any other domains that are subject to a threat or a loss.

Abercrombie, Robert K; Sheldon, Frederick T; Ferragut, Erik M

2014-06-24T23:59:59.000Z

289

National Security Science  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScience National

290

National Security Science Archive  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May JunDatastreamsmmcrcalgovInstrumentsrucLas Conchas recoveryLaboratory | NationalJohn Cyber Security Nuclear ForensicsScienceScience »

291

Security | Argonne National Laboratory  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr May Jun Jul(Summary)morphinanInformation Desert Southwest RegionatSearchScheduled System OutagesNews PressThemesLinksUserSecurity

292

Security | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0

293

PNNL: Security & Privacy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 TheSteven Ashby Dr. Steven Ashby Photo Dr.1999alt=Search

294

Energy Security Overview  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth7-1D: Vegetation ProposedUsing Zirconia Nanoparticles asSecondCareerFebruaryEnergySecurity Overview We are

295

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The National

296

National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy Login The NationalWashington. DC

297

Natlonal Nuclear Security Admlnlstratlon  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy2015 | JeffersonNations

298

Sandia National Laboratories: Lighting Developments to 2030  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -theErik Spoerke SSLS ExhibitIowa StateClimateLighting Developments to 2030 Lighting

299

Promoting India's development: energy security and climate security are convergent goals  

SciTech Connect (OSTI)

This paper investigates three aspects of the energy-climate challenges faced by India. First, we examine energy security in light of anticipated growth in power generation in response to the national goal of maintaining close to 10% growth in GDP. Second, we examine possible options for mitigation and adaptation to climate change for India that it can take to the coming Copenhagen meeting on climate change. Lastly, we introduce an open web based tool for analyzing and planning global energy systems called the Global Energy Observatory (GEO).

Rajan, Gupta [Los Alamos National Laboratory; Shankar, Harihar [Los Alamos National Laboratory; Joshi, Sunjoy [INDIA

2009-01-01T23:59:59.000Z

300

National Security | ornl.gov  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Mobile Applications StreamingReal-time Data Data System Architectures for National Security Sensor Networks Visual Analytics Risk Analysis Systems Modeling Engineering Analysis...

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


301

Technology Transfer Success Stories, Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security Navigate Home About Us Contact Information Hide Thumbs First Previous Pause Next Last Set Speed Slideshow speed: 5 seconds Move Autoinduction system New Image Set...

302

Climate Change and National Security  

E-Print Network [OSTI]

CLIMATE CHANGE Multiplying Threats to National Securityfor the impacts of climate change on national security. Pagea warming world. Page 11 Climate change acts as a threat

Alyson, Fleming; Summer, Kelly; Summer, Martin; Lauren, Franck; Jonathan, Mark

2015-01-01T23:59:59.000Z

303

David Telles wins NNSA Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

who conduct vulnerability analyses, authored the LANL Site Safeguards and Security Plan, and administered the Lab's Performance Assurance Program. Under his leadership,...

304

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes the minimum implementation standards for cyber security management processes throughout the Department. No cancellation. Admin Chg 1 dated 9-1-09.

2008-08-12T23:59:59.000Z

305

Secure Data Center (Fact Sheet)  

SciTech Connect (OSTI)

This fact sheet describes the purpose, lab specifications, applications scenarios, and information on how to partner with NREL's Secure Data Center at the Energy Systems Integration Facility.

Not Available

2012-08-01T23:59:59.000Z

306

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE O 470.1 Extended until 5-11-06 by DOE N 251.63, dated 5-11-05. Chg 1, Safeguards and Security Program, dated 9/28/95, extended by DOE N 251.57, dated 4/28/2004. Change 1, 5/21/96, revises Chapter IV. Cancels: DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, DOE M 5632.1C-1 in part.

1995-09-28T23:59:59.000Z

307

Security classification of information  

SciTech Connect (OSTI)

This document is the second of a planned four-volume work that comprehensively discusses the security classification of information. The main focus of Volume 2 is on the principles for classification of information. Included herein are descriptions of the two major types of information that governments classify for national security reasons (subjective and objective information), guidance to use when determining whether information under consideration for classification is controlled by the government (a necessary requirement for classification to be effective), information disclosure risks and benefits (the benefits and costs of classification), standards to use when balancing information disclosure risks and benefits, guidance for assigning classification levels (Top Secret, Secret, or Confidential) to classified information, guidance for determining how long information should be classified (classification duration), classification of associations of information, classification of compilations of information, and principles for declassifying and downgrading information. Rules or principles of certain areas of our legal system (e.g., trade secret law) are sometimes mentioned to .provide added support to some of those classification principles.

Quist, A.S.

1993-04-01T23:59:59.000Z

308

Electronic security device  

DOE Patents [OSTI]

The present invention relates to a security device having a control box containing an electronic system and a communications loop over which the system transmits a signal. The device is constructed so that the communications loop can extend from the control box across the boundary of a portal such as a door into a sealed enclosure into which access is restricted whereby the loop must be damaged or moved in order for an entry to be made into the enclosure. The device is adapted for detecting unauthorized entries into such enclosures such as rooms or containers and for recording the time at which such entries occur for later reference. Additionally, the device detects attempts to tamper or interfere with the operation of the device itself and records the time at which such events take place. In the preferred embodiment, the security device includes a microprocessor-based electronic system and a detection module capable of registering changes in the voltage and phase of the signal transmitted over the loop. 11 figs.

Eschbach, E.A.; LeBlanc, E.J.; Griffin, J.W.

1992-03-17T23:59:59.000Z

309

Ideas for Security Assurance in Security Critical Software using Modelica  

E-Print Network [OSTI]

Ideas for Security Assurance in Security Critical Software using Modelica David Broman, Peter critical software. Modelica is a modern, strongly typed, de- clarative, and object-oriented language assurance, by expanding the scope of Modelica into also becoming a declarative modeling language for other

Zhao, Yuxiao

310

2014 Headquarters Facilities Master Security Plan - Chapter 8...  

Office of Environmental Management (EM)

8, Operations Security Program 2014 Headquarters Facilities Master Security Plan - Chapter 8, Operations Security Program June 2014 2014 Headquarters Facilities Master Security...

311

2014 Headquarters Facilities Master Security Plan - Chapter 14...  

Office of Environmental Management (EM)

4, Cyber Security 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 14, Cyber...

312

2014 Headquarters Facilities Master Security Plan - Chapter 1...  

Office of Environmental Management (EM)

, Physical Security 2014 Headquarters Facilities Master Security Plan - Chapter 1, Physical Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 1,...

313

2014 Headquarters Facilities Master Security Plan - Chapter 10...  

Office of Environmental Management (EM)

0, Security Awareness Program 2014 Headquarters Facilities Master Security Plan - Chapter 10, Security Awareness Program June 2014 2014 Headquarters Facilities Master Security Plan...

314

2014 Headquarters Facilities Master Security Plan - Chapter 3...  

Office of Environmental Management (EM)

3, Personnel Security 2014 Headquarters Facilities Master Security Plan - Chapter 3, Personnel Security June 2014 2014 Headquarters Facilities Master Security Plan - Chapter 3,...

315

Fiber optic security seal including plural Bragg gratings  

DOE Patents [OSTI]

An optical security system enables the integrity of a container seal to be remotely interrogated. A plurality of Bragg gratings is written holographically into the core of at least one optical fiber placed about the container seal, where each Bragg grating has a predetermined location and a known frequency for reflecting incident light. A time domain reflectometer is provided with a variable frequency light output that corresponds to the reflecting frequencies of the Bragg gratings to output a signal that is functionally related to the location and reflecting frequency of each of the Bragg gratings. 2 figs.

Forman, P.R.

1994-09-27T23:59:59.000Z

316

Workshop on Education in Computer Security Page 1 Computer Security in Introductory Programming Classes  

E-Print Network [OSTI]

of domains occurs in a secure manner (as defined by the site security policy) and that the change in domains

Bishop, Matt

317

Contract Provisions and Ratchets: Utility Security or Customer Equity?  

E-Print Network [OSTI]

CONTRACT PROVISIONS ANO RATCHETS: UTILITY SECURITY OR CUSTOMER EQUITY? BARBARA A. PENKALA Senior Research Analyst Houston Lighting & Power Company Houston. Texas ABSTRACT The contract provisions and ratchets con tained in an electric... of customers and the magnitude of the load served. A smaller part of the cost is dependent on kilowatt-hours. or energy supplied. The high investment required in the electric utility business relative to annual revenue has an important influence on price...

Penkala, B. A.

318

Pricing Security L. Jean Camp  

E-Print Network [OSTI]

documented, with free patches, continue to exist on the Internet(Farmer, 1999). An alternative solution on the issues of defining the good and jumpstarting a market in the information survivability workshop. Security, the lack of security on one machine can cause adverse effects on another. The most obvious example

Camp, L. Jean

319

Fluid Mechanics and Homeland Security  

E-Print Network [OSTI]

Fluid Mechanics and Homeland Security Gary S. Settles Mechanical and Nuclear Engineering Department. 2006. 38:87­110 The Annual Review of Fluid Mechanics is online at fluid.annualreviews.org doi: 10 security involves many applications of fluid mechanics and offers many opportunities for research

Settles, Gary S.

320

Reporting Incidents Of Security Concern  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To enhance the Department of Energy (DOE) Incidents of Security Concern Reporting Program through more consistent reporting, better information tracking, and interactive coordination. DOE N 251.54, dated 07/08/03, extends this directive until 07/08/04. Cancels Deputy Secretary Glauthier memorandum, subject: Reporting Security Incidents, dated 9-7-99.

2001-04-03T23:59:59.000Z

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


321

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations. Admin Chg 1 dated 9-1-09.

2009-01-08T23:59:59.000Z

322

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. No cancellations.

2009-01-08T23:59:59.000Z

323

FOOD SECURITY: WAYS FORWARD THROUGH  

E-Print Network [OSTI]

FOOD SECURITY: WAYS FORWARD THROUGH COOPERATIVE PRODUCTION AND MARKETING1 "Given the chance, poor. The Sustainable Community Connections project, coordinated by AWISH-HELLAS, seeks to address food security issues) olive oil-related products, with targeting of markets in the European Union (EU) and United States (US

Zaferatos, Nicholas C.

324

Mobile lighting apparatus  

DOE Patents [OSTI]

A mobile lighting apparatus includes a portable frame such as a moveable trailer or skid having a light tower thereon. The light tower is moveable from a stowed position to a deployed position. A hydrogen-powered fuel cell is located on the portable frame to provide electrical power to an array of the energy efficient lights located on the light tower.

Roe, George Michael; Klebanoff, Leonard Elliott; Rea, Gerald W; Drake, Robert A; Johnson, Terry A; Wingert, Steven John; Damberger, Thomas A; Skradski, Thomas J; Radley, Christopher James; Oros, James M; Schuttinger, Paul G; Grupp, David J; Prey, Stephen Carl

2013-05-14T23:59:59.000Z

325

The GLASS Project: Supporting Secure Shibboleth-based Single Sign-On to Campus Resources  

E-Print Network [OSTI]

Watt,J. Sinnott,R.O. Jiang,J. Proceedings of the UK e-Science All Hands Meeting, Nottingham, UK, September 2007.

Watt, J.

326

Safeguards and Security Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Ensures appropriate levels of protection against unauthorized access; theft, diversion, loss of custody, or destruction of nuclear weapons, or weapons components; espionage; loss or theft of classified matter or Government property; and other hostile acts that may cause unacceptable adverse impacts on national security or on the health and safety of Department of Energy (DOE) and contractor employees, the public, or the environment. DOE N 251.40, dated 5/3/01, extends this directive until 12/31/01. Cancels DOE 5630.11B, DOE 5630.13A, DOE 5630.14A, DOE 5630.15, DOE 5630.16A, DOE 5630.17, DOE 5631.1C, DOE 5631.4A, DOE 5634.1B, DOE 5634.3, DOE 5639.3, and Chapter IX of DOE M 5632.1C-1

1995-09-28T23:59:59.000Z

327

Suppression of spurious mode oscillation in mega-watt 77-GHz gyrotron as a high quality probe beam source for the collective Thomson scattering in LHD  

SciTech Connect (OSTI)

Collective Thomson scattering (CTS) diagnostic requires a strong probing beam to diagnose a bulk and fast ion distribution function in fusion plasmas. A mega-watt gyrotron for electron cyclotron resonance heating is used as a probing beam in the large helical device. Spurious mode oscillations are often observed during the turning on/off phase of the modulation. The frequency spectra of the 77-GHz gyrotron output power have been measured, and then one of the spurious modes, which interferes with the CTS receiver system, is identified as the TE{sub 17,6} mode at the frequency of 74.7 GHz. The mode competition calculation indicates that the increase of the magnetic field strength at the gyrotron resonator can avoid such a spurious mode and excite only the main TE{sub 18,6} mode. The spurious radiation at the 74.7 GHz is experimentally demonstrated to be suppressed in the stronger magnetic field than that optimized for the high-power operation.

Ogasawara, S. [Department of Energy Engineering and Science, Nagoya University, Nagoya 464-8463 (Japan); Kubo, S. [Department of Energy Engineering and Science, Nagoya University, Nagoya 464-8463 (Japan); National Institute for Fusion Science, 322-6 Oroshi-cho, Toki-shi 509-5292 (Japan); Nishiura, M.; Tanaka, K.; Shimozuma, T.; Yoshimura, Y.; Igami, H.; Takahashi, H.; Ito, S.; Takita, Y.; Kobayashi, S.; Mizuno, Y.; Okada, K. [National Institute for Fusion Science, 322-6 Oroshi-cho, Toki-shi 509-5292 (Japan); Tatematsu, Y.; Saito, T. [Research Center for Development of Far-Infrared Region, University of Fukui, Fukui 910-8507 (Japan); Minami, R.; Kariya, T.; Imai, T. [Plasma Research Center, University of Tsukuba, Tsukuba 305-8577 (Japan)

2012-10-15T23:59:59.000Z

328

Office of Headquarters Personnel Security Operations  

Broader source: Energy.gov [DOE]

The Office of Headquarters Personnel Security manages and implements safeguards and security access authorization functions for DOE Headquarters and manages the Personal Identity Verification (PIV) process for Headquarters as mandated by Homeland Security Presidential Directive Number 12 (HSPD-12).

329

Departmental Personnel Security- Policy and Procedures  

Broader source: Energy.gov [DOE]

Departmental Personnel Security provides centralized and authoritative policy guidance and ensures consistent and effective implementation of the DOE personnel security program Department-wide to include the National Nuclear Security Administration.

330

EK101 Engineering Light Smart Lighting  

E-Print Network [OSTI]

EK101 Engineering Light Smart Lighting Homework for 9/10 1. Make an estimate (using if the patent is granted.) 3. What is a lumen? A lux? How are the two related? How would you use a lux meter, (Lux, Lumens/m2) Luminous Flux: Perceivable light power from a source, (Lumens) Use the lux meter

Bifano, Thomas

331

Measuring Light Reflectance of BGO Crystal Surfaces  

E-Print Network [OSTI]

by the National Nuclear Security Administration, Office ofby the National Nuclear Security Administration, Office of

Janecek, Martin

2009-01-01T23:59:59.000Z

332

Specific light in sculpture  

E-Print Network [OSTI]

Specific light is defined as light from artificial or altered natural sources. The use and manipulation of light in three dimensional sculptural work is discussed in an historic and contemporary context. The author's work ...

Powell, John William

1989-01-01T23:59:59.000Z

333

Independent Activity Report, Office of Secure Transportation...  

Broader source: Energy.gov (indexed) [DOE]

Office of Secure Transportation - March 2011 Independent Activity Report, Office of Secure Transportation - March 2011 March 2011 Report for the Appropriateness of Revisions to the...

334

Independent Oversight Evaluation, Office of Secure Transportation...  

Office of Environmental Management (EM)

Evaluation, Office of Secure Transportation - February 2004 Independent Oversight Evaluation, Office of Secure Transportation - February 2004 February 2004 Evaluation of the Office...

335

Independent Oversight Inspection, Office of Secure Transportation...  

Office of Environmental Management (EM)

Office of Secure Transportation - March 2007 Independent Oversight Inspection, Office of Secure Transportation - March 2007 March 2007 Inspection of Emergency Management at the...

336

Security & Defense Licenses Available | Tech Transfer | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Security and Defense SHARE Security and Defense 200401423 Synthesis Method for Stable Colloids of "Naked" Metal Nanocrystals 200501549 Enhanced Detection of Toxic Agents 200501614...

337

Homeland Security and Emergency Management Coordination (HSEMC...  

National Nuclear Security Administration (NNSA)

Homeland Security and Emergency Management Coordination (HSEMC) Program | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the...

338

Preliminary Notice of Violation, National Security Technologies...  

Office of Environmental Management (EM)

Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 Preliminary Notice of Violation, National Security Technologies, LLC - NEA-2011-03 August 11,...

339

Safety and Security Enforcement Process Overview  

Broader source: Energy.gov (indexed) [DOE]

SAFETY AND SECURITY ENFORCEMENT PROCESS OVERVIEW August 2012 OFFICE OF ENFORCEMENT AND OVERSIGHT OFFICE OF HEALTH, SAFETY AND SECURITY U.S. DEPARTMENT OF ENERGY AUGUST 2012 DOE...

340

Safety and Security Enforcement Coordinator Handbook  

Broader source: Energy.gov (indexed) [DOE]

SAFETY AND SECURITY ENFORCEMENT COORDINATOR HANDBOOK August 2012 Office of Enforcement and Oversight Office of Health, Safety and Security U.S. Department of Energy AUGUST 2012 DOE...

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


341

Harold Washington Social Security Administration (SSA) Center...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Harold Washington Social Security Administration (SSA) Center Water Conservation and Green Energy Harold Washington Social Security Administration (SSA) Center Water Conservation...

342

National Securities Technologies _NSTec_ Livermore Operations...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration NRTL Nationally Recognized Testing Laboratory NSTec National Security Technologies, LLC NTS Nevada Test Site OSHA Occupational Safety and...

343

Preliminary Notice of Violation, National Security Technologies...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

a Preliminary Notice of Violation (SEA-2014-02) to National Security Technologies, LLC (NSTec), for violations of Department of Energy's classified information security program...

344

National Nuclear Security Administration Appropriation and Program...  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

4 National Nuclear Security Administration Appropriation and Program Summary Tables Outyear Appropriation Summary Tables FY 2012 BUDGET TABLES National Nuclear Security...

345

Independent Oversight Review, Nevada National Security Site,...  

Broader source: Energy.gov (indexed) [DOE]

and Special Door Interlock systems at the Nevada National Security Site (NNSS) Device Assembly Facility (DAF). The NNSS DAF is operated by National Security Technologies, LLC...

346

Automated Security Compliance Tool for the Cloud.  

E-Print Network [OSTI]

?? Security, especially security compliance, is a major concern that is slowing down the large scale adoption of cloud computing in the enterprise environment. Business (more)

Ullah, Kazi Wali

2012-01-01T23:59:59.000Z

347

Independent Oversight Activity Report, Nevada National Security...  

Office of Environmental Management (EM)

Report, Nevada National Security Site - March 3-6, 2014 March 2014 Operational Awareness Oversight of the Nevada National Security Site HIAR NNSS-2014-03-03 This...

348

SECURITY ANALYSIS OF PROPOSEDTRAVELTO SENSITIVE COUNTRIES | Department...  

Broader source: Energy.gov (indexed) [DOE]

COUNTRIES More Documents & Publications 2014 Headquarters Facilities Master Security Plan - Chapter 6, Foreign Interaction PSH-12-0117 - In the matter of Personnel Security...

349

Extension of DOE Directive on Cyber Security  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

DOE N 205.4, Handling Cyber Security Alerts and Advisories and Reporting Cyber Security Incidents, is extended until 6/4/04.

2003-06-04T23:59:59.000Z

350

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

cyber-security analysis of the SCADA system of the Gignac water distributioncyber security of SCADA systems managing other infrastructures (e.g. , oil and natural gas distribution

Amin, Saurabh

2011-01-01T23:59:59.000Z

351

ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING...  

Broader source: Energy.gov (indexed) [DOE]

8: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS ADMINISTRATIVE RECORDS SCHEDULE 18: SECURITY, EMERGENCY PLANNING, AND SAFETY RECORDS Protection program records include the...

352

Enforcement Letter, Consolidated Nuclear Security, LLC | Department...  

Energy Savers [EERE]

security incidents involving the unclassified waste stream and discrepancies in the inventory of accountable nuclear material at DOE's Y-12 National Security Complex in Oak...

353

Measured Off-Grid LED Lighting System Performance  

SciTech Connect (OSTI)

This report is a product of our ongoing effort to support the development of high-quality yet affordable products for off-grid lighting in the developing world that have good potential to succeed in the market. The effort includes work to develop low-cost testing procedures, to identify useful performance metrics, and to facilitate the development of industry standards and product rating protocols. We conducted laboratory testing of nine distinct product lines. In some cases we also tested multiple generations of a single product line and/or operating modes for a product. The resultsare summarized in Table 1. We found that power consumption and light output varied by nearly a factor of 12, with efficacy varying by a factor of more than six. Of particular note, overall luminous efficacy varied from 8.2 to 53.1 lumens per watt. Color quality indices variedmaterially, especially for correlated color temperature. Maximum illuminance, beamcandlepower, and luminance varied by 8x, 32x, and 61x respectively, suggesting considerable differences among products in terms of service levels and visual comfort. Glare varied by1.4x, and was above acceptable thresholds in most cases. Optical losses play a role in overall performance, varying by a factor of 3.2 and ranging as high as 24percent. These findings collectively indicate considerable potential for improved product design.

Granderson, Jessica; Galvin, James; Bolotov, Dmitriy; Clear, Robert; Jacobson, Arne; Mills, Evan

2008-12-18T23:59:59.000Z

354

Cyber Security Evaluation of II&C Technologies  

SciTech Connect (OSTI)

The Light Water Reactor Sustainability (LWRS) Program is a research and development program sponsored by the Department of Energy, which is conducted in close collaboration with industry to provide the technical foundations for licensing and managing the long-term, safe and economical operation of current nuclear power plants The LWRS Program serves to help the US nuclear industry adopt new technologies and engineering solutions that facilitate the continued safe operation of the plants and extension of the current operating licenses. Within the LWRS Program, the Advanced Instrumentation, Information, and Control (II&C) Systems Technologies Pathway conducts targeted research and development (R&D) to address aging and reliability concerns with the legacy instrumentation and control and related information systems of the U.S. operating light water reactor (LWR) fleet. The II&C Pathway is conducted by Idaho National Laboratory (INL). Cyber security is a common concern among nuclear utilities and other nuclear industry stakeholders regarding the digital technologies that are being developed under this program. This concern extends to the point of calling into question whether these types of technologies could ever be deployed in nuclear plants given the possibility that the information in them can be compromised and the technologies themselves can potentially be exploited to serve as attack vectors for adversaries. To this end, a cyber security evaluation has been conducted of these technologies to determine whether they constitute a threat beyond what the nuclear plants already manage within their regulatory-required cyber security programs. Specifically, the evaluation is based on NEI 08-09, which is the industrys template for cyber security programs and evaluations, accepted by the Nuclear Regulatory Commission (NRC) as responsive to the requirements of the nuclear power plant cyber security regulation found in 10 CFR 73.54. The evaluation was conducted by a cyber security team with expertise in nuclear utility cyber security programs and experience in conducting these evaluations. The evaluation has determined that, for the most part, cyber security will not be a limiting factor in the application of these technologies to nuclear power plant applications.

Ken Thomas

2014-11-01T23:59:59.000Z

355

Security control methods for CEDR  

SciTech Connect (OSTI)

The purpose of this document is to summarize the findings of recent studies on the security problem in statistical databases and examine their applicability to the specific needs of CEDR. The document is organized as follows: In Section 2 we describe some general control methods which are available on most commercial database software. In Section 3 we provide a classification of statistical security methods. In Section 4 we analyze the type of users of CEDR and the security control methods which may be applied to each type. In Section 5 we summarize the findings of this study and recommend possible solutions.

Rotem, D.

1990-09-01T23:59:59.000Z

356

AP1000 Design for Security  

SciTech Connect (OSTI)

Nuclear power plants are protected from potential security threats through a combination of robust structures around the primary system and other vital equipment, security systems and equipment, and defensive strategy. The overall objective for nuclear power plant security is to protect public health and safety by ensuring that attacks or sabotage do not challenge the ability to safely shutdown the plant or protect from radiological releases. In addition, plants have systems, features and operational strategies to cope with external conditions, such as loss of offsite power, which could be created as part of an attack. Westinghouse considered potential security threats during design of the AP1000 PWR. The differences in plant configuration, safety system design, and safe shutdown equipment between existing plants and AP1000 affect potential vulnerabilities. This paper provides an evaluation of AP1000 with respect to vulnerabilities to security threats. The AP1000 design differs from the design of operating PWRs in the US in the configuration and the functional requirements for safety systems. These differences are intentional departures from conventional PWR designs which simplify plant design and enhance overall safety. The differences between the AP1000 PWR and conventional PWRs can impact vulnerabilities to security threats. The NRC addressed security concerns as part of their reviews for AP1000 Design Certification, and did not identify any security issues of concern. However, much of the detailed security design information for the AP1000 was deferred to the combined Construction and Operating License (COL) phase as many of the security issues are site-specific. Therefore, NRC review of security issues related to the AP1000 is not necessarily complete. Further, since the AP1000 plant design differs from existing PWRs, it is not obvious that the analyses and assessments prepared for existing plants also apply to the AP1000. We conclude that, overall, the AP1000 is less vulnerable to security threats such as malevolent use of vehicles (land, water or air), than are conventional PWRs. Further, the AP1000 is less vulnerable to external events (e.g., loss of transmission) than conventional PWRs. For some of the threats evaluated the AP1000 is comparable to conventional PWRs, while for other threats the AP1000 is inherently less vulnerable. (authors)

Long, L.B. [Southern Nuclear Operating Company, 40 Inverness Center Parkway, Birmingham, AL 35242 (United States); Cummins, W.E.; Winters, J.W. [Westinghouse Electric Company, 4350 Northern Pike, Monroeville, PA 15146 (United States)

2006-07-01T23:59:59.000Z

357

National Security Science July 2014  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNational Library of Energy LoginofNational SecuritySecurityJuly

358

DF-479 SD-11 Directory Security: Mechanisms and Practicality  

E-Print Network [OSTI]

This document reviews security issues and identifies some of the specific measures required to achieve security.

North American Directory

359

updated 6/7/2007 Aerospace Security Certificate (21 Hours)  

E-Print Network [OSTI]

Technologies AVED 5413* Landside Security Technologies AVED 5423* Security Planning, Audits, and NIMS AVED 5433

Veiga, Pedro Manuel Barbosa

360

A Strategy for Information Security: TOGAF , A. Movasseghi2  

E-Print Network [OSTI]

Security Planning, Information Security, TOGAF 1 Introduction Today's globally distributed network systems

Ertaull, Levent

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


361

CAMPUS ANNUAL SAFETY & SECURITY CRIME REPORT 2011 EMERGENCY NUMBERS  

E-Print Network [OSTI]

Security service is currently handled through a private security guard service contract, which provides

Olsen, Stephen L.

362

Cryptography and Data Security  

E-Print Network [OSTI]

The rising abuse of computers and increasing threat to personal privacy through data banks have stimulated much interest m the techmcal safeguards for data. There are four kinds of safeguards, each related to but distract from the others. Access controls regulate which users may enter the system and subsequently whmh data sets an active user may read or wrote. Flow controls regulate the dissemination of values among the data sets accessible to a user. Inference controls protect statistical databases by preventing questioners from deducing confidential information by posing carefully designed sequences of statistical queries and correlating the responses. Statlstmal data banks are much less secure than most people beheve. Data encryption attempts to prevent unauthorized disclosure of confidential information in transit or m storage. This paper describes the general nature of controls of each type, the kinds of problems they can and cannot solve, and their inherent limitations and weaknesses. The paper is intended for a general audience with little background in the area.

Dorothy E. Denning; Peter; J. Denning

1982-01-01T23:59:59.000Z

363

CALiPER Exploratory Study: Recessed Troffer Lighting  

SciTech Connect (OSTI)

This report describes an exploration of troffer lighting as used in office and classroom spaces, which was conducted by the CALiPER program. Twenty-four pairs of 22 and 24 troffers were procured anonymously, documented, tested for photometric and electrical performance, and installed in a mockup office space in Portland, Oregon. Three of the pairs were T8 fluorescent benchmark products, 12 were dedicated LED troffers, five were fluorescent troffers modified for LED lamps (sometimes referred to as "tubes"), and another four troffers were modified with LED retrofit kits. The modifications were performed by a commercial electrical contractor, following the instructions provided by the retrofit lamp or kit manufacturer. Once installed in the mockup facility, the converted luminaires were examined by a NRTL (Nationally Recognized Testing Laboratory) safety expert, who provided feedback on safety issues. In September 2012, a group of lighting designers, engineers, and facility managers were brought in to observe the LED luminaires in comparison to fluorescent benchmarks. This report documents performance in measures that go beyond illuminance values or luminaire efficacy. Dedicated LED troffers are ready to compete with fluorescent troffers in terms of efficacy (lumens per watt), and in many lighting quality issues such as glare, light distribution, visual appearance, and color quality. That is not to say that each one is stellar, but each one tested in this CALiPER study bested the fluorescent benchmarks in terms of efficacy, and almost all were rated highly in several categories -- only one luminaire of twelve performed consistently poorly.

Miller, Naomi J.; Royer, Michael P.; Poplawski, Michael E.

2013-04-28T23:59:59.000Z

364

Demonstration Assessment of Light Emitting Diode (LED) Residential Downlights and Undercabinet Lights in the Lane County Tour of Homes, Eugene, Oregon  

SciTech Connect (OSTI)

In August 2008 the Pacific Northwest National Laboratory (PNNL) conducted a light emitting diode (LED) residential lighting demonstration project for the U.S. Department of Energy (DOE), Office of Building Technologies, as part of DOEs Solid State Lighting (SSL) Technology Demonstration Gateway Program. Two lighting technologies, an LED replacement for downlight lamps (bulbs) and an LED undercabinet lighting fixture, were tested in the demonstration which was conducted in two homes built for the 2008 Tour of Homes in Eugene, Oregon. The homes were built by the Lane County Home Builders Association (HBA), and Future B Homes. The Energy Trust of Oregon (ETO) also participated in the demonstration project. The LED downlight product, the LR6, made by Cree LED Lighting Solutions acts as a screw-in replacement for incandescent and halogen bulbs in recessed can downlights. The second product tested is Phillips/Color Kinetics eW Profile Powercore undercabinet fixture designed to mount under kitchen cabinets to illuminate the countertop and backsplash surfaces. Quantitative and qualitative measurements of light performance and electrical power usage were taken at each site before and after initially installed halogen and incandescent lamps were replaced with the LED products. Energy savings and simple paybacks were also calculated and builders who toured the homes were surveyed for their responses to the LED products. The LED downlight product drew 12 Watts of power, cutting energy use by 82% compared to the 65W incandescent lamp and by 84% compared to the 75W halogen lamp. The LED undercabinet fixture drew 10 watts, cutting energy use by 83% to 90% compared to the halogen product, which was tested at two power settings: a low power 60W setting and a high power 105W setting. The LED downlight consistently provided more light than the halogen and incandescent lamps in horizontal measurements at counter height and floor level. It also outperformed in vertical illuminance measurements taken on the walls, indicating better lateral dispersion of the light. The undercabinet fixtures light output was midway between the low and high power halogen undercabinet fixture light outputs (35.8 foot candle versus 13.4 fc and 53.4 fc) but it produced a more uniform light (max/min ratio of 7.0 versus 10.8). The color correlated temperature (CCT, the blue or yellowness) of the LED light correlated well with the halogen and incandescent lights (2675 K vs 2700 K). The color rendering of the LED downlight also correlated well at 92 CRI compared to 100 CRI for the halogen and incandescent lamps. The LED undercabinet fixture had measures of 2880 K CCT and 71 CRI compared to the 2700 K and 100 CRI scores for the halogen undercabinet fixture. Builders who toured the homes were surveyed; they gave the LED downlight high marks for brightness, said the undercabinet improved shadows and glare and said both products improved overall visibility, home appearance, and home value. Paybacks on the LED downlight ranged from 7.6 years (assuming electricity cost of 11 c/kWh) to 13.5 years (at 5C/kWh). Paybacks on the LED undercabinet fixture in a new home ranged from 4.4 years (11c/kWh electricity) to 7.6 years (5c/kWh) based on product costs of $95 per LED downlight and $140 per LED undercabinet fixture at 3 hrs per day of usage for the downlight and 2 hrs per day for the undercabinet lighting.

Ton, My K.; Richman, Eric E.; Gilbride, Theresa L.

2008-11-10T23:59:59.000Z

365

Achieving Energy Savings with Highly-Controlled Lighting in an Open-Plan Office  

SciTech Connect (OSTI)

An installation in a Federal building tested the effectiveness of a highly-controlled, workstation-specific lighting retrofit. The study took place in an open-office area with 86 cubicles and low levels of daylight. Each cubicle was illuminated by a direct/indirectpendant luminaire with three 32 watt lamps, two dimmable DALI ballasts, and an occupancy sensor. A centralized control system programmed all three lamps to turn on and off according to occupancy on a workstation-by-workstation basis. Field measurements taken over the course of several monthsdemonstrated 40% lighting energy savings compared to a baseline without advanced controls that conforms to GSA's current retrofit standard. A photometric analysis found that the installation provided higher desktop light levels than the baseline, while an occupant survey found that occupants in general preferred the lighting system to thebaseline.Simple payback is fairly high; projects that can achieve lower installation costs and/or higher energy savings and those in which greenhouse gas reduction and occupant satisfaction are significant priorities provide the ideal setting for workstation-specific lighting retrofits.

Rubinstein, Francis; Enscoe, Abby

2010-04-19T23:59:59.000Z

366

Meeting Federal Energy Security Requirements  

Broader source: Energy.gov [DOE]

Presentationgiven at at the Fall 2012 Federal Utility Partnership Working Group (FUPWG) meetingdiscusses the opportunity to increase the scope of federal-utility partnerships for meeting energy security requirements.

367

Utility Security & Resiliency: Working Together  

Broader source: Energy.gov [DOE]

Presentationgiven at the Federal Utility Partnership Working Group (FUPWG) Fall 2008 meetingdiscusses Edison Electric Institute (EEI), including its key security objectives, key activities, cybersecurity activities, and spare transformer equipment program (STEP).

368

Intrusion detection using secure signatures  

DOE Patents [OSTI]

A method and device for intrusion detection using secure signatures comprising capturing network data. A search hash value, value employing at least one one-way function, is generated from the captured network data using a first hash function. The presence of a search hash value match in a secure signature table comprising search hash values and an encrypted rule is determined. After determining a search hash value match, a decryption key is generated from the captured network data using a second hash function, a hash function different form the first hash function. One or more of the encrypted rules of the secure signatures table having a hash value equal to the generated search hash value are then decrypted using the generated decryption key. The one or more decrypted secure signature rules are then processed for a match and one or more user notifications are deployed if a match is identified.

Nelson, Trent Darnel; Haile, Jedediah

2014-09-30T23:59:59.000Z

369

Securities trading of concepts (STOC)  

E-Print Network [OSTI]

Identifying winning new product concepts can be a challenging process that requires insight into private consumer preferences. To measure consumer preferences for new product concepts, the authors apply a securities trading ...

Dahan, Ely

370

Italy | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

United States and Italy on the 2014 Nuclear Security Summit See a fact sheet here.The White HouseOffice of the Press SecretaryItaly and the United States of America are pleased...

371

Belgium | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Elio Di Rupo of Belgium on the 2014 Nuclear Security Summit See a fact sheet here.The White HouseOffice of the Press SecretaryBelgium and the United States of America are pleased...

372

Forrestal Security and Safety Procedures  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish uniform procedures for the security and safety of the Forrestal Building and to inform all personnel of precautionary measures. This directive does not cancel another directive. Canceled by DOE N 251.11.

1983-02-02T23:59:59.000Z

373

INL@Work Cyber Security  

SciTech Connect (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2010-01-01T23:59:59.000Z

374

Cyber Security Process Requirements Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The Manual establishes minimum implementation standards for cyber security management processes throughout the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B. No cancellations.

2008-08-12T23:59:59.000Z

375

Security Area Vouching and Piggybacking  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

Establishes requirements for the Department of Energy (DOE) Security Area practice of "vouching" or "piggybacking" access by personnel. DOE N 251.40, dated 5-3-01, extends this directive until 12-31-01.

2000-06-05T23:59:59.000Z

376

INL@Work Cyber Security  

ScienceCinema (OSTI)

May Chaffin is one of many Idaho National Laboratory researchers who are helping secure the nation's critical infrastructure from cyber attacks. Lots more content like this is available at INL's facebook page http://www.facebook.com/idahonationallaboratory.

Chaffin, May

2013-05-28T23:59:59.000Z

377

Master Safeguards and Security Agreements  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

To establish the Department of Energy policy, requirements, responsibilities, and authorities for the development and implementation of Master Safeguards and Security Agreements (MSSA's). Does not cancel another directive. Canceled by DOE O 5630.13A

1988-02-03T23:59:59.000Z

378

Cognitive Security for Personal Devices  

E-Print Network [OSTI]

Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human minds---for example, computers authenticate ...

Greenstadt, Rachel

2008-03-17T23:59:59.000Z

379

Front lighted optical tooling method and apparatus  

DOE Patents [OSTI]

An optical tooling method and apparatus uses a front lighted shadowgraphic technique to enhance visual contrast of reflected light. The apparatus includes an optical assembly including a fiducial mark, such as cross hairs, reflecting polarized light with a first polarization, a polarizing element backing the fiducial mark and a reflective surface backing the polarizing element for reflecting polarized light bypassing the fiducial mark and traveling through the polarizing element. The light reflected by the reflecting surface is directed through a second pass of the polarizing element toward the frontal direction with a polarization differing from the polarization of the light reflected by the fiducial mark. When used as a tooling target, the optical assembly may be mounted directly to a reference surface or may be secured in a mounting, such as a magnetic mounting. The optical assembly may also be mounted in a plane defining structure and used as a spherometer in conjunction with an optical depth measuring instrument. A method of measuring a radius of curvature of an unknown surface includes positioning the spherometer on a surface between the surface and a depth measuring optical instrument. As the spherometer is frontally illuminated, the distance from the depth measuring instrument to the fiducial mark and the underlying surface are alternately measured and the difference in these measurements is used as the sagittal height to calculate a radius of curvature.

Stone, William J. (Kansas City, MO)

1985-06-18T23:59:59.000Z

380

Critical Infrastructure and Cyber Security  

E-Print Network [OSTI]

that employ stealth methods such as steganography, allowing botmasters to exploit public forums and search engines #1; As U.S. national elections draw near, an increase in phishing, scams and malicious code targeting candidates, campaigns, etc.... Chemical Manufacturing The Chemical Manufacturing sector combines organic and inorganic materials to make chemicals used in everyday life and that contribute to the national security, public safety, and economic security. The components...

Doll, Abby; Pirrong, Renee; Jennings, Matthew; Stasny, George; Giblin, Andy; Shaffer, Steph; Anderson, Aimee

2011-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


381

Office of Headquarters Security Operations  

Broader source: Energy.gov [DOE]

The Office of Headquarters Security Operations strengthens national security by protecting personnel, facilities, property, classified information, and sensitive unclassified information for DOE Headquarters facilities in the National Capital Area under normal and abnormal (i.e., emergency) conditions; managing access authorization functions for Headquarters; ensuring that executives and dignitaries are fully protected, and supporting efforts to ensure the continuity of government in all circumstances as mandated by Presidential Decision Directive.

382

Homeland Security Issues for Facilities  

E-Print Network [OSTI]

efficiency filters typically cause greater static pressure drop. Replacing air handling units to accept higher efficiency filters can be a major undertaking and expense. Besides offering some protection from biological and radiological agents, efficient..., security, surveillance, ventilation and filtration, and maintenance and training. The remainder of this discussion will focus primarily on occupant protection through HVAC system readiness and additional security measures. The aftermath of natural...

McClure, J. D.; Fisher, D.; Fenter, T.

2004-01-01T23:59:59.000Z

383

Cyber Security Incident Management Manual  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The manual establishes minimum requirements for a structured cyber security incident detection and management process for detecting, identifying, categorizing, containing, reporting, and mitigating cyber security incidents involving DOE information and information systems operated by DOE or by contractors on behalf of the Department. Admin Chg 1 dated 9-1-09; Admin Chg 2 dated 12-22-09. Canceled by DOE O 205.1B.

2009-01-08T23:59:59.000Z

384

Extracting Security Control Requirements University of Tulsa  

E-Print Network [OSTI]

-component systems or systems of systems (SoSs) are difficult to verify because the security controls must to formulate functional requirements from security controls with SoSs as the target. The process starts accepted security controls for "Federal Information Systems and Organizations" [8]. NIST defines security

Gamble, R. F.

385

06 DEC 2013 1 Information Security Guideline  

E-Print Network [OSTI]

responsibilities make informed decisions related to their organization's assets and corresponding security plan the University. 3 Security Plan Intention The executive heads of major University organizations are responsible an Information Security Plan (Plan) that demonstrates due care in securing their assets by meeting the intention

Queitsch, Christine

386

April 11, 2005 --Lecture 31 Computer Security  

E-Print Network [OSTI]

Science Policy Ancillaries #12;Security Planning Team Must represent all stakeholders, typically: Hardware

Jones, Douglas W.

387

Decision Support for Choice of Security  

E-Print Network [OSTI]

Decision Support for Choice of Security Solution The Aspect-Oriented Risk Driven Development (AORDD decisions. (4) RDD annotation rules for security risk and security solution variable estimation. (5) The AORDD security solution trade-o analysis and trade-o tool BBN topology. (6) Rule set for how

Langseth, Helge

388

Lighting and Daylight Harvesting  

E-Print Network [OSTI]

exposing us to the latest products and technologies. Daylight Harvesting A system of controlling the direction and the quantity of light both natural and artificial within a given space. This implies: Control of fenestration in terms of size..., transmission and direction. Control of reflected light within a space. Control of electric light in terms of delivery and amount Daylight harvesting systems are typically designed to maintain a minimum recommended light level. This light level...

Bos, J.

2011-01-01T23:59:59.000Z

389

Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms?  

E-Print Network [OSTI]

Can We Improve Energy Efficiency of Secure Disk Systems without Modifying Security Mechanisms--Improving energy efficiency of security-aware storage systems is challenging, because security and energy security and energy efficiency is to profile encryption algorithms to decide if storage systems would

Qin, Xiao

390

Cyber Security Companies, governments, and consumers depend on secure and reliable  

E-Print Network [OSTI]

Cyber Security Companies, governments, and consumers depend on secure and reliable computer-speed computers all introduce new cyber-security challenges. Cyber- security researchers at the University in the software development cycle. e also creates secure authentication protocols for vulnerable distributed

Hill, Wendell T.

391

Cyber Security and Resilient Systems  

SciTech Connect (OSTI)

The Department of Energy (DOE) Idaho National Laboratory (INL) has become a center of excellence for critical infrastructure protection, particularly in the field of cyber security. It is one of only a few national laboratories that have enhanced the nations cyber security posture by performing industrial control system (ICS) vendor assessments as well as user on-site assessments. Not only are vulnerabilities discovered, but described actions for enhancing security are suggested both on a system-specific basis and from a general perspective of identifying common weaknesses and their corresponding corrective actions. These cyber security programs have performed over 40 assessments to date which have led to more robust, secure, and resilient monitoring and control systems for the US electrical grid, oil and gas, chemical, transportation, and many other sectors. In addition to cyber assessments themselves, the INL has been engaged in outreach to the ICS community through vendor forums, technical conferences, vendor user groups, and other special engagements as requested. Training programs have been created to help educate all levels of management and worker alike with an emphasis towards real everyday cyber hacking methods and techniques including typical exploits that are used. The asset owner or end user has many products available for its use created from these programs. One outstanding product is the US Department of Homeland Security (DHS) Cyber Security Procurement Language for Control Systems document that provides insight to the user when specifying a new monitoring and control system, particularly concerning security requirements. Employing some of the top cyber researchers in the nation, the INL can leverage this talent towards many applications other than critical infrastructure. Monitoring and control systems are used throughout the world to perform simple tasks such as cooking in a microwave to complex ones such as the monitoring and control of the next generation fighter jets or nuclear material safeguards systems in complex nuclear fuel cycle facilities. It is the intent of this paper to describe the cyber security programs that are currently in place, the experiences and successes achieved in industry including outreach and training, and suggestions about how other sectors and organizations can leverage this national expertise to help their monitoring and control systems become more secure.

Robert S. Anderson

2009-07-01T23:59:59.000Z

392

Chapter 13. No Watt Left Behind No Watt Left Behind  

E-Print Network [OSTI]

­ from the smallest refrigerator to the largest building air-conditioning system ­ become fouled of previous forays. Much of the current thinking for making buildings "smart" about their energy consumption. This information is essential in order to understand and optimize energy consumption, to detect and #12;Chapter 13

393

Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY, EUROPEAN SECURITY  

E-Print Network [OSTI]

Alister John Miskimmon, University of Birmingham. RECASTING THE SECURITY BARGAINS: GERMANY recent developments in European Union (EU) security policy and their implications for Germany's bilateral of a greater EU security capability has significantly affected Germany's bilateral relations with the USA

Sheldon, Nathan D.

394

International Masters Program in Nuclear Security Human Capacity Building in Nuclear Security  

E-Print Network [OSTI]

1 TUDelft International Masters Program in Nuclear Security Human Capacity Building in Nuclear Security Dirk Jan van den Berg President Del2 University of Technology participants, Nuclear security requires highly skilled experts. Professionals, who are familiar

Langendoen, Koen

395

Tag: Global Security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumber ofES&HGlobal Security

396

Tag: global security | Y-12 National Security Complex  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security AdministrationcontrollerNanocrystallineForeign ObjectOUR TableE9. TotalNumberSecurityglobal security

397

Office of Secure Transportation | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 - September 2006 The 2002 Wholesale PowerSecurity Office of Oil,ArgonneServices

398

Unconditionally secure bit commitment by causally independent encryptions  

E-Print Network [OSTI]

We propose a new classical bit commitment protocol using the relativistic constraint that signals cannot travel faster than the speed of light $c$. This protocol is unconditionally secure against both classical or quantum attacks. The sender (Alice) and the receiver (Bob) each controls two secure stations separated by a large distance $d$, and they communicate by exchanging classical information only. Alice commits by sending from her stations two causally independent encrypted messages to the neighboring Bob's stations, after that the protocol is out of her control and she plays no role in the unveiling phase. The commitment remains concealed for a period of $\\Delta t=d/2c$. This protocol requires only limited communication resources and is readily implementable with current technologies.

Chi-Yee Cheung

2014-04-28T23:59:59.000Z

399

V-005: ModSecurity Multipart Message Parsing Security Bypass Vulnerability  

Broader source: Energy.gov [DOE]

SEC Consult has reported a vulnerability in ModSecurity, which can be exploited by malicious people to bypass certain security restrictions.

400

Building boundary is necessary for the real estate industry, flood management, and homeland security applications.  

E-Print Network [OSTI]

Abstract Building boundary is necessary for the real estate industry, flood management, and homeland security applications. The extraction of building boundary is also a crucial and difficult step, and Purdue University campus are evaluated. Introduction Airborne lidar (light detection and ranging

Shan, Jie

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


401

Visual analysis of code security  

SciTech Connect (OSTI)

To help increase the confidence that software is secure, researchers and vendors have developed different kinds of automated software security analysis tools. These tools analyze software for weaknesses and vulnerabilities, but the individual tools catch different vulnerabilities and produce voluminous data with many false positives. This paper describes a system that brings together the results of disparate software analysis tools into a visual environment to support the triage and exploration of code vulnerabilities. Our system allows software developers to explore vulnerability results to uncover hidden trends, triage the most important code weaknesses, and show who is responsible for introducing software vulnerabilities. By correlating and normalizing multiple software analysis tools' data, the overall vulnerability detection coverage of software is increased. A visual overview and powerful interaction allows the user to focus attention on the most pressing vulnerabilities within huge volumes of data, and streamlines the secure software development workflow through integration with development tools.

Goodall, John R [ORNL] [ORNL; Radwan, Hassan [Applied Visions, Inc.] [Applied Visions, Inc.; Halseth, Lenny [Applied Visions, Inc.] [Applied Visions, Inc.

2010-01-01T23:59:59.000Z

402

Homeland Security and Defense Applications  

SciTech Connect (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2014-11-06T23:59:59.000Z

403

Homeland Security and Defense Applications  

ScienceCinema (OSTI)

Homeland Security and Defense Applications personnel are the best in the world at detecting and locating dirty bombs, loose nukes, and other radiological sources. The site trains the Nation's emergency responders, who would be among the first to confront a radiological or nuclear emergency. Homeland Security and Defense Applications highly training personnel, characterize the threat environment, produce specialized radiological nuclear detection equipment, train personnel on the equipment and its uses, test and evaluate the equipment, and develop different kinds of high-tech equipment to defeat terrorists. In New York City for example, NNSS scientists assisted in characterizing the radiological nuclear environment after 9/11, and produced specialized radiological nuclear equipment to assist local officials in their Homeland Security efforts.

None

2015-01-09T23:59:59.000Z

404

Sandia National Laboratories: efficient LED lighting  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1development Sandia, NRELdeep-waterbiofuels economicallyefficient LED lighting

405

alternative fuel light-duty vehicles  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched FerromagnetismWaste andAnniversary, part 2Zenoss,AmineBroadbandLight-Duty Vehicles T

406

Sandia National Laboratories: Advanced Light Source  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwardsSafeguardsEngineersSandia/NewAdvanced Light Source

407

Kyler Nelson Light Timer  

E-Print Network [OSTI]

designated by the user, the Arduino board will dim the light to save energy. The user designates the time instance, the light is dimmed using pulse width modulation (PWM) in the Arduino's pin number 11

Kachroo, Pushkin

408

Security-by-design handbook.  

SciTech Connect (OSTI)

This document is a draft SecuritybyDesign (SeBD) handbook produced to support the Work Plan of the Nuclear Security Summit to share best practices for nuclear security in new facility design. The Work Plan calls on States to %E2%80%9Cencourage nuclear operators and architect/engineering firms to take into account and incorporate, where appropriate, effective measures of physical protection and security culture into the planning, construction, and operation of civilian nuclear facilities and provide technical assistance, upon request, to other States in doing so.%E2%80%9D The materials for this document were generated primarily as part of a bilateral project to produce a SeBD handbook as a collaboration between the Japan Atomic Energy Agency (JAEA) Nuclear Nonproliferation Science and Technology Center and Sandia National Laboratories (SNL), which represented the US Department Energy (DOE) National Nuclear Security Administration (NNSA) under a Project Action Sheet PASPP04. Input was also derived based on tours of the Savannah River Site (SRS) and Japan Nuclear Fuel Limited (JNFL) Rokkasho Mixed Oxide Fuel fabrication facilities and associated project lessonslearned. For the purposes of the handbook, SeBD will be described as the systemlevel incorporation of the physical protection system (PPS) into a new nuclear power plant or nuclear facility resulting in a PPS design that minimizes the risk of malicious acts leading to nuclear material theft; nuclear material sabotage; and facility sabotage as much as possible through features inherent in (or intrinsic to) the design of the facility. A fourelement strategy is presented to achieve a robust, durable, and responsive security system.

Snell, Mark Kamerer; Jaeger, Calvin Dell; Scharmer, Carol; Jordan, Sabina Erteza; Tanuma, Koji [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Ochiai, Kazuya [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan; Iida, Toru [Japan Atomic Energy Agency, Tokai-mura, Ibaraki, Japan

2013-01-01T23:59:59.000Z

409

Climate Change and National Security  

SciTech Connect (OSTI)

Climate change is increasingly recognized as having national security implications, which has prompted dialogue between the climate change and national security communities with resultant advantages and differences. Climate change research has proven useful to the national security community sponsors in several ways. It has opened security discussions to consider climate as well as political factors in studies of the future. It has encouraged factoring in the stresses placed on societies by climate changes (of any kind) to help assess the potential for state stability. And it has shown that, changes such as increased heat, more intense storms, longer periods without rain, and earlier spring onset call for building climate resilience as part of building stability. For the climate change research community, studies from a national security point of view have revealed research lacunae, for example, such as the lack of usable migration studies. This has also pushed the research community to consider second- and third-order impacts of climate change, such as migration and state stability, which broadens discussion of future impacts beyond temperature increases, severe storms, and sea level rise; and affirms the importance of governance in responding to these changes. The increasing emphasis in climate change science toward research in vulnerability, resilience, and adaptation also frames what the intelligence and defense communities need to know, including where there are dependencies and weaknesses that may allow climate change impacts to result in security threats and where social and economic interventions can prevent climate change impacts and other stressors from resulting in social and political instability or collapse.

Malone, Elizabeth L.

2013-02-01T23:59:59.000Z

410

Integrated safeguards and security management plan  

SciTech Connect (OSTI)

Berkeley Lab is committed to scientific excellence and stewardship of its assets. While security principles apply to all work performed at the Laboratory, their implementation is flexible. Berkeley Lab adheres to the following principles: Line management owns security; Security roles and responsibilities are clearly defined and communicated; Security functions are integrated; An open environment supports the Laboratory's Mission; The security program must support the scientific and operational missions of the Laboratory and must be value added; and Security controls are tailored to individual and facility requirements.

Bowen, Sue, editor

2001-04-16T23:59:59.000Z

411

Status of the National Security Workforce  

SciTech Connect (OSTI)

This report documents the status of the national security workforce as part of the National Security Preparedness Project, being performed by the Arrowhead Center of New Mexico State University under a DOE/NNSA grant. This report includes an assessment of the current workforce situation. The national security workforce is an important component of national security for our country. With the increase of global threats of terrorism, this workforce is being called upon more frequently. This has resulted in the need for an increasing number of national security personnel. It is imperative to attract and retain a skilled and competitive national security workforce.

None

2008-03-31T23:59:59.000Z

412

safeguards | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 JointProgram Consortium -| National Nuclear Security

413

Nuclear Safeguards and Security Challenge:  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the ContributionsArms Control R&D ConsortiumNuclearSafeguards and Security Challenge:

414

Security Cases | Department of Energy  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0 %Security

415

Security_Walls_VPP_Award  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administrationcontroller systemsBi (2) SrEvaluating the Seasonalsw ' b 0SecuritySmart March

416

Sandia National Laboratories: Climate Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0Energy AdvancedEnergyEnergyMapping WaterMonitoringClimate Security

417

AIRPORT LIGHTING Session Highlights  

E-Print Network [OSTI]

AIRPORT LIGHTING Session Highlights In May 2002, the Airport Technical Assistance Program, also known as AirTAP, sponsored three airport-lighting training sessions at different locations in Minnesota information on airport lighting and navigational aid equipment selection, funding, maintenance, and operation

Minnesota, University of

418

Advanced Demand Responsive Lighting  

E-Print Network [OSTI]

Advanced Demand Responsive Lighting Host: Francis Rubinstein Demand Response Research Center demand responsive lighting systems ­ Importance of dimming ­ New wireless controls technologies · Advanced Demand Responsive Lighting (commenced March 2007) #12;Objectives · Provide up-to-date information

419

assa security center: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Cures All Dumb Ideas in Computer Security 919 Jul 2011 12 147 Annual Security Report October 2013 Materials Science Websites Summary: of Security Field Operations,...

420

PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE...  

Office of Environmental Management (EM)

INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM BUSINESS ENCLAVE PIA - INL SECURITY INFORMATION MANAGEMENT SYSTEM...

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


421

2014 Headquarters Facilities Master Security Plan - Chapter 11...  

Office of Environmental Management (EM)

1, Incidents of Security Concern 2014 Headquarters Facilities Master Security Plan - Chapter 11, Incidents of Security Concern October 2014 2014 Headquarters Facilities Master...

422

2014 Headquarters Facilities Master Security Plan - Chapter 17...  

Office of Environmental Management (EM)

7, Headquarters Security Officer Program 2014 Headquarters Facilities Master Security Plan - Chapter 17, Headquarters Security Officer Program June 2014 2014 Headquarters...

423

Energy and Security in Northeast Asia: Proposals for Nuclear Cooperation  

E-Print Network [OSTI]

The bilateral nuclear and security agreement between theThe bilateral nuclear and security agreement between thein East Asia's security, nuclear energy, and environment. It

Kaneko, Kumao; Suzuki, Atsuyuki; Choi, Jor-Shan; Fei, Edward

1998-01-01T23:59:59.000Z

424

Light emitting device comprising phosphorescent materials for white light generation  

DOE Patents [OSTI]

The present invention relates to phosphors for energy downconversion of high energy light to generate a broadband light spectrum, which emit light of different emission wavelengths.

Thompson, Mark E.; Dapkus, P. Daniel

2014-07-22T23:59:59.000Z

425

Light Duty Combustion Research: Advanced Light-Duty Combustion...  

Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

Combustion Research: Advanced Light-Duty Combustion Experiments Light Duty Combustion Research: Advanced Light-Duty Combustion Experiments 2009 DOE Hydrogen Program and Vehicle...

426

Nike | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

and capability to zoom down the focal diameter during the laser pulse. Nike's deeper UV light allows it to produce higher ablation pressures than frequency tripled glass lasers...

427

Space & Security Power Systems Facility  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

Working with INL Community Outreach Visitor Information Calendar of Events ATR National Scientific User Facility Center for Advanced Energy Studies Light Water Reactor...

428

all-weather security surveillance: Topics by E-print Network  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing...

429

SECURITY AND CONTROL OF NUCLEAR EXPLOSIVES AND NUCLEAR WEAPONS  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the1 -the Mid-Infrared0 ResourceAwards SAGE Awards ,# , onLightThe

430

Transportation Safeguards & Security Test Bed (TSSTB) | ORNL  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched Ferromagnetism in Layered NbS2Topo II:LIGHT-DUTYTransportation Safeguards and

431

Photonic crystal light source  

DOE Patents [OSTI]

A light source is provided by a photonic crystal having an enhanced photonic density-of-states over a band of frequencies and wherein at least one of the dielectric materials of the photonic crystal has a complex dielectric constant, thereby producing enhanced light emission at the band of frequencies when the photonic crystal is heated. The dielectric material can be a metal, such as tungsten. The spectral properties of the light source can be easily tuned by modification of the photonic crystal structure and materials. The photonic crystal light source can be heated electrically or other heating means. The light source can further include additional photonic crystals that exhibit enhanced light emission at a different band of frequencies to provide for color mixing. The photonic crystal light source may have applications in optical telecommunications, information displays, energy conversion, sensors, and other optical applications.

Fleming, James G. (Albuquerque, NM); Lin, Shawn-Yu (Albuquerque, NM); Bur, James A. (Corrales, NM)

2004-07-27T23:59:59.000Z

432

Embedded Controllers Control. Connectivity. Security.  

E-Print Network [OSTI]

Application Summary MCF5282 HVAC and Security Control Panel Application Summary MCF5307 Music Media Player controllers to help get their products to market quickly and cost-effectively. Aggressive price of continuous innovative technology--provides customers with the opportunity to build market share

Grantner, Janos L.

433

International Aviation Security Technology Symposium  

E-Print Network [OSTI]

Laboratory, US Dept. of Homeland Security, William J. Hughes Technical Center; Atlantic City, NJ, USA-wave Mach number as a function of distance from the explosion center. These data then yield a peak. Characterization of an explosive requires understanding of the energy released during detonation. Typically TNT

Settles, Gary S.

434

Cloud Security by Max Garvey  

E-Print Network [OSTI]

Cloud Security Survey by Max Garvey #12;Cloudy Cloud is Cloudy What is the cloud? On Demand Service Network access Resource pooling Elasticity of Resources Measured Service #12;Cloud Types/Variants Iaa Cloud Public Cloud Hybrid Cloud combination. Private cloud with overflow going to public cloud. #12

Tolmach, Andrew

435

Library Protocol Safety and Security  

E-Print Network [OSTI]

Library Protocol Safety and Security · The library is open only to members of Brasenose; strangers are not to be admitted. · Eating, drinking (with the exception of water) and smoking are strictly forbidden. · Library the library. · Lampshades must not be tilted or have notes, postcards etc attached to them; any such items

Oxford, University of

436

Secure Symmetrical Multilevel Diversity Coding  

E-Print Network [OSTI]

Secure symmetrical multilevel diversity coding (S-SMDC) is a source coding problem, where a total of L - N discrete memoryless sources (S1,...,S_L-N) are to be encoded by a total of L encoders. This thesis considers a natural generalization of SMDC...

Li, Shuo

2012-07-16T23:59:59.000Z

437

Security & Sustainability College of Charleston  

E-Print Network [OSTI]

Security & Sustainability POLI 399 College of Charleston Fall 2013 Day/Time: T/H; 10@cofc.edu Office: 284 King Street, #206 (Office of Sustainability) Office Hours: by appt or virtual apt Instructor is that if sustained well-being and prosperity of human and ecological systems is the goal of sustainability

Young, Paul Thomas

438

Corporate Security and Conflict Outcomes  

E-Print Network [OSTI]

..................................................................................................... 75 Competition in Security Contracting and Conflict Outcomes .................................. 80 Research Design ....................................................................................................... 88 Dependent Variable... ................................... 16 Table 2 Contracted Service Total by Corporate Structure ............................................... 42 Table 3 The Effects of Public and Individual Firms Operating in Iraq (Part A) .............. 54 Table 4 The Effects of Public...

Tkach, Benjamin K

2013-10-21T23:59:59.000Z

439

KNOWLEDGE: Building, Securing, Sharing & Applying  

E-Print Network [OSTI]

is to educate and provide powerful analytical tools for information sharing, collaboration & decision support against threats to cyber infrastructure and data Data management in emergency situations Risk analysis for challenging problems in data analysis that address present and emerging homeland security threats Our Mission

440

An Operations Research approach to aviation security  

E-Print Network [OSTI]

Since the terrorist attacks of September 11, 2001, aviation security policy has remained a focus of national attention. We develop mathematical models to address some prominent problems in aviation security. We explore ...

Martonosi, Susan Elizabeth

2005-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


441

Statistical analysis of correlated fossil fuel securities  

E-Print Network [OSTI]

Forecasting the future prices or returns of a security is extraordinarily difficult if not impossible. However, statistical analysis of a basket of highly correlated securities offering a cross-sectional representation of ...

Li, Derek Z

2011-01-01T23:59:59.000Z

442

Safeguards and Security Program, acronyms and abbereviations...  

Office of Environmental Management (EM)

Program, acronyms and abbereviations - DOE M 470.4-7 Safeguards and Security Program, acronyms and abbereviations - DOE M 470.4-7 August 26, 2005 Canceled Safeguards and Security...

443

Site Tour Security Plan.pdf  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

for Site Tours Regarding Request for Proposal No. DE-SOL-0001458 Page 1 of 6 SECURITY PLAN The Pantex Plant (Pantex), Y-12 National Security Complex (Y-12), and the Tritium...

444

DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY  

E-Print Network [OSTI]

379 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special funds: OFFICE OF THE ADMINISTRATOR For necessary expenses of the Office of the Administrator in the National Nuclear Security Administration, including official reception and representation expenses

445

DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY  

E-Print Network [OSTI]

361 DEPARTMENT OF ENERGY NATIONAL NUCLEAR SECURITY ADMINISTRATION Federal Funds General and special funds: OFFICE OF THE ADMINISTRATOR For necessary expenses of the Office of the Administrator in the National Nuclear Security Administration, including official reception and representation expenses (not

446

Improving tamper detection for hazardous waste security  

SciTech Connect (OSTI)

After September 11, waste managers are increasingly expected to provide improved levels of security for the hazardous materials in their charge. Many low-level wastes that previously had minimal or no security must now be well protected, while high-level wastes require even greater levels of security than previously employed. This demand for improved security comes, in many cases, without waste managers being provided the necessary additional funding, personnel, or security expertise. Contributing to the problem is the fact that--at least in our experience--waste managers often fail to appreciate certain types of security vulnerabilities. They frequently overlook or underestimate the security risks associated with disgruntled or compromised insiders, or the potential legal and political liabilities associated with nonexistent or ineffective security. Also frequently overlooked are potential threats from waste management critics who could resort to sabotage, vandalism, or civil disobedience for purposes of discrediting a waste management program.

Johnston, R. G. (Roger G.); Garcia, A. R. E. (Anthony R. E.); Pacheco, A. N. (Adam N.); Trujillo, S. J. (Sonia J.); Martinez, R. K. (Ronald K.); Martinez, D. D. (Debbie D.); Lopez, L. N. (Leon N.)

2002-01-01T23:59:59.000Z

447

Building an Information Technology Security Awareness  

E-Print Network [OSTI]

Building an Information Technology Security Awareness and Training Program Mark Wilson and Joan Hash C O M P U T E R S E C U R I T Y NIST Special Publication 800-50 Computer Security Division

448

Security Equipment and Systems Certification Program (SESCP)  

SciTech Connect (OSTI)

Sandia National Laboratories (SNL) and Underwriters Laboratories, Inc., (UL) have jointly established the Security Equipment and Systems Certification Program (SESCP). The goal of this program is to enhance industrial and national security by providing a nationally recognized method for making informed selection and use decisions when buying security equipment and systems. The SESCP will provide a coordinated structure for private and governmental security standardization review. Members will participate in meetings to identify security problems, develop ad-hoc subcommittees (as needed) to address these identified problems, and to maintain a communications network that encourages a meaningful exchange of ideas. This program will enhance national security by providing improved security equipment and security systems based on consistent, reliable standards and certification programs.

Steele, B.J. [Sandia National Labs., Albuquerque, NM (United States); Papier, I.I. [Underwriters Labs., Inc., Northbrook, IL (United States)

1996-06-20T23:59:59.000Z

449

IBM Internet Security Systems Threat Insight Monthly  

E-Print Network [OSTI]

the Report 01 Keylogging, by the numbers 02 Securing the Secure Shell ­ Advanced user authentication and key Page 1 #12;Keylogging, by the numbers Introduction During the course of malware analysis, especially

450

Physical Security System Sensitivity to DBT Perturbations  

E-Print Network [OSTI]

, multiple scenarios are assessed that test different sets of adversary capabilities to better uncover and understand any security system vulnerabilities that may exist. We believe the benefit of identifying these site-specific security vulnerabilities...

Conchewski, Curtis

2012-10-19T23:59:59.000Z

451

Delegating Network Security with More Information  

E-Print Network [OSTI]

Network security is gravitating towards more centralized control. Strong centralization places a heavy burden on the administrator who has to manage complex security policies and be able to adapt to users' requests. To be ...

Naous, Jad

452

Light extraction from organic light-emitting diodes for lighting applications by sand-blasting  

E-Print Network [OSTI]

Light extraction from organic light-emitting diodes for lighting applications by sand@ust.hk Abstract: Light extraction from organic light-emitting diodes (OLEDs) by scattering the light is one of the effective methods for large-area lighting applications. In this paper, we present a very simple and cost

453

New Solicitations | National Nuclear Security Administration  

National Nuclear Security Administration (NNSA)

Stewardship Science Academic Alliances New Solicitations New Solicitations The National Nuclear Security Administration's Office of Research, Development, Test, and Evaluation...

454

Preproposal Conference & Site Tour | National Nuclear Security...  

National Nuclear Security Administration (NNSA)

Preproposal Conference & Site Tour | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation...

455

Spring 2013 Computer Security Midterm 1  

E-Print Network [OSTI]

the site's security officers have set a policy that all access between machines must use two separate forms

Paxson, Vern

456

On Cyber Security for Networked Control Systems  

E-Print Network [OSTI]

J. [2004], Low-latency cryptographic protection for SCADAlatency high-integrity security retrofit for lecacy SCADA

Amin, Saurabh

2011-01-01T23:59:59.000Z

457

Track 6: Integrating Safety Into Security Operations  

Broader source: Energy.gov [DOE]

ISM Workshop Presentations Knoxville Convention Center, Knoxville, TN August 2009 Track 6: Integrating Safety Into Security Operations

458

Infrastructure & Sustainability | National Nuclear Security Administra...  

National Nuclear Security Administration (NNSA)

& Sustainability | National Nuclear Security Administration Facebook Twitter Youtube Flickr RSS People Mission Managing the Stockpile Preventing Proliferation Powering the Nuclear...

459

Energy Security: Microgrid Planning and Design (Presentation)  

SciTech Connect (OSTI)

Energy Security: Microgrid Planning and Design presentation to be given at the 2012 WREF in Denver, CO.

Giraldez, J.

2012-05-01T23:59:59.000Z

460

Security and United States Immigration Policy  

E-Print Network [OSTI]

National Security Council memorandum as created to encourage defection of all USSR nationals and key personnel from the satellite

Totten, Robbie James

2012-01-01T23:59:59.000Z

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


461

SMART LIGHTING SYSTEMS ULTIMATE LIGHTING The Smart Lighting  

E-Print Network [OSTI]

Integration (Holistic Integrated Design) · Sensors as important as LEDs · Interconnected systems (human, building, grid) · Artistic Design Freedom · Lighting is Health, Entertainment, Information and Illumination Cost at any brightness · Chip level integrated electronics THE ERC RESEARCH COVERS THE ENTIRE SUPPLY

Linhardt, Robert J.

462

Mobile RFID Security Issues -ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Security  

E-Print Network [OSTI]

Mobile RFID Security Issues - ICU 1 SCIS 2006: The 2006 Symposium on Cryptography and Information Engineers Mobile RFID Security Issues Divyan M. Konidala, Kwangjo Kim Cryptology and Information Security #12;Mobile RFID Security Issues - ICU 2 RFID Technology (1/2) Radio Frequency Identification (RFID

Kim, Kwangjo

463

Security Policy Specification Using a Graphical Approach Page 1 Security Policy Specification Using a Graphical  

E-Print Network [OSTI]

Security Policy Specification Using a Graphical Approach Page 1 Security Policy Specification Using of California, Davis {hoagland,pandey,levitt}@cs.ucdavis.edu Technical Report CSE-98-3 A security policy states for organizations to declare their security policies, even informal state- ments would be better than the current

California at Davis, University of

464

National Security Issues at Department of Homeland Security and Department of Wednesday, November 18th  

E-Print Network [OSTI]

Transformational & Applied Research Directorate U.S. Department of Homeland Security Domestic Nuclear Detection Directorate at the Department of Homeland Security's Domestic Nuclear Detection Office. In this role, heSeminar: National Security Issues at Department of Homeland Security and Department of Energy

Farritor, Shane

465

Continental energy security: Energy security in the North American context1  

E-Print Network [OSTI]

, commissioned reports, and signed legislation in an effort to stem crude oil imports and improve energy securityERG/201101 Continental energy security: Energy security in the North American context1 Larry Hughes, Canada 24 January 2011 1 A textbox for the Global Energy Assessment's Knowledge Module 5: Energy Security

Hughes, Larry

466

Securing Distributed Storage: Challenges, Techniques, and Systems  

E-Print Network [OSTI]

important security issues related to storage and present a comprehensive survey of the security services, present a critical review of the existing solutions, compare them, and highlight potential research issues time, recent trends in data outsourcing have raised many new privacy issues making security a crucial

Kim, Dae-Shik

467

GEORG-AUGUST-UNIVERSITT Computer Security  

E-Print Network [OSTI]

systems 2 #12;GEORG-AUGUST-UNIVERSIT?T G?TTINGEN Why Security? » Computer systems are ubiquitous in our daily life » Computers store and process our data » Computers access and control our resources » More: intelligent security systems » Machine learning and arti cial intelligence for security 4 T-800 HAL 9000WOPR

Grabowski, Jens

468

Systems Security at Chemical and Biochemical Engineering  

E-Print Network [OSTI]

and Biochemical Engineering. The Systems Administrator for Chemical and Biochemical Engineering regularly reviews network security.However, maintaining systems security is a group effort and a never-ending task. Here Administrator regarding security bugs that may affect your personal computer. If a patch is available, download

469

Human Resources Security Access Matrix Function Training  

E-Print Network [OSTI]

June 2013 Human Resources Security Access Matrix Function Training Course Required Class Mode Training Course Prerequisite Security Access Form Required Contact for Additional Information Complete Electronic I-9 Forms REC001: I-9 /E-Verify Web Training OR Online OR None Electronic I-9 Security Access Form

Wu, Shin-Tson

470

Optimal Security Liquidation Algorithms Sergiy Butenko  

E-Print Network [OSTI]

using a set of historical sample-paths of prices. 1. Introduction Consider the following decision making positions for several securities. Historical sequences of prices of these securities (after opening. The algorithms provide path-dependent strategies which sell some fractions of security depending upon price

Uryasev, Stanislav

471

Oak Ridge National Laboratory National Security Programs  

E-Print Network [OSTI]

Oak Ridge National Laboratory National Security Programs Dr. Michael A. Kuliasha, Chief Scientist National Security Technologies Oak Ridge National Laboratory #12;2 OAK RIDGE NATIONAL LABORATORY U. S Security Challenges #12;3 OAK RIDGE NATIONAL LABORATORY U. S. DEPARTMENT OF ENERGY How Will Our Enemies

472

Department of Energy Cyber Security Management Program  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the Department of Energy (DOE) Cyber Security Management Program (hereafter called the Program) is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE N 205.1

2003-03-21T23:59:59.000Z

473

Cloud Security: Issues and Concerns Pierangela Samarati*  

E-Print Network [OSTI]

1 Cloud Security: Issues and Concerns Authors Pierangela Samarati* Università degli Studi di Milano, Italy sabrina.decapitani@unimi.it Keywords cloud security confidentiality integrity availability secure data storage and processing Summary The cloud has emerged as a successful computing paradigm

Samarati, Pierangela

474

Third Annual Cyber Security and Information  

E-Print Network [OSTI]

Third Annual Cyber Security and Information Infrastructure Research Workshop May 14-15, 2007 TOWARDS COMPREHENSIVE STRATEGIES THAT MEET THE CYBER SECURITY CHALLENGES OF THE 21ST CENTURY Frederick Sheldon, Axel Krings, Seong-Moo Yoo, and Ali Mili (Editors) #12;CSIIRW07: Cyber Security and Information

Krings, Axel W.

475

Department of Energy Cyber Security Management  

Broader source: Directives, Delegations, and Requirements [Office of Management (MA)]

The purpose of the DOE Cyber Security Management Program is to protect all DOE cyber information and information systems in order to implement the requirements of applicable laws required to maintain national security and ensure DOE business operations proceed without security events such as interruption or compromise. Cancels DOE O 205.1. Canceled by DOE O 205.1B.

2006-12-04T23:59:59.000Z

476

Cyber Security in Smart Grid Substations  

E-Print Network [OSTI]

Cyber Security in Smart Grid Substations Thijs Baars Lucas van den Bemd Michail Theuns Robin van.089 3508 TB Utrecht The Netherlands #12;CYBER SECURITY IN SMART GRID SUBSTATIONS Thijs Baars T.Brinkkemper@uu.nl Abstract. This report describes the state of smart grid security in Europe, specifically the Netherlands

Utrecht, Universiteit

477

Business-driven security White paper  

E-Print Network [OSTI]

March 2008 Business-driven security White paper Take a holistic approach to business-driven security. #12;Take a holistic approach to business-driven security. 2 Overview Today's corporate leaders face multiple challenges, including the need to innovate in extremely competitive business climates

478

Energy Security in Nova Scotia Larry Hughes  

E-Print Network [OSTI]

to maintain energy security #12;Mr. Harper and his energy superpower · "...an ocean of oil soaked sand liesERG/200706 Energy Security in Nova Scotia Larry Hughes Energy Research Group Electrical to Café Canada, Mahone Bay 30 November 2007 #12;Energy security in Nova Scotia Larry Hughes, PhD Energy

Hughes, Larry

479

Electronic DOE Information Security System (eDISS) PIA, Office...  

Office of Environmental Management (EM)

DOE Information Security System (eDISS) PIA, Office of Health Safety and Security Electronic DOE Information Security System (eDISS) PIA, Office of Health Safety and Security...

480

Arnold Schwarzenegger LIGHTING RESEARCH PROGRAM  

E-Print Network [OSTI]

Project Summaries ELEMENT 2: ADVANCE LIGHTING TECHNOLOGIES PROJECT 2.1 LIGHT EMITTING DIODE (LED light emitting diodes (LED) technology for general lighting applications by developing a task lamp

Note: This page contains sample records for the topic "watt lighting security" from the National Library of EnergyBeta (NLEBeta).
While these samples are representative of the content of NLEBeta,
they are not comprehensive nor are they the most current set.
We encourage you to perform a real-time search of NLEBeta
to obtain the most current and comprehensive results.


481

Integrating Security Solutions to Support nanoCMOS Electronics Research  

E-Print Network [OSTI]

Sinnott,R.O. Asenov,A. Bayliss,C. Davenhall,C. Doherty,T. Harbulot,B. Jones,M. Martin,D. Millar,C. Roy,G. Roy,S. Stewart,G. Watt,J. IEEE International Symposium on Parallel and Distributed Processing Systems with Applications, Sydney Australia, December 2008.

Sinnott, R.O.

482

Facility Security Checklist U.S. Department of Transportation  

E-Print Network [OSTI]

was the last time security logs and/or incident reports were reviewed? 25. Is there a current security plan

Goodman, Robert M.

483

NISTIR 6462 CSPP -Guidance for COTS Security Protection Profiles  

E-Print Network [OSTI]

..................................................................................................................................................4 2.2 OPERATIONAL ENVIRONMENT ............................................................................................................................... 25 4.3 JOINT TOE/ENVIRONMENT SECURITY OBJECTIVES...................................................................................................................5 3. SECURITY ENVIRONMENT

484

2012 Annual Planning Summary for National Nuclear Security Administrat...  

Broader source: Energy.gov (indexed) [DOE]

National Nuclear Security Administration 2012 Annual Planning Summary for National Nuclear Security Administration The ongoing and projected Environmental Assessments and...

485

Reliable Process for Security Policy Deployment  

E-Print Network [OSTI]

We focus in this paper on the problem of configuring and managing network security devices, such as Firewalls, Virtual Private Network (VPN) tunnels, and Intrusion Detection Systems (IDSs). Our proposal is the following. First, we formally specify the security requirements of a given system by using an expressive access control model. As a result, we obtain an abstract security policy, which is free of ambiguities, redundancies or unnecessary details. Second, we deploy such an abstract policy through a set of automatic compilations into the security devices of the system. This proposed deployment process not only simplifies the security administrator's job, but also guarantees a resulting configuration free of anomalies and/or inconsistencies.

Preda, Stere; Cuppens, Frederic; Garcia-Alfaro, Joaquin; Toutain, Laurent

2009-01-01T23:59:59.000Z

486

National Synchrotron Light Source  

ScienceCinema (OSTI)

A tour of Brookhaven's National Synchrotron Light Source (NSLS), hosted by Associate Laboratory Director for Light Sources, Stephen Dierker. The NSLS is one of the world's most widely used scientific research facilities, hosting more than 2,500 guest researchers each year. The NSLS provides intense beams of infrared, ultraviolet, and x-ray light for basic and applied research in physics, chemistry, medicine, geophysics, environmental, and materials sciences.

BNL

2009-09-01T23:59:59.000Z

487

LED Lighting Retrofit  

E-Print Network [OSTI]

? Municipal Street Lighting Consortium ? American Public Power Association (APPA) ? Demonstration in Energy Efficiency Development (DEED) ? Source of funding and database of completed LED roadway projects 6 Rules of the Road ESL-KT-11-11-57 CATEE 2011..., 2011 ? 9 Solar-Assisted LED Case Study LaQuinta Hotel, Cedar Park, Texas ? Utilizes 18 - ActiveLED Solar-Assisted Parking Lot Lights ? Utilizes ?power management? to extend battery life while handling light output ? Reduces load which reduces PV...

Shaw-Meadow, N.

2011-01-01T23:59:59.000Z

488

High efficiency incandescent lighting  

DOE Patents [OSTI]

Incandescent lighting structure. The structure includes a thermal emitter that can, but does not have to, include a first photonic crystal on its surface to tailor thermal emission coupled to, in a high-view-factor geometry, a second photonic filter selected to reflect infrared radiation back to the emitter while passing visible light. This structure is highly efficient as compared to standard incandescent light bulbs.

Bermel, Peter; Ilic, Ognjen; Chan, Walker R.; Musabeyoglu, Ahmet; Cukierman, Aviv Ruben; Harradon, Michael Robert; Celanovic, Ivan; Soljacic, Marin

2014-09-02T23:59:59.000Z

489

Total Light Management  

Broader source: Energy.gov [DOE]

Presentation covers total light management, and is given at the Spring 2010 Federal Utility Partnership Working Group (FUPWG) meeting in Providence, Rhode Island.

490

Lighting Technology Panel  

Broader source: Energy.gov [DOE]

Presentation covers theLighting Technology Panel for the Federal Utility Partnership Working Group (FUPWG) meeting, held onNovember 18-19, 2009.

491

Comparing Light Bulbs  

Broader source: Energy.gov [DOE]

In this exercise, students will use a light to demonstrate the difference between being energy-efficient and energy-wasteful, and learn what energy efficiency means.

492

Solid-State Lighting  

Broader source: Energy.gov (indexed) [DOE]

research and design. Quality LED luminaires require program designed to successfully move solid-state lighting precise design of several components -LED arrays, electronic into the...

493

Visualizing Cyber Security: Usable Workspaces  

SciTech Connect (OSTI)

An environment that supports cyber analytics work should enable multiple, simultaneous investigations, information foraging, and provide a solution space for organizing data. We describe our study of cyber security professionals and visualizations in a large, high-resolution display work environment. We discuss the tasks and needs of analysts that such an environment can support and present several prototypes designed to support these needs. We conclude with a usability evaluation of the prototypes and additional lessons learned.

Fink, Glenn A.; North, Christopher L.; Endert, Alexander; Rose, Stuart J.

2009-10-11T23:59:59.000Z

494

Simulated Interdiction: Proliferation Security Initiative  

E-Print Network [OSTI]

Parthia to curtail its nuclear weapons development programs. However, Bearia has often disagreed sharply with the U.S. and other international partners on specific steps to persuade Parthia to halt uranium enrichment. 17 For Simulation Use Only...For Simulation Use Only i For Simulation Use Only i George Bush School of Government and Public Service Nuclear Engineering Department Nuclear Security, Science and Policy Institute (NSSPI) Texas A&M University May 6, 2009 Simulated...

2009-01-01T23:59:59.000Z

495

research | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial Carbon CaptureFY08 Joint JOULECorrective

496

Nonproliferation | National Nuclear Security Administration  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear Security Administration the Contributions andDataNationalNewportBig Eddy

497

Security Council Approval of Kofi  

Energy Savers [EERE]

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Office of Inspector GeneralDepartment of Energyof the Americas | Department ofofDeliveredSectionSecuring theSEC.509

498

Safety and Security Policy Jobs  

Office of Science (SC) Website

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmosphericNuclear SecurityTensile Strain Switched5 Industrial CarbonArticlesHuman Resources

499

About SRNL - Directorates - National Security  

Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE:1 First Use of Energy for All Purposes (Fuel and Nonfuel),Feet) Year Jan Feb Mar Apr MayAtmospheric Optical Depth (AOD)Productssondeadjustsondeadjust DocumentationARMStreamsUSBudgetEnterpriseFermilabNational Security

500

Microgrid cyber security reference architecture.  

SciTech Connect (OSTI)

This document describes a microgrid cyber security reference architecture. First, we present a high-level concept of operations for a microgrid, including operational modes, necessary power actors, and the communication protocols typically employed. We then describe our motivation for designing a secure microgrid; in particular, we provide general network and industrial control system (ICS)-speci c vulnerabilities, a threat model, information assurance compliance concerns, and design criteria for a microgrid control system network. Our design approach addresses these concerns by segmenting the microgrid control system network into enclaves, grouping enclaves into functional domains, and describing actor communication using data exchange attributes. We describe cyber actors that can help mitigate potential vulnerabilities, in addition to performance bene ts and vulnerability mitigation that may be realized using this reference architecture. To illustrate our design approach, we present a notional a microgrid control system network implementation, including types of communica- tion occurring on that network, example data exchange attributes for actors in the network, an example of how the network can be segmented to create enclaves and functional domains, and how cyber actors can be used to enforce network segmentation and provide the neces- sary level of security. Finally, we describe areas of focus for the further development of the reference architecture.

Veitch, Cynthia K.; Henry, Jordan M.; Richardson, Bryan T.; Hart, Derek H.

2013-07-01T23:59:59.000Z